Blog Posts Tagged with "Adobe"

69dafe8b58066478aea48f3d0f384820

F-Secure: Malicious PDFs Targeting Defense Contractors

July 20, 2011 Added by:Headlines

"It's a PDF file... sent to an employee of a targeted company as an email attachment. It exploits a known Javascript vulnerability and drops a... backdoor. A decoy PDF file is shown... [as] a call for papers for 2012 AIAA Strategic and Tactical Missile Systems Conference... classified as SECRET..."

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Adobe Issues Updates for Flash Zero Day Vulnerability

April 18, 2011 Added by:Headlines

Adobe has issued an update to counter the latest Flash player zero-day flaw which is similar to a vulnerability patched last month that was suspected of playing a critical role in the network breach of security vendor RSA, a division of EMC...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Confirms Another Flash Player Zero Day Bug

April 12, 2011 Added by:Headlines

This vulnerability could allow an attacker to take control of the affected system. There are reports that this vulnerability is being exploited in the wild in targeted attacks via a Flash file embedded in a Microsoft Word file delivered as an email attachment...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Flash Zero Day Bug Central to RSA Hack

April 04, 2011 Added by:Headlines

Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Be Wary of Fake Adobe Update Scam

March 31, 2011 Added by:Headlines

"Amid reports of Adobe’s recent zero-day vulnerability, users have been urged to update to the newest version. Unfortunately, scammers are using this as an opportunity to target users," CSO's Bill Brenner said...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

McAfee: Mobile Malware Growth at All-Time High

February 08, 2011 Added by:Headlines

The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nearly Twenty Million New Malware Threats in 2010

January 31, 2011 Added by:Headlines

Almost twenty million new malware threats were identified in 2010, according to research by IT lab AV-Test. The number is more than fifty percent greater than those identified in 2009, and the trend shows an increase in the prevalence of unique malware samples over the last ten years...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

PDFs Now Leading Source of Malware Attacks

January 18, 2011 Added by:Headlines

Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Threats Lurk in Adobe PDF Documents

January 04, 2011 Added by:Headlines

A researcher has identified several flaws in the portable document file standard that produce some serious vulnerabilities. One finding shows the ability for a PDF to contain code for a database scanner that activates when the document is sent to a hub printer and can scan the entire network...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Analysis: Flash Player in a Chrome Sandbox

December 22, 2010 Added by:Rafal Los

The problems Adobe has had lately keeping itself off the 0-day list week after week doesn't bode well for the trust that browser makers have in the product... and apparently Google Chrome is the first to come out and drop Flash player right into a sandbox...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Report: Ten Most Vulnerable Applications for 2010

November 20, 2010 Added by:Headlines

The criteria for making the list require that the application be a consumer or end-user product that is not classified as being malicious by reporting outlets and which contains at least one critical vulnerability...

Comments  (1)

E313765e3bec84b2852c1c758f7244b6

Keep Your Eyes on this Adobe Zero Day

October 31, 2010 Added by:Brent Huston

A new Adobe exploit is circulating via Flash movies in the last day or so. Looks like the vulnerability is present across many Adobe products and can be exploited on Android, Linux, Windows and OS X. Keep a closer than usual eye out for suspicious new processes running on workstations...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Adobe Releases Critical Patches for Flash Player

July 31, 2009 Added by:Infosec Island Admin

Today, Adobe released version 10.0.32.18 of their Flash Player software. This new version fixes multiple critical vulnerabilities, many of this Adobe has not been forthcoming about.

Comments  (4)

Page « < 1 - 2 > »