Blog Posts Tagged with "PDF"
May 04, 2012 Added by:Headlines
"RedKit is armed with two of the most popular exploits... The first exploit is a fairly obfuscated PDF file that exploits the LibTIFF vulnerability..." The second is the "latest Java exploit, dealing with the AtomicReferenceArray vulnerability..."
May 02, 2012 Added by:f8lerror
During many penetration tests the need to social engineer a target may be required. Let’s talk about something that completely relies on the user being conned into following the attackers instructions. The scenario is simple send the user a PDF form and have them submit the form...
January 30, 2012 Added by:Pierluigi Paganini
At least six Chinese IP addresses were used to proxy or host the command and control servers. The Netbox webserver is mainly used by those who speak Chinese. In fact, all the documentation to setup and learn the framework is only available in Mandarin...
January 26, 2012 Added by:Headlines
US-CERT has received reports of attacks using malware-laden email attachments. The advisory comes one week after multiple DDoS attacks were launched against entertainment industry and US government websites by Anonymous supporters in an operation dubbed OpMegaupload...
January 12, 2012 Added by:Infosec Island Admin
Generally, people just aren’t thinking all that much when they get these calls. Sure, people should never be asking them for their passwords, but now this. Open this file would you? Tell me how many pages it has to verify that you got it, would you?
November 11, 2011 Added by:Headlines
F-Secure's Mikko Hypponen urged organizations to reconsider the continued use of Adobe Reader given the tendency for attackers to exploit the application's frequent vulnerabilities. "These attacks are not against PDF - these attacks are against Adobe Reader," said Hypponen...
July 20, 2011 Added by:Headlines
February 08, 2011 Added by:Headlines
The growing popularity and variety of mobile communications platforms and a lack of consumer awareness about proper security precautions have provided criminals with ample opportunity to exploit devices like smartphones and tablets...
January 31, 2011 Added by:Headlines
Almost twenty million new malware threats were identified in 2010, according to research by IT lab AV-Test. The number is more than fifty percent greater than those identified in 2009, and the trend shows an increase in the prevalence of unique malware samples over the last ten years...
January 18, 2011 Added by:Headlines
Exploits utilizing the ubiquitous PDF document now account for as much as 36% of malicious code distribution, and PDFs are the leading source for web-based attacks according to Symantec's Quarterly Global Threat Report...
January 04, 2011 Added by:Headlines
A researcher has identified several flaws in the portable document file standard that produce some serious vulnerabilities. One finding shows the ability for a PDF to contain code for a database scanner that activates when the document is sent to a hub printer and can scan the entire network...
December 11, 2010 Added by:Headlines
The rogue hacker group Anonymous, which has been making headlines for their repeated DDoS attacks dubbed Operation Payback, issued a press release. The most interesting piece of information int the release, though, was the name of the text's author, which was present in the PDF's meta data...
White House Website Includes Unique Non-Cook... makejoh makejoh on 07-28-2014
EBS Encryption: Enhancing the Amazon Web Ser... makejoh makejoh on 07-28-2014
Security and the Internet of Things... makejoh makejoh on 07-28-2014