Targeted attacks on Abobe Reader files rise
GFI Software revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe …
GFI Software revealed continuing high levels of rogue security products circulating during January, and a surge in malware that takes aim at vulnerabilities within Adobe …
In this video, Peleus Uhley, the Platform Security Strategist at Adobe, talks about assessing, testing and validating Flash content. He discusses cross-site scripting, code …
Adobe’s PDF format and standard has been known for a while now to be easily exploitable and, thus, rather insecure. In the past, attackers have taken advantage not only …
E-mails purportedly coming from the Adobe Support Team, reminding the recipient that a new version of Adobe Acrobat Reader has been released and offering a link …
Critical vulnerabilities have been identified in Adobe Flash Player 10.1.85.3 and earlier versions for Windows, Macintosh, Linux, and Solaris, and Adobe Flash Player 10.1.95.1 …
Bad news just keep piling on Adobe – it looks like there is a new zero-day vulnerability in their Flash Player that is being exploited in the wild. Its existence is …
An important library-loading vulnerability has been identified in Adobe InDesign CS5 7.0.2 and earlier, InDesign Server CS5 7.0.2 and earlier, and InCopy CS5 7.0.2 and …
A series of e-mails purportedly sent by Adobe Acrobat Reader Support employees in which the users are urged to activate their “new Adobe PDF Reader” have been …
Adobe is announcing the new Acrobat X Family of Products which includes Adobe Reader X as well as Acrobat X Suite, Acrobat X Pro, and Acrobat X Standard. Reader X is the only …
Critical vulnerabilities have been identified in Adobe Reader 9.3.2 (and earlier versions) for Windows, Macintosh and UNIX, Adobe Acrobat 9.3.2 (and earlier versions) for …
Critical vulnerabilities have been identified in Adobe Flash Media Server (FMS) 3.5.2 and earlier versions. The vulnerabilities could allow an attacker, who successfully …