![]() ![]() ![]() The first thing you need to do if you’re interested in becoming a Foxit partner is to fill out the form on their website. More broadly, this serves as a timely lesson for legacy software platforms-age and ubiquity makes them more and not less susceptible to attack. Foxit is also the creator of PhantomPDF, which is a full-featured PDF editor that allows you to create, edit, convert, secure, and sign PDF documents. Clicking on a PDF is as benign an activity as most employees engage in during their working days.Īll users are advised to ensure that any PDF readers used on any platforms are updated to the latest versions right away, which should address the issues covered here. Putting the specifics around the inner workings of PDF files aside, either in general or for individual apps, these vulnerabilities are consistent with the current theme within cybersecurity-attacks don’t execute themselves, pretty much all of them require some inadvertent or malicious user interaction. Once code has been planted and executed within a target network, such attacks clearly open the wider organisation to attack.įoxit has patched the vulnerability. This could be CVs sent to an HR department or research documents shared with scientists or information from trade bodies. We have seen increasingly targeted “spear-phishing” attacks in recent months, using crafted attachments to trick users into executing code on target machines. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |