<body><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d10668659\x26blogName\x3dOrganized+Individualists\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dSILVER\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://organizedindividualists.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://organizedindividualists.blogspot.com/\x26vt\x3d-2572478259347834530', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Think that PDF email attachment is safe to open?

Think again.

"PDF exploits are usually the first ones attempted by attackers," said Mary Landesman, a ScanSafe senior security researcher, referring to the multi-exploit hammering that hackers typically give visitors to malicious Web sites. "Attackers are choosing PDFs for a reason. It's not random. They're establishing a preference for Reader exploits."

This is a tad scary for me, as I tend to trust PDF's over Microsoft Office documents (and don't EVEN try to send me a .exe file). The important takeaway here is: Don't open any attachments you didn't know were coming to you. Period.

“Think that PDF email attachment is safe to open?”

  1. Anonymous Anonymous Says:

    I've not heard of this being an issue until I read this post. I must be one terrific IT guy.