

I also use Secunia's PSI program & have for a long while & the scores come up as 100%. I have a routine each day before I start browsing, to update my security programs, then check FileHippo for new updates to programs I have installed. I don't surf the kind of sites known for malware, although I know any site can be infected. I know there's still risks, but as an older person who just uses the internet via one home pc & not shared, I think it's about as good as I can get it, as far as safety is concerned. I don't allow scripting etc & have it set up not to open pdf's while browsing. I found Foxit Reader to be more streamlined & doesn't run when not in use if set up properly. If there’s not an “Anatomy of Attack” event scheduled in your area soon, drop us a note and we’ll let you know if and when one is coming to your neck of the woods.įollow on Twitter for the latest computer security news.įollow on Instagram for exclusive pics, gifs, vids and LOLs!Ī few years ago, I stopped using Adobe Reader due to the bloat, resource usage & the endless security flaws. But even better than that, we hold regular “Anatomy of Attack” events where we demonstrate malware threats and you can meet Sophos experts face-to-face. If you want to learn more you can subscribe to our YouTube channel for similar videos. Hopefully videos like this will help remind people of the importance of keeping applications like Adobe Reader updated with the latest security patches, and not just their operating system. (Enjoy this video? Check out more on the SophosLabs YouTube channel.) Just the simple act of opening the PDF file can exploit a vulnerability to automatically download malicious code from the internet, and display a decoy PDF file to trick you into believing that nothing wrong has happened.Ĭheck out the following video by our own Chet Wisniewski, showing how a PDF can help hackers pwn your PC: Something as simple as opening a PDF file can infect your computer, and potentially allow malicious hackers to gain access to your corporate network.Ĭybercriminals create boobytrapped PDF files, exploiting vulnerabilities in PDF reading software such as Adobe Reader, and either spam them out to unsuspecting victims or plant them on websites where they lie in wait for visitors.
