Tips open the PDF files that infected with viruses

Quoted from newest Kaspersky laboratory with topic "Information Security Threats in the First Quarter of 2010", now Adobe products is the main target of hackers. This is because the ability of the prevalence and multi-platform Adobe products. Among the many types of viruses, spyware and malware threats are detected, the family is the most popular Exploit.Win32.Pdfka with the percentage of 42.97 percent. This malware takes advantage of the weak side of Adobe Reader and Adobe Acrobat.

When coupled, Exploit.Win32.Pidief and Exploit.Win32.Pdfka targeting Adobe products with a total of 47.5 percent or about half of all attacks are detected. Detected attacks spread through the PDF document that contains Javascript that without the knowledge or consent from users to download and bring the rest of the malware directly from the internet.

Among the ten vulnerabilities of the most common software detected on users' computers during the first three months of the year 2010, three vulnerabilities found in Adobe products, six are found in Microsoft products, and the one found in Sun product.

All three programs targeting the vulnerabilities that Adobe was found on 23.37 percent, 17.87 percent and 15.27 percent of all computers are checked. The first vulnerability and last critical vulnerability that allows hackers to take complete control over the system remotely.

In addition, Adobe products user are often unaware of the potential threat posed, for example when opening a PDF file from an unknown sender. This report highlights the fact that many users of Adobe products do not install the patch that is designed to remove the software vulnerability and thus remain vulnerable to attacks.

One of the vulnerabilities in Adobe's products became public knowledge since three years ago has had a patch that is available all the time. This shows that there are still many users who do not update their software. To overcome this problem, on 13 April ago, Adobe released an automatic update that runs in the background. Developers are expected to help reduce the number of unpatched applications that look so attractive to cyber criminals.

0 komentar: