skip to main
|
skip to sidebar
Techie DIY
Monday, April 5, 2010
Exploits unneeded to attack via PDF files
Exploits unneeded to attack via PDF files
from
CNET News.com
Researchers devise ways to get malware onto computers, and even into clean PDF files, without exploiting any holes in the PDF reader software or using JavaScript.
http://bit.ly/bjqDKO
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
Followers
Blog Archive
►
2013
(223)
►
October
(9)
►
September
(22)
►
August
(20)
►
July
(13)
►
June
(19)
►
May
(29)
►
April
(27)
►
March
(29)
►
February
(27)
►
January
(28)
►
2012
(247)
►
December
(22)
►
November
(7)
►
October
(6)
►
September
(45)
►
August
(55)
►
July
(40)
►
June
(14)
►
May
(24)
►
April
(19)
►
March
(10)
►
February
(5)
►
2011
(14)
►
January
(14)
▼
2010
(246)
►
December
(19)
►
November
(29)
►
October
(34)
►
September
(38)
►
August
(27)
►
July
(7)
►
June
(5)
►
May
(11)
▼
April
(65)
Google Excites Site Owners with New Conversion Num...
Seven Steps to Online Marketing Success
Opera Mini iPhone App Downloaded 1 Million Times O...
Getting More Targeted Traffic
The Changing Web We Weave: Evolution of The 404 Page
Who's #1 in broadband? 1Gbps fiber for $26 in Hong...
It's Time to Rethink Your Approach to Analytics
5 Dumb Design Mistakes That Crush Copy (And How to...
Content and Usability
Is Social Media Becoming Boring?
The Medium Is The Message In Link Building
Fast Mobile Broadband Costs Vary Greatly Worldwide
8 Secrets of Success Within SEO
Mary Meeker: Mobile Internet Will Soon Overtake Fi...
Google on Net Neutrality, Its Fiber Buildout and C...
Americans Conducted 15.4 Billion Core Searches in ...
Discovering What Web 2.0 Really Means
Browser Wars: Apple, Mozilla Tweak their Entries
The Mercenary's Guide to Building Your Internet Ma...
Beginner's Guide to Link Metrics
Announcing Florie Brizel?s talk on ?Mobilology?
An Internet for Everybody
Paid Content: the New Paid Link
Grabbing Your Traffic by the Long Tail and Other R...
Why a Bad Economy Is the Best Time to Start a Busi...
Cup of Joe: Marketing Is For People With No Friends
It?s Official: Google Now Counts Site Speed As A R...
Don't blink: Hard-charging FCC turns broadband pla...
AT&T Overhauls Image -- Is it Afraid of the Big Ba...
Dead? Hardly. Ruling all but ensures net neutrality
Search Growth Slows In The U.S.
FCC pushes forward with broadband agenda
Yahoo: Dominate Search Results Like Matt Cutts
3 Ways To Use Google?s Search Results For Keyword ...
Verizon Tries to Patent Spot Pricing for the Cloud
Yahoo Searches Gain 3% of Market Share
Internet Ad Revenue Hit Record High In Q4 2009
Six Reasons SEOs Love Blogs
Craig Newmark: Social Networks Are Shifting the Ba...
Social Networking Habits Vary Considerably Across ...
SearchCap: The Day In Search, April 6, 2010
Groups Launch Effort to Get Broadband to Older US ...
Is Your Site Under Google Penalty?
Is Trust In Social Media Dying?
Join the Conversation: Are you ready for IPv6?
Exploits unneeded to attack via PDF files
If Google Indexing Goes Real-Time, What Will it Me...
Google fiber losers, unite! (And then build your o...
.
.
Half of Bloggers Consider Themselves Journalists
PRWeek/PR Newswire Media Survey Finds Digital Divi...
Second Site: Online Accessibility for the Visually...
Trick Gmail into thinking you're on an iPad for tw...
The most popular social sharing options on the top...
A New First In Mobile: Data Traffic Outstripped Vo...
Is There an ?Internet Operating System??
Prefab May Give Any Software Open Sourciness
Get $1 for Every Blog You Add to This New Network
We Just Tested Twitter?s @anywhere Platform (Scree...
Bringing Internet privacy into the 21st century
Should Open Source Be An Enemy Of The State?
Looking at the iPad From Two Angles
Google Real-Time Search Results Powered by Pigeons...
Beware: It's April Fools' Day
►
March
(11)
About Me
Tom L
View my complete profile
No comments:
Post a Comment