Click me
Transcribed

Adobe Becomes "The Man"?

infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages. infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages. infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages. infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages. infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages. infographics by Adobe becomes Or is it just easier for hackers to attack Adobe filetypes INVESTINTECH.COM "The Man" PDF S OLUTI ONS At the beginning of 2010, the well-known security company MCAfee stated in its yearly report of threat predictions that Adobe would be surpassing Microsoft as the biggest target for hackers, and the prediction became true. Once the attacks by cyber-criminals on the vulnerabilities of Adobe's Reader began to skyrocket in 2010, researchers found that some of the most notorious hackers have turned their focus to Adobe. The hacks on Adobe were seen to be very similar to the breaches of Google and many other big-name companies in 2009. TM The ever-growing popularity of Reader and Flash, especially on the Internet, makes Adobe the perfect target for hackers looking to reach a large population of computer users around the world. Total malware distributed & L22 Adobe Microsoft 2% 2008 17% 2009 28% 2010 The attacks by way of PDF have taken off over the last sev- eral years. According to McAfee statistics, the percentage of exploitative malware that targeted PDF vulnerabilities in 2008 was only two percent of all malware being distributed. PDF related attacks These numbers jumped to 17 percent in 2009 and 28 per- cent in the first three months of 2010 alone. other 20% Web exploits 2008 2009 Based on over a trillion Web requests processed in 2009, Adobe Reader/Adobe Acrobat exploits grew to 80 percent of all exploits encountered by Adobe in 2009, while attacks on Flash dropped. The reasons for this are believed to be the availability of Reader and Acrobat and the wide-spread use of PDF files by companies and consumers. 2010 80% Malicious PDFS were responsible for almost half of all Internet-based attacks in 2009, and even more in 2010. This was a tremendous jump in a short amount of time, considering that they only made up 11 percent of all Web-based attacks as recently as 2008. PDF Attacks by e-mail Flash attacks by social apps facebook 星 Subjet C You gotta ses LDI MUST SEEHI Subject: CUTEST KITTY IN THE WORLD! MUST SEE! You gotta see this!! Viw Download YOUR COMPUTER IS MY COMPUTER NOW, MEOW! Request for Permission There is also the lingering belief by the general public that it is a lot safer to open a PDF than it is to open a Microsoft Word file, for example, which is absolutely untrue. The most common form of attack seen came as a PDF file attached to emails claiming to have various information on international hot topics such as North Korea. I .-- - Adobe's troubles don't end with Reader either. There has also been a drastic increase in These emails contained the "Hydraq Trojan," which was used to breach Google and over 30 other companies in the previous year. Researchers noted that the wording in these emails being sent with infected PDF files was very similar to those used in the Google attacks, and the regions from where the attackers were coming from were similar as well, which was most certainly not a coincidence according to most experts. attacks coming by way of Adobe Flash as well, especially on many social networking sites in the form of rogue apps that many people are clicking on when browsing their Face- book pages.

Adobe Becomes "The Man"?

shared by maggie on May 04
412 views
0 shares
0 comments
In 2010 the security software company McAfee predicted that Adobe would be a bigger target for hackers than Microsoft. This prediction came true. So why do hackers target Adobe? This infographic looks...

Source

Unknown. Add a source

Category

Technology
Did you work on this visual? Claim credit!

Get a Quote

Embed Code

For hosted site:

Click the code to copy

For wordpress.com:

Click the code to copy
Customize size