Earlier this morning, Adobe announced a new version of its PDF editing software, Acrobat X. A quick look on the Adobe Reader Blog reveals that a new version of Adobe Reader is scheduled to follow next month, bringing with it enhanced security.
The post says Adobe Reader X will include a new "Protected Mode" feature that will hopefully help keep malware at bay. Adobe provides more details on its Secure Software Engineering Team Blog:
With Adobe Reader Protected Mode enabled (it will be by default), all operations required by Adobe Reader to display the PDF file to the user are run in a very restricted manner inside a confined environment, the “sandbox.” Should Adobe Reader need to perform an action that is not permitted in the sandboxed environment, such as writing to the user’s temporary folder or launching an attachment inside a PDF file using an external application (e.g. Microsoft Word), those requests are funneled through a “broker process,” which has a strict set of policies for what is allowed and disallowed to prevent access to dangerous functionality.
That functionality almost seems overdue, considering the sheer number of PDF-borne malware we've seen in recent years. In fact, ZDNet reported earlier this year that Adobe Reader has eclipsed Microsoft Word, Excel, and PowerPoint as a target for attacks.
|1. Ryszard - $503||2. punkUser - $502||3. the - $306|
|4. SomeOtherGeek - $300||5. Ryu Connor - $250||6. doubtful500 - $200|
|7. Anonymous Gerbil - $150||8. danny e. - $125||9. SecretSquirrel - $125|
|10. Techonomics - $100|
|Friday night topic: quadcopters!||1|
|The TR Podcast video 173: Torquing the Titan||0|
|Report: AMD R&D spending falls to near-10-year low||5|
|Deal of the week: Ultra-wide IPS for $750, 16GB DDR4-2666 for $190, plus more||36|
|Broadwell Xeon D lands on Mini-ITX boards||30|
|Half-Life 2: Update mod adds modern polish to old classic||49|
|The TR Podcast is live, so come ask us stuff!||1|
|AMD shows off DirectX 12 performance with new 3DMark benchmark||74|
|Intel and Micron sampling 3D NAND based on floating gates||27|