Information Security Leader, Author, Instructor and Speaker

File format vulnerabilities: protecting your application

Posted on February 5, 2009 in Articles | by

File format vulnerabilities are quickly taking center stage as one of the primary information security threats facing modern enterprises. Attackers exploiting these vulnerabilities create carefully crafted malicious files that trigger flaws (such as buffer overflows) in applications. These vulnerabilities are especially worrisome because they often cross platforms. For example, a file format vulnerability in Adobe Acrobat might allow an attacker to create a single malicious PDF file that compromises Windows, Macintosh and Linux systems.

Read the full article: File format vulnerabilities: protecting your application

Published in SearchMidmarketSecurity on 02/05/09

TAGS:

Leave a Reply

Your email address will not be published. Required fields are marked *