A PDF (Portable Document Format) is a file format designed to present documents consistently across multiple devices and platforms. Since developed by Adobe 1992, it’s become one of the most widely used formats for saving and exchanging documents. PDF files store a wide variety of data, including formatted text, metadata, vector graphics, and images. They also contain page layout information, which defines the location of each item on the page, as well as the size and shape of the pages in the document. The information is all saved in a standard format, so the document looks the same, no matter what device or program is used to open it. For example, if you save a PDF on a Mac, it will appear the same way in Windows, Android, and iOS.
Source: TechTerms
Additional Reading: Adobe Peps Up PDF On Smartphones With AI-powered Liquid Reformatting
Black Hat Briefing on Exploiting Portable Document Format files (PDFs)
There’s no reason why businesses shouldn’t be using PDFs. Considering PDFs are files that stay the same for every operating system, it’s a good idea to use them often. With many employees and clients working remotely, there’s a good chance those within the same company have different operating systems at home. With this in mind, using PDFs when sending data is great, as long as it’s something that doesn’t need to be edited (then you’d need a Word or Excel doc).
PDF’s due to their popularity have become a favorite target of hackers. As explained in this Black Hat Hacker presentation on PDF Hacking PDF’s are not perfect and have enough code that mistakes and vulnerabilities do exist. As a best practice for any company, removing administrative access to your desktop computers from their users could prevent some of the exploits in the above presentation from working. Yet there are other attacks that might not be avoidable. A PDF can have a link to a Phishing Website embedded within it which is invisible to normal SPAM filtering solutions and could allow your users to compromise their O365 or GSuite username and passwords.
Train your users on all forms of attack, especially on spotting and avoiding Phishing attacks, on the importance of Password Hygiene, and to question everything they do online today. If you avoid even one security breach, you’ll be so glad you took proactive measures to protect your employees and your business!
Learn about cybersecurity program development with CyberHoot by subscribing to our Newsletter, enrolling your company, and reading our weekly blog articles.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.