[All_jlau] JLab: Cyber Attacks Underway On Adobe PDF Users
deborah magaldi
magaldi at jlab.org
Mon Jan 4 16:34:26 EST 2010
Multiple groups are using a previously unknown vulnerability in Adobe
Acrobat and Reader to attack users in an attempt to gain unauthorized
access to commercial, government and private computer systems and steal
data. This attack is triggered by simply opening a malicious PDF file.
There is currently no patch against this attack and a patch will not be
released until Jan. 12. Everyone is urged to use caution with any PDF
files, including those from known associates and personal accounts.
Until the patch has been installed at JLab, the IT Division recommends
that you not open pdf documents unless they are work related and you
know the origin of the file(s). Please delete any e-mails with
suspicious attachments of any kind.
Users are urged to follow the steps below to disable JavaScript inside
their Adobe Acrobat and Reader programs on their JLab computers as well
as on home computers. Note that these instructions apply to Windows,
Linux and Mac computers.
Disabling Adobe JavaScript:
- Launch Acrobat or Adobe Reader
- On Windows and Linux: Select Edit>Preferences
On Mac: Select Acrobat>Preferences
- Select the JavaScript category
- Uncheck the 'Enable Acrobat JavaScript' option
- Click OK
If you have any questions, e-mail the Helpdesk at helpdesk at jlab.org
<mailto:helpdesk at jlab.org>.
E-mail security at jlab.org <mailto:security at jlab.org> to report
suspicious e-mails or phone calls.
/This message is being sent on behalf of the JLab Information Technology
Division.
/Regards,
Deb Magaldi
Jefferson Lab
Public Affairs
12000 Jefferson Ave., Suite 15
Newport News, VA 23606
ph. 757-269-5102
-------------- next part --------------
An HTML attachment was scrubbed...
URL: https://mailman.jlab.org/pipermail/all_jlau/attachments/20100104/550c6d3e/attachment.html
More information about the All_jlau
mailing list