Chet Wisniewski from Naked Security shows off in a Video that demonstrates how a Adobe Reader’s vulnerability can infect your computer to open the back doors for hackers to gain access.
Basically, here is how it works.
First, the hackers create boobytrapped PDF files that exploits the vulnerabilities in PDF reading software, such as Adobe Reader.
And then, they either spam them out to unsuspecting victims or plant them purposely on the websites quietly laying there waiting for the visitors.
A simple act of opening any of them can exploit a vulnerability to automatically download the malicious codes from the internet, and display a bogus PDF file to trick you into believing that everything is all right.
Such a simple fact will remind all of us how important it is to keep not only your Windows system but also your applications up-to-date with the latest security patches.