SearchSecurity.com

How an Adobe Reader zero-day exploit escapes sandboxing capabilities

A recent Adobe Reader zero-day exploit is notable for being the first in the wild to fully escape Reader's sandboxing capabilities. Could you explain how this attack works? Does it cast doubt on sandboxing as an effective enterprise application hardening technique?

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement