Adobe bundles Chrome plugin with Reader fixes

The plugin means Chrome users can easily convert web pages to PDF

Adobe Reader's latest security update appears to have an added extra a Google Chrome extension, which adds the Adobe Acrobat plugin to your Chrome browser.

Although it's nothing malicious it just enables any Chrome user to easily convert web pages into PDF the fact Adobe is doing this without informing users beforehand has been criticised by the security community.

One researcher, Troy Hunt, noticed strange goings on when he was installing the update, which was designed to fix a flaw that could potentially allow hackers to take control of the user's system.

Hunt told Wired: "[The plugin] auto-installed. I literally walked up to my PC and the prompt was already there."

The prompts he refers to include allowing Chrome to read and change all data on the websites a user visits, manage downloads and communicate with cooperating native applications.

The plugin isn't activated until these permissions receive the OK, however, it's important to note that if the requests for access are rejected, the Adobe Reader security fix will still be installed properly.

While this incident seems simply to be a case of Adobe trying to boost installations of the Reader plugin on Chrome, throwing up prompts that look like they're part of the security fix installation but in reality are malicious it a technique often used by hackers.

In a support document, Adobe said: "Information collected [by the plugin] will be used to develop new features and improve Adobe products," adding that no personally identifiable information is sent back to the company. It also said that, although the plugin does see what URLs the user visits in order to "allow the extension to convert HTML content to PDF", it doesn't send this information back to Adobe either.

Main image credit: Bigstock

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021