Adobe bundles Chrome plugin with Reader fixes

The plugin means Chrome users can easily convert web pages to PDF

Adobe Reader's latest security update appears to have an added extra a Google Chrome extension, which adds the Adobe Acrobat plugin to your Chrome browser.

Although it's nothing malicious it just enables any Chrome user to easily convert web pages into PDF the fact Adobe is doing this without informing users beforehand has been criticised by the security community.

One researcher, Troy Hunt, noticed strange goings on when he was installing the update, which was designed to fix a flaw that could potentially allow hackers to take control of the user's system.

Hunt told Wired: "[The plugin] auto-installed. I literally walked up to my PC and the prompt was already there."

Advertisement - Article continues below
Advertisement - Article continues below

The prompts he refers to include allowing Chrome to read and change all data on the websites a user visits, manage downloads and communicate with cooperating native applications.

The plugin isn't activated until these permissions receive the OK, however, it's important to note that if the requests for access are rejected, the Adobe Reader security fix will still be installed properly.

While this incident seems simply to be a case of Adobe trying to boost installations of the Reader plugin on Chrome, throwing up prompts that look like they're part of the security fix installation but in reality are malicious it a technique often used by hackers.

In a support document, Adobe said: "Information collected [by the plugin] will be used to develop new features and improve Adobe products," adding that no personally identifiable information is sent back to the company. It also said that, although the plugin does see what URLs the user visits in order to "allow the extension to convert HTML content to PDF", it doesn't send this information back to Adobe either.

Main image credit: Bigstock

Featured Resources

The essential guide to cloud-based backup and disaster recovery

Support business continuity by building a holistic emergency plan

Download now

Trends in modern data protection

A comprehensive view of the data protection landscape

Download now

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software

Download now

Delivering the future of work - now

The CIO’s guide to building the unified digital workspace for today’s hybrid and multi-cloud strategies.

Download now



Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Amazon Web Services (AWS)

What to expect from AWS Re:Invent 2019

29 Nov 2019

Raspberry Pi 4 owners complain of broken Wi-Fi when using HDMI

29 Nov 2019
Google Android

Samsung Galaxy A90 5G review: Simply the best value 5G phone

22 Nov 2019