Continuing our series of articles looking at PDF Shadow Attacks. While iText is immune to the published attacks, we present this series explaining what the attacks are, and what you can do about them. In this article, we'll explore the concept of incremental updates, and present some proof-of-concept code for detecting PDF Shadow Attack preparation with iText.
Are your PDF documents secure, and what should you do to ensure the data they contain is secure? Keeping that data secure is not only a best practice, but is often required by data privacy laws. In this blog and accompanying webinar: "PDF Security: Encryption and Digital Signatures", we offer you the top three ways to improve your PDF document security.
The PDF Shadow Attacks are a new class of security vulnerabilities for PDF. In case you need a tldr; then rest assured that iText is immune to the published attacks. However, we also found that iText 7 could be utilized to detect potentially malicious documents, resulting in this series of posts. In this first article, we'll take a look at the concept of PDF Shadow Attacks, and the three forms in which they may take.
Based on the feedback from our users (and developments in the larger Java ecosystem) we have decided that future releases of the iText 7 Suite will target Java 8 SE. This blog post looks into our reasons for doing this, and what it will mean for iText users.
Following on from our recent announcement of the deprecation of support for Java 7, we are also dropping support for .NET Standard 1.6 in favor of .NET Standard 2.0. This blog details our reasons for doing this, and what it will mean for our .NET userbase.
In Singapore, over 100 businesses have already integrated with the National Digital Identity (NDI) platform since its introduction in 2018. If you do business in Singapore, is your document workflow ready and can you afford to be left behind?