Singapore's National Digital identity (NDI) project provides users with the new “Sign with SingPass” feature to electronically sign PDF contracts, agreements and other legal documentation in high volume. This new feature is developed by the Government Technology Agency (GovTech).
Google Chrome now supports saving tagged PDFs, plus PDF form filling in the browser.
Released on 25th August, version 85 of the Chrome web browser included a couple of significant updates to its PDF output capabilities. Let’s take a quick look at the new features.
We are pleased to announce the release of iText DITO 1.5. The latest release of iText's high-convenience PDF document generator includes a number of new features and changes for template editing and PDF generation. Read on to learn more.
In the third and final part in our series of articles looking at the PDF Shadow Attacks, we explore using iText 7 to inspect documents which may be used to perform attacks using the "Replace" and "Hide and Replace" methods.
In our final release for 2020, we’ve a number of new features and improvements, including improved Core word wrapping for special scripts, full support for CSS background properties in pdfHTML, and much more!
Continuing our series of articles looking at PDF Shadow Attacks. While iText is immune to the published attacks, we present this series explaining what the attacks are, and what you can do about them. In this article, we'll explore the concept of incremental updates, and present some proof-of-concept code for detecting PDF Shadow Attack preparation with iText.
Are your PDF documents secure, and what should you do to ensure the data they contain is secure? Keeping that data secure is not only a best practice, but is often required by data privacy laws. In this blog and accompanying webinar: "PDF Security: Encryption and Digital Signatures", we offer you the top three ways to improve your PDF document security.
The PDF Shadow Attacks are a new class of security vulnerabilities for PDF. In case you need a tldr; then rest assured that iText is immune to the published attacks. However, we also found that iText 7 could be utilized to detect potentially malicious documents, resulting in this series of posts. In this first article, we'll take a look at the concept of PDF Shadow Attacks, and the three forms in which they may take.