Once they were just a convenient way to share documents with the widest possible audience. But PDF files have become increasingly popular as a way to distribute malware, according to a recent Microsoft security report, with attacks doubling almost every month in the second half of 2008.
Adobe has patched the vulnerabilities behind those particular problems, so if you're running the latest copy of Adobe Reader then you're not currently at risk. At least, that's the theory.
But what if there are other PDF security holes yet to be discovered? Just a few minutes spent tweaking your Adobe Reader settings could protect you from future attacks. Here's what you need to know.
2. Block multimedia
PDF files may also include embedded audio or video content, a problem if that's been hacked to exploit a media player security flaw. If you don't need multimedia support in your PDF files then click Edit > Preferences > Multimedia Trust, and clear "Allow multimedia options" for both "Trusted documents" and "Other documents".
3. Beware file attachments
The authors of a PDF document can configure it to launch attachments embedded within the PDF file itself. There are obvious risks here, and so Adobe will always display an "are you sure you really want to do that"-type prompt - but that may not always be enough. If inexperienced users have access to your system, for instance, they may not fully understand the consequences of clicking "OK".
Even with the prompt, we think the dangers of this feature outweigh any benefits. If you agree, click Edit > Preferences > Trust Manager and clear the "Allow opening of non-PDF file attachments..." box.
4. Control your plug-ins
Adobe Reader comes with more than 20 standard plug-ins to handle everything from processing web links to playing videos or saving PDF files. Each one provides another potential attack point for a hacker, so removing unnecessary plug-ins should help make you more secure (and might help Adobe Reader boot more quickly, too).
Click Help > About Adobe Plug-Ins to get a feel for what's installed. If you scroll down to SaveAsRTF and decide you really don't need the ability to save PDF files in Rich Text Format, say, then make a note of the plug-in's file name: SaveAsRTF.api. Close Adobe Reader, navigate to the plug-ins folder (by default \Program Files\Adobe\Reader 8.0\Reader\plug_ins) and rename SaveAsRTF.api to SaveAsRTF.api.old. Restart Adobe Reader, click Help > About Adobe Plug-Ins again and you'll see SaveAsRTF has disappeared.
Repeat the process with other unwanted plug-ins, as required. And if you discover you need a particular plug-in, after all, then remove the .old from the file name and restart Adobe Reader to get it working again.
5. Tweak default settings
Adobe Reader has a few other security settings that are installed at their safest values by default, but it's wise to check your configuration occasionally to ensure they're still set correctly.
Click Security and ensure "Verify signatures..." is checked, allowing Adobe Reader to check document signatures.
Then click Trust Manager > Change Settings to view the web sites that Adobe Reader is allowed to access. Make sure the program is not set up to use the riskiest "Allow all web sites" (unless you've set that yourself and understand the dangers), and that the My Web Sites list is either empty, or only contains sites that you trust.
6. Stay up-to-date
The best protection of all? Never view PDF files from untrusted sources, particularly spam. And ensure Adobe Reader is kept up-to-date with all the latest security patches. Allow the program to download updates just as soon as it alerts you to them, and click Help > Check For Updates occasionally just to confirm that you have the latest version.
Like this? Then check out 10 easy ways to boost your online security
Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register
Article continues below