Exit
  • Global community
    • Language:
      • Deutsch
      • English
      • Español
      • Français
      • Português
  • 日本語コミュニティ
  • 한국 커뮤니티
1

Hacked?

Guest
Jun 02, 2023 Jun 02, 2023

Can someone hack into my phone and files via this app??

TOPICS
Edit and convert PDFs
1.3K
Translate
Report
Community guidelines
Be kind and respectful, give credit to the original source of content, and search for duplicates before posting. Learn more
community guidelines
Community Expert ,
Jun 03, 2023 Jun 03, 2023

Can you elaborate on the situation you have?

 

If you create a document that has your phone number IN the document and put security on that document, I do not think it's 100% safe. There are applications out in the gray world that can defeat security — like most locks; they keep out the honest people. 

 

But, they cannot do that from within Acrobat, and they cannot take a document that you made that does not have your phone number and get your phone number. 

 

Simply, Acrobat Pro, by itself, is not a hacking application.

Translate
Report
Community guidelines
Be kind and respectful, give credit to the original source of content, and search for duplicates before posting. Learn more
community guidelines
Community Expert ,
Jun 04, 2023 Jun 04, 2023
LATEST

++ Adding to the topic,

 

Hi @Deleted User ,

 

  • "Can someone hack into my phone and files via this app??"

 

Yes, but this reality is not exclusive of any mobile app on its own (as mentioned by Gary).

 

A program like a mobile app does not exploits itself unless it is reversed engineered (or manually tested to perform actions against what it was intended to do in the first place).

 

The correct context of what you mean by "hacked" is most likely defined by a vulnerability that must be discovered first... then exploited successfully by an attacker on a targetted victim (who is unaware).

 

So, an exploit against a known vulberability on a mobile device has to be executed by an attacker against a targetted victim.

 

For instance, weather it be malware, viruses, phishing or shimming attempts against a victim, an operating system that is missing security patches / updates, or unsuspecting  users that download vulnerable mobile apps from web stores (specially downloading apps from unsecured servers that reside in hybrid cloud environemnts), what really leads to an actual hack (or better said: a vulnerability that could be exploited by an attacker) depends on many other elements.

 

More specifically, when we put in perspective the context of how vulnerabilities are discovered and exploited, we should also emphasize on how Us, the mobile device users,  should prevent and mitigate such risks.

 

See the article posted in the link below to get familiarized with all the vulnerability aspects that may affect our mobile devices:

 

 

If you suspect that your mobile app or your mobile device's operating system could be compromised, contact the appropriate Adobe Incident Response Team channel using the web page that I am linking below for you:

 

 

 

 

 

 

Translate
Report
Community guidelines
Be kind and respectful, give credit to the original source of content, and search for duplicates before posting. Learn more
community guidelines