There are many ways that exploits targeting the JBIG2 vulnerability could be hidden inside a PDF file, and it seems that the reliability of detection for these varying methods is spotty, at best."
Link to Original Source
Become a fan of Slashdot on Facebook
I go on working for the same reason a hen goes on laying eggs. -- H.L. Mencken