Protect yourself from infected MS Office files

Office Attacks

Conclusion

The MWI attacks show how dangerous even harmless-looking office files can be. Although most of them rely on macros, which must be enabled by the user, to infect the target, simply opening the file is all it takes for this type of attack. Even the best technical security measures can only provide limited protection. Awareness on the part of individual users is crucial. Whenever possible, users should validate the sender, subject, and plausibility, before opening any email messages or attachments they receive.

Infos

  1. "Microsoft Word Intruder Revealed" white paper published by Sophos: https://www.sophos.com/en-us/medialibrary/PDFs/technical%20papers/sophos-microsoft-word-intruder-revealed.pdf

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=