Say what you will about Millennials getting nostalgic about the 1990s, but it's much better than malicious hackers doing so. A new banking Trojan called DRIDEX makes use of Microsoft Word macros, an ...
A reader who wishes to remain anonymous has acquired a Word cootie and is at a loss as how to deal with it. Anonymous Person writes: My copy of Microsoft Office 2004 seems to have picked up a virus, ...
Debate continues over whether Apple’s MacOS is inherently more safe from malware than Windows or if Macs simply aren’t targeted as often because of their smaller share of the PC market. Regardless, ...
Bravo to Microsoft, because it sounds like they’re doing something to improve the security of Office users. Way back in 1995, Microsoft accidentally shipped a virus on CD-ROM. At first Microsoft ...
Rob Steward informed us of an issue where Norton AntiVirus (versions 6 or 7) would claim to fix Word files infected with Word macro viruses but apparently not actual repair the files. Subsequent ...
Macro viruses were designed to target specific applications, most commonly Microsoft Word. One particularly effective macro virus, called Melissa, was transmitted via email to a user’s address book.
Here's the deal. Corporate just put NAV on our server (Netware 5.1). Been yelling at them for about a year or 2 and now they did it but they botched it a little. They set it up so it only scans files ...
The proof of concept Virus.StarOffice.Stardust.a, is the first virus that can theoretically infect StarOffice and OpenOffice, according to a researcher’s posting on Kaspersky’s Viruslist weblog. The ...
A new Emotet Trojan variant has been observed in the wild with the added ability to hide from anti-malware software by embedding malicious macros used to drop the main payload inside XML files ...
The latest in the series became apparent last Friday when ON Technology said it had discovered in the wild a new strain of the Laroux virus that infects Microsoft Excel spreadsheets. The virus - ...
The human mind loves to categorize things, and malware is no exception. We here at CSO have done our part: our malware explainer breaks down malware based on how it spreads (self-propagating worms, ...
At the end of December 2015, the network system of Ukrainian power companies was attacked by hackers, leaving most areas of western Ukraine in the dark. Security Service of Ukraine (SBU) indicated ...