O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Macro and Client-Side Attack Anatomy

Macro and other variations of client-side attacks have a funny way of popping up when you least expect it. Unfortunately, many times these unexpected visits are because an employee opened an e-mail attachment that was directed to a Web site that appeared legitimate but was nothing more than a cleverly disguised virus or malicious Web site. We have all heard similar stories causing us to become complacent in our awareness of, and hasten our reaction to this type of attack. This lack of urgency may be caused by the over-glamorization of evil “hackers” sending malicious code to large companies as portrayed by the media. Although we are all aware of the famous macro and other client-side attacks and have seen ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required