O'Reilly logo

Seven Deadliest Microsoft Attacks by Naomi Alpern, Mike Borkin, Brian Barber, Rob Kraus

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Dangers Associated with Macros and ActiveX

Macros can be very sneaky and allow attackers to take advantage of unsuspecting victims and networks with little or no detection. Although these examples are certainly not comprehensive enough to include all possible variations of macro attacks, some of them should open your eyes to what the reality is as far as macro attack capabilities are concerned.

The real danger associated with macro and other client-side attacks is understanding that many of the attacks can easily be launched with little knowledge of how the attack works. In addition, the typical target for a macro attack is your common computer user who may not be fully aware of the dangers that exist today. Successful attacks can lead to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required