« Home | Subroto Bagchi's Welcome Address to IIM Bangalore » | Two held after ad campaign triggers Boston bomb sc... » | Microsoft Windows Vista debuted in retail stores » | The next Bill Gates 'not American' » | Hillary wants US troops out of Iraq » | Dedicated servers explained » | At Last Hotmail Is Catching Up And Started Windows... » | AOL names Indian as Vice-President » | What is DLD? » | Google co-op - Create Your Own Search Engine »

Symantec warns of new zero-day Microsoft Word attack

By Jeremy Kirk, IDG News Service, 01/26/07

Hackers are exploiting a new, unpatched vulnerability in Microsoft Word that could allow them to take control of a victim's computer, Symantec has warned.

The zero-day vulnerability is the fourth in Microsoft's widely-used Word 2000 software that has not yet been patched, the security company said in its Security Response Weblog.

A zero-day vulnerability refers to a security hole for which exploits are already available when it was discovered. This latest one affects most versions of Windows running Word, Symantec's advisory (http://www.securityfocus.com/bid/22225/info) said.

Danish security vendor Secunia also reported the vulnerability, and rated it as "extremely critical," its highest-level warning (http://secunia.com/advisories/23950/).
The attack comes via an infected Word document, a method increasingly used by hackers for targeted attacks. If the document is opened, it installs a Trojan horse program, called Trojan.Mdropper.W, onto the computer, Lau wrote. The Trojan also puts other files on a computer that enable a hacker to control it.

Microsoft could not be immediately reached for comment. The company released three sets of critical patches on Jan. 9, including ones for Outlook, PowerPoint and Windows, but not for Word.

Users can avoid trouble by not opening unexpected Word documents attached to e-mail. Hackers often spam out thousands of messages with harmful attachments, such as Trojan horse programs, hoping unsuspecting victims will open them.

Trojans often look harmless and can quietly install themselves on a computer with no visible signs. The use of Word to mount an attack can be particularly effective since the file format is so widely used.

Tags: Windows Microsoft Security Alerts Virus Alerts

Reporting of factual information in a free and fair manner is the very essence of this profession.
The advert designs can range from being simple text affairs that are very
basic, which also tend to be less expensive,
to the more expensive, fully graphic designed adverts with photo quality images
that can take up a whole page of the newspaper. That may be, the
temperature that is certainly most effective for catching fish.
That’s why, while drafting ads for newspapers selling or buying a property, make
your USP as your headline. But I felt I had something interesting, if not unique, to say about
the Mafia because as a boy I had listened not only to Mafiosi in my stepfather's kitchen but to first and second generation Sicilians who understood how and why the Mafia had gotten a foothold in this country.

Look at my web site - click here

Nevertheless, that does not mean that the product is a fake.
Before you apply heated gadgets onto your hair, protect your hair with heat protectant sprays and also serums.
Read this article, and it will show you any steps and tips to block websites in Windows 8′s Hosts File.
Yet, lack of moisture can also cause breakage, split-ends
and brittle hair. Many people use hair greases to keep their hair moisturized.


Review my blog :: hair straighteners

Ground cover can be added to pedophile the landscape.
Louis, a new delivery tradition has been created: the "Mulch Man. The less competition, the better off your plants will be.

My blog ... mulching

One part compost to two or three parts potting soil would be
a sufficient combination. Use the cultivator to make holes in the soil and turn it up
just a little between the rows. Try these top five organic garden weed controls that
actually work.

my web blog ... cautionary

Here you can have tremendous savings, as
you can learn the whole process without smashing up an
airplane. Solution Options: It was decided to use a web services simulator to simulate the exact functions of a web services backend.
The End of Military Flight Sim Pro With this program you can take advantage
of the military aspects of the game, landing and takeoff of
an airplane taking includes carrier. The main purpose of
a Simulator is to understand the behavior of the system.

Retain on your own and these you enjoy in the gaming.

Post a Comment
Thanks For Showing Interest In My Posts

Powered by Rollyo
Blogarama - The Blog Directory
blog search directory
Directory of Politics Blogs
Free Blog Traffic @ Blog Annoucne
Politics Blogs - Blog Top Sites
British Blog Directory.
Find Blogs in the Blog Directory
Submit your website to 20 Search Engines - FREE with ineedhits!