Microsoft warns users: run Word in safe mode

J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
J

JoAnn Paules [MVP]

"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
A

ANONYMOUS

I agree completely with you here but sometimes the sender who is known
to you may not even know that his/her computer is compromised. This
filters through his/her email attachments which reaches your system to
make it vulnerable.



JoAnn Paules said:
"To become open to attack a user must open a malicious Word document sent in
an e-mail attachment. The Word vulnerability potentially allows remote
attackers to take over a user's machine."

Anyone who opens attachments without knowing about them is a fool.

--

JoAnn Paules
MVP Microsoft [Publisher]

ANONYMOUS said:
Just seen this article which some users may be interested in.

http://www.computerweekly.com/Articles/Article.aspx?liArticleID=216094&liFlavourID=1

hth
 
J

Jupiter Jones [MVP]

Are you expecting the attachment?
Even if it is from a trusted friend, that is no guarantee of safety since
this has been a major source of malware for a long time.

If the attachment is unexpected, regardless the source, treat accordingly.
 
J

Jupiter Jones [MVP]

Are you expecting the attachment?
Even if it is from a trusted friend, that is no guarantee of safety since
this has been a major source of malware for a long time.

If the attachment is unexpected, regardless the source, treat accordingly.
 
J

Jupiter Jones [MVP]

Are you expecting the attachment?
Even if it is from a trusted friend, that is no guarantee of safety since
this has been a major source of malware for a long time.

If the attachment is unexpected, regardless the source, treat accordingly.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top