www.office.com/setup Blogs: MICROSOFT WORD and Microsoft Office users have been warned about a new zero-day security flaw that enables hackers to remotely install malware on your PC, security McAfee has warned.
The security flaw enables cyber-criminals to covertly install malware on your PC.
The terrifying attack is possible thanks to a flaw in Microsoft’s Object, Linking and Embedding (OLE) technology, McAfee warned in a blog post.
The security company wrote: “The exploit works on all Microsoft Office versions, including the latest Office 2016 running on Windows 10.
“The earliest attack we have seen dates to late January.”
Hackers are using Microsoft Word documents (or more specifically, RTF files listed with a “.doc” extension) to trick people into opening the files.
This is how criminals are able to remotely execute malware on your device.
McAfee says it has been in contact with Microsoft about the security flaw in its Microsoft Office applications.
The Redmond-based technology company is expected to push-out an update to its apps that closes the flaw this week for its habitual Patch Tuesday bug release.
PC owners should always make sure their software is being supported by the manufacturer, and is up-to-date.
But in the meantime, what should Microsoft Office users do to avoid the virus?
The .hta content is disguised as a normal RTF file to evade security products
“Do not open any Office files obtained from untrusted locations,” the company warns.
“According to our tests, this active attack cannot bypass the Office Protected View, so we suggest everyone ensure that Office Protected View is enabled.”
To enable Office Protected View in your application, launch Microsoft Word.
Then navigate to File > Options > Trust Centre, then click on Trust Centre Options.
Click on Protected View, then check all of the three tick boxes listed beneath this option.
Hit OK to finalise the changes – and you should be protected against the latest malware attack.
Mr Neiderman has skewered Samsung’s TizenOS, which powers the Gear S3 Frontier and a slew of other smart devices – including televisions and smartphones.
The Israeli researcher spoke to Motherboard ahead of a speech at the annual Security Analyst Summit held by Kaspersky Lab, revealing “It may be the worst code I’ve ever seen.”
“Everything you can do wrong there, they do it,” he added “You can see that nobody with any understanding of security looked at this code or wrote it.
“It’s like taking an undergraduate and letting him program your software.”
Tizen OS has been skewered, with one researcher blasting it as ‘the worst code’ he’d ever seen
Mr Neiderman says he was able to hijack the TizenStore app – Samsung’s version of Google Play Store – which is used to deliver apps and software updates to Tizen devices, to install malicious code to his device.
“You can update a Tizen system with any malicious code you want,” he said.
Visit more for website: www.office.com/setup