![]() As recently as the weekend, the topic resurfaced on social media with experts calling for a change in approach to macros. The cyber security community has come out in droves to support the move from Microsoft, a move that some corners of the industry have requested for some time. ![]() ![]() "The default is more secure and is expected to keep more users safe including home users and information workers in managed organisations," Microsoft said. Instead, users will now be presented with a button encouraging them to click and learn more about the potential impacts of enabling macros, and what malicious ones can achieve on a corporate network. Microsoft is changing the default behaviour of macros in five Office applications so that users will no longer be able to enable them with one click of a mouse. Once enabled, the malicious code gains access to the identity, documents, and network of the person who enabled it." "A wide range of threat actors continue to target our customers by sending documents and luring them into enabling malicious macro code," said Tom Gallagher, partner group engineering manager at Office Security. "Usually, the malicious code is part of a document that originates from the internet (email attachment, link, internet download, etc.).
0 Comments
Leave a Reply. |