![]() ![]() So what’s the word on staying safe in this wild, wild macro world? Snake in the Grass ![]() Threatpost noted macro malware for Apple’s OS appeared in February, while Bleeping Computer detailed a new vector that checks which operating system (OS) users are running and then delivers tailor-made Python code. MacOS users have largely been immune from these threats - until now. They’re then advised to “enable macros,” which are in-program scripts that allow attackers to download malware payloads and infect devices. ![]() ![]() The attack vector isn’t terribly complicated: Users receive a document attachment in their email, download it and open it in Word. For Windows users this is old hat, since Word-based macro infections have been making rounds since the early 1990s. Things are getting wild for macOS users: Macro malware is on the rise.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |