![]() ![]() In this blog post, I will demonstrate three different attacks that are stopped by Protected View. Microsoft Word, as an example, will open untrusted email attachments in a mode called “ Protected View“. Someone engaging in spear phishing could employ Word-based web trackers to learn more about the type of desktop computer and operating system a target is using, helping the spear phisher tune his or her strategy for further attack. To reduce the risk of this exposure, Microsoft Office applications like Outlook, Word and Excel use a trust model to determine how to handle documents that are downloaded from the internet or which arrive via email. ![]() Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials. This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates. Microsoft Word has long offered support for loading images and templates over the network. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |