Blocking Macros from Internet Originated Microsoft® Office Files
Microsoft®1 Office files and documents may contain a macro, an embedded program written in Visual Basic®2 for Applications (VBA). Although VBA macros have legitimate uses, macros in Microsoft Office have proven themselves to be a long-lasting and increasingly popular attack...
09 November 2016 2 page(s) pdf
Host Protection Technology Study
This study examined the behavior and capabilities of the different technologies against various attack scenarios in order to determine their effectiveness. The various products were grouped into different technology categories (host firewall, virus scanner, etc) and installed in a controlled...
01 June 2011 2 page(s) pdf
Add all new keywords to this page so they will show in the keyword list for all pages below.
22 December 2015
1-3 of 3 results returned for: "keywords:"Attack Vector""