Document exploitation is a well-known method of distributing malware in the malware community. A common theory for why crooks use booby-trapped documents is that victims can be more easily convinced to open document attachments than executables. Word, Excel and PDF documents that contain so-called exploits - active booby-traps - have the added trick of not […]

Read More...