Category Archives: 2017

Newly Disclosed Vulnerability in MS Word Allows Code Execution Without Macros Enabled

Macros in Microsoft Word documents have been used for malware delivery for a long time. Any document that asks you to “Enable Content” should raise a big red flag. However, a newly disclosed vulnerability in Word allows the download and execution of arbitrary malware even when macros are not enabled. Microsoft has no plans to […]

Spambot Forwards Legitimate Emails With Malware Payload Added

The recent detection of the Onliner spam botnet, which uses 80 million compromised email accounts to send spam to 711 million targets, is shocking in its size but not in the techniques used. Spammers have long used compromised email accounts to send spam. This avoids email filtering based on the source IP address. However, a […]

Hacking Back

New US legislation proposed by Representative Tom Graves, a Georgia Republican, would allow the victim of a cyber attack to take active countermeasures against the attacker’s computer without being guilty of a crime under the Computer Fraud and Abuse Act (CFAA). While hacking back might be might be an emotionally satisfying concept there are severe […]

Learn More About Cloudmark
Our Products
News and Events
Site Map  •  Privacy Policy  •  ©2002–2017 Cloudmark, Inc.