Hackers are using Microsoft PowerPoint to take over computers

TECHi's Author Jesseb Shiloh
Opposing Author Computerworld Read Source Article
Last Updated
TECHi's Take
Jesseb Shiloh
Jesseb Shiloh
  • Words 79
  • Estimated Read 1 min

Hackers are exploiting a security flaw in Microsoft Office by using PowerPoint to attack Windows users and gain control of computer systems Microsoft, in a security advisory on its website, says there have been “limited, targeted attacks” against users through Microsoft PowerPoint. An attacker who successfully exploits the security flaw could gain complete control of the system. With that sort of control, hackers could execute code remotely, alter or delete data and install harmful programs, like malware.

 

 

Computerworld

Computerworld

  • Words 150
  • Estimated Read 1 min
Read Article

Microsoft on Tuesday warned Windows users that cyber criminals are exploiting a zero-day vulnerability using malicious PowerPoint documents sent as email attachments. In an advisory, Microsoft outlined the bug and provided a one-click tool from its “Fixit” line that customers can use to protect their PCs until a patch is available. Although Microsoft does not label its advisories with the same four-step threat scoring system it uses for security updates, it said that a successful exploit would let hackers hijack the PC so that they could, for example, steal information or plant other malware on the machine. The vulnerability affects all versions of Windows, from the aging Windows Vista to the very newest Windows 8.1, and is within the operating system’s code that handles OLE (object linking and embedding) objects. OLE is most commonly used by Microsoft Office for embedding data from an Excel spreadsheet in, say, a Word document.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Computerworld

Four months in and net neutrality hasn’t stifled broadband investment
Four months in and net neutrality hasn’t stifled broadband investment

It's been four months since the FCC passed its net neutrality rules, and broadband investment still hasn't suffered. Many opponents…

Microsoft loses money for every smartphone it sells
Microsoft loses money for every smartphone it sells

Microsoft doesn't have a good track record with making money on its hardware, which isn't necessarily a bad thing considering…

Cisco tries to avoid the NSA by shipping equipment to weird places
Cisco tries to avoid the NSA by shipping equipment to weird places

Lets say the American government is interested in spying on you and, while you're pretty sure the company you're getting…

The Tor Network is anticipating a possible attack from law enforcement
The Tor Network is anticipating a possible attack from law enforcement

On Friday, a post on the Tor Project's blog sent out an alarming message: "The Tor Project has learned that…