Malware usually isnt just anywhere; it hides in specific places youve learned to shun.
Most recently and unbeknownst to nearly everyone cybercriminals have started packaging their malware into oh-so-familiar documents.
Why Documents?

As long as there have been computers, there has been malware.
Fortunately, this method of transmission was easy enough to thwart.
Thus, documents seem to be an ideal vector for conveying malware into even the most secure networks.

The concept of using documents to spread malware isnt new.
The perpetrator was caught and penalized, but Melissas legacy lives on.
Today, malicious hackers produce document-based malware that infects and spreads in a variety of ways.

As a result, more users are experiencing the effects of document-based attacks.
Still, criminals are no longer relying on email alone.
Doc attacks tend to look like any other malware attack, which means they can take many forms.

Some use embedded scripting to download additional malware from elsewhere on the internet.
There is no need to abandon Word for plain text readers like Notepad.
How To Protect Yourself Against Cyber Attacks
Are Your Passwords Secure?
Lets Find Out