The future of malware: Trojan horses
,----[ Quote ]
| The stealthy attacks install keystroke-logging or screen-scraping
| software, and they are used for industrial espionage and other
| financially motivated crimes, experts said.
|
| [...]
|
| Most attacks include Office files that use yet-to-be-patched
| vulnerabilities in the Microsoft application to install malicious code
| on vulnerable systems. The software giant has patched many such flaws
| on recent Patch Tuesdays.
`----
http://news.zdnet.com/2100-1009_22-6125453.html
Such attacks are alleviated in Linux as patches flow in regularly (without
requiring prompts, reboots, or several weeks of unnerving periods of
waiting), users are not encouraged/forced to inherit full system privileges,
and Open Office is more secure.
OpenOffice.org Spurns Security Worries
,----[ Quote ]
| OpenOffice.org has rejected accusations that its open-source
| application suite is at least as susceptible to attack as Microsoft's
| Office in a terse statement posted on its Web site.
|
| "The OpenOffice.org community confirms it regards security as of the
| highest importance and will react immediately to any security issues,"
| the statement read.
`----
http://news.yahoo.com/s/cmp/20061003/tc_cmp/193101143
|
|