The threat of a "0-day Attack" by Microsoft has generally increased. On February 2, Microsoft issued another security alert on Excel, a threat that has yet to be widely watched.
"There are potential threats in some Office applications," it said in its security bulletin. The damage to the "0-day attack" is unlikely to be repaired, and the attack on Excel is the fifth time that Microsoft has been attacked since December, and the scope of the threat is further growing.
The "0-day attack" threat affects Office 2000,office XP, Office2003, and Office2004, but it has no effect on Office2007 and works, and works, Orworks 2006. An attacker can use vulnerabilities to get user-clicked master Web page files or to intercept e-mail messages on a regular basis, and to enable end users to communicate. The biggest threat comes from the users ' ability to run managers. Hackers who successfully obtain information can gain the user's privileges, while Office software installed on Windows Vista systems is difficult to attack because all users, even system administrators, operate in standard mode. Microsoft recommends the release of the patch before the user to avoid the open do not know people send unreliable mail.
Security software developers are constantly working on this serious flaw problem. At the RSA meeting on February 6, the CA will announce a series of defense system tools to counter this "0-day attack" threat. Marketing manager David Finger said the "0-day attack" virus is now starting to have a virus variant, and we can use many tools to detect it.
The "0-day attack" vulnerability is currently the primary software security issue because part of the security signature has developed to a certain extent and time is another factor because attempts to fix security problems by patching are outdated. Taking a hard line against the attack, the "0-day attack" attack on Excel is a good example.