One of the handlers found an interesting article on the net which raises some interesting questions and describes an interesting attack vector for the delivery of malware. So in a few minutes of thinking we came up with a number of interesting uses of this feature, ranging from tracking documents being opened to malware being downloaded and installed and of course the original use as described in the article. Other products may have similar issues, so be aware. The article can be found here. Mark Hofman |
Mark 392 Posts ISC Handler Nov 25th 2006 |
Thread locked Subscribe |
Nov 25th 2006 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!