This also permits remote access and control of a computer and is tied to a buffer overflow issue in Word. Five weeks later, on January 25, the fourth security flaw was exposed. The attack starts when the user opens an email attachment that contains a Word file that has been manipulated. It allows remote access […]