{"id":411,"date":"2016-02-19T12:39:34","date_gmt":"2016-02-19T19:39:34","guid":{"rendered":"http:\/\/dshsolutions.com\/wordpress\/?p=411"},"modified":"2016-02-19T12:39:34","modified_gmt":"2016-02-19T19:39:34","slug":"how-just-opening-an-ms-word-doc-can-hijack-every-file-on-your-system-the-hacker-news","status":"publish","type":"post","link":"https:\/\/dshsolutions.com\/wordpress\/how-just-opening-an-ms-word-doc-can-hijack-every-file-on-your-system-the-hacker-news\/","title":{"rendered":"How Just Opening an MS Word Doc Can Hijack Every File On Your System | The Hacker News"},"content":{"rendered":"<blockquote><p>If you receive a mail masquerading as a company&#8217;s invoice and containing a Microsoft Word file, think twice before clicking on it.<br \/>\nDoing so could cripple your system and could lead to a catastrophic destruction.<\/p>\n<p>Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised websites to lure the victims into installing a deadly ransomware, dubbed &#8220;Locky,&#8221; into their systems.\n<\/p><\/blockquote>\n<p>Read More: <a href=\"https:\/\/thehackernews.com\/2016\/02\/locky-ransomware-decrypt.html\" target=\"_blank\" rel=\"noopener\">How Just Opening an MS Word Doc Can Hijack Every File On Your System | The Hacker News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you receive a mail masquerading as a company&#8217;s invoice and containing a Microsoft Word file, think twice before clicking on it. Doing so could cripple your system and could lead to a catastrophic destruction. Hackers are believed to be carrying out social engineering hoaxes by adopting eye-catching subjects in the spam emails and compromised [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,5,8],"tags":[],"class_list":["post-411","post","type-post","status-publish","format-standard","hentry","category-office-windows-powerpoint","category-security-2","category-software"],"_links":{"self":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/comments?post=411"}],"version-history":[{"count":0,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/posts\/411\/revisions"}],"wp:attachment":[{"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/media?parent=411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/categories?post=411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dshsolutions.com\/wordpress\/wp-json\/wp\/v2\/tags?post=411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}