Understanding the security implications of the latest patched Microsoft Office product memory leak vulnerability
What happens when you combine sophisticated anti-phishing attachment inspection, static file analysis, machine executable code in data files, customer reports of false positives, Microsoft Office suite, ActiveX controls and a bit of


