Malware authors don't necessarily need to trick users to enable macros to run malicious code. An alternative technique exists, one that takes advantage of another legitimate Office feature. This ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results