Doc Exploit.exe -

It could begin encrypting the user’s hard drive, demanding payment for the decryption key.

The most effective defense is a skeptical user. Recognizing that a document will never naturally be an executable file is the first step in breaking the chain of an attack. Conclusion DOC Exploit.exe

It might install a keylogger to capture passwords for banking, email, and social media. Defensive Best Practices It could begin encrypting the user’s hard drive,