Not necessarily - Images embedded in HTML are at risk if you render the html
in the email client. Always using plain text is not a guarantee either -
they say a search tool (ie, google or msn desktop search) can activate an
attached wmf - if you either index mail or use Eudora (or otherwise save all
attachments) and index the drive, and email exploit can be activated without
your interaction.

You can fairly easily avoid web sites with the exploit by not randomly
surfing or clicking links to unknown or untrusted sites. You have a good
chance of avoiding it in email if you use a good spam filter (increases your
chance of either a link or attachment never hitting the inbox to begin with)
and don't use the desktop search tools.

On 1/3/06, Bernie Cosell <[EMAIL PROTECTED]> wrote:
>
> Well, probably the visit to web sites: email attachments are completely
> inert and *always* require your active intervention before they can do
> anything.  So simply being careful [which you should've been doing all
> along!!!] will be OK for email attachments.   You have essentially no
> conrol over what your browser does: once you have it open a site, it'll
> do redirects, grab images, etc all automatically, and there's no way to
> tell *before* that happens that it is about to [unlike with email, where
> it waits for you to infect yourself].
>
>
> --
> Diane Poremsky
> [EMAIL PROTECTED]

--
                ----------------------------------------
To Change your email Address for this list, send the following message:
 CHANGE  WIN-HOME  your_old_address  your_new_address
 to:  [EMAIL PROTECTED]
Note carefully that both old and new addresses are required.

Reply via email to