Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-plugin-hostgator domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the ol-scrapes domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home4/scienrds/scienceandnerds/wp-includes/functions.php:6114) in /home4/scienrds/scienceandnerds/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":9502,"date":"2022-07-08T15:12:14","date_gmt":"2022-07-08T15:12:14","guid":{"rendered":"https:\/\/scienceandnerds.com\/2022\/07\/08\/microsoft-rolls-back-blocking-office-vba-macros-by-default\/"},"modified":"2022-07-08T15:12:15","modified_gmt":"2022-07-08T15:12:15","slug":"microsoft-rolls-back-blocking-office-vba-macros-by-default","status":"publish","type":"post","link":"https:\/\/scienceandnerds.com\/2022\/07\/08\/microsoft-rolls-back-blocking-office-vba-macros-by-default\/","title":{"rendered":"Microsoft rolls back blocking Office VBA macros by default"},"content":{"rendered":"

Source: https:\/\/www.theverge.com\/2022\/7\/8\/23199894\/microsoft-block-office-vba-macros-default-roll-out-stopped<\/a>
\n
<\/br><\/code><\/p>\n

\n

Microsoft is rolling back a planned change to block Visual Basic for Applications (VBA) macros by default in a variety of Office apps. Announced earlier this year<\/a>, Microsoft had been planning to prevent Office users from easily enabling certain content in files downloaded from the internet that include macros, in a move to improve security against malicious files. Microsoft had been testing this change ahead of a planned rollout to all Microsoft 365 users in June, but suddenly reverted the block on June 30th.<\/p>\n

BleepingComputer <\/em>reports<\/a> that Microsoft notified IT admins last week that it was rolling back the VBA macro block based on feedback from Office users testing the changes. \u201cWe appreciate the feedback we\u2019ve received so far, and we\u2019re working to make improvements in this experience,\u201d reads a Microsoft 365 message. <\/p>\n

\n <\/p>\n

<\/p>\n\"\"<\/p>\n

<\/source><\/picture>\n

<\/span><\/p>\n

<\/span><\/p>\n

The new security banner that Microsoft had planned.<\/figcaption>Image: Microsoft<\/cite><\/p>\n

<\/span><\/p>\n<\/figure>\n

The unusual rollback has surprised some Microsoft 365 users, as many had been waiting years for Microsoft to be more aggressive about blocking macros from Office files. Hackers have been regularly targeting Office documents with malicious macros, and Office has typically prompted users to click to enable macros running with a simple button. Microsoft\u2019s planned changes meant Office users would only be able to enable the macros by specifically ticking an unblock option on the properties of a file.<\/p>\n

\n