The Bat! not Subjected to Same Vulnerability as in MS Outlook Which Allows Hackers Run Visual Basic Code

Security researchers have discovered a way of making Microsoft Outlook run Visual Basic code and launch a command shell, according to SC Magazine UK.

"The payload will be called if the message is read (previewer), opened (not previewed) or if the user attempts to reply or forward the message. This means that the user needs to at least preview the message."

The Bat! users are on the safe side, as our email program does not execute any code embedded in emails. Previewing, opening, replying and forwarding messages is risk-free, as it won’t allow hackers to gain control of the operating system and steal data by using scripts. Many customers around the world trust The Bat! because it protects against malware and saves time while dealing with literally thousands of emails each day.