Documents as or more malicious than executables

Although controlling the executables receives either in an email or through a download is good, we must not forget that the forest is full of foxes. Simply opening a Word or PDF document, for example, harmless at first sight, we