Hackers take advantage of Word documents as weapons due to their widespread use and trust. This is facilitated by theā¦