Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
catch security software special
Fortunately, you don't need special antivirus or security software for MP3s. If your antivirus is current, there won't be any damage, because the scanner will catch it.
curious microsoft release service software whether
I am also curious to see whether Microsoft will release its own anti-virus software with the service pack.
escaping justice
But there are still a lot escaping justice.
articles found group information known publishing share source virus
If we joined, we couldn't share any identifying information about MARA members, so if we found someone in the group publishing virus source code, or co-authoring articles with known virus writers, we couldn't divulge that information.
buck buy computer daniel defend email goods lives marketing medicines messages nuisance people plenty prepared putting quick remember send sending spam unlikely unwanted users via
People who buy medicines marketed via spam messages are not only encouraging the spammers to send more of their nuisance emails, but are also potentially putting their lives at risk. Daniel Lin is unlikely to be sending any more spam, but there are plenty of other spammers out there prepared to make a quick buck with their unwanted marketing messages. All computer users should defend their email addresses with up-to-date anti-spam software, and remember to never buy goods marketed via spam.
behind business criminals money promising receiving users
Many users will be used to receiving dodgy sounding business propositions in their inbox, promising them a fortune. These schemes, however, only make money for the criminals behind them.
account attempt bank common criminals disaster emails families mining money sick steal surely trick using wary
Sick criminals are deliberately using the mining disaster in an attempt to steal from others, without a thought for the families of the victims, who have surely been through enough anguish. Everyone should be wary of emails such as these, as it is a common trick used by fraudsters to steal money and bank account information.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.
join members share
You have to join MARA to get a sample. They'll share only with members of their club.
slightly
What they did was not intentionally malicious. If anything, it was slightly inept.
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.