Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
distinct since types ways
In some ways it makes sense, since it isn't really distinct from other types of crime.
anyone ask bothering chain check colleagues common common-sense constantly easily email family genuine harmless headache letters people repeated stories support themselves time urban users using waste whether
Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed.
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
sentence
For that reason, this sentence should be welcomed.
believed email jailed message plenty received reflect sent sober time via viruses whether
If he had been scanning his email for viruses he would never have received the message from the Sober worm. If jailed he'll have plenty of time to reflect on whether he should have believed everything that was sent to him via e-mail.
access analyst appears examined microsoft ripped source virus whoever wrote
However, when examined by an experienced virus analyst the similarities become clear. It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit.
businesses companies computer date department eager earliest ensure fix following hanging microsoft networks official opportunity patches planning possible properly release roll romantic security serious soon systems tuesday update user vulnerable waiting
If you were planning a romantic date with someone from your IT department on Tuesday night, think again. Companies have been hanging on, waiting for the official fix from Microsoft for this serious security problem. Businesses will be eager to roll out these security patches as soon as possible to ensure their networks are properly defended. Any vulnerable computer user should update their systems at the earliest opportunity following the release of the patches on Tuesday.
file internet moved targeted viruses
In 20 years, viruses have moved from floppy disks to file viruses, to e-mail viruses, to Internet worms, to targeted Trojan-horse attacks.
action alleged apart arresting attempt banking becoming break bring closely computer crime criminal gangs german information internet men online organized plot police potential rewards seeing steal ways work
The German police should be applauded for arresting these men before the alleged criminal plot was put into action. The potential rewards for internet crime are high, and we are seeing organized international gangs becoming more sophisticated in the ways in which they attempt to steal information from online banking users. Computer crime authorities around the world need to work closely with each other to break apart these criminal gangs and bring them to justice.
accounts false gold using
The e-Gold accounts may have been set up using a false ID.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
attempt break computers disaster dreadful exploit hackers horrendous hurricane natural prepared situation
The hurricane is a dreadful natural disaster, and it's sickening to think that hackers are prepared to exploit the horrendous situation in an attempt to break into computers for the purposes of spamming, extortion and theft.