Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
appear exploiting eye group microsoft primarily quite security travels untrained via viruses
To the untrained eye Mytob and Zotob can appear quite different: one group of viruses travels via email, the other primarily by exploiting a Microsoft security hole.
apple careful colleagues computers lips mac malicious next patches protecting question security users using
The question on everyone's lips is - when will we see the next one, and will it have a more malicious payload. Apple Mac users need to be just as careful about protecting their computers with anti-virus software, firewalls and security patches as their friends and colleagues using Windows.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.
join members share
You have to join MARA to get a sample. They'll share only with members of their club.
message send touch
We don't want to touch that with a bargepole. What kind of message would that send to our customers?
accused citizen click falsely help illegal might panic police visiting wants websites
Every law-abiding citizen wants to help the police with their enquiries, and some will panic that they might be being falsely accused of visiting illegal websites and want to click on the unsolicited e-mail attachment.
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
action activities catching computer crime firm forces menace message required send spam strong
Firm action is required by the authorities to send a strong message to spammers that their activities are unacceptable. The U.S. computer crime forces should be congratulated for catching someone else who was contributing to the menace of spam email.
slightly
What they did was not intentionally malicious. If anything, it was slightly inept.