Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
against businesses couple home open protecting risk software subject updated users
Most businesses have been protecting against this for a couple of weeks. Home users who have not updated their software may be at risk if they open unsolicited subject lines.
behind business criminals money promising receiving users
Many users will be used to receiving dodgy sounding business propositions in their inbox, promising them a fortune. These schemes, however, only make money for the criminals behind them.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.
america based business crack efforts either enforcing forced helped knowledge north overseas prolific quit sharing tackle
Efforts such as ISPs sharing knowledge on how to crack down on spammers, and authorities enforcing the CAN-SPAM legislation, have helped North America tackle the spammers based on their doorsteps. Some of the most prolific spammers have been forced to either quit the business or relocate overseas as a result,
behind businesses counting criminals email ensure holiday home horses open opening people properly protected returning stop thinking updated users viruses year
It's important that businesses and home users ensure they are properly protected with automatically updated anti-virus software, and never open unsolicited email attachments. The criminals behind these viruses and Trojan horses don't stop just because it's the holiday season. They are counting on people returning in the New Year and not thinking before opening their email.
act advantages banking businesses care online proper reap users
If users and businesses take proper care over their computers, and act sensibly, then they should be able to reap the advantages of online banking without compromising their security,
businesses companies computer date department eager earliest ensure fix following hanging microsoft networks official opportunity patches planning possible properly release roll romantic security serious soon systems tuesday update user vulnerable waiting
If you were planning a romantic date with someone from your IT department on Tuesday night, think again. Companies have been hanging on, waiting for the official fix from Microsoft for this serious security problem. Businesses will be eager to roll out these security patches as soon as possible to ensure their networks are properly defended. Any vulnerable computer user should update their systems at the earliest opportunity following the release of the patches on Tuesday.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.