Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
clearly code consequences deliver growing malicious problem serious
This is clearly a growing problem with serious consequences. They are used to deliver spam, Trojan horses, and other malicious code very quickly.
apple careful code colleagues computers mac running unknown users virus
This is the first real virus for the Mac OS X platform. Apple Mac users need to be just as careful running unknown or unsolicited code on their computers as their friends and colleagues running Windows.
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
appear exploiting eye group microsoft primarily quite security travels untrained via viruses
To the untrained eye Mytob and Zotob can appear quite different: one group of viruses travels via email, the other primarily by exploiting a Microsoft security hole.
apple careful colleagues computers lips mac malicious next patches protecting question security users using
The question on everyone's lips is - when will we see the next one, and will it have a more malicious payload. Apple Mac users need to be just as careful about protecting their computers with anti-virus software, firewalls and security patches as their friends and colleagues using Windows.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.
join members share
You have to join MARA to get a sample. They'll share only with members of their club.
message send touch
We don't want to touch that with a bargepole. What kind of message would that send to our customers?