Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
apple careful code colleagues computers mac running unknown users virus
This is the first real virus for the Mac OS X platform. Apple Mac users need to be just as careful running unknown or unsolicited code on their computers as their friends and colleagues running Windows.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
clearly code consequences deliver growing malicious problem serious
This is clearly a growing problem with serious consequences. They are used to deliver spam, Trojan horses, and other malicious code very quickly.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.
center primitive status tells users windows
And Windows XP SP2 is having an effect, what with its primitive firewall and its status center that tells users if their anti-virus signatures are out of date.
attempting computer contains email ending extremely free himself innocent job learn mistakes naive people presenting promises risk scam spelling users
Email scammers are attempting to fleece the innocent out of money, and it is the naive who are most at risk of ending up penniless. This scam contains spelling mistakes and typos, but even if the scammer had done a better job at presenting himself professionally people need to learn that there is no such thing as a free lunch. If an unsolicited email makes extravagant promises then computer users should be extremely wary.
america continues danger europe inevitable north percentage rest shift
Europe is in danger of overtaking North America as the second-worst spam-relaying part of the world. This continental shift is inevitable because as North America's percentage continues to fall, the rest of the world is witnessing a rise.