Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
content data desktop entire feeds putting receive worm
This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
companies computing content data desktop educate email entire feeds includes joke opening practice putting receive receiving safe sending users worm
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
acts allow bad cause company computer data defended employees force home incident individual onto pcs police reminder risk running security sensitive stolen timely victim within
It's bad enough when an individual has data stolen from them by a virus, but a police force being the victim is a real cause for concern. This incident acts as a timely reminder that all organizations need to take computer security seriously. If you allow your employees to put sensitive company data onto their own home computers, you are running the risk that they will not be as well defended as the PCs within your business.
danger data excuse february heard home lost users
There should be no excuse for any data being lost on February 3 by this worm, but there is always the danger that some home users will not have heard that warning.
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
appear exploiting eye group microsoft primarily quite security travels untrained via viruses
To the untrained eye Mytob and Zotob can appear quite different: one group of viruses travels via email, the other primarily by exploiting a Microsoft security hole.
apple careful colleagues computers lips mac malicious next patches protecting question security users using
The question on everyone's lips is - when will we see the next one, and will it have a more malicious payload. Apple Mac users need to be just as careful about protecting their computers with anti-virus software, firewalls and security patches as their friends and colleagues using Windows.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.
join members share
You have to join MARA to get a sample. They'll share only with members of their club.
message send touch
We don't want to touch that with a bargepole. What kind of message would that send to our customers?