Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
apple currently emerging face far hackers headline increased indication interest level mac news platform posing showing targeting threat users viruses windows
Viruses emerging for the Mac OS X platform is headline news for Apple fans, but they are currently posing far from the level of threat that Windows users face every day. No-one should panic, but this is an indication that hackers are showing an increased interest in targeting the platform.
against apply chance companies computers defend hackers hole networks patch possible race security soon time
Hackers are in a race against time to infect as many computers as possible through the WMF security hole before companies have a chance to put the patch in place. Everyone should apply the patch as soon as possible, and defend their networks with up-to-date anti-virus and anti-spam software.
against door expecting front hackers leaving opens pop problem protecting sensitive spy stolen
A vulnerability like this opens the door for hackers to spy upon your sensitive information. Not protecting yourself against this problem is like leaving your front door open when you pop down the shops, and expecting to find that no-one has stolen your belongings.
affected door hackers information opens running sensitive software soon spy upgrade users
A vulnerability like this opens the door for hackers to spy on your sensitive information. Users running the affected software should upgrade as soon as possible.
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
attempt break computers disaster dreadful exploit hackers horrendous hurricane natural prepared situation
The hurricane is a dreadful natural disaster, and it's sickening to think that hackers are prepared to exploit the horrendous situation in an attempt to break into computers for the purposes of spamming, extortion and theft.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.