Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
behind businesses counting criminals email ensure holiday home horses open opening people properly protected returning stop thinking updated users viruses year
It's important that businesses and home users ensure they are properly protected with automatically updated anti-virus software, and never open unsolicited email attachments. The criminals behind these viruses and Trojan horses don't stop just because it's the holiday season. They are counting on people returning in the New Year and not thinking before opening their email.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
attempt boards breaking conspiracy exploits fool full horse interest internet message met newspapers people theories
Newspapers and internet message boards are full of conspiracy theories as to how Slobodan Milosevic may have met his end, and this Trojan horse exploits interest in the breaking news story in an attempt to fool people into infection.
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
bit determine love potential sample sharing threat
We would still love to see a sample of this and determine if this is a potential threat to our customers. It's a little bit disappointing that they are not sharing the sample.
games increase large online seen targeting types
We have seen a large increase in these types of Trojans targeting online gamers, as role-playing games have become a big business.
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
america europe next north surprised
I won't be surprised if Europe overtakes North America next month.