Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
attempt boards breaking conspiracy exploits fool full horse interest internet message met newspapers people theories
Newspapers and internet message boards are full of conspiracy theories as to how Slobodan Milosevic may have met his end, and this Trojan horse exploits interest in the breaking news story in an attempt to fool people into infection.
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
file internet moved targeted viruses
In 20 years, viruses have moved from floppy disks to file viruses, to e-mail viruses, to Internet worms, to targeted Trojan-horse attacks.
action alleged apart arresting attempt banking becoming break bring closely computer crime criminal gangs german information internet men online organized plot police potential rewards seeing steal ways work
The German police should be applauded for arresting these men before the alleged criminal plot was put into action. The potential rewards for internet crime are high, and we are seeing organized international gangs becoming more sophisticated in the ways in which they attempt to steal information from online banking users. Computer crime authorities around the world need to work closely with each other to break apart these criminal gangs and bring them to justice.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.
center primitive status tells users windows
And Windows XP SP2 is having an effect, what with its primitive firewall and its status center that tells users if their anti-virus signatures are out of date.
attempting computer contains email ending extremely free himself innocent job learn mistakes naive people presenting promises risk scam spelling users
Email scammers are attempting to fleece the innocent out of money, and it is the naive who are most at risk of ending up penniless. This scam contains spelling mistakes and typos, but even if the scammer had done a better job at presenting himself professionally people need to learn that there is no such thing as a free lunch. If an unsolicited email makes extravagant promises then computer users should be extremely wary.