Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
again biggest love morning opening overnight people quiet since took virus
It is probably the biggest virus since the Love Bug. It went quiet overnight but took off again this morning when people started opening their e-mails.
against businesses couple home open protecting risk software subject updated users
Most businesses have been protecting against this for a couple of weeks. Home users who have not updated their software may be at risk if they open unsolicited subject lines.
companies computing content data desktop educate email entire feeds includes joke opening practice putting receive receiving safe sending users worm
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
behind businesses counting criminals email ensure holiday home horses open opening people properly protected returning stop thinking updated users viruses year
It's important that businesses and home users ensure they are properly protected with automatically updated anti-virus software, and never open unsolicited email attachments. The criminals behind these viruses and Trojan horses don't stop just because it's the holiday season. They are counting on people returning in the New Year and not thinking before opening their email.
against door expecting front hackers leaving opens pop problem protecting sensitive spy stolen
A vulnerability like this opens the door for hackers to spy upon your sensitive information. Not protecting yourself against this problem is like leaving your front door open when you pop down the shops, and expecting to find that no-one has stolen your belongings.
affected door hackers information opens running sensitive software soon spy upgrade users
A vulnerability like this opens the door for hackers to spy on your sensitive information. Users running the affected software should upgrade as soon as possible.
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
appear exploiting eye group microsoft primarily quite security travels untrained via viruses
To the untrained eye Mytob and Zotob can appear quite different: one group of viruses travels via email, the other primarily by exploiting a Microsoft security hole.
apple careful colleagues computers lips mac malicious next patches protecting question security users using
The question on everyone's lips is - when will we see the next one, and will it have a more malicious payload. Apple Mac users need to be just as careful about protecting their computers with anti-virus software, firewalls and security patches as their friends and colleagues using Windows.
behavior businesses companies employ imagine inside jealous monitor number themselves tools user
You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.