Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
bit determine love potential sample sharing threat
We would still love to see a sample of this and determine if this is a potential threat to our customers. It's a little bit disappointing that they are not sharing the sample.
action alleged apart arresting attempt banking becoming break bring closely computer crime criminal gangs german information internet men online organized plot police potential rewards seeing steal ways work
The German police should be applauded for arresting these men before the alleged criminal plot was put into action. The potential rewards for internet crime are high, and we are seeing organized international gangs becoming more sophisticated in the ways in which they attempt to steal information from online banking users. Computer crime authorities around the world need to work closely with each other to break apart these criminal gangs and bring them to justice.
games increase large online seen targeting types
We have seen a large increase in these types of Trojans targeting online gamers, as role-playing games have become a big business.
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
america europe next north surprised
I won't be surprised if Europe overtakes North America next month.
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
against businesses couple home open protecting risk software subject updated users
Most businesses have been protecting against this for a couple of weeks. Home users who have not updated their software may be at risk if they open unsolicited subject lines.
biggest company damaged employ practices protected simple software sort
Microsoft's credibility will have been damaged by this hack. How can the biggest software company in the world not employ the simple safe-computing practices which could have protected it from this sort of attack?