Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
message send touch
We don't want to touch that with a bargepole. What kind of message would that send to our customers?
activities anyone anywhere computer information noticing pcs send spy viruses
Trojans are different from viruses because they can lurk in PCs without anyone noticing and can spy on the computer user's activities then send this information back anywhere in the world.
buck buy computer daniel defend email goods lives marketing medicines messages nuisance people plenty prepared putting quick remember send sending spam unlikely unwanted users via
People who buy medicines marketed via spam messages are not only encouraging the spammers to send more of their nuisance emails, but are also potentially putting their lives at risk. Daniel Lin is unlikely to be sending any more spam, but there are plenty of other spammers out there prepared to make a quick buck with their unwanted marketing messages. All computer users should defend their email addresses with up-to-date anti-spam software, and remember to never buy goods marketed via spam.
action activities catching computer crime firm forces menace message required send spam strong
Firm action is required by the authorities to send a strong message to spammers that their activities are unacceptable. The U.S. computer crime forces should be congratulated for catching someone else who was contributing to the menace of spam email.
action activities adult bringing campaigns children claiming computer cracking crime culprit firm generate harder help income involved looking message promoted required send sending simply spam strong woman worldwide
It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
companies computing content data desktop educate email entire feeds includes joke opening practice putting receive receiving safe sending users worm
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.