Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
action activities adult bringing campaigns children claiming computer cracking crime culprit firm generate harder help income involved looking message promoted required send sending simply spam strong woman worldwide
It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.
act although base catch driven helped obvious operations people rather receiving spam
Although the CAN-SPAM Act has helped catch some spammers, and driven some to base their operations overseas, it has an obvious flaw: it relies on people to 'opt-out' of receiving spam rather than 'opt-in' in the first place.
action education legal needed spam truly user
A combination of technology, legal action, user education and international co-operation is needed to truly make spam a thing of the past.
against bandwidth biggest computer deliver heard hit individual judgment millions nuisance pay pocket spam store unwanted users
This judgment against a spammer is undoubtedly the biggest we have ever heard of. Spam is not just a nuisance for individual computer users who find their inboxes clogged up with unwanted mail, but for ISPs who are hit in the pocket by having to pay for the bandwidth to deliver and store hundreds of millions of messages.
buck buy computer daniel defend email goods lives marketing medicines messages nuisance people plenty prepared putting quick remember send sending spam unlikely unwanted users via
People who buy medicines marketed via spam messages are not only encouraging the spammers to send more of their nuisance emails, but are also potentially putting their lives at risk. Daniel Lin is unlikely to be sending any more spam, but there are plenty of other spammers out there prepared to make a quick buck with their unwanted marketing messages. All computer users should defend their email addresses with up-to-date anti-spam software, and remember to never buy goods marketed via spam.
action activities catching computer crime firm forces menace message required send spam strong
Firm action is required by the authorities to send a strong message to spammers that their activities are unacceptable. The U.S. computer crime forces should be congratulated for catching someone else who was contributing to the menace of spam email.
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
bit determine love potential sample sharing threat
We would still love to see a sample of this and determine if this is a potential threat to our customers. It's a little bit disappointing that they are not sharing the sample.
games increase large online seen targeting types
We have seen a large increase in these types of Trojans targeting online gamers, as role-playing games have become a big business.
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.