Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
certainly change designed monotony quirky steal worms
It's quirky and very different from what we usually see. It's certainly a change from the monotony of worms designed to steal from you.
bank compare hacks happens information steals viruses worm
Compare what those viruses did to what happens today: If a worm steals your bank information or hacks into your accounts, that is it. You have been robbed.
account attempt bank common criminals disaster emails families mining money sick steal surely trick using wary
Sick criminals are deliberately using the mining disaster in an attempt to steal from others, without a thought for the families of the victims, who have surely been through enough anguish. Everyone should be wary of emails such as these, as it is a common trick used by fraudsters to steal money and bank account information.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
action alleged apart arresting attempt banking becoming break bring closely computer crime criminal gangs german information internet men online organized plot police potential rewards seeing steal ways work
The German police should be applauded for arresting these men before the alleged criminal plot was put into action. The potential rewards for internet crime are high, and we are seeing organized international gangs becoming more sophisticated in the ways in which they attempt to steal information from online banking users. Computer crime authorities around the world need to work closely with each other to break apart these criminal gangs and bring them to justice.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
bit determine love potential sample sharing threat
We would still love to see a sample of this and determine if this is a potential threat to our customers. It's a little bit disappointing that they are not sharing the sample.
games increase large online seen targeting types
We have seen a large increase in these types of Trojans targeting online gamers, as role-playing games have become a big business.
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.