Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
bit determine love potential sample sharing threat
We would still love to see a sample of this and determine if this is a potential threat to our customers. It's a little bit disappointing that they are not sharing the sample.
games increase large online seen targeting types
We have seen a large increase in these types of Trojans targeting online gamers, as role-playing games have become a big business.
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
bulk criminal dark email finding fortunes goods harder internet likely sell side turn via
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities,
against anywhere bulk chart computers criminal dark email exploit fight finding fortunes goods harder likely messages reveals sell send side turn unwanted via virus writers
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
america europe next north surprised
I won't be surprised if Europe overtakes North America next month.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
against businesses couple home open protecting risk software subject updated users
Most businesses have been protecting against this for a couple of weeks. Home users who have not updated their software may be at risk if they open unsolicited subject lines.
biggest company damaged employ practices protected simple software sort
Microsoft's credibility will have been damaged by this hack. How can the biggest software company in the world not employ the simple safe-computing practices which could have protected it from this sort of attack?