Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
against apply chance companies computers defend hackers hole networks patch possible race security soon time
Hackers are in a race against time to infect as many computers as possible through the WMF security hole before companies have a chance to put the patch in place. Everyone should apply the patch as soon as possible, and defend their networks with up-to-date anti-virus and anti-spam software.
ask chain clearly genuine harmless headache letters nonsense support themselves time users virus warning waste whether
The warning is clearly nonsense and no such virus exists. However, hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to think ask themselves whether everything they are told can be believed.
acts allow bad cause company computer data defended employees force home incident individual onto pcs police reminder risk running security sensitive stolen timely victim within
It's bad enough when an individual has data stolen from them by a virus, but a police force being the victim is a real cause for concern. This incident acts as a timely reminder that all organizations need to take computer security seriously. If you allow your employees to put sensitive company data onto their own home computers, you are running the risk that they will not be as well defended as the PCs within your business.
decide exploits problem seen serious time
You need to decide yourself on this one. The vulnerability is a serious problem -- we've seen over 200 different exploits -- but I don't think this is a time to panic.
anyone ask bothering chain check colleagues common common-sense constantly easily email family genuine harmless headache letters people repeated stories support themselves time urban users using waste whether
Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed.
believed email jailed message plenty received reflect sent sober time via viruses whether
If he had been scanning his email for viruses he would never have received the message from the Sober worm. If jailed he'll have plenty of time to reflect on whether he should have believed everything that was sent to him via e-mail.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.
center primitive status tells users windows
And Windows XP SP2 is having an effect, what with its primitive firewall and its status center that tells users if their anti-virus signatures are out of date.