Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
apple currently emerging face far hackers headline increased indication interest level mac news platform posing showing targeting threat users viruses windows
Viruses emerging for the Mac OS X platform is headline news for Apple fans, but they are currently posing far from the level of threat that Windows users face every day. No-one should panic, but this is an indication that hackers are showing an increased interest in targeting the platform.
activities anyone anywhere computer information noticing pcs send spy viruses
Trojans are different from viruses because they can lurk in PCs without anyone noticing and can spy on the computer user's activities then send this information back anywhere in the world.
appear exploiting eye group microsoft primarily quite security travels untrained via viruses
To the untrained eye Mytob and Zotob can appear quite different: one group of viruses travels via email, the other primarily by exploiting a Microsoft security hole.
bad funny news rather viruses worms
It's funny to us as we're so used to worms and viruses being bad news rather than making the world a better place.
activity amount associated computer consider forget hacker majority particular vast viruses windows written
It's important to consider the amount of hacker activity associated with a particular flaw. And let's not forget that the vast majority of computer viruses are written for Windows computers.
behind businesses counting criminals email ensure holiday home horses open opening people properly protected returning stop thinking updated users viruses year
It's important that businesses and home users ensure they are properly protected with automatically updated anti-virus software, and never open unsolicited email attachments. The criminals behind these viruses and Trojan horses don't stop just because it's the holiday season. They are counting on people returning in the New Year and not thinking before opening their email.
compared disturbing mac microsoft operating remembered second soon viruses worm
It's disturbing to see a second worm for Mac OS X so soon after the first, but it should be remembered that this is only two compared to well over 100,000 viruses for Microsoft operating systems.
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
compared number threat tiny viruses windows
There are a tiny number of mobile-phone viruses compared to the threat on the Windows platform.
bank compare hacks happens information steals viruses worm
Compare what those viruses did to what happens today: If a worm steals your bank information or hacks into your accounts, that is it. You have been robbed.
believed email jailed message plenty received reflect sent sober time via viruses whether
If he had been scanning his email for viruses he would never have received the message from the Sober worm. If jailed he'll have plenty of time to reflect on whether he should have believed everything that was sent to him via e-mail.
file internet moved targeted viruses
In 20 years, viruses have moved from floppy disks to file viruses, to e-mail viruses, to Internet worms, to targeted Trojan-horse attacks.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.