Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
best clean despite might unique wants worm writer
This Trojan writer just wants to clean up the Internet, which is unique for a worm creator. But despite what they might see as the best of intentions, this isn't the way to do it.
certainly change designed monotony quirky steal worms
It's quirky and very different from what we usually see. It's certainly a change from the monotony of worms designed to steal from you.
bad funny news rather viruses worms
It's funny to us as we're so used to worms and viruses being bad news rather than making the world a better place.
compared disturbing mac microsoft operating remembered second soon viruses worm
It's disturbing to see a second worm for Mac OS X so soon after the first, but it should be remembered that this is only two compared to well over 100,000 viruses for Microsoft operating systems.
computers data innocent launch spam steal viruses worms written
Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks,
anyone last updated virus worm year
This worm is over a year old, so anyone that's updated their virus protections in the last year will be protected.
content data desktop entire feeds putting receive worm
This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
alleged author guy paid points worm
That points to the guy in Turkey, who is alleged to have paid the worm author for writing Zotob.
bank compare hacks happens information steals viruses worm
Compare what those viruses did to what happens today: If a worm steals your bank information or hacks into your accounts, that is it. You have been robbed.
companies computing content data desktop educate email entire feeds includes joke opening practice putting receive receiving safe sending users worm
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
charts developed future impact prevent released virus worms
The Mytob worms have made a significant impact on the virus outbreak charts this year, so anything which may prevent future variants from being developed and released must be welcomed.
anywhere chart computers exploit reveals send unwanted virus writers
What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.