Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
action activities adult bringing campaigns children claiming computer cracking crime culprit firm generate harder help income involved looking message promoted required send sending simply spam strong woman worldwide
It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
catch criminals difference likes man notice point public view
Everyone likes to catch their man and get two criminals off the street, so from that point of view it was great. But the public will not notice any difference because of it.
account attempt bank common criminals disaster emails families mining money sick steal surely trick using wary
Sick criminals are deliberately using the mining disaster in an attempt to steal from others, without a thought for the families of the victims, who have surely been through enough anguish. Everyone should be wary of emails such as these, as it is a common trick used by fraudsters to steal money and bank account information.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
access appears microsoft ripped section source whoever wrote
It appears whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section and plugged in the Microsoft exploit.
attempt boards breaking conspiracy exploits fool full horse interest internet message met newspapers people theories
Newspapers and internet message boards are full of conspiracy theories as to how Slobodan Milosevic may have met his end, and this Trojan horse exploits interest in the breaking news story in an attempt to fool people into infection.
action education legal needed spam truly user
A combination of technology, legal action, user education and international co-operation is needed to truly make spam a thing of the past.
distinct since types ways
In some ways it makes sense, since it isn't really distinct from other types of crime.
onto patch problems vulnerable worry
The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.
computers effort extra plenty virus windows
They don't need to go to all that extra effort to write a virus for Macs. There are plenty of unprotected Windows computers out there.
apple careful code colleagues computers mac running unknown users virus
This is the first real virus for the Mac OS X platform. Apple Mac users need to be just as careful running unknown or unsolicited code on their computers as their friends and colleagues running Windows.
attempting computer contains email ending extremely free himself innocent job learn mistakes naive people presenting promises risk scam spelling users
Email scammers are attempting to fleece the innocent out of money, and it is the naive who are most at risk of ending up penniless. This scam contains spelling mistakes and typos, but even if the scammer had done a better job at presenting himself professionally people need to learn that there is no such thing as a free lunch. If an unsolicited email makes extravagant promises then computer users should be extremely wary.
companies educate practice safe users
Companies should educate their users to practice safe computing.