Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
acts allow bad cause company computer data defended employees force home incident individual onto pcs police reminder risk running security sensitive stolen timely victim within
It's bad enough when an individual has data stolen from them by a virus, but a police force being the victim is a real cause for concern. This incident acts as a timely reminder that all organizations need to take computer security seriously. If you allow your employees to put sensitive company data onto their own home computers, you are running the risk that they will not be as well defended as the PCs within your business.
certainly change designed monotony quirky steal worms
It's quirky and very different from what we usually see. It's certainly a change from the monotony of worms designed to steal from you.
anyone ask bothering chain check colleagues common common-sense constantly easily email family genuine harmless headache letters people repeated stories support themselves time urban users using waste whether
Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed.
activity amount associated computer consider forget hacker majority particular vast viruses windows written
It's important to consider the amount of hacker activity associated with a particular flaw. And let's not forget that the vast majority of computer viruses are written for Windows computers.
anyone attempt author chosen fool looks path pay thinking
There should be no need for anyone to pay the reward. It looks like this password was deliberately chosen by the author in an attempt to fool analysts into thinking it was a directory path instead.
act advantages banking businesses care online proper reap users
If users and businesses take proper care over their computers, and act sensibly, then they should be able to reap the advantages of online banking without compromising their security,
gives green light provide reply
Individuals have to reply to the unsolicited e-mail and unsubscribe, which gives the green light to spammers as long as they provide that option.
danger data excuse february heard home lost users
There should be no excuse for any data being lost on February 3 by this worm, but there is always the danger that some home users will not have heard that warning.
computer regular responsibility sure users
There's a responsibility on the part of regular computer users to make sure that they are not part of a DoS attack.
blocking educating form gotten job task together users
ISPs have gotten better at blocking spam, they've gotten together to form anti-spam associations and task forces, and they've done a better job of educating their users about spam,
becoming criminals employees exploiting finding handing information private users vulnerable ways
Criminals are becoming increasingly canny at finding ways of exploiting vulnerable users and pilfering funds. Some employees are practically handing their private information over on a plate.
action activities catching computer crime firm forces menace message required send spam strong
Firm action is required by the authorities to send a strong message to spammers that their activities are unacceptable. The U.S. computer crime forces should be congratulated for catching someone else who was contributing to the menace of spam email.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
alleged author guy paid points worm
That points to the guy in Turkey, who is alleged to have paid the worm author for writing Zotob.