Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
activities anyone anywhere computer information noticing pcs send spy viruses
Trojans are different from viruses because they can lurk in PCs without anyone noticing and can spy on the computer user's activities then send this information back anywhere in the world.
anyone last updated virus worm year
This worm is over a year old, so anyone that's updated their virus protections in the last year will be protected.
anyone attempt author chosen fool looks path pay thinking
There should be no need for anyone to pay the reward. It looks like this password was deliberately chosen by the author in an attempt to fool analysts into thinking it was a directory path instead.
anyone ask bothering chain check colleagues common common-sense constantly easily email family genuine harmless headache letters people repeated stories support themselves time urban users using waste whether
Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed.
anyone cannot dealt guy imagine
That isn't Sophos. I cannot imagine anyone here being so rude. I know the guy who dealt with this at Sophos, and he's very polite.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
again biggest love morning opening overnight people quiet since took virus
It is probably the biggest virus since the Love Bug. It went quiet overnight but took off again this morning when people started opening their e-mails.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
access appears microsoft ripped section source whoever wrote
It appears whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section and plugged in the Microsoft exploit.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
biggest company damaged employ practices protected simple software sort
Microsoft's credibility will have been damaged by this hack. How can the biggest software company in the world not employ the simple safe-computing practices which could have protected it from this sort of attack?