Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
attempt break computers disaster dreadful exploit hackers horrendous hurricane natural prepared situation
The hurricane is a dreadful natural disaster, and it's sickening to think that hackers are prepared to exploit the horrendous situation in an attempt to break into computers for the purposes of spamming, extortion and theft.
affected door hackers information opens running sensitive software soon spy upgrade users
A vulnerability like this opens the door for hackers to spy on your sensitive information. Users running the affected software should upgrade as soon as possible.
bad exploit hack leaves press sony
This leaves Sony in a real tangle. It was already getting bad press about its copy-protection software, and this new hack exploit will make it even worse.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
against door expecting front hackers leaving opens pop problem protecting sensitive spy stolen
A vulnerability like this opens the door for hackers to spy upon your sensitive information. Not protecting yourself against this problem is like leaving your front door open when you pop down the shops, and expecting to find that no-one has stolen your belongings.
bank compare hacks happens information steals viruses worm
Compare what those viruses did to what happens today: If a worm steals your bank information or hacks into your accounts, that is it. You have been robbed.
activity amount associated computer consider forget hacker majority particular vast viruses windows written
It's important to consider the amount of hacker activity associated with a particular flaw. And let's not forget that the vast majority of computer viruses are written for Windows computers.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
belief computers held incapable leave mac owners
Some owners of Mac computers have held the belief that Mac OS X is incapable of harboring computer viruses, but Leap-A will leave them shell-shocked.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
accounts false gold using
The e-Gold accounts may have been set up using a false ID.
aim itself music shooting slightly sony succeeded taking
In taking aim at the music pirates, Sony succeeded only in shooting itself in the foot. What they did was not intentionally malicious. If anything, it was slightly inept.