Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
amount code computers distribute horse malicious shortest spam using vulnerable
This Trojan horse has been aggressively seeded, using spam technology, to distribute malicious code to as many vulnerable computers as possible, in the shortest amount of time.
apple careful colleagues computers lips mac malicious next patches protecting question security users using
The question on everyone's lips is - when will we see the next one, and will it have a more malicious payload. Apple Mac users need to be just as careful about protecting their computers with anti-virus software, firewalls and security patches as their friends and colleagues using Windows.
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
access allowing anyone cause caution computer email extreme gain hackers internet malicious reduce ripped risk run software steal taken treat users
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.
clearly code consequences deliver growing malicious problem serious
This is clearly a growing problem with serious consequences. They are used to deliver spam, Trojan horses, and other malicious code very quickly.
across advantage affected against apple business code companies computers defended ensure hacker hackers hole intentions mac malicious microsoft month patches race releases roll run security software takes time users windows
Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.
again biggest love morning opening overnight people quiet since took virus
It is probably the biggest virus since the Love Bug. It went quiet overnight but took off again this morning when people started opening their e-mails.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
access appears microsoft ripped section source whoever wrote
It appears whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section and plugged in the Microsoft exploit.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.