Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
action activities adult bringing campaigns children claiming computer cracking crime culprit firm generate harder help income involved looking message promoted required send sending simply spam strong woman worldwide
It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.
attempt boards breaking conspiracy exploits fool full horse interest internet message met newspapers people theories
Newspapers and internet message boards are full of conspiracy theories as to how Slobodan Milosevic may have met his end, and this Trojan horse exploits interest in the breaking news story in an attempt to fool people into infection.
action activities catching computer crime firm forces menace message required send spam strong
Firm action is required by the authorities to send a strong message to spammers that their activities are unacceptable. The U.S. computer crime forces should be congratulated for catching someone else who was contributing to the menace of spam email.
access amazon attached capable carefully clicking code contain emails file further giving hackers horse install malicious message people running
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.
buck buy computer daniel defend email goods lives marketing medicines messages nuisance people plenty prepared putting quick remember send sending spam unlikely unwanted users via
People who buy medicines marketed via spam messages are not only encouraging the spammers to send more of their nuisance emails, but are also potentially putting their lives at risk. Daniel Lin is unlikely to be sending any more spam, but there are plenty of other spammers out there prepared to make a quick buck with their unwanted marketing messages. All computer users should defend their email addresses with up-to-date anti-spam software, and remember to never buy goods marketed via spam.
believed email jailed message plenty received reflect sent sober time via viruses whether
If he had been scanning his email for viruses he would never have received the message from the Sober worm. If jailed he'll have plenty of time to reflect on whether he should have believed everything that was sent to him via e-mail.
belief computers held incapable leave mac owners
Some owners of Mac computers have held the belief that Mac OS X is incapable of harboring computer viruses, but Leap-A will leave them shell-shocked.
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
accounts false gold using
The e-Gold accounts may have been set up using a false ID.
aim itself music shooting slightly sony succeeded taking
In taking aim at the music pirates, Sony succeeded only in shooting itself in the foot. What they did was not intentionally malicious. If anything, it was slightly inept.
businesses companies computer date department eager earliest ensure fix following hanging microsoft networks official opportunity patches planning possible properly release roll romantic security serious soon systems tuesday update user vulnerable waiting
If you were planning a romantic date with someone from your IT department on Tuesday night, think again. Companies have been hanging on, waiting for the official fix from Microsoft for this serious security problem. Businesses will be eager to roll out these security patches as soon as possible to ensure their networks are properly defended. Any vulnerable computer user should update their systems at the earliest opportunity following the release of the patches on Tuesday.
escaping justice
But there are still a lot escaping justice.