Graham Cluley

Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
capability itself people replicate spread unlike web
Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.
attempting computer contains email ending extremely free himself innocent job learn mistakes naive people presenting promises risk scam spelling users
Email scammers are attempting to fleece the innocent out of money, and it is the naive who are most at risk of ending up penniless. This scam contains spelling mistakes and typos, but even if the scammer had done a better job at presenting himself professionally people need to learn that there is no such thing as a free lunch. If an unsolicited email makes extravagant promises then computer users should be extremely wary.
belief computers held incapable leave mac owners
Some owners of Mac computers have held the belief that Mac OS X is incapable of harboring computer viruses, but Leap-A will leave them shell-shocked.
computer control hackers launch owners relay steal taking user
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
accounts false gold using
The e-Gold accounts may have been set up using a false ID.
aim itself music shooting slightly sony succeeded taking
In taking aim at the music pirates, Sony succeeded only in shooting itself in the foot. What they did was not intentionally malicious. If anything, it was slightly inept.
businesses companies computer date department eager earliest ensure fix following hanging microsoft networks official opportunity patches planning possible properly release roll romantic security serious soon systems tuesday update user vulnerable waiting
If you were planning a romantic date with someone from your IT department on Tuesday night, think again. Companies have been hanging on, waiting for the official fix from Microsoft for this serious security problem. Businesses will be eager to roll out these security patches as soon as possible to ensure their networks are properly defended. Any vulnerable computer user should update their systems at the earliest opportunity following the release of the patches on Tuesday.
escaping justice
But there are still a lot escaping justice.
hacker interest surprise
It wouldn't surprise me if this didn't get the interest of the hacker community.
attempt break computers disaster dreadful exploit hackers horrendous hurricane natural prepared situation
The hurricane is a dreadful natural disaster, and it's sickening to think that hackers are prepared to exploit the horrendous situation in an attempt to break into computers for the purposes of spamming, extortion and theft.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
awhile lowering number
It has been lowering for awhile for a number of reasons,
file internet moved targeted viruses
In 20 years, viruses have moved from floppy disks to file viruses, to e-mail viruses, to Internet worms, to targeted Trojan-horse attacks.