Graham Cluley
Graham Cluley
Graham Cluleyis a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice...
computers designed email evidence half home horses information innocent intention junk less malicious protect sending sent spam stealing waking worms
Two years ago, the US accounted for over half of all spam sent to the world - now it is less than a quarter, evidence which confirms that more Americans are waking up to the need to protect their home computers from malicious hackers. More and more viruses, worms and Trojan horses are being designed to take over innocent users' computers with the intention of stealing information and sending out junk email campaigns.
buck buy computer daniel defend email goods lives marketing medicines messages nuisance people plenty prepared putting quick remember send sending spam unlikely unwanted users via
People who buy medicines marketed via spam messages are not only encouraging the spammers to send more of their nuisance emails, but are also potentially putting their lives at risk. Daniel Lin is unlikely to be sending any more spam, but there are plenty of other spammers out there prepared to make a quick buck with their unwanted marketing messages. All computer users should defend their email addresses with up-to-date anti-spam software, and remember to never buy goods marketed via spam.
companies computing content data desktop educate email entire feeds includes joke opening practice putting receive receiving safe sending users worm
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.
action activities adult bringing campaigns children claiming computer cracking crime culprit firm generate harder help income involved looking message promoted required send sending simply spam strong woman worldwide
It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.
again biggest love morning opening overnight people quiet since took virus
It is probably the biggest virus since the Love Bug. It went quiet overnight but took off again this morning when people started opening their e-mails.
advise anyone apparent attached believe computer email intended message opens passing people receive risk sent wish wrong
People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.
emails mean reading receiving themselves
Receiving or reading the emails themselves does not mean you are infected.
current flaw higher longer microsoft obviously patch platform priority protect release released shipping taken versions
It has obviously taken longer for Microsoft to release a patch for the WMF flaw on the Vista platform than current versions of Windows, but that's because Vista isn't yet released and it was a higher priority to protect the shipping versions of Windows.
certainly days entire few fraud happening identity likely next
It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unraveling of an entire identity fraud gang.
access appears microsoft ripped section source whoever wrote
It appears whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section and plugged in the Microsoft exploit.
access appears code internet last microsoft people possible ripped several source whoever wrote
It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.
biggest company damaged employ practices protected simple software sort
Microsoft's credibility will have been damaged by this hack. How can the biggest software company in the world not employ the simple safe-computing practices which could have protected it from this sort of attack?
bad control controls employees hands kids legitimate programs putting sites
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one.
acting blocking determines guardian money moral sites steal trying viewing
This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,