Graham Cluley Quotes (94 Quotes)


    There is going to be a real growth in 'pump and dump' spam.

    Compare what those viruses did to what happens today If a worm steals your bank information or hacks into your accounts, that is it. You have been robbed.

    There should be no excuse for any data being lost on February 3 by this worm, but there is always the danger that some home users will not have heard that warning.

    This is the first real virus for the Mac OS X platform. Apple Mac users need to be just as careful running unknown or unsolicited code on their computers as their friends and colleagues running Windows.



    Sadly for the family, getting a court order against httpwww. wikipedia. de will not be the solution they are looking for. I find it unlikely that they will ever be satisfied in this issue, and disrupting httpwww. wikipedia. de has only probably drawn more attention to the hacker's short life.

    These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer.

    People who receive this viral email won't necessarily believe that it was intended for them or their company, of course, but they may wish to advise the apparent sender that they have sent the message to the wrong person. If anyone opens the attached file, however, they risk infecting their computer and passing on the pox to others.

    It will be interesting to see if they decide to break the cycle and release a patch earlier in response to the increasing number of exploits of this problem.

    Unlike worms, it doesn't have a capability to replicate itself and so has to be manually spread by being spammed out deliberately, or people downloading it from a Web site.

    You have to join MARA to get a sample. They'll share only with members of their club.

    The worry is that the problems with the patch may have prevented it from being successfully rolled out onto some vulnerable computers.

    You imagine that it would be used by jealous boyfriends, but it may also be used inside business. However, businesses themselves already employ a number of tools to monitor end user behavior on the desktop, so it could also be something that companies potentially use themselves.

    This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk.

    the average fantasy of the guy who sits in front of the computer terminal.

    Email scammers are attempting to fleece the innocent out of money, and it is the naive who are most at risk of ending up penniless. This scam contains spelling mistakes and typos, but even if the scammer had done a better job at presenting himself professionally people need to learn that there is no such thing as a free lunch. If an unsolicited email makes extravagant promises then computer users should be extremely wary.

    It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the e-mail-spreading section, and plugged in the Microsoft exploit. The Mytob worms have made a significant impact on the virus outbreak charts this year, so anything which may prevent future variants from being developed and released must be welcomed.

    It's bad enough when an individual has data stolen from them by a virus, but a police force being the victim is a real cause for concern. This incident acts as a timely reminder that all organizations need to take computer security seriously. If you allow your employees to put sensitive company data onto their own home computers, you are running the risk that they will not be as well defended as the PCs within your business.

    However, when examined by an experienced virus analyst the similarities become clear. It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit.

    This Trojan isn't trying to steal money or confidential information, but acting as a moral guardian instead, blocking viewing of sites it determines are unsavory,

    It's important to consider the amount of hacker activity associated with a particular flaw. And let's not forget that the vast majority of computer viruses are written for Windows computers.

    There's been no death, no Titanic-style disaster. So far there's been extremely little activity. We've had no reports of data destroyed from our business customers. That doesn't mean people can afford to be complacent, though.

    All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals.


    The warning is clearly nonsense and no such virus exists. However, hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to think ask themselves whether everything they are told can be believed.

    When I first entered the antivirus industry, updates were sent out on a 5.25-inch floppy disk. A lot has changed in that time.

    It's sickening to think that a woman claiming to help other mums generate an income while looking after their children was also involved in spam campaigns that promoted adult pornographic websites. The US computer crime authorities are cracking down harder than ever on those responsible for sending spam, and they should be congratulated for bringing another culprit to justice. Firm action is required worldwide to send a strong message to spammers that their activities are simply unacceptable.

    This move into the theft of virtual goods is hardly surprising when you consider the sums of money changing hands for virtual items in these virtual worlds.

    It's important that businesses and home users ensure they are properly protected with automatically updated anti-virus software, and never open unsolicited email attachments. The criminals behind these viruses and Trojan horses don't stop just because it's the holiday season. They are counting on people returning in the New Year and not thinking before opening their email.

    Every month Microsoft releases security patches for its software - and it's often a race against time for companies to roll these patches out across their business before a hacker takes advantage of the vulnerability. A security hole which allows hackers with malicious intentions to run code on Windows or Apple Mac computers is very serious, and all affected users should ensure they have defended their systems.

    That points to the guy in Turkey, who is alleged to have paid the worm author for writing Zotob.

    Europe is in danger of overtaking North America as the second-worst spam-relaying part of the world. This continental shift is inevitable because as North America's percentage continues to fall, the rest of the world is witnessing a rise.

    If you were planning a romantic date with someone from your IT department on Tuesday night, think again. Companies have been hanging on, waiting for the official fix from Microsoft for this serious security problem. Businesses will be eager to roll out these security patches as soon as possible to ensure their networks are properly defended. Any vulnerable computer user should update their systems at the earliest opportunity following the release of the patches on Tuesday.

    If we joined, we couldn't share any identifying information about MARA members, so if we found someone in the group publishing virus source code, or co-authoring articles with known virus writers, we couldn't divulge that information.

    This leaves Sony in a real tangle. It was already getting bad press about its copy-protection software, and this new hack exploit will make it even worse.

    There's a lesson for the general public here too. Always keep your antivirus software up to date and don't be too quick to believe everything you receive via e-mail.

    In taking aim at the music pirates, Sony succeeded only in shooting itself in the foot. What they did was not intentionally malicious. If anything, it was slightly inept.

    This Trojan horse is designed to take your data hostage and tries to scare users into paying up quickly by threatening to wipe files one-by-one.

    Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed.

    In some ways it makes sense, since it isn't really distinct from other types of crime.

    Microsoft's credibility will have been damaged by this hack. How can the biggest software company in the world not employ the simple safe-computing practices which could have protected it from this sort of attack.


    This is clearly a growing problem with serious consequences. They are used to deliver spam, Trojan horses, and other malicious code very quickly.

    The bad news is that most people think the situation is going to get worse for Macintosh users, and more threats will be targeted against the Apple community. The good news is that most don't believe it will ever be as big a problem as the one Microsoft Windows faces. What's perhaps surprising is that there is a hardcore element of 21 who believe that threat attempts against Mac users will not grow.

    It's funny to us as we're so used to worms and viruses being bad news rather than making the world a better place.

    There should be no need for anyone to pay the reward. It looks like this password was deliberately chosen by the author in an attempt to fool analysts into thinking it was a directory path instead.

    It has been lowering for awhile for a number of reasons,

    Apple Macs have been in the news for the last few weeks regarding a number of security issues. It's important that all computer users are protected against the latest attacks, and have their computers properly patched against vulnerabilities in the operating system. It would be a mistake to think that security flaws are only found in Microsoft's products.

    You need to decide yourself on this one. The vulnerability is a serious problem -- we've seen over 200 different exploits -- but I don't think this is a time to panic.

    The German police should be applauded for arresting these men before the alleged criminal plot was put into action. The potential rewards for internet crime are high, and we are seeing organized international gangs becoming more sophisticated in the ways in which they attempt to steal information from online banking users. Computer crime authorities around the world need to work closely with each other to break apart these criminal gangs and bring them to justice.


    More Graham Cluley Quotations (Based on Topics)


    Computers & Technology - Danger & Risk - People - Time - World - Crime - Business & Commerce - Actions - Security - Internet - Justice - Place - Family - Media & News - Communities - Money & Wealth - Sense & Perception - Error & Mistake - Intention - View All Graham Cluley Quotations

    Related Authors


    - - - - - - - - - - - - - - - - - - - - - - - - - -


Page 1 of 2 1 2

Authors (by First Name)

A - B - C - D - E - F - G - H - I - J - K - L - M
N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Other Inspiring Sections