[He said the Trojan horse is written in visual basic and doesn't appear to be connected to any other well-known malware .] It's more of a quirky piece of malware than a significant threat, ... Obviously, some people might construe it as a good Trojan because it blocks access to some adult sites and displays passages from the Koran. But from our point of view, no malware is good malware. |
A combination of technology, legal action, user education and international co-operation is needed to truly make spam a thing of the past. |
A lot of people are stuck in the 1990s, with their image of a virus writer as a kid eating pizza in their bedroom. In fact they are now much more serious, and much nastier. |
A vulnerability like this opens the door for hackers to spy on your sensitive information. Users running the affected software should upgrade as soon as possible. |
A vulnerability like this opens the door for hackers to spy upon your sensitive information. Not protecting yourself against this problem is like leaving your front door open when you pop down the shops, and expecting to find that no-one has stolen your belongings. |
All computer users should treat any unsolicited email attachments with extreme caution, or they run the risk of being ripped off. Anyone unfortunate enough to run malicious software could potentially be allowing hackers to gain access to their computer to spy, steal and cause havoc. Users need to savvy-up to reduce the risk of being taken in by greedy, money-grabbing internet criminals. |
Although the CAN-SPAM Act has helped catch some spammers, and driven some to base their operations overseas, it has an obvious flaw: it relies on people to 'opt-out' of receiving spam rather than 'opt-in' in the first place. |
And Windows XP SP2 is having an effect, what with its primitive firewall and its status center that tells users if their anti-virus signatures are out of date, |
And Windows XP SP2 is having an effect, what with its primitive firewall and its status center that tells users if their anti-virus signatures are out of date. |
Apple Macs have been in the news for the last few weeks regarding a number of security issues. It's important that all computer users are protected against the latest attacks, and have their computers properly patched against vulnerabilities in the operating system. It would be a mistake to think that security flaws are only found in Microsoft's products. |
But there are still a lot escaping justice. |
By taking control of unprotected PCs, hackers can relay spam, launch denial-of-service attacks, or steal user information, without computer owners being any the wiser. |
Chain letters like this are too easily forwarded to friends, family and colleagues without people using their common sense. Stories like this become urban legends, constantly being repeated without anyone bothering to check the facts. Hoaxes and chain letters like this are not harmless - they waste time and bandwidth, and can be a genuine headache for support departments. Users need to be more skeptical, and ask themselves whether everything they are told by email can be believed. |
Companies should educate their users to practice safe computing - that includes never opening unsolicited email attachments and discouraging the sending and receiving of joke files, pornography and screensavers. This worm feeds on people's willingness to receive salacious content on their desktop computer, but they could be putting their entire company's data at risk. |
Companies should educate their users to practice safe computing. |