There are a tiny number of mobile-phone viruses compared to the threat on the Windows platform. |
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, |
There are fortunes to be made from the dark side of the Internet and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities. |
There are fortunes to be made from the dark side of the internet, and spammers who are finding it harder to sell goods via bulk email are likely to turn to other criminal activities, ... What the chart reveals is that spammers and virus writers can exploit unprotected computers anywhere in the world to send out their unwanted messages - everyone has a part to play in the fight against spam. |
There are legitimate Web-filtering programs that let you control which sites your employees or your kids visit. The idea of putting controls into the hands of a Trojan is a bad one. |
There have been many more arrests in 2005 and 2004 than in years prior, |
There is going to be a real growth in 'pump and dump' spam. |
There should be no excuse for any data being lost on February 3 by this worm, but there is always the danger that some home users will not have heard that warning. |
There should be no need for anyone to pay the reward. It looks like this password was deliberately chosen by the author in an attempt to fool analysts into thinking it was a directory path instead. |
There's a lesson for the general public here too. Always keep your antivirus software up to date and don't be too quick to believe everything you receive via e-mail. |
There's a lesson for the general public here too. Always keep your antivirus software up to date and don't be too quick to believe everything you receive via e-mail. |
There's a responsibility on the part of regular computer users to make sure that they are not part of a DoS attack. |
There's been no death, no Titanic-style disaster. So far there's been extremely little activity. We've had no reports of data destroyed from our business customers. That doesn't mean people can afford to be complacent, though. |
These emails do not really come from Amazon, and clicking on the attached file will install a malicious Trojan horse on your computer. Once it has slipped under your radar, this Trojan is capable of downloading further malicious code from the internet, giving hackers access to your PC. A real message from Amazon would never contain an attached executable file, and people should always think carefully before running unsolicited code on their computer. |
They don't need to go to all that extra effort to write a virus for Macs. There are plenty of unprotected Windows computers out there. |