"Graham Cluley" is a British security blogger and the author of grahamcluley.com; a daily blog on the latest computer security news, opinion, and advice.

Cluley started his career in the computer security industry as a programmer at British anti-virus firm S&S International, where he wrote the first Windows version of Dr Solomon's Antivirus/Dr Solomon's Anti-Virus Toolkit.

From 1999 to 2013, Cluley was a Senior Technology Consultant at Sophos and also acted as the Head of Corporate Communications, spokesperson and editor of Sophos's Naked Security site.

In 2009 and 2010, Computer Weekly named Cluley Twitter user of the year.

In April 2011, Cluley was inducted into the InfoSecurity Europe Hall of Fame.

Before entering the computer security industry, Cluley authored two interactive fiction adventure games for MS-DOS: Jacaranda Jim (1987) and Humbug (video game)/Humbug (1990).

More Graham Cluley on Wikipedia.

Fortunately, you don't need special antivirus or security software for MP3s. If your antivirus is current, there won't be any damage, because the scanner will catch it.

It is certainly something that we thought has been happening for some time. What you are likely to see here over the next few days is the unravelling of an entire identity fraud gang.

Worms and viruses are increasingly being written to steal confidential data from innocent people's computers, to hijack resources, or launch spam or denial-of-service attacks.

This worm is over a year old, so anyone that's updated their virus protections in the last year will be protected.

That points to the guy in Turkey, who is alleged to have paid the worm author for writing Zotob.

The Mytob worms have made a significant impact on the virus outbreak charts this year, so anything which may prevent future variants from being developed and released must be welcomed.

It appears whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section and plugged in the Microsoft exploit.

It appears that whoever wrote Zotob had access to the Mytob source code, ripped out the email-spreading section, and plugged in the Microsoft exploit. It's possible that several people have access to the Mytob source code - so it may not be the last we see of this Internet scourge.