Forum Spam, a first-hand experience!!!
Besides working for Norman, I also act as the president of AMTSO, the Anti-Malware Testing Standards Organization. And of course Norman is also a member of AMTSO. If you like to know what AMTSO is all...
View ArticleA more secure Facebook
A few months ago Norman published a security article about the tool Firesheep, an extension to Firefox, which enabled taking over another user's unsecured session with a web site. Social networks like...
View ArticleIPcalypse happened: Will the Internet collapse? For $ale, my IPv4 number!!!
As I mentioned in my blog from 17 January "IPv4: IPcalypse", the available number of IPv4 addresses was reaching zero. That has happened, IANA Central Registry of IPv4 addreses is exhausted. Not on...
View ArticleKindly check the attached VALENTINE'S CARD coming from me
There are some (media) events, which inevitably inspire cybercriminals, for example: celebrity news disasters holidays / annual events The two former are difficult for the cybercriminals to prepare for...
View ArticleRandom or personal Google ads? Your choice!
A few weeks ago, Norman published a security article about whether personalized web advertisements are good or bad. Several proposals for opting-out of personalized advertisements were discussed....
View ArticleDomain name scam relived: AsiaGov
Two years ago a wrote a series of blogs on Domain Name Scammers trying to sell Norman domains we did not want and were “claimed” by “unknown” people. But if we reacted promptly, although they use a...
View ArticleGoogle uses 'the kill switch' to remove downloaded malware
In Norman's yearly summary of security incidents, we also attempt to look into our crystal ball to predict what will happen in the year to come. One of the forecasts made in our 2010 summary was: More...
View ArticleFake security program... for Android
Earlier this week I wrote about the malicious Android apps that Google had removed from users' devices. As another part of Google's cleaning-up procedures, the company pushed a security application to...
View ArticleDamage caused by internet banking fraud quintuples... What’s next?
It is not a surprise, more and more people are banking online and thus cybercriminals move more and more into that region. Banking fraud on the internet is not new. It has been existing for a few years...
View Article.XXX top level domain approved
My blog item 29 June last year, was titled Red Light District on the Internet. This was about the fact that The Internet Corporation for Assigned Names and Numbers (ICANN), had taken a major step in...
View Article666.624 IPv4 addresses sold for $7.5M to Microsoft
Don’t you love it when your predictions come true… On 3 February 2011 I wrote a blog item “IPcalypse happened: Will the Internet collapse? For $ale, my IPv4 number!!!” In that blog I wrote “Another...
View ArticleTo the Millions and Millions of people… How not to warn the Millions!
Last week, a data breach at Epsilon has put millions of e-mail addresses and names on the street. According to Epsilon, only 2% of their client data is affected, but that still leaves a lot of data on...
View Article"Successful" Twitter malware proves it once more
Earlier this week new Twitter malware spread very quickly in the Twitter community. The malicious application tweeted two messages similar to the following to the infected users' followers: directly...
View ArticleLife after death - Online
The Christian Easter may be the appropriate time to bring up: What happens with my online presence when I die? This is a matter that I must (shamefully) admit I did not reflect upon until I earlier...
View ArticleZero Day - a review
For some strange reason Easter in Norway is traditionally the high season for reading crime and thrillers. One reason may be the need to fill several consecutive days away from work (the public...
View ArticleGuilty until proven innocent?
During the years, Norman has written several articles about the danger of using and having unsecured wireless networks. Some selected articles are at the end of this blog item. A news story from...
View ArticleScams utilizing Google Music beta
It is a fact that cybercriminals and other persons who attempt to trick you react quickly when a new product or service enter the market. The latest example shows that these individuals react even...
View ArticlePurchasing and downloading outdated software
Last week in the "JoshMeister On Security" blog, the topic was about Apple's Mac App Store, and the fact that software available from this store may not be the latest version. The blog's author -...
View ArticleThe 10 most insecure passcodes
Earlier this week I read an extremely interesting and impressing blog item by Daniel Amitay: Most Common iPhone Passcodes. Amitay has analyzed more than 200 000 passcodes used in an app with a similar...
View ArticleThe insecurity paradox
The formula here attempts to explain a paradox in security analysis: If it is true that security is only as strong as its weakest link, why are not those who use insecure passwords, skip installing...
View Article
More Pages to Explore .....