Quantcast
Channel: Norman's security blog
Browsing all 20 articles
Browse latest View live

Forum Spam, a first-hand experience!!!

Besides working for Norman, I also act as the president of AMTSO, the Anti-Malware Testing Standards Organization. And of course Norman is also a member of AMTSO. If you like to know what AMTSO is all...

View Article



A more secure Facebook

A few months ago Norman published a security article about the tool Firesheep, an extension to Firefox, which enabled taking over another user's unsecured session with a web site. Social networks like...

View Article

IPcalypse happened: Will the Internet collapse? For $ale, my IPv4 number!!!

As I mentioned in my blog from 17 January "IPv4: IPcalypse", the available number of IPv4 addresses was reaching zero. That has happened, IANA Central Registry of IPv4 addreses is exhausted. Not on...

View Article

Kindly check the attached VALENTINE'S CARD coming from me

There are some (media) events, which inevitably inspire cybercriminals, for example: celebrity news disasters holidays / annual events The two former are difficult for the cybercriminals to prepare for...

View Article

Random or personal Google ads? Your choice!

A few weeks ago, Norman published a security article about whether personalized web advertisements are good or bad. Several proposals for opting-out of personalized advertisements were discussed....

View Article


Domain name scam relived: AsiaGov

Two years ago a wrote a series of blogs on Domain Name Scammers trying to sell Norman domains we did not want and were “claimed” by “unknown” people. But if we reacted promptly, although they use a...

View Article

Google uses 'the kill switch' to remove downloaded malware

In Norman's yearly summary of security incidents, we also attempt to look into our crystal ball to predict what will happen in the year to come. One of the forecasts made in our 2010 summary was: More...

View Article

Fake security program... for Android

Earlier this week I wrote about the malicious Android apps that Google had removed from users' devices. As another part of Google's cleaning-up procedures, the company pushed a security application to...

View Article


Damage caused by internet banking fraud quintuples... What’s next?

It is not a surprise, more and more people are banking online and thus cybercriminals move more and more into that region. Banking fraud on the internet is not new. It has been existing for a few years...

View Article


.XXX top level domain approved

My blog item 29 June last year, was titled Red Light District on the Internet. This was about the fact that The Internet Corporation for Assigned Names and Numbers (ICANN), had taken a major step in...

View Article

666.624 IPv4 addresses sold for $7.5M to Microsoft

Don’t you love it when your predictions come true… On 3 February 2011 I wrote a blog item “IPcalypse happened: Will the Internet collapse? For $ale, my IPv4 number!!!” In that blog I wrote “Another...

View Article

To the Millions and Millions of people… How not to warn the Millions!

Last week, a data breach at Epsilon has put millions of e-mail addresses and names on the street. According to Epsilon, only 2% of their client data is affected, but that still leaves a lot of data on...

View Article

"Successful" Twitter malware proves it once more

Earlier this week new Twitter malware spread very quickly in the Twitter community. The malicious application tweeted two messages similar to the following to the infected users' followers: directly...

View Article


Life after death - Online

The Christian Easter may be the appropriate time to bring up: What happens with my online presence when I die? This is a matter that I must (shamefully) admit I did not reflect upon until I earlier...

View Article

Zero Day - a review

For some strange reason Easter in Norway is traditionally the high season for reading crime and thrillers. One reason may be the need to fill several consecutive days away from work (the public...

View Article


Guilty until proven innocent?

During the years, Norman has written several articles about the danger of using and having unsecured wireless networks. Some selected articles are at the end of this blog item. A news story from...

View Article

Scams utilizing Google Music beta

It is a fact that cybercriminals and other persons who attempt to trick you react quickly when a new product or service enter the market. The latest example shows that these individuals react even...

View Article


Purchasing and downloading outdated software

Last week in the "JoshMeister On Security" blog, the topic was about Apple's Mac App Store, and the fact that software available from this store may not be the latest version. The blog's author -...

View Article

The 10 most insecure passcodes

Earlier this week I read an extremely interesting and impressing blog item by Daniel Amitay: Most Common iPhone Passcodes. Amitay has analyzed more than 200 000 passcodes used in an app with a similar...

View Article

The insecurity paradox

The formula here attempts to explain a paradox in security analysis: If it is true that security is only as strong as its weakest link, why are not those who use insecure passwords, skip installing...

View Article
Browsing all 20 articles
Browse latest View live




Latest Images