Norman Safeground Blogs

insight, opinion & information

 
 

For Consumption

Freshly served helpings of security information. tips, and best practices.

Latest Posts in For Consumption

Watch out for emails with “Order no.” in the subject

spam

Email providers like Google, Microsoft and Yahoo are normally quite good at filtering out emails that could compromise your internet security. Users of those services will never see the hundreds of SPAM emails they receive daily, because the above companies have become so good at finding and filtering malicious or … Read More

Warning: Service to check if your account has been hacked?

hacked

The people at Hold Security – the company who unveiled a huge hack of one billion user accounts – has released a service that allows people to check whether one of their online accounts has been hacked. But is this a good idea? The service – which is available for … Read More

How to avoid your own naked celebrity scandal

hacked

The shocking naked celebrity selfie leak – headlined by Jennifer Lawrence – has once again highlighted the importance of strong computer security, whether on your home computer or your smartphone. In the case of the explicit selfies, it’s believed that the sensitive photos were stolen from users’ backup accounts because … Read More

Map of pet cats raises privacy awareness

cat-hacked

Artist, teacher and cat-fanatic Owen Mundy has created the creepily-titled “I Know Where You Cat Lives” – iknowwhereyourcatlives.com – an online map of 1 million of the world’s cats. Its purpose is to raise awareness about how much data we accidentally share online. The website was created by scouring social … Read More

Biggest hack attacks in history

Adobe

Interactive graph of biggest hack attacks in history A new graph from Information is Beautiful demonstrates just how insecure the internet can be for users and companies, by displaying the biggest hacks in the history of the internet (click here to see the graph) The listed hacks are sorted by … Read More

In the news – car hacking, plane hacking and exploitable UEFI BIOS

Kristian Bognaes

In the News – August 2014 Kristian A. Bognaes, Director, Norman Safeground Development Center – I promised you some information from BlackHat in my previous entry – particularly concerning the possibility to infect and abuse automotive computer systems. That is one of my items this month. Cars and hacking The … Read More

What does Android malware do, and what should I look out for?

android-malware

Everyone knows that malware is bad, and that it can do bad things to your computer and mobile phone. Most users, however, are unsure of the consequences of infections. This means they underestimated the dangers and don’t know how to spot symptoms of an infection. We’ve put together a list … Read More

Securing your browser: Safari

safari-logo

Apple Mac users will be much more familiar with Safari – an internet browser – than Windows users. It’s the default option for getting on the internet on Apple computers, and therefore every Mac user has opened it at least once (I used it to download Chrome!). It’s generally considered … Read More

Are there safe alternatives to Google Play on Android?

android

If you have an Android mobile phone, you’ll want apps. From abacuses to zoology textbooks, there are over a million applications available for your smartphone, guaranteeing that at least a few of them will cater to your interests. However, just like on a computer, installing new software to your phone … Read More

Cryptolocker cure shows prevention is the best solution

cryptolocker-logo

For those of you who missed our previous articles about Cryptolocker, it’s a nasty virus that can permanently prevent you from accessing your files – unless you paid the criminal’s behind the malware a huge ransom. Since then – when we explained it was impossible to get your files back … Read More

 

For Consumption Bloggers

Norman Safeground Blogs Archive