Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Caribbean Cyber Security
03/31/2012

Most Caribbean governments and companies have yet to take seriously the threat posed by cyber attack. This is despite signs that the region is not immune to the actions of those who use the Internet to breach national security, undertake criminal activity or behave maliciously.

Education Linked to Security
03/30/2012

The nations security and economic prosperity are at risk if Americas schools do not improve, warns a task force led by former Secretary of State Condoleezza Rice and Joel Klein, the former chancellor of New York Citys school system.

Smart Phone Identity Theft
03/29/2012

Some 7% of smartphone owners became identity-fraud victims in 2011, the Javelin survey of 5,000 consumers found. Smartphone users are about one-third more likely to fall prey to identity fraud than the general public, the report found.

Why? Because smartphones are minicomputers that store vast quantities of personal information, yet many users do not protect their smartphones the way they do laptops and PCs.

Verizon Breaches
03/28/2012

Out of 855 breaches investigated by Verizon, it was reported that hacktivism was responsible for the disclosure of 58% of the confidential information.  This information is typically posted publicly in order to embarrass companies and is quickly scraped and used by online criminals  and abused.

Android Security
03/27/2012

Some skeptics say Android security software makers overhype threats to scare smartphone users into buying their products. While that may be true, the Android security threat is very real, and users should protect themselves in any way that they can.

Spidering Websites
03/26/2012

Website Spidering refers to the automated process of indexing a web site by a search engine. An automated program, known as a web crawler or spider, will go through a website following the links on each page, and will gather pertinent information from each page until it has properly indexed the entire website.

Spidering Websites

Cyber Fraud
03/25/2012

Internet security experts have set up a system to alert Americans when sensitive personal information such as social security numbers and online banking log-in credentials turn up in the hands of cyber fraudsters.

Security for Elderly
03/24/2012

Transportation Security Administration said it will test letting older airline passengers keep their shoes and jackets on when going through security.

The changes, which go into effect Monday at four airports, will reduce but not eliminate the possibility of pat-downs for air travelers who are at least 75 years old, USA Today reported.

Dell Entering Security World
03/23/2012

Dell said Tuesday that it had agreed to buy SonicWall, a privately held provider of data security measures for businesses, to continue expanding its corporate services offerings.

The purchase price was undisclosed, but a person briefed on the matter told DealBook that Dell paid about $1.25 billion, including the assumption of SonicWalls debt.

Food Security
03/23/2012

Politicians like to treat food security as a straightforward issue — if the country grows its own food, then we are better off economically. But the matter is much more complex. If local food is more expensive to produce and purchase than the imported equivalent, then the ordinary citizen is worse off.

Defense Contractors
03/22/2012

The Defense Department is bracing for billions of dollars in budget cuts — and that has defense contractors looking for new markets. Homeland Security is one of the most promising, particularly border security, which has not suffered any big cuts. So companies are lining up in hopes of landing a contract.

TSA Security
03/21/2012

Traveling through an airport has become a much more tedious experience in recent years due to the higher levels of security put in place. You have to wait in long queues, then remove your shoes, anything from your pockets, your belt, your laptop from its bag, and agree to get zapped with radiation in a scanner or have an intimate body search performed.

Most of us accept the inconvenience in the name of safer travel, but it looks as though even the TSA has realized none of us enjoy the experience. Their solution is not to speed things up or reduce the checks, though. Instead, the TSA will gladly accept a one-off payment of $100 from you to bypass security checks almost completely.

No Guarentees
03/22/2012

This is a very critical time with the Iranian nuclear program. The threat is growing but it is not imminent. Yet, it is becoming increasingly clear that Israel will strike Irans nuclear facilities in 2012. While Israel has the right to self defense if it can prove its security is at risk, it does not have the right to start a regional war and drag the U.S. in, or compromise the U.S. economic recovery if there is no hard evidence that Israel needed to defend itself.

First, it is clear that Iran is inviting disaster on itself. Irans lack of transparency, its saber rattling and hostility to the region, Israel, the U.S. and the world economy all contribute to a sense that military force is necessary to stop what might be a nuclear weapons program. But military force might be what Iran's leaders see as necessary to get what they want.

Information Requests
03/20/2012

Federal agencies did better last year trying to fulfill requests, but still fell further behind with backlogs, due mostly to surges in immigration records requested from the Homeland Security Department. It released all or portions of the information that citizens, journalists, businesses and others sought — and outright rejected other requests — at about the same rate as the previous two years. The AP analyzed figures over the last three years from 37 of the largest federal departments and agencies.

There was progress: The government responded to more requests than ever in 2011 — more than 576,000 — a 5 percent increase from the year before. Offices less frequently cited legal provisions that allow them to keep records secret, especially emails and documents describing how federal officials make important decisions. Agencies took less time, on average, to turn over records: about one month for requests it considered simple and about three months for more complicated requests. And 23 of 37 agencies reduced their individual backlogs of requests or kept buildups from increasing.

Private Security
03/19/2012

An Afghan government plan to abolish private security companies at the end of this month, along with the outbreak of anti-American demonstrations and attacks in the past month, has left the private groups that carry out most of the American-financed development work in Afghanistan scrambling to sort out their operations, imperiling billions of dollars in projects, officials say.

Anonymous Attack
03/18/2012

Anonymous hacktivists announced via Twitter that they had successfully hacked the website of New York Iron Works, a police-equipment supplier, and replaced the homepage with a tribute of love to arrested hacker and Chicagoan Jeremy Hammond. Anonymous also claimed responsibility for several other hacks on March 8, including knocking Peruvian government website http://policiainformatica.gob.pe/ offline, and posting the personal information of FBI agents in a public online message board in what they called Operation Piggy Bank.

Security Breach
03/17/2012

Spanish security firm Panda Labs found its website hacked by a spinoff of notorious hacker group Anonymous -- a clear retaliation against the sweeping arrests and indictments of the LulzSec group, first reported on FoxNews.com.

The names and e-mail addresses of Panda Security employees were posted on the website late Tuesday, along with a video detailing some of the hacking highlights of LulzSec, PC World reported, and a rant ultimately stating the group planned to continue its exploits.

Controversial Communities Program
03/16/2012

Homeland Security Secretary Janet Napolitano defended the budgetary request to complete the enlargement of the controversial Secure Communities program as part of smart and effective enforcement of U.S. immigration laws.

She outlined Department of Homeland Security priorities for the 2013 fiscal year during an appearance before the Senate Appropriations Subcommittee on Homeland Security.

Cyber 9-11
03/16/2012

Could the next devastating terrorist attack on the United States be unleashed from cyberspace? Sen. Joe Lieberman is convinced it could. He is working to make his last great legislative victory the approval of the Cybersecurity Act of 2012, which he says could prevent a cyber 9-11. He chairs the Homeland Security and Governmental Affairs Committee.

Chinese Foreign Policy
03/15/2012

The Syrian Crisis has ironically brought out a much more internationally engaged China than witnessed in the past.

Despite preaching non-interference, Chinas recent approach towards Syria shows a slight shift in Chinese foreign policy. A series of important diplomatic actions show China moving away from its traditional isolationist stance towards a behavior of more determined international engagement.

Super Secure Blackberry
03/15/2012

The National Security Agency has designed and built a series of Android phones intended to provide communications security for U.S. government staff. The phones were designed by the agencys Information Assurance Directorate, which is responsible maintaining the U.S. government’s secure communications channels.

According to a report in SC Magazine, the agencys goal was to create phones that were secure enough to meet the NSAs stringent security standards, cheap enough to be produced in large enough quantities, and easy for government personnel to use. The phones are made with commercial components and run a heavily doctored version of Android 2.2. The phones are locked down tightly, and only applications from the Defence Information Systems Agencys own app store can be installed.

Wikileaks Leaking More Secure Information
03/14/2012

The anti-secrecy group WikiLeaks said it would begin publishing more than five million emails on Monday from a US-based global security think tank, apparently obtained by hackers.

Chrome Determined Best Browser for Security
03/13/2012

Speaking at the RSA Conference in San Francisco yesterday, researchers at Accuvant Labs presented the results of a three-month security evaluation of Mozilla Firefox, Google Chrome, and Microsoft Internet Explorer. The goal of the study was to determine which browser is the most secure against attack -- an important consideration, given that browsers continue to represent the widest vector for attacks.

The winner: Chrome.

Cyberterrorism
03/12/2012

Concern about cyberterrorism was evident this week among security experts at the RSA security conference in San Francisco, who find that some people with extremist views have the technical knowledge that could be used to hack into systems.

Cyberterrorism does not exist currently in a serious form, but some individuals with extremist views have displayed a significant level of knowledge of hacking, so the threat shouldn't be underestimated, said F-Secure's chief research officer Mikko Hypponen on Thursday at the RSA security conference in San Francisco .

Government Tracking Keywords
03/11/2012

Next time you write about an infection, cooking, pork, sitting at the airport or subway, or even mention social media, know there s a chance the Department of Homeland Security will scan the tweet or Facebook comment.

The Electronic Privacy Information Center  just released DHS internal documents about the surveillance of social media and the information collected daily. EPIC gained access to the documents with a lawsuit, pushing the Freedom of Information Act.

The documents included hundreds of keywords that the government tracks.

NASA Security
03/10/2012

In a written briefing to Congress this week, NASA Inspector General Paul Martin gave details of the 5,408 security lapses which occured at the space agency in 2010 and 2011. Some were small, some were medium, some were nascent diplomatic incidents which resulted in arrests across international borders.

Homeland Security Watching Occupy WallStreet
03/09/2012

As Occupy Wall Street spread across the nation last fall, sparking protests in more than 70 cities, the Department of Homeland Security began keeping tabs on the movement. An internal DHS report entitled SPECIAL COVERAGE: Occupy Wall Street, dated October of last year, opens with the observation that mass gatherings associated with public protest movements can have disruptive effects on transportation, commercial, and government services, especially when staged in major metropolitan areas. While acknowledging the overwhelmingly peaceful nature of OWS, the report notes darkly that large scale demonstrations also carry the potential for violence, presenting a significant challenge for law enforcement.

Android Vulnerabilities
03/08/2012

It is not just Apple. Photos are vulnerable on Android phones, too.

Developers who make applications for Apple mobile devices have access to a person's entire photo library as long as that person allows the app to use location data, as was reported this week.

It turns out that Google, maker of the Android mobile operating system, takes things one step further.

By design, Android apps do not need permission to get a users photos. And as long as an app has the right to send data over the internet, it can copy those photos to a remote server without any notice, according to developers and mobile security experts. It is not clear whether any apps that are offered for Android devices are actually doing this.

Hackers are Winning
03/07/2012

Even teenagers can defeat U.S. network security

Will the U.S. government ever step up to the plate and properly defend the nation in cyberspace?  

Government Has Already Flunked the Cybersecurity Test

That is the pressing question as Democrats and Republicans in the U.S. Senate bicker over a pair of proposals designed to offer some improvements to the nations overall extremely poor state of cybersecurity.

RSA Conference
03/06/2012

The annual RSA Conference, which draws to a close on Friday, brought a record crowd of more than 20,000 as Congress weighs new legislation aimed at better protecting U.S. companies from cyber attacks by spies, criminals and activists.

If the bills suggest that hackers are so far having their way with all manner of companies, the procession of speakers brought it home in a personal way.

Security Industry is Unsecure
03/05/2012

Every year, security vendors gather at the RSA conference here to reaffirm their commitment to fencing out hackers and keeping data safe. And every year, corporate and government Web sites continue to fall victim to basic attacks. Heck, ubersecurity firm RSA itself was compromised not that long ago, as was digital certificate heavyweight VeriSign, even if it did not admit it for two years.



Current Blog

2012 Security Blog Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.