Security
Port
A Security Port Blog
Fox
Network with Security Hole |
07/26/2007 | |
Security analysts spotted a gaping
security hole in Fox News Network Web site on Monday,
revealing file directories and sensitive content,
although it appears the problem has been fixed.
Several directories were visible on a server
for Fox News that should normally not be accessible by a
Web browser over the Internet. The Fox News site runs on
the Apache Web server software on Ubuntu Linux.
|
Hackers Take Control of iPhone |
07/25/2007 | |
Hackers could take control of an iPhone if
its owner visits a doctored Web site or Internet
hotspot, security researchers reported Monday.
The vulnerability of the vaunted device,
Apple Inc first cell phone, is only theoretical for now.
There are no reports of criminals actually taking
advantage of the security glitch to remotely access an
iPhone.
But if it were exploited, hijacked
iPhones could be very useful to the same gangs that take
over personal computers and use them to disseminate
spam, said Charlie Miller, principal security analyst at
Independent Security Evaluators, which discovered the
flaw.
complete article
|
New
Mass Messaging Gateway Released |
07/24/2007 | |
Wireless messaging communication is
important in todays fast paced environment. PageGate allows critical alerts to be
sent instantly to wireless devices regardless of the
recipient's locations. PageGate supports group messaging
and preprogrammed alerts, so that with the press of a
single button notification can be sent to defined groups
of individuals.
To ensure delivery even in the
event of connectivity loss, PageGate version 5 supports failover
options and redundant connectors. Messages that cannot
be delivered to their intended recipients can be
automatically redirected to a backup recipient or group,
or the message can be sent to the same recipient via an
alternative delivery method.
|
Security Researchers |
07/24/2007 | |
For some security researchers who uncover
flaws in leading computer programs, a nod of
appreciation from software companies is no longer
enough.
Now they want money.
Critics say
the purity of research is in jeopardy as discoveries are
shopped around instead of submitted directly to software
vendors so they can quickly develop fixes.
|
Military Information Posted By
Mistake |
07/23/2007 | |
In a survey of servers run by agencies or
companies involved with the military and the wars in
Iraq and Afghanistan, The Associated Press found dozens
of documents that officials refused to release when
asked directly, citing troop security. Such material
goes online all the time, posted most often by
mistake.
complete article
|
Web
Shoppers are Cautious |
07/22/2007 | |
Today online shoppers may be more cautious
than they were two years ago. Some are waiting up to 35
hours before completing a shopping cart transaction. A
study of consumers Internet buying habits suggests that
online merchants face stiffer competition and new
hurdles in closing sales over the Web.
|
|
The anonymous researcher who claims to
have crafted a Mac OS X worm said Tuesday that he or she
will report his findings to Apple Inc., but added that
the Apple has a very long way to go on security.
|
Louisiana Opens Up Identity
Theft |
07/20/2007 | |
It seems like a list without end --
thousands of student names, addresses, ZIP codes,
birthdays -- and Social Security numbers.
In
all, more than 80,000 names and Social Security numbers
were accessible for perhaps as long as two years on an
internal Internet site run by the Louisiana Board of
Regents, the body that has oversight over the states
institutions of higher education.
|
SpyWare Cracks Case |
07/19/2007 | |
The FBI used a novel type of remotely
installed spyware last month to investigate who was
e-mailing bomb threats to a high school near Olympia,
Wash.
Federal agents obtained a court order on
June 12 to send spyware called CIPAV to a MySpace
account suspected of being used by the bomb-threat
hoaxster. Once implanted, the software was designed to
report back to the FBI with the Internet Protocol
address of the suspect's computer, other information
found on the PC and, notably, an ongoing log of the
users outbound connections.
complete article
|
|
Most teenagers are taking steps to protect
themselves online from the most obvious areas of risk,
according to the report. Many actively manage their
personal information as they try to maintain important
information confined to their network of trusted friends
while at the same time creating content for their
profiles and making new friends. The report indicates
that most teens believe that some information should be
shared while other information needs to be protected.
|
Google Security Acquisition |
07/13/2007 | |
Google said on Monday it has agreed to
acquire e-mail security company Postini for $625 million
expanding its package of online applications to compete
with Microsoft Office software. |
Wire
Tapping Case Dismissed |
07/12/2007 | |
A U.S. appeals court has ordered that a
lawsuit against the U.S. National Security Agency (NSA)
for a wiretapping program be dismissed because the
plaintiffs haven't been hurt by the agency's actions.
|
PHP
Validation |
07/11/2007 | |
Test your PHP for security with PHP Validator.
|
Wireless Messaging and
Security |
07/10/2007 | |
NotePage, Inc. is pleased to announce the
release of PageGate version 5. PageGate is a
complete wireless messaging solution that incorporates a
wide variety of messaging protocols for sending messages
to mobile phones, wireless devices, fax machines and
pagers.
Wireless messaging communication is
important in todays fast paced environment. PageGate
allows critical alerts to be sent instantly to wireless
devices regardless of the recipient's locations.
PageGate supports group messaging and preprogrammed
alerts, so that with the press of a single button
notification can be sent to defined groups of
individuals. .
To ensure delivery even in the
event of connectivity loss, PageGate version 5 supports
failover options and redundant connectors. Messages that
cannot be delivered to their intended recipients can be
automatically redirected to a backup recipient or group,
or the message can be sent to the same recipient via an
alternative delivery method.
Messages can be
sent into PageGate via: a Windows client, web page,
email, commandline, text file, serial port, modem,
wireless modem, wireless phone or the
Internet.
|
Rewards for Software Flaws |
07/10/2007 | |
Good news for hackers and software
security experts.
Wabisabilabi, a Swiss security
firm has created an online auction house called
WabiSabiLabi to bring together people who can
find loopholes in the software used by companies and can
find a solution.
Many criminal hackers rely on
loopholes in widely used software, usually Windows, to
get access to the valuable information on
computers.
Security researchers who find holes in
such software can sell their findings to the highest
bidder in this new online platform, said the online
edition of BBC News.
|
Charities are a Security Check |
07/09/2007 | |
Internet security company Symantec claims
that Internet fraudsters are donating money to charities
as a way to check the validity of stolen credit cards
prior to resale.
|
BPI
Raids Honeywell |
07/05/2007 | |
The British Phonographic Industry (BPI) is
investigating allegations of an extensive illegal music
filesharing ring at a Honeywell plant in Scotland.
Investigators from the BPI raided the plant in
Motherwell with police officers at 0840 BST yesterday
morning. The investigators made copies of the
contents of computers for detailed forensic analysis.
Honeywell said that it was cooperating fully with
both the police and the BPI over the investigation.
Legal boundaries
The BPI says the raid
follows a two-month investigation prompted by a tip-off
from a Honeywell employee. The BPI said the
information from the insider pointed to thousands of
music files being shared illegally.
|
Suspicion Behind Russian Cyber
Attacks |
07/04/2007 | |
A political battle is raging in Russian
cyberspace. Opposition parties and independent media say
murky forces have committed vast resources to hacking
and crippling their Web sites in attacks similar to
those that hit tech-savvy Estonia as the Baltic nation
sparred with Russia over a Soviet war memorial.
While they offer no proof, the groups all
point the finger at the Kremlin, calling the electronic
siege an attempt to stifle Russia's last source of free,
unfiltered information.
The victims, who range
from liberal democrats to ultranationalists, allege
their hacker adversaries hope to harass the opposition
with the approach of parliamentary elections in December
and presidential elections in next March.
|
Homeland Security Sponsors
Conference |
07/03/2007 | |
The U.S. Department of Homeland security
will host a invite-only conference that will
bring together security experts from law enforcement,
Internet service providers, and the technology
industry.
The Internet Security Operations
and Intelligence (ISOI) workshop will be held on August
27 and 28 at the Academy for Educational Development in
Washington D.C. |
Online Safety Parent Handbook from
WebRoot |
07/03/2007 | |
Free Security Report to help keep kids
safe online, from Web Root. The Online Parent Safety
Report contains a review and analysis of online habits
of children, the risks and tips on how to keep kids safe
online. |
Cyber Bullying Laws |
07/02/2007 | |
South Korea on Thursday started enforcing
a new law aimed at curbing the country's notorious cyber
bullying by preventing Internet users from hiding behind
false IDs.
Under the Internet real-name
system, the country's major portals and news media
websites will be compelled to record the real IDs of
users when they post entries.
Portal operators
will be obliged to disclose personal information such as
names and addresses of cyber attackers when their
victims want to sue them for libel or infringement upon
privacy. |
One
Third of Teens Harassed Online |
07/01/2007 | |
Nearly a third of online teens say they
have been harassed on the Internet, with girls and
participants of social-networking sites more likely to
be targets, a study finds. |
RIM
Promotes Security Concerns |
06/28/2007 | |
The manufacturer of BlackBerry smartphones
has assured the French government that their products
are not vulnerable to espionage.
Canadian phone
maker RIM said after Frances national defense agency
banned many government officials from using the devices
for sensitive government purposes that the
communications are protected by sophisticated encryption
codes that would take billions of years to crack, The
Times of London reported Wednesday.
|
More
Funds for Security |
06/27/2007 | |
The US House of Representatives on Friday
approved significant increases in funds next year for
domestic security and veterans care in a challenge to
President George W Bush's more limited budget requests.
|
Current Blog
2007 Security Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
2006 Security Blog Archive
December
Archive
November Archive
October Archive
September
Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
| |
 |

Security Alerts
Locate security alerts, and security feeds via a security rss feed
directory.
|