Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Fox Network with Security Hole
07/26/2007

Security analysts spotted a gaping security hole in Fox News Network Web site on Monday, revealing file directories and sensitive content, although it appears the problem has been fixed.


Several directories were visible on a server for Fox News that should normally not be accessible by a Web browser over the Internet. The Fox News site runs on the Apache Web server software on Ubuntu Linux.

Hackers Take Control of iPhone
07/25/2007

Hackers could take control of an iPhone if its owner visits a doctored Web site or Internet hotspot, security researchers reported Monday.


The vulnerability of the vaunted device, Apple Inc first cell phone, is only theoretical for now. There are no reports of criminals actually taking advantage of the security glitch to remotely access an iPhone.

But if it were exploited, hijacked iPhones could be very useful to the same gangs that take over personal computers and use them to disseminate spam, said Charlie Miller, principal security analyst at Independent Security Evaluators, which discovered the flaw.

complete article

New Mass Messaging Gateway Released
07/24/2007

Wireless messaging communication is important in todays fast paced environment. PageGate allows critical alerts to be sent instantly to wireless devices regardless of the recipient's locations. PageGate supports group messaging and preprogrammed alerts, so that with the press of a single button notification can be sent to defined groups of individuals.

To ensure delivery even in the event of connectivity loss, PageGate version 5 supports failover options and redundant connectors. Messages that cannot be delivered to their intended recipients can be automatically redirected to a backup recipient or group, or the message can be sent to the same recipient via an alternative delivery method.

Security Researchers
07/24/2007

For some security researchers who uncover flaws in leading computer programs, a nod of appreciation from software companies is no longer enough.

Now they want money.

Critics say the purity of research is in jeopardy as discoveries are shopped around instead of submitted directly to software vendors so they can quickly develop fixes.

Military Information Posted By Mistake
07/23/2007

In a survey of servers run by agencies or companies involved with the military and the wars in Iraq and Afghanistan, The Associated Press found dozens of documents that officials refused to release when asked directly, citing troop security. Such material goes online all the time, posted most often by mistake.

complete article

Web Shoppers are Cautious
07/22/2007

Today online shoppers may be more cautious than they were two years ago. Some are waiting up to 35 hours before completing a shopping cart transaction. A study of consumers Internet buying habits suggests that online merchants face stiffer competition and new hurdles in closing sales over the Web.

Mac OSX Worm
07/21/2007

The anonymous researcher who claims to have crafted a Mac OS X worm said Tuesday that he or she will report his findings to Apple Inc., but added that the Apple has a very long way to go on security.

Louisiana Opens Up Identity Theft
07/20/2007

It seems like a list without end -- thousands of student names, addresses, ZIP codes, birthdays -- and Social Security numbers.

In all, more than 80,000 names and Social Security numbers were accessible for perhaps as long as two years on an internal Internet site run by the Louisiana Board of Regents, the body that has oversight over the states institutions of higher education.

SpyWare Cracks Case
07/19/2007

The FBI used a novel type of remotely installed spyware last month to investigate who was e-mailing bomb threats to a high school near Olympia, Wash.

Federal agents obtained a court order on June 12 to send spyware called CIPAV to a MySpace account suspected of being used by the bomb-threat hoaxster. Once implanted, the software was designed to report back to the FBI with the Internet Protocol address of the suspect's computer, other information found on the PC and, notably, an ongoing log of the users outbound connections.

complete article

Teen Security
07/19/2007

Most teenagers are taking steps to protect themselves online from the most obvious areas of risk, according to the report. Many actively manage their personal information as they try to maintain important information confined to their network of trusted friends while at the same time creating content for their profiles and making new friends. The report indicates that most teens believe that some information should be shared while other information needs to be protected.

Google Security Acquisition
07/13/2007

Google said on Monday it has agreed to acquire e-mail security company Postini for $625 million expanding its package of online applications to compete with Microsoft Office software.

Wire Tapping Case Dismissed
07/12/2007

A U.S. appeals court has ordered that a lawsuit against the U.S. National Security Agency (NSA) for a wiretapping program be dismissed because the plaintiffs haven't been hurt by the agency's actions.

PHP Validation
07/11/2007

Test your PHP for security with PHP Validator.

Wireless Messaging and Security
07/10/2007

NotePage, Inc. is pleased to announce the release of PageGate version 5. PageGate is a complete wireless messaging solution that incorporates a wide variety of messaging protocols for sending messages to mobile phones, wireless devices, fax machines and pagers.

Wireless messaging communication is important in todays fast paced environment. PageGate allows critical alerts to be sent instantly to wireless devices regardless of the recipient's locations. PageGate supports group messaging and preprogrammed alerts, so that with the press of a single button notification can be sent to defined groups of individuals. .

To ensure delivery even in the event of connectivity loss, PageGate version 5 supports failover options and redundant connectors. Messages that cannot be delivered to their intended recipients can be automatically redirected to a backup recipient or group, or the message can be sent to the same recipient via an alternative delivery method.

Messages can be sent into PageGate via: a Windows client, web page, email, commandline, text file, serial port, modem, wireless modem, wireless phone or the Internet.

Rewards for Software Flaws
07/10/2007

Good news for hackers and software security experts.

Wabisabilabi, a Swiss security firm has created an online auction house called WabiSabiLabi to bring together people who can find loopholes in the software used by companies and can find a solution.

Many criminal hackers rely on loopholes in widely used software, usually Windows, to get access to the valuable information on computers.

Security researchers who find holes in such software can sell their findings to the highest bidder in this new online platform, said the online edition of BBC News.

Charities are a Security Check
07/09/2007

Internet security company Symantec claims that Internet fraudsters are donating money to charities as a way to check the validity of stolen credit cards prior to resale.

BPI Raids Honeywell
07/05/2007

The British Phonographic Industry (BPI) is investigating allegations of an extensive illegal music filesharing ring at a Honeywell plant in Scotland.

Investigators from the BPI raided the plant in Motherwell with police officers at 0840 BST yesterday morning.
The investigators made copies of the contents of computers for detailed forensic analysis.
Honeywell said that it was cooperating fully with both the police and the BPI over the investigation.
Legal boundaries

The BPI says the raid follows a two-month investigation prompted by a tip-off from a Honeywell employee.
The BPI said the information from the insider pointed to thousands of music files being shared illegally.

Suspicion Behind Russian Cyber Attacks
07/04/2007

A political battle is raging in Russian cyberspace. Opposition parties and independent media say murky forces have committed vast resources to hacking and crippling their Web sites in attacks similar to those that hit tech-savvy Estonia as the Baltic nation sparred with Russia over a Soviet war memorial.


While they offer no proof, the groups all point the finger at the Kremlin, calling the electronic siege an attempt to stifle Russia's last source of free, unfiltered information.

The victims, who range from liberal democrats to ultranationalists, allege their hacker adversaries hope to harass the opposition with the approach of parliamentary elections in December and presidential elections in next March.

Homeland Security Sponsors Conference
07/03/2007

The U.S. Department of Homeland security will host a invite-only conference  that will bring together security experts from law enforcement, Internet service providers, and the technology industry.


The Internet Security Operations and Intelligence (ISOI) workshop will be held on August 27 and 28 at the Academy for Educational Development in Washington D.C.

Online Safety Parent Handbook from WebRoot
07/03/2007

Free Security Report to help keep kids safe online, from Web Root. The Online Parent Safety Report contains a review and analysis of online habits of children, the risks and tips on how to keep kids safe online.

Cyber Bullying Laws
07/02/2007

South Korea on Thursday started enforcing a new law aimed at curbing the country's notorious cyber bullying by preventing Internet users from hiding behind false IDs.


Under the Internet real-name system, the country's major portals and news media websites will be compelled to record the real IDs of users when they post entries.

Portal operators will be obliged to disclose personal information such as names and addresses of cyber attackers when their victims want to sue them for libel or infringement upon privacy.

One Third of Teens Harassed Online
07/01/2007

Nearly a third of online teens say they have been harassed on the Internet, with girls and participants of social-networking sites more likely to be targets, a study finds.

RIM Promotes Security Concerns
06/28/2007

The manufacturer of BlackBerry smartphones has assured the French government that their products are not vulnerable to espionage.

Canadian phone maker RIM said after Frances national defense agency banned many government officials from using the devices for sensitive government purposes that the communications are protected by sophisticated encryption codes that would take billions of years to crack, The Times of London reported Wednesday.

More Funds for Security
06/27/2007

The US House of Representatives on Friday approved significant increases in funds next year for domestic security and veterans care in a challenge to President George W Bush's more limited budget requests.



Current Blog

2007 Security Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.