Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Security and Porn Do Not Mix
07/30/2010

A federal investigation has accused dozens of military officials and defense contractors, including some with top-level security clearances, of buying and downloading child pornography on private or government computers.

The Pentagon on Friday released investigative reports spanning almost a decade that implicated people working with agencies handling some of the nation‚€™s most closely guarded secrets, including the National Security Agency.

Defense workers who bought child pornography put the Department of Defense, the military and national security at risk by compromising computer systems, military installations and security clearances, a 2007 investigative report said.

Israel and Palestine Security
07/29/2010

The Middle East peace process may be stagnate but Palestinian security forces have brought real peace to areas under their control ‚€“ so much so that Israel is now likely to allow Jewish Israeli civilians to enter Palestinian towns long forbidden to them, and may even allow Palestinian security forces to operate inside Israeli-controlled areas.

Wikileaks Security Concerns
07/28/2010

The United States has condemned as irresponsible the leak of 90,000 military records, saying publication could threaten national security.

The documents released by the Wikileaks website include details of killings of Afghan civilians unreported until now.

Three news organisations had advance access to the records, which also show Nato concerns that Pakistan and Iran are helping the Taliban in Afghanistan.

Blackberry Security Concerns
07/27/2010

The UAE says BlackBerry smartphones operate outside of existing national security legislation, raising questions about the devices' legality in the Mideast business hub.

The countrys Telecommunications Regulatory Authority said in a statement carried late Sunday on state news agency WAM that BlackBerry applications allow people to misuse the service.
It says this can cause serious social, judicial and national security repercussions.

Borders are a Security Issue
07/17/2010

There should be unprecedented outrage about the federal government filing suit against Arizona's law to protect it's citizens from the flow of criminals crossing from Mexico into the state.

This step was only taken because the President Obama has failed to enforce the laws or to adequately secure our border. This is not just an immigration issue. It is a security issue that affects the entire country.

Cloud Security
07/16/2010

Some IT execs dismiss public cloud services as being too insecure to trust with critical or sensitive application workloads and data. But not Doug Menefee, CIO of Schumacher Group, an emergency management firm in Lafayette, La.

Of course there's risk associated with using cloud services ‚€“ theres risk associated with everything you do, whether you are walking down the street or deploying an e-mail solution out there. You have to weigh business benefits against those risks, he says.

Apple Security
07/15/2010

Apple surprisingly ranked first in the security firm Secunias vulnerability tracking report covering the first half of 2010, as reported in the UK-based technology paper, The Register.

Blackberry Protect
07/14/2010

BlackBerry-maker Research In Motion RIM today took the wraps off its latest offering for consumers, BlackBerry Protect, a free service meant to help non-corporate BlackBerry users secure and manage their smartphones.

Pakistan Security Concerns
07/14/2010

The United States and its allies have plenty to worry about in Afghanistan and Pakistan, with al Qaeda, two Talibans, the Haqqani Network and a plethora of other militant groups active. But the United States and intelligence analysts believe another group, one of Pakistans most powerful and well-established, is also broadening its horizons.

Security Risks Online
07/13/2010

In a time when everyone is managing and controlling much of their life from a smart phone or laptop, consumers should be more aware of the security risks accompanying such conveniences. Often times, many of the devices people use are connected on a single network. It is important to realize that the infrastructure these networks rely on is often full of holes.

Kyle Flaherty, director of marketing at BreakingPoint Systems, an Austin-based cyber security product developer, explains that consumers should hold vendors and services such as Twitter or Amazon accountable for their security infrastructure. Flaherty reiterates the fact that there is not any security assurance paired with network or data center equipment. This includes everything from routers for at-home networks to corporate and social media networks.

Twilight Security
07/12/2010

Concertgoers can expect more security personnel and other changes after a larger-than-expected crowd at the summers first Twilight event in Salt Lake City.

Police estimate 40,000 people jammed Pioneer Park on Thursday night for the concert by the band Modest Mouse, about 10,000 more than expected.

Twitter and FTC
07/11/2010

Twitter has settled charges brought by the Federal Trade Commission that it deceived consumers by allowing hackers to obtain administrative control over Twitter because of loose security.

The FTC said Thursday that the popular social networking site allowed hackers in 2009 to obtain tweets, the 140-character micro-blogs users sent out, that were designated private and send out phony tweets pretending to be from then-President elect Barack Obama and Fox News, among others.

MI5 and Russian Spies
07/10/2010

MI5 is investigating whether the Russian intelligence service channelled money into Britain to fund several spy sleeper cells.

The Security Service is exploring the sources of funding secured by Anna Chapman, 28, an alleged Russian spy arrested in the US last week who spent five years in London.

MI5 is looking at whether Mrs Chapman was able to use Moscows money to recruit sleeper agents during the five years she spent in London.

iTunes Hacking
07/09/2010

Earlier this weekend, reports emerged that a third-party developer had hacked into peoples App Store and iTunes accounts in order to boost sales of their e-books (a somewhat strange target considering how low e-book sales are through these channels).

Security and Geology
07/08/2010

An American geologist held and tortured by Chinas state security agents was sentenced to eight years in prison Monday for gathering data on the Chinese oil industry in a case that highlights the governments use of vague secrets laws to restrict business information.

Security of Medical Devices
07/07/2010

No one can turn the clock back to the days before the Tylenol killer laced bottles of the pain reliever with cyanide and changed drug packaging forever. But computer scientists and a prominent Boston cardiologist warn that medical devices may also be vulnerable to the kind of attacks that once seemed inconceivable.

Pacemakers, which keep hearts beating properly, and infusion pumps, which control diabetes, also connect patients to doctors by sending vital health data through wireless connections to allow regular monitoring and make programming adjustments possible. Those very communication channels may be susceptible to intrusion, exposing private information or even becoming avenues for interference with life-saving therapies, according to members of the Medical Device Security Center.

Homeland Security Seizes Control Of Oil Spill
07/06/2010

The Department of Homeland Security has seized control over a joint BP oil spill website, previously managed by several US Government agencies and BP and intended to inform the public about the progress made in the cleanup effort.

Twitter and FTC Agreement
07/05/2010

US regulator FTC and Twitter have agreed to settle charges that the micro-blogging site failed to safeguard personal information of millions of its users.

The Federal Trade Commission, which mainly looks into anti-competitive practices, had accused Twitter of serious lapses in its data security that allowed hackers to access non-public user information, among other things.

Happy Fourth of July
07/04/2010

Happy Fourth of July! And thank you to the US Military.

Banning Soldiers from Blogging in China
07/03/2010

China has issued regulations banning its 2.3 million soldiers from creating web sites or writing web blogs, adding to the nation's existing Internet curbs, state press said Saturday.

Online Disclosure
07/03/2010

In the murky world of the Internet, how do you ever really know who you are talking to, who you're buying from or if your bank can actually tell it is you when you log in to pay a bill?

Amid growing instances of identity theft, bank account breaches and sophisticated Internet scams, the government is looking for ways to make those transactions in cyberspace more secure.

But officials must tread carefully, as efforts to create identity cards, personal certificates or other systems of identifiers raise privacy worries and fears of Big Brother tracking its citizens online.

In a draft plan released Friday, the White House laid out an argument for a yet-undeveloped, voluntary identification system and set up a website to gather input from experts and everyday Internet users on how it should be structured.

The website was already getting votes, snipes and suggestions Friday afternoon ‚€” underscoring the incendiary nature of any discussion of Internet regulation.

Government Crackdown on Piracy
07/02/2010

U.S. President Barack Obamas administration will seek to aggressively enforce its intellectual property laws by putting pressure on countries that do not shut down piracy Web sites and by requiring all government contractors to check for illegal software, the White House announced.

The White House Office of the U.S. Intellectual Property Enforcement Coordinator, in a 65-page report released Tuesday, said the U.S. government will also step up its efforts to identify foreign Web sites trafficking in pirated goods and will create a database of intellectual property investigations to be shared among law enforcement agencies.

The U.S. government will also seek to protect U.S. intellectual property (IP) through trade agreements, including the controversial Anti-Counterfeiting Trade Agreement, the report said. Several digital rights groups have complained that officials from the U.S. and other countries have drafted ACTA in secret.

NATO in Afghanistan
07/01/2010

Intensified military operations against the Taliban are behind a surge in troop deaths in Afghanistan, NATO said Sunday, as the alliance announced the 93rd fatality in a record month for casualties.

Security Poll
06/28/2010

The survey explored the security implications of social networking and the use of personal devices in the enterprise. The survey polled 500 IT security professionals across the United States, Germany, Japan, China and India and came up with findings that are striking but neither unexpected nor unanticipated.

While announcing the result of the survey, Cisco informed that the results illustrate that the consumer influence on enterprise IT is growing and that more employees are bringing personal devices and applications into the network. This is serious because on the one hand, it is opening up new business opportunities and on the other hand it is throwing open new security challenges.

The survey took a close scrutiny of the changing enterprise security landscape that is being shaped up by the evolving requirements of todays borderless networks. The survey also examined the benefits and drawbacks of accommodating an increasingly mobile workforce, and the challenges of protecting sensitive and proprietary data, as part of the changing enterprise security scenario.

ATM Security Flaws
06/30/2010

A security expert has identified flaws in the design of some automated teller machines that make them vulnerable to hackers, who could make the ubiquitous cash dispensers spit out their cash holdings.

CyberSecurity
06/29/2010

The Homeland Security and Governmental Affairs Committee yesterday unanimously approved a major cybersecurity legislation that would structure how the federal government protects public and private sector cyber networks.

Crafted by Ranking Member Susan Collins and Sens. Joe Lieberman and Tom Carper, the Protecting Cyberspace as a National Asset Act of 2010 calls for the creation of a White House Office of Cyberspace Policy to spearhead federal and private sector efforts to secure critical cyber networks and assets. The office would be headed by a Senate-confirmed director who would be accountable to the public. The bill also creates a new center within the Department of Homeland Security to adopt cybersecurity policies related to federal and private sector networks.

Poll of IT Security Professionals with Suprising Results
06/28/2010

People who work for big companies are consistently ignoring the security policies of their employers to use banned social networking apps and their own phones and computers at work.

This is the headline finding of a poll of 500 IT security professionals conducted by Cisco. Some 68 per cent of the respondents know their employees use unsupported social networking applications.



Current Blog

2010 Securty Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.