Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Microsoft Rewards Innovative Hacking
07/30/2012

At the 2011 Black Hat conference Microsoft announced the BlueHat Prize, a contest designed to motivate development of innovative solutions intended to address serious computer security threats. Entrants had months to prepare and submit their research; the judges narrowed those down to three nominees. Last night at a packed Researcher Appreciation Party Microsoft announced the results.
All three of the nominees devised techniques for dealing with the insidious problem of ROP - Return Oriented Programming. ROP is a tough concept to explain.

Malware writers know they will encounter resistance if they try to insert malicious code into a computer that is protected by an antivirus. So instead of sending their own code, they find bits and pieces of existing code that they can assemble into a threat. No code enters the victim system, just a list of addresses, so it is hard to detect.

Tense Talk with Middleast
07/29/2012

Tensions flared between the United States and Pakistan on Friday, as two top officials traded accusations of doing too little to combat Taliban sanctuaries in Afghanistan and Pakistan.

Pakistani officials have long faced criticism from Americans and Afghans for what they say is their failure to stop militant assaults originating from safe havens in Pakistan, often with the complicity of Pakistans main spy agency, the Inter-Services Intelligence directorate.

But in the past several months, Pakistani officials have started accusing American and allied officials of the same problem coming from Afghanistan.

Security Keynote Fell Flat
07/28/2012

A former FBI officials keynote at the Black Hat security conference got a chilly reception Thursday from security experts who bristled at his call for business to do more to help the government defend against cyber attacks.

Shawn Henry, former FBI executive assistant director in charge of cyber-investigations, said businesses needed to step up in helping defend government and corporate networks against hackers and spies trying to steal intellectual property and government documents.

The comments from the ex-government cop-turned-security-vendor was met with only polite applause, an indication that the speech failed to spark the patriotic spirit among attendees of the Las Vegas conference.

Security Services Confident for Games
07/24/2012

MI5, the domestic security service, remains quietly confident that the Olympics will not be blighted by terrorism, despite organisers 11th-hour scramble to recruit enough guards to secure games venues.
For many years, the London Olympics have been viewed by MI5 as the most significant security challenge facing the UK. The immense international profile of the event means any group contemplating jihadist or extremist violence will be attracted by the idea of executing it in London over the next weeks.

Smith and Wesson Sale
07/24/2012

FutureNet Security Solutions, a subsidiary of Detroit, Michigan based FutureNet Group, Inc.,  announced today that it has reached an agreement with Smith & Wesson Holding Corporation to acquire the assets of the company's perimeter security division, Smith & Wesson Security Solutions, Inc.

Facebook Security Checkpoint
07/23/2012

Facebooks recently launched Malware Checkpoint, which prompts users to scan and clean their personal computers, has drawn criticism from users who claim it has locked them out of their accounts.

The checkpoint, which takes people to the Facebook Security site, provides links to McAfees Scan and Repair and Microsofts Security Essentials at no charge.

Yahoo Security Breach
07/22/2012

A new name can be added to the list of companies who have been hacked this year:  Yahoo. If you know anyone with a Yahoo account, there is a chance you received a strange e-mail from them recently. More than 450,000 username and passwords were compromised in the breach.

Olympic Security Underway
07/21/2012

Armed police shut down a busy motorway in central England Thursday amid a security alert centred on a bus, a stark reminder of the heightened watch being maintained by authorities just three weeks before the London Olympic Games.

Hours earlier, police in London arrested six people on terror charges but said the operation was unrelated to the Olympics, which begin in late July.

Taiwan Airport Security
07/20/2012

The Aviation Police Office said last Sunday that it will tighten security checks after an outbound U.S. citizen was found to have a handgun and ammunition concealed in her checked-in luggage a day earlier.
The office said that customs officers who failed to spot the weapon when the woman, surnamed Liang, entered Taiwan will be disciplined for negligence. It said it will also tighten security checks on checked-in luggage.

PandaLabs Security Tips
07/19/2012

PandaLabs, the antimalware arm of Panda Security, wants to provide security tips to consumers to stay safe and prevent falling victim to computer fraud this summer. During the summer, those with more spare time on their hands, especially children, use their computers and connect to the Internet more frequently, which increases the risk of falling victim to some kind of malicious code.

Afghanistan Security Status
07/18/2012

Washington declared Afghanistan a major non-NATO ally on Saturday, a largely symbolic status reinforcing its message to Afghans that they will not be abandoned as the war winds down.

Secretary of State Hillary Clinton announced the decision, made by President Barack Obama, during her unannounced visit to Kabul where she met President Hamid Karzai on the eve of a major donors conference in Tokyo which will draw pledges for aid.

Mobile Security
07/17/2012

Gone are the days mobile phones carried just a handful of contact numbers.

Today, the mini-computer in your pocket or handbag is likely to hold several keys to your life - from treasured photos and videos and important documents, to emails and login and passwords for several services including mobile banking.

So it's no surprise scammers see smartphones and tablets as treasure. Since locking your phone in a draw and never taking it out defeats the purpose of having it, it is important to take some steps to protect the information it contains.

DNSChanger
07/16/2012

On July 9, nearly 300,000 PCs will find themselves dazed and confused when the DNSChanger botnet is shut down for good. These systems will no longer be able to look up common Web destinations, such as Facebook and Google.

Compromised by the DNSChanger bot software, the infected computers reroute all their domain-name requests—an act that turns domains such as eweek.com into the IP addresses understood by routers—through servers that had been owned by criminals. Since late last year, however, the Internet Systems Consortium has run the servers on behalf of U.S. law enforcement, which took control of the domains, ensuring that infected systems are not redirected to malicious sites. Yet, on July 9, those Domain Name System servers will be shut down with the expiration of the court-ordered takeover. After that, compromised computers requests for Internet addresses will go unanswered.

Security Shortage for Olympics
07/15/2012

The private security company being paid nearly £300m to guard the London 2012 Olympics has yet to fully train or accredit thousands of security guards needed to protect the games from terrorist attack, it has emerged.

Ministers are anxious that with three weeks left until the opening ceremony, only half the guards needed to guarantee fully staffed patrols of the entrances to venues and carry out other security duties are ready to start work.

BMW Security Loop Hole
07/14/2012

There has been an unusual spike in the number of BMWs stolen in the UK this year, with some sources suggesting the number may be 300 cars or higher. The cars are being stolen without activating car alarms or immobilizers.

The suspected method involves the use of devices that plug into the cars OBD port and can program blank key fobs, leaving owners with keys to missing cars.

The essential theft process varies in detail, but all reports seem to have a fundamental methodology in common. First, the car is entered, either via nearby RF jammers that block the fob lock signal from reaching the car or, more crudely, by breaking a window, as seen in the video in this post of the 1 Series being stolen. In cases of the window break, the thieves seem to be exploiting a gap in the car's internal ultrasonic sensor system to avoid tripping the alarm.

Oops Security Mistake
07/13/2012

Internet security researchers said Thursday they may have been mistaken about claims that mobile devices powered by Google Inc.s Android operating system were hacked and used to send spam emails.

The researchers from security company Sophos Ltd. and Google rival Microsoft Corp. each had written blog posts in recent days identifying what they said were incidents of Android devices being used to generate spam emails from Yahoo Mails app. In an interview Thursday, Chester Wisniewski, senior security adviser at Sophos, said he was rechecking his findings after Google and some other security researchers disputed findings of an Android botnet.

Tennis Security Concerns
07/12/2012

Serena Williams says Wimbledon organizers should take security into account when scheduling matches after she was almost knocked over by fans following her fourth-round victory over Yaroslava Shvedova on Court 2.

The four-time champion at the All England Club was mobbed by fans seeking autographs as she began her walk from the court on the outskirts of the club back to the locker rooms inside Centre Court. Security guards had to push fans aside to let Williams through.

Al Queda Threats
07/12/2012

A terrorist plot to blow up a U.S. passenger jet timed to coincide with the Olympics has been uncovered by security agencies, according to intelligence sources.

Al Qaeda intended to use a radicalised Norwegian Islamic convert to attack U.S. planes in the build-up to the London Games - which start in 26 days on July 27 - it is understood.

Education of Military Kids a Security Issue
07/11/2012

Forty-four percent of the men and women in the armed forces are moms or dads.

One and a half million of their children are school-age. Their education is not just important for their own well-being. It is also a matter of national security because it is crucial to attracting and retaining an all-volunteer force, according to Defense Secretary Leon Panetta, who spoke Wednesday at the Gaylord Texan Resort & Convention Center.

FireFox Bug Not a Bug At All
07/10/2012

A bug in the latest version of Firefox that exposes secure information in the browsers New Tab window may not be a flaw at all, according to one security researcher.


The New Tab feature in Firefox 13 displays thumbnails of previously visited web pages whenever a new tab is opened in the browser. Those thumbnails include information from secure, or HTTPS, websites, too.

Online Banking Security vs Convenience
07/09/2012

Online banking is convenient, but it is easy for cybercriminals to gain access to your accounts when you process transactions over the Internet. Organized criminal gangs are using malware and phishing schemes to steal approximately $1 billion from small and mid-sized companies across the United States and Europe each year, and the problem has become so pervasive that a recent theft of $100 million from a business account barely registered on the FBIs radar.

The good news is that it is possible to enjoy the convenience of online banking without exposing your company to unnecessary risk by taking advantage of a banks products and services and exercising some basic precautions.

Mac Security
07/08/2012

Malicious software on a Mac, can it be true? Indeed, fair Apple aficionados, and as the company previews OS X 10.8, a.k.a. Mountain Lion--due in July--here are six signs that Mac security continues to mature, as it must.

Cyber Security Number 1 Threat
07/07/2012

Only three months ago, FBI Director Robert Mueller warned that while terrorism is still the FBI's top priority, in the not-too-distant future, we anticipate that the cyber threat will pose the No. 1 threat to our country.

Security Stalker
07/06/2012

A private security team was hired to follow and photograph a Reuters special correspondent who has written a series of articles exposing mismanagement in Greek banks.

Stephen Grey, who was in Athens last week for further reporting, was followed to a meeting at a building in the city on June 20.

The unidentified watcher waited for an hour and a half until Grey emerged. He then followed Grey to the Reuters office in Syntagma Square in the city centre, where the watcher was joined by a second man who arrived on a motorbike.

The two men kept the office under observation for more than an hour, Reuters security staff said.

Use Google Now with Caution
07/05/2012

Google Now, the smart assistant in the latest upgrade of the Android operating system, draws an uneasiness among security experts evaluating the risks the search-based feature for mobile devices brings to businesses.

Several security experts told CSO they were concerned about Now, while acknowledging it was too early to say for sure whether there are risks to businesses. Like companies, consumers may also be uneasy with the amount of information going to Google and what the company can do with it.

Independence Day - Fourth of July
07/04/2012

Royalty free stock photos for the Fourth of July


Security Oxymoron
07/03/2012

Talk about sheer audacity, writes David Sirota, the National Security Agency claims it can not tell Congress about its activities violating the privacy of Americans because doing so might violate Americans privacy. Yes, you read that right.

Olympic Security
07/03/2012

With less than four weeks remaining before the opening ceremony of the London Olympic, elaborate security arrangements have been put in place.
Every precautionary measure has been taken to counter disruptions to the Games by protests, violence and most importantly terrorism.
As far back as 2005, long before London had even won its bid to host the games, planning had started — in optimistic anticipation — on how to make the event safe.

Jewish Non-Profit Security
07/02/2012

The Department of Homeland Security has allocated $9.7 million to Jewish organizations and facilities considered vulnerable to terrorist attacks.

The funding, announced last Friday, came from the DHS’s Nonprofit Security Grant Program, which aids nonprofit organizations that are at risk of terrorist threats and helps those organizations coordinate with broader security initiatives.

Apple Security
07/01/2012

Apple, which faced harsh criticism of its response to the massive Flashback exploit earlier this spring, appears to be changing its approach to security at a time when its Mac OS X operating system is getting more attention from cyber-criminals.

How Will Linked In Security Issues Effect Social Media
06/25/2012

After hackers last week breached the LinkedIn site, stealing more than 6 million user passwords, analysts are debating whether the attack will cause long-term damage to the social network.

In the attack, users passwords were posted publicly to a Russian hacker forum. The incident garnered a lot of headlines, both in the trade and mainstream news media, and LinkedIn was accused of using lax security and having nothing more than light encryption to safeguard its users' data.

Many companies besides LinkedIn suffer security breaches. What's causing the furor over the LinkedIn breach is that the company makes its name and its money from user data, yet it failed to take what security experts would call adequate steps to secure its bread and butter.

Critics accuse the company of failing to protect its users. Will users stand by their social network or will they flee?



Current Blog

2012 Security Blog Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.