Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
What Is Eating the Internet
07/23/2014

It is a given that hackers can and do penetrate websites with laughable ease, ranging from those of retailers to those of the United States government.

It certainly does not help the security-minded to know that the U.S. National Security Agency and other countries spy agencies, including the UKs GCHQ and the West German intelligence agency, are tapping into online communications at will. In fact, the Germans have set aside US$136 million for that purpose.

Symantecs recent admission that antivirus software is dead didn't help matters, although it only echoed what many AV experts have been saying for years and what NSS Labs has pointed to in various reports over the last several years.

Mobile Device Security
07/22/2014

A study published last week by Avast (AVST) suggests the vulnerability of Android smartphones goes beyond malware. As it turns out, wiping the devices fails to remove sensitive data.

Avast is in the business of selling security software, so anything the company says about smartphone security should be taken with a grain of salt. Still, the evidence that Avast offered is shocking and should serve as a wake-up call, especially to those who are selling their Android smartphone in preparation for buying the next must-have mobile device.

Confusion with New Airport Security
07/21/2014

Interviews with passengers and industry officials found that there had been little resistance among passengers — except for widespread complaints that the announcement, with scant information on what to expect and where, created more confusion than seemed necessary.

10 Strangest Things Ever Found by Airport Security
07/18/2014

Human-Skull Fragments
Flames
A Dead Body
Cannonball
240 Live Fish
Boomerangs
Venomous Snakes
Baby
18 Severed Heads
Samurai Sword

Java 7 Patches Work on XP
07/17/2014

Future Java 7 security patches will work on Windows XP despite end of official support.

BlackHat August 2-7, 2014
07/16/2014

Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 17th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill building. Join us for four intense days of Trainings and two jam-packed days of Briefings.

Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

From its inception in 1997, Black Hat has grown from a single annual conference in Las Vegas to the most respected information security event series internationally. Today, the Black Hat Briefings and Trainings are held annually in the United States, Europe and Asia, providing a premier venue for elite security researchers and trainers to find their audience.

Mobile Security Threats
07/15/2014

Businesses have begun to take mobile threats quite seriously, purchasing new software solutions that are designed with mobile security in mind. Consumers, however, have yet to follow suit. The recent attack against Belato was primarily carried out through malicious links sent to consumers via email. When people clicked on these links, their mobile devices became compromised. The majority of these devices did not have security software installed, making their exploitation somewhat simple.

Airport Security
07/14/2014

The Department of Homeland Security is increasing security measures at airports overseas amid deepening concerns that terrorists in war-ravaged Syria are trying to develop a new generation of bombs that could be smuggled onto commercial planes.

The officials singled out smartphones including iPhones made by Apple Inc and Galaxy phones made by Samsung Electronics Co Ltd for extra security checks on U.S.-bound direct flights from Europe, the Middle East and Africa.

U.S. security officials said they fear bombmakers from the Yemen-based al Qaeda in the Arabian Peninsula have figured out how to turn the phones into explosive devices that can avoid detection.

As Security Startups Heat Up, a Reminder that Security is Not a Product or Service: It Is a Value
07/12/2014

In the past thirty days alone, just counting the security funding stories I’ve personally covered, over $192 million has been pumped into security startups. Needless to say, security is hot right now and investors are betting that these new startups are not only going to be the ones responsible for protecting users and enterprises in the web, but they also might generate a buck or two or a billion.

But how can we really be certain that these new security startups are going to prevent future calamities?

As Private Security Grows in Florida, so Do Gun Incidents
07/11/2014

More than 100,000 private-security guards patrol Florida's neighborhoods and businesses — more than twice the number of law-enforcement officers statewide.

As the private-security industry continues to grow in the Sunshine State, so do the numbers of armed security guards and gun-related incidents involving them. In the past five years, the number of armed guards has increased from 21,000 to more than 27,000.

About 5,000 investigations are conducted annually by the state Department of Agricultures Division of Licensing, which oversees the private-security industry. Each year, the state revokes licenses from at least 300 security guards for such reasons as drawing and firing their guns without justification. These state investigations also result in the rejection of nearly 3,000 license applications each year, records show.

Smartphone Locking
07/10/2014

Smartphone locking is often seen as a necessary but sometimes annoying tool. Punching in a PIN code or even using the newer fingerprint scanners can be a pain when just tooling around at home or sitting in a car.

It appears Apple is looking into this issue. The U.S. Patent and Trademark Office published a patent application from Apple on Thursday, which details technology that can sense users locations and then modify their phones unlocking code -- a smart lock, so to speak.

Self-Storage Security Technologies That Allow Operators to Minimize Crime and Maximize Revenue
07/09/2014

With modern security technology, self-storage facilities can minimize the chance of seeing their business appear in tomorrow’s crime headlines. Without compromising customer service or your bottom line, do you have all the components you need? Here are a few things you can add to your security arsenal to minimize crime and maximize facility revenue.

Some products, like access gates, keypads and video cameras, have remained steady staples of self-storage security, but their features have evolved to include many more options. New wireless and mobile technology provides a lot more flexibility to facility owners and customers alike. Remote-access tools are also hot on the market.

For example, keypads come customizable with a variety of amenities. Some models work via a mobile app that allows users to enter their access code via their smartphone or other device.

How Companies Can Rebuild Trust After A Security Breach
07/08/2014

In speaking to several cybersecurity experts, a few key points emerged about how companies can minimize the negative effects of a security breach on customer relations. Across the board, experts stressed that transparency and communication is key, as clients are often more concerned with how an organization responds to a breach than the fact that it occurred.

More Terrorism Concerns
07/07/2014

American authorities said Wednesday that they are concerned al-Qaeda might be developing a new kind of bomb that could be smuggled onto planes. The Obama Administration told foreign airports with direct flights to the U.S. to increase their security measures.

Terrorism Warnings
07/06/2014

France is ramping up security measures on all outgoing flights to the U.S. following terrorism warnings.



Current Blog

2014 Security Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.