Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Military Holiday Gifts
11/28/2011


Great Military and Security Gifts Discounted for the Holidays

Protecting Children
11/28/2011

National governments, including those in the United Kingdom, Ireland, and Australia, are promoting legislation to protect children from pornography and other unsuitable Web content. The ability for mobile device users, many of whom are minors, to freely access the Web, has made this an especially critical issue for telecom operators. If implemented, legislation would require operators to actively block undesirable content and make certain types of content available only if users opt-in to receive it.

AT&T Security Probe
11/27/2011

AT&T Inc, the No. 2 U.S. mobile provider, said it is investigating an organized and systemic attempt to access wireless customers' information but that it did not believe any accounts were breached.

The company, which had 100 million subscribers at the end of the third quarter, said it is advising less than 1 percent of its mobile customers that there was an attempt to obtain information about their accounts.

National Food Security
11/27/2011

The proposed National Food Security Bill, when implemented, would add to inflationary pressures, Reserve Bank Governor D Subbarao said.

Military Ornaments and Security Ornaments
11/26/2011


Military Ornaments

Police and Security Gifts
11/25/2011

Security for Olympic Games is Costly
11/25/2011

Taxpayers are paying out an enormous c250,000 a day on security to protect the Olympic venues, it has emerged.

With construction already completed on five of the arenas the cost of providing security for them has dramatically increased.

The new figure is more than triple what it cost to look after the venues a year ago.

Budget Issues Cause Security Problems
11/23/2011

If US Congress fails to take steps toward debt reduction over the next year, the Pentagon will face devastating, automatic, across-the-board cuts that will tear a seam in the nations defence, Defence Secretary Leon Panetta warned on Monday.

Four Rising Cyber Threats
11/23/2011

Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers.

Whether you are protecting corporate data or simply trying to keep your personal files safe, these threats -- some rapidly growing, others still emerging -- put your systems at risk. Fortunately, security procedures and tools are available to help you win the fight.

Cyber Security and the Power Grid
11/21/2011

Cyber security of the power grid is an often overlooked issue that could bring Connecticut, New England and possibly the country to its knees. While utilities, power generators and the grid administrator all value security, the electricity system is so complex and interdependent that one seemingly small and isolated failure can have serious ramifications.

Securing Mobile Devices
11/20/2011

IBM announced a new managed service to help IT administrators manage and support all the personal mobile devices being used by employees.

With IBMs Hosted Mobile Device Security Management service, IT departments can ensure personal phones and tablets comply with corporate security policies, protect them from malware infections, track user activity and secure connections to the network, IBM said Nov. 11. The service would cover devices running Apples iOS, Google's Android, Research in Motions BlackBerry, Nokias Symbian and Microsofts Windows Mobile, according to IBM.

Security and Defense
11/19/2011

After saber-rattling IAEA report came out, Israel is giving the world some time to get tough on Tehran.

Israel has now entered a waiting period. While just a week ago it seemed like fueled and armed Israel Air Force fighter jets were lining up on runways, ready to bomb Iran, this week they have been stored back in their concrete hangers to fight another day.

The immediate impact of the International Atomic Energy Agency report released on Tuesday is that, for now, an Israeli strike on Iran will move to the back burner and instead Jerusalem will give the world some time to impose tougher sanctions on Iran.

Predator Drones Over Border
11/18/2011

Two Border Patrol agents walked by a patch of brush on a remote ranch and saw nothing. But 19,000 feet overhead in the night sky, a Predator unmanned aircraft kept its heat-sensing eye on the spot.

In an operations center about 80 miles away, all eyes were on a suspicious dark cluster on a video screen. Moments later, the drone operators triggered the crafts infrared beam and pointed the agents directly to the undergrowth where two silent figures were hiding.

Rio Security Clean Up
11/17/2011

Police backed by tanks and helicopters charged into Rio de Janeiro‚€™s biggest slum today to take control of the neighborhood from drug traffickers as part of the battle to secure the city before it hosts the 2016 Olympic Games.

A 3,000-strong security force faced no resistance as it advanced into Rocinha, a maze of dwellings that house an estimated 100,000 people on a hillside overlooking some of Rios wealthiest communities. They searched the area for drug dealers, guns and drugs in preparation for the establishment of a so- called Police Pacification Unit, or UPP, which will allow the state to reclaim control of the community. Neighboring areas of Vidigal and Chacara do Ceu were also occupied. There was no conflict and no shots were fired during the action, which was backed by 24 armored vehicles and seven helicopters.

Security vs Abu Sayef
11/16/2011

Defense contractors in the United States, some eyeing to work in the Philippines for the first time, are scrambling to win a $200 million contract to support American troops in Mindanao. Nonetheless, they have yet to find Filipinos who can give them a true picture of what exactly they‚€™ll be up against when they get there.

A highly-placed source revealed the Pentagon has signaled it may bid out a fresh support contract for the Joint Special Operations Task Force-Philippines after the current contractor, Texas-based DynCorp International, finalizes its contract in September 2012.

Occupy Wall Street Security
11/15/2011

After a sexual assault at the crowded tent camp set up by Occupy Wall Street protestors in New York, security issues are starting to overshadow the more idealistic concerns of the activists.

Ironically, the intense police presence deployed to keep the protestors under control does not extend into the camp at Zuccotti Park itself, where less savory residents have started to appear among the several hundred anti-capitalist demonstrators.

Apple Security and Sandbox
11/15/2011

Apple is upping its security requirements for apps on the Mac, a move that could hinder developers but better safeguard users.

The Cupertino, Calif.-based company announced all apps submitted to the Mac App Store will require sandboxing support by March 2012. Sandboxing makes apps more secure by creating a barrier around the program that keeps it from accessing other aspects of users computers.

Cyber Attack Defense
11/14/2011

Cyber-security experts from the European Union and United States took part in simulated cyber-attacks against supervisory control and data acquisition systems and advanced persistent threats as part of

The United States and European Union took part in the first-ever joint cyber-security exercise addressing how to cooperate and respond in the event of a cyber-attack on critical infrastructure.

Pirates Seize Oil Tanker
11/13/2011

Pirates seized an oil tanker off the coast of Nigerias southern delta, kidnapping the crew in a bid to steal ship‚€™s cargo in the latest hijacking targeting the region, private security officials said Thursday.

Apple Security Chief
11/12/2011

Apples chief of security has left the company in the wake of controversy over how his team handled the investigation of a missing iPhone prototype this past summer, according to reports. John Theriault retired from his position as vice president of global security at Apple after a nearly five-year stint at the company.

Security at LAX
11/11/2011

Citing a $1.6-billion investment in security measures since 9/11, a study released Wednesday concludes that Los Angeles International Airport is much safer today but still needs to improve emergency management, the security of its facilities and the airport police force.

Homegrown Terrorism
11/10/2011

The arrest this week of four Georgia men charged with plotting to attack government officials with explosives and a biotoxin raises the question of just how big of a threat are homegrown terrorists in the United States?

While security experts obviously can not put a ranking on a would-be terrorist, there are some reasons why the homegrown variety pose a unique challenge to law enforcement.

Mobile Security
11/09/2011

Long-associated with the PC, but only recently applied to smartphones and tablet computers.

We ‚€” especially IT professionals ‚€” know that these devices are really pocketable computers.

China Cyber Attacks
11/08/2011

Cyber attacks traced to China targeted at least 48 chemical and military-related companies in an effort to steal technical secrets, a U.S. computer security company said Tuesday, adding to complaints about pervasive Internet crime linked to this country.

The targets included 29 chemical companies and 19 others that make advanced materials used by the military, California-based Symantec Corp. said in a report. It said the group included multiple Fortune 100 companies but did not identify them or say where they were located.

Boost Security
11/07/2011

While conventional wisdom says virtualized environments and public clouds create massive security headaches, the godfather of Xen, Simon Crosby, says virtualization actually holds a key to better security.

Isolation -- the ability to restrict what computing goes on in a given context -- is a fundamental characteristic of virtualization that can be exploited to improve trustworthiness of processes on a physical system even if other processes have been compromised, says Crosby, a creator of the open source hypervisor and a founder of startup Bromium, which is looking to use Xen features to boost security.

Security Services
11/06/2011

With the ever-increasing risk of cyber-threats as well as the financial and compliance liability attached to possible incidents, information security is a key element in your technology remit that needs attention.

Managed security services, or MSS, are network security services that have been outsourced to a service provider; a company providing such is called a managed security service provider, or MSSP.

XML Security Concern
10/30/2011

A weakness in XML Encryption can be exploited to decrypt sensitive information, researchers say.

XML Encryption is used for securing communications between Web services by many companies, including IBM, Microsoft and Red Hat. Researchers Juraj Somorovsky and Tibor Jager from the Ruhr University of Bochum (RUB) in Germany, devised an attack that decrypts data secured with the DES - Data Encryption Standard or the AES - Advanced Encryption Standard in CBC - cipher block chaining mode. They plan to present their findings in more detail at the ACM Conference on Computer and Communications Security later this year.

Risk of Security in Mobile Environment
10/29/2011

Computer security involves more than installing an antivirus utility on your PC. Malicious hackers are on a mission to steal money and wreak havoc, and they will do it by any means possible. The growing number of mobile devices, such as phones and tablets, and the popularity of social networks give them new avenues in which to expand their cybercrime.

The amount of malware spreading on phones and tablets continued to surge this year, rising 22 percent over 2010 in the first half of 2011, according to a McAfee study

Security In Iraq an Issue
10/27/2011

Iraqis fretted about the ability of their armed forces to protect them from violence after U.S. President Barack Obama said on Friday all U.S. troops would withdraw by the end of the year.

Washington and Baghdad failed to agree on the issue of immunity for U.S. forces after months of talks over whether American soldiers would stay on as trainers more than eight years after the U.S.-led invasion that toppled Saddam Hussein.

Obamas announcement prompted worries among Iraqis over the stability of their country and a possible slide back into sectarian violence.



Current Blog

2011 Security Blog Archive

November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.