Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Oil and Gas Industries Review Security
01/30/2013

The bloodshed at In Amenas has left the oil and gas industry struggling to come to terms with what it might mean for investment in risky countries.
Bob Dudley, BP's chief executive says the company, which had 18 workers at the remote Sahara gas plant, is reviewing security at its other facilities in the region and around the world.

Somalia Security Concerns
01/29/2013

The British government warned on Sunday of a specific threat to foreigners in Somalias breakaway enclave of Somaliland and urged its nationals to leave the country immediately.

How Not To Handle Internet Security
01/28/2013

Sometimes Internet security can be a difficult concept to grasp, but it is nothing some old-fashioned office supplies can not handle, right?

complete article

Security Online
01/27/2013

If you send e-mail, post updates on Facebook, check your bank account balance online, or do most anything that requires the Internet, you're at risk of being hacked.

In fact, last August, Mat Honan, senior writer for tech magazine Wired­-someone presumably well aware of the dangers of hacking-got hacked. He lost data from his iPhone, iPad, and MacBook, including all photos of his one-year-old daughter. My entire digital life was destroyed, he wrote on wired.com.

Chrome Encryption to Improve
01/26/2013

Google will beef up security in the next release of its Chrome browser (version 25) by encrypting all search queries sent from the software. Currently, only queries sent by searchers logged into a Google account are encrypted by Chrome.

Starting with the next version of Chrome, now in the development and beta channel, searches by anyone will be encrypted using the Secure Socket Layer, Google Software Engineer Adam Langley explained in The Chromium Blog.

Security Concerns for 2013
01/25/2013

A new year is under way, and that means new and changing digital security threats that even casual technology users need to know about. If you surf the Web, engage in social networking, use cloud storage or carry a smartphone, there are a few things you need to know to be prepared for 2013.

Mobile malware is ramping up
As more and more individuals rely on smartphones for everyday communication, finance, and business needs, criminals have begun to focus on victimizing mobile users. What began in 2012 is expected to reach greater heights in 2013.

Reporting of Security Breaches
01/24/2013

Proposed legislation in the European Union would force tech companies that have access to user data -- such as Facebook, Google, and Microsoft -- to report any security breaches to local cybersecurity agencies, the Financial Times reported today.

Security vs Privacy
01/23/2013

In the name of national security, US presidents have historically enacted extreme policies that have violated civil liberties. From time to time, grave crises have threatened the United States and have compelled President’s to react accordingly.

The Constitution does not say the Executive branch can suspend habeas corpus or violate civil liberties. However, presidents have used laws, US Code, and Executive Orders to justify emergency powers that consequently violate our civil liberties.

Every President has the awesome responsibility of balancing national security risk with preserving the Constitution.

Google Prepares to Leave Passwords Behind
01/22/2013

Tech juggernaut Google seems to be preparing to move away from passwords, which have long been a weak point of digital security, in favor of dedicated devices. But first it just has to convince the rest of the Internet to go along with their scheme.

Speaking Against Islam is a Security Threat
01/21/2013

Criticizing Islam considered National Security Threat after Spanish authorities threaten to deport Christian to certain death for speaking out.

Test Your Identity Security
01/20/2013

Whether you do online banking and shopping or not, it is good to know what sort of personal, private information actually resides in your computer. The longer we use our computers, the greater the odds things are there we are unaware of, or have simply forgotten.

Your private computer and Internet-related information bank account, credit card, Social Security numbers, names, addresses, etc. exists in two types, depending on what is happening at the time. Computer IT wonks refer to these two types as data at rest and data in motion.

Data at rest is data that is not actively participating in any activity; it simply exists, at rest in your computer, on a hard drive, flash drive, DVD, or some other form of data storage. It is resting, i.e., it is not busy doing anything or moving around.

Suspended Cell Service in Pakistan
01/18/2013

Cellular services have been suspended in parts of Pakistan on Sunday owing to reports of attacks on Tahirul Qadri and the long march participants. Services were suspended at 5pm and will remain off until further notice by the Pakistan Telecommunication Authority

Disable Java
01/17/2013

Concerns about the susceptibility of the Java programming language to cyberattacks culminated Thursday night, with a warning posted on the Department of Homeland Security’s Computer Emergency Readiness Team (US-Cert) calling on the public to temporarily disable Java on their personal computers.

The call came in response to the discovery of a new vulernability that lets an attacker execute code on a PC running Java.

Security Forces Fired Live Bullets at Demonstration
01/17/2013

Djibouti Security Forces fired live bullets on number of young demonstrators of primary and middle-school students who demonstrated peacefully on December 30, 2012. They peacefully demonstrated on the lack of the infrastructure in the residential areas they live in, especially, related to sport clubs foundations and other sports' infrastructure, during the meeting organized by the Sports Secretary of State. The use of the live bullets resulted in killing of a demonstrator, 14 year old, and wounding many others.

Export and Security
01/16/2013

Circuit-board manufacturer says it is tough to keep up with export laws, not get in trouble with Washington and stay ahead of foreign competitors.

Duck Hunters Peak Security Problems at Nuclear Plant
01/15/2013

A couple of duck hunters triggered a security scare at Plymouths Pilgrim Nuclear Power Station on Saturday morning.

The power plant declared an Unusual Event around 9:50 a.m. over what officials determined at the time to be suspicious activity.

An Unusual Event is the lowest of four emergency classifications for nuclear power plants as defined by the Nuclear Regulatory Commission.

Java Security Concerns
01/14/2013

Oracle Corp said it is preparing an update to address a flaw in its widely used Java software after the U.S. Department of Homeland Security urged computer users to disable the program in web browsers because criminal hackers are exploiting a security bug to attack PCs.

What is Hot in 2013!
01/13/2013

Each year we scratch our heads and come up with trends or technology that we think will be hot in the coming year. Checkout our list of What is Hot and What is Not in 2013.

What is Hot in 2013
1. Cloud
2. Synched Apps
3. Advanced Mobile
4. Social, Social, Social
5. Mobile Shopping / Price Comparison
6. Storage
7. Security
8. Virtual

What is Hot in 2013

Testing for Radiation
01/12/2013

Helicopters have been conducting radiation tests above portions of the Washington, D.C. area using remote gamma radiation sensing technology.

The National Nuclear Security Administration (NNSA) has been flying the radiation missions since Dec. 27, 2012 and they will continue until next Friday, Jan. 11. The flights have been conducted during daylight only, and the pilots fly about 80 miles per hour at 150 feet above the approximately 70-square mile radiation assessment area.

Naturally-occurring radiation is measured so that baseline levels can be established and used in security and emergency preparedness, reads a statement from the NNSA.

2012 Incorrect Security Predictions
01/11/2013

Before we rush into 2013, lets take a moment to see to see what digital-security experts got wrong in 2012.

No year-end review is complete without looking at all the things that didn't happen. Looking over security predictions that were made for 2012, it is clear that most of the predictions were more or less on target, but there were still a handful of misses.

Some of the flubs were because anticipated technology changes, such as a wholesale shift to Internet Protocol version 6 (IPv6), just did not happen.

PNC Apologies to Customers for Blocking Them
01/10/2013

PNC Bank is apologizing to customers inadvertently caught up in efforts to thwart attacks on its online and mobile banking websites.

In an email to customers Thursday night, Pittsburgh-based PNC said that for several weeks it has tried to block high volumes of traffic directed at its website during the attacks, known as denial-of-service attacks.

In some cases, those measures also may have blocked access to a small percentage of legitimate PNC customers for an extended period, the bank said. We sincerely apologize to those affected.

2012 Reflections, 2013 Predictions
01/09/2013

2012 was scarred with senseless tragedies, the Costa Concordia the majestic cruise liner, went down off the Tuscan island of Giglio, Italy when it was said the captain was showing off to islander friends. Horrific tornados that tour through the mid-western United States stole the lives of even the littlest angels. A horrific mass shooting at the Batman opening in Colorado showed a careless disregard for life. Sadly this was followed by a shooting at Seikh Temple in Oak Bridge, Wisconsin, taking the lives of worshippers. The pain and tragedy of 2012 continued on when many individuals seeking improved health, became deathly ill when they were injected with a contaminated compound that infected them with a form of fungal meningitis. Mother Nature unleashed her power in 2012 with Super Storm Sandy in all her glory changed the face of iconic beaches along the Jersey Shore and impacted New York City in ways never imagined. The crippled infrastructure, and flooded tunnels paralyzed the region for days (and in some cases weeks).

2012 Reflections, 2013 Predictions

Healthcare Security and the Cloud
01/08/2013

A leading advocate for the privacy and security of patient health information is urging the government to issue a strong guidance document on how healthcare data should be protected in the cloud.

What is known, she added, is that the healthcare industry has the worst security practices of any industry. Eighty percent of hospitals still do not even encrypt data. Hospitals are not putting the money into data protection.

The key issue with cloud storage, she said, is that there is no way of telling which services are following best practices for state-of-the-art comprehensive security and privacy.

Cyber Attack Expected
01/07/2013

A sampling of computer security professionals at the recent Information Systems Security Association conference found that a majority of them believe there will be a major cyber terrorism event within the next year. The survey, conducted by the network security and hardening vendor Ixia, found that of 105 attendees surveyed, 79 percent believe that there will be some sort of large-scale attack on the information technology powering some element of the US infrastructure—and utilities and financial institutions were the most likely targets. Fifty-nine percent of the security professionals polled believed that the US government should be responsible for protecting citizens from cyber terrorism.

What Threats do Businesses Face in 2013?
01/05/2013

Companies face a range of threats. For example, business identity theft can lead to a breach where credits can be issued or obtained under a business unique identity. Or a companys trade secrets could be compromised through leaks in its cyber security.

If a hacker wants to get information about a company, the first thing he or she will do is look for personal information about its CEO, which could be available on networking and social media websites, and also by gaining access to the CEOs personal computers. These multilevel and multithreaded attacks are very precise. Whereas previously, cyber attacks could be compared to carpet bombing, they are now more like precision missile strikes.

Top Computer Security Concerns for 2013
01/04/2013

The biggest security threats to companies in 2013 will depend on who is attacking the business: Opportunistic criminals will continue scanning for accounts with default or weak passwords, while targeted attackers will refine their attempts to fool employees, business services firm Verizon and security software firm McAfee stated in separate reports.

In the past year, about 90 percent of successful breaches analyzed by Verizon started with a weak or default password, or a stolen and reused credential, which is a trend that will continue, said Wade Baker, managing principal for the company's RISK team. The company analyzed data gathered from incidents it investigated in 2012 to identify the causes of data breaches.

Internet Explorer Security Problem
01/03/2013

Microsoft has released a temporary fix for its Internet Explorer browser, which the company says has a security hole that could allow hackers to take over a computer.

The security hole, which Microsoft confirmed over the weekend, affects Internet Explorer versions 6, 7 and 8, and could allow malicious code, placed on some unsuspecting websites, to be embedded in a computer system after the browser visited the site.

Benghazi Security Report
01/02/2013

The report by the Senate Homeland Security and Governmental Affairs Committee said the State Department failed to meet staffing requests from its own security personnel and made the grievous mistake of not closing the Benghazi compound at least temporarily because of growing threats.

The Democrat-turned-independent lawmaker from Connecticut, who is retiring from the Senate, said the reaction from the U.S. government to the security situation in Benghazi before the attack was woefully inadequate to the dangers the flashing light was indicating.

The report is largely consistent with the criticism of an independent review panel appointed by Secretary of State Hillary Rodham Clinton. That panel, in a Dec. 18 report, found the State Department had grossly inadequate security in Benghazi and must correct systemic failures in the protection of diplomats.

Facebook Security Glitch
01/01/2013

Facebook saved countless users from New Years Eve humiliation ... after initially exposing their private messages.

Facebooks Midnight Delivery app allows users to schedule private messages to wish friends a happy new year exactly when the clock strikes twelve. This is fantastic for those who intend on having a glass of Champagne or five as 2013 approaches, as it will let them schedule a polite message along the lines of Happy New Year, my beloved friends! instead of drunk texting everyone  something like I'm sooooo wasted right nowljskf and happy NEW YeAr! 2013 FTW! YOLO! when the ball in Times Square drops.

Now great as Facebooks little app sounds, there was just one problem: A security glitch temporarily exposed users scheduled messages to the general public.

Embassy Security
12/31/2012

Meeting congressional demands for more embassy security guards could be difficult for the U.S. Marine Corps even if funds are provided, a security analyst said.

Cyber Security Executive Order
12/30/2012

A cyber security executive order could be issued by President Obama as soon as early 2013, according to White House sources.

James Lewis, director of the technology and public policy program at the Center for Strategic and International Studies, told global affairs blog The Hill on Friday that the action would not likely occur after the holiday season.



Current Blog

2013 Security Blog Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.