Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Patriotic PowerPoint Layouts
07/04/2011


Patriotic PowerPoint Templates and themes for the 4th of July.

Celebrate the 4th of July
07/04/2011


Celebrate the 4th of July with Americana and patriotic themed sneakers!

Obama Losing Dems on National Security
07/03/2011

The Obama administration tried to find solace in Fridays landmark votes on the Libya operation, holding up the fact that the House did not actually de-fund the mission as some semblance of an endorsement.

But the two votes Friday on Libya, coupled with the fierce backlash the president faced from his own party after announcing his Afghanistan withdrawal plan Wednesday, underscore the political trouble President Obama is in when it comes to national security. Though anti-war Democrats and anti-interventionist Republicans have long locked arms against U.S. military campaigns abroad, that bipartisan coalition is swelling -- in size and intensity.

Security Results in Market Instability
07/02/2011

Uncertainties about the Greek debt situation and the removal of the security blanket of Fed easing could combine for another week of volatility, as the second quarter draws to an end.

There is a busy economic calendar, including important ISM manufacturing data and three Treasury auctions totaling USD 99 billion in new securities, which hit the market next week just as the Feds quantitative easing Treasury purchase program winds down.

FBI Hackers
07/01/2011

Days after hackers claimed to compromise more than 1,000 accounts of an FBI affiliate in Connecticut, authorities have yet to release any details about the extent of damage to the organization, which counts large businesses and state agencies among its members.

Web security specialists say the silence is probably calculated to avoid giving any credit to hackers that thrive on limelight and to reduce the risk of any further exposure.

Citigroup Cites $2.7 Million in Customer Losses
06/30/2011

Citigroup Inc. has told government officials that about 3,400 of the customers whose credit-card information was hacked have suffered about $2.7 million in losses, according to people familiar with the matter.

The disclosure is the first acknowledgment by the New York company that the May security breach resulted in any losses. Citigroup has previously indicated it would cover any losses, saying customers would not be liable for unauthorized use of their accounts in connection with the attack.

Lulz Security goes WikiLeaks
06/29/2011

Both the hacking supergroup calling itself Lulz Security and researchers fighting against it have borrowed tactics from WikiLeaks in recent days, dumping sensitive information onto the internet for others to comb through.

In the first of a promised series of mass distributions of secret government material, Lulz late on Thursday published hundreds of documents from Arizona‚€™s department of public safety.

Lulz said it targeted Arizona because of harsh new laws there aimed at illegal immigrants. But it is also a bid to build popular support and attract more hackers to its generally anti-government cause.

Stronger Net Security
06/28/2011

A small group of Internet security specialists gathered in Singapore this week to start up a global system to make e-mail and e-commerce more secure, end the proliferation of passwords and raise the bar significantly for Internet scam artists, spies and troublemakers.

Guilty in Security Hack
06/28/2011

One of the computer hackers allegedly responsible for gathering email addresses of iPad customers from the AT&T servers has pleaded guilty and could face up to five years in prison per charge.

Accused hacker Daniel Spitler pleaded guilty to identity theft and conspiracy to gain unauthorized access to computers, The Wall Street Journal reports. Spitler is allegedly part of the Goatse Security hacking group that orchestrated a security breach of AT&T's servers shortly after the launch of the original iPad.

Bulger is a Security Coup
06/27/2011

The return to Boston of fugitive Irish-American gangster James Whitey Bulger after 16 years on the run was met with high security at a courthouse that had not even been built when he fled the city.

Bulger arrived at the tightly guarded federal courthouse in Boston last night to answer charges that he committed 19 murders. His girlfriend, who was arrested with him on Wednesday in California, was scheduled to appear in court on charges of harbouring a fugitive.

Dept of Defense Recruiting
06/26/2011

The U.S. Department of Defense and Department of Homeland Security have established a pilot program with leading private defense contractors and ISPs called DIB Cyber Pilot in an attempt to strengthen each others knowledge base regarding growing security threats in cyberspace, a high-ranking DOD official told a gathering of global security experts this week.

Falsified Security
06/25/2011

In a colossal failure of 9-11 security measures, an illegal immigrant used the stolen ID of a Bronx man with an arrest record to get hired as an airline flight attendant, and flew several trips as a trainee before he was busted yesterday, authorities said.

Besides getting a job at American Eagle, Jophan Porter, 38, used the stolen ID to obtain a US passport, a US Department of Transportation ID card and at least three Florida driver's licenses, law-enforcement sources told The Post.

Porter was caught after ID-theft victim Anthony Frair of The Bronx was denied food stamps because government records matched him to the airline job.

RSA Security
06/25/2011

Computer security firm RSA says it is only offering to replace about a third of its SecurID tokens, amid indications it could take months to swap them out for its entire user base.

The comments clarify steps the firm is taking following a pair of high-profile hacking incidents that involved the theft of information related to the SecurIDs and an attack on RSA customer Lockheed Martin Corp.

Tunnels on Security a Risk
06/24/2011

Mexican drug cartels to traffic illicit goods into the country could be used to smuggle terrorists or weapons of mass destruction.

Sens. Diane Feinstein and Chuck Grassley, the chair and vice-chair of the Senate Caucus on International Narcotics Control, are stepping up congressional efforts to combat the growing use of tunnels along the southwest border.

Eleven tunnels - used to smuggle drugs, money, weapons, and in some cases people -  have been discovered so far this year, bringing the total number of tunnels found by law enforcement authorities since 2001 up to 125. The majority of the tunnels have been found in southern California and Arizona.

Hacking Advice
06/23/2011

Lulz Security has been all over the Internet wreaking havoc in the name of a good time. The hackers have revived Tupac Shakur at the PBS Web site, dropped in to say hello to the CIA and angered thousands of gamers by interrupting service on EVE Online, a multiplayer role-playing computer game. They also released 62,000 e-mails and passwords, all in the name of Lulz ‚€” Internet short-speak for laughter.

complete article

Cyber Intrusions are Normal
06/22/2011

Cyber intrusions are fast becoming the norm at even the worlds most technologically sophisticated companies. This surprisingly includes some companies that have cyber security as their main mission.

Growing Need of Cyber Security
06/21/2011

There have been a number of shocking events over the past year and a half in the world of cyber security.

Some of the events include: mass breaches of consumer information at Sony and elsewhere, the Stuxnet worms stealthy attack on the Iranian nuclear program, the security breach at defense contractor Lockheed Martin and the Chinese electronic break-in at Google .

Benefits of Shopping Online
06/20/2011

Why buy online? Why not buy online? Have you ever considered the pros and cons to shopping at a retail store vs shopping online? Lets take a look at the advantages and disadvantages of purchasing online...

Advantages Of Shopping Online...

1. Saves Time

If you already know what you are looking for, shopping online can save you a significant amount of time. With just a few clicks of the mouse, you can place your order and move on to other things.

Benefits of Shopping Online

Citi Hack
06/18/2011

Citigroups disclosure that the names, account numbers and e-mail addresses of 200,000 of its credit card customers were stolen strikes at the core of financial life.

Half of all Americans have a credit card. The Citi attack is a reminder that the technology protecting their data was built by humans, security analyst Jacob Jegher notes ‚€” and can be breached by humans.

NSA Official Pleads Guilty
06/17/2011

A former National Security Agency official pleaded guilty on Friday to one misdemeanor count of exceeding the authorized use of a computer.

Thomas Andrews Drake, 54, accused of leaking classified information to a reporter, entered a plea deal with the Justice Department. They agreed to drop all 10 more serious charges-- including illegally possessing classified information, obstructing the investigation into the leaks and lying to the FBI, the New York Times reports.

Nuclear Security Asleep
06/16/2011

Their job is to secure the only nuclear power plant in Arkansas, but four security guards were caught sleeping while on duty.

Four security guards at Arkansas Nuclear One, in Russellville, are accused of sleeping on the job.

Business Cards for Security Businesses
06/16/2011

Need Security Themed Business Cards? Check out the Business Cards Store for cards that are easy to customize.

New RSA Security Chief
06/15/2011

RSA, the Security Division of EMC, has named as its new security chief Edward Schwartz, who takes the position amid heated criticism over a SecureID data breach that left many of RSAs high profile customers vulnerable to cyber attacks.

Anonymouse Hackers Arrested
06/14/2011

Spanish authorities say they have arrested three members of the international group of computer hackers who call themselves Anonymous.

All three are Spanish, and between the ages of 30 and 32, said Manuel Vazquez, chief of the police department's high-tech crime unit. They were were arrested in the coastal city of Barcelona, in the region of Valencia and in the southern city of Almeria. Their names were not immediately made public.

Reuters reported that the three were involved in Aprils crippling attack on Sonys PlayStation network. But Sony had no immediate comment, and the information could not be confirmed by ABC News.

Insecurity about the Cloud
06/13/2011

Most enterprises face apprehension over adopting cloud computing, and with good reason: Nearly half of enterprise IT decision makers reported a security lapse or issue with their cloud provider within the last 12 months, according to a recent global cloud security survey conducted by Trend Micro.

The global survey of 1200 U.S., UK, Germany, India, Canada and Japan IT decision makers uncovers the insecurities and concerns surrounding their journey to the cloud. It confirmed that, on the whole, enterprises are moving toward the cloud at a brisk pace and are initiating a giant multiplicative wave of new deployments. Although slightly over 10 percent of the respondents currently have cloud computing projects in production, close to half are either implementing or piloting new cloud applications.

Ban Ki-moon Wants Second Term with UN Security Council
06/12/2011

Ban Ki-moon formally asked the U.N. Security Council to support his candidacy for a second five-year term as U.N. secretary-general, according to a letter obtained by Reuters on Monday.

Ban, a former South Korean foreign minister, already had received assurances of support from the United States and other key members of the U.N. Security Council, diplomats said in March, making his re-election all but certain.

Ban's first term ends on December 31. He is unopposed so far.

Hackers Hack Security Site
06/11/2011

A group of shadowy hackers responsible for a string of recent high-profile cyberattacks has claimed to have stolen email addresses and passwords from associates of an FBI-affiliated security program.

The hackers who call themselves Lulz Security, or LulzSec, said they had attacked the website of the Atlanta chapter of InfraGard in retaliation for US efforts to classify hacking as an act of war.

Lulz Security published a list online of around 180 email addresses and passwords which the group said were obtained from the InfraGard website.

We also took complete control over the site and defaced it, Lulz Security said in a statement at their website, Lulzsecurity.com.

Citadel to Teach Homeland Security
06/10/2011

The Citadel Graduate College has opened enrollment to a new graduate certificate in homeland security. The new program will introduce students to basic homeland security concepts, applicable management principles, policy analysis as well as skills necessary to successfully address security challenges within the United States and abroad. Classes are scheduled to begin in the fall.

Hackers exploiting Flash Player XSS vulnerability
06/09/2011

Adobe has released another Flash Player update to fix a serious security vulnerability that could expose Windows, Mac OS X, Linux and Solaris users to cross-site scripting attacks.

This universal cross-site scripting vulnerability could be used to take actions on a users behalf on any website or webmail provider, if the user visits a malicious website, Adobe warned in an advisory.

Facebook Security Settings
06/08/2011

Facebook is an amazing website that allows you to catch up with family and friends all over the world. But losing control of your Facebook account can dangerous; especially given the amount of information Facebook has on you.

With that in mind, here are three account settings you should consider changing to make your account more secure passwords, login approvals, and browsing Facebook securely.

China Denies Hacking
06/07/2011

Chinas defense minister on Sunday reiterated the nations denial in having any involvement in a series of cyber attacks on U.S. security systems.

The Chinese government attaches importance on cyber security and stands firmly against all kinds of cyber crimes, Liang Guanglie noted during an Asia-Pacific security forum in Singapore. It is hard to attribute the real source of attacks.

Cloud Security Concerns
06/07/2011

When I talk to people who deal with network security on a daily basis, I often ask how they feel about cloud security. The reaction I get is usually mixed. Some love it, but a surprising number are very wary about it, and more than a few have resisted the move to the cloud because they do not trust the security.

Security Breaches
06/06/2011

If you have not yet checked to see if your email address and password are now public knowledge, it would be a good idea to take a couple of minutes to make sure your information was not compromised in the past few days. One thing is certain: Seldom have events supplied a more compelling argument for following basic security measures.

Lockheed-Martin Hacked
06/01/2011

The network of defense contractor Lockheed-Martin was attacked using counterfeit electronic keys. Since the RSA Security network was hacked and the keys to its SecurID tokens were compromised a few months ago, the world has been waiting for the proverbial other shoe to drop. Well, it dropped.

Google Wallet Security Has a Weakness
06/02/2011

Google unveiled details of Google Wallet this week. Google Wallet is an ambitious mobile payment plan designed to let your Android smartphone be your wallet, but you should consider very carefully just how secure your credit card data will be in Google Wallet.

Do not get me wrong, Google understands the inherent security risks of storing credit card information, and it has gone to great lengths to ensure sensitive data is protected in every way possible. But, at the end of the security chain is an authorized Android app, and that is the Achilles heel of Google Wallet security.

Cloud Security
06/02/2011

Cloud Security Lie #1

The first big lie is that private cloud computing is, by definition, secure merely by way of the fact that it is deployed within the boundaries of a companys own data center. This misunderstanding arises from the fact that cloud computing contains two key differences from traditional computing: virtualization and dynamism.

Cloud Security Lie #2

The second lie about cloud computing security relates to assumptions about public cloud security, specifically, the assumption that security in public cloud computing rests solely with the CSP. The reality is that security in a service provider world is a responsibility shared between the provider and the user, with the former responsible for security in the infrastructure up through the interface point between application and hosting environment, and the user responsible for security with respect to interfacing with the environment, and importantly, within the application itself.

Microsoft Security Essentials
06/01/2011

In these tough economic times, everyone is trying to cut corners and get more for their money. Two free applications for Windows will help protect your computer from viruses and malicious software.

The first application is called Microsoft Security Essentials or MSE. MSE is a free antivirus software created by Microsoft. It provides protection against different types of malicious software like computer viruses, spyware, and phony programs that pretend to be useful applications but really steal your personal information.

Iris Scanners
05/31/2011

The best security technology available that would give the TSA an alternative controversial body scanners is already in use worldwide -- just not here in the U.S.

And it will not be here any time soon, either.

Thanks to privacy concerns and infrastructure issues, iris scanners are not planned for the U.S., a DHS spokesman told FoxNews.com. Airports and security checkpoints could use the machines, which take an instant picture of the eyeball from a few feet away and compare it against an internal database, in the hunt for terror suspects or illegal immigrants.

Bank Security in Pakistan
05/30/2011

The State Bank of Pakistan has asked banks to adopt minimum security standards to ensure safety, security and maintenance of e-banking transactions.

Banks must design fool-proof data security processes and SBP has issued various guidelines on critical subjects pertaining to operational continuity and data security and safety, said SBP Deputy Governor Yaseen Anwar.

New Malware on Android
05/30/2011

New malware has appeared on Googles Android marketplace, under the guise of legitimate apps.

Users are duped into downloading the malicious code, which has been found in apps with names such as iBook, iCartoon and ShakeBanger.

The code is designed to send SMS messages in order to subscribe to paid services without the knowledge of the handset owner.

The SMS Trojans were discovered by security company AegisLab, which released the news via its blog this week.



Current Blog

2011 Security Blog Archive

June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.