Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
How Will Linked In Security Issues Effect Social Media
06/25/2012

After hackers last week breached the LinkedIn site, stealing more than 6 million user passwords, analysts are debating whether the attack will cause long-term damage to the social network.

In the attack, users passwords were posted publicly to a Russian hacker forum. The incident garnered a lot of headlines, both in the trade and mainstream news media, and LinkedIn was accused of using lax security and having nothing more than light encryption to safeguard its users' data.

Many companies besides LinkedIn suffer security breaches. What's causing the furor over the LinkedIn breach is that the company makes its name and its money from user data, yet it failed to take what security experts would call adequate steps to secure its bread and butter.

Critics accuse the company of failing to protect its users. Will users stand by their social network or will they flee?

Bad Advertising Ban
06/24/2012

So it is that Google and Facebook, along with AOL, Twitter, and the Internet Advertising Bureau  on Thursday joined with StopBadware to announce the formation of the Ads Integrity Alliance, an industry partnership to fight bad advertising.

Bad advertising includes malvertising--malware delivered via ads--and ads that deceive or violate policies.

The Ads Integrity Alliance aims to serve three primary functions: developing and sharing industry best practices; coordinating information sharing about those attempting to abuse online ad systems; and sharing trend data with regulators and law enforcement agencies.

Bosses Find Security Boring
06/23/2012

How significant and urgent are the various threats to a companys infrastructure from security problems? It depends who you ask. A survey out today by Core Security, a company that specializes in software that predicts security problems, suggests there is a rather wide gulf of concern between the chief information security officer and the CEO.

The survey checked the opinions of 100 CEOs and 100 CISOs, or other C-level execs with responsibility on security matters. Among the highlights: 36 percent of CEOs said they never hear from their CISO about the state of the organization’s security, and only 27 percent get reports on the subject on a regular basis.

Rising Security Risks
06/22/2012

nemployment is not often associated with national security risk, but it is increasingly becoming a concern for intelligence agencies attempting to map out the likely socioeconomic impacts of rising unemployment in Europe. We define national security to mean the security and preservation of the state from internal and external risks, as well as the preservation of the character and integrity of the existing order. It is becoming increasingly clear that the continued deterioration of numerous European economies is having, and will have, growing impact on the national security of Europe as a whole.

Since the 1960s, several studies have examined the links between an increase in crime on a local or national level, and unemployment, which can serve as the catalyst for a gradual erosion of the social fabric of societies.

Immigration Security Changes
06/21/2012

Secretary of Homeland Security Janet Napolitano announced that effective immediately, certain young people who were brought to the United States as young children, do not present a risk to national security or public safety, and meet several key criteria will be considered for relief from removal from the country or from entering into removal proceedings. Those who demonstrate that they meet the criteria will be eligible to receive deferred action for a period of two years, subject to renewal, and will be eligible to apply for work authorization.

Security Issues at Edison
06/20/2012

Federal regulators have uncovered security problems at Edison International's troubled San Onofre nuclear plant on the California coast that could result in violations.

San Onofre has been closed for more than four months because of excessive wear on some equipment. It is operated by owner Southern California Edison, which is a unit of Edison International.

A Nuclear Regulatory Commission statement Thursday said inspectors reviewed records, observed activities and interviewed personnel during an inspection in May.

Facebook Wants Phone Number
06/19/2012

Facebook is trying to avoid a security meltdown. And they want your personal phone number to aide the process.

Some users may have already brushed off the notice at the top of their desktop news feed telling them to Stay in control of your account by following these simple security tips. But those who click the link are brought to the Facebook Security Tips page, which includes details about how to spot a scam, choose a unique password, and confirm a mobile number.

Bagdad on CCTV
06/18/2012

Iraqs fragile coalition government is pinning its hopes on a network of closed-circuit television CCTV cameras to show it can bring some measure of security to Baghdad following the withdrawal of U.S. troops last December.

Some 13,000 sophisticated surveillance cameras are now being installed around the Iraqi capital as part of a $17 million project approved in February by the Baghdad provincial council.

LinkedIn Problem Will Persist?
06/17/2012

For a Web firm like LinkedIn, there is a fate worse than confessing to a massive security breach: Failing to detect an ongoing one.

Hours after reports surfaced Wednesday that LinkedIn had suffered an intrusion by Russian hackers who leaked 6.5 million of the sites passwords, Linkedin has yet to confirm that it is either found or remediated the problem.

Microsoft Security Fixes
06/16/2012

Microsofts June batch of security patches will include critical fixes for dangerous security holes in the Windows operating system and the Internet Explorer browser.

According to advance notice from Redmond, a total of 7 security bulletins will be released to address at least 28 documented vulnerabilities in Microsoft Windows, Internet Explorer, Visual Basic for Applications, Dynamics AX, and the .NET Framework.

Security Provider IPO
06/16/2012

Cloud security provider Qualys Inc filed with U.S. regulators to raise up to $100 million in an initial public offering of its common stock.

Crypto World Class
06/15/2012

According to Stevens, a crypto-analyst at the Centrum Wiskunde and Informatica  in Amsterdam, Flame uses a type of attack that has never been seen before. Flame uses a completely new variant of a 'chosen prefix collision attack' to impersonate a legitimate security update from Microsoft. The design of this new variant required world-class cryptanalysis, he said, in a published analysis.

More Facebook Security
06/14/2012

Facebook on Thursday unveiled several app updates that boost the social networks security features on mobile.

The additions are intended to make it easier to confirm logins, report unwanted content, and lock down your device in the event of a breach.

Up first is Code Generator, which is part of a two-factor authentication system unveiled in May 2011 that requires users to enter a code sent via text message before logging in to their accounts. But the system did not work if you had issues receiving texts or were in an area with poor reception.

TSA Suspensions
06/14/2012

The head of federal security at Southwest Florida International Airport was one of the 42 Transportation Security Administration workers disciplined last week after an internal investigation found hundreds of random screenings were not performed last year, TSA Administrator John Pistole said Thursday.

Nairobi Security
06/13/2012

Security has been intensified around the city following heightened terror threats by Al Qaeda-linked Al Shabaab who have threatened to bring down Nairobis skyscrapers.

Most major buildings have increased security screening for people entering the buildings and vehicles.

A spot check by Capital FM News revealed that high rise buildings had deployed extra security checks all around the city, including government buildings like Nyayo House.

Password Perfection
06/12/2012

So far, 6.5 million users of LinkedIn and 1.5 million eHarmony subscribers had their password hashes uploaded to a hacking forum on the InsidePro website, although security experts suspect that many more accounts may have been compromised.

Needless to say, all three sites have recommended that every one of their users change their password on the site--just in case. But what is the best type of password to pick? Here are 7 best practices:
1. Pay Attention
2. Unique
3. Explore Life Beyond Letters
4. Use Uncommon Patterns
5. Lose The Biographical Details
6. Longer
7. Use Password Managers

Mynamar Unrest
06/11/2012

Myanmar sent troops and naval vessels to the western state of Rakhine on Saturday after seven people died in the worst fighting in years between minority Muslim Rohingya and Buddhists.

A senior government official said hundreds of Rohingya had rioted on Friday in Buddhist communities and an overnight curfew had been imposed in Maungdaw Township.

It was not clear what had sparked the unrest but the western region has been tense for days after reports of the gang rape and murder of a Buddhist woman blamed on Muslims and the reprisal killing last Sunday of 10 Muslims.

Reuters reporters and local residents saw up to four planes carrying soldiers land at Sittwe airport on Saturday.

Security Leak Probe
06/10/2012

U.S. Attorney General Eric Holder has assigned two federal prosecutors to lead investigations into recent leaks of classified government information.

The two attorneys will be directing separate investigations currently being conducted by the FBI.

What is Fair Use?
06/07/2012

As the Internet matures, users and governments are struggling to manage controversial issues. Lets face it, the Internet did not exist when the US copyright laws were written;let us not forget, while many countries respect copyright laws, the Internet is global without a governing body. There are not only different laws, rules and regulations, but also jurisdiction issues. RSS did not exist when copyright laws were written either. While ardent supporters feel any content in a feed can be syndicated, other equally fervent publishers contend that original works are just that--original works, and in many countries protected by copyright laws.

What is Fair Use?

Benefits of Shopping Online
06/06/2012

Why buy online? Why not buy online? Have you ever considered the pros and cons to shopping at a retail store vs shopping online? Lets take a look at the advantages and disadvantages of purchasing online...

Advantages Of Shopping Online...

1. Saves Time

If you already know what you're looking for, shopping online can save you a significant amount of time. With just a few clicks of the mouse, you can place your order and move on to other things.

Benefits of Shopping Online

Questioning Credibility Online
06/05/2012

Credibility online is becoming more and more of an issue. Anyone can have a blog or post to a forum and anyone can edit wiki entries. Web surfers are beginning to comprehend that just because it is in print does not necessarily mean that it is true. In fact, in today's online world, the collective truth might be the closest thing we can get to the real truth. Peer policing and social bookmarking have become common in the online world.


Questioning Credibility Online

How to Choose a Domain - Part 2
06/04/2012

Here are some other things to pay attention to when selecting domain names...

1. Domain Extensions
Many webmasters wrestle not only with choosing the best domain name, but also with the decision of what domain extensions to select for their website. The following is a general guide to what the most popular domain extensions represent...

How to Choose  a Domain - Part 2

IRS an ATM for Fraud
06/03/2012

For identity thieves, the Internal Revenue Service is like an ATM. They file a fraudulent income tax return using someone elses Social Security number and quickly receive a refund.

But for the victims of the scheme, the wait to get the money that is rightfully theirs can be as long as 18 months.

A growing number of South Floridians who are victims of tax-related identity theft are turning to their U.S. senators and congressmen for help, and their refunds are being expedited.

Competitive Intelligence
06/02/2012

Some companies compete by getting into the minds of their competitors. Competitive Intelligence is the process of collecting information about competitors in a competitive environment. These tips and tricks will help marketers better understand competitive intelligence, and how to effectively compete in their marketplace.

Individuals and companies use a variety of methods to gain information about their competitors. Some methods are controversial, and may even be considered unethical, but it is important that you are aware of them. Even if you do not want to use the questionable tactics yourself, it is important that you and your staff understand them, so you can be prepared and protected if your competitors decide to use them to learn your company strategies or secrets.

Competitive Intelligence

Security and SmartPhones
06/01/2012

Research in Motion has said the security of its smartphones is superior to that of its competitors phones. But companies specializing in security tools for Apples iOS and Google’s Android systems may give businesses another reason not to buy a BlackBerry.

Online Reputation Protection
05/31/2012

Google is sometimes thought to be the bane of the Internet, and it certainly can be a thorn in the side of search engine marketers. Many fail to look beyond the search of today, toward what the implications of indexing and storing information will have on future generations. Forget the slogan diamonds are forever -- Google is forever is more accurate in regard to the Internet. And if not Google, then some other search giant will be able to retrieve information from previous years within a few seconds. If something is online, it does not just "go away". Like it or not, the entire world is being indexed and categorized, and will be searchable for years to come.

Online Reputation Management

Cyber Security Intelligence
05/30/2012

The Department of Defense is expanding a program aimed at increasing the sharing of security intelligence between the Pentagon and critical infrastructure companies.

The Pentagon is expanding a cyber-security program meant to promote information sharing between the private and public sector.

In partnership with the Department of Homeland Security, the Department of Defense announced on May 11 that it is expanding its Defense Industrial Base Cyber Security/Information Assurance Program  to all eligible companies.

The goal of the program is to improve network defenses and reduce potential damage to critical programs when defense information is compromised.  As part of the program, the DoD shares information with companies handling DoD data that they can review or act on to improve security.



Current Blog

2012 Security Blog Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.