Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Protect Your Small Business from Cyber Criminals
06/26/2013

While many small business owners take measures to keep their physical office secure, unprotected company data stored on a computer poses a grave threat - and that data is getting more and more difficult to shield. Cybercriminals are increasingly targeting American small businesses.

According to Symantec.coms 2013 Internet Security Threat Report, companies with one to 250 employees were the victims of more than 30 percent of all cyberattacks last year, up from about 18 percent in 2011. And while 77 percent of small business owners surveyed by Symantec said they think their company is protected against cybercriminals, 83 percent of respondents lacked any official security plan.

Cloud Security
06/24/2013

At a time when privacy and hacking are at the center of a national debate, and concerns over cyber threats are ever-mounting, email security in the cloud is not something to be taken lightly.

Private cloud company Intermedia should know—as the largest provider of business email in the cloud, it is accountable for more than 600,000 email users security. President Michael Gold says their advantage is providing small and medium-sized businesses with trusted protection they just can not obtain doing this on their own.

How to Protect Small Business
06/23/2013

While many small business owners take measures to keep their physical office secure, unprotected company data stored on a computer poses a grave threat – and that data is getting more and more difficult to shield.

Cybercriminals are increasingly targeting American small businesses. According to Symantec.coms 2013 Internet Security Threat Report, companies with one to 250 employees were the victims of more than 30 percent of all cyberattacks last year, up from about 18 percent in 2011. And while 77 percent of small business owners surveyed by Symantec said they think their company is protected against cybercriminals, 83 percent of respondents lacked any official security plan.

Is it Time for DHS to Go Away?
06/19/2013

The surveillance state is even bigger, and scarier, than we thought.

And, as a result, it's time that we broke up the failed national security experiment known as the Department of Homeland Security.  Returning to dozens of independent agencies will return internal checks-and-balances to within the Executive branch, and actually make us both safer and less likely to be the victims of government snooping overreach.

Knowledge of Prism
06/18/2013

This week, The Guardian and The Washington Post reported on the existence of a secret program known as PRISM through which the NSA has gained access to the personal data of millions people using a host of communications services run by major American technology companies including Microsoft, Yahoo, Google, Facebook, Apple, and AOL, which owns The Huffington Post.

The Guardian also reported this week on the existence of a secret court order compelling Verizon to turn over phone call records to the NSA, including the date, location and duration of calls.

Senior government officials, including President Obama, acknowledged and defended the existence of the domestic surveillance programs. James Clapper, the director of national intelligence, said Friday that PRISM cannot be used to intentionally target any U.S. citizen, or any other person living in the United States.

Verizon refused to confirm or even comment on the court order in its case. But the cluster of Internet companies said to have actively participated in the PRISM program, in sharp contrast, forcefully denied any involvement, with some specifically saying they had no knowledge of it.

Border Security a Concern
06/17/2013

Many pundits assumed that this would be the year that comprehensive immigration reform became law. The conventional wisdom was that President Obamas re-election and his strong showing among Hispanic voters would force Republicans to go along.

Now, halfway through the year, the prospects for immigration reform have dimmed significantly.

Americans overwhelmingly feel that legal immigration is good for the country and think highly of immigrants. Some 76 percent have a favorable view of immigrants who work hard, support their families and pursue the American Dream. Most (55 percent) still support the concept of comprehensive reform that will secure the border and legalize the status of many of those currently in the country illegally.

How to Shield Communication from Big Brother
06/16/2013

If you have followed the startling revelations about the scope of the U.S. governments surveillance efforts in recent days, you may have thought you were reading about the end of privacy. But even when faced with the most ubiquitous of modern surveillance, there are ways to keep your communications away from prying eyes.

On Thursday, the Washington Post and the Guardian revealed a top-secret National Security Agency program called PRISM, which reportedly involves mining private data from the servers of companies including Google, Microsoft, Facebook, AOL, and Yahoo. The tech giants have denied participating in the program—but according to a leaked set of NSA slides, PRISM involves the monitoring of emails, file transfers, photos, videos, chats, and even live surveillance of search terms.

Separate disclosures have revealed that the NSA is scooping up millions of phone records from at least three major phone networks in the United States, using the data as part of program the White House says is aimed at finding terrorists.

Not every communication can be tracked and eavesdropped on by the government, however, and there are ways to reduce the chances of being snooped on. First, instead of browsing the Internet in a way that reveals your IP address, you can mask your identity by using an anonymizing tool like Tor or by connecting to the Web using a Virtual Private Network. Additionally, you can avoid Google search by using an alternative like Ixquick, which has solid privacy credentials and says it does not log any IP addresses or search terms or share information with third parties.

When it comes to sending emails, if you are using a commercial provider that has been linked to the PRISM spy initiative, you can throw a spanner in the NSAs works by learning how to send and receive encrypted emails. PGP or its free cousin GPG are considered the standard for email security, and these can be used to both encrypt and decrypt messages—meaning you can thwart surveillance unless you are unlucky enough to have Trojan spyware installed on your computer.

Security Sources Drying Up for Reporters
06/14/2013

In conversations with POLITICO, national security reporters and watchdogs said they already have seen increased caution from government sources following revelations that the DOJ had subpoenaed Associated Press reporters' phone records and tracked the comings and goings of Fox News reporter James Rosen at the State Department.

I had one former intel officer say, I hope you are buying 'burner' phones for your sources,'but I think he may have been pulling my leg, said David Ignatius, the Washington Posts national security columnist.
Reporters on the national security beat say it's not the fear of being prosecuted by the DOJ that worries them - it's the frightened silence of past trusted sources that could undermine the kind of investigative journalism that Obama was talking about.

NSA Spying on America
06/13/2013

Public disclosure of the federal governments effort to track terrorists through the telephone records of average citizens has reinvigorated a national debate over the balancing act between security and liberty.

A day that began Thursday with an uproar over the government trolling through Americans phone records ended with a new report about the government traipsing over their travels on the Internet. Taken together, they seemed sure to refocus Congress and its constituents on a debate that has waned since Sept. 11, 2001 — but never ended.

New Twitter Security
06/12/2013

Twitter introduced its secure two-factor option earlier this week after an accelerating number of hijacks against high-profile and corporate users, including The New York Times, Associated Press, the BBC, and Burger King.

This allows account holders to choose that logins be authenticated using SMS codes sent to mobile handsets in addition to the passwords that have proved so vulnerable to compromise.

Although the move has been welcomed as a necessary step in the right direction, some have reservations about its practicality and long-term security.

Stronger Border Security
06/11/2013

The Republican Sen. Marco Rubio, a key author of the bipartisan Senate immigration overhaul, is working on a proposal that would give Congress, not the Obama administration, the authority to devise a plan to bolster border security.

The Florida senator has long insisted that the bills border security provisions are not strong enough to win significant Republican support. He plans to introduce his proposal as the legislation moves to the Senate floor late this week or next.

Theme Park Security
06/10/2013

When a senior citizen and her grandson visiting Orlando climbed aboard the Dinosaur dark ride at Disney World's Animal Kingdom last Sunday, they were on the hunt for a thrill or two.

What they weren't expecting to find: A loaded gun, lying on the seat next to them.

The Cobra .380-caliber semiautomatic pistol was soon claimed by its owner, a Florida man who told park security that the weapon had fallen out of his pocket during the ride. Angelo Lista, 44, of Royal Palm Beach, who had a legal concealed weapons permit, was immediately escorted out of the park.

Bacon a Security Risk?
06/09/2013

Americans do love their bacon, but is that romance a national security issue?

Maybe.

This week, Chinas biggest pork producer announced plans to buy Virginia-based Smithfield Foods Inc. Republican Sen. Charles Grassley of Iowa wants a national security review by an interagency panel known as the Committee on Foreign Investment in the U.S., or CFIUS.

Chinese Cyber Attacks
06/08/2013

Defense Secretary Chuck Hagel pointed the finger at China Saturday when addressing cybersecurity threats, the latest in a series of rhetorical skirmishes between the United States and China on the issue.

Speaking to an audience of defense professionals at a regional security summit in Singapore, Hagel said the United States was concerned about the growing threat of cyber intrusions, some of which appear to be tied to the Chinese government and military.

Even as he singled out China, Hagel added that United States was determined to work more vigorously with China in order to address the problem.

Apple Security
06/07/2013

In March, Apple unveiled a two-step verification process for digital purchases and password resets to help improve the security of users information. However, according to the computer security company Elcomsoft, Apples two-step authentication process is less secure than the two-step login process used by Google and Microsoft.

This relatively new feature is supposed to add another layer of security by requiring a 4-digit verification code every time a user logs in to the My Apple ID webpage. The additional verification passcode is then sent to a device that the user selects through Apples Find My Phone app.

Lone Wolf Terrorism
06/07/2013

A country-by-country study of trends in terrorism finds unilateral and lone wolf threats rising alongside state-sponsored acts, according to findings released Thursday by the U.S. State Department.

The 200-page study, Country Reports on Terrorism 2012, includes a strategic assessment, a survey of counter terrorism efforts and reviews of what researchers believe are state sponsors of terrorism, terrorist safe havens, and foreign terrorist organizations.

Belmont Stakes Security
06/06/2013

The New York Racing Association has revised its security policies for Saturdays Belmont Stakes.

All who enter Belmont Park that day will be subject to an electronic wand search at admission gates. All items carried into the track are subject to search by NYRA security and law enforcement partners.

Among the banned items are umbrellas, coolers, backpacks and camcorders.

LinkedIn Security Improvements
06/05/2013

LinkedIn Corp unveiled technology to improve the security of the social networking site for professionals, about a week after Twitter introduced similar tools following a surge in high-profile attacks on its users.

The optional service, known as two-factor authentication, is designed to verify the identity of users as they log in by requiring them to enter numeric codes sent via text message.

LinkedIn introduced the service on Friday, about a year after a highly publicized breach that exposed passwords of millions of its users. Some security experts criticized LinkedIn at the time, saying the firm had failed to use best practices to secure its passwords.

Cyber Wealth
06/04/2013

Cybercriminals are not the only ones cashing in on espionage and hacking attacks. There are a slew of smaller security software companies that are also poised to rake in profits as cyberthreats mount.

With cyberattacks continuing to bombard government agencies and companies, there's growing pressure to spend more on securing the networks and platforms where valuable information lives. And this bodes well for security companies—small as well as large, experts say.

Java Security
06/03/2013

Oracles plans to bolster Java security were welcomed by security experts who nevertheless wanted to see more done to lockdown one of hackers favorite targets.

The Java steward released on Thursday its priorities for the application platform. The changes on tap included automated checking of the validity of signed certificates, stopping unsigned applets from being executed by default and adding centralized management options. The latter included whitelisting of applets in enterprise environments.

Charm Offensive from China
06/02/2013

Senior Chinese military officials came ready to talk at a major regional security forum over the weekend, surprising delegates with a new sense of openness at a time when Beijing is making strident claims to territory across Asia's seas.

No one expected any resolution of disputes over maritime boundaries, accusations of Chinese cyber-espionage, Beijing's suspicions about the U.S. pivot to Asia or other prickly issues at the annual Shangri-La Dialogue in Singapore.

But the charm offensive by the People's Liberation Army officers, less than a week before Chinese President Xi Jinping meets U.S. President Barack Obama for an informal summit, appeared to be designed to tone down the recent assertiveness by emphasizing cooperation and discussion.

Bring Your Own Devices
05/30/2013

How can corporate data and personal data exist on a single smartphone? Companies do not want their deep secrets to get out, while employees do not want to be told how to use their precious mobile gadgets that they bought with their own money.

US Diplomat Detained
05/29/2013

A U.S. diplomat disguised in a blond wig was caught red-handed as he tried to recruit a Russian agent in Moscow, Russias security services announced Tuesday, claiming the American was a CIA officer.

Ryan Fogle, a third secretary at the U.S. Embassy in Moscow, was carrying special technical equipment, disguises, written instructions and a large sum of money when he was detained late Monday, Russias Federal Security Service said.





Current Blog

2013 Security Blog Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.