Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Australia Warns About Social Sites
05/30/2010

Australian police have warned teenagers about posting photographs of themselves on social networking sites such as Facebook after a young woman was allegedly murdered by an Internet friend.

Symantec and Verisign
05/30/2010

Symantec Corp.s decision to pay $1.28 billion to buy a division of VeriSign Inc. that sells security technology to websites highlights how quickly the companies are moving in opposite directions.

Symantec, best known for its antivirus software for personal computers, wants to secure more things.

With the VeriSign deal, announced Wednesday, Symantec will have spent nearly $3 billion in two years acquiring technologies that make it a bigger player in other parts of the security market, such as protecting data on mobile phones and delivering software over the Internet.

Encrypted Google Search
05/29/2010

Google launched a new beta service this week--encrypted search using SSL  to protect searches from being snooped or intercepted while traversing the Internet. Encrypted Google search is still not entirely private, but it has benefits for individuals and businesses to ensure sensitive information is not exposed to prying eyes.

Russian Company Invests in Facebook
05/28/2010

Russian Internet investment group Digital Sky Technologies, which bought a $300 million stake in Facebook last year, is preparing to buy stakes in dozens of well-known Internet companies, its chief executive said.

Online Privacy
05/27/2010

From Facebook to advertisers who may be putting your online identity up for sale to the highest bidder, and to strangers who could track you across town, new ways of using technology and the Internet are making privacy issues a flash point for controversy.

Software Industry Conference
05/26/2010

Come to the 20th Annual Software Industry Conference to learn more about marketing, business and software in the conference sessions, network with peers and vendors at the evening events and in the hospitality suites, and then return to work energized with new ideas and new approaches to old ideas, ready to take your online business to the next level.

The Software Industry Conference is July 15-17th in Dallas, Texas.

Warrior Gateway
05/25/2010

For young veterans returning from duty in Iraq or Afghanistan, the process of re-entering society can be daunting, especially if they have been injured or have struggled with mental health problems.

A new, free Web portal wants to help these warriors find the services they need in an environment they are comfortable in: the Internet.

Warrior Gateway is designed with Google Inc. and social media in mind to make its intended audience as comfortable as possible. Veterans returning from Iraq and Afghanistan, generally in their mid-20s, grew up with e-mail, keep in touch using Facebook and are familiar with online communities that stretch across time zones.

Internet Cafe Security
05/24/2010

Your internet cafe might be housing a potential security threat—called the Typhoid adware, it works in similar fashion to Typhoid Mary, the first identified healthy carrier of typhoid fever who spread the disease to dozens of people in the New York area in the early 1900s.

Security Exploit
05/18/2010

A just-published attack tactic that bypasses the security protections of most current antivirus software is a very serious problem, an executive at one unaffected company said.
Last week, researchers at Matousec.com outlined how attackers could exploit the kernel driver hooks that most security software use to reroute Windows system calls through their software to check for potential malicious code before it's able to execute.

Google Sues for Decision on Links to Copyrighted Songs
05/17/2010

Google is suing a blues music label to seek a declaration that it has not facilitated the illegal distribution of copyrighted songs by providing links in search results.

Nightmare Scenarios
05/16/2010

Cybersecurity experts from around the world meeting on ways to protect the Internet say they still have fears of nightmare scenarios in which attacks could cripple critical computer networks.

Buy, Sell and Value Websites
05/15/2010

So, you have built an empire on the Internet, and now it's time to move on. Well OK, maybe its not a full-blown empire, but it has taken substantial blood, sweat and tears to create, and you want to make sure you get a reasonable amount of money for all your efforts. Determining the value of a website can be tricky, because a number of factors can play a role. Factors involved in determining the resale value of a website include...

Buy, Sell, and Value Websites

Non Latin Domains
05/14/2010

Three Mideast countries have become the first to get Internet addresses entirely in non-Latin characters.

Domain names in Arabic for Egypt, Saudi Arabia and the United Arab Emirates were added to the Internet's master directories on Wednesday, following final approval last month by the Internet Corporation for Assigned Names and Numbers, or ICANN. It's the first major change to the Internet domain name system since its creation in the 1980s.

Registrations for websites to use those names are to begin soon. On Thursday, Egypt granted three companies approval to register names using the countrys new Arabic suffix.

Software Industry Conference
05/13/2010

Come to the 20th Annual Software Industry Conference to learn more about marketing, business and software in the conference sessions, network with peers and vendors at the evening events and in the hospitality suites, and then return to work energized with new ideas and new approaches to old ideas, ready to take your online business to the next level.

Governments Online
05/13/2010

A U.S. senator has introduced legislation that would require U.S. government agencies to post all public documents online in a free, searchable database.

Facebook Privacy Problems
05/12/2010

Stymied by a recent court decision regarding network neutrality, the U.S. Federal Communications Commission has decided to partially reclassify broadband as a common-carrier service so that it can forge ahead on net neutrality rules and its national broadband plan. And, as usual of late, Facebooks ongoing privacy issues garnered headlines as well -- we pared down the myriad choices to just a manageable handful.

Better DNS Security
05/11/2010

The industry bodies responsible for the root servers that underpin the Internet have claimed success in implementing its DNS Security Extensions DNSSEC to the last clusters. The deployment is the final step before implementing the security required to prevent DNS cache poisoning attacks on Internet addresses.

Is There a Cyberwar?
05/10/2010

Is there really a cyberwar going on? Some officials and computer security companies say yes, arguing that armies of hackers are stealing online secrets and using the Internet to attack infrastructure such as power grids.

However, some security analysts said at a conference last week that cyberwarfare is such a broadly used term that it might be hurting efforts by countries to agree how to cooperate on Internet security.

Computer Stress Syndrome
05/08/2010

Crashing machines, slow boot times, and agony dealing with technical support have Digital Age people suffering from Computer Stress Syndrome, a study available online Tuesday found

Fake Anti-Virus Epidemic
05/07/2010

Google said Tuesday that fake software security programs rigged to infect computers are a growing online threat with hackers tricking people into installing nefarious code on machines.

An analysis of 240 million Web pages by the Internet search giant during the past 13 months revealed that fake anti-virus programs accounted for 15 percent of malicious software it detected.

Chavez on Twitter
05/06/2010

Venezuelan President Hugo Chavez will soon join the ranks of politicians on the popular micro-blogging site Twitter, under the profile @chavezcandanga, Minister of Public Works Diosdado Cabello said.

Guilty College Student
05/05/2010

A college student who hacked into former Republican vice presidential candidate Sarah Palins e-mail account and posted some of its contents on the Internet was found guilty Friday.

After four days of deliberations, a federal jury found David Kernell, the 22-year-old son of a Democratic Tennessee state legislator, guilty of obstruction of justice, a felony, and unauthorized access of a computer, a misdemeanor.

Kernell was cleared of a wire fraud charge, and the jury could not agree on a verdict on a charge of identity theft.

Judge Thomas Phillips declared a mistrial on the identity theft charge but did not set a date for sentencing.

The obstruction charge alone carries a prison sentence of up to 20 years, while the misdemeanor count is punishable by up to one year in jail.

Privacy vs Profit
05/04/2010

Facebooks evolution from online club house to Internet powerhouse is raising fears that the social network is trading privacy for profit.

The California companys recent move to become omnipresent with software plug-ins that let peoples online communities follow them to any website is the latest iteration to raise hackles of privacy advocates.

Security vs Laws
05/03/2010

Without law enforcement, there is no law.
Without law, there is no justice.
Without justice, there is no security.
Without security, there is no freedom.
Without freedom, there is nothing to distinguish the United States of America from every other middling-poor debtor country in the world.
And that, in a nutshell, is why every American from sea to shining sea should be down on his or her knees thanking God for the Arizona legislature taking a courageous stand in favor of principle over politics.

Cyber Security Monitoring
05/01/2010

Federal government agencies will implement real-time data monitoring for cyber-security that will replace paper-based reports in instructions outlined in a memo from President Barack Obamas technology leaders on Wednesday, April 21.

The U.S. Department of Homeland Security will provide support as agencies automate the reporting of security data as required by the Federal Information Security Management Act FISMA.

Boot Camp for Cyber Defense
04/30/2010

If you are the kind of person who worries about the security of computer networks, you should know that the National Security Agency is worrying about it too.

Since Tuesday, the NSA has been conducting its 10th annual Cyber Defense Exercise, a competition that pits students from a series of military academies against each other--and against the competition's leaders at NSA--in a bid to see who has the best cyberdefense skills. The idea? To build and defend computer networks against simulated intrusions by the National Security Agency Central Security Services Red Team.

State Lax on Security
04/29/2010

A report from Minnesotas legislative auditor says state officials did not do enough to safeguard data in a system used to verify the citizenship of new employees.

The state stopped using Texas-based Lookout Services Inc. last December after private data like employee birth dates and Social Security numbers were too easily accessed on the companys website.



Current Blog

2010 Securty Blog Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.