Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Bank Security in Pakistan
05/30/2011

The State Bank of Pakistan has asked banks to adopt minimum security standards to ensure safety, security and maintenance of e-banking transactions.

Banks must design fool-proof data security processes and SBP has issued various guidelines on critical subjects pertaining to operational continuity and data security and safety, said SBP Deputy Governor Yaseen Anwar.

New Malware on Android
05/30/2011

New malware has appeared on Googles Android marketplace, under the guise of legitimate apps.

Users are duped into downloading the malicious code, which has been found in apps with names such as iBook, iCartoon and ShakeBanger.

The code is designed to send SMS messages in order to subscribe to paid services without the knowledge of the handset owner.

The SMS Trojans were discovered by security company AegisLab, which released the news via its blog this week.

Great PowerPoint Presentation Tips
05/24/2011

When speaking at a conference or a seminar, it is important that your presentation convey professionalism. A PowerPoint presentation can be used to visually represent your material. The presentation should be polished and consistent throughout. The visual presentation should supplement your speech, not distract or detract from your oral presentation. Rarely should PowerPoint be used without an accompanying explanation of the slides. Here are a few tips for making your PowerPoint presentation better and more professional...

Great PowerPoint Presetnation Tips

More Facebook Security
05/23/2011

Facebook added two factor authentications, anti-cross-site scripting detection, CAPTCHA prompts to stop clickjacking and safe Web link surfing to protect user accounts.

Facebook rolled out three new security measures to try to prove that it cares about user privacy.

The social networking site now features two-factor authentication to secure the login process, a secondary step to thwart clickjacking scams and a new surfing tool to rate the safety of links, Clement Genzmer, a Facebook security engineer, wrote on the Facebook Security blog that appeared May 12. Clickjacking refers to tricking users into clicking on links that post on the Wall to get more people to click and is one of the most common sources of spam on Facebook.

Facebook Security
05/16/2011

Facebook announced a new, two-factor authentication system whereby the social-networking site will require users to enter a code they receive via text message.

The system, dubbed Login Approvals, will prevent users from signing in unless they can provide that code and authenticate their device.

Enhanced Cyber Security
05/21/2011

President Obama released his plans for protecting the security of the nations computer networks Thursday, and the striking thing about them is how little the White House actually proposes to do. That is for the best €” a top-down, government-led cybersecurity initiative would probably prove clumsy, intrusive and quickly outdated. The presidents most useful contribution in this area is to encourage network operators to protect their own systems, and then get out of the way.

Obama called for tougher penalties for attacks on computer systems, proposed incentives for companies to improve their security, and said the Department of Homeland Security should have the authority to review the adequacy of private network security systems.

Obama Tightens Security on Grandmother
05/20/2011

Kenya tightened its security around President Barack Obamas step-grandmother after the killing of Osama bin Laden by U.S. forces put the country on alert.

Five Things to Do Before Buying More Security Technology
05/20/2011

Companies that take a step back, review risks, identify and rank their data and develop a plan for dealing with foreseeable problems will wind up with better and more efficiently deployed defenses, he says, and outlines five steps to take:

€ Develop an information risk profile for the business. This includes finding out what data has what value to the company, what's acceptable loss, how loss affects partners and suppliers, what controls will be needed and the like.

€ Map business processes and track how data moves through those processes. Determine whether data can be handled more efficiently. For example, central databases rather than distributed databases can reduce network complexity and therefore improve security.

€ Asset inventory to determine where all the corporate data is. This may be surprising, Pironti says, because it can wind up on devices like employee-owned smartphones and tablets. Classify the data and establish controls for each class.

Popular Dropbox Dealing with Security and Privacy Issues
05/19/2011

Privacy issues relating to your data stored in the cloud are going to always be with us as long as we have data stored in the cloud. But then again, privacy issues when everyone had their data stored on local hard drives and networks were and are still an issue. There are many ways to look at this. You can always be shocked and amazed that what you thought was secure is not really. You can accept it as a fact of life that the cat and mouse game that is played by those who like to hack and crack systems for their own game and those who work to stop them will always go on. You can, legitimately, get upset when a company that promises secure storage does not really offer what they claim to.

Dropbox, the almost ubiquitous cloud storage and sharing service, has suffered some hits of late when it comes to data security and how it markets its service.

Seal Team Security
05/18/2011

Seals hit team fears for kin safety, security  is being discussed.

Security in the Cloud
05/18/2011

Todays enterprises, in addition to buying hardware and software to build their computing environments, also carry the burden of securing them. Security vendors provide them with a patchwork of security solutions that integrate poorly, and are difficult and costly to deploy and maintain. They also rely on infrastructure and application vendors to provide patches to remediate vulnerabilities found in the wild.

Now, with the ever increasing need to connect directly and digitally with customers and suppliers and the rapid pace of technical innovation, the task of maintaining the security and compliance posture of ones network has become a daunting, one could even say impossible, task.

Federal Government Recruiting Cyber Security Job Candidates
05/17/2011

While many Americans worry about terrorists attacking transportation systems or national landmarks, experts say the more likely target is at their fingertips.

With more and more people, businesses, and government agencies conducting their business online, cyberspace has become especially tantalizing, and protecting it, increasingly urgent.

This week, the White House released its cybersecurity plan, and Congress has been debating several bills for years. It is complex, and the debate is not likely to end soon. But supporters hope that eventually, there will be clear, standardized protocols in the event of an attack, and better strategies to reduce cyber threats.

As the Department of Homeland Security seeks to broaden its authority over cybersecurity, it is set aside $24-million to train scientists, engineers and analysts, and create a diverse workforce of high tech and policy professions to help protect the nation's digital border.

UN Women Focus on Peace, Security and Women
05/16/2011

This year, a new international agency came into being that is bolstering the fight to for global gender equality, UN Women. It brings under one roof several other UN bodies that for decades had focused on improving living standards, legal rights and health care, including the United Nations Development Fund for Women, the International Research and Training Institute for the Advancement of Women, and the Division for the Advancement of Women.

Among the new agencys goals:  helping inter-governmental bodies like the U.N. Commission on the Status of Women to formulate policies and global standards; and helping member states, as well as the UN itself, to implement them.

Sharing Your Private Data
05/15/2011

You probably do not realize it, but every time you turn on your mobile phone, the device knows where you are and may be telling someone else. That situation spurred lawmakers on Capitol Hill today to asksome tough questions of Google and Apple executives. As Darren Gersh reports, senators are concerned about how you phone is sending out data and who is getting it. Your mobile phone can help you find your way, tell you where the best pizza is and it can tell an advertiser exactly where you are, even if you would rather they did not  know. Which is why Minnesota Senator Al Franken is so concerned about protecting mobile privacy.

Secure Communities
05/08/2011

A program of the Department of Homeland Securitys Immigration and Customs Enforcement division where local police agencies submit to the FBI the fingerprints of all suspects they detain. The fingerprints are then sent on to immigration officials. Some communities in California and elsewhere have expressed concerns that the program would link their police departments with immigration enforcement and undermine the trust they have built within their communities.

Sony Sued Over Security
05/07/2011

Sony are being sued in the United States, with separate cases filed in California over the last few days.  Both cases are accusing Sony of being negligent by breaking its contract with users, and are seeking damages and class-action status.

Both the PlayStation network and the Qriocity music service have been turned off by Sony, following an external intrusion that managed to breach internal security and access the customer records of almost 77 million people.

Gaming the Border Fence
05/07/2011

After spending $1 billion on a virtual border fence that it does not plan to complete, the Department of Homeland Security is investing another $1.6 million to test video game technology to help improve its decisions on where to spend its border security funds.

In January, citing missed deadlines and cost overruns, the Obama administration scrapped the virtual border fence project, which was a system of sensors, radar, video and other technology as a way of spotting illegal immigrants crossing over.

France In Charge of Security Counsel
05/06/2011

France took over the presidency of the UN Security Council on Sunday playing a central role in the international campaign against Libyan leader Moammar Gadhafi and with a new crisis to handle in Syria.

The 15-nation council could not agree a statement condemning the violence in Syria and is increasingly divided over Libya, with Russia, China and India blocking new sanctions against Kadafi's entourage, diplomats said.

Human Error Caused Security Breach
05/05/2011

State Comptroller Susan Combs says human error and not malicious intent lies behind her offices exposing of the personal information of 3.5 million Texans.

Addresses, Social Security numbers and some birth dates and driver's license numbers have been placed on a publicly accessible comptrollers office computer server for nearly a year - and in some cases even longer.

Russia May Exercise Veto
05/04/2011

Russia has signaled that it can leverage its veto in the UN Security Council to entrap NATO in a protracted conflict in Libya. On April 26, Foreign Affairs Minister, Sergei Lavrov, told the media that Russia would not support a new Security Council resolution, if this leads to further escalation of the civil war and further interference from the outside in Libya. However, Moscow would support a resolution calling for an immediate ceasefire, a stop to all violence, and for the two Libyan sides to start negotiations immediately.

Cyber Worries
05/03/2011

The U.S. Department of Justice has issued a report critical of the Federal Bureau of Investigations ability to address threats to national security posed by cyber intrusions. The two main objectives of the audit were to evaluate FBI efforts in developing and operating the National Cyber Investigative Joint Task Force ( to address the national security cyber threat, and to assess the capability of FBI field offices to investigate national security cyber cases.

Security Option For Android Smartphones Reviewed
05/03/2011

Many people do not worry much about malware infecting their smartphone. But the recent discovery of over 50 infected apps in the Android Market, which may have struck tens of thousands of users, could lead some people to consider the merits of security apps for their phone.

CCTV Surveillance Helps Restaurants, Pizzerias and other Eateries Save Money
05/02/2011

Recent statistics analysis show that the urban businesses and also eateries such as pizzerias, ice cream parlors, coffee shops and even traditional restaurants are the ones most advantaged by having surveillance cameras or security systems installed. Moreover, it seems that owning any kind of eatery business and having surveillance cameras installed is the new trend for those who want their enterprise to see the fastest growing profit rates. Entrepreneurial experts say that a business has nothing to lose, but, on the contrary, everything to gain from investing in a CCTV surveillance system.

The method through which CCTV surveillance cameras help companies save money works on three flanks at once. First of all, the productivity of the employees will be maximized as they know they are not allowed to waste time even in the absence of a manager or supervisor. Secondly, the inventory losses will be minimized or completely eradicated.

Personal-Safety GPS Device is a Security Risk
05/01/2011

After thieves tried several times to steal a friend's car, Don A. Bailey bought a Zoombak personal GPS Locator device so that if the thieves ever succeeded, the cars owner would be able to track its whereabouts and get it back.

He never got to try it out on a theft, but Bailey hacked the device and learned that by exploiting security weaknesses in it, he could monitor the movements of a known device, impersonate it to the Zoombak tracking system, and even look for devices in his immediate vicinity to target.

The potential for abuse is not insignificant given that the device is marketed as a safety device--a way to keep track of the whereabouts of things that people might steal or harm, like cars, bikes, pets, and even children.

Russian Cyber Security Moguls Son Kidnapped
04/30/2011

The son of the founder of one of the worlds largest cyber security firms, Russias Kaspersky Lab, has been kidnapped, according to a Russian news report.

The original report, published by the Russian language website Life News, said the 20-year-old Moscow University student and son of multi-millionaire software developer Evgeny Kaspersky was abducted Tuesday and kidnappers were demanding 3 million Euros for his release.

In a statement on the company website, Kaspersky Lab did not deny reports of Ivan Kaspersky's kidnapping, but asked the media not to speculate on the case.

Russian Big Brother Rocked By Explosion
04/29/2011

A mysterious explosion rocked the location for filming of the hugely-popular Russian equivalent of reality television show Big Brother.

The explosion wounded one security guard, local reports said.

Security guards uncovered a suspicious backpack placed just inside the perimeter fence during their morning round, and the blast went off when they tried to move it, the ITAR-TASS news agency reported.



Current Blog

2011 Security Blog Archive

May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.