Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Microsoft Opening Up
02/28/2008

Microsoft Corp. says it will publish more information about how its products work, a move that will help competitors do a better job of building Microsoft-compatible software products. This is a major shift for Microsoft.

Most Stolen Software
02/27/2008

The SIIA created a list of titles most pirated by companies last year. They include:

Symantec Norton AntiVirus
Adobe Acrobat
Symantec pcAnywhere
Adobe Photoshop
Autodesk AutoCAD
Adobe Dreamweaver
Roxio Easy CD/DVD Creator
Roxio Toast Titanium
Ipswitch WS_FTP
Nero Ultra Edition

The most frequently pirated software titles on the Internet last year were:

McAfee VirusScan
Symantec Norton AntiVirus
McAfee Internet Security Suite
Intuit TurboTax
Adobe Photoshop
Adobe Acrobat
Intuit Quicken Home and Business
Symantec Norton pcAnywhere
Symantec Norton Ghost
Adobe Creative Suite.

Hard Drive Causes Porn Scandal
02/26/2008

A pink MacBook, a computer repair shop, an internationally renowned actor, and eight female pop stars are at the center of what is being described as the biggest Internet sex scandal in China.

It all began last year, when Edison Chen, a star of Infernal Affairs--the movie that inspired Martin Scorseses The Departed, dropped off his custom pink MacBook at a repair shop. Then in late January, thousands of sexually explicit images began appearing on the Internet that showed Chen in rather compromising positions with eight of the regions most popular actresses and singers. Authorities say the images were illegally copied from the computer by repair technicians.

Anti-Virus Solutions
02/25/2008

The best anti-virus software is not free. Here are some fee based options, though they are discounted for a limited time:

Norton Anti-Virus - http://www.software-dod.com/2nd-chance-norton-antivirus.htm

BitDefender Anti-Virus - http://www.software-dod.com/2nd-chance-bitdefender-antivirus.htm

Computer Associates Anti-Virus - http://www.software-dod.com/2nd-chance-ca-antivirus-spyware.htm

NYC Bans Sex Offenders on Social Sites
02/23/2008

New York City prosecutors on last Tuesday endorsed the United States first proposed law to ban registered sex offenders from social networking sites like Facebook and MySpace, officials said.

The district attorneys from all five of the citys boroughs announced their support for New York state Attorney General Andrew Cuomo's proposal, which would ban thousands of the states sex offenders from communicating with minors online.

Computer Associates Looking for Beta Testers
02/22/2008

CA is seeking beta testers for the 2008 version of its Internet Security Suite Plus, its all-in-one application for protecting against viruses, phishing attacks, spyware, spam and other Web borne threats. The software bundles together CAs other products, including eTrust and the popular PestPatrol program (now known as CA Personal Firewall and CA Anti-Spyware, respectively).

Web Log Analysis
02/21/2008

Everyone who understands Internet Marketing will tell you to analyze your web logs... but what does that really mean? What particular things should you pay attention to when analyzing your web logs?

Web Log Analysis

Top 10 Viruses of 2007
02/20/2008

Top 10 Viruses for 2007

According to AVG global security strategist Larry Bridwell, the 10 viruses exhibiting the most staying power in 2007 are:
W32/Detnat
W32/Netsky
W32/Mytob
W32/Bagle
W32/MyWife
W32/Virut
W32/Zafi
W32/MyDoom
W32/Lovegate
W32/Bagz

Internet Security Business
02/19/2008

Business is taking off for a 20-year-old college student who founded an internet security company and the next big plug for his product will soon be here in the heart of Illinois.

Ricky Doyle says portcard.net does basic background checks for people who log onto social networking sites like myspace and facebook.
He says his site verifies the user by asking questions only they know the answers to.

Then it tags the users account on the social networking sites showing they've been approved by his company.

He says it helps increase safety on the internet- especially for teens.

The Web is Dangerous, Google Warns
02/18/2008

The Web is scarier than most people realize, according to research published recently by Google.

The search engine giant trained its Web crawling software on billions of Web addresses over the past year looking for malicious pages that tried to attack their visitors. They found more than 3 million of them, meaning that about one in 1,000 Web pages is malicious, according to Neils Provos, a senior staff software engineer with Google.

SIIA Goes After eBay
02/17/2008

Online auction giant eBay has been implicated in piracy lawsuits. The Software & Information Industry Association is suing several eBay sellers as part of its campaign to stop auctioning of pirated software.

The latest round of lawsuits marks the largest onslaught since SIIA launched its auction-site antipiracy program two years ago. It filed nine separate suits in the U.S. District Court for the Northern District of California on behalf of members Adobe Systems and Symantec.

iPhone Security Fix
02/14/2008

Apple last Tuesday issued an update for iPhoto 08 that includes a security vulnerability fix.


iPhoto 08 7.1.2 addresses a flaw in iPhoto 08 version 7.1 that could have allowed an attacker to entice a victim into subscribing to a maliciously crafted photocast -- a sort of RSS feed for photos -- and then to execute malicious code on the victims system

CIA Eyes YouTube
02/13/2008

In keeping with its mandate to gather intelligence, the CIA is watching YouTube.


U.S. spies, now under the Director of National Intelligence (DNI), are looking increasingly online for intelligence; they have become major consumers of social media.

Woman Charged After Craigslist Hit Man Posting
02/12/2008

A Michigan woman has been charged with using the Craigslist classified-advertisement Web site to find a killer for a romantic rival.

The job title? Freelance. The price? $5,000.

According to authorities, Ann Marie Linscott posted two ads in November and received at least three responses, apparently from people who thought the ad was for a freelance writing gig.

In e-mail exchanges, however, Linscott, 48, told the job seekers that she was looking for silent assassins to eradicate a 56-year-old Oroville, California, woman named Carol, according to an affidavit from the FBI agent investigating the case.

Anti-Virus Site Hacked
02/11/2008

The Web site for Indian antivirus vendor AvSoft Technologies has been hacked and is being used to install malicious software on visitors computers, security researchers said last week.

complete article

Spain Goes After Internet Fraud
02/10/2008

Police in Spain have detained 76 people acrosss the country as part of what they described Sunday as their biggest-ever probe into Internet fraud.


The suspects defrauded their victions of over three million euros (four million US dollars), police said in a statement.

Speed Typing Software to Increase Productivity
02/07/2008

Direct Access is a powerful speed typing software to create global text templates, available in any application, and define your abbreviation list only once. You just type the abbreviation and Direct Access automatically expands it into the full phrase for you. With Direct Access, any piece of information is always available just by typing a few keystrokes.

Folder Synchronization Software 50% Off
02/05/2008

FolderClone Pro lets you make an identical copy of a folder tree from one drive to another. It can be used to synchronize files between a desktop computer and a laptop, or replicate data between a workstation and a server. It can also be used to copy important files from your hard drive to another location. (ZIP drive, CD-RW, removable hard disk, network drives, local hard disk).

Automation Software Featured on Software Deal of the Day
02/04/2008

Create scripts and record macros to automate and control your Windows applications, automate software processes and assign tasks to schedules, desktop shortcuts or hotkeys. Perform complex tasks with a single mouse click, or schedule your computer to perform tasks while you are away.

Windows automation software deeply discounted on Software Deal of the Day.

Security Logos and Identities
01/30/2008

Security Logos  large collection of security related logos for web designs and corporate brands..

Scientologists Attacked
01/29/2008

A group of hackers calling itself Anonymous has hit the Church of Scientologys Web site with an online attack.


The attack was launched January 19 by Anonymous, which is seeking media attention to help save people from Scientology by reversing the brainwashing, according to a Web page maintained by Anonymous.

Pirate Bay
01/28/2008

Sweden plans this week to charge the people running Pirate Bay, one of the worlds most visited Web sites, with being accessories in breaking copyright law.

Pirate Bay helps Web surfers share copyrighted music and film files, which is illegal in many countries, including Sweden.



Current Blog

2008 Security Blog Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.