Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Google Violating User Privacy
02/27/2012

Federal lawmakers are asking if Google Inc. violated the terms of its broad privacy settlement with the Federal Trade Commission, following a study in which it has been reported that Google is accused of bypassing the privacy settings on Apples Safari browser to track usage on iPhones and Macs without permission.

Firefox Security
02/26/2012

For the second time this week, Mozilla has rushed out a Firefox security update to fix a dangerous security vulnerability.

The latest vulnerability, which was discovered and reported by representatives from Red Hat, could be attacked simply by displaying a maliciously crafted image.

Iraqi Border Security
02/25/2012

Iraq said on Saturday it had reinforced security along its Syrian border to prevent arms smuggling, after reports fighters and weapons were crossing into Syria where President Bashar al-Assad has been facing an increasingly armed revolt.

Chrome Security
02/24/2012

Google has shipped another Chrome browser update to fix several gaping security holes.

The most serious of the patched vulnerabilities could allow remote hacker attacks via specially rigged Web sites.

The update also includes a new version of Adobe Flash Player, which was recently updated to cover multiple remote code execution vulnerabilities.

Public Keys Insecure
02/23/2012

How secure are your public keys? According to a new report, public keys used to protect encrypted websites are quite insecure thanks to weak random number generation algorithms.
Using data from the Electronic Frontier Foundations SSL Observatory project, researchers led by Arjen Lenstra at the Ecole Polytechnique Federale de Lausanne found that while the vast majority of public keys work as intended, about 2 out of every 1,000 RSA moduli - an algorithm for public-key cryptography - offer no security.

How to Locate Unprotected Android
02/22/2012

Use two Android apps that can be remotely installed and activated via the Android Market website, which can give you a second chance at finding your lost or stolen smartphone. Of course, your Android device must be powered on and have either a data or Wi-Fi connection in order for this to work.

complete article

Identity Theft
02/21/2012

For every dollar a stolen Social Security number is worth, your stolen medical information -- a partial medical history, your insurance number -- is worth $50, according to some experts.

Yet at least 11 times since 2009, Michigan health care providers lost or otherwise accidentally breached the health data of more than 118,000 patients in all. A report released in December concluded that breaches nationally climbed 32% last year, in part, because doctors are more often relying on smartphones and other electronic devices to update files.

It is unclear whether any of the information in the 11 breaches was misused; it might simply have been discarded. But lost or stolen medical information also can be used to file fraudulent claims or cost you years in rebuilding your credit history or reclaiming your health insurance. And if your medical file ends up containing information that is not yours -- say an addict uses your information to get drugs -- that could mean life-threatening mix-ups if a doctor prescribes the wrong medicine or sees the wrong blood type.

Drones in US Airspace
02/20/2012

Thousands of tiny unmanned aircraft or drones flying into civilian airspace over the United States can pose a security threat as they may be difficult to monitor in the long run and some craft may fall into enemy hands, security analysts say.

Although debate over the use of surveillance drones, approved by Congress this week, centers on civil liberties and individuals rights, a much greater risk of hostile drones entering U.S. airspace undetected isn't being considered, analysts said.

The Federation Aviation Administration said up to 30,000 drones could be in airspace shared with airliners carrying passengers.

Current lobbying for the drones insists there will be enough qualified experts to operate the drones safely and not endanger airborne human traffic but there are many questions unanswered about how the drone operators would be regulated.

Iraq Minimizing Security Contractors
02/19/2012

Iraq deeply mistrusts private security companies and wants to limit their operations here, officials say, while the contractors themselves have faced bureaucratic delays and detentions.

This mistrust stems from perceived arrogant behaviour by employees of these firms in the past and various incidents of violence involving them.

The most infamous incident was the 2007 killing of at least 14 civilians in Baghdad’s Nisur Square by gunmen from the Blackwater firm guarding a US embassy convoy.

While Blackwater, now called ACADEMI, was later banned from the country, security contractors still guard US diplomats in Iraq and provide security for various foreign companies.

Iraq is not looking to expand the security companies work here, government spokesman Ali al-Dabbagh said in an interview with AFP.

Russian Security Not Taking IPO
02/18/2012

Russian IT security firm Kaspersky Lab has scrapped its idea to hold an initial public offering, the company’s chief financial officer said.

Throughout much of 2011, Russias multinational cyber security giant was considering an IPO as part of its financial strategy. But a recent exit of a short-term venture capital partner, and a significant share buy back by Kaspersky ownership means that the initial idea of listing shares has been shelved.

Digital Security
02/17/2012

In both houses of Congress, legislation is gaining steam that would authorize the federal government to regulate the security of privately owned critical infrastructure, much of which is controlled by Internet-connected systems and susceptible to being hacked. The legislation is already riven by competing interests and fears.

Security Logos and Graphics
02/16/2012

Great logos and graphics for security designs.



Great security company logo designs.

Cyber Security Up
02/15/2012

The pace of attacks by cyber vigilantes seems to be increasing in 2012. Yesterday news broke that the website of the CIA was down, an attack for which Anonymous claimed responsibility. Today CNN is reporting that attacks also hit government agencies in Mexico and Alabama, and that information was compromised at Alabama’s Department of Homeland Security.

Girl Rescued In Kosovo Avalanche
02/14/2012

Rescuers have pulled a 5-year-old girl alive from the rubble of a house flattened by a massive avalanche that killed both her parents and at least seven of her relatives in a remote mountain village in southern Kosovo.

Google Suspends Some Functionality in Google Wallet
02/14/2012

Google has suspended prepaid capabilities on credit cards linked to its mobile wallet after a security flaw was exposed.

Saturdays move comes following the airing on the Internet of a flaw in the wallets design that could allow an unauthorized user of a phone to tap into an existing balance on a card by reconfiguring the wallets settings.

Bahrain Deployed Forces
02/13/2012

Bahrain on Sunday deployed thousands of security forces to confront anti-government protesters ahead of the one-year anniversary of the Shiite-led uprising that seeks to loosen the ruling Sunni dynastys monopoly on power.

Weak Bank Security
02/13/2012

Hackers may already able to use malware to outwit the latest generation of online banking security devices, security watchers warn.

An investigation by BBC Click underlines possible shortcomings in the extra security provided by banking authentication devices such as PINSentry from Barclays and SecureKey from HSBC. Using such two-factor authentication devices means that even if hackers trick consumers into handing over their bank login passwords they still will not be able to raid online banking accounts.

Secure Mobile Phones
02/12/2012

Some U.S. officials this year are expected to get smartphones capable of handling classified government documents over cellular networks, according to people involved in the project.

The phones will run a modified version of Googles Android software, which is being developed as part of an initiative that spans multiple federal agencies and government contractors, these people said.

The smartphones are first being deployed to U.S. soldiers, people familiar with the project said. Later, federal agencies are expected to get phones for sending and receiving government cables while away from their offices, sources said. Eventually, local governments and corporations could give workers phones with similar software.

Cyber Threats
02/11/2012

A developing Senate plan that would bolster the government's ability to regulate the computer security of companies that run critical industries is drawing strong opposition from businesses that say it goes too far and security experts who believe it should have even more teeth.

Legislation set to come out in the days ahead is intended to ensure that computer systems running power plants and other essential parts of the countrys infrastructure are protected from hackers, terrorists or other criminals. The Department of Homeland Security, with input from businesses, would select which companies to regulate; the agency would have the power to require better computer security, according to officials who described the bill. They spoke on condition of anonymity because lawmakers have not finalized all the details.

Bank Security
02/10/2012

The Australian central bank has moved to bolster its resistance to a form of cyber attack that has become an increasing menace to financial institutions in recent months.

The Reserve Bank of Australia late last week invited computer security providers to help prevent it falling prey to so-called distributed denial of service, or DDoS, attacks.

Jewish State Energy Independence
02/09/2012

The Coalition on the Environment and Jewish Life - COEJL today announced that a diverse group of community leaders has joined its Jewish Energy Covenant Campaign by signing the Jewish Environment and Energy Imperative declaration. Rabbis from the Conservative, Orthodox, Reconstructionist, Reform and Renewal movements and other communal leaders set the goal of significantly lowering greenhouse-gas emissions, advocating for energy independence and security, and reducing the Jewish community's energy consumption 14% by 2014.

Cloud Computing Security
02/08/2012

It would seem that cloud computing has crossed the Rubicon. Until quite recently, the main objection to cloud computing cited by surveys and anecdotal evidence alike has been the issue of security. Where is my data, will it be secure against hackers and hardware failure and can I get it back again have all been highly pertinent and frequently asked questions.

Egypt Protests
02/07/2012

As violent clashes erupted again between protesters and Egypts security forces in downtown Cairo on Sunday evening, there are reportedly over a hundred protesters injured and one death.

US Closes Syrian Embassy
02/07/2012

The United States has closed its embassy in Syria and pulled remaining diplomats, citing a worsening security situation.

The State Department said Monday that embassy functions have been suspended and that Ambassador Robert Ford and other diplomats have left the country. The United States had warned last month it would close its mission in Damascus unless Syrias government addressed security concerns, citing the safety of personnel and recent car bombs.



Current Blog

2012 Security Blog Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.