Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Zika: Why Biotechnology is Imperative to National Security. Analysis of Genotype Specific Bioweapons
02/29/2016

When we think of national security, we think of tanks, jets, missile defense systems and more recently, information space. But what about the realm of the microscopic, the biological or the genetic?

Whether you think biotechnology, genetics and microbes constitute another plane upon the modern battlefield or not is irrelevant. Someone else already does, and they have a head start on the rest of the world.

Germany Struggles to Assess Security Threats Ahead of Carnival
02/26/2016

In Cologne, a top destination in a region known for its big Carnival celebrations, police are doubling their presence from 2015 and boosting video surveillance of the parades and raucous street parties that precede the season of Lent and define one of the biggest open gatherings of the year.

The stepped-up efforts aim to reassure a public unsettled by a perceived crime spike and repeated terror threats. Yet behind the show of force, German security officials make little secret of their concern that the country is barely beginning to address the security challenge posed by last year’s record inflow of migrants.

iRobot Has Sold Its Defense And Security Business
02/25/2016

In an effort to divest itself of the defense and security market, iRobot has sold its D&S assets to form another company dedicated to all things military. The new company is led by CEO Sean Bielat, a former Marine officer.

Cloud Security
02/23/2016

Fear characterized the early days of cloud adoption – some of it justified and some purely sensational. The concept of sending data off the corporate network and thus outside of existing security technology spooked IT security professionals. But now that cloud has matured, one of the greatest barriers to adoption has become a people problem.  

This  growing confidence in the security capabilities of cloud providers reinforces Gartners prediction that in 2016, 95% of cloud security incidents will be the customer’s fault. Enterprise cloud providers’ entire business model depends on preventing breaches, and they have more resources and top talent to dedicate to security. But now that the cloud is secure enough for sensitive data, can cloud customers hold up their end of the shared liability model?

Security Experts Say That Hacking Cars Is Easy
02/21/2016

Security researchers from the University of Washington and the University of California, San Diego took to the stage at a conference on Tuesday to describe how they were able to remotely break into vehicle electronics through an array of security holes. Speaking at the Enigma Security Conference in San Francisco, they discussed how cars have evolved over the years into computers on wheels that crafty hackers can penetrate under the right circumstances.


Home Security
02/19/2016

Security is the major concern for industry verticals such as commercial areas, residential areas, and public places. The major reasons behind this are the alarming crime rates on global basis and unethical practices. With regards to this, electronic security equipment is expected to find potential opportunities in this market.

The entry level of security solutions in the residential sector has been witnessing a rapid growth since the last few years. There are several factors that can be attributed to this growth, such as increase in home burglary rates, attractive insurance policies to residents for installation of security solutions, and growing number of smart phone and tablet users.

Despite the numerous advantages offered by home security systems, lack of awareness about technological encroachments and a high installment cost of security solutions are some of the important restraints toward the growth of the home security system solutions market. A rise in the awareness level among consumers and increased adoption of new technology for home security would gradually result in cost reduction of the solution, thus driving the market for home security solutions.

TalkTalk Cyber Security
02/17/2016

Last October broadband provider TalkTalk was hacked for the third time in the space of just a year. The company, which has around four million customers in the UK, was initially unable to confirm whether the stolen customer data was encrypted or not, fuelling public outrage and landing them with a total bill of £35 million as a result.
Unfortunately, this attack is not an isolated incident. It follows a long line of similar attacks that have recently affected companies as varied as Sony, Carphone Warehouse and the infamous Ashley Madison.

Security Debt Collectors and Data Miners
02/15/2016

Vehicle surveillance broker Vigilant Solutions has offered Texas law enforcement agencies free access to its massive automated license plate reader databases and analytical tools— but only if the police give Vigilant access to all of their data on outstanding court fees and hand the company a 25 percent surcharge from money collected from drivers with outstanding court fines. Vigilant also gets to keep a copy of any license-plate data collected by the police, even after the contract ends, and can retain it indefinitely. The EFF warns that it turns police into debt collectors and data miners.

Venice carnival goers asked to lift masks for security
02/13/2016

It may be a tradition dating back to the 11th century but masks had to be lifted upon police request at this years famous carnival in Venice.

Revellers were subjected to extra security measures as they attended Sundays Flight of the Angel show in St Marks Square – one of the highlights of two weeks of festivities.

Wearing beautiful hand-painted masks and elaborate costumes to stroll around the canals of Venice is a key part of the carnival, which is believed to have started nine centuries ago after a military victory.

Internet of Things and Security Grow
02/11/2016

Gartner predicts the number of Internet of Things devices in use worldwide will grow from an estimated 5 billion in 2015, to some 25 billion connected devices by 2020. The best business strategies will perfectly balance the ever-growing IoT market opportunities versus a rapidly evolving threat environment. To help IoT solution providers define their 2016 product roadmap, here are some of Inside Secures top IoT predictions for the year:

IoT hype will become reality

For the past few years, we’ve been inundated with stories of IoT solutions that were either ahead of their time or just outlandish ideas not aimed at solving any pressing problem. Today, IoT use cases that once seemed to be material for sci-fi movies are part of our every day digital life. The recently released Adobe Digital Trends Report indicates 51% of smartphone owners have already interacted with home electronic IoT devices. Imagining a world where you wake up and your house is already heated to a comfortable temperature and your coffee is ready – not based on a preset time, but based on when you actually woke up doesn’t sound so crazy anymore. In 2016, there will be a growing number of authentic success stories where the IoT provides real value to consumers and enterprises.

Military Security in the Age of the Internet of Things
02/09/2016

Despite looming threats, trusted communications offer a glimmer of assurance.

Securing the cyber domain commands as much attention as it does effort and dollars—and yet, in spite of years of work to fortify enterprises, it is the fast-paced ecosystem known as the Internet of Things that gravely threatens the security of the world’s greatest military. With mere clicks on a computer, hackers have the knowledge and power to wreak havoc in the defense arena, with experts warning that it is just a matter of time before threats become realities, particularly in three distinctly vulnerable areas of vehicle safety, healthcare and supply chains.

Social Media Fighting Crime
02/07/2016

Sioux Falls police are looking to broaden their Facebook circle of friends.  One of the top law enforcement priorities Matt Burns announced when he took over as police chief last year was expanding his department's social media footprint.

Officer Sam Clemens is one of only two members of the Sioux Falls Police Department authorized to post messages on the departments Facebook and Twitter accounts. But Clemens will be getting some online backup with additional officers now being trained to post information on social media.

Social media has proven to be an important crimefighting tool for Sioux Falls police.  Surveillance video from the January 7th robbery at Casey's on North Kiwanis  generated a tip that led to the arrest of a suspect.

Search Engine Helps users Find Baby Monitor Feeds
02/05/2016

Specialised search engine Shodan now offers a feature that allows users to easily browse vulnerable Internet-connected cameras, prying into users personal lives.

The collection of supposedly private feeds that users can openly access includes security footage of banks, shops, schools, homes, and – most talked-about – children and babies, via Internet-connected cameras parents are using as baby monitors.

US, UK intelligence agencies cracked Israeli drone data
02/03/2016

The National Security Agency and the UKs Government Communication Headquarters have been hacking into Israeli drones to observe military operations and areas of interest in the Middle East, according to The Intercept. Anarchist, as the program was called, saw technicians at a GCHQ facility in Cyprus routinely intercept video feeds over the course of several years, with some of the most telling bits winding up among the documents leaked by Edward Snowden.

It is unclear whether the operation was ever able to decode drone video feeds in anything close to real time.

State Tax Refunds May Be Delayed Due to Security Concerns
02/01/2016

Some taxpayers may get their state income tax refunds a little later this year because of extra security measures aimed at preventing fraud.

Some states have warned taxpayers not to expect refunds until after March 1, regardless of how early they file their returns. The Internal Revenue Service has not issued any notice of delays in issuing federal income tax refunds for this year’s filing season, which begins Tuesday. The I.R.S. says about 90 percent of refunds are issued within 21 days.



Current Blog

2016 Security Blog Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.