Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Border Security
04/30/2013

McCain urged the Department of Homeland Security on Wednesday to develop an index to gauge border security, a measurement he called fundamental to the just-introduced bipartisan immigration reform plan.

Homeland Security Secretary Janet Napolitano, who was appearing before a Senate committee to discuss President Barack Obama’s proposed 2014 budget, said the department plans to add 3,500 new personnel to secure the countrys ports of entry. But the budget, overall, cuts spending by 2 percent,

Afghanistan Security
04/29/2013

The International Committee of the Red Cross warned on Thursday that security was deteriorating across Afghanistan as militants flood the battlefield and conduct attacks in what could be the most defining spring fighting season of the nearly 12-year-old war.

This year is crucial for Afghanistan as the U.S.-led coalition is expected to hand over the lead for security in Afghanistan to the country's security forces sometime in the late spring. Foreign military forces are then expected to begin a massive withdrawal of forces that will culminate at the end of next year.

Security for Kentucky Derby
04/28/2013

Enhanced security procedures will be implemented for this year's Kentucky Derby and Oaks, which will take place on May 4 and 3, respectively.

Churchill Downs, home to the Run for the Roses, will upgrade both security and hospitality policies for both the 139th Kentucky Derby and Oaks, with expanded screenings in place for patrons, employees and vendors entering the historic track.

Cyber Security Bill
04/27/2013

Despite concerns about protections for private information, the House of Representatives on Thursday passed the the Cyber Intelligence Sharing and Protection Act, legislation on Thursday designed to help companies and the government share information on cyber threats.

The bill passed the House last year but stalled in the Senate after President Barack Obama threatened to veto it over privacy concerns.

Security Systems
04/26/2013

SecurityPlanet.com is the leader in home security systems reviews. The simple to read reviews and comprehensive comparisons help make SecurityPlanet.com the useful resource consumers favor for unbiased and impartial home security reviews. The Connecticut reviews of leading home security system companies were just recently finalized and released by SecurityPlanet.com. On a yearly basis the SecurityPlanet.com group travels between states completing assessments of the home security system providers that do business in every state. Every home security system provider is ranked on numerous factors including customer service, pricing and warranties to name a few.

Extent of Training
04/25/2013

House Homeland Security Chairman Michael McCaul said Sunday he believes Tamerlan Tsarnaev, one of the two Boston Marathon bombing suspects, received training during an extended trip to the Chechen region of Russia in 2012.

McCaul also questioned why the FBI did not take further action against Tsarnaev when he was investigated before his trip.

Security Clearance
04/24/2013

People in top U.S. national security jobs or seeking them will no longer have to disclose mental health counseling for sexual assault, the government said on Friday.

Workers and job applicants are asked on security clearance forms whether they have sought professional counseling in the last several years, and victims of rape or sexual assault can be reluctant to seek help because they fear it will trigger rejection or revoke their clearance.

Windows XP Security
04/23/2013

Security companies are following Microsofts lead and are now urging Windows XP users to dump the 11-year-old operating system and to move to a newer and more secure platform.

Security vendor Sophos said in a blog post that hackers might try to exploit unpatched systems after Microsoft officially retires Windows XP, especially because these would have slight chances to block their attempts.

Small Business Cyber Security
04/22/2013

When it comes to cyber security, small businesses risk losing not only their own data, but jeopardizing their partners’ data, too. Hackers are now targeting small businesses as the weakest links in larger supply chains, raising the stakes for any small company that gets breached.

Many small business owners mistakenly assume that cyber-criminals are only interested in large enterprises. Some 77 percent of small business owners say their companies are safe from cyber threats, according to a recent survey by Symantec and the National Cyber Security Alliance. Yet, 83 percent of those companies have no formal cyber security plan.

The threat to small businesses is real: Nearly 40 percent of the over 1 billion cyber-attacks Symantec prevented in early 2012 were targeted at small companies.

Cyber Security
04/21/2013

Today, cyberspace is woven into the fabric of our daily lives. According to recent estimates, cyberspace now encompasses more than 2 billion people with at least 12 billion computers and devices, including global positioning systems, mobile phones, satellites, data routers, desktop computers and industrial control systems that run our power plants, water systems and more. It would take only a single infected computer to potentially contaminate or infect thousands or more. Ultimately, our nation’s cybersecurity depends on the people who defend it. The most impressive and sophisticated technology is useful only if it’s operated and maintained by a world-class cybersecurity workforce.

While the vast majority of the nations cyber infrastructure is privately owned, the security and economic implications are so profound that their protection is of national importance. To meet constantly evolving challenges, the Department of Homeland Security is growing its world-class cybersecurity team through strong career paths within the department and throughout the federal government.

Online Security
04/20/2013

With all of the recent corporate hacking scandals,  Forbes Insights decided to take a look at the most influential brands and individuals currently involved in cyber security conversations. We noticed a few interesting themes from evaluating influencer data (see  infographic below):

Cyber attacks on banks account for only 2% of the conversations around cyber attacks in general. This stems from the fact that people feel much more threatened, vulnerable and exposed when their personal data connected to their social networks is compromised as opposed to when their personal finances are breached. One is a very public occurrence and potentially embarrassing occurrence, while the other is more private and protected.

Policy makers from the U.S. and China comprise the majority of the top 15 most influential individuals on the topic of cyber attacks.

Security and the Cloud
04/19/2013

First there were PCs to protect, then networks, and security companies made fortunes around both. Now a third area has arisen that needs guarding, says industry veteran Shlomo Kramer: the data center; and he says it needs a fundamentally different approach.

As cloud computing gains and people go mobile, much of what they do relies on fast connections to data on distant machines.

Windows 8 Security
04/18/2013

In one of the first independent tests of third-party security suites on Windows 8, nearly all antivirus and anti-malware software tested well. What may surprise you is that even without a third-party suite, Windows 8 is relatively resistant to modern threats like zero-day attacks, according to the report.

Independent German security suite evaluators AV-Test.org publish bimonthly tests that rate the effectiveness of the biggest Windows security suites out there and rated all 26 of the suites they tested on Windows 8 in January and February as certified, including Windows 8 itself. This is because Windows 8 comes with the antivirus and anti-malware measures of Microsoft Security Essentials (MSE) built in and turned on.

Homeland Security
04/17/2013

In an exclusive interview with Reuters, Jane Holl Lute, the sole deputy secretary at Homeland Security, said on Monday she would give notice this week and leave to pursue a role in international Internet affairs.

Lute said that she was leaving with the department on a strong footing in Internet matters, with its central role cemented by an executive order on cybersecurity issued by President Barack Obama in February.

The order directs the civilian Department of Homeland Security to steer improvements in protections for private industry, instead of giving the lead to the militarys National Security Agency.

The preeminence of Homeland Security in patrolling the Internet is a big change from when Lute arrived there.

Border Security
04/18/2013

A whopping 93 percent of Republicans support securing the border, but only 61 percent of Hispanics feel the same. The large gap illustrates one of the difficulties Republicans face as they try to craft a bipartisan deal on immigration. While their base is likely to demand tough border measures, many Hispanics on the border feel security is already tight enough.

Eight-in-ten Americans support hiked-up border security and 72 percent support more Visas for high-skilled immigrants, the ABC News Washington Post poll on Wednesday found. Fifty-seven percent support a pathway to citizenship for illegal immigrants, a number in line with other recent polling on the subject.

Anonymous Attacks North Korea
04/17/2013

Anonymous continues to target North Korea with its latest round of exploits.

Citing the threat posed by the North Korean government, the hacktivist group defaced the countrys official Twitter and Flickr accounts yesterday.

The North Korean Twitter feed now displays a series of tweets with links that poke fun at the country's leader Kim Jong-un.

What is the Cost of Security
04/16/2013

Here, in this study, the cost of what the CISOs have chosen as must-haves, along with someone to administer it, can cost as little as $300,000 to $400,000. If you went beyond bare bones, you are probably looking at $500k to $800k. This was based on a 1000-person organization. Doing the math, that means about $500 to $800 spent on security for every person in the organization.

Another metric that came out of the study is that most organizations usually have about 1 security person for every 500 employees. For organizations much below the 500 level, it usually means that there is no dedicated security person (no surprise to those in the security field).

Google Says NO
04/15/2013

Bloomberg News reports Google has filed a petition against a government request for information after receiving a National Security Letter.

The details of the requested information are currently not disclosed, as you would imagine. Bloomberg says it is rare for a company to fight back after receiving such a request from a government agency. Reportedly the push back from Google comes three weeks after San Francisco federal judge ruled that National Security Letters, which are issued without a warrant, are unconstitutional.

New Domains May Result in Security Problems
04/14/2013

Plans to populate the Internet with dozens of new top-level domains in the next year could give criminals an easy way to bypass encryption protections safeguarding corporate e-mail servers and company intranets, officials from PayPal and a group of certificate authorities are warning.

The introduction of Internet addresses with suffixes such as .corp, .bank, and .ads are particularly alarming to these officials because many large and medium-sized businesses use those strings to name machines inside their networks.

Gaps in Security
04/12/2013

A sophisticated airborne radar system developed to track Taliban fighters planting roadside bombs in Afghanistan has found a new use along the U.S. border with Mexico, where it has revealed gaps in security.

Operated from a Predator surveillance drone, the radar system has collected evidence that Border Patrol agents apprehended fewer than half of the foreign migrants and smugglers who had illegally crossed into a 150-square-mile stretch of southern Arizona.

Design Tools
04/10/2013

Creating an interesting and colorful color palette can be a chore, even for the most experienced designers. We have compiled a list of color design tools that can be very useful for web artisans...

Design Tools

Cybersecurity and Big Brother
04/09/2013

The book Nineteen Eighty-Four was written by George Orwell in the 1940s. Words and concepts such as; Big Brother, doublethink, thoughtcrime, Newspeak and even Orwellian come from this famous literary work.  

More than sixty years later, philosophers still argue about what Orwell would say about the Internet, technology in 2013 or our future, if Orwell were alive today. Students continue to read and learn from Orwell and debate questions about security, privacy and monitoring on the Internet today.

Is Guam Secure?
04/08/2013

The Guam Homeland Security Advisor sent out a message calling North Koreas threats to U.S. military bases on Guam and other areas of the Pacific aggressive media rhetoric and sabre rattling.

The message also notes Pedro Leon Guerrero, Homeland Security Advisor, reiterating that he is - like the governor - comfortable and confident that Guam is protected by the U.S. military.

Tech is Not the Key to Job Security
04/07/2013

Technology jobs are not inherently secure simply because firms in every industry now rely on Internet connections, software applications and computing devices to engage customers and run internal operations.

Although the sector has been more resilient than many others during the economic downturn, not all IT jobs enjoy the same degree of stability. Web development, cybersecurity and cloud computing, for example, tend to see greater demand for workers.

Alabama Teachers Support Guns in School
04/06/2013

A new survey of Alabama teachers finds a majority of them support armed security officers in their schools.

But the same survey found teachers oppose allowing administrators and teachers having guns in school and that opposition does not change even if only some administrators and teachers were allowed to carry guns and trained in how to use.

Iraqi Christians Celebrate with a Sense of Heightened Security
04/05/2013

Iraqs Catholic Christians flocked to churches to celebrate Easter Sunday, praying, singing and rejoicing in the resurrection of Christ behind high blast walls and tight security cordons.

It was the first Easter since the election of Pope Francis in Rome, and worshipers said they hoped their new spiritual leader would help strengthen their tiny community that has shrunk under the joint pressures of militant attacks and economic hardships.

Giving Up Your Social Security Number
04/04/2013

Every time you go to a new doctor or dentist and they give you a clipboard brimming with documents to fill out and sign, notice how they always ask for your Social Security number? Do you dutifully give it up? Did you ever wonder if they really need it?

So, the next time someone asks you for your Social Security number, reflect on this: In December, the Army announced that hackers stole the Social Security numbers of 36,000 visitors to Fort Monmouth in New Jersey, including intelligence officers.

Cyber activists took control of the CIAs website. The private information, including some Social Security numbers, of celebrities and political leaders including FBI Director Robert Mueller and Secretary of State Hillary Clinton were exposed.

The sensitive data of First Lady Michelle Obama, Vice President Joe Biden and Attorney General Eric Holder, recently were posted on a website for the world to see.

Hackers even listened in on a phone call in which the FBI and Scotland Yard were discussing the criminal investigation against those very same hackers!

I Work on the Internet Cartoon
04/03/2013


I Work on the Internet

Google Chrome Security
04/02/2013

Chrome offers several privacy features that help protect you while you browse. The most notable are its phishing- and malware-protection schemes, and a tool that can auto-correct misspelled Web addresses.

Chromes phishing and malware protection put up a warning screen whenever you visit a website that Google has identified as potentially malicious, whether it spreads malware or tries to steal your personal information.

Samsung Security Locks
04/01/2013

Two security vendors have released temporary fixes for a flaw in some Samsung Android phones that could allow an attacker to bypass a locked screen.

The problem comes from Samsungs implementation of the emergency call feature, which allows people to dial emergency services or reveals a contact people can dial if they find someones phone, said David Richardson, a product manager at Lookout Mobile Security.

Lookout and Bkav Mobile Security have issued updates in their products to temporarily fix the flaw.

Samsung configured the emergency call function in such a way that it appears to briefly unlock the phone, Richardson said.

Chinese Hacking
03/31/2013

Cyber attacks have become a constant, daily battle for everyone across the globe. From individuals to businesses and governments, hackers are infiltrating the secure networks of our banking, communication, and intelligence systems.  However, new cyber warfare rules released by NATO on Tuesday declares government attacks on civilians, hospitals, nuclear power plants, dams and dykes may be considered acts of war if the intent is to cause injury, death, damage, and destruction.  NATO, unlike the United States, has proactively defined a new way to fight the enemy in an information age conflict.

More Apple Security Problems
03/30/2013

Apple this week addressed two glaring security flaws in iOS 6.1, the operating system for iPhones, only to have a third security hole exposed. All three flaws related to giving an attacker a route to bypass the lock screen function to gain access to the phone user's private data. As more consumers use their personal iPhones for work, companies are moving to impose security policies, such as mandatory use of the lock screen function that requires users to enter a password. But hackers are discovering more ways to bypass these security measures.



Current Blog

2013 Security Blog Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.