Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Google Beefs Up Its Gmail Security Features
04/29/2016

Google is rolling out an updated security warning system this week for Gmail users that the company says is designed to make sure they do not fall victim to cyber attacks.

The first security warning will be triggered when a user clicks on a link in Gmail that Google suspects to be dangerous.

A second enhancement gives suspected targets of state-sponsored hacking attempts a full-page warning along with information on how to protect their accounts. The new full-page alert is in addition to Googles existing warning, which shows up as a red strip with a link at the top of a suspected victims Gmail page.

Suspected state-sponsored hacking attempts are rare and impact 0.1 percent of Gmail users, according to Google's online security blog.

Telecom Partners Say Cloud Security Is Top Of Mind In Wake Of Verizon Breach
04/27/2016

Verizon Enterprise Solutions is the latest victim of a data breach that affected more than a million of its enterprise customers, news that partners believe will have wide-ranging implications on telecom and cloud security solutions.

First reported by security journalist Brian Krebs, the breach allowed hackers to collect information on an estimated 1.5 million enterprise clients, including basic contact information. Verizon said in the report that no customer proprietary network information or other data was accessed. The data was found for sale on an underground cyberforum.

New Research Grants for Stevens Total More than $5 Million; Focus on Homeland Security, Defense and Cybersecurity
04/25/2016

The number of research grants awarded to Stevens Institute of Technology since February 1 total more than $5 million, with the bulk of the awards coming from the U.S. Department of Defense (DoD) and U.S. Department of Homeland Security (DHS).

The largest award ($2.75 million) came from the DHS to support a multi-year program to develop and deploy a system of sensors that would defeat small and medium Unmanned Aerial Systems (UAS), commonly known as drones, to protect critical infrastructure and people. The Stevens research team, led by Dr. Hady Salloum, director of the DHS S&T Center of Excellence for Maritime Security at Stevens, will provide key elements of this program, including the development of a test bed, development and demonstration of an acoustic sensor solution, and contributions to other program efforts including modeling and simulation.

BitQuick Taken Offline
04/22/2016

Security is one of the major concerns when it comes to the bitcoin industry. There have been so many instances where the security of bitcoin platforms was breached by hackers, making away with loads of bitcoin. The history has taught bitcoin businesses not to compromise on the security of their products, as it may end up causing some serious damage to their reputation. Even with bitcoin exchanges and wallet providers implementing the best security features, they still face the threat.

Machine Learning and Security
04/20/2016

Machine learning and artificial intelligence (AI) are in the spotlight. Not only did funding in AI companies reach records heights last year, but we’re seeing it positioned as an antidote to improve just about every facet of our lives and businesses—from how we travel, to how we shop, to our health care. Big players like Microsoft and Google are also getting into the game, releasing open source frameworks to make taking advantage of machine learning a whole lot easier.

Websites Lack Security
04/18/2016

Every time you PayPal someone, or send a Gmail, or log into Facebook, a layer of encryption protects the information that zips across the Internet. These sites all use HTTPS, an added layer of security to the standard HTTP protocol that facilitates web communication. But as a new Google report shows, an alarmingly small number of the webs most-trafficked sites use this vital security protocol.

The Google audit shows that 79 of the webs top 100 non-Google sites don’t deploy HTTPS by default, while 67 of those use either outdated encryption technology or offer none at all. The worst offenders include big names, like the New York Times and IMDB.

UK Workers more Diligent about Cyber Security at Home
04/15/2016

UK employees expect an IT safety net to protect them at work and are more willing to take responsibility for security at home, a survey commissioned by Citrix has revealed

More than four in 10 UK workers regularly use passwords to secure home documents, but only one in three do so at work, a survey has revealed.

In a further sign of disparity in employee attitudes to work and personal data, 68% of workers said they shredded unwanted personal documents, while just 40% do so at work, according to a poll of 2,000 full-time workers in the UK commissioned by secure access firm Citrix.

Pay with Your Face? Amazon Tech Brings Security Questions
04/13/2016

Amazon may be looking at ways to let you pay for purchases with just a look. But experts warn that such systems have proven easy to fool in the past.

In a new patent application — U.S. patent No. 20,160,071,111, filed on March 10 — the company described a system that would let a user authorize a purchase using two things: an image of the persons face and a live motion to check that the image is actually the owner of the phone.

Security Solutions are Slowing Down our Systems
04/11/2016

Despite the inherent insecurities of the cybersecurity industry, a new report from Barkly, an endpoint security company, reveals that the biggest issue IT security teams have to face with current security solutions is that they slow down the system.

When asked about the options of productivity vs security and the potential downfalls of security solutions, 41 percent of respondents said that they were dissatisfied with their current solution, not because it failed to deliver security, but because it slows down their system.


If security products are slowing systems and by extension lowering productivity, then IT pros should consider whether or not their colleagues are taking insecure shortcuts to improve efficiency, such as using unauthorized third-party apps or connecting unsanctioned devices to the network.

Computers Can Be Hacked to Send Data as Sound Waves
04/08/2016

A team of security researchers has demonstrated the ability to hijack standard equipment inside computers, printers and millions of other devices in order to send information out of an office through sound waves.

The attack program takes control of the physical prongs on general-purpose input/output circuits and vibrates them at a frequency of the researchers' choosing, which can be audible or not. The vibrations can be picked up with an AM radio antenna a short distance away.

Uber Has a Secret Security Hotline
04/06/2016

If you are having an emergency in an Uber, theres a secret hotline to get in touch with them, according to Business Insider.

A secret hotline that Uber has been denying exists–it does not call it a hotline–does not sound very useful, but the company now says has been tested in 22 cities around the country.

The hotline is 800-353-8237 (UBER), and customers who call that number in an emergency will go directly to a customer service human being.

Inkjet Can Spoof Mobile Fingerprint Security
04/04/2016

Researchers have spoofed biometric fingerprint security in two models of mobile phone using nothing more than an inkjet printer.

The fingerprint is a popular method of identification due to the fact that there are no two identical fingerprints among the seven billion people on the planet, but it is by no means impregnable.

The Cloud and Security
04/01/2016

Security concerns are undoubtedly the major hurdle for widespread cloud adoption; indeed, a massive 90 percent of firms surveyed by Information Security in 2015 stated security was the biggest factor preventing organizations from moving to the cloud. No one is about to wave a magic wand in 2016 and make that go away.

Intel Security Guru Says Regulating Encryption Is Difficult
03/30/2016

Encrypting digital data should not be considered a moral issue of good and evil. Rather, it is a nuanced legal issue that may not be covered under existing law.

Thats one of the takeaways from a discussion about cybersecurity and data with Steve Grobman, the chief technology officer for Intels security group. Grobman explained during the Structure Data conference in San Francisco on Thursday that encryption is really just complex mathematics, which makes it a difficult thing to legislate.



Current Blog

2016 Security Blog Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.