Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Cloud Security: 8 Things You Need to Know When Choosing a Storage Service
04/19/2017

When you decide to start using a cloud storage or online backup provider, you may have some worries about security: we have all seen the sensational headlines about starlets having naked pictures of themselves stolen from their online accounts.

However, with proper security measures, your stored files can be just as safe in the cloud as they are on your laptop — if not safer. In this article we’ll talk a little about the most common ways cloud services protect your data.

With cloud storage, you don’t have to worry about the physical security of your data: even if your laptop or tablet gets stolen, you will not have lost your documents and images. Most cloud storage breaches were actually facilitated by users who gave away their passwords, often as the victims of phishing.

complete article

Pope urges EU: Resist false security promised by populists
04/17/2017

Pope Francis urged European leaders on Friday to resist the false forms of security promised by populists who want to wall themselves off and instead bank on a future of greater solidarity and union.

Francis welcomed 27 EU leaders to the Vatican on the eve of a summit to mark the 60th anniversary of the Treaty of Rome, the founding charter of the bloc.

The summit falls just days before Britain triggers a procedure to leave the EU and comes amid a wave of anti-EU populist sentiment sweeping the continent that threatens the very essence of the EU.

In his remarks, Francis said Europeans seem to have forgotten the tragedy of the walls and divisions that inspired leaders decades ago to hope for a better future through union.

LastPass security flaw could have let hackers steal passwords through browser extensions
04/15/2017

A LastPass security vulnerability could have allowed malicious attackers to steal users’ passwords, a researcher revealed this week.

A HACKER COULD HAVE ACCESSED OBVIOUSLY BAD LASTPASS COMMANDS

On Monday, Google researcher Tavis Ormandy reported the vulnerability in the popular password management tool. In an outline of the problem, Ormandy explains that a coding flaw allowed anyone to proxy unauthenticated messages to a LastPass browser extension.

Is Privacy Real? The CIA Is Jeopardizing America's Digital Security, Experts Warn
04/13/2017

WikiLeaks released its latest cache of confidential C.I.A. documents Thursday as part of its Vault 7 operation, exposing the U.S. government of its hacking and digital espionage capabilities — this time having to do with iPhones and other smart devices used by hundreds of millions of people across the globe. But there was an issue concerning cyber security experts and computers scientists much more damning then any of the secretive information featured in the new leaks: the C.I.A.'s total disregard of safety measures put in place for discovering these dangerous flaws in smart gadgets.

The federal agency has kept its discovery of many exploits (software tools targeting flaws in products, typically used for malicious hacking purposes) a secret, stockpiling that information rather than reporting it to multinational corporations, throwing millions of Americans into the crosshairs of a dangerous, intergovernmental spying game in the process.

How to improve your digital security
04/11/2017

Want to control your own digital security? There’s a wide array of options for secure messaging apps, email services and browsers that help you do-it-yourself.

4 myths -- and facts -- about online security
04/09/2017

Myth 1. Emails are always secure
Fewer than half -- 46% -- of people said they know email is not always encrypted. Encryption ensures only the sender and recipient are able to access the emails.

Myth 2. Private browsing is always private
Surfing the web in private (or incognito) mode prevents the browser -- like Chrome, Firefox, or Safari -- from collecting data about your activities. But it doesn't prevent an internet service provider, like Comcast, from monitoring your activity.

Myth 3. Turning off GPS means no one can track me
Almost half of people surveyed either didn't know or were unsure whether disabling GPS prevents all tracking. Your phone's built-in location service is just one way data can be collected.

Myth 4. My password is enough to protect me
Strong passwords are good, but security experts also recommend using two-factor authentication for account security. This means you must have a second login, like a security code sent to your phone, to sign into accounts. It prevents hackers from getting into your account, even if they know the password.

Phishing 101 at the School of Hard Knocks
04/07/2017

A recent, massive spike in sophisticated and successful phishing attacks is prompting many universities to speed up timetables for deploying mandatory two-factor authentication (2FA) — requiring a one-time code in addition to a password — for access to student and faculty services online. This is the story of one university that accelerated plans to require 2FA after witnessing nearly twice as many phishing victims in the first two-and-half months of this year than it saw in all of 2015.

Bowling Green State University in Ohio has more than 20,000 students and faculty, and like virtually any other mid-sized state school its Internet users are constantly under attack from scammers trying to phish login credentials for email and online services.

BGSU had planned later this summer to make 2FA mandatory for access to the school’s portal — the primary place where students register for classes, pay bills, and otherwise manage their financial relationship to the university.

That is, until a surge in successful phishing attacks resulted in several students having bank accounts and W-2 tax forms siphoned.

Popular security cam flaw lets burglars disable them
04/05/2017

Nests outdoor indoor Nest Cam, Dropcam and Dropcam Pro have been found to have three vulnerabilities that allow would-be burglars to exploit the cameras via Bluetooth to make them stop recording footage.

These exploits, reported to affect firmware version 5.2.1., were discovered by security researcher Jason Doyle and already alerted Nest about them back in October.

No patches have been issued yet at this time but according to Engadget, Nest is aware of the issue, [has] developed a fix for it, and will roll it out to customers in the coming days.

The first two bugs allow an attacker to trigger a memory buffer overflow in the cameras by sending super-long Wi-Fi data, such as an SSID name parameter or a Wi-Fi password parameter, via Bluetooth Low Energy (BLE). This overflow causes the cameras to crash and restart.

The third bug lets an attacker trick the cameras to temporarily disconnect from its current Wi-Fi network by sending it a new, non-existent Wi-Fi network SSID to connect to, again via Bluetooth. This causes the cameras to keep attempting to connect to the phantom network then reconnect to the original Wi-Fi network every 90 seconds. This time, the window is vital since Nest cameras depend on the cloud to store their footage. Each disconnection means the cameras temporarily stop recording and saving footage to their internet-based servers.

London Attack Reminds May of Post-Brexit Security Ties Need
04/03/2017

The worst terror attack on British soil since 2005 took place a year to the day after the deadly bombings on Brussels, and exactly one week before Mays government triggers Brexit. The unnamed British-born attacker was investigated by the British intelligence service MI5 some years ago but he was not part of the current intelligence picture, May told lawmakers on Thursday.

Expressions of solidarity and offers of help flooded in from the European Union governments May will be engaging in complex and probably acrimonious negotiations on how to decouple after more than 40 years together.

But for the woman who until eight months ago was in charge of keeping the country safe, the incident serves as a powerful argument to conserve a key aspect of EU cooperation in light of the interdependence of security services and terror plots across European capitals, from Paris to Berlin.



Current Blog

2017
August Archive
April Archive
March Archive

February Archive
January Archive

2016 Security Blog Archive
November /December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.