Security
Port
A Security Port Blog
US
Warns of Apple Security Flaw |
11/30/2006 | |
An exploit for a security bug in Apple's
Mac OS X operating system could be used to carry out
denial of service attacks, the US Computer Emergency
Readiness Team (US-CERT) has warned.
The warning
follows an advisory notice about the flaw issued by the
French Security Incident Response Team last week.
|
Computer Security Day |
11/30/2006 | |
Computer Security Day was started
in 1988 to help raise awareness of computer related
security issues. Our goal is to remind people to protect
their computers and information. This annual event is
held around the world on November 30th although some
organizations choose to have functions on the next
business day if it falls on a weekend.
|
Computer Alerts to Fights |
11/29/2006 | |
Combined with closed circuit television
systems, this new software can quickly notify security
personnel about loud, angry people in outdoor public
spaces, public transportation, nightclubs and
bars.
Complete Article
|
9 of
10 Emails are Spam |
11/29/2006 | |
The number of "spam" messages has tripled
since June and now accounts for as many as nine out of
10 e-mails sent worldwide, according to U.S. email
security company Postini. |
Security Feeds |
11/28/2006 | |
Interested in monitoring the latest
security news and alerts using RSS feeds? Use the RSS
feeds located in the Security Directory to stay on top of
critical security information. |
Web
Application Weakness |
11/28/2006 | |
According to Mass.-based Watchfire, the
most vulnerable area in the enterprise information
ecosystem is Web applications. The company specializes
in software and services to audit the security and
regulatory compliance of Web sites.
|
Microsoft Launches Security
Week |
11/28/2006 | |
Microsoft today launched Microsoft
Security Week 2006, a series of awareness building and
education activities aimed at raising awareness of
computing-related security issues. This will allow users
to leverage the full advantages of the Internet with the
confidence that they are protected against malicious
software and other security threats.
|
Symantec Security Bulletin |
11/27/2006 | |
Symantec is releasing a new portfolio of
security and availability products specifically for the
small- to mid-sized marketplace.The new initiative from
Symantec is an SMB security product blueprint that is
intended as a guide to help customers and solution
providers. |
Homeland Security Classes |
11/23/2006 | |
Next year, Justan Holloway's class
schedule will look more like an action movie plot than
an academic pursuit. The Savannah State University
sophomore will study international terrorism, disaster
planning, criminology, social psychology and Arabic.
Holloway plans to be among the first to enroll
in the college's new degree program in homeland
security. |
Fake
Bombs Lost |
11/22/2006 | |
A major security alert has been sparked
after police lost a briefcase full of imitation bombs.
An officer left the case containing around 15 mock-up
explosive devices on a train.
He was returning
home after using the "bombs" in a presentation to
security staff and police. |
|
What is Pound Privacy?
Pound
Privacy is a campaign to create the first standard
for search engine query privacy. The implementation is
fairly straightforward: If you append the phrase
"#privacy" at the end of a query on any search engine or
site search, your query should not be tracked by IP or
cookie, and should not be made public in keyword tools.
It is that simple. |
Background Checks |
11/20/2006 | |
If you have ever been employed, chances
are good that you’ve had a background check run on
you. Employers looking for reliable, trustworthy
individuals will often use these reports to confirm that
information given on a resume is true and ensure that
they are hiring persons of high standards. But what is
included in a background check? Do you have control over
who can access your report? How can you find out what is
on your record?
Background Checks
|
Homeland Security Aid
Sentenced |
11/20/2006 | |
A 56-year-old former Homeland Security
press aide was sentenced Friday to five years in prison
after he pleaded no contest to sending sexually explicit
Internet messages to someone he thought was a
14-year-old girl. |
Hackers in Chile |
11/19/2006 | |
Two Chileans accused of hacking into
thousands of government Web sites were freed from jail
Wednesday but ordered to stay away from computers while
the case is investigated, their lawyer said.
|
Internet Rage Becomes Physical |
11/19/2006 | |
A British man convicted of what has been
described as the country's first "web-rage" attack, was
jailed for 2-1/2 years on Friday for assaulting a man he
had exchanged insults with over the Internet.
|
PGP
is 15 Years Old |
11/16/2006 | |
PGP Corporation salutes the 15th
anniversary of PGP encryption technology. Developed and
released in 1991 by Phil Zimmermann, Pretty Good Privacy
1.0 set the standard for safe, accessible technology to
protect and share online information.
|
Kevin Mitniks Security Advice |
11/15/2006 | |
Here's my Top 10 list of steps you should
take to protect your information and your computing
resources from the bad boys and girls of
cyberspace.
~ Back up everything! You are not
invulnerable. Catastrophic data loss can happen to you
-- one worm or Trojan is all it takes. ~
Choose passwords that are reasonably hard to guess --
don't just append a few numbers to a no-brainer. Always
change default passwords. ~ Use an antivirus
product like AVG or Norton, and set it to update daily.
~ Update your OS religiously and be vigilant
in applying all security patches released by the
software manufacturer. ~ Avoid hacker-bait
apps like Internet Explorer and disable automatic
scripting on your e-mail client. ~ Use
encryption software like PGP (pretty good privacy) when
sending sensitive e-mail. You can also use it to protect
your entire hard drive. ~ Install a spyware
detection app -- or even several. Programs that can be
set to run frequently, like SpyCop, are ideal.
~ Use a personal firewall. Configure it to
prevent other computers, networks and sites from
connecting to you, and specify which programs are
allowed to connect to the net automatically.
~ Disable any system services you're not
using, especially apps that could give others remote
access to your computer (like Remote Desktop, RealVNC
and NetBIOS). ~ Secure your wireless
networks. At home, enable WPA (Wi-Fi protected access)
with a password of at least 20 characters. Configure
your laptop to connect in Infrastructure mode only, and
don't add networks unless they use WPA.
Complete Article
|
Privacy and Mobile Phones |
11/14/2006 | |
Intel Corp. has attached a privacy license
to its new location-aware software product, intended to
protect cell phone users' personal information as mobile
devices increasingly rely on tracking technology to
provide targeted services. |
Software Piracy Leads to Guilty
Plea |
11/13/2006 | |
The operator of a Web site that offered
copies of software has pleaded guilty to one count of
criminal copyright infringement, the U.S. Department of
Justice.
Ronnie A. Knott, 36, of Salt Lake City,
pleaded guilty Thursday before Judge T.S. Ellis III in
U.S. District Court for the Eastern District of
Virginia. He is scheduled to be sentenced Feb. 23, and
he faces a maximum sentence of five years in prison and
a $250,000 fine.
Complete Article
|
Water In Danger in Russia |
11/12/2006 | |
The head of the Federal Security Service
said Tuesday that his agency had information that
terrorists were planning attacks against water plants in
southern Russia. |
Israel Accuses Russian Tourist of
Spying |
11/12/2006 | |
A Russian tourist, who tried to take
picture against backdrop of Azrieli Towers in Tel Aviv
was pounced by security personnel, accused of spying,
planning terror attack for Hezbollah.
|
Protecting Your Computer |
11/11/2006 | |
Relatively simple local security measures
you can take on your server to prevent a hacker from
getting in and exploiting your system.
Complete Article
|
Panama on Security Council |
11/10/2006 | |
Panama was elected to the last seat in the
UN Security Council for a new two-year term on Tuesday,
in what seems to be the third longest electoral
stand-off for a seat on the Security Council in the
world organization's 61-year history.
|
How
to Land a Security Job |
11/09/2006 | |
If you have ever been employed, chances
are good that you’ve had a background check run on
you. Employers looking for reliable, trustworthy
individuals will often use these reports to confirm that
information given on a resume is true and ensure that
they are hiring persons of high standards. But what is
included in a background check? Do you have control over
who can access your report? How can you find out what is
on your record?
Security Jobs and Background Checks
|
IBM
Heading into Surveillance |
11/08/2006 | |
IBM's decided that it's had enough of
making traditional processors, and instead will head
further into the lucrative military and law enforcement
business. Big Blue just announced today that it's begun
selling the "Smart Surveillance System," or S3.
|
eVoting Security Issues Raised |
11/07/2006 | |
Security of electronic voting machines is
coming under scrutiny as the midterm elections approach.
On the eve of Election Day, several states have
reported computer problems during early elections. A
privacy group predicted disaster; voters' advocates
anticipated errors and one group announced a Web tool
for recording and addressing problems.
|
Internet Enemies |
11/08/2006 | |
The international journalists' advocacy
group Reporters Without Borders has released its annual
list of countries that systematically violate online
free expression.
The countries include: -
Belarus - Burma - China - Cuba - Egypt -
Iran - North Korea - Saudi Arabia - Syria -
Tunisia - Turkmenistan - Uzbekistan - Vietnam.
|
Privacy Issue Ignored |
11/02/2006 | |
A Homeland Security advisory panel finds
serious privacy and security problems with RFID. But the
report is stalled, while the government rolls out new ID
cards using the controversial technology.
Privacy Issue Ignored
|
Hackers Penetrate Water System |
11/01/2006 | |
A foreign hacker who penetrated security
at a Harrisburg, Pa., water filtering plant is under
investigation by the FBI for planting malicious software
capable of affecting the plant's water treatment
operations, ABC News has learned.
Complete Article
|
Blog Archive
November Archive
October Archive
September
Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive
| |
 |

Security Alerts
Locate security alerts, and security feeds via a security rss feed
directory.
|