Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
US Warns of Apple Security Flaw
11/30/2006

An exploit for a security bug in Apple's Mac OS X operating system could be used to carry out denial of service attacks, the US Computer Emergency Readiness Team (US-CERT) has warned.

The warning follows an advisory notice about the flaw issued by the French Security Incident Response Team last week.

Computer Security Day
11/30/2006

Computer Security Day was started in 1988 to help raise awareness of computer related security issues. Our goal is to remind people to protect their computers and information. This annual event is held around the world on November 30th although some organizations choose to have functions on the next business day if it falls on a weekend.

Computer Alerts to Fights
11/29/2006

Combined with closed circuit television systems, this new software can quickly notify security personnel about loud, angry people in outdoor public spaces, public transportation, nightclubs and bars.

Complete Article

9 of 10 Emails are Spam
11/29/2006

The number of "spam" messages has tripled since June and now accounts for as many as nine out of 10 e-mails sent worldwide, according to U.S. email security company Postini.

Security Feeds
11/28/2006

Interested in monitoring the latest security news and alerts using RSS feeds? Use the RSS feeds located in the Security Directory to stay on top of critical security information.

Web Application Weakness
11/28/2006

According to Mass.-based Watchfire, the most vulnerable area in the enterprise information ecosystem is Web applications. The company specializes in software and services to audit the security and regulatory compliance of Web sites.

Microsoft Launches Security Week
11/28/2006

Microsoft today launched Microsoft Security Week 2006, a series of awareness building and education activities aimed at raising awareness of computing-related security issues. This will allow users to leverage the full advantages of the Internet with the confidence that they are protected against malicious software and other security threats.

Symantec Security Bulletin
11/27/2006

Symantec is releasing a new portfolio of security and availability products specifically for the small- to mid-sized marketplace.The new initiative from Symantec is an SMB security product blueprint that is intended as a guide to help customers and solution providers.

Homeland Security Classes
11/23/2006

Next year, Justan Holloway's class schedule will look more like an action movie plot than an academic pursuit. The Savannah State University sophomore will study international terrorism, disaster planning, criminology, social psychology and Arabic.

Holloway plans to be among the first to enroll in the college's new degree program in homeland security.

Fake Bombs Lost
11/22/2006

A major security alert has been sparked after police lost a briefcase full of imitation bombs. An officer left the case containing around 15 mock-up explosive devices on a train.

He was returning home after using the "bombs" in a presentation to security staff and police.

Pound Privacy
11/21/2006

What is Pound Privacy?

Pound Privacy is a campaign to create the first standard for search engine query privacy. The implementation is fairly straightforward: If you append the phrase "#privacy" at the end of a query on any search engine or site search, your query should not be tracked by IP or cookie, and should not be made public in keyword tools. It is that simple.

Background Checks
11/20/2006

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Background Checks

Homeland Security Aid Sentenced
11/20/2006

A 56-year-old former Homeland Security press aide was sentenced Friday to five years in prison after he pleaded no contest to sending sexually explicit Internet messages to someone he thought was a 14-year-old girl.

Hackers in Chile
11/19/2006

Two Chileans accused of hacking into thousands of government Web sites were freed from jail Wednesday but ordered to stay away from computers while the case is investigated, their lawyer said.

Internet Rage Becomes Physical
11/19/2006

A British man convicted of what has been described as the country's first "web-rage" attack, was jailed for 2-1/2 years on Friday for assaulting a man he had exchanged insults with over the Internet.

PGP is 15 Years Old
11/16/2006

PGP Corporation salutes the 15th anniversary of PGP encryption technology. Developed and released in 1991 by Phil Zimmermann, Pretty Good Privacy 1.0 set the standard for safe, accessible technology to protect and share online information.

Kevin Mitniks Security Advice
11/15/2006

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

~ Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.
~ Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
~ Use an antivirus product like AVG or Norton, and set it to update daily.
~ Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
~ Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
~ Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
~ Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
~ Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
~ Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
~ Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Complete Article

Privacy and Mobile Phones
11/14/2006

Intel Corp. has attached a privacy license to its new location-aware software product, intended to protect cell phone users' personal information as mobile devices increasingly rely on tracking technology to provide targeted services.

Software Piracy Leads to Guilty Plea
11/13/2006

The operator of a Web site that offered copies of software has pleaded guilty to one count of criminal copyright infringement, the U.S. Department of Justice.

Ronnie A. Knott, 36, of Salt Lake City, pleaded guilty Thursday before Judge T.S. Ellis III in U.S. District Court for the Eastern District of Virginia. He is scheduled to be sentenced Feb. 23, and he faces a maximum sentence of five years in prison and a $250,000 fine.

Complete Article

Water In Danger in Russia
11/12/2006

The head of the Federal Security Service said Tuesday that his agency had information that terrorists were planning attacks against water plants in southern Russia.

Israel Accuses Russian Tourist of Spying
11/12/2006

A Russian tourist, who tried to take picture against backdrop of Azrieli Towers in Tel Aviv was pounced by security personnel, accused of spying, planning terror attack for Hezbollah.

Protecting Your Computer
11/11/2006

Relatively simple local security measures you can take on your server to prevent a hacker from getting in and exploiting your system.

Complete Article

Panama on Security Council
11/10/2006

Panama was elected to the last seat in the UN Security Council for a new two-year term on Tuesday, in what seems to be the third longest electoral stand-off for a seat on the Security Council in the world organization's 61-year history.

How to Land a Security Job
11/09/2006

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Security Jobs and Background Checks

IBM Heading into Surveillance
11/08/2006

IBM's decided that it's had enough of making traditional processors, and instead will head further into the lucrative military and law enforcement business. Big Blue just announced today that it's begun selling the "Smart Surveillance System," or S3.

eVoting Security Issues Raised
11/07/2006

Security of electronic voting machines is coming under scrutiny as the midterm elections approach.
On the eve of Election Day, several states have reported computer problems during early elections. A privacy group predicted disaster; voters' advocates anticipated errors and one group announced a Web tool for recording and addressing problems.

Internet Enemies
11/08/2006

The international journalists' advocacy group Reporters Without Borders has released its annual list of countries that systematically violate online free expression.

The countries include:
- Belarus
- Burma
- China
- Cuba
- Egypt
- Iran
- North Korea
- Saudi Arabia
- Syria
- Tunisia
- Turkmenistan
- Uzbekistan
- Vietnam.

Privacy Issue Ignored
11/02/2006

A Homeland Security advisory panel finds serious privacy and security problems with RFID. But the report is stalled, while the government rolls out new ID cards using the controversial technology.

Privacy Issue Ignored

Hackers Penetrate Water System
11/01/2006

A foreign hacker who penetrated security at a Harrisburg, Pa., water filtering plant is under investigation by the FBI for planting malicious software capable of affecting the plant's water treatment operations, ABC News has learned.

Complete Article



Blog Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.