Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
What is Fair Use?
10/26/2007

As the Internet matures, users and governments are struggling to manage controversial issues. Lets face it, the Internet did not exist when the US copyright laws were written;let us not forget, while many countries respect copyright laws, the Internet is global without a governing body. There are not only different laws, rules and regulations, but also jurisdiction issues. RSS didn't exist when copyright laws were written either. While ardent supporters feel any content in a feed can be syndicated, other equally fervent publishers contend that original works are just that--original works, and in many countries protected by copyright laws.

Much of the Internet is uncharted territory. There is no single agencies that has complete control over content or censorship, and it is unlikely that there will ever be a recognized body that regulates and agrees to terms and conditions to govern the online world. At this point, the location of webhosts and companies owning domains dictate what laws that are observed. In other words, if a company in the US or UK is violating a copyright and their host is in the US or UK, it will be easy to enforce copyright laws in the event of a violation and have the website content pulled. If the website is located on a server in a region that does not recognize or acknowledge the rights of a copyright holder, the web host will be less likely to cooperate in removing the offending content.

What is Fair Use?

Food Supply Vulnerabilities
10/25/2007

The possibility that the nation's food supply could be targeted by terrorists has existed since at least the anthrax letters of October 2001, but recent events have underlined just how real the threat is. Suspects in last month's failed car bombings in London and Glasgow, for instance, include physicians, a reminder that terrorists can have biomedical know-how. And imports of contaminated food from China—pet food laced with the chemical melamine, toothpaste with the poisonous compound diethyl glycol and seafood with carcinogenic antimicrobials—show how vulnerable the food supply is to intentional acts of terrorism, too, says Frank Busta, codirector of the National Center for Food Protection and Defense at the University of Minnesota.

Iraq Changes Required
10/24/2007

Defense Secretary Robert M. Gates said yesterday that the mission of private security contractors guarding individuals in Iraq is fundamentally at odds with the broader U.S. military objective of stabilizing Iraq, and that changes would be required to reconcile them.

Israel Uncovers Plot to Kill Olmert
10/23/2007

Israels security services foiled a plot by Palestinian militants to assassinate Israeli Prime Minister Ehud Olmert before a summit with Palestinian President Mahmoud Abbas, Israeli media reported on Sunday.

The reports said Yuval Diskin, the head of Israel's Shin Bet internal security service, told Olmerts cabinet that militants planned to attack the Israeli leader's convoy as it sped to a meeting with Abbas in the West Bank town of Jericho in August.

Security Science Panel
10/23/2007

A new commission should be established to help balance the need for scientific openness and security concerns in a world facing terrorism, the National Research Council urged Thursday.

The new Science and Security Commission should be co-chaired by the presidents national security adviser and the director of the Office of Science and Technology Policy, said the council, an arm of the National Academy of Sciences. It should include representatives from academic research institutions and national security agencies.

Panda Transaction Services
10/23/2007

Panda Security has launched Panda Security for Internet Transactions, an antifraud service for online transactions to protect clients of e-banking, pay-platforms and e-commerce against active malware.

Banks and businesses will be able to scan PCs to ensure that users launching transactions on their websites are not affected by any malicious code, Panda Security said. This eliminates the risk of passwords being stolen or other fraudulent operations, the company said.

Comcast Blocking Traffic
10/22/2007

Comcast Corp. actively interferes with attempts by some of its high-speed Internet subscribers to share files online, a move that runs counter to the tradition of treating all types of Net traffic equally.


The interference, which The Associated Press confirmed through nationwide tests, is the most drastic example yet of data discrimination by a U.S. Internet service provider. It involves company computers masquerading as those of its users.
complete article

RIAA Next Target
10/22/2007

The RIAA, which has apparently dedicated itself to the mission of searching out copyright violators no matter where they might hide, has chosen for its next well-publicized target a Usenet access provider called Usenet.com. Now, keep in mind that the RIAA is not going up against the Usenet itself -- there's nobody really to sue in that huge decentralized tangle. It is going up against one of those companies that offer users access to the vast library of Usenet newsgroups.

Security Templates
10/21/2007

In need of a website for a security company? Check out these security templates ! Search on keywords to expand the templates you are viewing.

Mynamar Internet Access
10/19/2007

Myanmars ruling junta restored Internet access but kept foreign news sites blocked, partially easing its crackdown as a U.N. envoy arrived in Thailand on Sunday to rally neighboring governments around demands for democratic reforms in the country.

Land that Job Part 2
10/19/2007

With 385,000 American workers in the call center industry, competition is intense for the most desirable positions. If you are fortunate enough to be called in for an interview for one of these posts, how can you prepare yourself so that you stand out from the crowd?

Land that Job Part 2

St Petersburg Hub of Internet Security Problems
10/19/2007

An Internet business based in St. Petersburg has become a world hub for Web sites devoted to child pornography, spamming and identity theft, according to computer security experts. They say Russian authorities have provided little help in efforts to shut down the company.

Internet As a Weapon
10/18/2007

Cyberspace may become a more active battlefield in the Bush administrations war on terrorism.

The new National Strategy for Homeland Security, issued earlier this week by the White House, places a greater emphasis on the uninterrupted use of the Internet and the communications systems, data, monitoring, and control systems that comprise our cyberinfrastructure.

Cybercrime in Russia
10/16/2007

An Internet business based in St. Petersburg has become a world hub for Web sites devoted to child pornography, spamming and identity theft, according to computer security experts. They say Russian authorities have provided little help in efforts to shut down the company.

Russian Spammer Murder Story Deemed A Hoax
10/15/2007

Contrary to rumors circulating on the Internet, Russian spammers are alive and well.


A blog post on Thursday by someone writing under the name Alex Loonov claimed that Alexey Tolstokozhev, a Russian spammer, had been found murdered in his house near Moscow. Contrary to rumors circulating on the Internet, Russian spammers are alive and well.

complete article

Software to Target Cyber-bullying
10/12/2007

New computer software to tackle cyber-bullying is being rolled out across schools in London.

The software monitors computer activity on the internet, instant messaging, e-mail and other applications for inappropriate behavior.
If improper activity is detected, the program stores details of the offending material for review

Inappropriate Email
10/05/2007

Four out of every five children receive inappropriate spam e-mail touting get-rich-quick schemes, loan programs, and pornographic materials, according to a study released by Internet security provider Symantec Corporation.

McAfee New Products
10/03/2007

McAfee has released the 2008 editions of its security suite -- McAfee Total Protection, Internet Security, and VirusScan Plus -- plus a new product for mobile phones.

Facebook Not Safe
10/02/2007

The office of New York Attorney General Andrew Cuomo has stepped up its warnings against social-networking site Facebook, with a representative from the office saying the company may face a consumer fraud charge for misrepresenting how safe the site is for minors. The problem, according to an Associated Press story, is that Facebook claims its closed-site model makes the service safer for minors than other social networks, and that privacy and harassment concerns receive prompt responses.

The attorney generals office says those asserations simply are not true.

Spy Satelite Delayed
10/01/2007

Score one for the skeptics on the U.S. House of Representatives Homeland Security Committee.

Under fire from politicians citing privacy worries, the U.S. Department of Homeland Security is delaying plans--previously slated to kick in Monday--to begin making detailed spy-satellite images available to a wider range of government agencies.

Security Breaches
09/29/2007

A top homeland security lawmaker has called for an investigation into possible cyber attacks on computer systems at the Homeland Security Department. Rep. Bennie Thompson, D-Miss., said he believes Unisys Corp - the company that holds the $1.7 billion contract to build parts of the Homeland Security Department's computer network - is at fault for these network break-ins.

Asia Trailing in Finance Security
09/29/2007

Asia Pacific financial institutions are the worlds worst when it comes to information technology security threats,a new study by business consultants Deloitte says.
The top three breaches were through email attacks such as spam, viruses and phishing (where data was illegally collected from a persons email or internet).

But there was some good news - the 2007 Global Security Survey found the regions finance houses were global leaders in privacy compliance.

Virtual Fence Failing
09/28/2007

Because of a software glitch, the first high-tech virtual fence on the nation's borders remains inoperable, three months after its scheduled debut.

Homeland Security Secretary Michael Chertoff said he is withholding further payment to the prime contractor, Boeing Co., until the success of the pilot project stretching 28 miles near the border southwest of Tucson.

Nine 98-foot towers laden with radar, sensors and sophisticated cameras have been built in an area heavily trafficked by illegal immigrant and drug smugglers. The towers, each a few miles apart, are intended to deter or detect border crossers and potential terrorists and enhance the ability of Border Patrol agents to catch them.

People Are the Biggest Security Threat
09/27/2007

The biggest threats to the security of financial institutions electronic systems are the mistakes that people make according to a survey of banks. No big surprise there.

TJX Settles Class Action Lawsuit
09/27/2007

The TJX Companies, Inc., a discount retailer, said Friday it settled customer class action lawsuits in the United States, Canada and Puerto Rico stemming from a massive security breach of customer data that affected at least 45 million credit and debit cards.

The announcement did not specify the settlement cost, but noted that its estimated costs were included in a $107 million reserve included in its second-quarter report for fiscal 2008 and its estimate of $21 million in costs expected in fiscal 2009. The $107 million figure includes costs from other lawsuits not included in the customer class actions, the Framingham, Massachusetts based company said.

New York Giving Identity to Illegals
09/26/2007

State officials say a plan to provide driver's licenses to illegal immigrants with valid foreign passports will enhance security by creating records of their identities. But critics say those records could compromise security instead.

New York has between 500,000 and 1 million undocumented immigrants, many of whom drive without licenses and car insurance or with fake licenses, Gov. Eliot Spitzer said in announcing the plan Friday. He said it would bring people out of the shadows into American society.

Security Templates
09/25/2007

In need of a website for a security company? Check out these security templates ! Search on keywords to expand the templates you are viewing.



Current Blog

2007 Security Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.