Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Risk of Security in Mobile Environment
10/29/2011

Computer security involves more than installing an antivirus utility on your PC. Malicious hackers are on a mission to steal money and wreak havoc, and they will do it by any means possible. The growing number of mobile devices, such as phones and tablets, and the popularity of social networks give them new avenues in which to expand their cybercrime.

The amount of malware spreading on phones and tablets continued to surge this year, rising 22 percent over 2010 in the first half of 2011, according to a McAfee study

Security In Iraq an Issue
10/27/2011

Iraqis fretted about the ability of their armed forces to protect them from violence after U.S. President Barack Obama said on Friday all U.S. troops would withdraw by the end of the year.

Washington and Baghdad failed to agree on the issue of immunity for U.S. forces after months of talks over whether American soldiers would stay on as trainers more than eight years after the U.S.-led invasion that toppled Saddam Hussein.

Obamas announcement prompted worries among Iraqis over the stability of their country and a possible slide back into sectarian violence.

Security in the Cloud
10/27/2011

Security, cited as an issue with cloud computing when the concept began to take hold several years ago, remains a pivotal concern for developers, an IBM official stressed on Wednesday afternoon.

Executives from IBM and Amazon sparred over the degree of security issues pertinent to cloud computing during a conference panel session at the ZendCon 2011 event in Santa Clara, Calif.

Palestinian Vote
10/26/2011

A Palestinian official on Saturday expressed hopes that the United Nations Security Council would vote on the U.N. membership of an independent Palestinian state next month.

Secure the Internet
10/25/2011

The computer networks that control power plants and financial systems will never be secure enough, so government and corporate leaders should consider developing a new, highly secure alternative Internet, a top FBI official said.

Shawn Henry, the FBIs executive assistant director, said critical systems are under increasing threat from terror groups looking to buy or lease the computer skills and malware needed to launch a cyber attack.

UN Security Votes
10/24/2011

Round and round they went. After a day of marathon voting for Security Council seats, the 193-member U.N. General Assembly still could not decide between Azerbaijan and Slovenia, putting off the 11th ballot until Monday.

Does it matter? Yes. The 15-member U.N. Security Council, whose decisions are mandatory, can be critical in getting world support for sanctions, initiating peacekeeping missions or threatening states to cool it -- or else. For countries initiating action, a positive vote in the Council shows international backing.

Los Alamos
10/22/2011

The Chemistry and Metallurgy Research Replacement complex at the Los Alamos National Laboratory is intended to replace a World War II-era plutonium facility at an earthquake-prone location. The potential facility has long been under consideration, and its completion would probably require nearly 10 years, according to AP.

Officials have maintained that the site, to be used by researchers studying radioactive substances such as plutonium, is critical to fulfilling Los Alamoss nuclear weapons mission and would neither produce nor hold nuclear bombs. Opponents have derided the initiative as an unneeded and expensive means of generating nuclear armaments

Cyber Security Awareness
10/22/2011

National Cyber Security Awareness Month

Each October, in an effort to increase awareness and prevention of online security problems, the U.S. Department of Homeland Security and the National Cyber Security Alliance spearhead National Cyber Security Awareness Month (NCSAM).

The Higher Education Information Security Council also promotes and participates in the campaign, joining forces with a range of organizations to expand cyber security awareness across the country. Schools and universities are encouraged to participate in their capacity as educators.

Border Security a Real Concern
10/21/2011

Texas Gov. Rick Perry said Wednesday an Iranian-backed terror plot coordinated in Mexico proves the U.S. must secure its southern border, an attempt to shore up his standing among Republicans on immigration.

The Republican presidential hopeful used Tuesdays announcement that Iranian forces had sought to assassinate the Saudi ambassador to the U.S. to call for more border troops, improved fencing along the Mexican border and increased border patrols including the use of predator drone surveillance.

Security Cuts
10/20/2011

An editorial on Monday identified specific weapons programs that could be targeted for cuts as the Pentagon faces growing pressure to help curb the federal deficit. There is, however, a huge area of potential Defense Department savings that does not involve equipment and war- fighting capabilities: bringing under control the galloping -- and unsustainable -- cost of providing well-deserved benefits to those who serve our country.

The main issue here is Tricare, the health-insurance program for active-duty, reserve and National Guard troops and retirees, as well as their dependents. This year, the Pentagon plans to spend $52 billion on the program, or almost 8 percent of its $700 billion budget.

Cloud Security
10/19/2011

IT network services provider Juniper announced on Friday that its SRX Series Services Gateways have been selected by Dell to help secure its cloud data center.

This news comes on the heels of Juniper Networks appointments in the Asia-Pacific region.

Border Security
10/19/2011

Two retired generals claim doing business along the Texas-Mexico border is like being in a war zone. They took their message to Congress on Friday, and some lawmakers did not like it.

The retired generals released their strategic military analysis of the border. They started studying the situation after the Texas Legislature hired them. The ex-military men took their report to Washington on Friday. Congressman Michael McCaul called the retired generals to Capitol Hill to testify.

Chat Down vs Pat Down
10/18/2011

Chat-downs, a play on the word pat-down, describing the physical screening that has angered some passengers as too intrusive, are part of the U.S. governments effort to adopt a broader strategy of sifting out people who might pose a greater security risk among the roughly 1.2 million people who fly each day.

Yemeni Security Issues
10/17/2011

Yemeni security forces unleashed a deadly assault on anti-government protesters in the nation's capital on Saturday and deadly fighting raged between government forces and tribal fighters, witnesses said.

At least 10 people were killed and 38 others were wounded, said Mohammed Al-Qubati, who was at the scene of the protests in Sanaas Change Square. He said forces opened fire to disperse demonstrators who planned to march to the city center from the square.

Energy Companies a Risk
10/13/2011

U.S. utilities and industries face a rising number of cyber break-ins by attackers using more sophisticated methods, a senior Homeland Security Department official said during the government's first media tour of secretive defense labs intended to protect the U.S. power grid, water systems and other vulnerable infrastructure.

Acting DHS Deputy Undersecretary Greg Schaffer told reporters Thursday that the worlds utilities and industries increasingly are becoming vulnerable as they wire their industrial machinery to the Internet.

SAT Cheating Likely More Common, Than Most Think
10/12/2011

The administrators of college entrance exams should make immediate security changes to stop cheating, said the prosecutor who has accused a college student of using a fake ID to take exams for six of his buddies €” one of them a girl.

Nassau County District Attorney Kathleen Rice told The Associated Press on Thursday that she suspects cheating is widespread and that security changes should be implemented as soon as this weekend, when nearly 700,000 students are expected to take the SATs.

Security Fears and Mobile Devices
10/11/2011

The risks mobile devices pose to enterprises and consumers are mounting with the rising adoption of smartphones and tablets. Not only are cybercriminals finding the growing base lucrative to target, weaknesses and vulnerabilities of mobile platforms also make their effort worthwhile.

David Hall, Symantecs regional consumer product marketing manager for the Asia-Pacific region, told ZDNet Asia the fact that more are using smartphones and tablets, have not gone unnoticed by cybercriminals. Citing the Symantec Internet Security Threat Report Volume 16, Hall said that mobile operating and system vulnerabilities jumped from 115 in 2009 to 163 last year--an increase of 42 percent.

As more users download and install third-party applications for mobile devices, the possibility of installing malicious apps also increase, he added in his e-mail. Malicious codes are now designed to generate revenue and there are likely to be more threats created for these devices as people increasingly use them for sensitive transactions such as online shopping and banking, he explained.

Security is a Battlefield
10/10/2011

Organizations must understand that security is like warfare, and in a world where they will be compromised, they have to strategize the best approach to defend, revise their battleplan and eliminate adversaries, according to Eddie Schwartz, RSAs first chief security officer.

Schwartz, who came into office in June this year, said information security involves three elements: studying the enemy, attack and defense. He finds it fascinating to think about how organizations defend themselves in a world where you cannot "put a wall around" themselves nor predict the nature and timing of cyberattacks.

The C-level executive, who has practised karate and aikido for as long as he has been in the security industry, said that like defending a castle or yourself on a battlefiield traditional concepts sometimes do not work for organizations and new concepts must be applied.

Pakistan Security Issues
10/09/2011

Pakistans political and military leadership have closed ranks, shrugging off intense US pressure to do more to combat militant groups and accusing Washington of using the country as a scapegoat for NATO failures in Afghanistan.

Prime Minister Yousuf Raza Gilani held crisis talks with opposition leaders and military officers to formulate a response to US accusations that its security services were working hand in hand with the militant Haqqani network.

Social Media Pose Security Risks
10/08/2011

Virus and malware attacks against organizations have increased because of employees using Facebook, Twitter, LinkedIn and other social media in the workplace, according to a global study.

Of the 4,640 organizations surveyed by the Ponemon Institute, a research firm, more than half said these computer attacks grew as a result of workers using social networks. About a quarter of those respondents said the attacks rose by more than 50 percent.

As social media services play a bigger role in businesses, many organizations find themselves ill-equipped to handle the accompanying security risks, according to the report. Researchers surveyed information-technology employees at organizations in the U.S., India, Brazil, Germany and elsewhere, and found that only 35 percent had a policy on using social media at work. Of those, 35 percent enforce it.

Palestines UN Application
10/07/2011

The U.N. Security Council on Monday took up the issue of the Palestinian bid for full U.N. membership. The meeting was mostly procedural and that the council is expected to meet again on the subject later this week.

The 15-member Security Council met behind closed doors for less than one hour.  Afterward, Lebanese Ambassador Nawaf Salam, who holds the rotating presidency this month, spoke to the press.

Cyber Security Awareness
10/06/2011

Lookout Mobile Security, a smartphone security company dedicated to making the mobile experience safe for everyone, is joining the National Cyber Security Alliance in support of National Cyber Security Awareness Month this October. Millions of consumers now regard their smartphone as their most personal computer and use their phone to bank, shop and send valuable information. As mobile devices have become an essential tool for everyday life--they have also become an attractive target for hackers.

In fact, according to Lookouts 2011 Mobile Threat Report, up to one million mobile phone users will be affected by mobile security threats in 2011. During National Cyber Security Awareness Month, Lookout aims to increase consumer awareness about the various cyber threats to smartphones and educate mobile users about the steps they can take to best protect themselves. To this end, Lookout will be running an educational series on its blog, to help smartphone users understand how to best protect their phone and personal information. In addition, Lookout will be giving away Lookout Premium accounts on Twitter and Facebook throughout the month to encourage awareness.

Syria Sanctions in Question
10/05/2011

The Security Council is divided over whether to even threaten U.N. sanctions against Syria.

The council met again last Thursday behind closed doors to try to bridge divisions on what would be a first U.N. resolution condemning President Bashar Assads six-month military crackdown and calling for inclusive political talks.

But the Europeans and Russia remained at odds over mentioning the possibility of sanctions.

Attempted Bomber Trial
10/04/2011

Umar Farouk Abdulmutallabs attempted Christmas Day bombing of a commercial jet over Detroit in 2009 launched an exhaustive critique of the U.S. aviation security and intelligence-sharing systems.

It accelerated the installation of controversial body scanners in U.S. airports, while federal authorities pressed other nations to do the same.

Yet nearly two years later, Tuesdays start of the criminal trial of the Nigerian national, accused of detonating an explosive in his underwear, approaches more as an anticlimactic end to the near-catastrophic breach of national security.

Legal and terrorism analysts say the evidence against the slightly built 24-year-old €” a confession, his expressed allegiance to al-Qaeda and the expected testimony of passengers who subdued Abdulmutallab as the bomb flamed and then fizzled in his lap €” represents nearly a fait accompli for prosecutors

Port Security is Evolving
10/03/2011

Millions of containers from around the world enter ports throughout the United States every year.  The threat to U.S. national security at these ports have grown in the last decade and so has security.  At a recent technology conference near Los Angeles, companies were able to show off their latest inventions in high tech security.

At two of the busiest ports in the United States, thousands of containers come and go every day.  

John Holmes with the Port of Los Angeles says ten years ago security around here was not a priority.

Homeland Security is Homeless
09/29/2011

A planned $3.4-billion headquarters project on the site of a former asylum is stalled in Congress. In the meantime, the departments 22 agencies are scattered in more than 35 offices around Washington

Google Wallet Security
09/28/2011

Google Wallet allows users to simply enter a 4-digit PIN number and tap their phone enabled with a near field communication chip in front of a payment reader to make their store payments. However, like other payment mechanisms, prospective users will surely be wary of using technology which can potentially expose their personal financial information. Security analysts have already pointed out that the payment method of using a 4-digit PIN can be exposed to hacking attacks, and Google still needs a way to re-assure users that the Wallet is not vulnerable to cyber crimes.

Security Clearance
09/27/2011

More than 2.8 million federal employees and at least 1 million contractors and consultants have security clearances, according to a report by the Office of the Director of National Intelligence.

The number represents the number of security clearances as of October 2010 and is an increase of roughly 45,000 from a year before. The report marks the first time the government has inventoried the number of people having access to classified material.

The report also shows the number of contractors holding clearances declined slightly since October 2009. Contractors holding top secret clearances in October 2010 numbered 524,990, down from 536,637 the year before. Contractors holding confidential/secret clearances in October 2010 totaled 541,097, down from 552,088 the year before.

Secure Communities
09/26/2011

A program that checks the immigration status of all people booked into local jails needs systemwide changes and may need to be suspended until its problems are worked out, according to a review conducted by the Department of Homeland Securitys advisory council.

The program, called Secure Communities, allows Homeland Security to review the fingerprints of people arrested by state and local law enforcement agencies against federal immigration databases.

The program has been criticized because some people arrested for minor crimes, or on charges that are later dropped, are detained by Immigration and Customs Enforcement officials, sometimes resulting in deportation.

Apple Security Concerns
09/25/2011

Wanted: experienced security professional. Must have plan to thwart Chinese counterfeiters, protect secret blueprints from spies and keep workers from leaving super-secret unreleased smartphones behind in bars.

A day after a recent report surfaced that an Apple employee had lost a prototype for a new but unreleased iPhone at a Northern California watering hole, two job listings appeared on Apples website for managers of new product security.

TSA Chats
09/24/2011

The Transportation Security Administration recently began experimenting with a new technique at the airport in which officers engage in brief, casual conversations with passengers and listen for any hints of suspicious behavior. The program is modeled after an approach that has long been used by Israeli security officials, but does not employ profiling, TSA officials said.

Cybersecurity
09/23/2011

The names and email addresses of hundreds of U.S. intelligence officials €” including some senior officials in the Obama Administration €” have been posted on an anti-secrecy website after computer hackers allegedly swiped them from the internal membership list of a prestigious national security organization.

The apparent cyberattack on the Intelligence and National Security Alliance, or INSA, is the latest example of the ability of hackers to penetrate the computer systems of government agencies and private companies €” including those that pride themselves on their savvy and expertise in cybersecurity.





Current Blog

2011 Security Blog Archive

October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.