Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Credibility Online
10/30/2012

Credibility online is becoming more and more of an issue. Anyone can have a blog or post to a forum and anyone can edit wiki entries. Web surfers are beginning to comprehend that just because it is in print does not necessarily mean that it is true. In fact, in today's online world, the collective truth might be the closest thing we can get to the real truth. Peer policing and social bookmarking have become common in the online world.

Credibility Online

Anonymity of the Internet
10/29/2012

Attempting to legislate the Internet will not work, as the Internet is global and covers areas where no single governments rule applies. The jurisdiction issues make the Internet a haven for fraudulent and illegal activity.

Child exploitation and the rise of Internet related crimes is increasing. Child exploitation has no boundaries; pedophiles exist in every socioeconomic, ethnic and religious community. Consider these statistics, 20% of children online are approached sexually online. 89% of those advances take place over instant messaging. Online predators prowl, rebellious teenagers are opportune targets, and shared personal details often make them become victims.

Anonymity of the Internet

Airport Security
10/28/2012

Airport security needs to undergo a radical overhaul or else passengers will become further disgruntled, lines will grow and terminals will be overwhelmed, airline executives said Tuesday at a global aviation conference.

Spy on Your Competition
10/27/2012

It is important to realize that while monitoring your competitors is essential, it could easily become an obsession. Therefore, it is crucial that you strike a balance when incorporating it into your business plan. There are several ways to conduct successful stealth competitive intelligence operations. While it is fanciful to imagine yourself as a secret agent or spy, none of these techniques are difficult, hidden or secretive. In fact, most of them are tools or services available to all businesses.

Spy on Your Competition

Android a Haven for Malware
10/26/2012

A division of the Federal Bureau of Investigation has issued a warning to smartphone users about mobile malware and device safety, specifically regarding the Android operating system. A report published late last week the Internet Crime Complaint Center revealed that it has been made aware of various malware attacks, such as Loozfon and FinFisher, that target Android smartphones. Each malware is different and can range from stealing a user’s address book to completely taking over the infected device. The agency notes that Loozfon and FinFisher are just two examples of active malware that are used by criminals and users should take precautions to protecting their devices.

RSS Feeds and Security
10/25/2012

As RSS gains momentum security fears loom large. As publishers are quickly finding innovative uses for RSS feeds, hackers are taking notice. The power and extendibility of RSS in its simplest form is also its achilles heel.

RSS Feed Security

Company Impact on Food Security
10/24/2012

Nothing could be more appropriate than the World Food Day focus on cooperatives this year, given the benefits they can have on livelihoods and food security.

The collective power of cooperatives can enable better access to market, better returns, better access to inputs and services, and a better support network for smallholder farmers. Higher returns act as an incentive for farmers to invest back into their farms, so farms become more sustainable. And more production and more income means farmers can better provide for the nutrition, education and health of their families.

And Africa is, of course, at the centre of the global challenge of food security. First because one in three of the world's hungry live on the continent. Second, because Africa has the potential not only to feed its own people but also to become a more significant food exporter. Around 60 per cent of the world's uncultivated arable land is found in Africa. But even bringing grain yields up to half the world average on land already under crops would produce a sizeable surplus to export.

Standard Settings Not Always Best
10/23/2012

If you stick with your softwares default settings, you're letting the programs' vendors determine how much security is right for your system. Those vendors have their best interests in mind, not yours.

Security Logo Designs
10/22/2012

Large collection of security logo designs:

or private detective logo designs:

Developers Ignore Their Security Responsibilities
10/21/2012

Software developers are ignoring their responsibilities to protect and design infrastructure that is properly secured, according to Oracle Chief Security Officer Mary Ann Davidson.

Speaking at the Australian Information Security Association's National Conference 2012 in Sydney today, Davidson said that developers, in many cases, were building systems used in key infrastructure without even thinking about security.

MiniFlame
10/20/2012

Ongoing teardowns of the Flame malware and its underlying components have yielded a surprising discovery: a new piece of malware.

Security researchers at Kaspersky Lab said that what they previously suspected was an attack module for the Flame malware is instead a standalone piece of attack code, although it can do double duty as a plug-in for both the Flame and Gauss malware. Designed for data theft and for providing attackers with direct access to an infected system, MiniFlame is based on the same architectural platform as Flame, according to Kaspersky Lab.

MiniFlame is a high-precision attack tool, said Alexander Gostev, chief security expert at Kaspersky Lab, in an emailed statement. Most likely it is a targeted cyberweapon used in what can be defined as the second wave of a cyberattack ... to conduct more in-depth surveillance and cyber-espionage.

How to Effectively Protect Web Content
10/20/2012

Just like writers, photographers, and other creative artists have learned, protecting content is one of the primary struggles that webmasters face on a daily basis. It takes time and talent to develop quality content, and there are few things more frustrating than to discover that your content has been poached by another website.

There are a number of actions that webmasters can take to proactively protect their work from being used without authorization by people on the web who are simply looking to cut corners. Take the following steps to proactively guard your content...

How to Protect Web Content

Cryptography and Collision Attack
10/19/2012

A widely used cryptographic algorithm used to secure sensitive websites, software, and corporate servers is weak enough that well-financed criminals could crack it in the next six years, a cryptographer said.

The prediction about the SHA1 algorithm, posted recently to a hash function mailing list sponsored by the National Institute of Standards and Technology, is based on calculations its author and fellow cryptographers admit are rough. The back-of-the-envelope math also incorporates several assumptions that are by no means certain. At the same time, the ability to carry out a reliable collision attack on SHA1 would have catastrophic effects on the security of the Internet.

Authentication for Mobile Security
10/18/2012

Imagine that your smartphone is lost, or your tablet is stolen. Aside from the cost of the device itself, what else is at risk? How much sensitive personal data do you have stored on your smartphone or tablet?

Of course you have sensitive information stored on your mobile device. One of the primary benefits of carrying the mobile device in the first place is to have that information at your fingertips.

State Sponsored Cyber Attacks
10/17/2012

Google officials are sending out tens of thousands of new messages to Gmail users that their accounts may be targets of state-sponsored cyber-attacks, citing a growth in the number of threats coming out from other parts of the world, particularly the Middle East.

The warnings, which Google security officials began sending out Oct. 2, are coming after Google security officials gleaned new information about cyber-attacks and their perpetrators, according to a report in the New York Times.

Fish Poop Equals Food Security
10/16/2012

Drought, genetic modification, energy instability, population growth, war. All of these things have a major impact on the price and accessibility of food. A lack of food security has the biggest impact on poor and remote communities, since resources needed for planting, harvesting, and storing food are even harder to come by. In Nepal and other developing nations, aquaponics, a combination of aquaculture and hydroponic growing, is gathering steam as a possible solution.

Aquaculture is the practice of breeding, rearing and harvesting fish or other sea foods, usually in ponds, rivers, lakes and the ocean, although it can also be accomplished indoors as well. Hydroponics is the practice of growing vegetables in water and nutrients, without soil.

UN Security Council Condemns Syria
10/15/2012

The U.N. Security Council on Friday condemned in the strongest terms four deadly suicide bombings in Syrias largest city after Syria requested the condemnation.

National Guard and Cyber Security
10/14/2012

The Washington National Guard is leveraging a decade of investment in cyber security at Camp Murray in Lakewood into projects that could protect state and local governments, utilities and private industry from network attacks.

The aim is to bring to the digital world the kind of disaster response the National Guard already lends to fighting wildfires and floods, said Lt. Col. Gent Welsh of the Washington Air National Guard.

Airport Security Failure
10/13/2012

Screeners at Newark Liberty International Airport are properly executing standard pat-downs of passengers only 16.7 percent of the time and they identify and take appropriate action on prohibited items in only a quarter of all cases, according to a secret internal report.

Memorial Staffer Questions Security and is Fired
10/12/2012

A former manager at the Sept. 11 memorial was fired for raising health and security concerns at one of the most security-conscious places in the world, he said in a lawsuit Friday.

Thomas Cancelliere maintained he was fired from his job as director of the National Sept. 11 Memorial and Museum in retaliation for alerting his bosses to numerous problems.

How to Protect Web Content
10/12/2012

Just like writers, photographers, and other creative artists have learned, protecting content is one of the primary struggles that webmasters face on a daily basis. It takes time and talent to develop quality content, and there are few things more frustrating than to discover that your content has been poached by another website.

There are a number of actions that webmasters can take to proactively protect their work from being used without authorization by people on the web who are simply looking to cut corners. Take the following steps to proactively guard your content...

How to Protect Web Content

Spy on Your Competitors
10/11/2012

The old adage, keep your friends close, and your enemies closer, is applicable not only to personal relationships but business relationships as well. While I am not suggesting that you befriend your competitors, it is important that you are cognizant of your competitors' business ventures and methods.

It is important to realize that while monitoring your competitors is essential, it could easily become an obsession. Therefore, it is crucial that you strike a balance when incorporating it into your business plan. There are several ways to conduct successful stealth competitive intelligence operations. While it is fanciful to imagine yourself as a secret agent or spy, none of these techniques are difficult, hidden or secretive. In fact, most of them are tools or services available to all businesses.

Spy On Your Competitors

Safety Online
10/10/2012

The proliferation of computer technology and emergence of the Internet has enhanced the lives of children and adults. Increasing productivity and efficiency, the Internet is a powerful educational tool, and it provide youths a vast amount of information. That said, it is important to remember that the Internet can also be very dangerous. Criminals are using modern technology to prey on innocent victims.

According to research, one in five youths, ages 10-17, were approached online sexually or were sexually solicited. The tool for the solicitation was the Internet. In fact, 89% of those solicitations occurred via chat rooms or with predators using instant messaging. Additionally, nine out of ten children online, ages 8-16, have viewed pornography online. In most cases the children unintentionally encountered pornography while searching for an alternate item, but the statistic is very telling.

Safety Online

RSS Security
10/09/2012

RSS is growing at a lightening speed. What was once only known as a techie tool, RSS is becoming a tool that is continuously being used by the general population. Along with the good comes, the not so good. And while some have mentioned the emergence of RSS spam, where content publishers dynamically generate nonsensical feeds stuffed with keywords, the real concern relates to security. While an annoyance to the search engines, spam in RSS feeds pales in comparison to the possible security concerns that could be in RSS future.

RSS Security

Reputation Management
10/08/2012

The Internet is a bit like the old wild west, and sadly, people often post material about an individual, product, company, or service that is inaccurate or simply nasty. Businesses and individuals alike are struggling with how to best deal with online inaccuracy and defamation. The normal steps for dealing with defamation typically involve litigation, but this is not always realistic for Internet-based situations since the Internet is global, and not managed or governed by any single set of laws.

If you have the good fortune of being located in the same legal jurisdiction as the offending poster and their website hosting company, you might be able to successfully prosecute them; or at the very least, you might be able to get the webpage with the offending material taken down by the website host. Keep in mind that most defamation court cases require that you show that actual harm was done by the offending material, which can often be difficult.

Of course, even if you are able to remove the initial post, cross your fingers that it was not part of a syndicated blog using RSS feeds. If the posting was syndicated, it will truly be an uphill battle to track down and remove all copies.

Reputation Management

Security Business Cards
10/07/2012


Security Business Cards for professionals!

Be Prepared!
10/06/2012

Businesses and individuals alike have all grown to rely on computers. The reliance is never more apparent than when something happens to the horrid little box that makes our lives easier. We expect computers to react a certain way, in certain situations. It nearly always comes as a surprise when the beloved little box, know as a computer, refuses to boot up. Probably even more shocking, is the dawning that we've neglected to backup or prepare for the unforeseen disaster that has just been thrust upon us.

Regardless of the number of times you have experienced the dread of being unable to access the information trapped in the god-awful computerized contraption, we are always invariably unprepared.

Be Prepared In the Event of Disaster

Security PowerPoint Templates
10/05/2012

Large collection of security PowerPoint Templates


Keeping Your Password Secure
10/04/2012

As the web has evolved, so have the methods of collecting personal information. A large number of websites require visitors to register to gain access or participate. While the need for registration is understandable, tracking user names and passwords can be burdensome. Consider using software to store your passwords, in a safe accessible manner.

Keep Your Passwords Secure

Keep Children Safe Online
10/03/2012

There was once a time when you only had to worry about children when they were outside or not at home. Those times have changed. Strangers can now enter your home, without a key or coming through a door. How you may ask? These strangers enter your home using a keyboard. These strangers can befriend your children online.

Social networking has become increasingly popular and websites like Myspace have thrived with adolescents and teens. While pedophiles may be the minority on these sites, the threat of having a pedophile enter your home, under the guise of being someone their not, is just too big of a threat to ignore.


Keep Children Safe Online

Android Hack Repopulates Transit Cards
10/02/2012

Two researchers have created an Android app that they say can re-program certain NFC-enabled travel-cards, such as those used in the San Francisco Muni and New Jersey PATH transit system.

The researchers, Corey Benninger and Max Sobell of the Intrepidus Group, showed off the tool on Thursday at the EUSecWest security conference in Amsterdam. The flaw they were exploiting can be found in paper-electronic tickets — designed for one-off or limited use — that use a MiFare Ultralight NFC chip from NXP Semiconductors.

The exploit allows the apps users to revert such a ticket to its original state. If the card had been used for all the originally-loaded 10 trips, for example, the hack would make it seem as though the card was freshly bought and fully loaded.

iPhone Security an Epic Fail
10/01/2012

The vaunted security of the iPhone 4S took an epic fail tumble at the recent Pwn2Own hacking competition. Seems like nothing is secure or safe anymore. Sure, there were a lot of criticisms regarding the iPhone security fail - but it still netted the competition winners at this hackathon something like $30,000 US. THAT is a lot of money and it offers definitive proof that the iPhone is insecure. In fact, you may check the alternate sources for this: Threatpost and ZDNet. If you have any negative comments on the hack of the iPhone please refer to those sources.

No Evidence Secret Service Scandal Caused Threat to President
09/30/2012

A Secret Service scandal involving agents who hired prostitutes in Colombia did not harm presidential security, according to an investigation conducted by the acting inspector general for the Department of Homeland Security.

Although we found that these agents engaged in misconduct, our investigation developed no evidence to suggest that the actions of USSS personnel in Cartagena compromised the safety and security of the president or any sensitive information during this trip, Charles Edwards wrote to House and Senate members concerned about the matter.




Current Blog

2012 Security Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.