Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Red Sox Security
10/29/2013

Citing lessons learned during the Boston Marathon bombings in April, a Boston Police official discussed details of security preparations in case the Red Sox win the American League Pennant on Saturday or Sunday night.

In a press conference late Saturday afternoon, police Superintendent-in-Chief Daniel Linsky said it has been a while since a major Red Sox celebration in the city, but he added the Boston Police have had several opportunities in recent years to practice massive crowd control efforts, including the Celtics’ championship season in 2008 and the Bruins Stanley Cup title in 2011.

Border Secuirty Delays Bridge
10/28/2013

Lauded last year as a model of cooperation and a means to boost Texas robust trade relationship with Mexico, a rail project here in the Rio Grande Valley has hit a snag over the relocation of an X-ray machine.

And if Cameron County and United States Customs and Border Protection remain at an impasse, the opening of the Brownsville West Rail Bypass International Bridge — the first new rail bridge to connect the countries in more than a century — could face a months long delay, preventing an expansion at a crucial land port.

Food Security
10/25/2013

For the first time in recorded history the next generation is expected to die younger than their parents due to malnutrition and diet-related disease. This is because some will not get enough food to eat. Others will have no choice but to eat cheap, processed food. Both are victims of a global food system that serves monopoly profit rather than people.

Even though we produce 1 ½ times enough food for every man, woman and child on the planet, nearly a billion people go hungry while over a billion are malnourished.

The Human Factor
10/24/2013

The employee with a mobile phone in each hand and a tablet on his lap, gets my vote as the poster boy of corporate security risks for the next five years. This is a very real concern for small and large organizations. It is the anxiety that every CIO faces as more and more data is transmitted through devices that are not controlled by IT.

The presumption now is that IT has already lost, that the fight is over. That now, they just have to give in. And when they give in, they’ve got to let everything else in.

Uganda on Alert
10/23/2013

Ugandas government spokesman says the US embassy has shared intelligence with the administration warning of a possible terrorist attack, similar to the one on Kenyas Westgate mall nearly a month ago.

In response, Ofwono Opondo says President Yoweri Museveni’s government has placed all security agencies on high alert.

Egyptian Security Forces Tear Gas Students
10/22/2013

Egyptian security forces fired bird shot and teargas to prevent supporters of deposed Islamist President Mohamed Morsi from marching on Sunday to the site of a protest camp that was destroyed two months ago, a Reuters witness said.

The crowd of about 100 people were students from Al-Azhar University, the historic seat of Sunni Muslim learning. They threw rocks at riot police stationed outside the gates of the university, and police threw the stones back.

From Communism to Security Domination
10/21/2013

Totalitarianism often leads to capitalism.

Consider the ominous-sounding Research Institute for Mathematical Machines where, in 1988, researchers Eduard Kucera and Pavel Baudis toiled while Czechoslovakia was a satellite of the Soviet Union.

Kucera had no future in physics because he refused to join the Communist Party. Baudis was no better off, examining strange code on a floppy disk that turned out to be the Vienna virus.

Little did Kucera and Baudis realize that a quarter-century later, their modest cooperative – then called ALWIL – would blossom into Avast Software, a full-fledged international phenomenon. With nearly 200 million customers in 43 languages – a staggering 1 million users in 38 different countries – it is used by more people than rivals AVG Technologies, Symantec and McAfee combined.

US Thawing to Pakistan
10/20/2013

The United States has quietly restarted security assistance to Pakistan, U.S. officials said on Sunday, after freezing much of that aid during a period of strained relations beginning with the 2011 Navy SEAL raid that killed al Qaeda chief Osama bin Laden.

While the move to free up the aid has been underway for some months, it became public as President Barack Obama prepares for a White House meeting on Wednesday with Pakistani Prime Minister Nawaz Sharif.

Relations between the two countries remain tense on major issues, including Pakistani opposition to U.S. drone strikes and Washington's complaints about the ties of the Pakistani intelligence service to militant groups active in Afghanistan.

But the bonds appear to be on the mend after a series of major setbacks in recent years, including the bin Laden raid, a NATO air strike that mistakenly killed Pakistani border guards and a January 2011 incident in which a CIA contractor killed two men on the streets of Lahore, Pakistan.

Shortcuts in Background Checks
10/16/2013

The calls and e-mails from top executives came toward the end of each month, former managers at USIS recalled. The company needed to swiftly complete investigating security clearances for the government in order to reach its monthly revenue goal, the managers said they were told.

In interviews this week, former and current USIS employees detailed how the company had an incentive to rush work because it is paid only after a file is marked FF, for fieldwork finished, and sent to the government. In the waning days of a month, investigations were closed to meet financial quotas, without a required review by the quality control department, two former senior managers said.

The details of how its contract was structured provide new insight into the workings of USIS, a company that is now the focus of two federal inquiries, including a grand jury investigation in Washington, according to Congressional testimony and people with knowledge of the proceedings.

Items to Shred
10/15/2013

A quick checklist of items you may want to shred:

* Any document containing Social Security numbers, birthdates, PIN numbers or passwords.

* Banking documents or any others containing financial information.

* Leases, contracts or letters that include signatures.

* Pre-approved credit-card applications.

* Medical or dental bills.

* Travel itineraries.

* Used airline tickets.

* Insurance forms.

* Utility billing statements.

Mobile Security and Banking
10/14/2013

With all the mobile devices out there, how can you ensure that your banking transactions are secure? In truth, there's no entirely foolproof way to protect your mobile transactions, but there are some steps you can take to maximize security.

Beware of phishing and spoofing
The first thing you should be aware of is phishing and spoofing. When hackers go phishing, they trick someone into providing private information. In the past, hackers would often phish over email, but these days, more and more, they do so over text message, often posing as a bank. Meanwhile, spoofing involves setting up a fake website created to appear like that of an official bank, but it's intended for the same purpose as phishing: to capture your private information.

Yahoo Security Bounties
10/11/2013

Earlier this week, Yahoo was accused of using change in its sofa cushions as compensation for reports of security exploits, but now the whole ordeal has generated enough buzz to bring about change for the internet pioneer. As it turns out, these small prizes along with rewards such as t-shirts were paid for out of pocket by Ramses Martinez, the director of Yahoo's security team, who took a moment today to explain the companys new -- and far more lucrative -- bounty program. Moving forward, Yahoo will reward security researchers with payments that range between $150 and $15,000 for issues that it deems new, unique and or high-risk.

Embassy Security Concerns
10/10/2013

The government shutdown will make it more difficult for the State Department to introduce security upgrades at its embassies.

For example, the closing may set back training for security agents at U.S. diplomatic facilities, department spokeswoman Marie Harf told a news conference, The Hill reports.

Obamacare Security Concerns
10/09/2013

Minnesota insurance broker Jim Koester was looking for information about assisting with Obamacare implementation; instead, what landed in his inbox last month was a document filled with the names, Social Security numbers and other pieces of personal information belonging to his fellow Minnesotans.

In one of the first breaches of the new Obamacare online marketplaces, an employee of the Minnesota marketplace, called MNsure, accidentally emailed Koester a document containing personally identifying information for more than 2,400 insurance agents, the Minnesota Star Tribune reported. MNsure was able to quickly undo the damage because Koester cooperated with them, but the incident left him unnerved.

Security Clearance Issues
10/08/2013

Fresh worries about the security clearance system have soared to the top of the public agenda, fueled by two devastating betrayals. Edward Snowden, a former National Security Agency computer tech contractor, used his clearance to steal and leak records on the nations most sensitive surveillance programs; Aaron Alexis, a federal IT contractor, used his to smuggle a shotgun into the Navy Yard in Washington, D.C., and massacre a dozen public servants.

Adobe Security Breach
10/07/2013

Hackers infiltrated the computer system of the software company Adobe, gaining access to credit card information and other personal data from 2.9 million of its customers, the company acknowledged on Thursday.

Adobe began warning 2.9 million customers Thursday that their Adobe user ID, as well as passwords and credit card numbers -- stored in encrypted format -- were stolen in a series of "sophisticated attacks" that appear to date from August 2013, if not earlier.



Current Blog

2013 Security Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.