Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Why Cyber Security Matters To Everyone
10/16/2014

October is National Cyber Security Awareness Month — as good a time as any to remind people that their cyber security hygiene does not just affect them, but everyone around them. And in the globally connected world we live in, that literally is everyone.

Your cyber hygiene affects others!

It’s not unlike public health. One of the reasons health officials urge almost everyone to get a flu shot is because people who are infected are more likely to infect others. And the same is true for cyber security.

Romanian Hackers are Accessing Yahoo Servers
10/15/2014

Yahoo servers have been infiltrated by Romanian hackers exploiting the Shellshock bug discovered last month, according to cyber security expert Jonathan Hall.

In a blog post on his website Future South, Hall detailed the process by which he discovered Yahoo, Lycos and WinZip websites had all been infiltrated by a group of Romanian hackers.

Hall had Google-searched a range of codes designed to identify which servers were vulnerable to Shellshock, and found that Romanian hackers had breached two Yahoo servers and were exploring the network in search of access points for Yahoo!Games, which has millions of users.

Ex-Agent Cites Progressive Down Slide In Morale At Secret Service
10/14/2014

Low morale could be partly to blame for the recent spate of security lapses at the Secret Service.

The agency with the responsibility for protecting the president, vice president and their families rates in the bottom third in job satisfaction rankings within the federal government.

The root of that discontent could be bureaucratic. The Secret Service, which was created in 1865 to fight counterfeiters, traces its heritage back to the U.S. Treasury Department. It did not get into the business of protecting presidents until 1901 after the assassination of President McKinley.

Evidence the 9-11 Hijackers Scoped Out the Airport Before Attack
10/13/2014

At least three eyewitnesses spotted al Qaeda hijackers casing the security checkpoints at Bostons Logan Airport months before the 9/11 attacks. They saw something and said something — but were ignored, newly unveiled court papers reveal.

One of the witnesses, an American Airlines official, actually confronted hijacking ringleader Mohamed Atta after watching him videotape and test a security checkpoint in May 2001 — four months before he boarded the American Airlines flight that crashed into the World Trade Center.

Google Brings Security Staff In-House: A New Trend?
10/10/2014

It is a common to hear that a company will spin off part of its workforce to contractors, but not the idea of bringing workers, often low-paid, back into a corporate environment. So the news that Google would bring its security workers back in-house from a contract firm was unusual. Google plans to hire more than 200 security guards, making them full- and part-time employees of the company, and therefore eligible for company benefits. Previously, Googles guards were provided by an outside contractor called Security Industry Specialists.

National Security Concerns Heat Up Smartphone Wars
10/09/2014

A trio of headlines are shining a spotlight on a new twist in the brutally competitive smartphone market, where national security is suddenly becoming a major new headache for manufacturers. In one headline, Chinese smartphone sensation Xiaomi is being investigated in Taiwan for national security risks related to the storage of local user data on some offshore mainland Chinese-based computers. In a similar news bit, Beijing is reportedly considering forbidding government workers from using foreign-made smartphones.

Security Officials Fear iPhone 6 Marks New Era of Products Designed to Skirt N.S.A.
10/08/2014

Under its new operating system for iPhones, iPads and iPod Touch devices, once users set a passcode, Apple will no longer be able to unlock your device—even if ordered to do so by a court, as Matthew Green explained in Slate earlier this week. That means if a court orders Apple to reveal the contents of a phone, all it will be able to turn over is a set of nonsensical data.

Apple claims that breaking the code that is unique to each user’s phone could take more than five years, although experts say that underestimates how quickly agencies can crack codes. Apple is not the first to encrypt data on a phone, Googles Android has been able to do that for years, although it is not the default setting. The next version of Android, however, will have the encryption as the default.

10 things every celebrity should do for better online security
10/07/2014

1. Be careful what is on your phone. Try not to put any content on there that you wouldn't want splashed across the world. I know this is tough and I also know this is generational. But I also know that as a celebrity, you're a bigger target and you need to recognize and own that.

2. Who has your log-in information? Assistants, publicists, managers? The less people who have it, the more secure you are. Keep that circle small. And if there is a change to your team, you need to change passwords immediately.

3. Most major websites (Apple, Google, Facebook, Yahoo, etc.) offer something called two-step verification. It requires an additional step to verify any new device from immediately logging into your account. Th

Secret Service Under Fire for Security Lapses
10/06/2014

Secret Service Director Julia Pierson will have some explaining to do this week at a congressional hearing into lapses in the agency's efforts to protect President Barack Obama. One particularly flagrant case was revealed Sunday in which Secret Service officials mishandled a shooting attack on the White House in November 2011, not even realizing it had occurred until four days afterward.

The revelation follows an incident earlier this month in which a man carrying a knife jumped a White House fence, sprinted across the lawn and made it into a doorway of the White House before he was stopped by officers.

The House hearing is scheduled Tuesday to look into the security lapses.

Holder: Mixed Record On National Security Issues
10/03/2014

Attorney General Eric Holder was just months into the job when he announced plans to prosecute the accused mastermind of the Sept. 11 attacks and other alleged co-conspirators in a New York courtroom, rather than through the Guantanamo Bay military commission process.

It was an audacious idea, but immediately beset by political opposition and public safety concerns. The Obama administration’s eventual decision to walk away from the proposal was a stinging defeat for Holder — and a vivid reminder of the complexities of the legal fight against terrorism.

Capital Security Bumps Up Against D.C. Tourism
10/02/2014

The prospect of more of the U.S. capital being closed off after an intruder got into the White House has struck a nerve in Washington over public space being eroded by barricades and bollards. The possible tightening of security around the president's residence, a highly visible symbol of democracy and a prime draw for tourists and protesters alike, raises questions like whether safety trumps openness or whether a capital city can ever be entirely safe, analysts said.

FDA Pushes To Improve Medical Device Security
10/01/2014

When former VP Dick Cheney last year disclosed that doctors had disabled the wireless capabilities in his pacemaker because of hacker concerns, it hammered home the dangers posed by network-connected medical devices. Such concerns have finally prompted the US Food and Drug Administration (FDA) to convene a collaborative industry-wide effort to bolster medical device cyber security.

As a first step, the FDA will host a workshop in Arlington, Va., next month during which it hopes to bring together medical device manufacturers, healthcare providers, biomedical engineers, IT systems administrators, health insurers, and others. The goal of the two-day event is to spur a discussion on the best ways to identify and mitigate cybersecurity vulnerabilities in commonly used medical devices.

Security Concerns Arise With Phone-Database Contract
09/30/2014

Americans can easily take their phone number along when switching carriers. But try to move the entire database of those numbers, and things can get complicated.

Law-enforcement and national-security officials are closely watching the fate of the database, which tracks the vast majority—about 680 million—of the U.S. cellphone and land-line phone numbers in use.

The database was set up in 1997 so that subscribers do no't have to get new numbers when they change phone-service providers.

But it is also a little-known linchpin for federal agencies setting up wiretaps or conducting surveillance.

DoD Ramps Up Security as It Drifts Toward Cloud
09/29/2014

The U.S. Defense Department is committed to pursuing cloud-based services and steadily has been improving its capabilities to utilize the technology. The latest evidence of DoD embracing the cloud is its approval of a protocol that will facilitate the use of the technology at higher security levels.

The departments Defense Information Systems Agency, or DISA, has granted provisional authorization for the use of cloud services to levels 3 to 5 of its Cloud Security Model, or CSM.



Current Blog

2014 Security Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.