Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
No Evidence Secret Service Scandal Caused Threat to President
09/30/2012

A Secret Service scandal involving agents who hired prostitutes in Colombia did not harm presidential security, according to an investigation conducted by the acting inspector general for the Department of Homeland Security.

Although we found that these agents engaged in misconduct, our investigation developed no evidence to suggest that the actions of USSS personnel in Cartagena compromised the safety and security of the president or any sensitive information during this trip, Charles Edwards wrote to House and Senate members concerned about the matter.

China Security Visit in Afghanistan
09/29/2012

Chinas top security official made a surprise four-hour visit to Afghanistan yesterday, the first by a ranking Chinese political figure since 1966, the state-run Xinhua News Agency reported.

Zhou Yongkang, one of the nine members in the Standing Committee of the Politburo, met with Afghan President Hamid Karzai and said China will actively participate in Afghanistans reconstruction, Xinhua reported.

complete article

Security Threats
09/29/2012

Protecting intellectual property and sensitive information is a major security concern for any business today—especially against the backdrop of workers needing to share documents and files with their colleagues, customers and partners daily. The problem facing IT professionals is that all too frequently these items contain confidential information, mandating the need for effective file encryption. But a good data-leak prevention platform will go several steps further down the security trail than adding simple file encryption to the smorgasbord that modern IT security systems have become—we have found that there is now a pressing need to create a secure platform for co-workers to collaborate.

If you are moving data around on a company network, protecting the information flow is a relatively easy task—with the right technology in place, of course. But the biggest headache that many company IT professionals face is the one posed by removable media. In a smaller-size company, chances are the IT department consists of one or two people—typically assisted by one or more local specialists—and the company chairman/MD makes decisions on which security systems to deploy. The headache for the company, however, is that relying on a single person to understand the nature of the multiple security threats that the modern technology landscape presents is asking for trouble, no matter how knowledgeable that person is in their given trade.

Smart Grid Security
09/29/2012

A new research expects the smart grid cyber security market to exhibit huge growth before the end of the decade, climbing from a global value of $7.8 billion in 2011 to $79 billion in 2020. By enabling more efficient transmission and distribution of electricity, smart grids are rapidly gaining popularity around the world. However, concerns are growing that the two-way flow of information the technology involves threatens privacy and could potentially compromise personal data, says this new research report by energy industry experts GlobalData.

The latest report on smart grid cyber security market states that while governments worldwide prepare to spend billions on securing smart grid infrastructure from external threats, large portions of the global community are fighting the potential harvest and dissemination of personal information by utility companies and other organizations.

Federal Protection Service
09/28/2012

Congressional auditors have raised doubts for years about the Federal Protective Services ability to protect federal facilities from terrorists, criminals and other threats.

Apparently, many agencies that FPS protects share those doubts.

Agencies last year paid the Federal Protective Service $236 million in fees to assess risks and provide security at their buildings. But a growing number of those agencies are spending even more to assess their own security needs out of concern that FPS is doing that job poorly.

Twitter Hires Hacker
09/27/2012

Charlie Miller, a well-known hacker and computer security consultant, has joined the payroll of Twitter, where he will work with the security team.
Miller, who lives in Wildwood, announced his new job Friday on his personal Twitter feed.

Who Do Cyber Criminals Target?
09/26/2012

Whom do hackers want to hack? This might be one of the most misunderstood questions in IT security. And misperceptions here often lead businesses to make poor decisions about their defenses.
Logic tells us that cybercriminals are like Willie Sutton--they go where the money is. Banks and other financial companies, as well as businesses with lots of credit card data, would be the prime targets, right? And the bigger they are, the better targets they make.


This same logic is often applied to attacks on end users. If you're going to target a user, make it a high-level executive, a wealthy individual, or an IT administrator who has access privileges to many different systems. Go for the users with the keys to the safe.

All of these assumptions are perfectly logical. But they are also all wrong.

Most cybercriminals just are not all that selective. True, banks handle lots of transactions, but any company with money is a good target, and a company that sells snack foods or construction equipment may have far fewer defenses.

Similarly, the perception that cybercriminals target only big companies is a myth. Large companies have more money, but they also have big security teams and high-priced defenses. Small and midsize companies have fewer security skills and little in the way of security budgets, which makes them natural targets for cybercriminals who don't want to work too hard.

Cheating!
09/25/2012

The Baltimore school system has hired a leading data forensics company to review thousands of state assessment results dating to 2009 — a third-party analysis that school officials say is needed to inject fairness into investigations of alleged cheating.

But the move has come under fire from the president of the principals union, who says the $275,000 contract with Caveon Test Security is a waste of money for the financially strapped school district and a misguided effort by schools CEO Andrés Alonso to confirm his long-held suspicions about cheating at some schools.

Security at Temples
09/24/2012

Monday was Rosh Hashanah, the Jewish new year, and security has been ramped up at temples and synagogues across the New York area.

Extra police officers will be standing guard as the heightened tensions throughout the mideast add an extra layer of urgency to security precautions.

Anger over an anti-Islamic film has sparked violent protests throughout the Muslim world, and harsh threats between Israel and Iran over Iran's nuclear program also increase the potential for an attack on Jewish temples in the city.

Android Security Patch
09/23/2012

More than half of all Android devices don't have security patches and are vulnerable to malware, according to a security company.

The findings are based on data from Duo Security, who not coincidentally also produced the free X-Ray for Android app, according to InformationWeek.  

Major Security Issues for Small Businesses
09/22/2012

As organizations continue to adopt bring-your-own-device initiatives, which allow employees to use personal mobile devices to connect to the company network, these businesses are potentially opening themselves up to security breaches, according to a survey of more than 100 small and midsize business IT security providers during June and July 2012, which was sponsored by cloud security specialist Trend Micro and conducted by Osterman Research.

The survey found the typical SMB employee uses a number of endpoint devices, such as a desktop computer, notebook, tablet, smartphone and home computers with various applications on them. These multiple access points can also be opening through which malware can enter the organization's network. According to the report, cyber-criminals employ multiple compromised endpoints and social networking sites to infect a wide range of targets, including the most popular mobile devices such as those running Google Android and Apple iOS.

Security Chief in Libya Gone
09/21/2012

Libya has sacked its security chiefs for Benghazi after a deadly attack on the U.S. consulate in the eastern city last week, Interior Minister Fawzi Abdel Aal told Reuters.

Colonel Salahadeen Doghman will replace the deputy interior minister for the east, Wanis Sharif, as well as the head of national security for Benghazi, Hassan Bou Hmida.

Groomed to Hate
09/20/2012

Muslim children are at risk of being groomed in extremist anti-Western ideology by radicalised parents, posing a new challenge to national security agencies, a leading terrorism expert has warned.

Data Security Compliance
09/20/2012

The possibilities of technology in the cloud and Big Data have become apparent in recent months. However, it has also become clear that we must establish protection systems for all that information. In order to design standard policies that ensure the protection of large volumes of information, the CSA, a nonprofit organization dedicated to promoting the use of best practices within cloud computing, has decided to create a working group to study this area.

Among the first PLA Working Group includes privacy officers, representatives from data protection authorities, data protection subject matter experts and independent privacy experts. The group has been created to begin defining compliance baselines for data protection legislation and standards for privacy measures such as data protection and data security.

Finger Scanning
09/19/2012

Apple is due to secure its acquisition of a company specialising in fingerprint scanning next month, days after the latest iPhone goes on sale, suggesting the technology will be used to improve security in the world's bestselling phone.

The board of AuthenTec is expected to agree to a $365m acquisition by Apple – one of the largest sums paid in a takeover by the California technology giant – when it votes on 4 October.

Technology Reliance
09/18/2012

These days business owners and professionals are equipped with an increasing supply of gadgets that can easily contain personal information, proprietary data and intellectual property.

As they become more reliant on technology to conduct business, they also become more vulnerable to crime, according to security experts.

Security Service Access Threats
09/17/2012

The security services – MI5, MI6, GCHQ and the police – have been heavily focused for years on counter-terrorism and, in particular, preventing an atrocity at the Olympics and Paralympics .
With those events now safely passed, ministers and intelligence chiefs are intensifying talks on whether more effort is needed to tackle emerging risks, in particular espionage by foreign states.

Homeland Security Postpones BioWatch
09/17/2012

Amid concerns about cost and reliability, the federal Department of Homeland Security has quietly postponed plans to buy technology that officials have long claimed could provide a life-saving upgrade of BioWatch, the nations system for detecting biological attacks.

One year ago, the department had said a contract for the new, automated system would be awarded by mid-May 2012, at an estimated cost of $3.1 billion during its initial five years of operation.

Security Costs at 9-11 Memorial
09/16/2012

With its huge reflecting pools, ringed by waterfalls and skyscrapers, and a cavernous underground museum still under construction, the National Sept. 11 Memorial and Museum at the World Trade Center is an awesome spectacle that moved and inspired some 4.5 million visitors in its first year.

But all that eye-welling magnificence comes with a jaw-dropping price tag.

The foundation that runs the memorial estimates that once the roughly $700 million project is complete, it will cost $60 million a year to operate.

Facebook Spam
09/15/2012

Lately some folks have been receiving emails which appear to be from their Facebook friends, but actually show an unfamiliar email address in the reply field. Turns out that the strange spam attack was related to a Facebook security hole.

According to Facebook, a temporary misconfiguration on the social network allowed a spammer to scrape public information from users friend lists. This spammer used that information together with a large number of compromised email accounts to send out a wave of spam messages.

Google Takes on VirusTotal
09/14/2012

Search engine giant Google continued its efforts to bolster security credentials with the acquisition of VirusTotal, which provides a free service analyzing suspicious files and URLs and helps detect viruses, worms, Trojans and other malware. The announcement was made via a VirusTotal blog post, which expressed excitement about the deal and reiterated its dedication to keeping computers from threats.

Apple Issues Security Update
09/13/2012

Apple released an update for Java for Mac users, but it does not address the issue targeted in a series of attacks during the past month.

Apple has released a security update for Java, but it does not address another security hole that has been at the center of recent attacks.

Apple on Sept. 5 pushed out an update for Java 6 Mac OS X Snow Leopard, Lion and Mountain Lion. The patches followed a move by Oracle to release a rare out-of-band patch to address security concerns raised by a spate of attacks targeting CVE-2012-4681. However, the update by Apple only addresses CVE-2012-0547, despite linking to an Oracle advisory on the former.

Pacific Rim Security
09/12/2012

Asia-Pacific leaders focused their attention on rising concern over food security on Sunday, as they prepared to wrap up their annual summit with an agreement to slash tariffs on trade in environmental goods and a call to keep markets open even in hard times.

The explicit focus on food security by the leaders of the 21-member APEC reflects abiding concern over the potential for food prices to surge to politically volatile levels.

Current prices are high, though they remained flat in August and are below the levels that triggered rioting and unrest in parts of the developing world in 2007-2008. Another food crisis, in 2010-2011, also caused hardships for poorer consumers, especially in countries heavily dependent on food imports.

9-11 Never Forget
09/11/2012


In our hearts, in our minds, in our prayers.

9/11 Never Forget

Operations Security
09/10/2012

Operations security is a key component of antiterrorism and force protection, helping protect service members, civilian employees, families, facilities and equipment everywhere by denying information.
Operations security is not a specific category of information. It is a process for identifying, controlling and protecting generally unclassified information which, if known to a competitor or adversary, could be used to our disadvantage.

One of the first steps to consider when developing an OPSEC process traditionally involves identifying critical information. Service members, civilian employees and family members should always be mindful about potential adversaries who seek to discover critical information about our military communities and military missions.

Weapons Plant Insecurity
09/09/2012

The contractors in charge of guarding the national stockpile of bomb-grade uranium in Tennessee knew well before an 82-year-old nun and two other pacifists broke through three barriers this summer that a lot of the security equipment was broken, and government managers knew it too, according to an internal audit of Energy Department operations at the weapons facility. The inspector generals investigation found troubling displays of ineptitude.

The intruders used ordinary bolt cutters to penetrate as far as the uranium storage building before dawn on July 28, and then went undiscovered until they approached an officer in his vehicle and surrendered, according to the audit. The officer failed to draw his gun or even secure his gun from seizure, and permitted the trespassers to roam about and retrieve various items from backpacks they had apparently brought into the area, the report said.

Security Clearance
09/08/2012

U.S. Special Operations Forces has suspended the training of Afghan Local Police recruits while it double checks the background of the current police force following a rise in attacks against NATO troops by their Afghan counterparts, an official said Sunday.

The order follows reports that more than 40 NATO troops were killed this year by either members of the Afghan security forces or by insurgents disguised as an Afghan policeman or soldier.

Espionage and China
09/07/2012

A  former security guard at a U.S. consulate compound under construction in China pleaded guilty Thursday to trying to sell photographs and other classified documents to China in an attempt to dig himself out of financial ruin after losing tens of thousands of dollars in the U.S. stock market.

Bryan Underwood, 32, faces from 15 years to life in prison after admitting Monday in U.S. District Court in Washington that he sought to communicate national defense information to a foreign government. Standing before Judge Ellen S. Huvelle, he told her he was guilty of making several overtures to the Chinese government, including a letter offering his information and skills to officials with Chinas Ministry of State Security.

He was hoping to be paid from $3 million to $5 million, prosecutors said, far beyond his $158,000 in stock losses last year. But Chinese security officers rebuffed his attempt to make contact and no secrets were ever divulged, U.S. authorities said.

Security Guard Warned Teen Before Death
09/06/2012

A security guard working on the double-decker bus where a 16-year-old boy was killed when he stuck his head out of a double-decker bus said he warned the teens not to play with the roof hatch on the top of the bus.

Daniel Fernandez was killed was killed after sticking his head out of a party bus and hitting an overpass just after crossing the George Washington Bridge into New Jersey Friday, authorities said.

He was part of a group of 65 teenagers headed to New Jersey for a sweet sixteen party, according to Port Authority spokesman Al Della Fave. They boarded the bus in Queens, and crossed over the George Washington Bridge to New Jersey shortly after 6:30 p.m.

As the bus exited the upper level to head toward Interstate 95, the boy opened the top hatch of the bus and stuck his head out, said Della Fave. His head struck the underside of the Fletcher Avenue overpass, causing extreme trauma.

Fernandez was rushed to Hackensack University Medical Center, where he was pronounced dead.

Cameras Not Perfect But Important to Security
09/05/2012

They might not be perfect but cameras still provide police with valuable information about crimes- like the approximate height and weight of suspects- and it gives police clues on exactly where they need to be looking at a crime scene.

Security Issues for Next President
09/05/2012

As the political parties convene in Tampa and Charlotte for pre-game huddles, the American people might want to look beyond the trash talk and victory dances. What should be the first plays our next Commander-in-Chief runs?

First: Get U.S. Power Right

The most important thing our next president can do for our national security is get our domestic house in order. U.S. power does not come from simply declaring that America is great and exceptional: It comes from doing great things and upholding exceptional values. To maintain U.S. strength, we need to have a strong economy with modern infrastructure and an educated, creative citizenry -- one that includes the worlds brightest and hardest working people. That is the only way we can compete in a global world with new, rising powers.

Security March
09/04/2012

Hundreds of Massachusetts janitors, security guards and airport workers will be rallying for better job security and higher wages.

The workers plan to gather at the Boston Common Monday morning to urge wealthy corporations to help rebuild the middle class. They will march from the Common to Copley Plaza after the rally.

Lt. Gov. Timothy Murray, labor union officials and others are also expected at the event.

Organizers say the rally will include local janitors who are pushing for better jobs that bring them closer to the middle class.

The event is sponsored by Local 615 of the Service Employees International Union, which represents 18,000 property service workers in Massachusetts, New Hampshire and Rhode Island.

Great Security Logo Designs
09/04/2012

Fantastic security logo designs for security related businesses.

Big Brother is Growing
08/25/2012

License plate scanners are being deployed by an increasing number of government and law enforcement agencies, but at what privacy cost?

But what are the security and privacy implications of the growing use of such scanners? It is not an exaggeration to say that in ten years there will be ALPRs just about everywhere, making detailed records of every driver's every movement, and storing it for who knows how long, said Kade Crockford, the ACLU of Massachusetts privacy rights coordinator, in a blog post. In some cases, we know that the worst-case scenario--vast databases with records of movements of massive numbers of people--is already happening.




Current Blog

2012 Security Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.