Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Security Concerns Arise With Phone-Database Contract
09/30/2014

Americans can easily take their phone number along when switching carriers. But try to move the entire database of those numbers, and things can get complicated.

Law-enforcement and national-security officials are closely watching the fate of the database, which tracks the vast majority—about 680 million—of the U.S. cellphone and land-line phone numbers in use.

The database was set up in 1997 so that subscribers do no't have to get new numbers when they change phone-service providers.

But it is also a little-known linchpin for federal agencies setting up wiretaps or conducting surveillance.

DoD Ramps Up Security as It Drifts Toward Cloud
09/29/2014

The U.S. Defense Department is committed to pursuing cloud-based services and steadily has been improving its capabilities to utilize the technology. The latest evidence of DoD embracing the cloud is its approval of a protocol that will facilitate the use of the technology at higher security levels.

The departments Defense Information Systems Agency, or DISA, has granted provisional authorization for the use of cloud services to levels 3 to 5 of its Cloud Security Model, or CSM.

Boston Security Firms CyberArk, Veracode Make Deals as Threats Mount
09/26/2014

Been hacked lately? Sure you have. But a couple of longstanding local tech companies have been combating cyber threats for years, and now they’re making noise on the financial front.

One of them, CyberArk Software, has been preparing to go public since about 2011 and has just set its IPO terms. The Israel-founded company, whose U.S. headquarters are in Newton, MA, is planning to raise $75 million by offering 5.4 million shares at a price range of $13 to $15.

Retail Security Breaches 2014: Home Depot, Target Should Have Stronger Countermeasures, Experts Say
09/25/2014

Using the deep Web as a marketplace, hackers from around the world have been developing software designed specifically to break into retailers point-of-sale (POS) systems to recover customer data, which is then sold on the black market to buyers who use the information to make purchases and access cash. It is not a new phenomenon, but experts say it is becoming more common.

Use Google New Panel for Security
09/12/2014

Just how secure is your Google account? For example, have you set up two-step verification? Do you know which apps you've allowed to access your account? Is your recovery information up to date in case you get locked out of your account? These questions are important for any Google user; even more so should Google reside at the center of your digital universe.

Personal Hacks
09/23/2014

Hackers can steal an astonishing amount of personal information in iCloud Nudegate type hacks.

With the help of simple software tools that are believed to have been used in nudegate attacks, Ars managed to hack into iPhones and retrieve personal data from iCloud accounts of family members. The tools work best on older devices running previous iOS versions, but they have been successfully used on iPhones running iOS 7 that can be jailbroken and it’s likely that these methods will work on iOS 8 devices as well.

And it turns out one does not have to be a star hacker to pull this off, either: You only need some skills and technical understanding to hack into your friends iOS devices.

ApplePay: The Security Pros & Cons
09/22/2014

ApplePay, the new mobile payments service introduced by Apple this week, could ultimately set the security and privacy benchmarks for digital wallets much higher.

Even so, the hunt for security holes and privacy gaps in Apples new digital wallet has commenced. It won’t take long for both white-hat researchers and well-funded criminal hackers to uncover weaknesses that neither Apple nor its banking industry partners thought of.

Security Ops Confidence Levels Drop
09/19/2014

Survey shows most organizations unable to keep up with new and emerging threats from state-sponsored attackers.

As foreign state-sponsored attackers turn up the heat on corporate targets, security operations staffers are losing confidence in their ability to stave off these threats. New survey results released this week showed that confidence levels among IT security professionals has slipped this year, with fewer than half of them feeling sure they can keep up with new and emerging threats.

Conducted among Black Hat attendees by Lieberman Software, the survey asked infosec professionals about their organizations' readiness to respond to state-sponsored and other advanced attacks. The study found that 59% of respondents believe their organizations are likely to be the target of a state-sponsored attack sometime in the next six months.

Heavy investment in Internet of Things Security
09/18/2014

Gartner says over 20 percent of enterprises will have digital security services for business initiatives using Internet of Things devices by 2017.

The research firm said Friday that by the end of 2017, over 20 percent of enterprises will recognize the need to protect business units which use Internet of Things devices, and as a result, will be required to invest more heavily in security.

Chief information security officers are already seeing a change in the business environment due to IoT, as devices, networks and systems are becoming more interconnected on a daily basis -- and security must evolve as a response. The problem many CISOs will face is the need to blend approaches and solutions to cater for IoT security, and this may include securing mobile and cloud architecture, industrial control, automatons and physical security, according to Gartner.

Southwest Border Command Is Planned at Homeland Security
09/17/2014

Homeland Security officials are planning to create a military-like chain of command to police the Southwest U.S. border, in what could be the department's most significant restructuring since its creation in the wake of the Sept. 11 terror attacks, according to people familiar with the discussions.

The plan would create a Southern Command, or Southcom in military parlance, bringing together groups of agents from Customs and Border Protection, and Immigration and Customs Enforcement, these people said. A Coast Guard admiral would oversee Southcom, and have command over personnel from both agencies, they said.

Concerns about national security boost GOP, especially its hawks
09/16/2014

A variety of data points suggest that while Republicans are riding a wave of anti-Obama opinion, the collapse of President Obama’s foreign policy and international chaos are shifting the electorate toward pro-defense candidates who can reassure a nervous public.

We have seen the data showing that the GOP now holds a double-digit lead over Democrats on national security, while the presidents standing on national security has plunged to the low 30s. Quite striking is the shift in priorities.

How hackers could still get around Apple Pay security
09/15/2014

Apple did not go into great detail describing the security aspects of Apple Pay when they introduced it this week. But there were a few things mentioned that shed some light on how the company plans to keep users data safe.

For starters, Apple does not plan to store any of its users financial information on its servers or in their device. Instead, the company is using a technology called tokenization to identify a user for payments.



Current Blog

2014 Security Blog Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.