Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Private Security Outnumbers The Police In Most Countries Worldwide
09/29/2017

Whether they are patrolling shopping malls, conducting screening at airports or protecting VIPs, private security guards have become an increasingly common sight across the world. In many countries, they are armed with handguns and even dress in uniforms similar to the police. The sector has experienced huge growth in recent years and today there are an estimated 20 million private security workers worldwide while the industry is worth approximately $180 billion. That is expected to grow even further to $240 billion by 2020, greater than the GDP of 100 countries including Portugal, Romania and Hungary.

Hotel Room Hacking
09/27/2017

A man hacked his way into at least 78 hotel rooms over the course of several years, thanks to a known bug that let him slip in and out like a ghost.

Cybersecurity And You: Does Size Matter?
09/25/2017

We have all been warned to change our passwords regularly, make sure they are not easy to guess, and keep a sharp eye on our credit card statements. And many of us are diligent in doing what we can to keep our information secure.

But the irony of the situation is that most times our personal data is hacked from behind the firewalls of the companies we do business with and not because of a lack of our own personal data hygiene.

Cybersecurity Is Not A One-Time Fix
09/22/2017

Every company has at least one employee who will click on anything , said Brad Smith, Microsoft president and chief legal officer, at a company conference in July.

Although employees may be the weakest link in an organizations cybersecurity front lines, the evolution of malware and cybercrime are putting even the most security-conscious organizations at risk. Traditional approaches to security, which typically focus on keeping the bad guys out, often lead to too many layers and components, and too much complexity.

Androids Oreo Update
09/20/2017

Androids recently released Oreo update packs in plenty of features, including a battery life boost and a notifications rethink. But Oreos most important improvements will happen behind the scenes, with a host of security updates designed to evolve with ever-expanding digital threats. From halting ransomware to blocking malicious apps and easing Androids longstanding fragmentation woes, Oreo tackles some big problems. For the security developers who work behind the scenes, though, it is just one more step on a journey that never really ends.

Three security steps that will help keep your smartphone safe
09/18/2017

The first security step is to set a lock code or fingerprint access so that someone can not just come along and access the data on your misplaced or lost phone.

The second step is to be very careful about what apps you install on the machine. Many of them not only violate your privacy by, for example, accessing your contact list, but they can compromise security in other ways. Notice what permissions the app says it needs when you are installing it. If, for example, a game says it needs access to your phone contacts, do not install it.

Finally, smartphones are at least as vulnerable to hacking and malware as PCs so, yes, I recommend installing security software.

465K People With Pacemakers Need Security Update
09/14/2017

Is it a recall? Is it a software update? Well, it's actually both. Abbott, the medical device company that produces implantable cardiac pacemakers under the St. Jude’s Medical brand, has issued a corrective action, per the Food and Drug Administration, to mitigate what it calls the risk of patient harm due to potential exploitation of cybersecurity vulnerabilities. That's right, it is asking 465,000 people with certain devices to visit their doctors and get a firmware update so that their implants are not so easy to hack into. They say patients should schedule a visit with their doctor, and that the process will take three minutes start to finish, during which time all essential features will run in backup mode, reports Consumerist. It's unclear how many people in other countries are affected.

Test Messaging Software or Security Companies
09/12/2017

Text messaging is used a variety of ways in the security industry. Some of the industry specific uses for PageGate include:

Security Alerts
Emergency Notifications
Alarm Notification Automation
Dispatch Notifications
Communicate Critical Information Related to a Scene
On-call and Re-call Notifications
Allows for Better Decision Making
Reminders of Payment Due Date
Notification of Received Payments
Notification of Discounts, Deals and Promotions
Routine Employee Communications

Test Messaging Software or Security Companies

350% more cybersecurity pros in Washington, D.C., area than rest of U.S.
09/10/2017

Two entrepreneurs place a big bet on cybersecurity startups along the Capital Beltway.

Silicon Valley is home to the largest population of cybersecurity product companies in the world.

Sand Hill Road in Menlo Park, California, is the epicenter of technology (and cybersecurity) venture capital. Scores of venture capital (VC) firms dotting the Bay Area have made it an attractive HQ location for startups seeking funding.

Investors—especially angels and first round financiers—prefer to be close to their portfolio companies. Simply put, where there are VCs, there will be startups.

China Enforces First Action Under Developing Cyber Security Law
09/08/2017

Chinas Cyber Security Law (the Law) went into effect on June 1. We have now seen the first enforcement action under the Law (news report in Chinese here). Chongqings Public Security Bureau  (PSB) issued a warning to a local Internet data center company for failure to preserve a blog.  The company was ordered to rectify that deficiency within 15 days. While this is a small violation, it marks the first enforcement action under the Law.

10 bad habits cybersecurity professionals must break
09/06/2017

Demand for cybersecurity professionals continues to rise, with the projected talent gap in the field reaching 1.8 million jobs by 2022. Those that take on these roles play a key role in the enterprise, as the average cost of a data breach worldwide is now $3.62 million.

A number of common mistakes arise in the field that can make your job more difficult and put your company at risk. Here are 10 bad habits cybersecurity workers must break to be most effective in their role.

1. Overconfidence
2. Bypassing corporate controls
3. Negligence toward false positives
4. Failing to review the environment as a whole
5. Disregarding the user
6. Letting your skills lapse
7. Not patching immediately
8. Alert fatigue syndrome
9. Relying too heavily on third party vendors
10. Ignoring the business side

Automotive Defense
09/04/2017

Red Balloon Security, a world leader in embedded device security, is announcing the release of a new cybersecurity product to protect automobiles from a wide range of potential cyber attacks. Called Symbiote for Automotive Defense, the new embedded device defense system is officially launching at the escar USA Conference 2017 in Detroit, on June 21.

Best Hacks from BlackHat and DefCon
09/01/2017

Hackers Hijack a Carwash to Cause Vehicle-Destroying Mayhem
Leave it to hackers to turn the wholesome American institution of the carwash into a horrifying death trap.

Chinese Hackers Take Over a Tesla—Again
In September of last year, security researchers at the Keen Labs group of the Chinese tech giant Tencent pulled off an impressive feat of automotive hacking, completely undermining the security of a Tesla S to disable its brakes after it automatically connected to their rogue Wi-Fi hotspot.

Sonic Gun Attack Can Glitch Oculus Headsets or Hoverboards
One group of hackers has modernized the old party trick of the woman singing a high pitched note at the perfect frequency to break a wine glass.

Taking Down the Avalanche Botnet
On Wednesday, FBI Cyber Division Unit Chief Tom Grasso gave a Black Hat audience details of the December Avalanche takedown orchestrated by a group of international law enforcement agencies.



Current Blog
2017
October Archive

September Archive
August Archive
April Archive
March Archive

February Archive
January Archive

2016 Security Blog Archive
November /December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2015 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2014 Security Blog Archive
November / December Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.