Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Hidden Software
08/18/2014

Hidden Software Relevant Products Services secretly installed on cars, mobile Relevant Products Services phones, and laptops has put roughly two billion devices at risk of being hijacked or attacked by hackers, according to new research. The vulnerability is so widespread that even automobiles use the software that contains the security Relevant Products Services flaw, said security scientists presenting at the Black Hat USA security conference in Las Vegas this week.

Latin America Cyber Security
08/15/2014

The Latin America Cyber Security report defines and segments the cyber security solutions and services market in Latin America with analysis and forecast of revenue. This market is estimated to grow from around $5.29 billion in 2014 to $11.91 billion by 2019, at a CAGR of 17.6% from 2014 to 2019.

HTTPS Matters!
08/14/2014

In a presentation at this years Google GOOGL +1.05% I/O developers conference Ilya Grigorik, a Google advocate for the Chrome team, told developers that HTTPS matters on all sites.

EMV Is No Silver Bullet for Payment Card Security
08/13/2014

In the wake of the Target data breach and other retail breaches like it, there has been a renewed call in the United States for a move to Chip and PIN credit cards, also known as EMV. At the Black Hat USA 2014 conference here, however, multiple researchers revealed that EMV is not necessarily a panacea for all that ails the payment card industry.

Russian Hackers Steal Passwords
08/12/2014

Russian hackers stole 1.2 billion unique username and password combinations – that is nearly the population of China – and more than 500 million e-mail addresses, according to a New York Times story published late Tuesday.

Security Experts: Car Hacking Is Real and We Need To Prepare
08/11/2014

Getting hacked, whether on a desktop or smartphone, pretty much sucks. In a way, your entire digital life is an open book and even the control of your devices can be wrenched away from you. But imagine it is not a smartphone getting ripped from your hands but rather your cars steering wheel.

How to Protect Your Data From Social Engineers and Other Security Threats
08/08/2014

Security systems that look for patterns attributed to attacks are becoming cheaper, passwords longer and more complicated and security departments are growing year on year.

But why go to so much trouble when you can just ask someone for their password? It may sound simple, but this is what is happening. Humans by nature are flawed and when presented with a situation that puts us out of our comfort zone we tend to become stressed and make poor decisions. While a company may have a water-tight security policy in place, having staff comply with the policy 100% of the time is a challenge far beyond the initial undertaking of creating the rules.

Online Security Crucial for Businesses
08/07/2014

Online shopping may mean convenience for consumers, but merchants offering e-commerce need to do their part to keep their customers’ information safe and secure.

The National Consumers League stated 550 million identities were compromised through 614 database breaches last year. Retail giant Target fell victim to a data breach, which compromised 110 million customers last December.

The fallout from business computer security issues put consumers at risk for identity theft and fraud, creating a lack of trust in the marketplace.

Security Flaws
08/06/2014

nternet-connected cameras, USB sticks and even a web browser promising anonymity have serious security flaws, according to researchers preparing to lay bare the dangers of online life at conferences in Las Vegas this week.

Cyber security researchers from across the world will gather for the Black Hat and Def Con conferences, aiming to expose vulnerabilities in devices and software that people trust in order to fix the problems and try to make companies more careful when designing technology.

Why The Security of USB is Broken
08/05/2014

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our thumbdrives from becoming the carrier for the next digital epidemic. But the security problems with USB devices run deeper than you think: Their risk isn’t just in what they carry, it is built into the core of how they work.

Hardware Vulnerabilities
08/04/2014

The Internet of Things — Internet-connected appliances such as thermostats and refrigerators — might be the future of home automation. But a new report suggests their security is not as cutting-edge.
Hewlett-Packards security division ran a suite of tests against 10 of the most common smart home devices.

And the probe came up with a list of 250 vulnerabilities — an average of 25 per device — that plagued everything from garage door openers and thermostats to webcams and remote power outlets.

What Is Eating the Internet
07/23/2014

It is a given that hackers can and do penetrate websites with laughable ease, ranging from those of retailers to those of the United States government.

It certainly does not help the security-minded to know that the U.S. National Security Agency and other countries spy agencies, including the UKs GCHQ and the West German intelligence agency, are tapping into online communications at will. In fact, the Germans have set aside US$136 million for that purpose.

Symantecs recent admission that antivirus software is dead didn't help matters, although it only echoed what many AV experts have been saying for years and what NSS Labs has pointed to in various reports over the last several years.



Current Blog

2014 Security Blog Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
Jan & February Archive

2013 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2012 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2011 Security Blog Archive

December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2010 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2009 Securty Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.