Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases

Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Security Templates

Security Logos  large collection of security related logos for web designs and corporate brands..

Scientologists Attacked

A group of hackers calling itself Anonymous has hit the Church of Scientologys Web site with an online attack.

The attack was launched January 19 by Anonymous, which is seeking media attention to help save people from Scientology by reversing the brainwashing, according to a Web page maintained by Anonymous.

Pirate Bay

Sweden plans this week to charge the people running Pirate Bay, one of the worlds most visited Web sites, with being accessories in breaking copyright law.

Pirate Bay helps Web surfers share copyrighted music and film files, which is illegal in many countries, including Sweden.

Security Software Tracks Down Stolen PC

A thief pilfers a laptop computer from an unsuspecting traveler at an airport departure lounge and flits off, unnoticed.

A few years ago, the laptops rightful user would have had little chance of seeing it again.

But today, a handful of security companies offer software and gadgets to recover stolen notebook computers or, at least, make the sensitive corporate data they hold inaccessible to criminals.

Chinese Internet users up to 210 million

The Chinese government said Friday its Internet population has soared to 210 million people, putting it on track to surpass the U.S. online community this year to become the worlds largest.

AT&T or The Police

A decade after the government said that AT&T and other service providers do not have to police their networks for pirated content, the telecommunications giant is voluntarily looking for ways to play traffic cop.

Secure Web Communications for Islamic Fundamentalists

An Islamist Web site often used by al Qaeda supporters carried updated encryption software on Friday which it said would help Islamic militants communicate with greater security on the Internet.

The Mujahideen Secrets 2 was promoted as the first Islamic program for secure communications through networks with the highest technical level of encoding.

Software Suit Settlement

A New York-based publishing firm has agreed to pay $500,000 to resolve a copyright infringement suit filed by the Software & Information Industry Association on behalf of several prominent software vendors.

Whittiker Legal Publishing on Wednesday signed off on settlement to resolve a lawsuit brought against it in federal district court in the Eastern District of New York. In addition to the cash settlement, the company agreed to destroy all unlicensed copies of the Adobe, FileMaker and Symantec applications in its possession.

Security Software Discounted

Check out the latest security software titles at a significant discount! Software Deal of the Day offers software at a significant discount for 24 hours. Also check out the 2nd Chance Software Deals, this is designed specifically for those who miss the 24 hour deals but still want excellent software at discounted prices.

Plagiarism Detection

More than 100 schools and colleges have turned to the computer software universities use to combat plagiarism because of growing alarm at sixth-form pupils cheating in their coursework.

Plagiarism Detection

MacSweeper Security

The MacSweeper site purports to scan Macs for security issues, then sell users a software fix--but researchers have their doubts.

Some Macintosh users have encountered a security program whose function and Web site have the tell-tale signs of a scam.
Visitors to the Web site selling the program, called MacSweeper, are offered a free security scan of their computers. The scan, which only works on Macs, highlights supposed security problems with the computers. It offers to remove the problems with the purchase of a US$39.99 lifetime subscription.

But the awkward English on the programs Web site, and the way the program operates, have raised doubts over its legitimacy, users and security researchers say.

more on MacSweeper

Software Pirate Faces Jail

A British man who was selling £12,000 software for £12 on eBay faces up to 10 years in prison. He pleaded guilty to copyright infringement and will be sentenced in February.

Michael Walton broke an encryption code in the software which allowed him to make copies of it. He sold the copies on eBay, where he reportedly had 80 identities.

Variety of Security Logos

Great selection of security logos!

Top 10 Winners for 2008

After looking into my crystal ball, I have made a cluster of predictions about what will be hot, and what will be not so hot in technology for 2008.

1. Video
YouTube has not shown any signs of slowing down. With the increasing popularity of portability and the increase of video-viewing technology, the growth of video is unlikely to slow down.

2. Healthy
Healthy is in. It is not only fashionable, but now cool to be healthy. Maybe this will help counter the rise in obesity in the US. Even those who give in to their cravings and indulge agree that it is cool to be healthy. Organic foods are at an all time high with an increase of roughly 20% per year in the US! This may also be a top New Year Resolution.

3. Long Tail
The Long Tail is still hot. Small businesses and big business are all attempting to capture the famed long tail.

Top 10 Winners Predicted for 2008

Network Solutions Critized for New Policies

A company that sells Internet domain names is facing criticisms for holding some in reserve as a consumer-protection measure, a move that also prevents interested parties from shopping around for better prices.

After weeks of testing, Network Solutions LLC began this week to grab names that people search for on its Web site but do not immediately register.
The name is locked up for about four days, during which the person who made the search can buy it directly from the company for $35 a year — a few times more than what many of its rivals charge. After that, the name returns to the pool and can be registered by anyone through any registration company.

Accounting Software Hole Porn Subscribers at Risk

Freehold-based Too Much Media, which sells accounting software for adult Web sites, told its customers last month that a security breach on its computers allowed hackers to access various adult Web sites subscriber lists.

Security Predictions for 2008

At the beginning of each year I like to talk about what did or did not happen during the past year, and what to expect in the coming year. Unlike past years, I will try not to get too emotionally ramped up on all the failures.

Overall, compliance laws (and years of bad press) finally forced most organizations to encrypt more data and laptops by default. Chances are these days that if a thief steals a laptop it will be password protected and its data encrypted. More developers are utilizing SDL (secure design lifecycle) in their programming, taking into account from the beginning the malicious risks posed to and by their applications.

complete article

Security Vulnerabilities

A Google security engineer says hundreds of thousands of Flash files are vulnerable and a considerable percentage of major Internet sites are affected.

Rent for Hire Zombies

So say security experts looking back on 12 months in which hi-tech gangs took control of the Internets underground.

The economy supporting these groups has matured so much that now everything from virus-writing kits to spam-spewing zombies are available for rent or hire.

Social Network Security

It is not just the average net user who is a fan of social network sites, so are hi-tech criminals.

So say security professionals predicting what net criminals will turn to in 2008 to catch people out.

The quasi-intimate nature of the sites makes people share information readily leaving them open to all kinds of other attacks, warn security firms.

Detailed information gathered via the sites will also help tune spam runs or make phishing e-mail more convincing.

Batteries are Like Liquids on Planes

If you do not want to lose your spare lithium batteries for your camera, notebook or cell phone, you might want to pack carefully for your next flight.

New rules from the Transportation and Security Administration that took effect on January 1 ban travelers from carrying loose lithium batteries in checked baggage. Passengers are allowed to pack two spare batteries in their carry-on bag, as long as they are in clear plastic baggies.

Security Portals Worth a Look

Key security websites that are oft overlooked but contain valuable information for security professionals or those interested in security in general:

Security Protection - collection of security RSS feeds.

Alarm Tools - security and alarm directory of related vendors.

Password Software - tools for managing and protecting passwords

Security Software - collection of key security software solutions.

Government Feeds - collection of RSS feeds from government agencies.

Take a look at the above websites, they are worth attention!

What is Hot and What is Not in Technology for 2008

Privacy made the list, see where:

Top 10 Winners Predicted for 2008
1. Video
2. Healthy
3. Long Tail
4. Buy USA
5. Rich Internet / Interactive Web / Semantic Web / Web Services
6. Aggregate and Attention Data
7. Power of the People
8. Going Green
9. Biometrics and Big Brother
10. Prosthetics / Bionic

Top 10 Losers Predicted for 2008
1. Lead
2. Squat Toilets
3. DRM
4. China
5. Skinny is Out
6. Blockbuster / Netflix
7. Orbo
8. MySpace fell to Facebook
9. Privacy
10. Piracy

What is Hot and What is Not for 2008

2007 Reflections, 2008 Predictions

The lens through which viewers receive their news has changed. The images of struggle are no longer frozen in time; technology has helped preserve and personalize these conflicts by producing moving tributes to the conflicts of humankind.

The strife and internal conflicts that marred the globe in 2006 continued into 2007: Mynamar (Burma), Palestine and Lebanon all continue to struggle with internal conflicts in their borders. The differences between 2006 and 2007 are not obvious; however, under close examination, it is evident that several external struggles have been transformed into internal conflicts. In 2006, many countries attempted to influence their neighbors. This was evident with Iran attempting to influence the turmoil in Iraq, and Syria attempting to control Lebanon. Both struggles have evolved into internal personal conflicts in 2007.

2007 Reflections, 2008 Predictions

The Politics of Privacy

Nearly 30 years after its passage, a once-obscure wiretapping law, and the secret federal court created by it, roiled the waters in Washington, D.C. And the debate is far from over.

The 1978 law in question is the Foreign Intelligence Surveillance Act, which was enacted in the post-Watergate era as a way to rein in abuses by U.S. intelligence agencies. After September 11, 2001, President Bush authorized his administration to bypass FISA when conducting wiretaps--a mechanism that he defended as necessary but that a chorus of opponents said amounted to a violation of the law, and perhaps the U.S. Constitution itself.

complete article

2007 Privacy Suffered

Threats to personal privacy got more severe in 2007, a report has claimed.

Compiled by Privacy International and the Electronic Privacy Information Center the report details global trends in privacy protection and surveillance.

It found that in 2007 more nations than ever ranked as places where surveillance had become endemic.

The move toward greater surveillance had left the fundamental right to a private life fragile and exposed, the report said.

Airport Security Follies

Six years after the terrorist attacks of 2001, airport security remains a theater of the absurd. The changes put in place following the September 11th catastrophe have been drastic, and largely of two kinds: those practical and effective, and those irrational, wasteful and pointless.

The first variety have taken place almost entirely behind the scenes. Explosives scanning for checked luggage, for instance, was long overdue and is perhaps the most welcome addition. Unfortunately, at concourse checkpoints all across America, the madness of passenger screening continues in plain view. It began with pat-downs and the senseless confiscation of pointy objects. Then came the mandatory shoe removal, followed in the summer of 2006 by the prohibition of liquids and gels. We can only imagine what is next.

Brussels Cancelled Fireworks

The city of Brussels has cancelled its traditional fireworks display to see in the New Year on Monday night due to an ongoing state of heightened security.

Identity Theft at All Time High

The loss or theft of personal data such as credit card and Social Security numbers soared to unprecedented levels in 2007, and the trend is not expected to turn around anytime soon as hackers stay a step ahead of security and laptops disappear with sensitive information.

Guard Your Identity

You know the drill when it comes to safeguarding your identity. Do not give out your Social Security number, do not lend your credit card to anyone and do not surf the Internet with abandon.

But with more credit cards in circulation now than at any other time of the year and online shopping increasingly seen as a better alternative to marching through the crowds, a refresher course in ID protection is in order.

Despite secure Internet networks and the growing availability of insurance coverage for identity fraud, a survey of 500 adults by the National Association of Insurance Commissioners found 57 percent of Americans are worried about becoming a victim of identity theft this holiday season.
The Federal Trade Commission estimates that about 3 percent of Americans are victims of identity theft each year.

Kids are Not Safe Online

Four out of every five children receive inappropriate spam e-mail touting get-rich-quick schemes, loan programs, and pornographic materials, according to a study released by Internet security provider Symantec Corporation. Parents want their children to experience the information and communication channels the Internet provides, but want to make sure they are protected from many of the hazards that are present.

Apple Files DRM Patent

Apple, Inc. has filed for a patent in the U.S. for a Digital Rights Management (DRM) system for controlling where software runs. The method described in the application is one that allows for the injection of code into an applications run-time instruction stream that checks to see if the application is being run on a specific hardware platform, and then repeats that check to see if it is still being run on that authorized platform.

Current Blog

2008 Security Blog Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.