Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases

Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
US Warns of Apple Security Flaw

An exploit for a security bug in Apple's Mac OS X operating system could be used to carry out denial of service attacks, the US Computer Emergency Readiness Team (US-CERT) has warned.

The warning follows an advisory notice about the flaw issued by the French Security Incident Response Team last week.

Computer Security Day

Computer Security Day was started in 1988 to help raise awareness of computer related security issues. Our goal is to remind people to protect their computers and information. This annual event is held around the world on November 30th although some organizations choose to have functions on the next business day if it falls on a weekend.

Computer Alerts to Fights

Combined with closed circuit television systems, this new software can quickly notify security personnel about loud, angry people in outdoor public spaces, public transportation, nightclubs and bars.

Complete Article

9 of 10 Emails are Spam

The number of "spam" messages has tripled since June and now accounts for as many as nine out of 10 e-mails sent worldwide, according to U.S. email security company Postini.

Security Feeds

Interested in monitoring the latest security news and alerts using RSS feeds? Use the RSS feeds located in the Security Directory to stay on top of critical security information.

Web Application Weakness

According to Mass.-based Watchfire, the most vulnerable area in the enterprise information ecosystem is Web applications. The company specializes in software and services to audit the security and regulatory compliance of Web sites.

Microsoft Launches Security Week

Microsoft today launched Microsoft Security Week 2006, a series of awareness building and education activities aimed at raising awareness of computing-related security issues. This will allow users to leverage the full advantages of the Internet with the confidence that they are protected against malicious software and other security threats.

Symantec Security Bulletin

Symantec is releasing a new portfolio of security and availability products specifically for the small- to mid-sized marketplace.The new initiative from Symantec is an SMB security product blueprint that is intended as a guide to help customers and solution providers.

Homeland Security Classes

Next year, Justan Holloway's class schedule will look more like an action movie plot than an academic pursuit. The Savannah State University sophomore will study international terrorism, disaster planning, criminology, social psychology and Arabic.

Holloway plans to be among the first to enroll in the college's new degree program in homeland security.

Fake Bombs Lost

A major security alert has been sparked after police lost a briefcase full of imitation bombs. An officer left the case containing around 15 mock-up explosive devices on a train.

He was returning home after using the "bombs" in a presentation to security staff and police.

Pound Privacy

What is Pound Privacy?

Pound Privacy is a campaign to create the first standard for search engine query privacy. The implementation is fairly straightforward: If you append the phrase "#privacy" at the end of a query on any search engine or site search, your query should not be tracked by IP or cookie, and should not be made public in keyword tools. It is that simple.

Background Checks

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Background Checks

Homeland Security Aid Sentenced

A 56-year-old former Homeland Security press aide was sentenced Friday to five years in prison after he pleaded no contest to sending sexually explicit Internet messages to someone he thought was a 14-year-old girl.

Hackers in Chile

Two Chileans accused of hacking into thousands of government Web sites were freed from jail Wednesday but ordered to stay away from computers while the case is investigated, their lawyer said.

Internet Rage Becomes Physical

A British man convicted of what has been described as the country's first "web-rage" attack, was jailed for 2-1/2 years on Friday for assaulting a man he had exchanged insults with over the Internet.

PGP is 15 Years Old

PGP Corporation salutes the 15th anniversary of PGP encryption technology. Developed and released in 1991 by Phil Zimmermann, Pretty Good Privacy 1.0 set the standard for safe, accessible technology to protect and share online information.

Kevin Mitniks Security Advice

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

~ Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.
~ Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.
~ Use an antivirus product like AVG or Norton, and set it to update daily.
~ Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.
~ Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.
~ Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.
~ Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.
~ Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.
~ Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).
~ Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Complete Article

Privacy and Mobile Phones

Intel Corp. has attached a privacy license to its new location-aware software product, intended to protect cell phone users' personal information as mobile devices increasingly rely on tracking technology to provide targeted services.

Software Piracy Leads to Guilty Plea

The operator of a Web site that offered copies of software has pleaded guilty to one count of criminal copyright infringement, the U.S. Department of Justice.

Ronnie A. Knott, 36, of Salt Lake City, pleaded guilty Thursday before Judge T.S. Ellis III in U.S. District Court for the Eastern District of Virginia. He is scheduled to be sentenced Feb. 23, and he faces a maximum sentence of five years in prison and a $250,000 fine.

Complete Article

Water In Danger in Russia

The head of the Federal Security Service said Tuesday that his agency had information that terrorists were planning attacks against water plants in southern Russia.

Israel Accuses Russian Tourist of Spying

A Russian tourist, who tried to take picture against backdrop of Azrieli Towers in Tel Aviv was pounced by security personnel, accused of spying, planning terror attack for Hezbollah.

Protecting Your Computer

Relatively simple local security measures you can take on your server to prevent a hacker from getting in and exploiting your system.

Complete Article

Panama on Security Council

Panama was elected to the last seat in the UN Security Council for a new two-year term on Tuesday, in what seems to be the third longest electoral stand-off for a seat on the Security Council in the world organization's 61-year history.

How to Land a Security Job

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Security Jobs and Background Checks

IBM Heading into Surveillance

IBM's decided that it's had enough of making traditional processors, and instead will head further into the lucrative military and law enforcement business. Big Blue just announced today that it's begun selling the "Smart Surveillance System," or S3.

eVoting Security Issues Raised

Security of electronic voting machines is coming under scrutiny as the midterm elections approach.
On the eve of Election Day, several states have reported computer problems during early elections. A privacy group predicted disaster; voters' advocates anticipated errors and one group announced a Web tool for recording and addressing problems.

Internet Enemies

The international journalists' advocacy group Reporters Without Borders has released its annual list of countries that systematically violate online free expression.

The countries include:
- Belarus
- Burma
- China
- Cuba
- Egypt
- Iran
- North Korea
- Saudi Arabia
- Syria
- Tunisia
- Turkmenistan
- Uzbekistan
- Vietnam.

Privacy Issue Ignored

A Homeland Security advisory panel finds serious privacy and security problems with RFID. But the report is stalled, while the government rolls out new ID cards using the controversial technology.

Privacy Issue Ignored

Hackers Penetrate Water System

A foreign hacker who penetrated security at a Harrisburg, Pa., water filtering plant is under investigation by the FBI for planting malicious software capable of affecting the plant's water treatment operations, ABC News has learned.

Complete Article

Blog Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.