Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases

Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog

8,500 Cyber Victims

British electronic-crime detectives are investigating a massive data theft operation that stole sensitive information from 8,500 people in the U.K. and others in some 60 countries, officials said Tuesday.

In total, cybercriminals targeted 600 financial companies and banks, according to U.K. authorities, who have worked over the past week to identify and notify victims.

Complete Article

Hackers Obscure Hack from Security Software

Hackers are developing new software that will help hide browser attack code from some types of security software.

The software, called VoMM (eVade o’ Matic Module), uses a variety of techniques to mix up known exploit code so as to make it unrecognizable to some types of antivirus software.

Complete Article

FBI Tracks Usage

FBI Director Robert Mueller on Tuesday called on Internet service providers to record their customers' online activities, a move that anticipates a fierce debate over privacy and law enforcement in Washington next year.

Complete Article

Test Hack

Test-Hack is your own online hacker simulation. With 20 levels that require different skills to get to another step of the game, this new real-life imitation will help you advance your security knowledge. Test-Hack will help you improve your JavaScript, PHP, HTML and graphic thinking in a fun way that will entertain any visitor!

10 Most Dangerous Things for End-Users

1 Introduction
2 Clicking on Unknown Email Attachments
3 Installing Unauthorized Applications
4 Turning Off or Disabling Automated Security Tools
5 Opening Messages from Unknown Senders
6 Surfing Legally-risky Sites
7 Giving Out Passwords
8 Random Surfing the Unknown
9 Attaching to Unknown WiFi Networks
10 Filling Out Web Scripts, Forms
11 Participating in Chat Rooms or Social Networking Sites

10 Most Dangerous Things for End-Users

Security Classifications

Much is heard these days of government secrets being uncovered, national security being compromised, and of sensitive information getting into the wrong hands. Most countries have a classification system to formalize state secrets and protect information from being used to endanger citizens. This article will familiarize you with the security classification system.

Security Classifications

Rooting Out Rootkits

In a nutshell, rootkits are nasty programs that can load on boot or temporarily live in memory and run in user mode (aka ring 3 for you processor gurus) and kernel mode (aka protected mode or ring 0).

Rootkits became pervasive in the Unix world, but the technology and its threat are slowly and surely bleeding into the Windows environment. They manipulate Windows by taking over the operating system -- even inside a virtual machine -- with the goal of hiding malware and controlling any or all aspects of the system.

Rooting out Rootkits

Britain at Risk

Britain has now become the number one target for a "resurgent" al Q'aeda, according to British intelligence officials. Ties with Pakistan seen as key reason. British news sources give various justifications for this same conclusion.

FingerPrint for Beer

The government is is funding the roll out of fingerprint security at the doors of pubs and clubs in major English cities.
Funding is being offered to councils that want to have their pubs keep a regional black list of known trouble makers.

The fingerprint network installed in February by South Somerset District Council in Yeovil drinking holesy is being used as the show case.

Complete Article

Apple Blames Microsoft for Virus

Apple’s statement on the iPods that accidentally left the factory infected with a virus was bound to start a fire, and it did. The statement about the RavMonE.exe virus ended with 'as you might imagine, we are upset at Windows for not being more hardy against such viruses, and even more upset with ourselves for not catching it.'

Security and quality assurance experts reacted negatively by stating that Apple’s efforts to deflect blame onto Microsoft are misleading and the batch of factory-infected iPods reveals a troubling lack of thoroughness in the company's manufacturing process.

Complete Article

Telecommuting Terrorists

Michael Chertoff, head of US Homeland Security, warned that people don't need to travel to a country with "-stan" in its name to become radicalized and commit acts of violence. Instead, they can now turn to the Internet. "They can train themselves over the Internet. They never have to necessarily go to the training camp or speak with anybody else and that diffusion of a combination of hatred and technical skills in things like bomb-making is a dangerous combination," Chertoff said at a conference of international police chiefs, according to Reuters.

Microsoft Kernel Access

Microsoft usually finds itself at the center of one software controversy or another. Most recently, the hot issue has been one of security: should third-party security companies such as Symantec and McAfee be granted access to Vista's internals, including the kernel? Previously, Microsoft had stated that no companies would be allowed to access Vista's core for security reasons, but Symantec launched an official complaint over the matter with the European Union. Today, Microsoft said that they would grant access to the kernel for the 64-bit versions of Vista to security software firms.

Microsoft Kernel Access

Linux Security

Outlines some easy things administrators can do to make their Linux server more secure and significantly reduce the risk they face. This tutorial lists seven such items.

Security on Campus

It may surprise you to know that college and university campuses are scenes to more than just socializing and learning. All too often, they can also be the scenes of a crime. Awareness of this problem has grown dramatically over the last twenty years, and many institutions are taking appropriate measures to protect their students from malice.

Security on Campus

Rent a Cop Security Issues

In the aftermath of 9/11, private security officers are being asked to step into the breach and fill gaps in the nation's homeland security plans. But experts warn that most of this 2 million person workforce receives little or no training, aren’t subjected to rigorous background checks for previous criminal behavior and are paid so poorly that many quickly leave for better paying jobs.

Complete Article

Security Cache

Security experts have warned of malicious code residing in cached web pages on servers used by ISPs, search engines and businesses.

Microsoft Security Lockdown

Microsoft is still talking with partners who are complaining about how the Redmond, Wash. developer has set up Windows Vista's security, but it won't budge from its decision to lock down access to the kernel, a company security manager said Thursday.

Ajax Security Issues

The programming tool Ajax has proven integral to the latest popular Internet destinations and is winning the favor of corporate supporters, including IBM and Google, as well as developers. However, there are some security issues that may accompany this cutting-edge technology tool.

Complete Article

Security Classifications

Much is heard these days of government secrets being uncovered, national security being compromised, and of sensitive information getting into the wrong hands. Most countries have a classification system to formalize state secrets and protect information from being used to endanger citizens. This article will familiarize you with the security classification system.

Although the exact number varies from country to country, there are generally five levels of security classification:

Security Classifications

Medicare and Medicaid Security Gaps

Federal investigators say they have found serious computer-security flaws that could lead to the improper disclosure of medical information on people enrolled in Medicare and Medicaid. The investigators, from the Government Accountability Office, said “key information security controls were missing”.

Complete Article

Kaspersky Defends Microsoft Security

Russian security vendor Kapersky has jumped to the defence of Microsoft, refuting claims by rival security vendors Symantec and McAfee that Microsoft is using its monopoly to lock them out of access to the Vista operating system kernel.

Complete Article

NSA Security

NSA initiatives in enhancing software security cover both proprietary and open source software, and we have successfully used both proprietary and open source models in our research activities. NSA does not favor or promote any specific software product or business model. Rather, NSA is promoting enhanced security.

Background Checks for Security

If you have ever been employed, chances are good that you’ve had a background check run on you. Employers looking for reliable, trustworthy individuals will often use these reports to confirm that information given on a resume is true and ensure that they are hiring persons of high standards. But what is included in a background check? Do you have control over who can access your report? How can you find out what is on your record?

Background Checks

Security Dollars Wasted

The US has spent $44 billion on bio-terrorism defences, which according to experts at the Center for Biosecurity at the University of Pittsburgh, has done nothing to protect the country.

Complete Article

Sharing Data on Suspected Terrorists

An anti-terror deal struck between the United States and the European Union gives U.S. law enforcement access to passenger data on U.S.-bound flights. The agreement was deadlocked for months as the EU held out for privacy rights.

Appeals court OKs continuing NSA Surveillance Program

National Security Agency (NSA) wiretapping program can continue while President George Bush's administration appeals a ruling by a Michigan judge who said the program was illegal.

The U.S. Court of Appeals for the Sixth Circuit, in an order released Wednesday, said the Bush administration successfully argued that the program would be irreparably harmed if it were shut down pending the government's appeal of the earlier ruling.

Complete Article

Hackers Target Commerce Dept. Computers

Chinese hackers are deviling the U.S. Department of Commerce, forcing the agency to replace workstations and bar employee use of the Internet from their own work computers.

The targets of the attacks were computers in the Bureau of Industry and Security (BIS), which oversees a number of commercial U.S. exports having both commercial and military uses, including software and technology.

No data was compromised in the attacks, according to the agency.

Hacker Attack

Security Feeds

Receive alerts and notifications of security conditions via RSS feeds. This Security Feeds directory covers all kinds of security issues. Search for feeds of interest or navigate the categories to locate feeds related to specific security concerns.

Cyber Attack

The idea of terrorists bringing down the Internet is as unfathomable today as the collapse of the Twin Towers was on Sept. 10, 2001. But the threat cyberattacks pose to the Net is real.

Government policy-makers, corporate leaders, and cyberwonks agree that it's ultimately the federal government's responsibility to coordinate protection of the Internet. But Washington has so far fallen short of its goals for safeguarding the Net, and if it's going to succeed, it will need more cooperation from private industry.

Cyber Attack

Blog Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.