Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases

Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
Kids Break Porn Filter

The Australian government Monday admitted no Internet child safeguards were foolproof after a teenager claimed he was able to break through its multi-million dollar pornography filter in minutes.

Digital Car Keys Hacked

Israeli and Belgian security experts have discovered a flaw in the algorithm used to protect anti-theft digital key systems in a wide range of cars, including cars from Honda, Ford, General Motors, Mercedes Benz and Jaguar.

Hacker Safe Popularity Growing

Earlier this month Yahoo! announced it was including merchants' Hacker Safe security seals within Yahoo! Shopping pages. Now PriceGrabber has announced the same deal- and there are rumors that other comparison shopping sites are soon to follow, creating a sea-change in the web site trust mark business.

Security Fence Slow to Grow

Nearly a year after Congress passed legislation calling for the construction of 700 miles of new fencing along the U.S.-Mexico border, about 15 miles have been built, according to the Department of Homeland Security.

Pharmacy Spams Nuclear Blog

The Web site for the institution charged with safeguarding the safety and integrity of the U.S. nuclear arsenal has been inadvertently hosting advertisements and blogs that link to illegal prescription drug sites hawking everything from generic painkillers to erectile dysfunction medication, Security Fix has learned.

Computer Misuse Act Violated over Wireless Access

Police officers in London arrested a 39-year-old man using his laptop to access someone elses wireless Internet connection on Tuesday. His actions could potentially breach the Computer Misuse Act and the Communications Act, according to a Metropolitan Police Service statement.

eBay Says Skype Not Victim of Russian Hackers

Skype has not been attacked, eBay Inc. said Friday, dispelling rumors that Russian hackers took down its popular online telephony service.

EBay attributes the outage to a problem in a Skype networking algorithm, but code has been posted to a Russian security discussion forum that could supposedly be used to knock the service offline in a DOS (denial-of-service) attack.

Google Gets Behind Click Fraud

Google has unveiled a Web site resource center focused on the thorny issue of click fraud, which many consider a potential threat to the Googles main source of revenue: Pay-per-click advertising.

Google developed the new Ad Traffic Quality Resource Center primarily to give its advertisers a single place to find Google information about click fraud, said Shuman Ghosemajumder, business product manager for trust and safety at Google, on Friday.

Rewriting History

A US hackers homemade program to pinpoint origins of Wikipedia edits indicates that alterations to the popular online encyclopedia have come from the CIA and the Vatican.

The Wikiscanner Identities Revealed

Australia Attempting to Thwart Perverts

Australia will provide a free Internet filtering service and access to a hotline in a bid to thwart perverts seeking to contact children, Prime Minister John Howard said.

ISPs Lack Responsibility

A new report on Internet safety has concluded ISPs should take more responsibility for online security since end users are often lax.

But the 121-page Personal Internet Security report, published on Friday by the U.K. House of Lords, stopped short of suggesting that the Office of Communications, the U.K. communications regulator -- should impose new rules on ISPs.

Confidential Data Stolen

Internet hackers have stolen confidential data on 60,000 Norwegians, including the head of the agency for safeguarding them, the agency itself revealed Friday.

Kids Outsmarting Adults Online

The gap is widening between what kids do online and what their parents think they do.

A new study shows that children are online twice as much as their parents think they are and nearly one-quarter are getting away with forbidden online activities, according to security company Symantec, which commissioned Harris Interactive to do the poll.

Security Logos

Great collection of diverse Security Logos. If you are building a security related website or product line consider using one of these security logos.

Forensic Tools Fall Under Hacker Laws

A law that makes it a crime to host online or otherwise provide software that could be used in cyber attacks went into effect in Germany. While the reaction from Germanys hacker culture has been somewhat muted, the measure is already prompting changes within one of the worlds most active computer security research and hacking communities.

The trouble with this kind of law is that it is awfully difficult to pin down the definition of a computer program designed for malicious purposes. But the forensic tools that are needed to find and close software and network security holes become a double-edged sword because they can almost always also be used by criminals to probe for or exploit potential weaknesses in a target.

Lobby Tracking Secure Tracking

Jolly Technologies announces the availability of Lobby Track, a new secure tracking, access control and visitor management software system; ID Flow, the next-generation software for ID card design, data and production.

These innovative new technologies will allow organizations to track employees and equipment with detailed activity logs by individual or groups; set access control policy; and provide visitor management functionality, including data entry, advanced ID card and badge design and printing.

Preparing Children for Emergencies

Intense circumstances create high amounts of stress, not only for adults, but children also. Whether it is a fire, flood or earthquake, children need to know what to do and how to do it in order to minimize stress and anxiety. Have you heard stories on the news about a child who saves a family by staying calm, calling 911, and following directions? Being prepared to help in an emergency saves lives. What makes it possible for a child in a high stress situation to be ready to help?

Preparing Children for Emergencies

Voting Systems Fail

California released the results of the states extensive testing of electronic voting systems. State-sanctioned teams of computer specialists were able to break through the security of every model of voting machine and change results or take control of some of the systems' electronic functions.

Some county elections officials in the state voiced concerns about the study, saying they worry that they could be forced to junk millions of dollars in voting machines if the California Secretary of State decertifies them for the February election.

Secure Instant Messaging

If you're like me you do not like any one reading your shit. The following links and instructions will show you Windows users how to route your IM connections through three other computers around the world and how to use encrypted IM. Not only will your IM be near impossible to trace but people in the middle wont be able to sniff your traffic either.
complete article

US Military Gangs

Evidence of gang culture and gang activity in the military is increasing so much an FBI report calls it a threat to law enforcement and national security. The signs are chilling: Marines in gang attire on Parris Island; paratroopers flashing gang hand signs at a nightclub near Ft. Bragg; infantrymen showing-off gang tattoos at Ft. Hood.

It's obvious that many of these people do not give up their gang affiliations, said Hunter Glass, a retired police detective in Fayetteville, North Carolina, the home of Ft. Bragg and the 82nd Airborne. He monitors gang activity at the base and across the military.

Student Social Security Numbers Posted

Students who were in the 10th grade in the St. Mary Parish School System in Louisiana between 2001 and 2003 may have had their Social Security number appear on the Board of Regents Web site for a couple of hours earlier this month.

Internet Jihad

Muslim hardliners are becoming more savvy at dodging national security scrutiny as they increasingly ditch the mosque for the internet to reach their followers and disseminate messages of hate.

Counter-terrorism experts warned yesterday that Islamic radicals were developing a greater interest in secretly spreading their beliefs and ideologies through internet chat rooms to maximize their potential audience and make it more difficult for authorities to trace them.

Internet Censorship Increasing

State restrictions on use of the Internet have spread to more than 20 countries that use catch-all and contradictory rules to help keep people off line and stifle feared political opposition, a new report says.

Sexual Predators Online

Reports indicate that sexual predators are targeting Moms and their online dating habits as a way to prey on children!

LinkedIn Security Flaws in Toolbar

Security researchers are reporting a public exploit has been designed that could take advantage of critical security flaws in the LinkedIn Internet Explorer Toolbar.

The vulnerabilities do not apply to the Web site, only the LinkedIn IE toolbar.
Users of the LinkedIn social-networking site that have the IE toolbar installed on their computers could be at risk of a remote attack, should they visit a malicious Web site.

Search Engines Suddenly Care About Privacy

After years of insisting that they should be trusted to keep user search histories indefinitely, search engines are suddenly competing to limit data retention.

In March, Googles announcement that it would anonymize user data after 18 to 24 months was met by silence from the rest of the industry. But after further announcements last week from Google and No. 4 search engine, Microsoft on Sunday announced it would be matching Googles 18-month policy. And Monday, Yahoo announced it would leap-frog both companies and anonymize data after 13 months.

Miss America All About Internet Safety

Lauren Nelson, the current Miss America, asked Congress to mandate Internet safety classes for children to educate them about online predators and other threats.

29,000 Sex Offenders on MySpace
07/31/2007 has found more than 29,000 registered sex offenders with profiles on the popular social networking Web site — more than four times the number cited by the company two months ago, officials in two states Tuesday.

Top Security Software for 2007

The WINNERS for the 2007 Shareware Industry Awards have been announced! Take a look at the best software for 2007 in each category! Security Software does not really fare well in the competition.

Best Overall Utility
FolderMatch by Salty Brine Software
TuneUp Utilities 2007 by TuneUp Software GmbH - WINNER
WinRar by win.rar GmbH
WinZip by WinZip International LLC.

Best Application
ClipMate by Thornsoft Development - WINNER
CSE HTML Validator by AI Internet Solutions
Open Office by Sun Microsystems

Best Graphics Program or Utility
Easy Imager by Fookes Software
IrfanView by Irfan Skiljan
PaintShop Pro by Corel Corporation - WINNER

Best Desktop Enhancement
Microangelo Toolset by Eclipsit Corporation - WINNER
MBSS Fireworks by Patrick D. Grengs II
Window Blinds by Stardock Corporation

Best Photo Program or Utility
ACDSee Pro Photo Manager by ACD Systems
ALSee by ESTsoft
Life Poster Maker by Lincoln Beach Software - WINNER

Best Sound Program or Utility
ALSong by ESTsoft
D'Accord iChords by D'Accord Music Software
RecordForAll by NotePage, Inc. - WINNER
Winamp Pro by NullSoft

Best Vertical Market Program or Utility
Guitar and Drum Trainer by Renegade Minds
Help & Manual by EC Software GmbH
Vmware Workstation by VMware Inc. - WINNER

Best Business Application or Utility
Microsoft Office 2007 by Microsoft Corporation - WINNER
PayWindow 2007 by ZPAY Payroll Systems
Time & Chaos by Chaos Software

Best Educational Program or Game
AceReader Pro by StepWare Inc.
WinFlash Educator by Open Window Software
WISCO Word Power by Wisco Computing - WINNER

Best Hobby or Personal Interest
Auction Sentry Deluxe by
Google Earth by Google Inc. - WINNER
MyLife Organized by My Life Organized

Best Internet Enhancement
Cute FTP Professional by GlobalSCAPE
FlashGot by InformAction
FTP Voyager by Rhino Software, Inc. - WINNER
WS_FTP Professional by Ipswitch, Inc.

Best Internet Communication
Miranda by Miranda IM
Pidgin by Softare Freedom Law Center
Skype by Skype Limited - WINNER
Trillian by Cerulean Studios

Best Web Enhancement
Mozilla Firefox by Mozilla Foundation - WINNER
Mozilla Thunderbird by Mozilla Foundation
RoboForm by Siber Systems
SPAMFighter by SPAMFighter

Best Non-Action Game
Ant War 1 by Anarchy Enterprises
Pocket War by MetalShard, Inc.
Pretty Good MahJongg by Goodsol Development, Inc. - WINNER

Best New Game
Addictive Football by Addictive 247 Games  - WINNER
Golf King by NHN USA
Titan Attacks by Demand Entertainment

Best Program for PDA's
Journal Bar by Omega One
Resco Explorer by Resco, sro.
Spb Mobile Shell by Spb Software House - WINNER

Security Info

Stay current on the latest security products, news and information on Security Info. RSS feeds are also available that detail top security feeds.

FBI and China Nail Pirates

The FBI said Tuesday that a joint effort with the Chinese authorities had led to the arrest of 25 people and the seizing of more than $500 million worth of counterfeit Microsoft and Symantec software that was being made in China and distributed worldwide.

The arrests, according to industry executives, represented the most significant crackdown on software piracy.

Forensic Software Not Secure

Forensic software used to investigate computer crime is not as secure as it should be, according to researchers with Isec Partners.

The security company spent the past six months investigating two forensic programs, Guidance Software EnCase, and an open-source product called The Sleuth Kit. It discovered about a dozen bugs that could be used to crash the programs or possibly even install unauthorised software on an investigator machine, according to Alex Stamos, founding partner with Isec Partners.

Current Blog

2007 Security Blog Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.