Information about general information security issues.

12 Endpoint Security Myths Dispelled

/
A posting from Dark Reading in there Endpoint  Security  section: It's…

Evernote offers two-factor verification in wake of hack

/
A posting from NBS News in there Technology Section: Popular…

LinkedIn flips the two-factor authentication switch

/
A posting from Naked Security on LinkedIn authentication:  Happy…

Social Engineering: Tips to Protecting Yourself

/
In the world of information security, ‘social engineering’ is a term that describes a non-technical way of hacking that relies on the hacker to collect information to bypass normal security controls. It is the art of manipulating users into performing actions or divulging confidential information.

GovSec – The SecurityOrb Show: Interview with Curtis KS Levinson about GovSec

/
GovSec - The SecurityOrb Show: Interview with Curtis KS Levinson about GovSec

Anatomy of a change – Google announces it will double its SSL key sizes

/
A posting from Naked Security on Google announces it will double…

Twitter launched “Login Verification” feature after the Non-Stop Hijacking of accounts by Pro-Assad Hackers

/
Twitter launched "Login Verification" feature after the Non-Stop Hijacking of accounts by Pro-Assad Hackers

Google security: You (still) are the weakest link

/
A posting from Cnet News in there Security and Privacy section: AN…