Friday, May 5, 2017

BP 5/5

BP 5/5 Phishing Attack Underscores OAuth Security Risks

How many users were phished on Gmail?
What did the attack do?
What does the developer platform allow people to do?
How has Google fixed the issue?
How did this developer get around this issue?
How do traditional phishing scams work?
What is the OAuth protocol?
How many apps use the protocol?
What can be done to fix the security holes?
How can people fix their email if they were targeted?

No comments:

Post a Comment

BP 5/20

BP 5/20: Bluetooth's Complexity Has Become a Security Risk WHat is the BlueBorne flaw? How is Bluetooth developed? How can malicious...