DEF CON 29 – Jenko Hwong – New Phishing Attacks Exploiting OAuth Authentication Flows
OAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read MoreOAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read More