DEF CON 29 – Jenko Hwong – New Phishing Attacks Exploiting OAuth Authentication Flows
OAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read moreOAuth 2.0 device authentication gives users on limited-input devices like TVs an easier way to authenticate against a cloud website/app
Read moreWe present a novel class of DNS vulnerabilities that affects multiple DNS-as-a-Service (DNSaaS) providers. The vulnerabilities have been proven and
Read moreOpenness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams. Changes in upstream dependency
Read moreWhite paper Available Here: http://media.defcon.org/DEF CON 23/DEF CON 23 presentations/Ronny Bull & Jeanna Matthews – UPDATED/DEFCON-23-Ronny-Bull-Jeanna-Matthews-Exploring-Layer-2-Network-Security-In-Virtualized-Enviroments-WP.pdf Cloud service providers offer
Read moreThe University of Minnesota recently got banned from contributing to the Linux Kernel. The Linux Advisory Board has reviewed and
Read moreIn this video I go over the on going debacle concerning university of Minnesota’s hypocrite commits study on the Linux
Read moreDNS fragmentation attacks are a more recent series of cache poisoning attacks on resolvers. Even if DNSSEC is fully implemented,
Read more