Social Networks Evil Twin Attacks

What will happen if someone impersonates you on a social network? Will that person be able to fool your friends and as such gain access to resources, which only you are entitled to?… or are social network protected enough to guarantee the credibility of the social participants.

Introduction to Social Networks Evil Twin Attacks

Lets have a look at a social network like LinkedIn. [...]

more | comments | comments rss | posted by

30mins Introductionary Presentation on Client-side Security

I was asked to have a 30 minutes long introductionary presentation on client-side security issues. Although the presentation is very basic and high-level oriented, as it was designed to serve as an overview rather then as an in depth analysis, I thought that still someone may find it useful or may use it in their own presentations.

You can download the PDF version from here and the ODT version from here. Let me know if it works for you.

more | comments | comments rss | posted by