Mobile app developers need to be aware of improper OAuth 2.0 implementations that have put one billion mobile apps at risk to takeover.
You don’t want to be footing the bill for some crook’s film-watching! It’s just one of many dangers of password reuse.
Some 12 hours after WikiLeaks published emails stolen from the email account of Hillary Clinton campaign Chairman John Podesta, someone has hijacked the man’s Twitter account and tweeted out “I’ve switched teams. Vote Trump 2016. Hi pol.” The “Hi pol” part of the message is a reference to the 4chan Politically Incorrect board, dedicated to the discussion of news, world events, political issues, and other related topics.” The hijack of the Twitter account has been … More