Credential Stealing as an Attack Vector

Traditional computer security concerns itself with vulnerabilities. We employ antivirus software to detect malware that exploits vulnerabilities. We have automatic patching systems to fix vulnerabilities. We debate whether the FBI should be permitted to introduce vulnerabilities in our software so it can get access to systems with a warrant. This is all important, but what’s missing is a recognition that… Continue reading Credential Stealing as an Attack Vector

OAuth 2.0 Resource Owner Password Grant – Handling of Access Token Upon Logging Out

I am new to OAuth 2.0. I used BShaffer’s OAuth PHP Server on Authorization Code Grant, and I understand that the client application can have its OAuth token separate from its session authentication, that is, if a user logs out, the access … Continue reading OAuth 2.0 Resource Owner Password Grant – Handling of Access Token Upon Logging Out

Boom in Steam account hijacking is due to cheap Steam Stealers

With over 125 million active users, Valve’s Steam is the most popular online gaming platform in the world and, consequently, forms a huge pool of targets for cyber crooks and scammers. After all, Steam accounts contain users’ personal and payment info, as well as offer the opportunity to earn money by trading away items users have accumulated. “Account theft has been around since Steam began, but with the introduction of Steam Trading, the problem has … More Continue reading Boom in Steam account hijacking is due to cheap Steam Stealers