Simon Thorpe Why using SMS in the authentication chain is risky

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=tJm8TPPF_Z0



Duration: 1:02:12
0 views
0


OWASP - AppSecUSA 2016 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2023-12-26Cleaning Your Applications' Dirty Laundry with Scumblr
2023-12-26Patterns of Authentication and Self Announcement in IoT
2023-12-26Dan Kuykendall SPArring with the Security of Single Page Applications
2023-12-26Practical Tips For Running A Successful Bug Bounty Program
2023-12-26Dave Lewis Barbarians at the Gateway
2023-12-26Eric Johnson Continuous Integration Live Static Analysis using Visual Studio & the Roslyn API
2023-12-26Scaling Security Assessment at the Speed of DevOps
2023-12-26Should there be an Underwriters Laboratories certification for software in IoT products
2023-12-26Evan Johnson Misconfigured CORS and why web appsec is not getting easier
2023-12-26Everything is Terrible Three Perspectives on Building, Configuring, and Securing Software
2023-12-26Simon Thorpe Why using SMS in the authentication chain is risky
2023-12-26HTTPS & TLS in 2016 Security practices from the front lines
2023-12-26Stephen De Vries Threat Modeling With Architectural Risk Patterns
2023-12-26Using language theoretics and runtime visibility to align AppSec with DevOps
2023-12-26James Kettle Exploiting CORS Misconfigurations for Bitcoins and Bounties
2023-12-26Jimmy Mesta Containerizing your Security Operations Center
2023-12-26When encryption is not enough Attacking Wearable
2023-12-26Yair Amit The Ways Hackers Are Taking To Win The Mobile Malware Battle
2023-12-26Top 10 Security Best Practices to secure your Microservices
2023-12-26There’s a new sheriff in town dynamic security group recommendations with Grouper and Dredge
2023-12-26WAFs FTW A modern devops approach to security testing your WAF



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering