SlideShare ist ein Scribd-Unternehmen logo
1 von 41
HOW TO Tell if your
   designing an
 insecure website

Akash Mahajan at Meta Refresh 2013
Hasgeek Doesn’t
 Allow How-tos As           Does this
Talks But I Got In !!      bother you?
         :P




 HOW TO Tell if         your
                    designing
     an insecure website
Joke
DISCLAIMER
  Insecure
  Websites
   Design and
   UI/UX
 This is not a how to, this is
more like a series of thoughts
Effective
   Design, UI
     or UX

Talking About Effective Design
Can we say effective
      design is

Something that compels
 a user to do what the
   designer wanted?
Gmail ; A Great Example of Effective Design
Close Look at our example




 Phishing Attack or Effective Design
Even closer look at our example
             1. Favicon FTW




       2. Bookmark link
Phishing with a ph!
Salient features of effective design

Assumptions – maybe based on
data like heat maps etc.

Call to action – green button = go

Visual cues and
logos to inspire
trust
Salient features of phishing
Most people don’t

Notice what is in the

address bar




People love to fill login
forms
Address bar/URL can look like


   scheme://[login[:password]@]
   (host_name|host_address)[:po
   rt][/hierarchical/path/to/re
   source[?search_string][#frag
   ment_id]]

From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
Design Thinking?
Maybe Don’t Think == Impulsive

im·pul·sive /imˈp lsiv/
                ə
Adjective


Acting or done without forethought:
"young impulsive teenagers shoppers".
phish·ing
made up word

is the act of attempting to acquire
information such as usernames,
passwords, and credit card details by
masquerading as a trustworthy entity
in an electronic communication.
Effective Design/UI/UX is about generating




TRUST
People trust big shiny locks
Best piece of advice from a
    show about aliens
Two examples where this trust
 collides with effective design and
 makes the UI/UX bad for the user

1. Password Reset/Change feature
2. An SSL enabled website
How password reset should work

   akashmahajan@gmail.com
      Enter email to reset password




  YourSuperSecretPassword
What went down behind the scenes
• Code loaded in the browser sent that email to
  server.
What went down behind the scenes
• Server did bunch of things like check if email
  was in database, generated password etc.
The difficult part & UI nightmare


 How does the server know
 that it is you who filled the
email and you are the owner
   of this email address?
So how is it supposed to work?
• Using out of band communication.
• Code loaded in the browser sent that email to
  server.
And…..?
• Web server will email you a unique link.
  Hoping that the email address is in your hands

• You click on the link and go back to the server.

• Server confirms the link is proper it allows you
  to reset the password
Just FYI, that the email
 address you sent to the
server and the password
  you got back were in
       CLEARTEXT
People/stuff between you & the
                server
• Wireless Network
• Helpful IT admin monitoring for “bad traffic”
• ISP gateway with helpful IT admin
  “monitoring”
• Country level gateway with helpful govt. IT
  admin “monitoring” – Think Tunisia, Egypt, Iran
• Helpful Server admin “monitoring”
• And who knows what else is out there.
Just to recap!
•   Effective Design/UI/UX inspires trust.
•   People trust based on strong visual cues
•   These cues can be faked.
•   So ideally trust no one
•   If we use common sense approach to
    generating a new password we will need
    to trust multiple intermediaries.
So how do we create secure websites?




Finally a problem worthy of philosoraptor
HTTP + SSL/TLS = HTTPS
SSL/TLS

Encrypted Communication – Nobody
can see your message hence can’t
change it

Secure Identification of a Network –
Are you talking to the right server?
http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_slides.pdf
Bad Things can Happen

Comodo an affiliate of a root CA was hacked.

DigiNotar another affiliate was hacked.

Hundreds of certificates for google, yahoo,
mozilla, MS windows update were released.
Rougue SSL Certificate
Secure By Design



Will cover this
 next year!
I don’t have any answers for
                you
• I am not a designer. I understand security in
  systems.

• I understand that people want to use systems
  to do things, not get stopped due to security
  or insecurity.

• The idea was to get your attention and see if
  these problems can be solved using design.
@makash
     Akash Mahajan
That Web Application Security Guy

Weitere ähnliche Inhalte

Andere mochten auch

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoAkash Mahajan
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesAkash Mahajan
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajanAkash Mahajan
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practiceAkash Mahajan
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containersAkash Mahajan
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergUser Centered Strategy (UCS)
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kursklausbremer
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonThomas Koch
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und PythonThomas Koch
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojektePeter Eulberg
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Michel Lawaty
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DRbizmerce
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Olimex Bulgaria
 

Andere mochten auch (18)

Venom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demoVenom vulnerability Overview and a basic demo
Venom vulnerability Overview and a basic demo
 
I haz your mouse clicks and key strokes
I haz your mouse clicks and key strokesI haz your mouse clicks and key strokes
I haz your mouse clicks and key strokes
 
Top 10 web application security risks akash mahajan
Top 10 web application security risks   akash mahajanTop 10 web application security risks   akash mahajan
Top 10 web application security risks akash mahajan
 
Big Python
Big PythonBig Python
Big Python
 
Secure passwords-theory-and-practice
Secure passwords-theory-and-practiceSecure passwords-theory-and-practice
Secure passwords-theory-and-practice
 
App sec in the time of docker containers
App sec in the time of docker containersApp sec in the time of docker containers
App sec in the time of docker containers
 
Php security
Php securityPhp security
Php security
 
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab NürnbergWindofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
Windofarming Raspberry - Ignite Talk zur Ignite am 18.10.204 im FabLab Nürnberg
 
Python crash-kurs
Python crash-kursPython crash-kurs
Python crash-kurs
 
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit PythonEinfache Heimautomatisierung auf dem Raspberry Pi mit Python
Einfache Heimautomatisierung auf dem Raspberry Pi mit Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Raspberry Pi und Python
Raspberry Pi und PythonRaspberry Pi und Python
Raspberry Pi und Python
 
Raspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und BeispielprojekteRaspberry Pi - Einführung und Beispielprojekte
Raspberry Pi - Einführung und Beispielprojekte
 
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
Raspberry Pi im Embedded Testing - „tool“ oder „toy“?
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
2015 cloud trend and cloud DR
2015 cloud trend and cloud DR2015 cloud trend and cloud DR
2015 cloud trend and cloud DR
 
ESET - Cyber Security
ESET - Cyber SecurityESET - Cyber Security
ESET - Cyber Security
 
Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?Open Source Hardware. Why we do it, why it matters?
Open Source Hardware. Why we do it, why it matters?
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

How to tell if your designing an insecure website

  • 1. HOW TO Tell if your designing an insecure website Akash Mahajan at Meta Refresh 2013
  • 2. Hasgeek Doesn’t Allow How-tos As Does this Talks But I Got In !! bother you? :P HOW TO Tell if your designing an insecure website
  • 4. DISCLAIMER Insecure Websites Design and UI/UX This is not a how to, this is more like a series of thoughts
  • 5. Effective Design, UI or UX Talking About Effective Design
  • 6. Can we say effective design is Something that compels a user to do what the designer wanted?
  • 7. Gmail ; A Great Example of Effective Design
  • 8. Close Look at our example Phishing Attack or Effective Design
  • 9. Even closer look at our example 1. Favicon FTW 2. Bookmark link
  • 11. Salient features of effective design Assumptions – maybe based on data like heat maps etc. Call to action – green button = go Visual cues and logos to inspire trust
  • 12. Salient features of phishing Most people don’t Notice what is in the address bar People love to fill login forms
  • 13. Address bar/URL can look like scheme://[login[:password]@] (host_name|host_address)[:po rt][/hierarchical/path/to/re source[?search_string][#frag ment_id]] From Browser Security Handbook http://code.google.com/p/browsersec/wiki/Part1
  • 15. Maybe Don’t Think == Impulsive im·pul·sive /imˈp lsiv/ ə Adjective Acting or done without forethought: "young impulsive teenagers shoppers".
  • 16. phish·ing made up word is the act of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 17. Effective Design/UI/UX is about generating TRUST
  • 18. People trust big shiny locks
  • 19. Best piece of advice from a show about aliens
  • 20. Two examples where this trust collides with effective design and makes the UI/UX bad for the user 1. Password Reset/Change feature 2. An SSL enabled website
  • 21. How password reset should work akashmahajan@gmail.com Enter email to reset password YourSuperSecretPassword
  • 22. What went down behind the scenes • Code loaded in the browser sent that email to server.
  • 23. What went down behind the scenes • Server did bunch of things like check if email was in database, generated password etc.
  • 24. The difficult part & UI nightmare How does the server know that it is you who filled the email and you are the owner of this email address?
  • 25. So how is it supposed to work? • Using out of band communication. • Code loaded in the browser sent that email to server.
  • 26. And…..? • Web server will email you a unique link. Hoping that the email address is in your hands • You click on the link and go back to the server. • Server confirms the link is proper it allows you to reset the password
  • 27. Just FYI, that the email address you sent to the server and the password you got back were in CLEARTEXT
  • 28. People/stuff between you & the server • Wireless Network • Helpful IT admin monitoring for “bad traffic” • ISP gateway with helpful IT admin “monitoring” • Country level gateway with helpful govt. IT admin “monitoring” – Think Tunisia, Egypt, Iran • Helpful Server admin “monitoring” • And who knows what else is out there.
  • 29. Just to recap! • Effective Design/UI/UX inspires trust. • People trust based on strong visual cues • These cues can be faked. • So ideally trust no one • If we use common sense approach to generating a new password we will need to trust multiple intermediaries.
  • 30. So how do we create secure websites? Finally a problem worthy of philosoraptor
  • 31.
  • 32. HTTP + SSL/TLS = HTTPS
  • 33. SSL/TLS Encrypted Communication – Nobody can see your message hence can’t change it Secure Identification of a Network – Are you talking to the right server?
  • 35. Bad Things can Happen Comodo an affiliate of a root CA was hacked. DigiNotar another affiliate was hacked. Hundreds of certificates for google, yahoo, mozilla, MS windows update were released.
  • 37.
  • 38.
  • 39. Secure By Design Will cover this next year!
  • 40. I don’t have any answers for you • I am not a designer. I understand security in systems. • I understand that people want to use systems to do things, not get stopped due to security or insecurity. • The idea was to get your attention and see if these problems can be solved using design.
  • 41. @makash Akash Mahajan That Web Application Security Guy

Hinweis der Redaktion

  1. Talk about KSRTC person using the computer to go to googleTyped google in the address barClicked on Google.co.in when the results were displayed.Typed KSRTC in the google.co.in search boxClicked on KSRTC link, which was the 1st search result.
  2. Google for TabNabber
  3. http://www.trailofbits.com/resources/creating_a_rogue_ca_cert_paper.pdf