Google Docs Phishing Scam a Game Changer

Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth. Source: http://www.darkreading.com

Leave a Reply