News OAuth
OAuth 2.0 Best Practices for Native Apps

In October 2017, the Internet Engineering Task Force (IETF) released the Best Current Practices (BCP) when using OAuth 2.0 with native mobile applications. This BCP states that OAuth 2.0 authorization…

Vulnerabilities in Wifi security protocol

Security experts at Belgian University KU Leuven have discovered a weakness in WPA2, a wireless security protocol that is being used worldwide for internet connection over Wifi network. The researchers…

1 2 3 4 708