Blog
March 7, 2011
Four Attacks on OAuth - How to Secure Your OAuth Implementation
This article briefly introduces an emerging open-protocol technology, OAuth, and presents scenarios and examples of how insecure implementations of OAuth can be abused maliciously. We examine the characteristics of some of these attack vectors, and discuss ideas on countermeasures against possible...