Who do you trust?

Imagine this scenario: a woman is enjoying a cup of coffee at her favorite Wi-Fi hotspot, and uses her iPad to check her email. As she starts to login to Gmail, she doesn't realize that the man sitting a few tables over, apparently working on his laptop, has intercepted her login and is pretending...
By
August 3, 2011

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg