Talk With an Expert

A technical study of an emerging open-protocol technology and its security implications.

Four Attacks on OAuth - How to Secure Your OAuth Implementation