Facebooktwitterredditlinkedintumblrmail

Because Web 2.0 applications often result in novel exploits, data leaks, or identity theft, the solution is to understand the attacks and assess how best to prevent them.

Read article »