Loading…
This event has ended. View the official site or create your own event → Check it out
This event has ended. Create your own
View analytic
Friday, October 25 • 2:00pm - 2:45pm
View this abstract in your browser

Sign up or log in to save this to your schedule and see who's attending!

Personalized invoices, receipts, hotel reservation confirmations, special credit card promotions, and more can all be found online without ever entering a username or password. These vulnerabilities originate from an insecure method of hosting and communicating sensitive information. This presentation will go over how you may already be a victim of this blatant information disclosure, how the leaked information can be exploited, and who some of the offenders are. The presentation will also go over some of the methods to avoid these vulnerabilities in the first place, and what to do once you discover that your company is already vulnerable.

Speakers
avatar for PHIL PURVIANCE

PHIL PURVIANCE

Security Associate, Bishop Fox
The number of companies with bug bounty programs has increased dramatically over the last five years. A clever researcher can make easy money disclosing security vulnerabilities responsibly, and some have even turned it into a full-time job. | | But how do these programs actually work? I will use my personal experiences on both sides of the fence - as a bug hunter and as a bug bounty submission reviewer - to provide an exclusive look into... Read More →


Friday October 25, 2013 2:00pm - 2:45pm
Gemalto Room Norris Conference Center, 2525 W. Anderson Lane, Suite 365, Austin, Texas 78757

Attendees (19)