George Stephanis: Understanding Security Holes

Continue the discussion

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

Published

April 20, 2016

Security is hard. Over the last few months there have been a number of high-profile plugin security vulnerabilities, but there is surprisingly little familiarity in the developer community when it comes to properly evaluating and remedying issues when they are discovered.

In this talk, we’ll be explaining in basic terms how several types of vulnerabilities work (including Cross-Site Scripting (XSS), SQL Injection (SQLI), Cross-Site Request Forgeries (CSRF), and Clickjacking, see what can be done to defend against them, and what to do when you have a vulnerability reported to you.

Please Note: This is a development-oriented talk, but will not get too deep into code.

Presentation Slides »

Rate this:

Event

WordCamp Lancaster 2016 11

Speakers

George Stephanis 6

Tags

security 2

Language

English 4044

Download
MP4: Low, Med, High
OGG: Low
Subtitles
Subtitle this video →
Producer
%d bloggers like this: