Link Details

Link 962427 thumbnail
User 1064211 avatar

By lizzieb
via ctovision.com
Published: Apr 30 2013 / 08:14

HTML5 brings new opportunities – for developers and for attackers. Here you will see two examples of how an attacker could abuse HTML5 and how you as a developer could prevent this (or not).
  • 7
  • 0
  • 315
  • 552

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (7)



Voters Against This Link (0)



    Apache Hadoop
    Written by: Piotr Krewski
    Featured Refcardz: Top Refcardz:
    1. Play
    2. Akka
    3. Design Patterns
    4. OO JS
    5. Cont. Delivery
    1. Play
    2. Java Performance
    3. Akka
    4. REST
    5. Java