FastSaying

This could have led to the stealing of identities, allowing a remote attacker to deceive innocent users into downloading malicious code or providing personal and confidential information.

Limor Elbaz

AllowingDeceiveDownloadingIdentitiesInnocentLedMaliciousRemoteStealingUsers

Related Quotes

We analyze major search engines and e-commerce sites for their weaknesses in an attempt to improve security.
— Limor Elbaz
CommerceSecurity
Three of the vulnerabilities can launch malicious code that allows an attacker to snoop on users. The other vulnerability is a DOS attack that will only work in a few cases and crash the media player when it tries to open a file.
— Thomas Kristensen
AllowsCodeLaunch
Chat is a conduit for distribution of malicious code. It's a way to distribute Trojans, and, in addition, users who don't know how to hide their IP address will reveal it during chat. On the Internet, chat is risky business.
— Chris Rouland
AdditionChatCode
We think that allowing users to navigate, conveniently, through our content database is not only an alternative way to find what viewers are looking for, but a fun way to discover new content.
— Jenifer Osterwalder
AllowingAlternativeContent
Multi-touch sensing was designed to allow nontechies to do masterful things while allowing power users to be even more virtuosic.
— Jefferson Han
AllowAllowingDesigned