Phishing is a social-engineering attack where the attacker entice his victims to give-up their credentials for a given website by impersonating it. Believe it or not phishing campaigns are well organized and follow a very strict playbook. This post aim at shedding some light on how phishing campaign works under the hood, showcase which infrastructure phishers use to steal users credentials and provide advice on how to defend against it.
To help Hearthstone players keep track of complex effect outcomes and improve their game play, I created a set cheat sheets. Each sheet cheat provided detailed statistics for a given card that trigger a complex effect such as the piloted shredder “summon a 2-mana cost minion.”
19.5% of HTTPS-enabled sites in Alexa's Top 1 Million trigger or will soon trigger a Chrome security warning because they are using the now deprecated SHA-1 signature algorithm to sign their HTTPS certificate. Soon those sites will be flagged by all major browsers as insecure.
I am a legend: Hacking Hearthstone with machine learning Defcon talk wrap-up: video and slides available but no tool. Here is why: The video and slides of our talk on how to use machine learning for Hearthstone are finally available for those who couldn’t come to Defcon. In our talk, Celine and I show how […]
Is it possible to reliably predict what your opponent will play during a hearthstone game? Turnout the answer is yes you can use machine learning to predict what is in your opponent deck based on what he played earlier in the game.
In this post, we will evaluate the mana cost of two cards with unique abilities: Edwin VanCleef and the Twilight drake. We will see that VanCleef is clearly an undervalued card whereas the Twilight drake have a fair price. This is the third post on my serie on how to price Hearthstone cards.
Here are the most undervalued hearthstone cards and how to find them using machine learning.
How to find the secret real value of Hearthstone cards using my pricing model
What’s the best icon to entice people to share something through their social networks? It turns out to be the one used on Android. While this may contradict guidelines proposed by some designers, this conclusion is based on the results of a survey of 7,500 users. I conducted the survey using Google Consumer Surveys this […]
Worries about big data and privacy are all over the news, but our new research shows that big data can also help better understand users' privacy concerns.
This is the story of how — and why — Google switched to numeric captchas. Captchas are these wiggly words used as a puzzle to tell humans apart from computers. Over the last few years, based on my work that began at Stanford, I’ve been working on designing a more user-friendly captcha for Google that […]
Half of Android users don’t bother to lock their phones, despite having the choice of using patterns, passwords, PINs, and even their faces to secure their devices. This contrasts starkly with a report from the Federal Communications Commission warning that up to 40 percent of robberies in major cities involve cell phones. More precisely, over 52 percent […]
Marketers agree: screen size is a top priority for anyone shopping for their next cell phone but my new consumer survey challenges this conventional wisdom.
Social tags are the HTML tags that social networks use to know what to display when one of their users shares your webpage. Because these tags determine how your page is presented in users’ social network feeds, optimizing those tags is an essential part of modern SEO. In this post we’ll look at Facebook and […]