SlideShare a Scribd company logo
WAFFLEJS
Shape Security
OCTOBER 2016
1.6 Billion

Leaked credentials in 2016 alone
2.1
"The security aspect of cyber is very, very tough."
This data gets sold
sold
tradedThis data gets
sold
traded
organizedThis data gets
sold
traded
organized
stored by criminals
forever
This data gets
Every breach adds a piece of you to a criminal's database.
Passwords, emails, names, security questions & answers, addresses, and more
1. Credentials get tested on other sites
2. Working credentials are traded or sold
3. Targeted fraud is performed with valid accounts
How does this data get used?
This isn't cost effective unless automated
BY EVIL
ROBOTS
Headless browsers like PhantomJS
Shape stops automated attacks in a
post-captcha world.
Captchas ruin UX and don't work!
Shape Security @ WaffleJS October 16
1.5B
Logins analyzed per week
350M
Protected user accounts
$1B
Fraud losses deflected in 2016
Now Hiring!
Web Platform Experts - http://bit.ly/shape-wpe
Help defend the web by doing ridiculous things with JavaScript and Browser APIs
UI Developers - http://bit.ly/shape-ui
Build out a real time analytics dashboard and customer portal with Angular, React, and D3
Backend Developers - http://bit.ly/shape-backend
Build the backend that ingests and powers the real time analytics for billions of transactions

More Related Content

PDF
The Life of Breached Data & The Dark Side of Security
PDF
The Dark Side of Security
PDF
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
PDF
Server-Side Second Factors: Approaches to Measuring User Authenticity
PPTX
2018 Hacked Website Trends
PPTX
Email attacks and shimming attack
PPT
Beyond The Norm: Building Secure Websites
PPTX
Tune in for the Ultimate WAF Torture Test: Bots Attack!
The Life of Breached Data & The Dark Side of Security
The Dark Side of Security
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Server-Side Second Factors: Approaches to Measuring User Authenticity
2018 Hacked Website Trends
Email attacks and shimming attack
Beyond The Norm: Building Secure Websites
Tune in for the Ultimate WAF Torture Test: Bots Attack!

What's hot (6)

PPTX
XSS (Cross Site Scripting)
PPT
Web Application Security - "In theory and practice"
PPTX
10 ways to protect your e commerce site from hacking & fraud
PDF
Web Browsers and Tracking Protections
PPTX
Why use private proxy presentation
PDF
Testing iOS apps without jailbreak in 2018
XSS (Cross Site Scripting)
Web Application Security - "In theory and practice"
10 ways to protect your e commerce site from hacking & fraud
Web Browsers and Tracking Protections
Why use private proxy presentation
Testing iOS apps without jailbreak in 2018
Ad

More from Jarrod Overson (19)

PDF
Practical WebAssembly with Apex, wasmRS, and nanobus
PDF
AppSecCali - How Credential Stuffing is Evolving
PDF
How Credential Stuffing is Evolving - PasswordsCon 2019
PDF
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
PDF
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
PDF
Deepfakes - How they work and what it means for the future
PDF
The State of Credential Stuffing and the Future of Account Takeovers.
PDF
How to Reverse Engineer Web Applications
PDF
The life of breached data and the attack lifecycle
PDF
Graphics Programming for Web Developers
PDF
JavaScript and the AST
PDF
ES2015 workflows
PDF
Maintainability SFJS Sept 4 2014
PDF
Idiot proofing your code
PDF
Riot on the web - Kenote @ QCon Sao Paulo 2014
PDF
Managing JavaScript Complexity in Teams - Fluent
PDF
Real World Web components
PDF
Managing JavaScript Complexity
PDF
Continuous Delivery for the Web Platform
Practical WebAssembly with Apex, wasmRS, and nanobus
AppSecCali - How Credential Stuffing is Evolving
How Credential Stuffing is Evolving - PasswordsCon 2019
JSconf JP - Analysis of an exploited npm package. Event-stream's role in a su...
Analysis of an OSS supply chain attack - How did 8 millions developers downlo...
Deepfakes - How they work and what it means for the future
The State of Credential Stuffing and the Future of Account Takeovers.
How to Reverse Engineer Web Applications
The life of breached data and the attack lifecycle
Graphics Programming for Web Developers
JavaScript and the AST
ES2015 workflows
Maintainability SFJS Sept 4 2014
Idiot proofing your code
Riot on the web - Kenote @ QCon Sao Paulo 2014
Managing JavaScript Complexity in Teams - Fluent
Real World Web components
Managing JavaScript Complexity
Continuous Delivery for the Web Platform
Ad

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Big Data Technologies - Introduction.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Spectroscopy.pptx food analysis technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
sap open course for s4hana steps from ECC to s4
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Programs and apps: productivity, graphics, security and other tools
Big Data Technologies - Introduction.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
20250228 LYD VKU AI Blended-Learning.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
The AUB Centre for AI in Media Proposal.docx
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Spectroscopy.pptx food analysis technology
Building Integrated photovoltaic BIPV_UPV.pdf
Understanding_Digital_Forensics_Presentation.pptx
sap open course for s4hana steps from ECC to s4

Shape Security @ WaffleJS October 16