A large percentage of web based attacks can be avoided with careful planning and implementation of the website's code. However, a large portion of attacks directly target the user's browser, where the protection imprinted into the server side architecture is many times not enough. This is the area where SessionBox helps you. A number of different attack methods base their attack vector on the fact, that users are already logged into other websites. Let's take an example. You are probably logged into Facebook. When you visit a site - let's call it example.com - this site runs many scripts inside your browser. Where you have active sessions for Facebook.com. This means that example.com can for example send requests to Facebook.com - where you are already authenticated - and make actions on your behalf. Moreover, example.com might be a trusted site, but they can also be attacked, and if they are not prepared against XSS attacks, a savvy hacker can inject their scrip...
Share your sessions Did you ever wish to pass over one of your accounts to a friend of yours? Or is your company using shared accounts for your daily activities? Well, there are some solutions, but all of those include sending over your password to the other party - sometimes client side code tries to hide this fact, but any savvy user can easily get around that. With our latest release (1.0.35) we have added a new feature, called Session sharing. With this brand new possibility we provide a new way of sharing your accounts, without sharing the password itself. Moreover, you can limit the timespan of the sharing itself, so if you just want to show something to your friends, you can give them access for an hour, then they won't be able to access your account again. How to start sharing? Open up the context menu for the session you wish to share. You can see a new item here, called "Share..." Select the domains you want to share. Browsing around on t...