Google Docs Phishing Scam a Game Changer

Experts expect copycats that take advantage of passive authentication from third-party applications using standards such as OAuth.