1Exploiting authorization by nonce in WordPress plugins (opens in new tab)(nowotarski.info)73nelse1y ago41
3Security Implications of Golang Net/Textproto.Reader Misuse (opens in new tab)(nowotarski.info)1nelse2y ago0
6Facebook Engineering: Under the Hood: Building posts search (opens in new tab)(facebook.com)3nelse12y ago0
7Today we’re opening up Foursquare Ads to all small businesses around the world. (opens in new tab)(blog.foursquare.com)5nelse12y ago1
8Move.js Control your device with your body movement (opens in new tab)(skycocker.github.io)1nelse12y ago0
9Man-in-the-middle attack on Mobile Facebook possible due to lack of HSTS header (opens in new tab)(gist.github.com)39nelse12y ago7
12Understanding Common Factor Attacks: An RSA-Cracking Puzzle (opens in new tab)(loyalty.org)6nelse12y ago0
14Increased rewards for Google’s Web Vulnerability Reward Program (opens in new tab)(googleonlinesecurity.blogspot.com)3nelse12y ago0
15Introducing Free Social Media Marketing Promotions with API Access (opens in new tab)(hellosocial.com)1nelse12y ago0