I've recently been dealing with a really large .ics file (10.5 MB of data, 17,364 events spanning 10 years) and it seems to be able to choke just about anything that tries to work with it. It takes forever for Apple...
Read More
Our thinking
I’m harvesting credit card numbers and passwords from your site. Here’s how.
The following is a true story. Or maybe it’s just based on a true story. Perhaps it’s not true at all. https://hackernoon.com/im-harvesting-credit-card-numbers-and-passwords-from-your-site-here-s-how-9a8cb347c5b5 Basically $EVIL_HACKER issues a pull request against a large number of open source git repos of popular npm...
Read More
Read More
How the Meltdown and Spectre exploits work in layman’s terms
Thanks to Joe Fitz (Twitter: @securelyfitz) who has written a relatively easy to understand overview about how the recent #meltdown and #spectre bugs work in layman's terms: https://twitter.com/securelyfitz/status/949004862968143873 Let's say you go to a library that has a 'special collection'...
Read More
Read More