Ropemaker Allows Attackers to Change Content of an Email–After It's Delivered
(infosecurity-magazine.com)
August 2017 Archive
16741.
16742.
Millennials are killing these industries
(businessinsider.com)
16743.
Apple HI Guidelines (1992) [pdf]
(interface.free.fr)
16744.
16746.
99.99 + 0.02 = 100.00999999999999
(ideone.com)
16747.
Show HN: First Employees
(firstemployees.io)
16748.
16749.
React Native: A developer's perspective
(medium.com)
16751.
Structure and Interpretation of Classical Mechanics
(mitpress.mit.edu)
16752.
16753.
How Cloud-Native Security Can Prevent Modern Attacks
(twistlock.com)
16754.
US Gov originated iPhone tech
(businessinsider.com)
16755.
Codeine and cough: an ineffective gold standard
(ncbi.nlm.nih.gov)
16758.
16759.
Nymph: A C like Programming Language
(github.com)
16760.
Show HN: Paperless communication system for condo, HOA and commercial properties
(condonewsmanager.com)
16761.
16762.
16765.
Spear Phishing – It Can Happen to Anyone
(sentinelips.com)
16766.
16767.
Quantopian Phases Out (Live Trading) Broker Integrations
(quantopian.com)
16768.
A cloud-based content gathering network
(usenix.org)
16769.
How to Stay Safe Trading on Cryptocurrency Exchanges
(cryptocoinstockexchange.com)
16770.
Audi Uncorks a VIN mystery
(global.handelsblatt.com)