Hacking Proprietary iCalendar Properties by Eugene Lim #57, Hacking TechniquesYou are unauthorized to view this page.
Source code review – catching low-hanging fruit #56, Source codeYou are unauthorized to view this page.
Account takeover case study + checklist that will help you find them #55, Case StudiesYou are unauthorized to view this page.
Little-known technique to exploit self-XSS with a serious impact #54, Client-side hacking techniquesYou are unauthorized to view this page.