Securing the Spike: On the Transferabilty and Security of Spiking Neural Networks to Adversarial Examples