Developers commonly generate unique API keys for clients. But how long does an API key need to be to make the chances of a collision smaller than the chance that your computer might be struck by lightning? Fewer than you’d think, argues Sam Corcos, co-founder of SightMaps over at LearnPhoenix.io.
Recent Security ArticlesView all
The Node.js Foundation, a community-led consortium to advance the development of Node.js, today announced that the Node.js Security Project will become a part of the Node.js Foundation. The Node.js Security Project will provide a process for discovering and disclosing security vulnerabilities.
Mastercard, a company that once warned that the risks of digital currency outweigh the benefits, has released two new blockchain APIs to promote collaboration and innovation in the digital exchange of value. Through its Mastercard Labs arm, Mastercard has indicated the API release is just the start.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||The Infobip APIs allow for integration tools that aim to utilize Infobip products and services in a single place. Infobib has five different APIs; HTTP SMS API, Voice API, OMNI Channel API, Factor...||Messaging||11.09.2011|
All Security APIs (505)View all
Salesforce.com Shield Platform Encryption
||The Salesforce.com Shield Platform Encryption API is a secure portal for using HTTP verbs to create, upload, import, retrieve, export, and manipulate Salesforce-hosted tenant secrets. The API is...||Enterprise||11.25.2016|
AMEX Enhanced Authorization
||This API has anti-fraud capability that allows merchants to submit additional data with an authorization request. Risk-decisioning helps to decrease fraud, improve approval rates, and reduce the...||Security||11.11.2016|
||The Fireeye API integrates cybersecurity into applications, providing HTTP requests and JSON and XML formats. Endpoints include threats, targets, and vulnerability. Use the API to analyze risk, plan...||Security||11.11.2016|
||The CardConnect API integrates payments into transactional web services. It is available in REST architecture with HTTP verbs, CURD functions, and JSON responses. In addition, it provides endpoints...||Credit Cards||11.11.2016|
||GrantedBy.Me offers an additional layer of security which features fingerprint scanning, face recognition, and gestures. This platform replaces traditional username/password authentication with a...||Authentication||11.02.2016|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|