YouMail launched its Spam Risk API. YouMail uses algorithms to analyze a database of hundreds of millions of phone numbers to determine the likelihood a particular phone number is spam. Historical call patterns and crowdsourced data are combined to determine an OK, caution, or danger designation.
Recent Security ArticlesView all
Whether you're rolling your own soup to nuts API management solution, or your existing API management technology is missing some of the basics when it comes to API endpoint security, Cloudflare's recently released Traffic Control may have the right combination of features to fill in the gaps.
Ho-hum. Over 500 million user accounts at Yahoo! were breached. Who cares, right? You don't even have a Yahoo! account! It doesn't affect you. Right? Think again. If history tells us anything, the breach of the Yahoo! database means more attacks, perhaps against your systems, are on the way.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||The Infobip APIs allow for integration tools that aim to utilize Infobip products and services in a single place. Infobib has five different APIs; HTTP SMS API, Voice API, OMNI Channel API, Factor...||Messaging||11.09.2011|
All Security APIs (493)View all
||The OpenStack Freezer API operates as a systems backup solution. The RESTful API can be used to restore systems or applied in disaster recovery procedures. OpenStack, the API’s provider, manages bulk...||Storage||10.19.2016|
W3C Web Cryptography
Google Verified Access
||The Google Verified Access API authenticates the legitimacy of the users of network services and facilitates the monitoring of their adherence to policy guidelines. The Google Admin console hosts the...||Verification||10.14.2016|
W3C The Permissions
||The W3C The Permissions API is a document that specifies an API for handling permissions. It allows web applications to know whether a given permission has been granted or denied, or if a user will...||Application Development||10.14.2016|
MasterCard BIN Table Resource
||The MasterCard BIN Table Resource API can keep up-to-date MasterCard issuing account ranges that can be used for authorization, routing, and fraud prevention purposes. Incorporating the BIN Table...||Credit Cards||10.09.2016|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|