Mashups using the same API (2)
Have you noticed an increase in the number of reports about malware and compromised web servers? Recently, a computer exploit known as Gumblar has been making news for its ability to launch exploits via drive-by download. Gumblar silently installs itself on a computer if a user simply visits a compromised web site, where it proceeds to steal FTP logins and replace legitimate Google search results with redirects to sites of the attacker's choosing. Despite the threat of Gumblar and malware exploits like it, users of recent releases of the Firefox or Chrome browser have an extra layer of protection provided by their use of Google's Safe Browsing API.
Earlier this month, hacker Alexey V. Borodin discovered a method that allows some iOS app users to make "In-App Purchases" for FREE. Because Apple does not link purchases directly to individual customers or devices, a single receipt can be used for multiple transactions. Borodin's method takes advantage of this fact by fooling iOS apps into accepting fake purchase receipts and bypassing Apple’s authentication servers.
Moving to reunify Java in a way that will make it easier for developers to build applications spanning everything from the Internet of Things (IoT) to sophisticated backend Web applications running in the cloud, Oracle today released Java Platform, Standard Edition 8 and Java Platform, Micro Edition 8. The latest versions of Java 8 reduce the number of primary instances of Java down to two.
PicPurify Realtime Porn Image Detection
||Picpurify is an adult content moderation service based on deep learning technology. Over 1 million images were used to create an algorithm that identifies adult related content. The Realtime Porn...||Images||07.21.2016|
||The Proxicity API allows developers to get a new, verified proxy with every request. Proxicity provides verified, working proxy servers for all use cases. They use a custom proxy tester service to...||Security||07.05.2016|
||The Ansible API integrates automation features into IT applications, aiming to achieve security and compliance. JSON format is available to send requests and responses, along with secret access for...||Automation||06.27.2016|
||The HackerOne API integrates vulnerability tactics with the aim to increase the security of web services. It is available in JSON and REST formats with API token. HackerOne helps users find...||Hacking||06.27.2016|
||The Email Verifier API allows developers to integrate email data verification capabilities into 3rd-party applications. Email Verifier connects with email domains to verify the status of email...||06.25.2016|