The Latest News On The API Economy
Searching: No Search Term , Filtered By Category: "Security"
Ho-hum. Over 500 million user accounts at Yahoo! were breached. Who cares, right? You don't even have a Yahoo! account! It doesn't affect you. Right? Think again. If history tells us anything, the breach of the Yahoo! database means more attacks, perhaps against your systems, are on the way.
BeyondTrust announced a free API to call user credentials from BeyondTrust's PowerBroker Password Safe. API access to credentials eliminates the need for an individual user to enter username and password, and instead provides streamlined authentication directly within an integrated app.
High-Tech Bridge has announced a new release of its free SSL security testing service that companies and organizations can use to test their Web, email, VPN and other SSL/TLS-based services. The new release tests for known vulnerabilities in SSL/TLS implementations and in encryption protocols.
Box has introduced new security and governance APIs that organizations can use to incorporate content governance and compliance capabilities into applications and workflows. The new Box APIs includes a Retention Policy API, Legal Hold Policy API, Watermarking API, and Folder Metadata API.
HTTPS adoption among the world’s top half million sites doubled this year, achieving in one year what hadn’t been managed in 20 years’ since HTTPS’ introduction. Adoption went from 5.5% in August last year to 12.4% by the end of July, according to data from HTTP Archive.
Yelp spent two years developing a bug-bounty program with Hackerone, which led to over 100 resolved reports. Now, Yelp is taking the program to the broader public to engage a wider set of security researchers. The program offers bounties starting at $100 and can pay up to $15,000.
Bluetooth beacons offer a range of uses for sending radio signals over the air to connected smartphone applications. In this tutorial, developer Kuba Gretzky explains how he bypassed the beacons in restaurants to collect authorisation keys and earn himself free beer on a points-based app.
Pokémon GO has been hugely popular and generated millions of sessions around the world as people search for the digital creatures. But, it turns out that a fair chunk of recent API traffic has been coming from gaming bots that are making spatial queries to the API from outside of the game client.
Box APIs support everything from the way that Box and Office365 integrate seamlessly, to the 1,600 third-party applications in our app store. This API-first strategy has been incredibly successful, to the point where more than half of our monthly API calls come from third-party integrations.
Apple has announced that the company plans on launching its first-ever bug bounty program in September. The program will initially be invite only and the company will pay up to $200,000 USD to researchers who discover and report iOS and iCloud bugs and security vulnerabilities.
Dashlane and Google want to simplify security and authentication on Android devices and have an API to do it. App developers can use the new Open YOLO API to access the credentials stored in password managers to log users into apps and services. The idea here is to improve security.
Pokémon Go has become a runaway hit and many developers are showing their enthusiasm for the game by reverse engineering the private, internal Pokémon Go API and creating unofficial third-party apps. The current situation of the Pokémon Go API exemplifies mobile API security concerns.
The rise of fintech was more like an explosion – thousands of new apps suddenly sprung onto the market and fundamentally changed how we interact with our finances and the financial institutions we put in charge of them. While there’s never been a question about whether fintech requires
As Pokemon Go continues is rise in popularity, many developers have reverse engineered the game to publish unauthorized APIs. Niantic has now issued a cease and desist letter to a popular Pokemon Go API developer in an attempt to quash the unauthorized practice. Will threatened legal action work?
A new self-serve risk assessment tool is now available in private beta for API providers who want to test the security robustness around their API architecture and design. The new tool allows entering an API by a variety of means and then testing for common vulnerabilities. Solutions are suggested.
Security researcher Avicoder reported that he uncovered a vulnerability in Twitter's Docker installation housing its Vine source code. The researcher downloaded the entire Vine source code in one of the 80+ server images pulled. Twitter secured the install within 5 minutes, and paid compensation.
Security researchers have discovered a vulnerability in the Swagger ecosystem that could result in the exploitation of Web API endpoints when those endpoints or any SDKs designed to access them are generated from a Swagger-based API description. Malicious remote code execution is the main concern.
Fourteen APIs have been added to the ProgrammableWeb directory in categories including Security, Telephony, Content and Authentication. Featured today are several APIs for threat intelligence provided in the CrowdStrike Falcon Platform. Here's a rundown of the latest additions.
With thousands of Facebook developers pushing code at an average rate of three to four times a day, writing code that is “secure by default” is critical to avoid introducing security vulnerabilities. Although secure by default code is not a new idea, it’s something many developers and
Stampery launched two new services that further its goal to be the defacto notarization provider of the 21st century. A new API and improved certification service (Stamp.io) continue Stampery's use of blockchain technology to digitally verify documents and create secure records of existence.