A researcher has found a vulnerability in the latest version of reCAPTCHA that could let spambots bypass reCAPTCHA fields across millions of sites. The developer has a script that uses Google’s speech recognition API to solve audio challenges associated with the latest version of reCAPTCHA.
Recent Security ArticlesView all
Tesla's backbone API suffered a 20 hour outage earlier this week that left the company's keyless driving feature and mobile app monitoring unavailable. While the outage represented more of an inconvenience than a devastation, the vulnerability highlighted the dangers of an API-driven auto market.
CORS is a security mechanism that allows a Web page from one domain to access a resource from a different origin. This article provides an in-depth guide to Cross-Origin Resource Sharing (CORS) for REST APIs, on how CORS works, and common pitfalls especially around security.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||The Infobip APIs allow for integration tools that aim to utilize Infobip products and services in a single place. Infobib has five different APIs; HTTP SMS API, Voice API, OMNI Channel API, Factor...||Messaging||11.09.2011|
All Security APIs (537)View all
||The PasswordPing Exposures REST API allows developers to access and integrate the passwords functionalities of PasswordPing with other applications. The main API method is retrieving passwords to see...||Passwords||03.05.2017|
PasswordPing Exposures Alerts Service
||The PasswordPing Exposures Alerts Service REST API allows developers to access and integrate the exposures alerts functionalities of PasswordPing with other applications. Some example API methods...||Passwords||03.05.2017|
||The PasswordPing Exposures REST API allows developers to access and integrate the exposures functionalities of PasswordPing with other applications. Some example API methods include retrieving...||Passwords||03.05.2017|
||The VirusTotal Private REST API exposes the information generated by its scanners to developers for integration and third-party access. The private API is part of account service and the limits and...||Security||03.05.2017|
||Density operates as a people counter platform. The Density API supports the counting, recording, and monitoring of people traffic in particular locations in public or private domains. This includes...||Internet of Things||02.28.2017|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|