It was only a matter of time before the idea of a free VPN started to get traction. There's one from Opera for Opera users (that only works on browser traffic). Now, there's another from ProtonMail. How long will it be before Google offers one? And what database should you be spending time with?
Recent Security ArticlesView all
The week is coming to a close which means it’s time to bring you the news we couldn’t cover with a look at what what going on in the world of APIs. In time for the tenth anniversary of reCAPTCHA Google announced that they are bringing the spam protection service to Android.
TeleSign has greatly enhanced the iOS SDK for its App Verify service. The SDK allows app developers to handle verification completely in the background without multiple steps required for an onboarding user. By simply entering a phone number, the app exchanges with the phone for verification.
Most Popular Security APIs (10) View all
Box is a modern content management platform that transforms how organizations work and collaborate to achieve results faster.
Box Platform provides content APIs to build secure...
||The ThreatCrowd REST API allows developers to access and integrate the functionality of ThreatCrowd with other applications. Some example API methods include identifying related infrastructure and...||Security||10.12.2015|
Google Safe Browsing
||The Google Safe Browsing API allows developers to access and integrate the functionality of Google Safe Browsing with other applications. The Google Safe Browsing version 3 API allows applications to...||Security||06.29.2007|
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Mist.io displays real time analytics and visualizations of system metrics, and...||Web Site Management||10.10.2014|
||MEGA is a New Zealand based cloud storage service that helps users protect their privacy. With MEGA, users can control the encryption, users hold the keys, and users decide who to grant or deny...||Storage||01.24.2013|
All Security APIs (562)View all
||Find out which name servers are snitching on you. NSnitch provides a DNS server which records the IP address of requests made against it and then makes that IP available via JSON API. It also...||Tools||06.15.2017|
proxycheck proxy detection
||The proxycheck proxy detection API allows developers to submit an IPv4 or IPv6 address to determine whether it's acting as a proxy server or VPN server. All responses are given in JSON. Users...||Security||06.07.2017|
||Sqreen is a provider of in-app security and data protection solutions. The Sqreen API supports the detection of hidden security risks in data. The API screens emails and IP addresses to determine...||Security||05.28.2017|
||The RackConnect API is designed for Rackspace cloud accounts and Rackspace's hybrid connectivity solution connecting dedicated and cloud servers. Rackspace is a managed cloud company that...||Cloud||05.19.2017|
TeleSign Phone ID
||The PhoneID service is a REST API that provides a cleansed phone number, phone type, and telecom carrier information that can be used to determine which phone numbers are a potential fraud risk, and...||Messaging||05.17.2017|
Mashups (25)View all
||Mist.io aggregates a user's cloud servers to help them monitor status and activity with a single unified interface. Users can view analytics visualizations from Mist.io's web interface...||Web Site Management||10.10.2014|
||IronBox is a service that protects data and secures privacy. Their IronBox Express is a web app that secures a user's DropBox account, ensuring file protection for all folder contents. IronBox...||Security||08.25.2014|
Captcha Bypass Service
||An efficient Captcha Bypass Service.||Tools||02.26.2014|
MappyHealth - Tracking disease trends, 140 characters at a time
||MappyHealth.com was developed in response to the NowTrending2012 application challenge. The team came together with a common mission to build an application that would positively impact public health...||Health||06.14.2012|
||IceCharge is a fraud detection and prevention service that is built on top of a digital profiling algorithm. The service tries to identify legitimate transactions based on trying to check the...||Messaging||08.29.2011|