Mashups using the same API (1)
If it's your own system, it's okay, right? If you have been following APIs for a while, you know at the back of your mind that there must be an API to do almost anything in today’s world of interconnected systems. Once in a while though we do get hit by APIs that do something out of the normal. How about a cloud-powered API that tests your network vulnerability? Well, Thoughtcrime Labs, the developers behind CloudCracker have released their CloudCracker API to help you do just that.
Standardization, or lack thereof, around identity, authentication and authorization for open web APIs is one of the greatest challenges to mashup application developers today. So it's quite notable that Google not only just quietly added OAuth support to their Google Contacts API but also stated that "This is our first step towards OAuth enabling all Google Data APIs."
Elcomsoft has upgraded Phone Breaker; commercially sold software that has been implicated in API attacks that resulted in the exfiltration of personal info from iPhone users' iCloud accounts. With this recent upgrade, now it can extract secrets like IDs and passwords kept Apple's iCloud Keychain.
||The SAASPASS API allows developers to integrate two-factor authentication (2FA) into their websites and applications, eliminating the need for usernames and passwords. The API's methods allow...||Authentication||03.15.2018|
Symantec DeepSight Intelligence
||The DeepSight Intelligence API with a RESTful interface, provides cyber intelligence access sourced from the largest civiliian threat collection network. Content include both technical intelligence...||Intelligence||03.07.2018|
||The Dynu REST API gives access to manage hostnames, DNS records, domain registrations, and email service settings without having to access the web interface. OAuth2 is required to authenticate and...||Domains||03.07.2018|
||The SafeTrek API transforms applications and devices into life-saving tools the instant they are synced with a SafeTrek account. Once connected, devices can be used to trigger an alarm, and share...||Safety||03.02.2018|
WebCargo Email Check & Webform
||The WebCargo Email Check...||Validation||02.28.2018|