April 16, 2015
View all 1 Followers
View all 970 Related Articles
Related Articles (970)
We don't want to allow signups from VPNs or proxies. Visitors using a VPN or TOR, which hides their real location and identity, might be trying to perform malicious activity on your site. So how can we block these users? This article shows how the ipdata threat API can help you do this.
In an age where end users and developers alike are more conscious about IT security than ever, it’s little wonder that more focus is being put on finding more robust authentication methods than the simple password.
All companies have an obligation to protect user data as best as they can in accordance with their respective terms of services. When data is compromised, those companies should react quickly to fix it. Panera Bread offers a case study in the wrong way to respond to a vulnerability.