Security News

Phone tracking service LocationSmart exposed API, allowing anyone to track you
2018-05-18 12:46

An unsecured API used in a product demo can be exploited by attackers to track phone locations without the consent of end users.

Tens of Thousands of Malicious Apps Using Facebook APIs
2018-05-01 14:53

The apps are deemed malicious by doing things such as capturing pictures and audio when the app is closed, or making an unusually large amount of network calls.

WebAuthn API helps businesses ditch passwords for biometric security
2018-04-11 12:39

The API, which has almost reached formal adoption, provides a vendor-neutral method for organizations to use password-less authentication.

No password? No worries! Two new standards aim to make logins an API experience
2018-04-11 05:30

WebAuthn and CTAP published this week A pair of authentication standards published this week have received endorsement from Mozilla, Microsoft and Google: the WebAuthn API, and the FIDO Alliance's...

Widespread API use heightens cybersecurity risks
2018-01-31 11:00

A new Imperva survey showed a heightened concern for cybersecurity risk related to API use. Specifically, 63 percent of respondents are most worried about DDoS threats, bot attacks, and...

Secure coding in Java: Bad online advice and confusing APIs
2017-10-03 15:15

For programmers and software developers, the Internet forums provide a great place to exchange knowledge and seek answers to concrete coding conundrums. Alas, they are not always the source of...

Using behavior analysis to solve API security problems
2017-09-12 14:00

When people think about complex security challenges, airport security might be the most familiar. The scope of challenges and implications of breaches are daunting. This is especially true when...

Attackers exploited Instagram API bug to access users’ contact info (Help Net Security)
2017-08-31 17:54

Instagram has confirmed that “one or more individuals obtained unlawful access to a number of high-profile Instagram users’ contact information — specifically email address and phone number — by...

Deprecated, Insecure Apple Authorization API Can Be Abused to Run Code at Root (Threatpost)
2017-08-24 14:32

An insecure Apple authorization API is used by numerous popular third-party application installers and can be abused by attackers ro run code as root.

Netflix Helps Identify APIs at Risk of Application DDoS Attacks (Security Week)
2017-08-01 16:41

Netflix has published tools and information to help defenders identify systems that could be leveraged by malicious actors for damaging application layer distributed denial-of-service (DDoS)...