I've been programming since the age of 12 when my parents bought me an Amiga 500 with "The Works" software bundle that included AMOS Basic and some other stuff. That was in 1993 or so. Since then I ha ...
Continue ReadingSeptember 25, 2021
Broken Authentication Processes Even if you have a strong authentication system, it can be broken by an attacker who knows how to bypass or manipulate the process. For example, an attacker could use ...
Continue ReadingSeptember 25, 2021
Something like: type family Foo (x :: * -> *) :: * where Foo Int = Bool Foo Char = String foo1 :: forall x . Foo x => x -> Bool foo1 i = case cast i of { Int -> True ; _ -> False } -- ...
Continue ReadingSeptember 25, 2021
In this post, I'll talk about how AOSP is structured, what it takes to build an operating system from scratch, and why we do it all in the open. What is AOSP? The Android Open Source Project (AOSP) ...
Continue ReadingSeptember 25, 2021
The good news is that a number of API security testing tools are available to help organizations get a handle on their API usage, as well as the risks associated with them. These include: 1. Veracode ...
Continue ReadingSeptember 25, 2021
Heres how to protect them from attack. the problem of APIs being used by third-party developers, who may not have the same security standards as the company that created them in the first place. In ...
Continue ReadingSeptember 25, 2021
tl;dr: The problem with APIs is that they are too flexible and can be used for almost anything. The good news is that there are a number of tools available to help organizations identify, track, mana ...
Continue ReadingSeptember 25, 2021
It emerged from stealth today with $20.7 million in Series A funding from True Ventures, New Era Capital Partners, TLV, and SixThirty. APIs have become a hot target for attackers as organizations rap ...
Continue ReadingSeptember 25, 2021
Back to Main