Posts Tagged: vulnerabilities

world-war-api-understanding-the-enemy-nordic-apis

World War API: Understanding the Enemy

The virtual world stage is ever evolving, and unfortunately, the physical conflicts of yesterday are quickly becoming the digital conflicts of today. States, groups, and individuals are poised to wage digital warfare for a variety of political, economic, and social reasons. Read more

World-War-API-cyberattacks-on-the-international-scale

World War API: Cyberattacks on the International Scale

The world is changing. What was once fought on battlefields with physical weapons is quickly transitioning online, with groups of individuals and even entire nations utilizing the internet to disrupt their enemies.

Just as with any conflict, there will be civilian casualties — whether it be civilian infrastructure or users weaponized as Distributed Denial of Service drones, the consequences of the coming virtual conflicts will be bad. Read more

6-techniques-for-99.999-uptime-nordic-apis

6 Techniques for 99.999% Uptime

A system is only useful if it can be used. If a system can’t be accessed, it might as well not exist. As far as APIs are concerned, this principle of availability is referred to as uptime.

Uptime is the state of a server or service, and the reliability thereof. Read more

reverse-engineering-in-app-purchases-within-mobile-gaming-apis-nordic-apis-sandoval

Reverse Engineering In-App Purchases Within Mobile Gaming APIs

Hacking is an incredibly misunderstood term. The media has portrayed the practice at one of two extremes — either a hacker is a hooded, mysterious “anti-hero” fighting the big bad evil of corporatocracy, or a stereotypically capricious counter-culture hero shouting “hack the planet”. Read more

4-API-vulnerabilities-four-risks-to-mitigate-nordic-apis

Your API is Vulnerable if These 4 Risks Aren’t Mitigated

It’s an unfortunate reality that if a system faces the publicly-served internet, chances are it will be attacked at some point within its lifecycle. This is simply a matter of statistics — given the number of users utilizing APIs, the Internet of Things, and the dynamic World Wide Web, an attack is statistically more likely than unlikely. Read more