Where in the web API ecosystem are providers open to attack? An API may be vulnerable to attack for a number of reasons. Learn how to super proof your API to avoid DDOS attacks, spoofing, SQL injection, reverse-engineering, and other methods. Arm yourself with information on who is behind cyber warfare, and how you can prevent embarrassing exploits.

Related articles

How to Safely Throttle High Traffic APIs

Too much traffic can be a dangerous thing. To many application developers, this seems like a good problem to have – traffic is exactly what you want for your service, so accordingly, the the better. The simple truth is, however, that too much of a good thing can be very dangerous – and in…

Read More

Don’t Let API Changes Hit You Like A Freight Train!

Most web applications, and many mobile applications, rely on 3rd party APIs like social login, cloud storage, e, messaging, CRM etc. The benefits are obvious, and for some applications the API integration is a core element. However, the API dependency does make applications vulnerable to change — one small change to an API can…

Read More

Review of Approov for Mobile API Security

Unfortunately, the reality of mobile apps is that at some point, someone is going to try to do something they’re not allowed to. Whether this is through brute-forcing keys, spoofing identities, or simply issuing distributed attacks across the application’s server dependencies, the threat to public-facing APIs in the mobile space is real, dangerous, and often…

Read More

How Pokémon Go Fans Hacked ‘Em All: And How to Prevent Similar Reverse-Engineering

Every developer hopes for huge user bases populated by large amounts of monthly users. People using an application to its potential in the thousands, if not hundreds of thousands, is a dream come true. Unfortunately for API services, with a greater deal of exposure comes a marked increase in vulnerability. Key to this topic is…

Read More

World War API: Understanding the Enemy

The virtual world stage is ever evolving, and unfortunately, the physical conflicts of yesterday are quickly becoming the digital conflicts of today. States, groups, and individuals are poised to wage digital warfare for a variety of political, economic, and social reasons. And, as with any conflict, civilian data — and civilian architecture — are prone…

Read More

World War API: Cyberattacks on the International Scale

The world is changing. What was once fought on battlefields with physical weapons is quickly transitioning on, with groups of individuals and even entire nations utilizing the internet to disrupt their enemies. Just as with any conflict, there will be civilian casualties — whether it be civilian infrastructure or users weaponized as Distributed Denial of…

Read More