Intel Services and SmartBear Collaborate to Help Developers Make ‘Stuff That Works’

Mashery Ready! API Plugin - Learn More

Written by Harneet Singh, Product Management for Developer Tools at Intel Mashery Today, we are pleased to announce that Intel® Mashery™ I/O Docs is coming to SmartBear!  Available as a plugin, you can now import your Mashery I/O Docs definitions into Ready! API, enabling … [Read more...]

IT Security’s Perfect Storm is Brewing

© 2000 - Warner Bros. Entertainment, Inc.

30 foot waves crashing all around. Constant rain. Cold. Hope is lost. This is the scene in George Clooney's tragic film, the Perfect Storm, which climaxes in the vain efforts of a group of sailors trying to push through a raging hurricane to get a boatful of fish to port. As … [Read more...]

Avoid Pulling a Moonpig by Security Testing Your API

Now we know why Moonpig looks so nervous... he's a hacker's dream.

What do you do to ensure that your APIs are as secure as possible and still meet your release deadlines? A major UK-based online greeting card provider, Moonpig, has been found to contain numerous security flaws in their front-facing REST API. Developer Paul Price posted … [Read more...]

Hardening Your Application Against API Failures with API Virtualization

Candy Crush API Failure Error

True confession time:  I’m a Candy Crush Saga addict. There was a time when we all were, but it’s become less of an open conversation these days and those of us who still linger in the parking lot to play just one more game before going into the office… well, we don’t speak … [Read more...]

The Most Common API Security Hacks of 2014 [Infographic]

Most Common API Security Hacks of 2014

2014 was the year of the API security hack. Snapchat, Twitter, Tinder – these companies and more all experienced malicious API security attacks that compromised their users’ data, and as a result, their credibility. So we looked at the hard numbers this year to determine the … [Read more...]

When Your APIs Are Ready to Be Liberated, Are You Ready to Free Them?

IBM_Plugin_280x260

Almost every enterprise that I know takes a very cautious approach to this new API game. They build it, test it, try it, do a limited release, then fix the necessary areas, test it again, and finally, when they are satisfied they are ready, they get it out in the open. … [Read more...]

API Security Testing – How to Hack an API and Get Away with It (Part 3 of 3)

HackYourAPI9

  The first two installments in this series have set us well on our path to API security/intrusion nirvana; we first got to grips with current API technology basics, moved on to API Attack surface detection and then looked at a series of common and potent … [Read more...]

API Security Testing – How to Hack an API and Get Away with It (Part 2 of 3)

467236477

  In this 3-part blog series, I’ll provide deep dive instructions and specific examples on how you can avoid common security threats by hacking your own API. This second post covers the anatomy of some of the most common API security hacks. In our last post, we … [Read more...]

API Security Testing – How to Hack an API and Get Away with It (Part 1 of 3)

Hack Your Own API

In this 3-part blog series, I’ll provide deep dive instructions and specific examples on how you can avoid common security threats by hacking your own API. This first post will highlight 3 key aspects you will need to understand when hacking an API: API technologies, … [Read more...]

The API Copyright Debate Surfaces Again

technology-innovation

It all started back in May 2014, when a federal appeals court made a ruling that sparked outrage and controversy in the software industry. Their decision was theoretically a final step in the long-standing lawsuit between Google and Oracle, where Oracle claims that Android … [Read more...]