Countering threats: Steps to take when developing APIs

4-6-11

High profile data breaches resulting from faulty APIs continue to make headlines. In the last few months alone, T-Mobile’s data breach resulted in hackers stealing personal data of more than two million customers while Google shutdown the consumer version of Google+, citing a bug that exposed the personal profiles of up to 500,000 users, with the API at fault used by up to 438 applications.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*