Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 536

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 537

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 539

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 554

Warning: "continue" targeting switch is equivalent to "break". Did you mean to use "continue 2"? in /home/public/wp-content/plugins/wordfence/models/block/wfBlock.php on line 557
Is your API leaking? Breaking APIs to increase security – kuemerle.com

Is your API leaking? Breaking APIs to increase security

Smartphone apps, single page web applications and most other applications are required to use various APIs in order to accomplish work. While this technology is wonderfully powerful, many developers are unaware of all the ways in which an improperly implemented API can cause data breaches and lead to expensive publicity disasters or compromise of internal systems. In this session we will dive into ways to investigate and compromise web based APIs in order to increase the security and stability of our applications.