E-HAWK, cyber intelligence provider focused on combating fraudulent sign ups, has released the Vetting API Connector. The API automates the various vetting tools E-HAWK has deployed to analyze sign ups to determine the risk of fraud. The technology analyzes risk by vetting IP address, email, phone number, location, device and more. Based on risk levels, companies utilizing E-HAWK tools can set automatic responses to fraudulent activity.
The benefits of a well-designed, well-implemented, easily integated API are well known: happier developers, higher usage and, hopefully, greater profit as a result. While many high-level best practices for developing a great API have been established, a failure to pay close attention to small details, such as parameter defaults, can create big headaches.
There’s no shortage of controversy when it comes to healthcare these days, but from a developer perspective, the increased usage of electronic medical records (EMR) represents a potential boon. The challenge is that a lot of those records are locked up in proprietary systems that for the most part are fairly inaccessible.
Signifyd, ecommerce fraud prevention service, allows developers to integrate the service with third party ecommerce platforms through the Signifyd API. The Signifyd service uses a number of data points, and allows users to give greater importance to certain points depending on need, to develop a risk score and develop a fraud assessment. From social media activities, to bank data, Signifyd takes a holistic approach to fraud prevention.
It seems at every API conference, there is a new feature being released by the team at OAuth.io. In October, at API Strategy and Practice in San Francisco, OAuth.io released a mobile SDK. Now after APIDays in Paris, OAuth.io has released a ‘code request’ feature to abstract usage tokens in the authentication process. Co-Founder Mehdi Medjaoui spoke with ProgrammableWeb about the service that provides a unified API for any OAuth implementation.
With both delivery and management of security increasingly moving to the cloud, organizations of all sizes are presented with new approaches to security that use APIs to reduce the complexity of securing applications.
Multi-factor authentication platform provider LaunchKey has announced new API integrations for web and mobile applications. The LaunchKey platform improves privacy and security through decentralization of credentials from personal identification information. In addition to native apps, LaunchKey offers a central API, multiple SDKs and plugins that allow for cross-platform integration with mobile devices.
The explosive growth of social media, cloud computing and mobile devices is making Web APIs the primary interface for technology-driven products and services, and placing more and more attention on the emerging “API economy.” And with 50 percent of B2B collaboration predicted to take place through APIs by 2016, we are only seeing the tip of the iceberg.
In one of the opening sessions at today’s NordicAPIs, co-organizer of the event and CEO of Twobo Technologies, Travis Spencer, urged businesses to not only adopt an API strategy, but to reorient their businesses towards becoming an API platform. It is a bold assertion that previously has only been taken up by large players (US telco AT&T speak about reorienting as a platform for example), yet Spencer is saying that in order to succeed, all businesses will need to reorient – and the sooner the better.
A little more than one week has passed since Buffer’s infrastructure was successfully hacked, resulting in a flood of unauthorized posts to Twitter and Facebook. Shortly after ProgrammableWeb’s investigation of the hack revealed how more questions about the attack deserved to be answered, Buffer disclosed some of the answers on its blog. But more questions remained and Buffer’s CTO Sunil Sadasivan has come forward to answer them in this ProgrammableWeb exclusive Q&A.