Introduction Public APIs are prone to attacks. One way is to impersonate the user and get access to the system resources via APIs. Lot of security methods are in use…
Monthly Archives
Introduction Public APIs are prone to attacks. One way is to impersonate the user and get access to the system resources via APIs. Lot of security methods are in use…