Tagged articles
3 articles
Page 1 of 1
Architect
Architect
Apr 30, 2023 · Information Security

Common API Vulnerabilities and How to Detect Them

This article explains the most frequent API security weaknesses—including information disclosure, broken object‑level and function‑level authorization, authentication bypass, over‑exposure of data, missing rate limits, mass‑assignment, misconfiguration, injection, asset mismanagement, and business‑logic flaws—providing detection techniques and illustrative code examples.

Authenticationinformation disclosureinjection
0 likes · 17 min read
Common API Vulnerabilities and How to Detect Them
Huolala Tech
Huolala Tech
Jun 25, 2021 · Artificial Intelligence

How Optimizing Information Disclosure Boosts Efficiency in Mobility‑On‑Demand Platforms

An in‑depth review of the award‑winning KDD paper reveals how a novel information‑disclosure framework, built on multinormal logit modeling and edge‑cutting optimization, dramatically improves driver, user, and platform efficiency in mobility‑on‑demand logistics systems.

AI modelingLogistics Optimizationinformation disclosure
0 likes · 9 min read
How Optimizing Information Disclosure Boosts Efficiency in Mobility‑On‑Demand Platforms
MaGe Linux Operations
MaGe Linux Operations
Oct 1, 2014 · Information Security

How to Remove Sensitive Response Headers in IIS to Harden Web Security

This guide explains why response headers like Server, X-Powered-By, and ASP.NET version fields expose critical information, and provides step‑by‑step instructions for disabling or deleting these headers in IIS using UrlScan, IIS Manager, web.config, and Global.asax modifications.

IISbanner grabbinginformation disclosure
0 likes · 5 min read
How to Remove Sensitive Response Headers in IIS to Harden Web Security