• Latest
  • Trending
Why Should You Keep Your API Key Secure?

Why Should You Keep Your API Key Secure?

July 12, 2022
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Tuesday, 28 March, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Why Should You Keep Your API Key Secure?

by ITECHNEWS
July 12, 2022
in Leading Stories, Opinion
0 0
0
Why Should You Keep Your API Key Secure?

Attacks against APIs are increasing and API key protection is central to miminizing your business risks. In this article we’ll look at what your exposures are and what you should do about it.

API Attacks Are On The Rise

Stolen or accidentally exposed API keys and secrets can easily be exploited by threat actors and used to access sensitive information, impersonate your mobile app or make API calls on its behalf. With Salt Security reporting a 681% increase in API attacks during 2021 and Corsha estimating that poor API security will cost organisations up to $75B per year, this is a growing problem with significant financial risks for mobile businesses.

YOU MAY ALSO LIKE

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Data Leak Hits Thousands of NHS Workers

Exposed API keys can be used both to exploit vulnerabilities or bugs in the coding of the API itself and through API abuse (where the API is accessed or used in a way that was not intended). Example attacks include account takeover, automated account creation, data scraping or DDoS attacks.

A recent security review by BeVigil found that many apps using the RazorPay API payment gateway were exposing API keys. This was down to poor coding practice and a lack of security awareness by the app developers rather than a flaw in the RazorPay API.

While code hardening and obfuscation techniques can add an additional layer of protection against the theft of API keys, readily available tools, such as mobSF, enable attackers to take published apps, download and reverse engineer them to extract the API keys and secrets for malicious purposes.

A MitM attack can be carried out using tools like mitmproxy and Charles Proxy to intercept the API traffic between your mobile app and the backend server and steal API keys or other secrets.

The thing to recognise is that if an API key becomes available to a bad actor then all the protection you have built into your mobile app will be useless as the attacker will use a script to bypass your app and trick the server into thinking it is communicating with a genuine instance of your mobile app.

Protecting against this attack vector requires your APIs to be shielded and you can read more about this in a more detailed four part series which starts here.

The Risks For Your Business

Mobile apps with APIs that access fintech or healthcare records are particularly at risk from transaction skimming, exposure of sensitive user information or unauthorised access to customer accounts or patient records. Research by Alissa Knight found security issues with many healthcare apps and APIs that use the FHIR standard. Many of the mobile healthcare apps tested had hardcoded API keys and tokens which could be used to access EHR APIs. With confidential patient data at risk, the financial and reputational costs for mobile healthcare companies can be significant.

Run-time protection is needed to protect the mobile app and its environment from tampering at the same time as ensuring that your APIs are properly shielded. Using a service such as Approov Mobile App Protection allows you to verify your app’s authenticity and integrity at run-time, ensuring that API keys cannot be misused at scale and that only the official version of your mobile app operating in an untampered environment can access your back-end API. Bots, scripts, fake and tampered apps are all blocked at source.

Source: Shona Hossell
Via: Security Boulevard
Tags: Why Should You Keep Your API Key Secure?
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023

Recent News

  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • EU Cybersecurity Agency Warns Against Chinese APTs February 20, 2023
  • How Your Storage System Will Still Be Viable in 5 Years’ Time? February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version