The following pages are tagged with
|Brute Force Attacks
|| Since all third-party applications are HTTP services that are publicly available on the internet, one should always be mindful of the possibility of brute-force attacks. While brute-force attacks are unlikely due to the "security through obscurity" obtained by running your application service on a non-standard HTTP port, they should not...
|Man In The Middle (MITM) Attacks
|| Because all communication between Vizydrop services and third-party applications is done via standard hypertext protocols, the same security considerations that you would expect for a publicly available web application are applicable to Vizydrop third-party applications. Because the default communication for the system is HTTP, developers should be mindful that all...