Syndicated Blog

Apeleg Blog
Recent content on Apeleg Blog
Visual representation of a CAPTCHA showing the word ‘pump’ with distortions

Privacy Pass: The Revolution in CAPTCHA Mitigation and User Privacy

The traditional approach to human verification, CAPTCHAs, is facing significant challenges due to evolving bot technology and user dissatisfaction. These mechanisms, although once effective, are now becoming both inadequate and inconvenient, compromising ...
Screen capture of a username and password slog-on prompt

Understanding Identity and Access Management (IAM)

Identity and Access Management (IAM) is a critical component of cybersecurity, especially in business environments. IAM, in simple terms, is a framework of policies, practices and procedures to ensure that the right ...

Opaque IDs: the ultimate protection against enumeration attacks

|
IDs in APIs and applications might be exploited to gain unauthorised access to other data or otherwise disclose information by means of various attacks, such as timing attacks and enumeration attacks. For ...
Screen capture showing a simple client-side rendered page

Progressively loading CSR pages

|
The principles of progressive enhancement can be applied to client-side rendered pages (or any pages with client-side scripts) to ensure that no matter the capabilities of users’ browsers, an appropriate baseline interactivity ...

Effectively mitigating CSRF

|
Cross-Site Request Forgery (CSRF) is an attack in which an external site makes a request to another site on behalf of a user without consent. This attack often relies on an existing ...

Apeleg join the W3C

|
Apeleg have become a W3C member. The World Wide Web Consortium (W3C) is one of the chief international standard organisations for the web. We plan on bringing our experience to the table ...
Screen capture with inspection tool showing an externally hosted image

Modern and robust hotlink protection in 2022

|
Hotlinking refers to the practice of third-party web properties loading resources directly from your server. Unauthorised hotlinks are generally undesirable, not only because they can facilitate reproducing your content without permission. Web ...
Components of a trusted platform

Types of Execution Environments, Attestation and SGX

|
Execution environments are the combination of hardware and software components that can be used to execute and support applications, typically comprising a processing unit, memory, input and output ports and an operating ...

Benchmarking in C (for x86 and x64)

|
Benchmarks are extremely useful to see how performant some code or operation is and a requirement for any empirical decision making. After all, how can we know with any certainty if some ...

Smidyo × Apeleg = Vector Express

Apeleg have partnered with Smidyo in a joint venture to provide Vector Express. Vector Express is a SaaS platform that addresses and simplifies many common tasks when working with vector files. It ...