With Article Data Extractor you will be able to scrape and retrieve all the relevant information from any article you find on the web. Forget about ads, banners and other unessential parts as well. Only receive all the data related to the article of your choice.
Article Data Extractor takes only 1 parameter — the URL of any article or blog. It scrapes and extracts any relevant information such as title, text, published time, media links, and many more. Save time and receive all this data structured so you can filter, query, and store all the information that the web has for you.
This API is perfect for any marketing agency or any news platform that wants to retrieve the most important information from an article. This is the author's name, the text from the article itself, and do not forget about TAGS. With this API all the tags embedded in the article will be available.
Also, this is great to compare what images are using other blogs or news forums in different articles.
So, if you have a large collection of articles, you will be able to filter by author's name, by tag elements, or even by published dates. This API will help you to have your articles better organized. }
Besides API call limitations per month:
Version 2.0 will allow you to parse any article of your choice.
Extract main article and metadata from a news entry or blog post.
Article Data Extractor - Endpoint Features
Object | Description |
---|---|
url |
[Required] The URL of the article. |
{"error":0,"message":"Article extraction success","data":{"url":"https://www.biometricupdate.com/202411/kyc-alone-is-not-enough-proof-reality-defender-on-threat-of-ai-driven-fraud","title":"‘KYC alone is not enough’: Proof, Reality Defender on threat of AI-driven fraud","description":"The general consensus from the panelists is that generative AI has evolved significantly, with real-time video deepfakes emerging as the next frontier.\nHe emphasizes the alarming scale of the problem, referencing Deloitte’s projection that generative AI fraud could become a $40 billion annual challenge by 2027.\nDeepfake technology has been used to impersonate CEOs in scams and misinformation campaigns, taking advantage of executives’ publicly available voice and image data.\nWhile these tools enhance creativity and efficiency, they also empower bad actors to scale social engineering attacks and financial fraud with minimal technical expertise.\nArticle Topicsbiometric liveness detection | biometrics | deepfake detection | deepfakes | digital identity | fraud prevention | generative AI | identity verification | KYC | Proof | Reality Defender...","links":["https://www.biometricupdate.com/202411/kyc-alone-is-not-enough-proof-reality-defender-on-threat-of-ai-driven-fraud"],"image":"https://d1sr9z1pdl3mb7.cloudfront.net/wp-content/uploads/2024/07/24005224/generative-ai-deepfake-fraud-scaled.jpg","content":"<div><p>The growing prevalence of generative AI has unlocked positive potential across a range of industries, but it has also amplified challenges, particularly around identity fraud and trust in digital transactions. In a webinar this week, industry leaders from Proof and Reality Defender discussed the shift in how AI-driven fraud is being carried out and the measures necessary to address emerging threats.</p>\n<p>Kelly Pidhirsky, VP solutions consulting at <a href=\"https://www.biometricupdate.com/companies/proof\">Proof</a>, highlighted the company’s journey from its roots as Notarize to becoming a platform centered on securing high-value digital interactions.</p>\n\t\t \n\t\t<p id=\"inarticle\">\n\t\t\t \n\t\t</p><p>“We started out as the first company to bring legal notarizations online, and since then we’ve really revolutionized the traditional paper-bound processes, and it’s all about setting a new standard for digital interactions,” Pidhirsky says. “Fast forward to today, and it’s so much more than just online notarizations, not that that’s not incredibly important, it’s still the foundation, but we’re all about now becoming this comprehensive, identity-centric platform.”</p>\n<p><a href=\"https://www.prove.com/solutions/prove-identity-network\">Proof’s identity authorization network</a> cryptographically binds verified real-world identities to digital documents, aiming to reduce fraud and ensure compliance. With a client base spanning over 7,000 organizations, including financial institutions, healthcare providers, and real estate firms, Proof has redefined trust in virtual environments.</p>\n<p>The general consensus from the panelists is that generative AI has evolved significantly, with real-time <a href=\"https://www.biometricupdate.com/202406/video-deepfake-fraud-threat-is-real-helplessness-is-not-id-rd-webinar\">video deepfakes</a> emerging as the next frontier. While previous limitations, such as errors in extreme facial angles or actions like touching one’s hair, were evident even six months ago, recent breakthroughs have overcome these barriers. This progress allows fraudsters to convincingly impersonate individuals in real time, a feat that requires sophisticated training and computational resources.</p>\n<p>“The rise of generative AI exacerbates identity trust issues,” Pidhirsky adds, pointing to the ease with which bad actors can exploit advanced tools to impersonate individuals and undermine KYC (Know Your Customer) protocols. “KYC alone is not enough,” she warns, <a href=\"https://www.fincen.gov/sites/default/files/shared/FTA_Identity_Final508.pdf\">citing an $81 billion annual loss</a> attributed to identity-related fraud.</p>\n<h2>Battling deepfake threats</h2>\n<p>Mason Allen, head of sales at <a href=\"https://www.biometricupdate.com/companies/reality-defender\">Reality Defender</a> addresses the increasing sophistication of deepfake technology, which has evolved from crude digital imitations to hyper-realistic manipulations capable of undermining enterprise and government systems. Reality Defender, a New York-based cybersecurity company, employs multi-model approaches to detect signals of synthetic media in real time, offering defenses against fraudulent activity. <a href=\"https://www.biometricupdate.com/202410/reality-defender-expands-series-a-to-33m-integrated-by-accenture\">Reaching $33 million</a> in an expansion of its series A funding round last month, the company’s AI detection models, trained on extensive datasets, enable real-time identification of deepfake forgeries during critical moments of user verification.</p>\n<p>“Deepfakes are the next iteration of a cat-and-mouse game akin to antivirus software,” Allen remarks, explaining how Reality Defender continuously adapts to emerging deepfake techniques. He emphasizes the alarming scale of the problem, referencing <a href=\"https://www.biometricupdate.com/202406/deloitte-predicts-losses-of-up-to-40b-from-generative-ai-powered-fraud\">Deloitte’s projection</a> that generative AI fraud could become a $40 billion annual challenge by 2027.</p>\n<p>In financial contexts, real-time video calls are often used for KYC processes and high-value transactions. However, fraudsters have begun exploiting these mechanisms. For example, a deepfake scam earlier this year involved impersonating a chief financial officer and two deputies on a live Zoom call, resulting in the theft of $25 million. Such incidents highlight the vulnerabilities of existing identity verification systems.</p>\n<p>The risks extend beyond financial crimes. Deepfake technology has been used to impersonate CEOs in scams and misinformation campaigns, taking advantage of executives’ publicly available voice and image data. Even high-profile figures, such as <a href=\"https://www.nbcnews.com/politics/congress/ben-cardin-targeted-apparent-deep-fake-call-dmytro-kuleba-rcna172776\">U.S. Senator Ben Cardin, have fallen victim to deepfakes</a>, with a recent incident involving a fabricated interaction with a purported Ukrainian official.</p>\n<p>Generative AI platforms like Runway and ChatGPT have progressed rapidly, making it increasingly difficult to distinguish between real and synthetic media. Allen illustrates this with examples of advancements in video generation technology, noting how deepfakes have evolved to the point of being indistinguishable from authentic content. While these tools enhance creativity and efficiency, they also empower bad actors to scale social engineering attacks and financial fraud with minimal technical expertise.</p>\n<h2>Call to action</h2>\n<p>The speakers shared a call to action: a reevaluation of digital identity verification systems to address vulnerabilities exposed by generative AI. Pidhirsky emphasizes the importance of verifying the “living, present person” behind documents, while Allen stressed the need for enterprises to adopt proactive measures in identifying and mitigating deepfake risks.</p>\n<p>“Generative AI isn’t just a future problem, it’s a present reality,” Pidhirsky warns. The webinar advocates for enhanced collaboration between technology providers and stakeholders to secure digital interactions against increasingly sophisticated threats.</p>\n<p><a href=\"https://www.biometricupdate.com/202410/entrust-proof-transunion-offer-platforms-insights-to-combat-financial-fraud\">Proof, Entrust and TransUnion</a> are also introducing tools to address fraud risks. For example, <a href=\"https://www.biometricupdate.com/companies/entrust-datacard\">Entrust</a> launched a cloud-based identity verification service that supports biometric checks, while <a href=\"https://www.biometricupdate.com/companies/transunion\">TransUnion</a> focuses on fraud insights derived from behavioral analytics. Additionally, Proof’s Verify deepfake defense aims to reduce the risk of fraudulent activities such as deepfakes by ensuring that users are legitimate.</p>\n<p>Proof’s Verify platform already serves over 7,000 organizations, including financial institutions, healthcare providers, small businesses, and government agencies.</p>\n<p>The experts also advocate for continuous monitoring and dynamic risk assessment as key strategies. Technologies that verify identity through video, voice, and behavioral patterns in real time can help thwart attacks while maintaining ease of use for genuine users.</p>\n<p>As deepfake technology becomes increasingly accessible, the potential for misuse will likely grow.</p>\n<p id=\"finished\"></p>\n\t\t\t\t \n\n\t\t\t\t\n\t\t\t\t<h2>Article Topics</h2>\n\t\t\t\t<p><a href=\"https://www.biometricupdate.com/tag/biometric-liveness-detection\" rel=\"tag\">biometric liveness detection</a>  |  <a href=\"https://www.biometricupdate.com/tag/biometrics\" rel=\"tag\">biometrics</a>  |  <a href=\"https://www.biometricupdate.com/tag/deepfake-detection\" rel=\"tag\">deepfake detection</a>  |  <a href=\"https://www.biometricupdate.com/tag/deepfakes\" rel=\"tag\">deepfakes</a>  |  <a href=\"https://www.biometricupdate.com/tag/digital-identity\" rel=\"tag\">digital identity</a>  |  <a href=\"https://www.biometricupdate.com/tag/fraud-prevention\" rel=\"tag\">fraud prevention</a>  |  <a href=\"https://www.biometricupdate.com/tag/generative-ai\" rel=\"tag\">generative AI</a>  |  <a href=\"https://www.biometricupd...
curl --location --request GET 'https://zylalabs.com/api/35/article+data+extractor+api/1880/article+data+extractor?url=https://www.thestartupfounder.com/use-this-data-extractor-api-to-get-article-data-from-mathrubhumi/' --header 'Authorization: Bearer YOUR_API_KEY'
Header | Description |
---|---|
Authorization
|
[Required] Should be Bearer access_key . See "Your API Access Key" above when you are subscribed. |
No long term commitments. One click upgrade/downgrade or cancellation. No questions asked.
The Article Data Extractor API is designed to extract relevant information from articles or blogs by providing the URL of the desired webpage. It scrapes and retrieves data such as the article's title, text, published time, media links, and more. The API aims to save time by delivering structured data that can be easily filtered, queried, and stored for further use.
The Article Data Extractor API can extract various types of information from articles or blogs. This includes the article's title, main text content, published time, media links (such as images or videos embedded within the article), and potentially other metadata associated with the article.
The accuracy of data extraction depends on factors such as the structure and quality of the webpage, as well as the consistency of its layout and formatting. The API employs scraping techniques to retrieve information, and its accuracy may vary based on these factors. However, it is designed to provide reliable and relevant data from the provided article or blog URL.
No, at the moment batch requests are not supported. You will have to make one API call per article that you want to extract the data from.
The extracted data from the articles or blogs is typically returned in a structured format, such as JSON. This makes it easier to work with the data programmatically, as you can access specific fields and properties. The API organizes the extracted information in a structured manner, allowing you to filter, query, and store the data as per your requirements.
Zyla API Hub is like a big store for APIs, where you can find thousands of them all in one place. We also offer dedicated support and real-time monitoring of all APIs. Once you sign up, you can pick and choose which APIs you want to use. Just remember, each API needs its own subscription. But if you subscribe to multiple ones, you'll use the same key for all of them, making things easier for you.
Prices are listed in USD (United States Dollar), EUR (Euro), CAD (Canadian Dollar), AUD (Australian Dollar), and GBP (British Pound). We accept all major debit and credit cards. Our payment system uses the latest security technology and is powered by Stripe, one of the world’s most reliable payment companies. If you have any trouble paying by card, just contact us at [email protected]
Additionally, if you already have an active subscription in any of these currencies (USD, EUR, CAD, AUD, GBP), that currency will remain for subsequent subscriptions. You can change the currency at any time as long as you don't have any active subscriptions.
The local currency shown on the pricing page is based on the country of your IP address and is provided for reference only. The actual prices are in USD (United States Dollar). When you make a payment, the charge will appear on your card statement in USD, even if you see the equivalent amount in your local currency on our website. This means you cannot pay directly with your local currency.
Occasionally, a bank may decline the charge due to its fraud protection settings. We suggest reaching out to your bank initially to check if they are blocking our charges. Also, you can access the Billing Portal and change the card associated to make the payment. If these does not work and you need further assistance, please contact our team at [email protected]
Prices are determined by a recurring monthly or yearly subscription, depending on the chosen plan.
API calls are deducted from your plan based on successful requests. Each plan comes with a specific number of calls that you can make per month. Only successful calls, indicated by a Status 200 response, will be counted against your total. This ensures that failed or incomplete requests do not impact your monthly quota.
Zyla API Hub works on a recurring monthly subscription system. Your billing cycle will start the day you purchase one of the paid plans, and it will renew the same day of the next month. So be aware to cancel your subscription beforehand if you want to avoid future charges.
To upgrade your current subscription plan, simply go to the pricing page of the API and select the plan you want to upgrade to. The upgrade will be instant, allowing you to immediately enjoy the features of the new plan. Please note that any remaining calls from your previous plan will not be carried over to the new plan, so be aware of this when upgrading. You will be charged the full amount of the new plan.
To check how many API calls you have left for the current month, look at the ‘X-Zyla-API-Calls-Monthly-Remaining’ header. For example, if your plan allows 1000 requests per month and you've used 100, this header will show 900.
To see the maximum number of API requests your plan allows, check the ‘X-Zyla-RateLimit-Limit’ header. For instance, if your plan includes 1000 requests per month, this header will display 1000.
The ‘X-Zyla-RateLimit-Reset’ header shows the number of seconds until your rate limit resets. This tells you when your request count will start fresh. For example, if it displays 3600, it means 3600 seconds are left until the limit resets.
Yes, you can cancel your plan anytime by going to your account and selecting the cancellation option on the Billing page. Please note that upgrades, downgrades, and cancellations take effect immediately. Additionally, upon cancellation, you will no longer have access to the service, even if you have remaining calls left in your quota.
You can contact us through our chat channel to receive immediate assistance. We are always online from 8 am to 5 pm (EST). If you reach us after that time, we will get back to you as soon as possible. Additionally, you can contact us via email at [email protected]
To let you experience our APIs without any commitment, we offer a 7-day free trial that allows you to make API calls at no cost during this period. Please note that you can only use this trial once, so make sure to use it with the API that interests you the most. Most of our APIs provide a free trial, but some may not support it.
After 7 days, you will be charged the full amount for the plan you were subscribed to during the trial. Therefore, it’s important to cancel before the trial period ends. Refund requests for forgetting to cancel on time are not accepted.
When you subscribe to an API trial, you can make only 25% of the calls allowed by that plan. For example, if the API plan offers 1000 calls, you can make only 250 during the trial. To access the full number of calls offered by the plan, you will need to subscribe to the full plan.
Service Level:
100%
Response Time:
1,217ms
Service Level:
100%
Response Time:
2,560ms
Service Level:
100%
Response Time:
1,500ms
Service Level:
100%
Response Time:
811ms
Service Level:
100%
Response Time:
413ms
Service Level:
100%
Response Time:
954ms
Service Level:
100%
Response Time:
551ms
Service Level:
100%
Response Time:
2,381ms
Service Level:
100%
Response Time:
474ms
Service Level:
100%
Response Time:
4,172ms
Service Level:
100%
Response Time:
544ms
Service Level:
100%
Response Time:
1,583ms
Service Level:
100%
Response Time:
10,779ms
Service Level:
100%
Response Time:
2,016ms
Service Level:
100%
Response Time:
6,185ms
Service Level:
100%
Response Time:
285ms
Service Level:
100%
Response Time:
523ms