Tips to harden your Nginx configuration; part 2

This is the second part in the series on Nginx server security. This article follows on from Part 1 with more tips on hardening your Nginx configuration. 5. Make use of ModSecurity ModSecurity is an open-source module that works as a web application firewall. Different functionalities include filtering, server identity masking, and null byte attack prevention. Real-time […]

Read More →

Are you prepared for PCI v3.0?

At the end of December 2014 the new set of Payment Card Industry Data Security Standards (PCI DSS) will come largely into force, with just a few small elements having the later deadline of July 2015 to allow businesses time to adapt. If your company or organisation processes card transactions, either directly or through a […]

Read More →

Delegate tasks, limit access and stay in control with Acunetix OVS Multi-User Access

A new feature to the online version of Acunetix – Acunetix Online Vulnerability Scanner (OVS) now allows the owner of an account to create child users, delegating vulnerability scanning and reporting tasks to other users and at the same time auditing their actions. This increased flexibility has been introduced following feedback from current users, who […]

Read More →

8 tips to secure your IIS installation

You have just finished installing IIS on your Windows OS. You’re probably thinking that you can delve into the web development world and forget all about the underlying web server. After all, IIS is a Microsoft product so it should install with the right default configuration settings, right? That is far from true with IIS. […]

Read More →

How to scan an HTTP password protected area

There are 2 types of password protected areas: HTTP Password protected areas: These are generally managed by the web server, and the user is prompted with a password dialog. Form-based restricted areas: This type of authentication is handled by the web application. The credentials are requested using a web form. This article explains how to […]

Read More →

Analysing the latest trends in web application attacks

A recent study by a leading web application security vendor has highlighted some interesting statistics about web application attacks. Some of the findings examined below should enable web security practitioners to better anticipate, identify and act against cyber threats. Threat Growth One of the unsurprising news items is that web application attacks have increased in […]

Read More →