Can I configure Acunetix WVS to crawl a website in a pre-defined way?

While scanning certain web applications, you might need to configure Acunetix WVS to crawl a web page — such as a shopping cart — in a predefined way.  To do so, you need to record a login sequence using the … [+]

How can I integrate Acunetix WVS with another third party application?

Acunetix WVS offer command-line support, which provides similar functionality and is an easy way to integrate Acunetix WVS with other third party applications. If you wish to run the Acunetix WVS console application then you can run ‘wvs_console.exe’ from the … [+]

Why isn't my website's web technology listed in the scan wizard?

Why isn't my website's web technology listed in the scan wizard?

Acunetix WVS is designed to perform a web security scan by using a web application as an exploitable front-end, through which it can make contact with a web server. This approach ensures that WVS does not rely on specific compatible … [+]

VIDEO: Acunetix Web Vulnerability Scanner 8 - What's New?

VIDEO: Acunetix Web Vulnerability Scanner 8 – What’s New?

This brief presentation highlights the new exciting features of Acunetix Web Vulnerability Scanner Version 8. We look forward to your comments. … [+]

FAQ: Where are Acunetix WVS files stored?

Acunetix Web Vulnerability Scanner 8 stores application settings, scan results and configuration information in different  files and directories. These are divided in three categories: Data directory, Application directory, and Scheduler Saves directory. You can browse to them from the main … [+]

Acunetix Web Vulnerability Scanner 8 BETA Available Now

Acunetix Web Vulnerability Scanner 8 BETA Available Now

Note: This is no longer available. Click here to download a 14-day free trial of the latest version of Acunetix.  The next stage in the evolution of Acunetix Web Vulnerability Scanner has arrived — WVS 8 BETA! Many of you … [+]

Acunetix Reseller Jacadis to Sponsor ISACA Security Conference

Acunetix Reseller Jacadis to Sponsor ISACA Security Conference

On the 5th of December 2011, the Pittsburgh chapter of ISACA will be hosting a one-day “Information Technology Audit & Control” Conference; with Acunetix reseller Jacadis — specialists in network and web security — as one of the gold corporate sponsors for … [+]

Don't Forget Your Marketing Website Security

Don't Forget Your Marketing Website Security

I recently read about a marketing agency that experienced a security breach and subsequent defacement of its customers’ websites. Apparently their developers had misconfigured the web server and unknowingly gave the whole world access to change any and all content … [+]

Why people violate security policies

Why people violate security policies

Many organizations have a formal set of information security policies covering everything from acceptable internet usage to security in software development to web application security. In fact, it’s hard to come across a business today that doesn’t have at least … [+]