How to Configure Acunetix WVS to Successfully Crawl WIVET

How to Configure Acunetix WVS to Successfully Crawl WIVET

WIVET stands for Web Input Extractor Teaser, and is a web application that is designed to test the crawling capabilities of web application scanners. WIVET has been used in web application scanner reviews, such as the reputable review from Shay … [+]


ShellShock’s magnitude for potential damage – truly shocking!

48 hours since the latest in the series of BIG BUGS 2014 has made the news, and the Internet community is still struggling to assess the damage. After the initial moments of disbelief, researchers started coming to terms with the … [+]

CVE-2014-6271: Bash code injection vulnerability

BASH Vulnerability leaves IT Experts Shell Shocked!

Yesterday, a critical vulnerability was reported in GNU Bash.  Bash is the Bourne Again Shell that is installed on all Linux distributions.   The vulnerability is related to the way environment variables are parsed before running the BASH shell. It is possible to … [+]


Preventing NTP Reflection DDOS Attacks Based on CVE-2013-5211

NTP is the standard protocol for time synchronization in the IT industry and is widely used by servers, mobile devices, endpoints and network devices, irrespective of their vendor. Latest definition of NTP is at version 4, described in RFC 5905. … [+]


Statistics about the leaked Gmail, Yandex, passwords

Around 10 million email addresses and passwords were recently leaked on a Russian Bitcoin forum. Many websites report about 5 million Gmail accounts the leak includes also accounts from 2 popular russian mail providers (Yandex and The leak contains … [+]


WordPress 4.0 “Benny” released

The long awaited WordPress version 4.0, codenamed “Benny” in honour of jazz clarinettist and band leader Benny Goodman has been released.  While this does seem like a major release to some of us, since it includes a good amount of … [+]


List of checks done by Acunetix on WordPress

An Acunetix web vulnerability scan is able to detect a WordPress installation, and will execute various WordPress related checks when the popular blogging web application is identified. When WordPress is detected, Acunetix will issue the following knowledge base entry. Acunetix … [+]


Balancing Web Security with your Compliance Requirements

As an executive responsible for many aspects of running your business, it can be difficult and downright confusing trying to understand the balance between Web security and compliance. Your IT, information security, and internal audit teams may be telling you … [+]

RATs vs Worms

Danger: Open Ports – Remote Access Trojans (RATs) vs Worms

Having a good antivirus solution gives a warm, fuzzy feeling of safety: you know that your assets are virus free and that your network is secure. However, most antivirus solutions cannot detect Remote Administration Tools (aka Remote Access Trojans  or … [+]

Help Net Security

How important is website security?

In an interview on Help Net Security, Acunetix’ Product Manager Nicholas Sciberras, illustrates why website security should be a priority in any organization. He talks about the challenges involved in auditing website security, illustrates the pros and cons of using remote … [+]