acunetix_logo_blog_post_100x74

Featured Article

Acunetix WVS v9.5 build 20140902 detects Hibernate Query Injection, Format Strings and more

September 02, 2014 - 11:30am

Acunetix Web Vulnerability Scanner version 9.5 build 20140902 has been updated to include new vulnerability checks, including detection of Hibernate Query Injection, format strings vulnerabilities, MySQL username disclosure and others, including some, in well-known web applications. This new build also ... [+]


Protect Your Website During National Blog Posting Month

Protect Your Website During National Blog Posting Month

On November 1st, MarketWire and other sites across the Internet announced National Blog Posting Month (NaBloPoMo), an annual ritual for dedicated bloggers. Blogger Eden Kennedy launched NaBloPoMo in 2006; the event has grown to include thousands of bloggers, and it’s … [+]

Automate more with the new Acunetix WVS 8 build

Automate more with the new Acunetix WVS 8 build

The new Acunetix Web Vulnerability Scanner build number 20121106 includes a number of new features, new security checks, product improvements and as well bug fixes. To help web security experts automate their work, in this new build we included a … [+]

Directory Listing and Information Disclosure

Directory Listing and Information Disclosure

Directory listing is a web server function that displays a list of all the files when there is not an index file, such as index.php and default.asp in a specific website directory. … [+]

Website Vulnerabilities Will Cost You

Website Vulnerabilities Will Cost You

Note: This article refers to an older version of Acunetix. Click here to download the latest version. Even the best websites are vulnerable to hacking. Though web security continues to improve, hackers are constantly developing new ways to attack and … [+]

Keeping Your WordPress Blog Secure

Keeping Your WordPress Blog Secure

If you have a WordPress blog or website, you’ll want a regular chain of visitors. Whether you’re sharing your personal opinions on niche topics or you’re running a business, here are a few tips you can use to make sure … [+]

The Aftermath of an Online Attack

The Aftermath of an Online Attack

If you have a website, whether personal or business, that makes you a potential target for an online attack. After all, cyber crime is at an all time high as hackers can make a living from selling private or corporate … [+]

National Weather Service Hacked

National Weather Service Hacked

The National Weather Service has been hacked by the Kosova Hacker’s security group, leading to sensitive server information being leaked. The group managed to hack into the server using a Local File Inclusion (LFI) vulnerability in the weather.gov website. … [+]

What can Developers do to Better Protect PII?

What can Developers do to Better Protect PII?

A client of mine recently asked me if I had any Web development related tips for dealing with Personally Identifiable Information (PII). With this being an information security 101 type question, I had to think about it for a bit. … [+]

One Thing That Can Buy You More Web Security Than Just About Anything Else

One Thing That Can Buy You More Web Security Than Just About Anything Else

There is no magic bullet when it comes to web security. That said, there is one thing that can buy you more security than practically anything else. It’s your passwords. Your choice in – and management of – your web … [+]

Acunetix Web Vulnerability Scanner Version 8 build 20121003 released

Acunetix Web Vulnerability Scanner Version 8 build 20121003 released

The new Acunetix Web Vulnerability Scanner 8 build includes a new crawler feature to automatically ignore duplicate input schemes in the same directory. With this new crawler feature, scans will take less time to complete and less traffic is generated … [+]