FAQ: How Can I Backup My Acunetix WVS Settings?

After installing Acunetix WVS configuring it to best suit your requirements (scanning profiles, save directories, login sequences etc.), you might need to make changes to your workstation that might cause all these customizations to be lost – e.g. formatting your hard drive. It is highly recommended to backup your Acunetix settings and customizations to easily […]

Read More →

Application Security Calls For A Proactive Approach

Error! That’s something we don’t have much room for in application security. Yet we leave so much to chance. The only reasonable way to find the flaws that matter – and to keep up – is to use automated tools and processes wherever possible. Numerous information security studies show that application security is seriously lagging […]

Read More →

Understanding the value of the OWASP Top 10 2013

Find out how IT security professionals can benefit from the free resources available from the OWASP Top 10 2013 List of Risks. As IT security professionals we certainly have our fair share of information available to simplify the work we do. There’s the CVE dictionary, the Special Publications from NIST, and even certain regulations such […]

Read More →

Web Security Vulnerabilities Exposed by Google Searches (Google Hacking)

Google Hacking is a hacking technique used by hackers to identify web security vulnerabilities on web applications or gather information for general or individual targets. Mostly this information includes configuration and source code files, sensitive data, database information, etc. This technique makes use of the Google Search engine to search for specific information regarding an […]

Read More →