The mainstream media is in a frenzy about the Ashley Madison hack, and with good reason. Aside from the shady social and moral motives that most people are criticising Avid Life Media (the site’s owners) about, the breach is a notable one in terms of what the attackers made off with. Among the stolen data […]
Acunetix General Manager, Chris Martin was interviewed by Len Rust for the popular Australasian ICT news platform – Rust Report during Cebit in Sydney Australia 2015. In his interview, Mr. Martin gives a brief overview of the company, describes what sets Acunetix apart from its competitors, and talks about the company’s greatest challenges and opportunities.
Join network security industry leaders at America’s Center Convention Complex for St. Louis SecureWorld 2015 to be held on September 22nd and 23rd. Alliance Technology Partners and Acunetix will be exhibiting at Booth 305. Find out more on keynotes and speakers and register for conference discounts today!
Adultery site data hits the web with serious consequences The Ashley Madison hack continues to grab headlines, with a reported 39GB of data having now been dumped online. What also emerged from the leaked data is that around 90% of users were in fact male. Some minor celebrities have had fingers pointed and there have […]
The WordPress team have just announced that the 4.3 release of the massively popular blogging and content management software has been released to the public. While there are some interesting new usability features, the WordPress team have also released a new security feature that deals with the way passwords are reset. The new and improved […]
Oracle publish then delete blog whining about bug finders We’re well in the age of the ‘bug bounty’, where companies have cottoned on to the fact that it’s safer to pay those who discover security flaws in their products, than risk them being published and exploited. Well, apparently Oracle’s CSO begs to differ, as exposed […]
Chinese Internet Policing Becomes Literal China is well known for having some of the strictest internet restrictions in the world and the level of control from the government is now set to increase further, with police being posted at the larger internet companies. The government claims this initiative is designed to strengthen national security by […]
Business logic in web applications refers to the encoding of real-world business rules that determine how data should be created, displayed, stored, and changed in a workflow-style process. Applications implementing business logic are not easy to test automatically because they are meant to be used and understood by humans, not automated software. So for example, […]
Acunetix WVS v10 has introduced several new features, including an entirely re-engineered Login Sequence Recorder. The feature we’re going to be focusing on in this post is the ability to import the output of other tools into Acunetix WVS to facilitate the testing process of complex web applications and web services. The crawler can automatically crawl practically […]
Major Android vulnerability leaves billions of devices open to attack This week saw some serious Android vulnerabilities hit the headlines; according to various reports these affect 95% of Android devices, allowing them to be hacked simply be receiving an MMS message. The six vulnerabilities are said to be the worst Android vulnerabilities ever uncovered. The […]