acunetix_logo_blog_post_100x74

Featured Article

Acunetix WVS v9.5 build 20140902 detects Hibernate Query Injection, Format Strings and more

September 02, 2014 - 11:30am

Acunetix Web Vulnerability Scanner version 9.5 build 20140902 has been updated to include new vulnerability checks, including detection of Hibernate Query Injection, format strings vulnerabilities, MySQL username disclosure and others, including some, in well-known web applications. This new build also ... [+]


compliance

Balancing Web Security with your Compliance Requirements

As an executive responsible for many aspects of running your business, it can be difficult and downright confusing trying to understand the balance between Web security and compliance. Your IT, information security, and internal audit teams may be telling you … [+]

AopSec USA 2014

Visit Acunetix Stand at OWASP AppSec USA 2014

Acunetix will be sponsoring and exhibiting at this year’s OWASP AppSec USA. The event will be held from 16th to the 19th September at the Denver Marriott City Center, Denver, USA. AppSec USA is a world-class software security conference for developers, auditors, risk managers, … [+]

RATs vs Worms

Danger: Open Ports – Remote Access Trojans (RATs) vs Worms

Having a good antivirus solution gives a warm, fuzzy feeling of safety: you know that your assets are virus free and that your network is secure. However, most antivirus solutions cannot detect Remote Administration Tools (aka Remote Access Trojans  or … [+]

Help Net Security

How important is website security?

In an interview on Help Net Security, Acunetix’ Product Manager Nicholas Sciberras, illustrates why website security should be a priority in any organization. He talks about the challenges involved in auditing website security, illustrates the pros and cons of using remote … [+]

POS security

POS Security: Are my POS terminal credentials up for sale?

There is a black market for stolen credit card information: you can shop online for credit card data for prices between 20$ and 100$ per item. Underground websites like Silk Road (today Silk Road 2.0) offer the possibility to acquire … [+]

Identify the Heartbleed Bug with Acunetix Vulnerability Scanner

Heartbleed Used to Steal Credentials and Breach Community Health Systems

Last Monday, Community Health Systems (CHS) filed an 8-K filing with the US Securities and Exchange Commission, confirming a security breach which occurred in April and June, 2014. CHS blamed the breach on a group of Chinese hackers. The 8-K … [+]

wordpress-logo-stacked-rgb

WordPress Security Revisited

Starting as just a good blogging system in 2003, WordPress has grown to be the most popular Content Management System (CMS), used in over 22% of the top 1 million web sites. It is the CMS that can be installed … [+]

light-resized

Common Network Security Assessment Oversights

Network security assessments are one of the most critical exercises performed for minimizing business risks. Your time is limited. You’ve got pressure from management to get things done. There’s so much to do and not enough time to do it. … [+]

resized

Making Web Security Part of your IT Governance Program

Moving past IT compliance, IT “governance” is becoming the new area of focus in enterprises today. With compliance often being a more tactical business function, IT governance tends to operate at a higher level, especially in larger organizations. Internal audit, … [+]

security-resized

How to Take Your Network Security Assessments to the Next Level

There’s always a point in every IT professional’s career where he thinks he has everything figured out. We can get so caught up in our ways that we often overlook the fact that there are so many things we do … [+]