Identify the Heartbleed Bug with Acunetix Vulnerability Scanner

Featured Article

The Aftermath of the Heartbleed Bug

April 17, 2014 - 09:34am

The Heartbleed bug, a security flaw in the popular OpenSSL library used for data encryption, has taken the web security world by storm, and the victim toll has started to rise. The first reported victims include the Canada Revenue Agency ... [+]


Untitled-2

Persistent Cross-Site Scripting

Persistent XSS (or Stored XSS) attack is one of the three major categories of XSS attacks, the others being Non-Persistent (or Reflected) XSS and DOM-based XSS.  In general, XSS attacks are based on the victim’s trust in a legitimate, but … [+]

Untitled-4

Visit the Acunetix Stand at Infosecurity Europe 2014

Acunetix is to be exhibited in the New Exhibitor’s Zone at Infosecurity Europe at Earls Court from the 29th of April till the 1st of May. Infosecurity Europe is the largest free-to attend information security business and education event in … [+]

ROI - resized

The ROI of Protecting Against Cross-Site Scripting

The ways in which your organization can be damaged by cross-site scripting (XSS) attacks are endless. Apart from the damage it can cause on its own, successful cross-site scripting can be used as a platform for delivering even more devastating … [+]

Acunetix Web Vulnerability Scanner v9, build 20131216 includes a new PCI 3.0 compliance report and several new tests

Acunetix Presents at Comguard Roadshow, Qatar

The Doha Marriott Hotel, Qatar, played host to the ‘Emerging Threats: New Trends and Risk Visibility’ Comguard event for end-users, held on March 12, 2014. Acunetix was exhibited by Mr. Damian Fearnley, Regional Sales Manager for EMEA, who also presented a high-level … [+]

Non-Persistent XSS blog post image

Non-Persistent Cross-Site Scripting

Non-Persistent cross-site scripting (XSS), also known as Reflected XSS, is one of the three major categories of XSS attacks, the others are; persistent (or Stored) XSS and DOM-based XSS.  In general, XSS attacks are based on the victim’s browser trust … [+]

Click here

ClickJacking and Blind XSS

What you see is NOT what you get! In essence, ClickJacking (or UI redressing) is a technique used by attackers to trick users into clicking on malicious web pages that they wouldn’t have accessed otherwise, by overlaying them on apparently … [+]

WS_ReadersChoice_Winner_88x51 (1)

Acunetix Web Vulnerability Scanner Wins WindowSecurity.com Readers’ Choice Award

Acunetix WVS was selected as the 2014 Readers’ Choice Award winner in the Web Application Security category. IT consultants, IT managers, and Network and System Administrators alike voted for Acunetix WVS as their top choice for Web Application Security. WindowSecurity.com is a Microsoft … [+]

UXSS

Universal Cross-Site Scripting (UXSS): The Making of a Vulnerability

What is Universal Cross-Site Scripting (UXSS)? Common cross-site scripting (XSS) attacks target websites or web applications that are vulnerable to XSS, because of inadequate development of client-side or server-side code. These attacks have the vulnerable web page as main prerequisite, … [+]

Communicating with Management 3

Communicating with Management about Web Security, Part 3 – Getting and Keeping Your Message Out There

We’ve all seen it. Apathy and disinterest are the name of the game with web security until a business deal is threatened, a data breach occurs, or an auditor reports something negative to the board and management is called on … [+]

data target -resized

Top Targets of Blind XSS

Web-based security threats are a popular topic and you can easily find related information, including on cross-site scripting and one of its important flavors, Blind XSS. However, although this information is usually delivered at a high level of detail, the … [+]