acx_logo

Featured Article

More comprehensive scanning with Acunetix WVS v9.5 – Part I

May 05, 2014 - 08:15am

In these 2 articles, I will be detailing the new functionality introduced in Acunetix WVS version 9.5. An important update introduced in the new version of Acunetix WVS is full JSON and XML support. If you are scanning a web ... [+]


Why Web Security is Not Just IT’s Problem

Why Web Security is Not Just IT’s Problem

What’s your take on Web security? Do you see it as one of those techie things that other people should be handling? Or do you see it as your responsibility to ensure everything associated with your Web presence is in … [+]

Over 1 Million Accounts Leaked in a Massive Hack Attack

Over 1 Million Accounts Leaked in a Massive Hack Attack

A recent online attack from a hacker group called Team GhostShell has targeted more than 100 websites from banks, stock exchange, police departments, and consulting firms, to law firms, and several companies from many other different sectors. Some of the … [+]

Web Security Tip of the Week: Why Do Hacker Attacks Happen?

Web Security Tip of the Week: Why Do Hacker Attacks Happen?

Criminal hackers have it made. They know that many people don’t get – or completely ignore – online security. This attitude from many is at the core of why we experience web security issues. But, as problematic as the human … [+]

Acunetix Web Vulnerability Scanner Version 8 Build 20120808 Released

Acunetix Web Vulnerability Scanner Version 8 Build 20120808 Released

We are pleased to announce an updated build of Acunetix Web Vulnerability Scanner 8 (WVS 8). The new build 20120808 offers a number of new security checks for several different well known web applicatoins, improvements and also a number bug … [+]

htaccess files should not be used for security restrictions

htaccess files should not be used for security restrictions

According to Apache documentation: .htaccess files (or “distributed configuration files”) provide a way to make configuration changes on a per-directory basis. A file, containing one or more configuration directives, is placed in a particular document directory, and the directives apply to … [+]

Reuters.com WordPress hacked. False Syria blog posts posted

Reuters.com WordPress hacked. False Syria blog posts posted

On Friday 3rd August 2012 Reuters.com announced that it was a victim of a hack attack. Reuters.com blogging platform (WordPress) was compromised and attackers posted several fake news articles that were attributed to its reporters. Parent company of Reuters.com, Thomson-Reuters … [+]

What if We Held Ourselves to the Security Certification Standards?

What if We Held Ourselves to the Security Certification Standards?

Confidentiality, compensating controls, risk transference are just a few of the core information security concepts covered by the CISSP exam – concepts that also happen to impact Web application security. Having recently completed the technical edits for a CISSP exam … [+]

Take Care in Handling the Results of Your Web Application Testing

Take Care in Handling the Results of Your Web Application Testing

How do you handle your web application testing, vulnerability scans, test data and related security assessment reports? I’ve found that this is something that doesn’t get a lot of attention in web application security circles but is still impactful to the business. It’s … [+]