acx_logo

Featured Article

More comprehensive scanning with Acunetix WVS v9.5 – Part I

May 05, 2014 - 08:15am

In these 2 articles, I will be detailing the new functionality introduced in Acunetix WVS version 9.5. An important update introduced in the new version of Acunetix WVS is full JSON and XML support. If you are scanning a web ... [+]


Web Passwords are Often the Weakest Link

Web Passwords are Often the Weakest Link

Of the highly-visible hacks and data breaches over the past year, a large number of them were related to criminal hackers cracking weak Web passwords. This is arguably the most common Web flaw and something that anyone can exploit at … [+]

Web Security is Like the Layers of an Onion

Web Security is Like the Layers of an Onion

If you’ve ever peeled an onion, you’ve seen the multiple layers that make up its existence all the way to the core. Securing your Web presence requires the same approach and it’s called “layered security”. Also referred to as “defense-in-depth”, … [+]

Acunetix WVS 8 Released Candidate Now Available!

Acunetix WVS 8 Released Candidate Now Available!

We are pleased to announce a Release Candidate (RC) of the much-awaited Acunetix Web Vulnerability Scanner, version 8. This build fixes issues that were reported during the Beta stages of development and also adds a number of improvements which boost … [+]

To Validate or Not, Is That the Question?

To Validate or Not, Is That the Question?

Recently, a project manager I work with asked me if I had manually validated a set of security flaws I uncovered during a web security assessment. The flaws in question were related to the server host and not the actual … [+]

The critical Web-based systems that are going untested and unsecured

The critical Web-based systems that are going untested and unsecured

I recently participated in a webinar aimed at helping physical security professionals, corporate security managers and others responsible for both physical and logical security. This is an area of security that doesn’t get near the attention it deserves – especially … [+]

What Does Having a Hacked Website Mean?

What Does Having a Hacked Website Mean?

When someone hacks a website, what are they trying to accomplish? Some just do it for fun while others have more dangerous things in mind and even worse, financial interests. Some hackers like to show off and will maybe replace … [+]

WordPress Version 3.3.1 released

WordPress Version 3.3.1 released

A new version of WordPress is available for download. WordPress version 3.3.1 includes a fix for a disclosed reflected cross-site scripting vulnerability reported by Joshua H., Hoang T., Stefan Zimmerman, Chris K and the GoDaddy team. It also includes 15 … [+]

Securing FTP Running on Your Web Server

Securing FTP Running on Your Web Server

I’ve had several questions from clients recently on how they can to secure FTP running on their web servers. The easy and short-sighted response would be “Are you nuts? You need to run FTP on a dedicated server!” However, looking … [+]

Acunetix Web Vulnerability Scanner 8 Now BETA 2

Acunetix Web Vulnerability Scanner 8 Now BETA 2

As the BETA program for Acunetix Web Vulnerability Scanner 8 keeps gaining momentum, all the great feedback received from our BETA participants has helped us achieve the BETA 2 milestone. This brings a significant number of improvements to WVS 8, … [+]