Statistics from a phisher’s list

Yesterday night I was following some security related forums and some person posted a phishing kit for a popular bank from Romania.  A phishing kit is a collection of scripts to help a script kiddie launch a phishing exploit and steal data such as credit card information, passwords.  While looking through the contents of this […]

Read More →

Acunetix WVS Version 7 build 20101123 released

An updated build of Acunetix WVS Version 7 was released. Improvement: More updates to the Client Script Analyser (CSA) engine for better Web 2.0 support Bug Fixes: Fix: Added port in host header for https in manual browsing Fixed: Crawler not serving pages to Client Script Analyzer engine on request if pages were already queued […]

Read More →

Acunetix WVS Version 7 build 20101115 released

An updated build of Acunetix WVS Version 7 was released.  It includes a new feature,  and improved support for JQuery and Web 2.0 web applications. New Features: Ability to stop individual running security scripts during a scan Major Improvements: CSA engine now supports a wider range of JQuery and Web 2.0 applications Introduced a number […]

Read More →

Holidays Brings out the Bad Guys

As you might expect, there is a projected large increase in criminal activities forecasted for this year.  Driving malware and trojan infections via YOUR website is now becoming more of a standard operating procedure than ever.  As reported in ThreatPosts more recent listing: ‘Spammers Gearing Up Botnets For Holiday Rush‘ criminals are ramping up quickly. […]

Read More →

Acunetix WVS Version 7 build 20101028 released

An updated build of Acunetix WVS Version 7 has been released.  This build addresses a number of bug fixes. Bug Fixes: Fixed: Replay of recorded login sequences was not working properly in the free version Fixed: NTLM authentication was not working properly when using specific type of credentials Fixed: Crash in Login Sequence Recorder while […]

Read More →

Internet Voting Trial Thwarted by Hackers

The District of Columbia recently attempted to give the opportunity to number of people who live or work overseas to be able to cast their vote remotely. To do this a secure E-Voting website costing over $300,000 was built. On Tuesday, September 28 2010 the first public trial run was launched. Thirty-six hours later the voting system was hacked by a student. It took nearly three days for D.C officials to realize that their system was compromised. The trial was immediately suspended and red-faced engineers and politicians quickly scrambled to find out how this breach could possibly have happened.

Read More →