The WordPress database is the most important component of your WordPress website. It contains all the content of your website, such as information about your users and all your posts, etc. In order to access the database, a database user should have specific privileges that allow him or her to manipulate it. The WordPress database […]
Running multiple instances of Acunetix Web Vulnerability Scanner (WVS) allows you to scan multiple websites simultaneously. Each instance can scan one website at a time – you can have up to two instances of all Acunetix WVS editions or up to ten instances if you are using the Enterprise or Consultant editions. To run multiple web […]
Just recently, the WordPress development team released the latest and greatest version of the web platform – WordPress 3.3.2. It is always important that you update your WordPress installation to the latest version, as it addresses bug fixes and security issues reported in the previous versions. This WordPress update fixes numerous security flaws including two […]
Acunetix Web Vulnerability Scanner Wins the WindowSecurity.com Readers’ Choice Award for the Fifth Successive Year Leading Windows Security resource site, WindowSecurity.com, has announced that Acunetix Web Vulnerability Scanner has been selected as the winner of the 2012 WindowSecurity.com Readers’ Choice Awards, in the Web Application Security category.
When performing web security assessments, it’s easy for us to feel confident in what we see. Take Cross-Site Scripting (XSS) for instance. Your scanner finds this web vulnerability. You validate that it does indeed exist. What more is there to do? Well, it depends on how much pushback your get from your network admins or […]
Is the exploitation of web vulnerabilities worth the trouble? Does it create unnecessary risks that should be avoided? Why exploit flaws anyway? This is not a black and white circumstance. Every situation is unique. But here’s what I know. The exploitation of web security flaws such as Cross-Site Scripting, SQL injection and Cross-Site request forgery […]
Gerald Ford once said “Nothing in life is more important than the ability to communicate effectively.” What a profound statement that not only applies to our personal lives but also how far we go in our IT careers. There’s hardly anything that can cause IT Geeks to lose their audience – and our credibility – […]
We are proud to announce a new build of Acunetix Web Vulnerability Scanner 8. Build 20120403 offers you a new feature which automatically verifies vulnerabilities such as SQL Injection, Cross-Site Scripting and Directory Traversal, and helps you save loads of time.
The time required for web scanning with Acunetix Web Vulnerability Scanner (WVS) varies depending on the size and complexity of the target website, the response time of the web server, the type of scan you are running (Quick, Heuristic or Extensive) and the scanning profile used. Therefore, web scanning may vary from a few minutes […]
Nowadays, most web applications use databases in order to store all information and data required for a website or blog to run efficiently and dynamically. These databases often contain configuration settings as well as confidential information, such as user passwords. In order to restrict access to a database, it is common to maintain an administrative […]