acx_logo

Featured Article

More comprehensive scanning with Acunetix WVS v9.5 – Part I

May 05, 2014 - 08:15am

In these 2 articles, I will be detailing the new functionality introduced in Acunetix WVS version 9.5. An important update introduced in the new version of Acunetix WVS is full JSON and XML support. If you are scanning a web ... [+]


Latest Comparison Report from Larry Suto

Latest Comparison Report from Larry Suto

Last week, Larry Suto published a report entitled “Accuracy and Time Costs of Web Application Security Scanner Report”.  I’ve started to investigate in detail the results from this report. And I’ve found a list of inaccuracies.  Here is a direct … [+]

Protect yourself on Facebook and other social networks

While not particularly new anymore, online social networking is still an exciting medium. Compulsively, I check my Facebook every day, make several posts on Twitter and contribute what I can to LinkedIn and I know I’m not alone with these … [+]

Get sued for Malware Distribution

It’s becoming quite clear that this is an age of increased malware and security threats. The news is becoming more and more flooded with these kinds of reports and many of them are from reputable companies that end up looking … [+]

FAQ: Can I scan a website that uses URL rewrite without specifying URL rewrite rules in Acunetix WVS?

FAQ: Can I scan a website that uses URL rewrite without specifying URL rewrite rules in Acunetix WVS?

Although it is not a suggested operation, yes, you can still scan a website which has URL rewrite enabled without specifying any URL rewrite rules in Acunetix Web Vulnerability Scanner. Unlike other scanners, Acunetix WVS will advise you once it … [+]

Acunetix WVS Version 6.5 build 20100203 released

Acunetix WVS Version 6.5 build 20100203 released

An updated build of Acunetix WVS Version 6.5 has been released with a number of new security checks, improvements and bug fixes. New security checks: 8.3 DOS filename source code disclosure Apache Tomcat Directory Host Appbase authentication bypass vulnerability Apache … [+]

Malware Scanning - Customer Scenario

Malware Scanning – Customer Scenario

Malware…  Yes, its been around for many years.  However the attack vector has changed.  Long ago the primary distribution method was by sharing dirty data (yes, exchanging floppy disks….remember those days?! Then it went onwards into distributing viruses and malware … [+]

e107 CMS system website compromised

e107 CMS system website compromised

As part of my job here at Acunetix, from time to time I analyze source code looking for security problems. Using this information I adjust Acunetix WVS to detect these problems automatically (when it’s possible). Monday, I downloaded e107 from … [+]

How you get affected by Malware - Customer Story

How you get affected by Malware – Customer Story

One big thing that is missing from this industry is empirical trend data that supports the TRUE risks and costs associated with hacking and malware infections. To date, we’ve written quite alot about customer-specific impacts when they are infected.  The … [+]

Security is hard

Security is hard

The year debuted with ‘Operation Aurora’: Google and over 30 other companies were hit by a spear phishing attack which resulted in theft of intellectual property from Google and probably other companies. Spear phishing is a targeted form of phishing in which … [+]

Wild Security Week – SEO Poisoning Malware Survey

Well folks, its been a crazy week online this week. Is it part of the holidays, or simply that more vulnerabilities are going ‘unfixed’ and the hackers are finding more? You be the judge. We definitely think that there is … [+]