Identify the Heartbleed Bug with Acunetix Vulnerability Scanner

Featured Article

The Aftermath of the Heartbleed Bug

April 17, 2014 - 09:34am

The Heartbleed bug, a security flaw in the popular OpenSSL library used for data encryption, has taken the web security world by storm, and the victim toll has started to rise. The first reported victims include the Canada Revenue Agency ... [+]


AISA 2013

Acunetix and Aquion Participate in AISA National Conference

The 6th annual AISA National Conference, held at the Sydney Exhibition and Convention Centre on 10th October 2013, hosted over 900 experts and professionals from the Information Security industry. Acunetix showcased at the information odyssey-themed event in collaboration with Aquion, … [+]

XSS Vulnerability injected through Google Analytics, executed in IOS's Gmail application

XSS Vulnerability injected through Google Analytics, executed in IOS’s Gmail application

Roy Castillo, a security researcher from the Philippines, identified a cross-site scripting (XSS) vulnerability in the Gmail application for iOS. The vulnerability was found in the mail attachment feature and needed no user interaction to be triggered. In a post … [+]

IT Security Includes Cyber Attack Response

IT Security Includes Cyber Attack Response

Preventing cyber attacks is a dominant topic for IT security.  It is the first layer of defense.  The more attacks prevented the better – no question about it.  However, does great prevention guarantee there will no successful cyber attacks?  Of … [+]

Critical vulnerabilities discovered in Gazelle and TBDEV.net

Critical vulnerabilities discovered in Gazelle and TBDEV.net

Gazelle and TBDEV.NET are the most popular web applications used as BitTorrent trackers. A BitTorrent tracker is an application that assists in the communication between peers using the BitTorrent protocol. BitTorrent trackers can be public/open where anybody can join or … [+]

The Default WordPress Administrator Account Is In Use

The Default WordPress Administrator Account Is In Use

Alert group: WordPress default “admin” account exists Acunetix WP Security Plugin test: During this test Acunetix looks for the default admin account in the WordPress user list. Repercussions: With the default WordPress administrator account active, a malicious user does not … [+]

Acunetix Web Vulnerability Scanner v9, build 20131009 includes checks for HTML Injection and the detection of weak passwords in Joomla! and Django

Acunetix Web Vulnerability Scanner version 9, build 20131009 includes checks for HTML Injection, and adds the detection of weak passwords in Joomla! and Django’s Administrative interfaces. In addition, the new build includes the detection of readme documentation files, together with … [+]

On the increasing popularity of JavaScript - Acunetix.

On the Increasing Popularity of JavaScript

Many people think of JavaScript as a way to create interactive and dynamic web pages.   JavaScript gives visitors a great website experience across platforms and across browsers that can be adjusted and tweaked to fit the user’s device, interests, and … [+]

Slow HTTP DoS Attacks and How to Mitigate Them in Apache HTTP Server

How To Mitigate Slow HTTP DoS Attacks in Apache HTTP Server

A Slow HTTP Denial of Service (DoS) attack, otherwise referred to as Slowloris HTTP DoS attack, makes use of HTTP GET requests to occupy all available HTTP connections permitted on a web server. A Slow HTTP DoS Attack takes advantage … [+]

Slowloris detection in AWVS

Why You Need To Pay Attention To The Slow HTTP Attack

Okay, I admit, I haven’t been stressing enough to people just how critical the Slow HTTP vulnerability really is. The Slow HTTP flaw is present on practically every Apache-based system I test and can facilitate denial of service (DoS) conditions … [+]

The Role Of An Automated Web Security Scanner In A Holistic Web Security Audit

The Role Of An Automated Web Vulnerability Scanner In A Holistic Web Security Audit

Easily two-thirds of the value of any given web vulnerabilities assessment comes from the use of automated web vulnerability scanners. At least that’s been my experience. I certainly don’t have the knowledge – or the time – to manually track … [+]