Acunetix to be Showcased at SC Congress Toronto

Acunetix will be exhibited at this year’s SC Congress in Toronto, Canada. The event will be held at the Metro Convention Centre in the North Building, on the 17th and 18th of June. Click here to register for Canada’s premier information security conference and expo which will bring industry professionals and the latest security solutions […]

Read More →

Getting Back to Basics with Web Security

It’s usually the simple things in life that create the most problems – we’ve all learned this universal law the hard way. Be it slick tires when driving in the rain, that extra decimal point when doing our taxes, or a bad Ethernet patch cable that’s discovered after hours of computer troubleshooting, it seems that […]

Read More →

Patching Servers is Not Enough

Patches and vulnerabilities Patches are pieces of code designed to fix ‘bugs’, enable additional functionality or address security flaws in operating systems and applications. Timely installation of patches on web servers and applications is generally recognized as critical to the success of website availability and security, especially considering the speed at which exploits are discovered. […]

Read More →

Drop by the Acunetix Stand at OWASP AppSec EU 2014

Acunetix will be sponsoring and exhibiting at this year’s OWASP AppSec EU. The event will be held from 23rd till 26th June at Anglia Ruskin University’s Cambridge campus in the United Kingdom. OWASP is an open-source application security organization made up of security professionals from around the world. OWASP is the global standards body for […]

Read More →

Why you should be Concerned about Web Security

Ever since the Heartbleed bug disaster, you’d think companies are becoming more vigilant with their web security plan. Recent events seem to show evidence to the contrary, with millions of users’ data left exposed to cyber-attacks on popularly used websites, including a government website and eBay. Security flaws in Australian government website Security researcher Nik […]

Read More →

Analysis of an Intrusion: Backdoors

The concept of “Backdoor” has seen many interpretations during the relatively short history of the Internet. Microsoft defines Backdoors as “A hidden entrance to a computer system that can be used to bypass security policies”, and, in essence, that is what they are. A Backdoor allows an attacker to access a remote computer, bypassing authentication […]

Read More →

Vulnerable Network Devices: A Growing Concern

Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime when it comes to network devices. The usual tasks revolve around backup / restore of […]

Read More →