Malware, otherwise referred to as a Malicious Software Program, is harmful software which can infiltrate your website and cause major irreversible damage via website hacking. Website malware can find its way into your site, perform modifications to your content, and gain access to not only your own personal information, but your customer’s sensitive information as […]
Jacadis LLC, Acunetix reseller, will be exhibiting Acunetix Web Vulnerability Scanner at the 2011 Central Ohio InfoSec Summit. Jerod Brennen of Jacadis will also be discussing, “How to Securely Deploy and Manage Enterprise Mobile Devices”.
Introduction On April 11th 2011, at nine in the evening, Barracuda Networks posted a grim entry on their blog. Their network had been hacked. Thousands of their confidential customer and employee records were stolen. In an ironic twist of fate, the company that advocates security through it’s own Web Application Firewall were victims to the […]
ComGuard, official Acunetix WVS Reseller in the United Arab Emirates, are to be hosting a special event! An Acunetix Knowledge Quiz will be hosted from their website and participants with the most correct answers will win an Acer Notebook.
The 2011 Verizon Data Breach Investigations Report is out. Yeah, yeah, yeah – yet another report telling us what a bad state of security we’re in and that we need to fix all sorts of things in IT. Okay, I’m not going to complain too much because it does help generate business and keep us […]
Regulatory ‘compliance’ – it’s a dirty word in business today. Perhaps that’s because we’re being force-fed more and more rules that various governing bodies believe are the best ways for us to run our businesses. Regardless of what side of the government growth – and IT governance – equation you’re on, IT compliance is here […]
These days, everyone and their grandmother has a website or blog. It’s becoming more and more common for the average person to have a website, whether it’s for informational purposes or as a way to promote a product or service. Either way, there is a ton of competition on the web which results in higher […]
Introduction On 27th March 2011 a message was posted on the popular Full Disclosure mailing list exposing a recent hack against the website mysql.com. This vulnerability was apparently also reported by a hacker called TinKode, who also claims to have found a cross site scripting attack on the same web site in January. SQL Injection […]
With all the talk lately, especially in the OWASP LinkedIn forum, about the most expensive web scanners being the so-called best, Infosec Island have put the far more affordable Web Vulnerability Scanners to the test. By using two well known web applications that were purposely developed with vulnerabilities in order to facilitate web application testing and research […]
In part I of Do you have WordPress Security, we asked some vital questions relating to keeping your WordPress website and blog secure. Here is the concluding part of the article. Secure WordPress Plugins WordPress plugins are another classic example of how hackers are quickly finding inroads to people’s websites even before the authors of […]