What You Don’t Know About Web Security CAN Hurt You

How secure is your web environment? You know, your business’ marketing website, your customer-facing web applications, your internal financials application, the various cloud services that process and store business assets, and so on. Many business executives don’t have the slightest idea about the security of these critical business systems. They view this as a technical […]

Read More →

Acunetix Exhibited at Infosecurity Europe 2014

Acunetix participated in this year’s Infosecurity event at Earls Court, London. Infosecurity Europe is considered to be the biggest free-to-attend information security event in Europe – and the 19th edition of this event held up to its reputation. From April 29th till May 1st, Infosecurity Europe was host to over  300 exhibitors and roughly 13,000 […]

Read More →

Build Secure Microsoft .NET Framework Web Apps Free of Vulnerabilities

Do you want the peace of mind that you’re delivering secure code free of vulnerabilities when building applications using the Microsoft .NET framework? Acunetix’s AcuSensor Technology is your answer. The .NET Framework is Microsoft’s comprehensive and consistent programming model for building applications that have visually stunning user experiences, seamless and secure communication, and the ability […]

Read More →

Better scan results with CVSS, CVE and CWE

By adding these internationally adopted standards of classification, users of Acunetix Vulnerability Scanner will have a common language across their various security products resulting in an easier, more fluid remediation process. The most recent version of Acunetix Web Vulnerability Scanner includes the classification of vulnerabilities using CVE (Common Vulnerabilities Exposure), CWE (Common Weakness Enumeration) and […]

Read More →

Scan Google Web Toolkit Applications with Acunetix

Google Web Toolkit (GWT) is an open source set of tools that allows web developers to create and maintain complex JavaScript front-end applications in Java, using the Java development tools of their choice. It is a development toolkit for building and optimizing complex browser-based applications. GWT is already being used by tens of thousands of […]

Read More →

Negative Impacts of Automated Vulnerability Scanners and How to Prevent them

Automated web application vulnerability scanners are constantly being used in order to automatically identify vulnerabilities such as Cross-Site Scripting (XSS) and SQL Injection on web applications. Although automated vulnerability scanners have become an indispensable tool for pen-testers and security consultants, they could sometimes have a negative impact on your scan target. An automated scan damaged […]

Read More →

The Results are in – Verizon 2014 Data Breach Investigations Report

The numbers are in… and cybercrime had quite an active 2013 according to Verizon’s 2014 Data Breach Investigations Report (DBIR) – one of the information security industry’s most prominent studies compiled from over 50 contributing organizations. This year’s report includes an array of security issues, from denial of service (DOS) attacks to web application attacks […]

Read More →