Confidentiality, compensating controls, risk transference are just a few of the core information security concepts covered by the CISSP exam – concepts that also happen to impact Web application security. Having recently completed the technical edits for a CISSP exam prep book, these principles are…
Take Care Handling the Results of Web Application Testing
How do you handle your web application testing, vulnerability scans, test data and related security assessment reports? I’ve found that this is something that doesn’t get a lot of attention in web application security circles but is still impactful to the business. It’s actually kind of ironic that…
Web Security Tip of the Week: Understanding WordPress Vulnerabilities
Did you know that if a system has an IP address or a URL, then it’s fair game for attack from a hacker? That’s been the universal law and it always will be. So why is it that WordPress security and WordPress vulnerabilities seem to…
How does Acunetix Compare to Other Web Application Vulnerability Scanners?
In the 2012 Web Application Vulnerability Scanners Benchmark report, which was carried out by Shay-Chen on his website, Sectooladdict, Acunetix Web Vulnerability Scanner topped the Cross-Site Scripting and SQL Injection tests with a 100% detection rate and 0% false positives! Click here to read the…
Join the Acunetix Online Community
You can interact with the Acunetix Team and with other members of the online web security community on the Acunetix Facebook Page. Our Facebook Page makes it easy to share your thoughts and comments about the latest web security news, Acunetix Web Vulnerability Scanner, or…
Don’t Let Problems Stop You From Carrying Out Web Application Testing
Web security assessment success is directly related to the amount of preparation you do up front before you run a single web application test. It’s the 80/20 Rule: the 20 percent time and effort you put into planning for the assessment will represent 80 percent of the value…
The Consequences of Having a Hacked Website
Cybercrimes are at an all time high, with hackers and identity thieves making a living from selling private or corporate data. If you have a hacked website, it can have far reaching repercussions especially if your website databases include your customers’ private and confidential information,…
New cross-site scripting security checks in latest Acunetix WVS build
We are pleased to announce an updated build of Acunetix Web Vulnerability Scanner 8 (WVS 8). The new build 20120704, includes a number of new security checks, improvements and bug fixes. The highlight of this new Acunetix Web Vulnerability Scanner 8 build is that it…
Windows Short (8.3) Filenames – A Security Nightmare?
Each time you create a new file on Windows, the operating system also generates an MS-DOS-compatible short file name in 8.3 format, to allow MS-DOS-based or 16-bit Windows-based programs to access files which have a long name. You can see these MS-DOS-compatible short file names by…