MALTA, 4 December 2013- Acunetix today announced the beta release of its latest product, Acunetix Online Vulnerability Scanner. Responsive, scalable and centralised with unmatched deep crawling and scanning capabilities, Acunetix Online Vulnerability Scanner promises to help businesses of any size protect their websites, web applications…
Acunetix Exhibited at GITEX Technology Week 2013
Comguard, an official Partner for Acunetix Web Vulnerability Scanner based in the United Arab Emirates, participated in the GITEX exhibition held between October 20th and October 24th 2013 at the Dubai World Trade Centre. Acunetix was showcased as one of the key vendors for Comguard at…
Latest Improvements in the Detection of DOM XSS Vulnerabilities
The latest build of Acunetix Web Vulnerability Scanner (Build 20131023) released yesterday, contains important improvements in the detection of DOM XSS vulnerabilities. Our DeepScan technology was also further strengthened in this build. Take the following piece of code for example: This code is vulnerable to…
Latest WVS v9 build with new DOM XSS checks that can be injected in HTTP GET parameters
Acunetix Web Vulnerability Scanner version 9, build 20131023 includes new DOM XSS checks for the type of DOM XSS vulnerabilities that can be injected in the HTTP GET parameters. This new build also includes the option to automatically save scan results to disk after a…
Acunetix and Aquion Participate in AISA National Conference
The 6th annual AISA National Conference, held at the Sydney Exhibition and Convention Centre on 10th October 2013, hosted over 900 experts and professionals from the Information Security industry. Acunetix showcased at the information odyssey-themed event in collaboration with Aquion, an official Acunetix Partner based…
XSS Vulnerability injected through Google Analytics, executed in IOS’s Gmail application
Roy Castillo, a security researcher from the Philippines, identified a cross-site scripting (XSS) vulnerability in the Gmail application for iOS. The vulnerability was found in the mail attachment feature and needed no user interaction to be triggered. In a post on his blog, Roy Castillo…
IT Security Includes Cyber Attack Response
Preventing cyber attacks is a dominant topic for IT security. It is the first layer of defense. The more attacks prevented the better – no question about it. However, does great prevention guarantee there will no successful cyber attacks? Of course not. Good Security is…
Critical vulnerabilities discovered in Gazelle and TBDEV.net
Gazelle and TBDEV.NET are the most popular web applications used as BitTorrent trackers. A BitTorrent tracker is an application that assists in the communication between peers using the BitTorrent protocol. BitTorrent trackers can be public/open where anybody can join or private (where an invitation is…
The Default WordPress Administrator Account Is In Use
Alert group: WordPress default “admin” account exists Acunetix WP Security Plugin test: During this test Acunetix looks for the default admin account in the WordPress user list. Repercussions: With the default WordPress administrator account active, a malicious user does not have to guess the username…