What can one say about on-line porn sites and security that hasn’t already been said? Most of us know that if we decide to spend time surfing around in the “less desirable” areas of the internet then we are opening ourselves up to the risk…
Author Archives Acunetix
Cloud Computing Benefits
Mention “the cloud” and many who are not heavily involved in the preparation and creation of internet-based resources will turn their heads skyward. To be fair, cloud computing can be a difficult concept to grasp even for those who work within the IT industry because…
Large Companies Don’t Protect From Malware
Everywhere we turn in the recent weeks we are reading articles, blog posts and social media updates about frustrations consumers are having with Adobe products. This comes in light of the Kaspersky Lab report titled “Information Security Threats In the First Quarter of 2010” indicating…
Dangerous XSS vulnerability found on YouTube – vulnerability explained
On the 4th of July 2010 YouTube users began complaining that their videos had been hijacked, the comments section of their videos seemed to be most severely affected, many complained that old comments vanished and new comments could not be added. Others reported that offensive messages were popping up on their screen or scrolling horizontally in large fonts and striking colors. Some users also seemed to suggest that there were experiencing page redirects, often to sites promoting pornographic content.
Acunetix takes first place in black box web vulnerability scanners comparison
Acunetix Web Vulnerability Scanner placed first in a paper released by Adam Doup´e, Marco Cova, and Giovanni Vigna from the University of California, Santa Barbara. In the paper “Why Johnny Can’t Pentest: An Analysis of Black-box Web Vulnerability Scanners”, the authors compared the capalities of…
OWASP AppSec US 2010, California
Acunetix will be exhibiting at the OWASP AppSec US 2010 in California. The event will take place between 7th and 10th of September 2010. The event will be held at UC Irvine Conference Center, in Irvine, California. For more details about the OWASP AppSec conference…
In-depth analysis of a PHP attack that lead to Apple information disclosure
Recently over 100,000 Apple customers were affected by an information gathering attack on the AT&T website. Security experts blame this breach on “poorly designed software”. An analysis of the attack reveals that the hackers did indeed use a classic attack, in fact…
Could BP Learn from the Malware Attacks on recent hosts?
As I watch the debacle unfold in what is quickly becoming widely known as one of the worlds worst environmental disasters – I watch with interest the actions of Mr. Hayward – the CEO and point man for the BP Company. Since I’ve been working…
Fraud: An Infected Website Is a Commodity
It’s a sad statement to make that anyone can become a hacker, with a few dollars and the right contacts anyone can “order” an infected website. A simple email will give anyone the means to access credit card numbers, addresses, and all of your personal…