Acunetix General Manager, Chris Martin was interviewed by Len Rust for the popular Australasian ICT news platform – Rust Report during Cebit in Sydney Australia 2015. In his interview, Mr. Martin gives a brief overview of the company, describes what sets Acunetix apart from its competitors,…
In the headlines: Ashley Madison hack, Amazon quits Flash, Stolen IRS tax records and more
Adultery site data hits the web with serious consequences The Ashley Madison hack continues to grab headlines, with a reported 39GB of data having now been dumped online. What also emerged from the leaked data is that around 90% of users were in fact male….
WordPress 4.3 “Billie” improves password resets
The WordPress team have just announced that the 4.3 release of the massively popular blogging and content management software has been released to the public. While there are some interesting new usability features, the WordPress team have also released a new security feature that deals…
In the headlines: Oracle CSO fracas, Wassenaar re-evaluated, car hacking lawsuits and more
Oracle publish then delete blog whining about bug finders We’re well in the age of the ‘bug bounty’, where companies have cottoned on to the fact that it’s safer to pay those who discover security flaws in their products, than risk them being published and…
In the headlines: Chinese VPN Services, MasterCard survey, Firefox Exploit and more
Chinese Internet Policing Becomes Literal China is well known for having some of the strictest internet restrictions in the world and the level of control from the government is now set to increase further, with police being posted at the larger internet companies. The government…
Business Logic Security Testing with Acunetix v10
Business logic in web applications refers to the encoding of real-world business rules that determine how data should be created, displayed, stored, and changed in a workflow-style process. Applications implementing business logic are not easy to test automatically because they are meant to be used…
In the headlines: Android vulnerabilities, MongoDB database and more
Major Android vulnerability leaves billions of devices open to attack This week saw some serious Android vulnerabilities hit the headlines; according to various reports these affect 95% of Android devices, allowing them to be hacked simply be receiving an MMS message. The six vulnerabilities are…
Scanning for malicious links and phishing links
Any webmaster who has administered a blog with comments enabled or a forum knows all too well what a nightmare spam comment and post can be. While spam remains a problem, there are a lot of options (most notably Akismet for WordPress) how you can…
In the headlines: Ashleymadison.com, CVS pharmacy, Jeep hack and more
Google calls Wassenaar rules unfeasible The Wassenaar rules’ potential transposition into US law came to light a few weeks ago and just as the open comments on the proposal come to an end, Google have officially spoken out against the proposal. “We believe that these…