Checking For Vulnerabilities in Path Fragments

Note: This article refers to an older version of Acunetix. Click here to download the latest version. Nowadays, more and more people are using URL rewrite techniques to increase their “friendliness” to both users and search engines. With URL rewrites, a URL like http://www.site.com/cms/product.php?action=buy&id=1 is…

Read more

Online Security Considerations when Traveling

Whenever my friends or family members tell me they’ll be travelling abroad, I always like to remind them not to overlook online security when it comes to their website or blog, especially if accessing their accounts from an unknown computer. No doubt, most travelers will, at…

Read more

Web Passwords are Often the Weakest Link

Of the highly-visible hacks and data breaches over the past year, a large number of them were related to criminal hackers cracking weak Web passwords. This is arguably the most common Web flaw and something that anyone can exploit at any time. The bad guys…

Read more

Web Security is Like the Layers of an Onion

If you’ve ever peeled an onion, you’ve seen the multiple layers that make up its existence all the way to the core. Securing your Web presence requires the same approach and it’s called “layered security”. Also referred to as “defense-in-depth”, the layered web security approach…

Read more