An application does not need to use the root (MySQL), sa (Microsoft SQL Server), postgres (PostgreSQL) or SYSDBA (Oracle Database) to connect to the database. Likewise, it’s a bad idea to run daemons or services as root (Linux) or Administrator (Microsoft Windows), unless there is…
Highlights from Security Leaders in Sao Paulo
Sunlit Technologies the Acunetix distributor for Brazil, exhibited at the 6th edition of Security Leaders in Sao Paulo on 18th and 19th November 2015, at Fecomércio / SP – Rua Doutor Plinio Barreto, 285 – Sao Paulo. Since 2010, Security Leaders and the Brazilian IT market have been following a…
Takeaways from the VTech Hack, and the Vigilante Side of Security Breaches
Anyone following the news this week likely learned of the massive breach exposing the personal data of millions of parents and their children. VTech, a Hong Kong-based toy maker was hacked, exposing everything from children’s names and home addresses, to pictures (reportedly, 190GB worth of…
HIMSS survey uncovers critical weaknesses in hospital web security
A new report has just been published, covering the current state of cybersecurity in the US healthcare sector. Considering the very public breaches of Anthem and other health insurers over the last year, the sector is particularly under scrutiny. Unfortunately the results are not very…
Acunetix 10 build includes security checks in CORS configurations, Rails web applications and identifies the vBulletin 5 RCE
Acunetix 10 (build 20151125) has been released. This new build checks for insecure DNS records, insecure CORS configurations, Rails web applications running in development mode, web applications running Tornado and Pyramid in debug mode and various new and updated vulnerability checks including one for vBulletin…
PWC Global State of Information Security Survey 2016
Price Waterhouse Coopers have just published a report about cybersecurity. Not about the attacks and threats themselves, but about how businesses are tackling the risks. Titled the Global State of Information Security Survey 2016, its key findings relate to measures such as external collaboration and…
Defence in depth – Part 2 – Security before obscurity
Fail-safe defaults Software is bound to fail. Try as we might to create perfect, failure-resistant software, bugs will always exist that might cause software to fail. Notwithstanding this, it is important that this potential failure does not expose an application to a security risk. An…
In the headlines: Anonymous vs ISIS, Australian attorney general, NTP and DDoS exploits
Anonymous vs ISIS Naturally, even cybersecurity news in this past week has centred around ISIS in the wake of the Paris attacks. The main headline has come from Anonymous, who have again but more formally waged ‘war’ on ISIS themselves. So far their efforts seem…
Defence in depth and how it applies to web applications – Part 1
Information security generally refers to defending information from unauthorized access, use, disclosure, disruption, modification or deletion from threats. Organizations are constantly facing threats that exist both externally as well as internally — be they from nation states, political activists, corporate competitors or even disgruntled employees….