Password protecting your WordPress admin area through a layer of HTTP authentication is an effective measure to thwart attackers attempting to guess users’ passwords. Additionally, if attackers manages to steal a user’s password, they will need to get past HTTP authentication in order to gain…
Predictions and challenges for website security in 2015
What Happened in 2014 2014 will be remembered for many things; it’s the year HTML5 has been given the green light and the year JavaScript has been used to provide dynamic content more than ever before. We have also seen major version releases in important…
What to look for when choosing a web vulnerability scanner
Evaluating a web vulnerability scanner is not the easiest of tasks. With a multitude of open source and commercial products to choose from, all promising to provide the best of breed scanning functionality, choosing the right web vulnerability scanner is a tough, albeit important decision….
5 most dangerous software bugs of 2014
Wired have just released the 5 most dangerous software bugs in 2014 – 3 of which affect web security. Once again, web sites, web applications and web servers are the main source of concern for IT administrators trying to prevent unauthorised access from the internet….
WordPress Security Tips Part 4 – Complex Security Keys
Heads up – Depending on your webserver’s configuration, activated plugins and/or themes, the following could break some functionality. It is strongly advised to try out any configuration in a testing/staging environment before changing any configuration on production servers. Complex WordPress Security Keys WordPress makes use…
WordPress Security Tips, Part 3 – Security Configurations
Heads up – Depending on your webserver’s configuration, activated plugins and/or themes, the following could break some functionality. It is strongly advised to try out any configuration in a testing/staging environment before changing any configuration on production servers. Prevent Directory Listing Directory Listing occurs when…
Automate post-scan reports and new Coverage Report in Acunetix Online
Acunetix Online Vulnerability Scanner has been updated with 2 new features. These are: The option to generate a report automatically once a scan is completed. This will save time for users. When creating a new scan, users will be able to optionally configure a report…
How to avoid eBay hack attacks
Back in September, eBay made the headlines due to a number of Cross Site Scripting (XSS) vulnerabilities found on their site. Following pressure from security experts and users, a few of these vulnerabilities were patched, although eBay were quoted as saying they would not remove…
Lessons we can learn from the Sony Pictures hack
In light of the recent Sony Pictures hack, it’s important to clarify the facts and examine how such an attack might have taken place, to serve as a learning experience for other companies. News about the hack on Sony Pictures’ infrastructure continue to unfold, with…