Analysis of an Intrusion: Backdoors

The concept of “Backdoor” has seen many interpretations during the relatively short history of the Internet. Microsoft defines Backdoors as “A hidden entrance to a computer system that can be used to bypass security policies”, and, in essence, that is what they are. A Backdoor…

Read more

Vulnerable Network Devices: A Growing Concern

Network devices, except maybe firewalls, are not usually perceived as security sensitive assets. Manufacturers and users do not invest time in assessing the security state of routers and switches. IT admins, handling business IT infrastructures, are mainly concerned with uptime when it comes to network…

Read more

Acunetix Exhibited at Infosecurity Europe 2014

Acunetix participated in this year’s Infosecurity event at Earls Court, London. Infosecurity Europe is considered to be the biggest free-to-attend information security event in Europe – and the 19th edition of this event held up to its reputation. From April 29th till May 1st, Infosecurity…

Read more