Scan Your Perimeter Servers for Shellshock Officially known as CVE-2014-6271, this vulnerability, cordially termed ShellShock, has been assigned the highest CVSS score of 10, a score that the notorious HeartBleed did not achieve. The high score is more than warranted. The vulnerability is very easy to exploit allowing pretty much every script kiddie to take control of a
E-SPIN will be organizing FOC training sessions throughout March 2014, Technology Training on Acunetix WVS, Nipper Studio, and McAfee Risk Advisor. The training sessions provided this March are in line with our goal to increase enterprise awareness towards Risk Management and how to better mitigate and seize these risks and turn them into opportunities through
Acunetix APAC Region Sales Manager business visit E-SPIN Malaysia business center Acunetix, developer of famous Acunetix Web Vulnerability Scanner (WVS), an automated and advanced manual web application security testing/penetration testing tool that audits your web applications by checking for exploitable hacking vulnerabilities, represented by Robert Padovani, APAC Regional Sales Manager visit to one of the
Acunetix web vulnerability scanner is recently launch the new version 9. It come with lot of handy features, from HTML5 and mobile sites support, new AcuMonitor services for better detection of hard to detect Blind XSS vulnerabilities and many more. Please go thru the new features overview video below for some feature highlight. E-SPIN is
Acunetix are moving to a new, secure product download system, to make the upgrade process as transparent as possible. For existing software update and upgrade susbcriber (SUS), please follow these instructions to start making use of the new system: Update Automatically from Acunetix WVS If you are running Acunetix WVS version 8 build 20130205 and
Session hijacking is the act of taking control of a user session after successfully obtaining or generating an authentication session ID. Session hijacking involves an attacker using captured, brute forced or reverse-engineered session IDs to seize control of a legitimate user’s Web application session while that session is still in progress. Types of Session Hijacking
As many as 70% of web sites have vulnerabilities that could lead to the theft of sensitive corporate data such as credit card information and customer lists. Hackers are concentrating their efforts on web-based applications – shopping carts, forms, login pages, dynamic content, etc. Accessible 24/7 from anywhere in the world, insecure web applications provide