Angela Moscsaritolo

Send feedback to Angela Moscsaritolo



Recent articles for Angela Moscsaritolo

New SOCs 
Nov 8, 2011 | Comment Now 
Organisations have built situation rooms to protect data and respond to threats.
 
Facebook and the bug hunters 
Nov 2, 2011 | Comment Now 
The sometimes dangerous business of vulnerability disclosure is becoming profitable.
 
The path of privacy 
Oct 7, 2011 | Comment Now 
How US schools maintain the privacy of 55 million students.
 
Digitial investigations have matured 
Aug 2, 2011 | Comment Now 
Forensics enables you to understand and prevent breaches.
 
Security pros should trust noone 
Jun 2, 2011 | Comment Now 
The zero-trust network framework, in which security is embedded into the network offers protection from threats and helps isolate and contain damage if an incident arises, but ...
 
 NZ researchers find SCADA holes 
May 13, 2011 | Comment Now 
The US Cyber Emergency Response Team has warned of a critical vulnerability in two popular SCADA systems, found by security-assessment.com.
 
New Zeus version targeting Firefox users for bank fraud 
Apr 22, 2010 | Comment Now 
Uses HTML injection and transaction tampering techniques.
 
Avalanche the most prolific phishing group of 2009 
Oct 27, 2009 | Comment Now 
A criminal phishing group called Avalanche was responsible for nearly a quarter of all phishing attacks identified during the first half of this year, according to a recently ...
 
New Halloween-themed spam just the first fright 
Oct 26, 2009 | Comment Now 
With Halloween nearing, users should be on alert for spam and other attacks exploiting the holiday, and experts expect social network websites to serve as a major vector this year.
 
Twitter XSS vulnerability not yet fixed 
Aug 27, 2009 | Comment Now 
Claims patch doesn't work.
 
Adobe ColdFusion, JRun updated for critical issues 
Aug 18, 2009 | Comment Now 
More patches for the web design and development platform.
 
Spam back up to pre-McColo levels 
Apr 1, 2009 | Comment Now 
Four months after the highly publicised takedown of the McColo web-hosting company, in which worldwide spam levels dropped by around 70 percent, the prevalence of junk mail has ...
 
23 per cent of users fall for spear phishing 
Mar 11, 2009 | Comment Now 
A new study found that 23 per cent of people worldwide will fall for spear phishing attacks.
 
Firefox update addresses multiple security issues 
Mar 6, 2009 | Comment Now 
Mozilla has issued Firefox 3.0.7, which fixes multiple security issues that could potentially cause an attacker to run arbitrary code on a victim's computer, cause a denial-of-s...
 
Obama appoints "first ever" federal CIO 
Mar 6, 2009 | Comment Now 
President Obama has appointed the first-ever federal chief information officer (CIO).
 
Users increasingly falling victim to malware distributed on Digg, YouTube 
Mar 4, 2009 | Comment Now 
Infection of the adware called "VideoPlay," which has been spreading through malicious posts and comments on Digg and YouTube, increased 400 percent from January to February, ...
 
Blueprints of Obama's Marine One helicopter leaked on P2P 
Mar 3, 2009 | Comment Now 
The blueprints for US president Barack Obama's helicopter, Marine One, were downloaded from a peer-to-peer (P2P) network and onto a computer in Iran, a file-sharing monitoring ...
 
Spoofed Delta Airlines emails contain trojan 
Mar 2, 2009 | Comment Now 
Emails spoofed to look like they are coming from Delta Airlines to confirm a ticket purchase are attempting to infect users with a trojan, according to a Belgium-based security ...
 
Microsoft says password stealers pose biggest threat 
Feb 24, 2009 | Comment Now 
The top two threat families on Microsoft's detection and removal list this month are online game password stealers (PWS).
 
Spam poses as CNN story about Israel-Hamas conflict 
Jan 12, 2009 | Comment Now 
Cybercriminals are leveraging the Israel-Hamas conflict in Gaza to dupe users into visiting malware-laden websites through spam claiming to be from CNN.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 335

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 139

Vote