Saroj Kar

Saroj is a Staff Writer at SiliconANGLE covering DevOps, Emerging Tech, Mobile and Gaming news. If you have a story idea or tip, send it to @SiliconAngle on Twitter.

Latest from Saroj Kar

Infected QR Malware Surfaces on Smartphones Apps

As with any phenomenon of popular stuff where users have an interest, it only takes a short time before it gets hijacked by the nefarious. Now, you will have to be wary of QR-Codes, the next target for malware penetration against your smartphones. The warning came from Kaspersky Lab, which has discovered the first sign ...

New PHP Web Defacement Malware Caught Wearing Camouflage

Web defacement occurs when an intruder maliciously alters a Web page by inserting or substituting provocative and frequent offending data. The defacement of an organization’s site exposes visitors to misleading information until the malware system attack is discovered and rectified. Fraser Howard and the security researchers of Sophos Labs have discovered a new technique of ...

The End of a Story: Google Buzz

Google has announced that it will abandon Google Buzz, which lets you share information with friends without having to create new networking contacts. End of service will take place in mid-January 2012. This decision is taken in order to concentrate on the Google’s vision to build a competitive social web with Google Plus to compete against ...

Pivot3 Launches New VDI Appliance Line for VMware Environments

Pivot3, a provider of unified storage and compute appliances, unveiled the Pivot3 vSTAC VDI appliance for VMware view environments.  The new tool offers a stackable virtual desktop infrastructure along with high-performance compute and storage platform best suited for managing virtual desktops. vSTAC VDI appliances deliver high-performance compute and storage resources that scale as appliances are ...

Lookout’s Protected Enough Androids – Onto the iPhone!

A smartphone is not just a phone anymore.  It’s now a mobile device that performs many tasks, making it a rather essential item in our everyday lives.  Now that mobile phones are becoming a dominant computing platform, protecting them from threats is becoming a lot more important as more cyber attacks are emerging on both ...

Mobile Industry Solidifies Strategies around BYOD

The running theme for many companies that participated in the CTIA Enterprise & Applications conference last week was BYOD, seeking ways to extend devices, support and services beyond iPhone or Android boundaries.  But this growing trend would be nothing without a booming device ecosystem to drive mobile workers and enterprise needs.  Especially in the tablet ...

IPO Fever: Is the Party Still On?

More and more big enterprises have begun to rely on software to provide online services. To extend the company’s market value, entrepreneurs continue to come up with new business plans, many looking to a growing number of angel investors ahead of IPO preparations. It seems IPO season was in full swing earlier this year, but ...

Mango Debuts in India as Microsoft Lures More Android, iOS Developers

Microsoft Corporation India finally launched its first Windows Phone 7.5 ,or Mango, in India this week. Major smartphone handset provider, HTC, is the first to usher in this change with the launch of their new handset, the Radar. The device gets a boost with 8GB internal memory, 3.8-inch WVGA SLCD display and 1GHz processor.  The ...

Government and Private Players Join Hands for US Broadband Adoption

A coalition of major IT companies, online retailers and nonprofit organizations have launched a nationwide program to drive up broadband adoption in the U.S., and train residents in computer technology skills in an effort to cut unemployment and spur economic growth. The new program will get support from Microsoft, Best Buy, Monster.com, Sesame Workshop, the ...

Microsoft Security Intelligence Report: Overlook the Zero-Days

Microsoft submitted the eleventh edition of Security Intelligence Report covering the period January to June 2011. The report compares the effects of malicious programs that attack vulnerabilities for which there are no security updates are available called as zero-day attacks. According to the report, the vulnerability that zero-day account constitutes for only 1% of attacks ...