Isha Suri

Isha Suri is a staff writer for SiliconANGLE covering social news and security trends. If you have a story idea or news tip, send it to @SiliconAngle on Twitter.

Latest from Isha Suri

Mahdi Malware Targets Middle East under a New Cyber Espionage Campaign

Yet another cyber espionage campaign targeting the Middle East countries has been revealed. Identified by Kaspersky Lab and Seculert, the so-called ‘Mahdi’ malware affected over 800 victims in Iran, Israel, and Afghanistan, for the last eight months. The victims are mostly associated with governmental departments and agencies. “Statistics from the sinkhole revealed that the victims ...

Maplesoft Faces Security Breach, Zeus Trojan is the Culprit

Maplesoft, a leading provider of high-performance software tools has reported a security breach of its administrative database. As reported on the company website, the hackers gained access to e-mail subscription data and company and institution names of customers, but the financial data remained secure. The security breach was conducted using a Trojan attack with the ...

Cisco Acquires Virtuata, Enhances Secure Virtualization Capabilities

Cisco has acquired the California-based privately held Virtuata and that will help the networking giant to provide enhanced security for virtual machines. As reported on their official blog, Hilton Romanski, Vice President and Head of Corporate Business Development at Cisco said that the networking infrastructure giant will leverage the Virtuata’s innovative capabilities to enable consistent ...

As Android Malware Menace Shoots Up, Should You Worry?

Ever since the Google launched its mobile OS Android, it became a favorite eye candy, not only for the mobile users but for the hackers as well. Right from the debut beta version to the Android 4.0.x Ice Cream Sandwich, there is not a single version that could escape hackers. So far, the count of ...

SQL Injection Attacks Are Still the Favorite Tool of Hackers

Undoubtedly, SQL injection is the favorite tool of hackers, and this is quite evident from some recent incidents. Before discussing those incidents in details, let’s dig deeper on the ‘Why’ part. SQL injection is mostly used to attack database, a resting place that is hardly monitored. Most businesses do not pay attention to database security, ...

Google Scales Up Safe Browsing Efforts for Users, Reports Increased Online Attacks

Ever since Google announced malware and phishing protection for online users, the search engine giant has been doing a great job protecting users from identity and phishing attacks, by issuing timely warnings. To ensure timely and comprehensive detection of threats, Google’s Safe Browsing Team has scaled up its efforts, as they have recognized the increased ...

Anonymous Launches Par:AnoIA, Looking to Lead WikiLeaks

As discussed in my previous post that Anonymous hactivist group keeps on looking for ways to grab attention, here we have one more instance of the same instinct. Anonymous is quite interested in the cables released by WikiLeaks and their work, but not so happy with their pace, and this is the reason some members ...

Verizon Brings GameTanium, Offers On-demand Android Games

We all love Android, and of course the range of applications it provides. So, if you’re an owner of an Android smartphone, there’s going to be a moment of glee that Verizon has got something nice to offer you. Verizon has teamed up with Exent to launch a new GameTanium service that provides its Android ...

Instagram Patches Privacy Vulnerability, Hammers a Quick Fix

Instagram, the mobile photo-sharing network recently suffered a flaw in its image application, recently discovered by Spanish researcher Sebastián Guerrero. As described in the advisory published by Guerrero, there was a logical flaw in the authorization that he called ‘friendship vulnerability’. Accordingly, an attacker can perpetrate a brute force attack in the context of user ...

ACTA Provisions Reach from the Grave in CETA (But Don’t Panic Yet)

It seems that the rejection of ACTA, Anti-Counterfeit Trade Agreement by the European Parliament has not discouraged the EU anyways, and this is why the European Union is putting up efforts to push yet another anti piracy agreement, called CETA. The Canada-EU Trade Agreement (CETA) is better known as the Trojan Horse of ACTA, and ...