PostsCommentsPayoutssurajraghuvanshi (25)in #nsa • 7 years agoState of the Art technology developed used by NSA and CIA part 2WALKOFF WALKOFF is an open source automation platform that enables users to easily integrate, automate and customize their processes enabling their environment to automatically…surajraghuvanshi (25)in #security • 7 years agoCryptocurrency Malware RETADUPRETADUP malware was identified recently in Israeli hospitals.. While RETADUP was found in Israeli hospitals, a new variant was targeting specific industries and governments in…surajraghuvanshi (25)in #cryptocurrency • 7 years agoFuture of cryptocurrencyAmong core problems in the US$150 billion business are how nations can apply the tax to cryptocurrency businesses and whether there should be checks on the ability for bitcoin…surajraghuvanshi (25)in #nsa • 7 years agoState of the Art technology developed by NSAState of the Art technology developed by NSA (national security agency) There is contribution from NSA for computer socecity, specially in security domain. Today i am listing…surajraghuvanshi (25)in #cloud • 7 years agoAWS Security for StartersAs AWS and Security practitioners on large-scale AWS deployments, we’ve about seen it all. Most of these are very easy to implement and will go a very long way to ensuring your…surajraghuvanshi (25)in #penetration • 7 years agoData Storage Security on AndroidThe protection of sensitive data, such as credentials, authentication tokens or private information(user information), is a key focus in mobile security. Public data should be…surajraghuvanshi (25)in #hacking • 7 years agoBlueBorne attack - Hack into mobile phone via bluetoothBluetooth is complicated. Too complicated. Too many specific applications are defined in the stack layer, with endless replication of facilities and features. These…