BlogHide Resteemssurajraghuvanshi (25)in nsa • 7 years agoState of the Art technology developed used by NSA and CIA part 2WALKOFF WALKOFF is an open source automation platform that enables users to easily integrate, automate and customize their processes enabling their environment to automatically adapt and respond…surajraghuvanshi (25)in security • 7 years agoCryptocurrency Malware RETADUPRETADUP malware was identified recently in Israeli hospitals.. While RETADUP was found in Israeli hospitals, a new variant was targeting specific industries and governments in South America.The new…surajraghuvanshi (25)in cryptocurrency • 7 years agoFuture of cryptocurrencyAmong core problems in the US$150 billion business are how nations can apply the tax to cryptocurrency businesses and whether there should be checks on the ability for bitcoin and other virtual…surajraghuvanshi (25)in nsa • 7 years agoState of the Art technology developed by NSAState of the Art technology developed by NSA (national security agency) There is contribution from NSA for computer socecity, specially in security domain. Today i am listing few of the tools…surajraghuvanshi (25)in cloud • 7 years agoAWS Security for StartersAs AWS and Security practitioners on large-scale AWS deployments, we’ve about seen it all. Most of these are very easy to implement and will go a very long way to ensuring your success on AWS.…surajraghuvanshi (25)in penetration • 7 years agoData Storage Security on AndroidThe protection of sensitive data, such as credentials, authentication tokens or private information(user information), is a key focus in mobile security. Public data should be available and…surajraghuvanshi (25)in hacking • 7 years agoBlueBorne attack - Hack into mobile phone via bluetoothBluetooth is complicated. Too complicated. Too many specific applications are defined in the stack layer, with endless replication of facilities and features. These over-complications are a direct…