<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Sat, 16 May 2026 10:45:36 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@surajraghuvanshi/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[State of the Art technology developed used by NSA and CIA part 2]]></title><description><![CDATA[WALKOFF WALKOFF is an open source automation platform that enables users to easily integrate, automate and customize their processes enabling their environment to automatically adapt and respond to security]]></description><link>http://direct.ecency.com/nsa/@surajraghuvanshi/state-of-the-art-technology-developed-used-by-nsa-and-cia-part-2</link><guid isPermaLink="true">http://direct.ecency.com/nsa/@surajraghuvanshi/state-of-the-art-technology-developed-used-by-nsa-and-cia-part-2</guid><category><![CDATA[nsa]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Wed, 27 Sep 2017 12:18:48 GMT</pubDate><enclosure url="https://i.ecency.com/p/PB8ro82ZpZP5xqHVTtgzxr9jRnPYTxeDK7ZMexdNhUY5JjCZRt9nHmzcwZPkHzS3RWRPVmo4gZcFB7bFoHNxp3ibK6Z1XVad9bthVhMEuDx3RMiE?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cryptocurrency Malware RETADUP]]></title><description><![CDATA[RETADUP malware was identified recently in Israeli hospitals.. While RETADUP was found in Israeli hospitals, a new variant was targeting specific industries and governments in South America.The new RETADUP]]></description><link>http://direct.ecency.com/security/@surajraghuvanshi/cryptocurrency-malware-retadup</link><guid isPermaLink="true">http://direct.ecency.com/security/@surajraghuvanshi/cryptocurrency-malware-retadup</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Wed, 27 Sep 2017 12:00:54 GMT</pubDate><enclosure url="https://i.ecency.com/p/3W72119s5BjWPGGUiZ9pqnZoj8JHYxCCp9dtn2QVevij6KwsnCmnv77Rra6UzHrrRvjvffs5Us9JSG1y5XnLDLvCyhANXn6hNeLEXXVHF3jaDocrvSKzPg?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Future of cryptocurrency]]></title><description><![CDATA[Among core problems in the US$150 billion business are how nations can apply the tax to cryptocurrency businesses and whether there should be checks on the ability for bitcoin and other virtual currencies]]></description><link>http://direct.ecency.com/cryptocurrency/@surajraghuvanshi/future-of-cryptocurrency</link><guid isPermaLink="true">http://direct.ecency.com/cryptocurrency/@surajraghuvanshi/future-of-cryptocurrency</guid><category><![CDATA[cryptocurrency]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Mon, 25 Sep 2017 09:03:09 GMT</pubDate><enclosure url="https://i.ecency.com/p/Zskj9C56UondJxcjVaienfhVaNb7LJVWG6e787gZwz5ZKLkp81dmWZ9urfER5Ej1RAgneYLjnHrW38vgakmNeD5iqxpCBFXSN8uKqHS6RT5GFxBqtx46?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[State of the Art technology developed by NSA]]></title><description><![CDATA[State of the Art technology developed by NSA (national security agency) There is contribution from NSA for computer socecity, specially in security domain. Today i am listing few of the tools developed]]></description><link>http://direct.ecency.com/nsa/@surajraghuvanshi/state-of-the-art-technology-developed-by-nsa</link><guid isPermaLink="true">http://direct.ecency.com/nsa/@surajraghuvanshi/state-of-the-art-technology-developed-by-nsa</guid><category><![CDATA[nsa]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Wed, 20 Sep 2017 12:45:57 GMT</pubDate><enclosure url="https://i.ecency.com/p/PB8ro82ZpZP5xqHVTtgzxr9jRnPYTxeDK7ZMexdNkgbVHoxwVXsZoM3fuymRZ7gtrfXVdJobQCf7rj6M3ngdv9rzpAAD6CdtuN9iqazXTJEDNa6z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AWS Security for Starters]]></title><description><![CDATA[As AWS and Security practitioners on large-scale AWS deployments, we’ve about seen it all. Most of these are very easy to implement and will go a very long way to ensuring your success on AWS. Disable]]></description><link>http://direct.ecency.com/cloud/@surajraghuvanshi/aws-security-for-starters</link><guid isPermaLink="true">http://direct.ecency.com/cloud/@surajraghuvanshi/aws-security-for-starters</guid><category><![CDATA[cloud]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Wed, 20 Sep 2017 10:44:09 GMT</pubDate></item><item><title><![CDATA[Data Storage Security on Android]]></title><description><![CDATA[The protection of sensitive data, such as credentials, authentication tokens or private information(user information), is a key focus in mobile security. Public data should be available and accessible]]></description><link>http://direct.ecency.com/penetration/@surajraghuvanshi/data-storage-security-on-android</link><guid isPermaLink="true">http://direct.ecency.com/penetration/@surajraghuvanshi/data-storage-security-on-android</guid><category><![CDATA[penetration]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Thu, 14 Sep 2017 09:06:06 GMT</pubDate><enclosure url="https://i.ecency.com/p/3W72119s5BjWPGGUiZ9pqnZoj8JHYxCCp9dtn2QVf9oZuPm5VRzE9VSizpMMCz8R8fXdFs8KTKCG3mL2B2bAMG17hRJc1vmEV3kC2ZgaB3HVBqXKyrDZR8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[BlueBorne attack - Hack into mobile phone via bluetooth]]></title><description><![CDATA[Bluetooth is complicated. Too complicated. Too many specific applications are defined in the stack layer, with endless replication of facilities and features. These over-complications are a direct result]]></description><link>http://direct.ecency.com/hacking/@surajraghuvanshi/blueborne-attack-hack-into-mobile-phone-via-bluetooth</link><guid isPermaLink="true">http://direct.ecency.com/hacking/@surajraghuvanshi/blueborne-attack-hack-into-mobile-phone-via-bluetooth</guid><category><![CDATA[hacking]]></category><dc:creator><![CDATA[surajraghuvanshi]]></dc:creator><pubDate>Thu, 14 Sep 2017 06:30:33 GMT</pubDate></item></channel></rss>