Login
Discover
Waves
Decks
Plus
Login
Signup
SecurityInDomain
@surajraghuvanshi
25
Followers
64
Following
6
Resource Credits
Available
Used
Created
2017-09-14 06:29
RSS Feed
Subscribe
Blog
Blog
Posts
Comments
Communities
Wallet
surajraghuvanshi
nsa
2017-09-27 12:18
State of the Art technology developed used by NSA and CIA part 2
WALKOFF WALKOFF is an open source automation platform that enables users to easily integrate, automate and customize their processes enabling their environment to automatically adapt and respond to security
$ 0.000
1
3
surajraghuvanshi
security
2017-09-27 12:00
Cryptocurrency Malware RETADUP
RETADUP malware was identified recently in Israeli hospitals.. While RETADUP was found in Israeli hospitals, a new variant was targeting specific industries and governments in South America.The new RETADUP
$ 0.000
2
1
surajraghuvanshi
cryptocurrency
2017-09-25 09:03
Future of cryptocurrency
Among core problems in the US$150 billion business are how nations can apply the tax to cryptocurrency businesses and whether there should be checks on the ability for bitcoin and other virtual currencies
$ 0.000
1
1
surajraghuvanshi
nsa
2017-09-20 12:45
State of the Art technology developed by NSA
State of the Art technology developed by NSA (national security agency) There is contribution from NSA for computer socecity, specially in security domain. Today i am listing few of the tools developed
$ 0.039
2
2
surajraghuvanshi
cloud
2017-09-20 10:44
AWS Security for Starters
As AWS and Security practitioners on large-scale AWS deployments, we’ve about seen it all. Most of these are very easy to implement and will go a very long way to ensuring your success on AWS. Disable
$ 0.000
2
surajraghuvanshi
penetration
2017-09-14 09:06
Data Storage Security on Android
The protection of sensitive data, such as credentials, authentication tokens or private information(user information), is a key focus in mobile security. Public data should be available and accessible
$ 0.000
5
3
surajraghuvanshi
hacking
2017-09-14 06:30
BlueBorne attack - Hack into mobile phone via bluetooth
Bluetooth is complicated. Too complicated. Too many specific applications are defined in the stack layer, with endless replication of facilities and features. These over-complications are a direct result
$ 0.000
1