🚀Techno teaching program🔑
84 subscribers
61 photos
5 videos
6 files
68 links
comedy,teaching,film,news and poem all in one
For more information contact admin @JWMATT
We drive the world!!!
website:https://tamirat-kebede.jimdosite.com/
Download Telegram
The Hacker News Daily Updates

8 Real World Use Cases for SOAR e-book

Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team's tasks with security orchestration, automation and response (SOAR).

Download NowSponsoredLATEST NEWSJun 12, 2019

When Time is of the Essence – Testing Controls Against the Latest Threats Faster

A new threat has hit head the headlines (Robinhood anyone?), and you need to know if you're protected right now. What do you do? Traditionally, you would have to go with one of the options below. Option 1 – Manually check that IoCs have been updated across your security controls. This would ...

Read More

RAMBleed Attack – Flip Bits to Steal Sensitive Data from Computer Memory

A team of cybersecurity researchers yesterday revealed details of a new side-channel attack on dynamic random-access memory (DRAM) that could allow malicious programs installed on a modern system to read sensitive memory data from other processes running on the same hardware. Dubbed RAMBleed and ...

Read More

Microsoft Releases June 2019 Security Updates to Patch 88 Vulnerabilities

After Adobe, the technology giant Microsoft today—on June 2019 Patch Tuesday—also released its monthly batch of software security updates for various supported versions of Windows operating systems and other Microsoft products. This month's security updates include patches for a total of 88 ...

Read More

Adobe Issues Critical Patches for ColdFusion, Flash Player, Campaign

It's Patch Tuesday week! Adobe has just released the latest June 2019 software updates to address a total 11 security vulnerabilities in its three widely-used products Adobe ColdFusion, Flash Player, and Adobe Campaign. Out of these, three vulnerabilities affect Adobe ColdFusion, a commercial ...

Read More

New Flaw in WordPress Live Chat Plugin Lets Hackers Steal and Hijack Sessions

Security researchers have been warning about a critical vulnerability they discovered in one of a popular WordPress Live Chat plugin, which, if exploited, could allow unauthorized remote attackers to steal chat logs or manipulate chat sessions. The vulnerability, identified as CVE-2019-12498, ...

Read More

8 Real World Use Cases for SOAR e-book

Less than 1 percent of critical security alarms are ever investigated. Automate 80-90 percent of your team's tasks with security orchestration, automation and response (SOAR).

Download NowSponsored

This email was sent to tmrtkebede@gmail.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here. 

Contact The Hacker News: info@thehackernews.com 
Unsubscribe 

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

 
The Hacker News Daily Updates

The Cyber Risk Handbook - Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For a Limited Time

This resource is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise.

Download NowSponsoredLATEST NEWSMar 18, 2019

Round 4 — Hacker Puts 26 Million New Accounts Up For Sale On Dark Web

A hacker who was selling details of nearly 890 million online accounts stolen from 32 popular websites in three separate rounds has now put up a fourth batch of millions of records originating from 6 other sites for sale on the dark web. The Hacker News today received a new email from the ...

Read More

Patched WinRAR Bug Still Under Active Attack—Thanks to No Auto-Updates

Various cyber criminal groups and individual hackers are still exploiting a recently patched critical code execution vulnerability in WinRAR, a popular Windows file compression application with 500 million users worldwide. Why? Because the WinRAR software doesn't have an auto-update feature, ...

Read More

Telegram Gained 3 Million New Users During WhatsApp, Facebook Outage

WhatsApp, Facebook, and Instagram faced a widespread outage yesterday with users from around the world reporting issues with sending messages on WhatsApp and Messenger, posting feeds on Facebook and accessing other features on the three Facebook-owned platforms. While the outage was quite ...

Read More

New WordPress Flaw Lets Unauthenticated Remote Attackers Hack Sites

If for some reason your WordPress-based website has not yet been automatically updated to the latest version 5.1.1, it's highly recommended to immediately upgrade it before hackers could take advantage of a newly disclosed vulnerability to hack your website. Simon Scannell, a researcher at RIPS ...

Read More

Zero-Day Flaws in Counter-Strike 1.6 Let Malicious Servers Hack Gamers' PCs

If you are a Counter-Strike gamer, then beware, because 39% of all existing Counter-Strike 1.6 game servers available online are malicious that have been set-up to remotely hack gamers' computers. A team of cybersecurity researchers at Dr. Web has disclosed that an attacker has been using ...

Read More

The Cyber Risk Handbook - Creating and Measuring Effective Cybersecurity Capabilities ($43 Value) FREE For a Limited Time

This resource is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise.

Download NowSponsored

This email was sent to tmrtkebede@gmail.com. You are receiving this newsletter because you opted-in to receive relevant communications from The Hacker News. To manage your email newsletter preferences, please click here. 

Contact The Hacker News: info@thehackernews.com 
Unsubscribe 

The Hacker News | Pearls Omaxe, Netaji Subash Place, Pitampura, Delhi 110034 India

 
#Gurbaan_Caaalaa jedhamu intala jaallatu takka jalaa #power_bank erga hatee booda ishii dhokata. Guyyaa tokko manatti dhufteef

#intala:-Obbolleessoo caalaan essaa jira?

#Obbolleessa_caalaa:-Jeneneetara irratti mobaayila isaa chaarjii gochuu deeme,😂

Sponser @Orovine1
Forwarded from Top Tech (ᗰᏆᏦᏆ)
This media is not supported in your browser
VIEW IN TELEGRAM
Feeling like a real😱👍😂
🔰Wondershare Filmora v8.7.6.2 64bit🔰

🌀Extremely intuitive and easy to use video editing software. With wide range of powerful editing tools and effects.

@hackers_camp
[Robert_B._Cialdini]_Influence_Science_and_Practice.epub.7z
1.9 MB
Hello everyOne today i want to share a extremly useful psychological book that you can use whether you are Student, professional, Busines person or work at home YOU NEED TO READ THIS BOOK VERY WISELY, it will teach about influence, how to dominate and be a leader further more you'll not be vulnerable for future influnece tricks.Thanks, @XCIC
breacking news
Cybersecurity researchers discover a critical flaw in the popular Evernote Chrome extension that could have allowed hackers to hijack your browser and steal sensitive information from any website you accessed. Ever note is a popular service that helps people taking notes and organize their to-do ...
🇮🇸🇰🇾🇱🇷What are the problems you face when you wanna apply for scholarship??
Which college or university fits me?
Which country is better??🇦🇨🇦🇮🇦🇺🇨🇦( USA, CANADA, DUBAI UK, AUSTRALIA, CHINA, POLAND, GERMANY, and more )
How can i apply??
How can i save my time, energy and money and get the scholarship I want??
How do I get scholarship without paying much money??
Most of us have this questions when trying to apply for scholarship??
But we have good news u came exactly to the right place because that is our job we consult you?
Which country?
Which college???
Help you get part time jobs.
🔶️🔶️what is more?
🔻🔻This is not just for undergraduates,postgraduates.. It is for all for including highschool and other higher levels.
So If you need work visa ,scholarship visa ,business visa,tourist visa..contact us
This is not just fake advertisements.
💯💯We are 100% guaranteed because this is our job.
contact us @fiyameta900
📱📞Call or inbox +251965208029/ and join my channel for more updates @tmrtkebede@gmail.com
🎓🎓🎓🎓🎓🎓🎓
#Facebook hacking

🔆#facebook account እንዴት Hack እንደሚደረግ እናያለን።

በመጀመሪያ ልነግራችሁ ምወደው የፌስቡክ አካውንት እኛ ራሳችን #ሀክ ማድረግ አንችልም፤ ሆኖም ግን አውቆትም ሆነ አታለነው ባለ አካውንቱ በአንድም ሆነ በሌላ መንገድ እንዲተባበረን በማድረግ ወደ አካውንቱ ሰብረን መግባት እንችላለን ይህም #Facebookphishing ይባላል።

🔆ከፌስቡክ phishing መንገዶች ዋናዎቹ...

1. #Facebook የተሰራበት #html ፋይል ላይ የ3 ወይንም የ4 መስመር ጥቂት ማስተካከያዎችን በማድረግ password reset ማድረግ እንችላለን።

👆ይህን ለማድረግ username or phone number ማወቅ ይጠበቅብናል።

💢እንዴት ማድረግ እንደምትችሉ እዚህ ጋር ለመፃፍ ስለማልችል ከታች አጭር #ቪዲዩ እለቃለሁ ተመልከቱት።

2. ወደ አካውንቱ #ሊንክ በመላክ 📤

💢ይህን ስራ ለመስራት የሚጠቅሙን ዌብሳይቶች አሉ፤ እነሱ ጋር #regisrer በማድረግ በዌብሳይቱ ላይ የራሳችን አካውንት እና ለሰውየው የሚላክ ሊንክ ይሰጡናል።

💢ይሄን ሊንክ ሰውየው ሲከፍተው በቅፅበት አካውንቱ የጋራችን ሆነ 👏 ማለት ነው።

💢እስከዛሬ ፌስቡክ ስንጠቀም ይሄን እንድታዩ 😱 ይሄ እንዲመጣላችሁ 🙀 ሊንኳን ይጫኗት 👆 በሚሉ አጭቤዎች የምን ያህሎቻችን አካውንት ከነሱ ጋር የጋራ እንደሆነ ቤት ይቁጠረው (ማለቴ ፌስቡክ ይቁጠረው። 😜

💢እንዴት ለሚለው ከታች 👇 ያለውን አጭር #ቪዲዩ ይመልከቱ። (መርጠን ያመጣንላችሁ ቪድዩ ነው)

3. የፌስቡክን አፕ የሚመስል አፕ በመስራት

💢ይህን ለማድረግ የግድ #applicationdevelopment ላይ ጎበዝ መሆን አይጠበቅብዎትም፤ ከታች ያለው ሊንክ ላይ ይግቡና ራሳቸው የሰሩት አፕ አለ ✔️ እሱን ይጠቀሙ።
👇👇👇
(www.xplace.com)

4.#domainname (www.Facebook.com) የሚለውን በሌላ ከሱ ጋር የሚመሳሰል ለዚህ ስራ ቀድመን ያዘጋጀነውን ሀሰተኛ #domainname (www.facebok.com) or (www.faceebook.com) ወይም ሌላ ከ Facebook.Com ጋር ስሙ የሚቀራረብ #domain_name በመስጠት ፌስቡክን የሚመስል website እንሰራና እሱ ላይ #username and #password እንዲያስገባልን ማድረግ።

👆ይህ መንገድ ከሌሎቹ ከበድ የሚል ነው ምክንያቱም የራሳችንን Domain & Web Hosting ማዘጋጀት ይኖርብናል፤ ሆኖም ግን አስተማማኝ 👍 ነው።

ከላይ ካሉት መንገዶች የቀለላችሁን በመጠቀም ወደአካውንቱ 👨‍💻 መግባት ትችላላችሁ።


💢💢💢💢💢💢💢💢💢💢
Channel name was changed to «TechnoTeaching program»
Guyyaa boruurra kaasuun waantoota ajaa'ibaa linkin kana gadi jiruun qofa hordoofa @viruschannelteaching
Pls pls teredugni this channel used for educational purpose only
🔰PhoneSploit Tool🔰

Ⓜ️ Hack Android Devices just with an IP address using ADB connect feature. You can also exploit millions of devices from Shodan using this tool.

🔻LINK - bit.ly/2HNL4lX

@viruschannelteaching😱
Feta lemalat jion
@Yonivines
Channel photo updated
Forwarded from Top Tech (ᗰᏆᏦᏆ)
KMSAuto net@freecodecs.zip
5.5 MB
Easy way to activate ur windows 10 install this app in ur pc
@hackers_camp
Pls read.
Reading make u fantastic

💥 What is cyber-crime? what types of cyber security threats are being witnessed by the world today? Explain India’s attempts to tackle these issues 💥introduction:
Cybercrime is a criminal action that encompasses mobile phones, laptop, network, and computer.  It is a threat to country’s external and internal security and monetary status. Crimes committed against publics with an illicit intention to cause physical or psychological harm, or loss to the victim directly or indirectly, by means of contemporary telecommunication networks such as social media network, the Internet and mobile phones.

Body:
Types of cyber security threats: Cyber Security is protecting cyber space including critical information infrastructure from attack, damage, misuse and economic espionage.
India’s attempts to tackle these issues:
Information Technology Act, 2000
The act regulates use of computers, computer systems, computer networks and also data and information in electronic format.
The act lists down among other things, following as offences:
Tampering with computer source documents.
Hacking with computer system
Act of cyber terrorism i.e. accessing a protected system with the intention of threatening the unity, integrity, sovereignty or security of country.
Cheating using computer resource etc.
Strategies under National Cyber Policy, 2013
Creating a secure cyber ecosystem.
Creating mechanisms for security threats and responses to the same through national systems and processes.

National Computer Emergency Response Team (CERT-in) functions as the nodal agency for coordination of all cyber security efforts, emergency responses, and crisis management.

Securing e-governance by implementing global best practices, and wider use of Public Key Infrastructure.

Protection and resilience of critical information infrastructure with the National Critical Information Infrastructure Protection Centre (NCIIPC) operating as the nodal agency.

NCIIPC has been created under Information Technology Act, 2000 to secure India’s critical information infrastructure. It is based in New Delhi.

Promoting cutting edge research and development of cyber security technology.

Human Resource Development through education and training programs to build capacity.

Cyber Surakshit Bharat Initiative: It was launched in 2018 with an aim to spread awareness about cybercrime and building capacity for safety measures for Chief Information Security Officers (CISOs) and frontline IT staff across all government departments.

National Cyber security Coordination Centre (NCCC): In 2017, the NCCC was developed. Its mandate is to scan internet traffic and communication metadata (which are little snippets of information hidden inside each communication) coming into the country to detect real-time cyber threats.

Cyber Swachhta Kendra: In 2017, this platform was introduced for internet users to clean their computers and devices by wiping out viruses and malware.
Training of 1.14 Lakh persons through 52 institutions under the Information Security Education and Awareness Project (ISEA) – a project to raise awareness and to provide research, education and training in the field of Information Security.

Way forward:
Real-time intelligence is required for preventing and containing cyber attacks.
Periodical ‘Backup of Data’ is a solution to ransomware.
Using Artificial Intelligence (AI) for predicting and accurately identifying attacks.
Using the knowledge gained from actual attacks that have already taken place in building effective and pragmatic defence.
Increased awareness about cyber threats for which digital literacy is required first.
India needs to secure its computing environment and IoT with current tools, patches, updates and best known methods in a timely manner.

The need of the hour for Indian government is to develop core skills in cyber security, data integrity and data security fields while also setting stringent cyber security standards toprotect banks and financial institutions.
🍁🍁
How to save data (coin)on telegram ?
Solved question is coming soon
At @viruschannelteaching only