Home Tranning - Hacking

Tranning - Hacking

All the blog posts about education and stuff

[RSA Conference Asia Pacific & Japan 2019] Fatal signs: 10 symptoms when you think...

After a recent success as a keynote speaker, Paula returns to the RSA Conference series with another valuable cybersecurity speech. Her session on July 18th revealed to you Fatal signs: 10 symptoms when you think you’ve been hacked.  >> Scroll down to view slides and tools from Paula’s session and gain even more valuable knowledge >>> As the new malware trends...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations. The vulnerability was discovered by Wordfence security team and the...

Hack Instagram – How Instagram was Hacked within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of your Instagram account within 10 minutes. Facebook and Instagram are frequently...

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

[RSA Conference Asia Pacific & Japan 2019] Overtake the hacker’s moves thanks to the...

Do you know that 87% of breached companies did not have security policies and they even did not implement any security awareness education program for employees?  If you took part in Paula Januszkiewicz’s keynote session at the RSA Conference...

Ad Inserter Plugin Let Hackers to Execute Arbitrary PHP Code

A critical remote code execution vulnerability in WordPress plugin Ad Inserter, let hackers execute arbitrary PHP code in the vulnerable installations.The vulnerability was discovered by Wordfence security team and the...

Hack Instagram – How Instagram was Hacked within 10 Minutes

A security researcher reported a critical vulnerability that allows malicious hackers to hack Instagram account and take complete control of your Instagram account within 10 minutes.Facebook and Instagram are frequently...

Docker Hub Hacked – Hackers Gained Access to 190,000 Users Accounts

Docker Hub Hacked, sensitive data more than 190,000 accounts may have exposed. Docker Hub discovered the unauthorized access to a single Hub database On Thursday, April 25th, 2019.Docker hub is...

How To Keep Your Mobile Safe From Cyber Security Threats

Mobile phones have become a part of everyday life, and their functionality continues to develop at a rapid pace. You can switch from monitoring work emails to playing the latest games, to live...

APLICATIONS

AI Robot Hands Can Now Study A Hundred Years To Rotate...

AI will now try to do things in the real world rather than on the internet. Dactyl successfully learned complex physical tasks by using...

HOT NEWS