Awareness
Lunch Program | High Stakes in Cyber-Security
Published on Apr 29, 2014 Late last year, cyber-hacking hit the headlines after hackers stole about 40 million credit and debit…
Read More »OpenSSL Heartbeat (Heartbleed) Explained
ការពន្យល់ពី OpenSSL Heartbleed មាននូវចំនុចខ្សោយមួយដ៏ធំនៅក្នុង OpenSSL ដែលដំណើរការនូវ SSL/TLS Protocol (CVE-2014-0160). ចំនុចខ្សោយនេះគឺកើតឡើងត្រូវបាន គេស្គាល់ថាជា heartbeat extension ចំពោះ protocol នេះ ហើយវាមានផលប៉ះពាល់ទៅលើជំនាន់ 1.0.1 និង beta…
Read More »Understanding Heartbleed in Video
តើអ្វីទៅដែលហៅថា HeartBleed? វិដេអូឃ្លីបខាងលើនេះ អ្នកនឹងយល់ដឹងអំពីអ្វីទៅដែលហៅថា HeartBleed? HeartBleed ត្រូវបានគេរកឃើញថាមានចំនុចខ្សោយដែលអាចអនុញ្ញាតឲ្យមាន ការវាយប្រហារទៅលើ OpenSSL។ សូមទស្សនាទាំងអស់គ្នា
Read More »How Do You Start Your Career in Cybersecurity?
The third of a three-part series titled “How to Get Hired in Cyber: Making the Cut at ManTech.’ Defense contractor…
Read More »How botnet “command-and-control” works
Botnet command and control centers come in many different forms – here’s a breakdown of how it works and how…
Read More »An Interview with Vicente Diaz, Kaspersky Lab at Mobile World Congress
Published on Feb 27, 2014 Vicente Diaz of the Global Research and Analysis Team (GReAT) spoke with Kaspersky Daily to discuss…
Read More »Why encryption can be a pain and how we’re fixing that
Encryption often seems not worth the trouble – performance impact on users is just too great for many businesses. But…
Read More »Critical Infrastructure Protection: The Movie
The short video clip on critical infrastructure protection prepared for Kaspersky Security Analyst Summit 2014 #TheSAS2014
Read More »What is Hacking?
A short video on Hacking. This is to show that Hacking or Being a hacker is not always a bad…
Read More »Difference Between Viruses, Worms and Trojans
A short video to explain the difference between virus, worm and trojan horse.
Read More »Protect your Privacy Completely : Web Browsing with TAILS + Tor
Privacy advocates, people who believe in personal liberty, and tinfoil-hat conspiracy theorists, this free and open source system is for…
Read More »Network security threats explained: WiFi
James Lyne explains how hackers can take advantage of the mistakes that are commonly made when setting up wireless networks.
Read More »