Video

  • Surveillance, Cyber Crime & Cyber Espionage

    Published on Feb 24, 2014 Panel: Howard Schmidt, former Special Assistant to the President, Cyber Security Coordinator at Executive Office…

    Read More »
  • STLR 2014 Symposium | Internet Torts & Cybercrimes

    On April 11, 2014, the Stanford Technology Law Review hosted it’s 2014 Symposium “Privacy Challenges in the Internet Age.” The…

    Read More »
  • “Big Data, Hacktivists & Cybercrime In The World Today 2014”

    Read More »
  • [Presentation] The Evolution of Online Banking Cybercrime

    បទបង្ហាញស្តីពី ការវិវត្តន៍នៃឧក្រិដ្ឋកម្មតាមប្រព័ន្ធបច្ចេកវិទ្យានៃ Online Banking លោក ​Richard Martin, ប្រធានផ្នែក Innovation នៅ Payments Council និយាយអំពីការវិវត្តន៍នៃ online banking cybercrime។ មេរៀននេះគឺត្រូវបានថតនៅពេលមានការសិក្សាមុខវិជ្ជា Ms Information Security…

    Read More »
  • Video – Stealing Facebook Token from Viber

    វិដេអូឃ្លីបង្ហាញពីការលួចយកនូវ Facebook Token ពីក្នុងកម្មវិធី Viber អ្នកស្រាវជ្រាវបានបង្ហាញនូវវិដេអូឃ្លីបនៅក្នុង YouTube ដែលបង្ហាញពីចំនុចខ្សោយដែលមាននៅក្នុងកម្មវិធីដ៏ពេញនិយមគឺ Viber សម្រាប់ iOS និង ​Android ចំពោះអ្នកទាំងឡាយណាដែលប្រើប្រាស់នូវ Facebook SDK សម្រាប់ធ្វើជា App Login ហើយនឹងរក្សាទុកនូវ…

    Read More »
  • Certified Ethical Hacker Video Training [75 Parts]

    វិេដអូបណ្តុះបណ្តាលស្តីពី Certified Ethical Hacker ខាងក្រោមនេះគឺជាខ្សែវិដេអូដែលបង្ហាញពីការបណ្តុះបណ្តាលស្តីវគ្គ Ethical Hacking (CEH) ដោយក្រុមហ៊ុន ​TrainSingle មានទាំងអស់ចំនួន ៧៥ វគ្គ។ សូមចូលរួមរៀនទាំងអស់គ្នា

    Read More »
  • File upload vulnerability (PHP cmd shell)

    ចំនុចខ្សោយដែលមាននៅក្នុង File Upload សម្រាប់អ្នកអភិវឌ្ឍន៍វិបសាយដោយប្រើប្រាស់ PHP វិដេអូខាងលើនេះបង្ហាញអ្នកពីវិធីសាស្ត្រដែលអ្នកវាយប្រហារធ្វើការបញ្ជូន (upload) file PHP command shell (ដែលយើងអាចហៅម្យាងទៀតថា ជា back-door ឬមេរោគ) ចូលទៅក្នុងវិបសាយ ឬប្រព័ន្ធ។ នេះគឺបញ្ជាក់អំពីចំនុចខ្សោយ (vulnerability) ដែលមាននៅក្នុងវិបសាយមួយឈ្មោះថា…

    Read More »
  • Web Warriors ~ CBC Documentary

    Uploaded on Feb 18, 2012 Enter the world of hackers and cyber sleuths. The internet is touted as one of…

    Read More »
  • Career Chat – Ethical Hacker

    Confused about your career? gyaniguy has friendly advice from young people who are having fun doing unique stuff. Lloyd Rodrigues…

    Read More »
  • [Presentation] Data Protection and Compliance: Where Encryption Applies

    Does your business face many industry and regulatory compliance mandates? Whether its PCI DSS, SOX, HPPA or FISMA, these regulations…

    Read More »
  • [Presentation] Why simple security is better security

    Experts from IANS and Sophos explain why enterprise-class security offerings are a bad bet for smaller businesses, give tips on…

    Read More »
  • WIRELESS LAN SECURITY MEGAPRIMER PART 16: CAFFE LATTE ATTACK BASICS

    Description: Welcome to Part 16 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…

    Read More »
  • WIRELESS LAN SECURITY MEGAPRIMER PART 15: WEP CRACKING

    Description: Welcome to Part 15 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…

    Read More »
  • WIRELESS LAN SECURITY MEGAPRIMER PART 14: WEP IN-DEPTH

    Description: Welcome to Part 14 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…

    Read More »
  • EXPLOIT RESEARCH MEGAPRIMER PART 5 FREESSHD BUFFER OVERFLOW

    Description: Welcome to Part 5 of the Exploit Research Megaprimer. Please begin this series by watching Part 1, if you have…

    Read More »
Back to top button