Video
International Engagement on Cyber Conference – GEORGETOWN UNIVERSITY
http://www.youtube.com/watch?v=p76lBbWS6CQ http://www.youtube.com/watch?v=bjYXQBp7Wkg http://www.youtube.com/watch?v=KdLV5mZtVoo http://www.youtube.com/watch?v=oQZNOKwx6bU http://www.youtube.com/watch?v=cuETiVvhzfw http://www.youtube.com/watch?v=DU_ToA2sdVI
Read More »Busting wireless security myths
Last year Sophos looked at Wi-Fi security by sending one chap right across London on a bicycle, and me on…
Read More »Information security training for new employees
This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic…
Read More »Today’s Corporate IT Security Threats
Costin Raiu, Director of Kaspersky Lab’s Global Research & Analysis Team talks about the most important steps in the malware…
Read More »Modern Cyberwar
Cyberwar has become one of the most-discussed and important topics in the IT security world during the last year. In…
Read More »Keith Alexander: Perspectives on Cybersecurity
Speaker: Keith Alexander, Commander, US Cyber Command Moderator: Anja Manuel, Principal, The RiceHadley Group, LLC As the head of United…
Read More »Cyber Threats and Cyber Security
On February 19, 2013, the Richman Center hosted “Cyber Threats and Cyber Security” with Judith Germano, Chief of Economic Crimes,…
Read More »Breaking the chain of criminality: Fighting malware one link at a time
ការវាយប្រហារជាមួយនឹង malware បច្ចុប្បន្ន ហើយនឹងឧក្រិដ្ឋជនដែលឈរនៅពីក្រោយវា គឺមើលទៅហាក់ដូចជាសមរភូមិមួយដែលចាញ់ រួចបាត់ទៅហើយជាមួយនឹងការវាយប្រហារថ្មីៗ ដែលកើតឡើងគ្រប់ច្រកល្អក មានដូចជា drive-by-downloads, zero-day vulnerabilities and social enginnering។ សិក្សាពីការប្រើប្រាស់នៃយុទ្ធសាស្រ្ត ការពារច្រើនស្រទាប់ (multi-layer defense) អាចបង្កើននូវភាពលំបាកនៃការវាយប្រហារដោយឧក្រិដ្ឋជន ចូលមកក្នុងប្រព័ន្ធរបស់អ្នក។
Read More »2013 Symposium Panel: Cyberwarfare
Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…
Read More »Understanding NMap from Team Cymru
Today we talk with Fyodor, author of the network scanner NMAP. These short overviews will give you a good grounding…
Read More »DNS Amplification Attack
កាលពីពេលថ្មីនេះ មានការវាយប្រហារដ៏ធំមួយ ទំហំប្រមាណ 300GB ប្រឆាំងនឹង Spamhaus បានធ្វើឲ្យអ៊ិនធឺណែតយឺតជុំវិញពិភពលោក។ តើបច្ចេកទេសអ្វីដែល attackers បានប្រើប្រាស់ក្នុងការវាយប្រហរានោះ។ Attackers បានទាញយកប្រយោជន៍នៃចំនុចខ្សោយនៅក្នុង DNS protocol ដើម្បីធ្វើការបង្កើនទំហំ bandwidth វាយប្រហារទៅលើជនរងគ្រោះ ដែលបច្ចេកទេសនេះ គេហៅថា DNS…
Read More »Introducing Kaspersky Security for Mobile
This video provides an overview of Kaspersky Lab’s new set of Mobile Device Management technologies, designed to protect business data…
Read More »Malware World Map, ASCII Edition by F-Secure
ASCII interface, Linux distro, boots from USB drive.
Read More »The Exploit Intelligence Project
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…
Read More »