Video

  • Breaking the chain of criminality: Fighting malware one link at a time

    ការវាយប្រហារជាមួយនឹង malware បច្ចុប្បន្ន ហើយនឹងឧក្រិដ្ឋជនដែលឈរនៅពីក្រោយវា គឺមើលទៅហាក់ដូចជាសមរភូមិមួយដែលចាញ់ រួចបាត់ទៅហើយជាមួយនឹងការវាយប្រហារថ្មីៗ ដែលកើតឡើងគ្រប់ច្រកល្អក មានដូចជា drive-by-downloads, zero-day vulnerabilities and social enginnering។ សិក្សាពីការប្រើប្រាស់នៃយុទ្ធសាស្រ្ត ការពារច្រើនស្រទាប់ (multi-layer defense) អាចបង្កើននូវភាពលំបាកនៃការវាយប្រហារដោយឧក្រិដ្ឋជន ចូលមកក្នុងប្រព័ន្ធរបស់អ្នក។

    Read More »
  • 2013 Symposium Panel: Cyberwarfare

    Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…

    Read More »
  • Understanding NMap from Team Cymru

    Today we talk with Fyodor, author of the network scanner NMAP. These short overviews will give you a good grounding…

    Read More »
  • DNS Amplification Attack

    កាលពីពេលថ្មីនេះ មានការវាយប្រហារដ៏ធំមួយ ទំហំប្រមាណ 300GB ប្រឆាំងនឹង Spamhaus បានធ្វើឲ្យអ៊ិនធឺណែតយឺតជុំវិញពិភពលោក។ តើបច្ចេកទេសអ្វីដែល attackers បានប្រើប្រាស់ក្នុងការវាយប្រហរានោះ។ Attackers បានទាញយកប្រយោជន៍នៃចំនុចខ្សោយនៅក្នុង DNS protocol ដើម្បីធ្វើការបង្កើនទំហំ bandwidth វាយប្រហារទៅលើជនរងគ្រោះ ដែលបច្ចេកទេសនេះ គេហៅថា DNS…

    Read More »
  • Introducing Kaspersky Security for Mobile

    This video provides an overview of Kaspersky Lab’s new set of Mobile Device Management technologies, designed to protect business data…

    Read More »
  • Malware World Map, ASCII Edition by F-Secure

    ASCII interface, Linux distro, boots from USB drive.

    Read More »
  • The Exploit Intelligence Project

    In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…

    Read More »
  • Step-byStep SQL Injection Attack

    *This video is intended for educational purposes only, no-one involved in the creation of this video may be held responsible…

    Read More »
  • Guide to Scary Internet Stuff: Drive-by Downloads

    In this series explaining common internet security threats and how to avoid them, looks at Drive-by downloads.

    Read More »
  • Guide to Scary Internet Stuff: Underground Economy

    In this Symantec Guide to Scary Internet Stuff looks at the Underground Cybercrime Economy and how to protect yourself.

    Read More »
  • Guide to Scary Internet Stuff: Viruses, Trojans & Worms

    A series of guides looking at common security threats on the internet and what to do to protect against them,…

    Read More »
  • Wireshark Analysis – 3 Parts

    ខ្សែវិដេអូនេះ នឹងបង្ហាញអ្នកអំពីមុខងារផ្សេងៗដែលមាននៅក្នុង Wireshark ដែលនឹងជួយអ្នក ក្នុងការចាប់យក packets ពីក្នុងបណ្តាញ។ វិដេអូនេះ នឹងផ្តល់ជាប្រយោជន៍ដល់អ្នក សម្រាប់ការជ្រើសរើស យកប្រភេទនៃ traffic  ដែលនឹងត្រូវចាប់យកដោយ wireshark ផងដែរ។ ខ្សែវិដេអូនេះមានបីវគ្គ សូមយល់ដឹងទាំងអស់គ្នា។

    Read More »
  • Guide to Scary Internet Stuff: Botnets

    The second in the series explaining common internet security threats and how to avoid them, looks at Botnets.

    Read More »
  • Stuxnet – Cyber Warfare

    In June last year, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic…

    Read More »
  • Make Love No Cyberwar

    Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into…

    Read More »
Back to top button