Video
Breaking the chain of criminality: Fighting malware one link at a time
ការវាយប្រហារជាមួយនឹង malware បច្ចុប្បន្ន ហើយនឹងឧក្រិដ្ឋជនដែលឈរនៅពីក្រោយវា គឺមើលទៅហាក់ដូចជាសមរភូមិមួយដែលចាញ់ រួចបាត់ទៅហើយជាមួយនឹងការវាយប្រហារថ្មីៗ ដែលកើតឡើងគ្រប់ច្រកល្អក មានដូចជា drive-by-downloads, zero-day vulnerabilities and social enginnering។ សិក្សាពីការប្រើប្រាស់នៃយុទ្ធសាស្រ្ត ការពារច្រើនស្រទាប់ (multi-layer defense) អាចបង្កើននូវភាពលំបាកនៃការវាយប្រហារដោយឧក្រិដ្ឋជន ចូលមកក្នុងប្រព័ន្ធរបស់អ្នក។
Read More »2013 Symposium Panel: Cyberwarfare
Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…
Read More »Understanding NMap from Team Cymru
Today we talk with Fyodor, author of the network scanner NMAP. These short overviews will give you a good grounding…
Read More »DNS Amplification Attack
កាលពីពេលថ្មីនេះ មានការវាយប្រហារដ៏ធំមួយ ទំហំប្រមាណ 300GB ប្រឆាំងនឹង Spamhaus បានធ្វើឲ្យអ៊ិនធឺណែតយឺតជុំវិញពិភពលោក។ តើបច្ចេកទេសអ្វីដែល attackers បានប្រើប្រាស់ក្នុងការវាយប្រហរានោះ។ Attackers បានទាញយកប្រយោជន៍នៃចំនុចខ្សោយនៅក្នុង DNS protocol ដើម្បីធ្វើការបង្កើនទំហំ bandwidth វាយប្រហារទៅលើជនរងគ្រោះ ដែលបច្ចេកទេសនេះ គេហៅថា DNS…
Read More »Introducing Kaspersky Security for Mobile
This video provides an overview of Kaspersky Lab’s new set of Mobile Device Management technologies, designed to protect business data…
Read More »Malware World Map, ASCII Edition by F-Secure
ASCII interface, Linux distro, boots from USB drive.
Read More »The Exploit Intelligence Project
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…
Read More »Step-byStep SQL Injection Attack
*This video is intended for educational purposes only, no-one involved in the creation of this video may be held responsible…
Read More »-
Guide to Scary Internet Stuff: Drive-by Downloads
In this series explaining common internet security threats and how to avoid them, looks at Drive-by downloads.
Read More » -
Guide to Scary Internet Stuff: Underground Economy
In this Symantec Guide to Scary Internet Stuff looks at the Underground Cybercrime Economy and how to protect yourself.
Read More » -
Guide to Scary Internet Stuff: Viruses, Trojans & Worms
A series of guides looking at common security threats on the internet and what to do to protect against them,…
Read More » -
Wireshark Analysis – 3 Parts
ខ្សែវិដេអូនេះ នឹងបង្ហាញអ្នកអំពីមុខងារផ្សេងៗដែលមាននៅក្នុង Wireshark ដែលនឹងជួយអ្នក ក្នុងការចាប់យក packets ពីក្នុងបណ្តាញ។ វិដេអូនេះ នឹងផ្តល់ជាប្រយោជន៍ដល់អ្នក សម្រាប់ការជ្រើសរើស យកប្រភេទនៃ traffic ដែលនឹងត្រូវចាប់យកដោយ wireshark ផងដែរ។ ខ្សែវិដេអូនេះមានបីវគ្គ សូមយល់ដឹងទាំងអស់គ្នា។
Read More » -
Guide to Scary Internet Stuff: Botnets
The second in the series explaining common internet security threats and how to avoid them, looks at Botnets.
Read More » Stuxnet – Cyber Warfare
In June last year, a computer virus called Stuxnet was discovered lurking in the data banks of power plants, traffic…
Read More »Make Love No Cyberwar
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into…
Read More »