Video

  • International Engagement on Cyber Conference – GEORGETOWN UNIVERSITY

    http://www.youtube.com/watch?v=p76lBbWS6CQ http://www.youtube.com/watch?v=bjYXQBp7Wkg http://www.youtube.com/watch?v=KdLV5mZtVoo http://www.youtube.com/watch?v=oQZNOKwx6bU http://www.youtube.com/watch?v=cuETiVvhzfw http://www.youtube.com/watch?v=DU_ToA2sdVI

    Read More »
  • Busting wireless security myths

    Last year Sophos looked at Wi-Fi security by sending one chap right across London on a bicycle, and me on…

    Read More »
  • Information security training for new employees

    This animation was developed for partial fulfillment of MSc. computer science, systems security management (IS0729) module. This animation presents basic…

    Read More »
  • Today’s Corporate IT Security Threats

    Costin Raiu, Director of Kaspersky Lab’s Global Research & Analysis Team talks about the most important steps in the malware…

    Read More »
  • Modern Cyberwar

    Cyberwar has become one of the most-discussed and important topics in the IT security world during the last year. In…

    Read More »
  • The Implications of Global Cybersecurity in Today’s Corporate World

    Read More »
  • Keith Alexander: Perspectives on Cybersecurity

    Speaker: Keith Alexander, Commander, US Cyber Command Moderator: Anja Manuel, Principal, The RiceHadley Group, LLC As the head of United…

    Read More »
  • Cyber Threats and Cyber Security

    On February 19, 2013, the Richman Center hosted “Cyber Threats and Cyber Security” with Judith Germano, Chief of Economic Crimes,…

    Read More »
  • Breaking the chain of criminality: Fighting malware one link at a time

    ការវាយប្រហារជាមួយនឹង malware បច្ចុប្បន្ន ហើយនឹងឧក្រិដ្ឋជនដែលឈរនៅពីក្រោយវា គឺមើលទៅហាក់ដូចជាសមរភូមិមួយដែលចាញ់ រួចបាត់ទៅហើយជាមួយនឹងការវាយប្រហារថ្មីៗ ដែលកើតឡើងគ្រប់ច្រកល្អក មានដូចជា drive-by-downloads, zero-day vulnerabilities and social enginnering។ សិក្សាពីការប្រើប្រាស់នៃយុទ្ធសាស្រ្ត ការពារច្រើនស្រទាប់ (multi-layer defense) អាចបង្កើននូវភាពលំបាកនៃការវាយប្រហារដោយឧក្រិដ្ឋជន ចូលមកក្នុងប្រព័ន្ធរបស់អ្នក។

    Read More »
  • 2013 Symposium Panel: Cyberwarfare

    Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…

    Read More »
  • Understanding NMap from Team Cymru

    Today we talk with Fyodor, author of the network scanner NMAP. These short overviews will give you a good grounding…

    Read More »
  • DNS Amplification Attack

    កាលពីពេលថ្មីនេះ មានការវាយប្រហារដ៏ធំមួយ ទំហំប្រមាណ 300GB ប្រឆាំងនឹង Spamhaus បានធ្វើឲ្យអ៊ិនធឺណែតយឺតជុំវិញពិភពលោក។ តើបច្ចេកទេសអ្វីដែល attackers បានប្រើប្រាស់ក្នុងការវាយប្រហរានោះ។ Attackers បានទាញយកប្រយោជន៍នៃចំនុចខ្សោយនៅក្នុង DNS protocol ដើម្បីធ្វើការបង្កើនទំហំ bandwidth វាយប្រហារទៅលើជនរងគ្រោះ ដែលបច្ចេកទេសនេះ គេហៅថា DNS…

    Read More »
  • Introducing Kaspersky Security for Mobile

    This video provides an overview of Kaspersky Lab’s new set of Mobile Device Management technologies, designed to protect business data…

    Read More »
  • Malware World Map, ASCII Edition by F-Secure

    ASCII interface, Linux distro, boots from USB drive.

    Read More »
  • The Exploit Intelligence Project

    In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…

    Read More »
Back to top button