video

  • Introduction and Overview Information Security as e-Goverment

    Read More »
  • Episode 6 – “Hacktivist”

    “2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…

    Read More »
  • Episode 5 – “In It All The Way”

    “2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…

    Read More »
  • Episode 4 – “Have You Seen This Boy?”

    “2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…

    Read More »
  • A day in the life of an Ethical Hacker

    តើអី្វទៅដែលហៅថា Ethical Hacker ហើយការងារប្រចាំថ្ងៃរបស់ Ethical Hacker មានអ្វីខ្លះ? សូមទស្សនាខ្សែវិដេអូខ្លីនេះ ដែលនិយាយពីការងារ និងភារកិច្ចរបស់ ethical hacker។

    Read More »
  • Episode 1: “SWITCHED ON” by Trend Micro

    Welcome to Republic of South Sylvania. Mobile and cloud based technology influence every interaction citizens make. See what happens when…

    Read More »
  • Be ready for future threats

    លោក Eugene Kaspersky, ស្ថាបនិក និងជានាយកប្រតិបត្តិនៃ Kaspersky Lab  បានផ្តល់កិច្ចសម្ភាសនិយាយអំពីអនាគតនៃកិច្ចការពារការគំរាមគំហែង និងអំពីវិធីសាស្ត្រដែល virtualization មានផលប៉ៈពាល់ដល់តម្រូវការនៃដំណោះស្រាយក្នុងពេលបច្ចុប្បន្ន។ នៅក្នុងវិដេអូខាងលើនេះ គឺមានសំណួរសំខាន់ៗដូចខាងក្រោម៖ • What is Kaspersky’s view on upcoming…

    Read More »
  • Network Security Fundamental from APNIC

    នេះគឺជាឯកសារវិដេអូស្តីពីការបង្រៀនទៅលើប្រធានបទ មូលដ្ឋានគ្រឹះនៃសន្តិសុខបណ្តាញ “Network Security Fundamental” ដែលរៀបចំដោយ APNIC (Asia Pacific Network Information Center)។

    Read More »
  • Knowledge

    What is BotNET?

    តើអ្វីទៅជា BotNET? BotNET គឺជាបណ្តាញកុំព្យូទ័រជាច្រើនដែលត្រូវបានឆ្លងមេរោគ (មេរោគកុំព្យូទ័រ, key loggers, និងកម្មវិធីមិនល្អដទៃទៀត) ហើយត្រូវបានគ្រប់គ្រងពីចម្ងាយដោយឧក្រិដ្ឋជន ដែល⁣ ទូទៅដើម្បីផលប្រយោជន៍ហិរញ្ញវត្ថុ ឬក៏ដំណើរការវាយប្រហារទៅលើវិបសាយ ឬក៏បណ្តាញ។ បើសិនជាកុំព្យូទ័របស់អ្នកត្រូវបានឆ្លងដោយ botnet malware នោះវាធ្វើការទំនាក់ទំនង និងទទួលនូវពាក្យបញ្ជា អំពីអ្វីដែលវាត្រូវធ្វើពី ម៉ាស៊ីនមេ…

    Read More »
  • 2013 Symposium Panel: Cyberwarfare

    Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…

    Read More »
  • Malware World Map, ASCII Edition by F-Secure

    ASCII interface, Linux distro, boots from USB drive.

    Read More »
  • The Exploit Intelligence Project

    In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…

    Read More »
  • Awareness

    Guide to Scary Internet Stuff: Viruses, Trojans & Worms

    A series of guides looking at common security threats on the internet and what to do to protect against them,…

    Read More »
  • Make Love No Cyberwar

    Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into…

    Read More »
  • Awareness

    Are You Ready? Cyber Security. Evolved – Symantec

    In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend…

    Read More »
Back to top button