video
Episode 6 – “Hacktivist”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 5 – “In It All The Way”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »Episode 4 – “Have You Seen This Boy?”
“2020” is the story about the near future based on an ICSPA report entitled Project 2020. This video project takes…
Read More »A day in the life of an Ethical Hacker
តើអី្វទៅដែលហៅថា Ethical Hacker ហើយការងារប្រចាំថ្ងៃរបស់ Ethical Hacker មានអ្វីខ្លះ? សូមទស្សនាខ្សែវិដេអូខ្លីនេះ ដែលនិយាយពីការងារ និងភារកិច្ចរបស់ ethical hacker។
Read More »Episode 1: “SWITCHED ON” by Trend Micro
Welcome to Republic of South Sylvania. Mobile and cloud based technology influence every interaction citizens make. See what happens when…
Read More »Be ready for future threats
លោក Eugene Kaspersky, ស្ថាបនិក និងជានាយកប្រតិបត្តិនៃ Kaspersky Lab បានផ្តល់កិច្ចសម្ភាសនិយាយអំពីអនាគតនៃកិច្ចការពារការគំរាមគំហែង និងអំពីវិធីសាស្ត្រដែល virtualization មានផលប៉ៈពាល់ដល់តម្រូវការនៃដំណោះស្រាយក្នុងពេលបច្ចុប្បន្ន។ នៅក្នុងវិដេអូខាងលើនេះ គឺមានសំណួរសំខាន់ៗដូចខាងក្រោម៖ • What is Kaspersky’s view on upcoming…
Read More »Network Security Fundamental from APNIC
នេះគឺជាឯកសារវិដេអូស្តីពីការបង្រៀនទៅលើប្រធានបទ មូលដ្ឋានគ្រឹះនៃសន្តិសុខបណ្តាញ “Network Security Fundamental” ដែលរៀបចំដោយ APNIC (Asia Pacific Network Information Center)។
Read More »-
Knowledge
What is BotNET?
តើអ្វីទៅជា BotNET? BotNET គឺជាបណ្តាញកុំព្យូទ័រជាច្រើនដែលត្រូវបានឆ្លងមេរោគ (មេរោគកុំព្យូទ័រ, key loggers, និងកម្មវិធីមិនល្អដទៃទៀត) ហើយត្រូវបានគ្រប់គ្រងពីចម្ងាយដោយឧក្រិដ្ឋជន ដែល ទូទៅដើម្បីផលប្រយោជន៍ហិរញ្ញវត្ថុ ឬក៏ដំណើរការវាយប្រហារទៅលើវិបសាយ ឬក៏បណ្តាញ។ បើសិនជាកុំព្យូទ័របស់អ្នកត្រូវបានឆ្លងដោយ botnet malware នោះវាធ្វើការទំនាក់ទំនង និងទទួលនូវពាក្យបញ្ជា អំពីអ្វីដែលវាត្រូវធ្វើពី ម៉ាស៊ីនមេ…
Read More » 2013 Symposium Panel: Cyberwarfare
Panelists: Alice Beauheim, currently on a one year sabbatical from the Office of the Director of National Intelligence; David Weissbrodt,…
Read More »Malware World Map, ASCII Edition by F-Secure
ASCII interface, Linux distro, boots from USB drive.
Read More »The Exploit Intelligence Project
In 2011, mass malware is still the most common source of compromise on corporate networks. Bots like Zeus, Gozi, and…
Read More »-
Awareness
Guide to Scary Internet Stuff: Viruses, Trojans & Worms
A series of guides looking at common security threats on the internet and what to do to protect against them,…
Read More » Make Love No Cyberwar
Does Kaspersky write malware or create cyberweapons? Let’s find out! Our undercover reporter tries to trick the Kaspersky team into…
Read More »-
Awareness
Are You Ready? Cyber Security. Evolved – Symantec
In less than 300 seconds you can experience the speed and intensity of a cyber attack. Today companies can defend…
Read More »