• Pronunciation Challenge
  • Saved
  • Search Vocabulary

Footer

Download on the App StoreGet it on Google Play

About

  • About Us
  • Our Learning Services
  • Join Us
  • FAQ
  • Hot Tags

Services

  • Pronunciation Challenge
  • Saved
  • Search Vocabulary
  • Blog

Channels

Levels

  • A1
  • A2
  • B1
  • B2
  • C1
  • C2

Privacy˙Terms˙
©2026 VoiceTube Corporation. All rights reserved

About Software Security results of 8,840

Relevance
What is Ransomware, How it Works and What You Can Do to Stay Protected02:46

What is Ransomware, How it Works and What You Can Do to Stay Protected


3327
B2
MQTT OpenHAB ESP8266 Door / Window Sensor: Software (Using WINDOWS)10:42

MQTT OpenHAB ESP8266 Door / Window Sensor: Software (Using WINDOWS)


17
B1
Introduction To Software Development LifeCycle | What Is Software Development? | Simplilearn05:33

Introduction To Software Development LifeCycle | What Is Software Development? | Simplilearn


10
B1
Prevent Ransomware35:34

Prevent Ransomware


3
B1
Heartbleed bug makes personal information vulnerable#網路安全遭受重大威脅 "心臟流血"漏洞可能讓你大量失血(隱藏字幕)01:48

Heartbleed bug makes personal information vulnerable#網路安全遭受重大威脅 "心臟流血"漏洞可能讓你大量失血(隱藏字幕)


1533
B1
China bans select US and Israeli cybersecurity tools: sources | REUTERS01:04

China bans select US and Israeli cybersecurity tools: sources | REUTERS


8
B1
Why Small Businesses are Easy Targets for Hackers | Inc.02:02

Why Small Businesses are Easy Targets for Hackers | Inc.


9374
B1
Could AI Disruption Fears Trigger a Software M&A Boom? | WSJ's Take On the Week26:52

Could AI Disruption Fears Trigger a Software M&A Boom? | WSJ's Take On the Week


67
A2
Should I Go Into Computer Science?02:21

Should I Go Into Computer Science?


302
B1
What is Cloud Computing03:20

What is Cloud Computing


529
B1
SolarWinds updates flagship software01:11

SolarWinds updates flagship software


3
B1
Suspected Chinese hackers breach U.S. networks01:35

Suspected Chinese hackers breach U.S. networks


8
B1
IT Security Tutorial - Comparing attack methods by OSI layer05:41

IT Security Tutorial - Comparing attack methods by OSI layer


12
B1
The U.S. Was Hacked for MONTHS, Here’s What We Know So Far04:15

The U.S. Was Hacked for MONTHS, Here’s What We Know So Far


9
B1
Using 'stalkerware' to spy on a colleague's phone - BBC News04:01

Using 'stalkerware' to spy on a colleague's phone - BBC News


14
B1
U.S. hacking attack reached into Microsoft, sources say01:29

U.S. hacking attack reached into Microsoft, sources say


15
B1
Apple - iPhone 5s - 全新的 Touch ID 指紋掃描感應器03:02

Apple - iPhone 5s - 全新的 Touch ID 指紋掃描感應器


1218
B2
How Secure Is The United States Power Grid?14:14

How Secure Is The United States Power Grid?


16
B1
Hands-On Practice on LinkedIn Learning with GitHub Codespaces01:46

Hands-On Practice on LinkedIn Learning with GitHub Codespaces


5
A2
Information Security... What you need to know04:49

Information Security... What you need to know


460
A2
Inside the AI Alien Hunting Project at Harvard15:14

Inside the AI Alien Hunting Project at Harvard


10
B1
Web Development Tutorial - Understanding your web host needs06:04

Web Development Tutorial - Understanding your web host needs


4
A2
Cloud Computing - IaaS Introduction (Infrastructure as a Service)22:22

Cloud Computing - IaaS Introduction (Infrastructure as a Service)


17
A2
Gmail users targeted in new scam | Sunrise03:30

Gmail users targeted in new scam | Sunrise


12804
B1
Cloud Computing Tutorial - Understanding the public cloud platform05:11

Cloud Computing Tutorial - Understanding the public cloud platform


11
B1
Quantum Teleportation Is Real, Here's How It Works03:52

Quantum Teleportation Is Real, Here's How It Works


11
B2
Your CPU Is Spying On You! Patch it Now! (Intel CPU Exploit Found)06:49

Your CPU Is Spying On You! Patch it Now! (Intel CPU Exploit Found)


15
B1
What Software Does a Software Engineer Use?07:45

What Software Does a Software Engineer Use?


11
A2
Is Minneapolis under surveillance during ICE surge? We went there to find out08:00

Is Minneapolis under surveillance during ICE surge? We went there to find out


10
B1
How Zoom became a household name05:43

How Zoom became a household name


14
B1
Spider-Man - Talon Sets Up Spider-Man (S1E4) | Movieclips03:04

Spider-Man - Talon Sets Up Spider-Man (S1E4) | Movieclips


20
A2
U.S. intelligence agencies say Russia likely behind hacking of government agencies01:37

U.S. intelligence agencies say Russia likely behind hacking of government agencies


8
B1
As TikTok ban looms, users turn to other Chinese-based platforms03:02

As TikTok ban looms, users turn to other Chinese-based platforms


27
B1
Ransomware, WhatsApp Spyware - CS50 Podcast, Ep. 529:08

Ransomware, WhatsApp Spyware - CS50 Podcast, Ep. 5


4
B1
Israel reopens Gaza's key Rafah border crossing with Egypt | BBC News03:52

Israel reopens Gaza's key Rafah border crossing with Egypt | BBC News


3
A2
Suspected Russian hackers spied on U.S. agencies01:43

Suspected Russian hackers spied on U.S. agencies


20
B1
JavaScript: Who, What, Where, Why and Next by Laurie Voss | JSConf EU 201944:55

JavaScript: Who, What, Where, Why and Next by Laurie Voss | JSConf EU 2019


3
B1
Ultra Ethernet Escaping the Chaos of Order presented by UEC16:59

Ultra Ethernet Escaping the Chaos of Order presented by UEC


18
B1
What's Your Information Worth To Hackers?03:30

What's Your Information Worth To Hackers?


23147
B1
CrowdStrike CEO: ‘We know what the issue is’ and are resolving it05:17

CrowdStrike CEO: ‘We know what the issue is’ and are resolving it


4044
B1
Anthropic’s Mythos: What It Is and What It Is Capable of08:21

Anthropic’s Mythos: What It Is and What It Is Capable of


3
B1
Musk Gets Mad at OpenAI and Apple02:53

Musk Gets Mad at OpenAI and Apple


12
B1
Some bad code just broke a billion Windows machines03:59

Some bad code just broke a billion Windows machines


2622
B1
White House warns of 'active threat' after Microsoft hack01:34

White House warns of 'active threat' after Microsoft hack


9
B1
Linux - SSH for Remote Administration20:51

Linux - SSH for Remote Administration


3
A2
Behind Crowdstrike's global IT meltdown and why the world remains vulnerable 🎧27:42

Behind Crowdstrike's global IT meltdown and why the world remains vulnerable 🎧


20
B1
  • 1
  • 2
  • 3
  • 4
  • 5
  • ...
  • 193