stitcherLogoCreated with Sketch.
Get Premium Download App
Listen
Discover
Premium
Shows
Likes

Listen Now

Discover Premium Shows Likes

Cyber City Security Show

18 Episodes

27 minutes | Aug 19, 2017
Unpacking The Africa Country Benchmark Report - Get 20% Discount With ABR
ACBR assesses the performance of all 54 African countries in an 800-page infographic-driven report. It is a key resource for any business, government, organisation or institution that will find value in country-specific and comparative assessments of all 54 African countries. The report scores, ranks and insightfully assesses each country holistically, as well as across business, economic, political and social factors.
19 minutes | Jan 14, 2017
Interrogating The Credibility of US's Claim on Election Hacks By Russia
— Also, we look into the Election Hack Report of the United States: What You Need to Know as a politician, as an individual who may have a website or webservice who has some “things” from the DHS?FBI report found in your service.Africa Business Radio
50 minutes | Jan 14, 2017
2017, The Year of The First Ransomworm Attack
— This session we look at two main issues: 1. We look at the Top 17 Security Predictions for 2017; What will happen in 2017? Whether you prefer to call them cybersecurity forecasts or doom and gloom , it is a compilation of predictions from the world’s leading security firms around the world and the predictions. We may see one of the first Ransomworm attacks in 2017, we may also see the first state The first nation state cyber-attack will be conducted and acknowledged as an act of war 2. Also, we look into the Election Hack Report of the United States: What You Need to Know as a politician, as an individual who may have a website or webservice who has some “things” from the DHS?FBI report found in your service.Africa Business Radio
27 minutes | Jan 14, 2017
Top 17 Cyber Security Predictions for 2017
— We look at the Top 17 Security Predictions for 2017; What will happen in 2017? Whether you prefer to call them cybersecurity forecasts or doom and gloom , it is a compilation of predictions from the world’s leading security firms around the world and the predictions. We may see one of the first Ransomworm attacks in 2017, we may also see the first state The first nation state cyber-attack will be conducted and acknowledged as an act of warAfrica Business Radio
44 minutes | Dec 24, 2016
Cyber Security 2016; The Year In Retrospect
— The increase in digital presence in companies will substantially alter how security professionals approach data security. More than ever before, security professionals are now integrated with digital business decisions, and as such must work with business leaders to ensure the protection and safety of the organisation. Africa Business RadioAfrica Business Radio
16 minutes | Dec 24, 2016
Global Cyber Security 2016; Year of Repeatedly Broken Records
— "Every minute, we are seeing about half a million attack attempts that are happening in cyber space." -Derek Manky, Fortinet global security strategist Headless worms, machine-to-machine attacks, jailbreaking, ghostware and two-faced malware: The language of cybersecurity incites some levels of fear and 2016 has been execptional.Africa Business Radio
17 minutes | Dec 24, 2016
Vulnerability Disclosure 2016; The Plight of Security Researcher
— Arguments about what really is "responsible" disclosure. Web security researchers being dragged off in handcuffs for "knocks on the door," while software security researchers gleefully post proof-of-concept exploits publicly. Vulnerability researchers rallying to the cry of "no more free bugs," while software vendors waffle between "sure, we'll pay you," "no, but we'll send you a nice thank-you," and "that's extortion."Africa Business Radio
8 minutes | Dec 19, 2016
Vulnerability Presents Headphones as Privacy Risk.
— Researchers at Israel’s Ben Gurion University have created a piece of proof-of-concept code they call “Speake(a)r,” designed to demonstrate how determined hackers could find a way to surreptitiously hijack a computer to record audio even when the device’s microphones have been entirely removed or disabled.Africa Business Radio
10 minutes | Dec 19, 2016
How Smartphone App. Exposes Tesla Vulnerabiltiy
— Researchers at Norway-based security firm Promon have demonstrated how thieves with the necessary hacking skills can track and steal Tesla vehicles through the carmaker’s Android application.Africa Business Radio
6 minutes | Dec 19, 2016
OpenSource Software - The Vulnerability Blind Spot
— Open source software is software with source code that anyone can inspect, modify, and enhance. We explore some possible vulnerability bind spots that may constitute serious problem.Africa Business Radio
10 minutes | Dec 19, 2016
Connected Cars' Vulnerability - IoTs
— IOActive researchers found that half of the cyber vulnerabilities in connected vehicles could grant an attacker full or partial control of a vehicle, the majority of which could be fixed with an ounce of prevention. A connected car is a car that is equipped with Internet access, and usually also with a wireless local area network.[1][2] This allows the car to share internet access with other devices both inside as well as outside the vehicle. Often, the car is also outfitted with special technologies that tap into the internet or wireless LAN and provide additional benefits to the driver.Africa Business Radio
39 minutes | Dec 19, 2016
IoTs Vulnerabilities - Cars, Headphones etc
— In this rush to bring connected devices to market, security and privacy is often being overlooked,” said Craig Spiezle, OTA Executive Director and President. “If businesses do not make a systemic change we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings.Africa Business Radio
39 minutes | Dec 13, 2016
Recent Events in The Global Cyber Security Space
— Cyber City Security Show is an online radio show designed for businesses and individuals from all works of life who range from zero technical knowledge to expert knowledge in cyber concepts; helping them understand the intricacies of the world’s next biggest threat to humanity.Africa Business Radio
8 minutes | Nov 14, 2016
German Armed Forces Hacked into The Afghan mobile Operator
— Nations: Here we looked at the German Armed forces cyber unit hacking into the Afghan mobile operator in order to locate the Indian senior technical reporter’s location in an attempt to rescue her from a kidnap in Afghanistan. The question is how do we determine what is right in the cyber world? Would it be the motives or just the principles behind hacking without Authorization? Would it have been right for the German army to hack into mobile operator in Afghan whereas it would have been wrong if the German armed forces hacked into a united states mobile operator?Africa Business Radio
5 minutes | Nov 14, 2016
Legalising Weaponised Drones - Pre-Considerations
— Big Impact: On big impact, we looked at the issues of drone laws. In Q2, 2016, A gentleman was arrested for flying drones across the united states embassy in Sandton, persistently for 2 days, with states in the US – North Dakota passing into law the drone laws which allow for surveillance, how do we make sure that Africa is prepared for the influx of these drones by combating vulnerabilities from both hardware and software as well for these drones vis-à-vis the legal issues concerning who can own a drone and what he can do with the droneAfrica Business Radio
5 minutes | Nov 14, 2016
Facebook Declares Everyone Dead
— This section looked at Facebook and the bug that created a weird glitch on Friday which converted most Facebook accounts to a memorialized account. So in case you are an active user of Facebook, you may want to check if you are still alive! although Facebook has resolved this bug, you may want to double check if you are alive on FacebookAfrica Business Radio
7 minutes | Nov 14, 2016
Russia Banned LinkedIn on The Violation of Personal Data Law
— Trending Now!!!: This section looked at the closure of LinkedIn on Monday morning in Russia over a violation by LinkedIn to place the servers that host Russian people’s data in Russia. How this will affect LinkedIn operation in Africa with new acts like POPI was also discussed. Perhaps, LinkedIn needs to begin to look into POPI in South Africa so as to avoid these type of shutdown in Africa as well.Africa Business Radio
40 minutes | Nov 12, 2016
The Awakening Show - Cyber Security
— Nations: Here we looked at the German Armed forces cyber unit hacking into the Afghan mobile operator in order to locate the Indian senior technical reporter’s location in an attempt to rescue her from a kidnap in Afghanistan. The question is how do we determine what is right in the cyber world? Would it be the motives or just the principles behind hacking without Authorization? Would it have been right for the German army to hack into mobile operator in Afghan whereas it would have been wrong if the German armed forces hacked into a united states mobile operator? 2. Big Impact: On big impact, we looked at the issues of drone laws. In Q2, 2016, A gentleman was arrested for flying drones across the united states embassy in Sandton, persistently for 2 days, with states in the US – North Dakota passing into law the drone laws which allow for surveillance, how do we make sure that Africa is prepared for the influx of these drones by combating vulnerabilities from both hardware and software as well for these drones vis-à-vis the legal issues concerning who can own a drone and what he can do with the drone 3. Down to Home -- Trending Now!!!: This section looked at the closure of LinkedIn on Monday morning in Russia over a violation by LinkedIn to place the servers that host Russian people’s data in Russia. How this will affect LinkedIn operation in Africa with new acts like POPI was also discussed. Perhaps, LinkedIn needs to begin to look into POPI in South Africa so as to avoid these type of shutdown in Africa as well. 4. On a lighter note: This section looked at Facebook and the bug that created a weird glitch on Friday which converted most Facebook accounts to a memorialized account. So in case you are an active user of Facebook, you may want to check if you are still alive! although Facebook has resolved this bug, you may want to double check if you are alive on FacebookAfrica Business Radio
COMPANY
About us Careers Stitcher Blog Help
AFFILIATES
Partner Portal Advertisers Podswag
Privacy Policy Terms of Service Do Not Sell My Personal Information
© Stitcher 2022