Africa CyberSecurity Conference

About Africa CyberSecurity Conference

This author has not yet filled in any details.
So far Africa CyberSecurity Conference has created 22 blog entries.
3 10, 2017

Insider fraud in the banking industry: What if we could help you prevent, detect and respond to insider fraud?

By | October 3rd, 2017|Conference|0 Comments

An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials. The hacker obtains access to the computer systems [...]

30 08, 2017

The Next Big Attack Landscape: Eye on SCADA

By | August 30th, 2017|Conference|0 Comments

This white paper explores the continuously expanding cyber-attack landscape through a profound analysis of the SCADA (Supervisory Control and Data Acquisition) Systems/ICS, their functionalities as well as the need to protect such systems from cyber-attacks to help safeguard the critical infrastructures

3 05, 2017

Hacker holds Netflix to ransom and threatens to release the entire new season of their hit drama “Orange is the New Black”

By | May 3rd, 2017|Conference, Cyber Security|0 Comments

Hacker 'The Dark Overload' claims to have stolen Season 5 of the hit series The hacker is threatening to release the series to file sharing services unless paid Netflix says that a small production company it worked with was breached The new episodes were scheduled to debut June 9 Netflix is counting on the show [...]

24 10, 2016

Questions to be asked

By | October 24th, 2016|Conference|0 Comments

Cyber threats constantly evolve with increasing intensity and complexity. The ability to achieve mission objectives and deliver business functions is increasingly reliant on information systems and the Internet, resulting in increased cyber risks that could cause severe disruption to a company’s business functions or operational supply chain,impact reputation, or compromise sensitive customer data and intellectual [...]

7 08, 2016

“Quadrooter” security flaws said to affect over 900 million Android devices

By | August 7th, 2016|Conference, Cyber Security|0 Comments

All versions of Android are vulnerable to these flaws, which won't be fully patched until the September security release next month. Four previously undisclosed security vulnerabilities found in Android phones and tablets that ship with Qualcomm chips could let a hacker take full control of an affected device. Almost a billion Android devices are affected [...]