Click any of the episodes below for a 30-second episode sample of the highly acclaimed NINJIO AWARE attack vector training. Speak to a NINJIO security professional to get full episodes for further evaluation for your team.
SECURITY TOPIC
Generative A.I.
OVERVIEW
SECURITY TOPIC
Watering Hole Attacks
OVERVIEW
In a warning, the organization investigating cyberattacks on critical industrial operations said up to 15,000 industrial sites could be taken over by hackers. Watering hole attacks involve bad actors infecting a common location, such as an industry website, that intended victims trust and regularly visit.
SECURITY TOPIC
Personal Cloud Storage Risks
OVERVIEW
Android game developer, Ateam, recently announced 900,000 customers had their personal data exposed. The breach occurred due to Ateam employees’ improper use of the cloud storage service, Google Drive. Cloud storage, while convenient, comes with inherent risks and must be used with caution.
SECURITY TOPIC
Vishing
OVERVIEW
Cybercriminals are becoming more sophisticated in their approach, with Twilio becoming one of more than 130 organizations to fall victim to a large-scale VISHING and SMISHING campaign. The financial as well as emotional damage of such attacks can be extensive.
SECURITY TOPIC
Social Media Security Hygiene
OVERVIEW
Twitter and WhatsApp were recently breached, resulting in more than 500 million users having personal data stolen. Social media attacks provide new opportunities for bad actors to target user accounts with increasingly sophisticated attacks. In this episode, starring Robert Davi as our CFO, Jack, we learn about the malicious methods that bad actors use on social media to potentially infiltrate an organization. Watch to learn more about social media security hygiene and what you can do to protect yourself and your organization from social media attacks!
SECURITY TOPIC
Clone Phishing
OVERVIEW
News publisher, The Guardian, fell victim to a suspected phishing attack, through which the personal information of UK staff members was stolen. Phishing has evolved to include “clone phishing,” which is highly sophisticated and more difficult to spot.
SECURITY TOPIC
Physical Security
OVERVIEW
While cybersecurity threats sit at the forefront of everyone’s minds, a physical security breach can be every bit as damaging to an organization. In this episode, staring Joey Lawrence as Jeff, we learn about the methods often deployed by bad actors to infiltrate an organization via a physical security breach. Watch to learn more about physical security and what you can do to protect yourself and your organization from these kinds of attacks!
SECURITY TOPIC
Pig Butchering Scam
OVERVIEW
The ‘Pig Butchering Scam’ has become the scourge of the internet. A long con that tricks victims into sending money to fraudulent investment platforms, it has exploded to become the costliest scam out there, with victim losses totaling tens of billions of dollars worldwide. In this episode, starring Tia Carrere as Vivian, we learn how Pig Butchering Scams are executed by cyber criminals and the devastating effects this kind of scam has on its victims. Watch to learn more about Pig Butchering Scams and what you can do to protect yourself and your organization from these kinds of attacks!
SECURITY TOPIC
Deep Fake Audio Scam
OVERVIEW
A UK-based energy company was recently scammed out of $243,000 by hackers running a “Deep Fake Audio Scam,” a scam that uses artificial intelligence (A.I.) to replicate voices of people we know and trust. In this episode, starring Robert Davi as Louie Sr., we learn about how bad actors maliciously use artificial intelligence to run “Deep Fake Audio Scams”. Watch to learn more about how you can protect yourself and your organization from these kinds of attacks!
SECURITY TOPIC
Juice Jacking
OVERVIEW
Dish Network recently experienced an extended television service outage due to a cybersecurity incident. ‘Juice Jacking’, a method used by bad actors, can lead to such incidents. In this episode, starring Robert Wagner as the Announcer, we learn about juice jacking and how bad actors can deliver malware via public USB ports to victims’ mobile devices, and even infect entire networks. Watch to learn more about what you can do to protect yourself and your organization from these kinds of attacks!
SECURITY TOPIC
Artificial Intelligence Hygiene
OVERVIEW
As with every new technology, artificial intelligence (AI) comes with risks. Before utilizing the opportunities and rewards AI has to offer, it’s important to fully investigate its vulnerabilities in order to manage associated risks.
SECURITY TOPIC
Smishing
OVERVIEW
Global agencies have recently warned consumers of a major spike in SMS phishing, or “smishing,” attacks. One such campaign targeted customers of the multinational shipping company UPS.
SECURITY TOPIC
Social Media Account Cloning
OVERVIEW
Social media account cloning has become a growing problem that can affect even the most cautious of users. In fact, stay tuned after the quiz to hear about how NINJIO’s own founder, Zack Schuler, was impacted by this rising threat.
SECURITY TOPIC
Wrong Number Text
OVERVIEW
HCA Healthcare announced the theft of PII and other sensitive information from up to 11 million of their patients. A cautious approach to seemingly harmless baiting tactics can help prevent such data breaches.
SECURITY TOPIC
Vishing
OVERVIEW
Hotel and casino giant MGM Resorts reported losses from a recent vishing attack that exceeded 110 million dollars. Vishing involves a convincing phone call, rather than email, to trick targets into divulging sensitive information.
SECURITY TOPIC
2FA Bots
OVERVIEW
Security experts are seeing a massive increase in crimeware services available on the Dark Web. One example involves a “2FA Bot”, which intercepts two-factor authentication codes, allowing hackers to login to a victim’s sensitive websites such as banking and investment accounts, social media, and retirement platforms. In this episode, starring Joey Lawrence as HydroGen’s CEO Aaron Stark, you will learn about the various ways that crimeware services, such as automated bots, can be used to bypass multi-factor authentication methods.
SECURITY TOPIC
Malicious Apps
OVERVIEW
Over 300,000 Android users have been hit with Banking Trojan Malware that allows hackers to steal login credentials for banking websites. The malware was installed on victim devices when they downloaded malicious apps from the Google Play app store.
SECURITY TOPIC
Watering Hole Attacks
OVERVIEW
A major vulnerability called “Log4J” has left an alarming number of companies and software vendors exposed to extreme risk of compromise. The vulnerability allows bad actors to manipulate data, infect systems with malware, and potentially gain control of systems altogether. One example of how this attack may put an even wider group at risk is through watering hole attacks.
SECURITY TOPIC
Catphishing
OVERVIEW
The Netflix documentary “Tinder Swindler” has cast a spotlight on catfishing — spelled with an “f” — where con artists use romance to break hearts and bank accounts by tricking victims into sending money. Another variety is Catphishing — with a “ph” — where con artists trick corporate victims into sending sensitive information such as login credentials or access to sensitive data.
SECURITY TOPIC
Cybersecurity Culture
OVERVIEW
When geopolitical conflict is high, cyberthreats increase – making heightened awareness more critical than ever. Organizations that are successful in building a cybersecurity awareness culture have a greater chance of mitigating the risk, as everyone plays a crucial role. In this episode, with Joey Lawrence as Aaron Stark, you will learn about the importance of cultivating a strong cybersecurity awareness culture at your organization and the critical role each individual has in maintaining an organization’s security.
SECURITY TOPIC
Insider Threat
OVERVIEW
The cybercrime group – LAPSUS$ – made headlines recently by hacking such big name corporations as NVIDIA, Samsung, Microsoft and identity management platform — Okta. One vector LAPSUS$ used involves recruiting insiders through online advertisements offering to pay employees for access to their company’s network.
SECURITY TOPIC
Ransomware
OVERVIEW
Tire manufacturer, Bridgestone, recently experienced a ransomware attack that shut down production at its factories, putting added pressure on an already struggling supply chain. Ransomware attacks are increasing in sophistication and affecting thousands of organizations worldwide.
SECURITY TOPIC
Spear Phishing
OVERVIEW
Blockchain bridge, Horizon, recently revealed that hackers stole $100 million in cryptocurrency. Researchers speculate the breach was the result of a “private key compromise,” where hackers obtained the password required to gain access to a crypto wallet. Spear phishing is a common technique bad actors use to compromise such credentials.
SECURITY TOPIC
Call Center Scams
OVERVIEW
Flagstar Bank was compromised in a data breach that stole the personal information of more than 1.5 million customers. Call center scams are an increasingly prevalent threat that can lead to such incidents. In this episode, starring Tia Carrere as Heidi, you will gain direct insight into how common call center scams work. Watch to learn more about call center scams so you can identify and prevent these types of threats!
SECURITY TOPIC
Credential Hygiene
OVERVIEW
Networking & security giant, Cisco, revealed a threat actor breached their network by tricking one of their employees using a multi-prong targeted attack. Protecting your login credentials with good credential hygiene is paramount to effective security.
SECURITY TOPIC
Security Updates
OVERVIEW
Apple recently urged its users to update their iPhones, iPads and Mac computers after a security flaw allowed hackers to take over these devices. Updating your software in a timely manner is crucial to keeping your devices and information secure.
SECURITY TOPIC
Verify Before You Trust
OVERVIEW
Grand Theft Auto video game developer, Rockstar, and ride-share giant, Uber, both suffered recent, similar attacks that occurred within a few days of each other. Both incidents could have been avoided by employees adhering to a strict policy of – ‘verify before you trust.’
SECURITY TOPIC
Wire Fraud
OVERVIEW
Recently, hair salon company “Sport Clips” filed a lawsuit claiming a security breach at the company’s advertising firm led to a $541,000 payment being wired to a scammer. In this episode starring Jon Lovitz as Richard, the company mistakenly wires $600,000 to what appears to be the correct vendor, but had Richard done his due diligence by confirming the last minute change of account numbers with a phone call to the sender of the email, the fraudulent wire transfer could have been avoided. See what happens and learn how to protect yourself and your organization from attacks like this!
SECURITY TOPIC
Macro Malware
OVERVIEW
As the Coronavirus pandemic rages on, cybercriminals are becoming more and more savvy with leveraging current event attacks, to circumvent one’s better judgement. Email-based attacks promising new job opportunities, or lists of rehires, are becoming increasingly common. In this episode starring Jon Lovitz as Richard, a supposed “Rehire List” is emailed to him and – being that he has been unemployed for some time and eager to return to work – Richard hurriedly opens the document and enables macros without first verifying the file’s authenticity. Debbie, a coworker, helps him discover that the email and attached “Rehire List” were malicious in nature, and helps point out a few key ways to avoid macro-based attacks. See what happens and learn how to protect yourself from attacks like this!
SECURITY TOPIC
Privacy and PII
OVERVIEW
Food delivery service DoorDash suffered a data breach in which hackers stole the Personally Identifiable Information, or PII, of 4.9 million users. PII is valuable to cybercriminals because they sell it on the dark web and use it to commit various cybercrimes, such a credit card fraud and identity theft. In this episode starring Robert Davi as Louie Sr., we see that Louie has breached their way onto a food delivery service’s network, which granted them access to 3 million customer records. However, Louie ran into an issue while exfiltrating the data and has to call in an old business partner to help him out. Watch to find out who Louie calls and learn more about Privacy and PII!
SECURITY TOPIC
Push Notification Scams
OVERVIEW
An increasing number of websites are asking visitors to approve “push notifications.” In many cases these are harmless. But occasionally, the communication pathways these establish are exploited by cybercriminals. In this episode starring Tia Carrere as Cass, we see Cass help save her mother Doris from falling victim to a cybercrime via a push notification, supposedly from her bank’s website. Watch to learn more about push notifications and safe push notification interaction behavior.
SECURITY TOPIC
Job Post Scams
OVERVIEW
Social engineering is the manipulation of people’s emotions to trick them into divulging private information or performing actions they normally wouldn’t do. In this episode, Liz is managing a video project which she suspiciously hasn’t been paid for yet even though she and her team have just finished shooting the project. This sparks a conversation with her colleague Harlan – played by Alex Thomas – where Harlan informs Liz of social engineering through job post scams which can often be represented as great opportunities. Watch to learn more from Harlan and Liz about social engineering through job post scams.
SECURITY TOPIC
PII
OVERVIEW
The Personally Identifiable Information, also known as “PII” or “Personal Data”, of 26 million military veterans was stolen from the Veteran’s Administration after an employee took the data home on an unsecure device. Properly securing personal data and eliminating personal data is crucial to preventing such cybercrimes. In this episode, we get the follow-up story to 603’s “Louie Louie” and see Louie Sr. and son confront Nico to help them steal personal data. After some convincing, Nico agrees and we learn more about how this trio of bad actors were able to obtain sensitive information!
SECURITY TOPIC
Proactive Security Awareness
OVERVIEW
The hacking group “DarkSide” has claimed responsibility for the Colonial Pipeline ransomware attack, which disrupted fuel shipments to the entire Eastern Seaboard of the United States. When you encounter cyber threats, being proactive in reporting them is crucial to avoiding attacks such as this. In this episode we see Jeff Winston, an employee at Provincial Pipeline, encounter a suspicious email claiming to be an “urgent” software update. Stacy Keach portrays our news anchor who emphatically drives home the message: “If you see something, do something”. This resonates with Jeff, but he is still intrigued by that email he received. Will Jeff fall victim to this cyber-attack, or will he be a proactive cybersecurity citizen?
SECURITY TOPIC
Insider Threat
OVERVIEW
Insider threats are an increasing cybersecurity concern, with the number of incidents recently spiking. Urgency coupled with careless sharing of information represents a particular type of insider threat with potentially devastating effects. As this episode opens we see our pilot Maddie, played by Tia Carrere, begin to experience tough visibility in the air and radio in to her Central Command center for support. We quickly learn that they are dealing with a “Logic Bomb” – malicious code that hackers can plant in a system that will disrupt operations if it goes off. This means that Maddie will lose connection to Central Command if it goes off! Watch to learn more about how this “Logic Bomb” ended up in their system via an insider threat and if the Central Command team can disable it in time!
SECURITY TOPIC
Passphrase Protection
OVERVIEW
Kaseya, a supplier of IT software, became the victim of the largest ransomware attack on record. Also known as a “supply chain” attack, it spread from Kaseya to roughly 1,500 of their client companies, impacting users all over the globe. This episode opens with a young boy who is rushing his sick mother into a pharmacy in São Paulo, Brazil. We quickly learn that the pharmacist is unable to access the patient files due to a ransomware attack, which unfortunately is only the beginning to this nightmare scenario. Through the investigation, led by an Interpol Officer played by Damian Chapa, we learn more about passphrase security and the risk of supply chain cyberattacks!
SECURITY TOPIC
Stored Document Integrity
OVERVIEW
Wire fraud in the real estate sector has seen an ~1100% increase in recent years. Most are attributable to Business Email Compromise, where fraudsters assume the identity of the real estate agent, escrow officer, or closing solicitor. As hackers continue to invent new ways of scamming people, including using malware to manipulate sensitive documents, the number of victims could rise even further. As this episode opens, we see an escrow/solicitor’s office buzzing with anxious energy as it’s brought to Sam’s attention – as portrayed by Alex Thomas – that six of their clients have unknowingly been given fraudulent wiring instructions in one single day. Upon further investigation by Sam and Rebecca, we find out that the culprit was not the usual “Business Email Compromise”, but actually a piece of malware that scans documents for the word “Wire” and then alters the document with the hacker’s account and routing numbers. Watch to learn more about Stored Document Integrity and verifying before you trust!
SECURITY TOPIC
Identity Protection
OVERVIEW
Cell service provider T-Mobile was recently hacked, resulting in the theft of personal information of 50 million customers. Incidents like these are becoming increasingly common, making it more and more likely each of us had – or will have – our data stolen. Knowing how to protect your identity can help mitigate the damage. This episode, starring celebrity actor Andrew Lawrence as “Mike”, tells a story about the potential ways one’s identity can get stolen and how to proactively and reactively take action to protect yourself.
SECURITY TOPIC
QR Code Phishing
OVERVIEW
Grand Theft Auto video game developer, Rockstar, and ride-share giant, Uber, both suffered recent, similar attacks that occurred within a few days of each other. Both incidents could have been avoided by employees adhering to a strict policy of – ‘verify before you trust.’
SECURITY TOPIC
Telephone Scams
OVERVIEW
Telephone scams play off your emotions, creating urgency and legitimacy. Lloyd had a gut feeling that there was a problem, but key details convinced him otherwise.
SECURITY TOPIC
Macy’s Breach
OVERVIEW
Hackers are thorough and research their targets – they just need the perfect opportunity to come along. When a new employee at Lacy’s posted about their new job status, hackers took note. All they needed was an easy to crack, recycled password.
SECURITY TOPIC
Business Email Compromise
OVERVIEW
Hackers can be patient threat actors – They can lie dormant in compromised email accounts, watching and learning everything about you until they identify an opportunity to execute an attack. In this episode, we learn to never let our guard down with seemingly benign sensitive requests, especially when urgency is involved.
SECURITY TOPIC
Physical Security
OVERVIEW
With the increase of employees working from home and social distancing in place if you are working at an office, physical security becomes increasingly more important. In this episode, we learn why it is important to stay vigilant and adhere to physical security policies, as well as stay alert for suspicious behavior. Threat actors count on employees being overly courteous and trusting of others. It’s imperative to report any violations of a policy that could put your company at risk, regardless of deadlines or how convincing a person may be.
SECURITY TOPIC
Email Attachment Threats
OVERVIEW
Hackers attempt to take advantage of people’s fear, curiosity, and goodwill during times of crisis. In this episode we learn how email attachment threats can result in devastating consequences. Watch how a bad actor steals a family’s entire savings after an unsuspecting user opens an unknown file attachment promising information about COVID-19.
SECURITY TOPIC
Money Mule Scams
OVERVIEW
A money mule is a person who transfers money acquired illegally and often times is unaware that they are participating in a money laundering scheme. Hackers trick people into becoming money mules by creating fake organizations or charities as a front for their criminal activities. Watch as an unsuspecting COVID-19 charity volunteer gets arrested by unknowingly laundering funds for a criminal organization.
SECURITY TOPIC
Website Spoofing
OVERVIEW
Home title fraud is becoming a fast-growing scheme for cybercriminals and can result in devastating consequences to its victims. In this episode, featuring Jon Lovitz, watch how a hacker uses a spoofed website to get their victim to provide personal information which then allows the hacker to apply for a fraudulent transfer of ownership and then take-out loans against the value of the victim’s home.
SECURITY TOPIC
401K Scams
OVERVIEW
In 2019, fraud-related losses grew 15% from the previous year, totaling nearly $17 billion (USD). Part of that figure includes fraud relating to 401K accounts, which have become a growing target of hackers. In this episode, we follow Celeste, who is getting ready for retirement and is surprised to learn that she has become a victim of 401K fraud. See what happens and learn how you can help protect yourself from this particular threat.
SECURITY TOPIC
Smishing
OVERVIEW
A hack known as “Blueleaks” recently exposed an enormous amount of highly sensitive law enforcement data, including the personal information of over 700,000 police professionals. Robert Davi (as Frank) stars in this episode as he regretfully notifies Diana, an undercover agent that’s been working on a big case, that her cover has just been blown due to a cybersecurity attack, that all started from a malicious text message.
SECURITY TOPIC
Man in the middle attack
OVERVIEW
The multinational GPS technology company, Garmin, was recently struck by ransomware, with hackers demanding a payment of $10 million U.S. dollars to restore key services. In this episode, a ransomware attack was successfully launched on NavTerrain, where a mountaineer – whose NavGoTek device lost functionality as a result of a “Man-in-the-middle” hack via Chatbot- is left stranded on Mount Everest. Guest stars Jon Lovitz and Robert Davi inform us how a NavTerrain employee fell victim to this MITM attack, and how you can protect yourself from similar attacks.
SECURITY TOPIC
Social Media Spear Phishing
OVERVIEW
When Suprema, a global biometrics management firm was hacked, it exposed fingerprint biometrics information and other sensitive data of millions of users. In this episode, a PhenoScan employee falls victim to a spear phishing attack which gave criminals access to sensitive biometrics information, allowing them to infiltrate businesses and steal equipment. Guest star Laticia Rolle, as Detective Laticia Collins, informs us how to identify and stay safe from similar attacks, especially while working from home.
SECURITY TOPIC
Home VPN Security
OVERVIEW
In this episode we learn about corporate device security and best practices while working from home, after a remote worker’s laptop is the source of a cyber attack that shuts down a hospitals access to critical patient data. Watch to learn more from our guest star Alex Thomas about securely working from home and how to protect you and your organization from cyber attacks.
SECURITY TOPIC
Business Email Compromise (BEC)
OVERVIEW
After her husband’s wrongful arrest, Megan desperately researches what might have led to his stolen identity. She uncovers a case of Business Email Compromise, and hurries to share what she’s learned with their lawyer.
SECURITY TOPIC
Mobile Device Management
OVERVIEW
The hackers have a plan, a way to bypass a large company’s MDM, or Mobile Device Management, software to gain access to their sensitive data. Using inside contacts, custom servers, and text message phishing, they can get everything that they want – as long as the mobile devices in question haven’t had their software and anti-virus kept up-to-date.
SECURITY TOPIC
Insider Threats
OVERVIEW
Still a little new at his job with a large, widely-followed company, Chris feels like he has a bit to prove. This drive leads him to make a few social forum and social media posts detailing non-confirmed company information. Now he must face the consequences of his actions and learn the meaning of his team’s data classification policies.
SECURITY TOPIC
Email Spoofing
OVERVIEW
The message is shocking and uncomfortable, threatening Stuart with the release of truly embarrassing material if he doesn’t pay hackers thousands of dollars in Bitcoin. Trying to control his destiny, Stuart discusses the email with his boss – but it might not actually be what it seems.
SECURITY TOPIC
Password Spraying
OVERVIEW
An undercover operative has gone missing…and now it’s time to turn to a convicted hacker to find out what happened, and how a large hacking syndicate gains access to multiple accounts all over the world.
SECURITY TOPIC
Social Media Security
OVERVIEW
When a vacation rental goes horribly wrong, Ava takes an important lesson to heart – friend requests on social media from strangers pose a unique security threat. This is knowledge that she resolves to pass to her daughter as clearly as possible.
SECURITY TOPIC
Malicious Insider Threats
OVERVIEW
When proprietary information is leaked, the fingers start pointing to find a culprit. Thankfully, Isabel has taken care to document an employee’s suspicious behavior, but now she needs to find out why her reports were never heeded.
SECURITY TOPIC
SIM Card Hijacking
OVERVIEW
Tina and Kate thought that they had done everything that they needed to do to protect themselves by utilizing 2FA on their accounts. When $8000 goes missing, though, with nothing going through to Tina’s phone, they realize that they overlooked a crucial flaw – SIM card hijacking.
SECURITY TOPIC
USB Drops
OVERVIEW
Human curiosity opens the door to hackers and scammers. A USB drive, cleverly labelled as something that anybody would want to know, can act as the perfect bait for a large-scale infrastructure attack. Cyber probes are on the rise…
SECURITY TOPIC
Spear Phishing
OVERVIEW
Whether a spear phishing email is created by an insider or by someone who has delved into social media for a user’s information, these targeted attacks present enormous risks. In the wake of a data breach of truly staggering proportions, watch as the Metropolis One security team looks at some of the telltale signs that could have prevented the breach.
SECURITY TOPIC
Gift Card Fraud
OVERVIEW
It’s an urgent request – get fifteen $150 gift cards and send the codes immediately! Before rushing to comply, it’s important to slow down and carefully consider all the details…
SECURITY TOPIC
Ransomware
OVERVIEW
Free charging cables and other swag? It’s difficult to complain about that – but with some planning from hackers, those charging cables could be something a little more sinister.
SECURITY TOPIC
Phishing and Identity Theft
OVERVIEW
Life has been hectic for Mike’s family with his daughter spending 3 months in the hospital, but things are starting to look up – until a crucial loan is denied. Mike discovers that he was caught in a phishing scheme and suffered identity theft. Now even his job is in jeopardy as he tries to handle the fallout. Watch and learn important ways to spot a phish and avoid getting caught by these emails.
SECURITY TOPIC
Securely working from home and VPN Security
OVERVIEW
Dan, the CFO at a large company, wanted to make everything simple. He wanted a process so easy that he could access his company’s network from home without any additional authentication. Going against the recommendations of his IT department, he insisted that his IT department set up a point-to-point VPN connection, but the consequences of his actions are starting to catch up with him. Watch and learn how important it is that you connect to your network securely.
SECURITY TOPIC
Smishing
OVERVIEW
While chatting over lunch, Megan receives a text from her bank, alerting her to suspicious activity. Worried, she quickly begins to follow the instructions, but before she can fully act, her friend intervenes with a warning. The text could be a Smish. Watch and learn how important it is to recognize text message phishing.
SECURITY TOPIC
2FA Security
OVERVIEW
2-Factor Authentication using your mobile phone (SMS) is a great security measure, and countless end-users have it in place – but that’s bad news for Nico as he tries to use some stolen credentials. Nico and his hacking buddy think of a scheme to get around 2FA via SMS, opening the potential for business email compromise and all sorts of mischief. Watch to see how a hacker might try to get around 2FA via SMS, and how you can avoid becoming a victim of this plot.
SECURITY TOPIC
Macro Malware
OVERVIEW
A routine day at air traffic control turns dangerous when the system begins to glitch. Macro-based malware made it into the organization’s system, rendering their equipment useless. The result could put innocent lives at stake. Watch to see how to avoid falling victim to macro malware.
SECURITY TOPIC
Ransomware
OVERVIEW
In this episode, an entire city shuts down and panic ensues; crucial city systems are being held up by hackers using ransomware. Either the city can try to gain access themselves or pay the perpetrators. The first step is tracking down where the ransomware came from and understanding the breakdown in simple policies that put them in this dire situation.
SECURITY TOPIC
Malvertising
OVERVIEW
In this episode, a meeting starts late after a link to Amazon prompted a software update – an update that IT knew nothing about. It turns out that the culprit is malvertising. Watch and see how to avoid falling for fake ads and links found from internet searches.
SECURITY TOPIC
Cryptojacking
OVERVIEW
In this episode, a phone overheats and explodes. It might have been a product failure – but there is a possibility that the user was a victim of cryptojacking. Watch and learn how cryptojacking software might find its way on to your devices and how damaging it can be.
SECURITY TOPIC
Wireless Security
OVERVIEW
In this episode, a submarine commander faces a potentially deadly attack. It seems that an enemy obtained confidential data about the submarine’s sensors; the contractor responsible needs to track down what happened and make some changes, fast. Watch and learn how small, portable, and inexpensive devices might be used to gain access to your data.
SECURITY TOPIC
Spear Phishing
OVERVIEW
When it comes to spear phishing attacks, there are a number of clues that a user can look for to make sure they don’t fall victim to a hacker. These clues were overlooked, and now, the Prime Minister must take the stage to discuss the resulting security breach…as well as her own resignation.
SECURITY TOPIC
Keystroke Loggers
OVERVIEW
While trying to give his all to a high-profile defense case, Dan chooses to cut a few corners regarding the firm’s IT Security procedures. The result places his entire career at stake when hackers find a way to gain his exact login credentials. This episode focuses on increasing awareness around keystroke loggers and what hackers can do with them.
SECURITY TOPIC
Passphrase Security
OVERVIEW
When faced with a blackmail threat regarding embarrassing messages, Emily tries to understand how hackers might have accessed her account. Weak password practices could be to blame.