Sample Our Latest AWARE Episodes

Click any of the episodes below for a 30-second episode sample of the highly acclaimed NINJIO AWARE attack vector training. Speak to a NINJIO security professional to get full episodes for further evaluation for your team.

901 GIGO: GARBAGE IN, GARBAGE OUT

SECURITY TOPIC
Generative A.I.

OVERVIEW

23andMe suffered a data breach resulting in the theft of user genetic information including ethnicity and family relationships. The rapid implementation of public generative artificial intelligence (G.A.I.) models, such as ChatGPT, has led to two types of risk: Input risk, where sensitive data entered into G.A.I. can be stolen by hackers, and output risk, where information generated by G.A.I. is wrong or biased. Extreme caution must be taken when using this tool.

902 H2Oh-no

SECURITY TOPIC
Watering Hole Attacks

OVERVIEW
In a warning, the organization investigating cyberattacks on critical industrial operations said up to 15,000 industrial sites could be taken over by hackers. Watering hole attacks involve bad actors infecting a common location, such as an industry website, that intended victims trust and regularly visit.

903 CLOUDED JUDGMENT

SECURITY TOPIC
Personal Cloud Storage Risks

OVERVIEW
Android game developer, Ateam, recently announced 900,000 customers had their personal data exposed. The breach occurred due to Ateam employees’ improper use of the cloud storage service, Google Drive. Cloud storage, while convenient, comes with inherent risks and must be used with caution.

801 IT’S NOT JUST ABOUT THE MONEY

SECURITY TOPIC
Vishing

OVERVIEW
Cybercriminals are becoming more sophisticated in their approach, with Twilio becoming one of more than 130 organizations to fall victim to a large-scale VISHING and SMISHING campaign. The financial as well as emotional damage of such attacks can be extensive.

802 SOCIAL MEDIA HORROR SHOW

SECURITY TOPIC
Social Media Security Hygiene

OVERVIEW
Twitter and WhatsApp were recently breached, resulting in more than 500 million users having personal data stolen. Social media attacks provide new opportunities for bad actors to target user accounts with increasingly sophisticated attacks. In this episode, starring Robert Davi as our CFO, Jack, we learn about the malicious methods that bad actors use on social media to potentially infiltrate an organization. Watch to learn more about social media security hygiene and what you can do to protect yourself and your organization from social media attacks!

803 ATTACK OF THE CLONES

SECURITY TOPIC
Clone Phishing

OVERVIEW
News publisher, The Guardian, fell victim to a suspected phishing attack, through which the personal information of UK staff members was stolen. Phishing has evolved to include “clone phishing,” which is highly sophisticated and more difficult to spot.

804 PHYSICAL EDUCATION

SECURITY TOPIC
Physical Security

OVERVIEW
While cybersecurity threats sit at the forefront of everyone’s minds, a physical security breach can be every bit as damaging to an organization. In this episode, staring Joey Lawrence as Jeff, we learn about the methods often deployed by bad actors to infiltrate an organization via a physical security breach. Watch to learn more about physical security and what you can do to protect yourself and your organization from these kinds of attacks!

805 EVERYTHING. GONE.

SECURITY TOPIC
Pig Butchering Scam

OVERVIEW
The ‘Pig Butchering Scam’ has become the scourge of the internet. A long con that tricks victims into sending money to fraudulent investment platforms, it has exploded to become the costliest scam out there, with victim losses totaling tens of billions of dollars worldwide. In this episode, starring Tia Carrere as Vivian, we learn how Pig Butchering Scams are executed by cyber criminals and the devastating effects this kind of scam has on its victims. Watch to learn more about Pig Butchering Scams and what you can do to protect yourself and your organization from these kinds of attacks!

806 WHO DO YOU THINK YOU’RE TALKING TO?

SECURITY TOPIC
Deep Fake Audio Scam

OVERVIEW
A UK-based energy company was recently scammed out of $243,000 by hackers running a “Deep Fake Audio Scam,” a scam that uses artificial intelligence (A.I.) to replicate voices of people we know and trust. In this episode, starring Robert Davi as Louie Sr., we learn about how bad actors maliciously use artificial intelligence to run “Deep Fake Audio Scams”. Watch to learn more about how you can protect yourself and your organization from these kinds of attacks!

807 CHARGING STATION CURVEBALL

SECURITY TOPIC
Juice Jacking

OVERVIEW
Dish Network recently experienced an extended television service outage due to a cybersecurity incident. ‘Juice Jacking’, a method used by bad actors, can lead to such incidents. In this episode, starring Robert Wagner as the Announcer, we learn about juice jacking and how bad actors can deliver malware via public USB ports to victims’ mobile devices, and even infect entire networks. Watch to learn more about what you can do to protect yourself and your organization from these kinds of attacks!

season 8 episode 8 poster

808 CYBERCRIME WAVE

SECURITY TOPIC
Artificial Intelligence Hygiene

OVERVIEW
As with every new technology, artificial intelligence (AI) comes with risks. Before utilizing the opportunities and rewards AI has to offer, it’s important to fully investigate its vulnerabilities in order to manage associated risks.

season 8 episode 9 poster

809 HARD TO SWALLOW

SECURITY TOPIC
Smishing

OVERVIEW
Global agencies have recently warned consumers of a major spike in SMS phishing, or “smishing,” attacks. One such campaign targeted customers of the multinational shipping company UPS.

810 WHO ARE YOU?

SECURITY TOPIC
Social Media Account Cloning

OVERVIEW
Social media account cloning has become a growing problem that can affect even the most cautious of users. In fact, stay tuned after the quiz to hear about how NINJIO’s own founder, Zack Schuler, was impacted by this rising threat.

811 HELLO

SECURITY TOPIC
Wrong Number Text

OVERVIEW
HCA Healthcare announced the theft of PII and other sensitive information from up to 11 million of their patients. A cautious approach to seemingly harmless baiting tactics can help prevent such data breaches.

812 ALL BETS ARE OFF

SECURITY TOPIC
Vishing

OVERVIEW
Hotel and casino giant MGM Resorts reported losses from a recent vishing attack that exceeded 110 million dollars. Vishing involves a convincing phone call, rather than email, to trick targets into divulging sensitive information.

701 BAD ROBOT

SECURITY TOPIC
2FA Bots

OVERVIEW
Security experts are seeing a massive increase in crimeware services available on the Dark Web. One example involves a “2FA Bot”, which intercepts two-factor authentication codes, allowing hackers to login to a victim’s sensitive websites such as banking and investment accounts, social media, and retirement platforms. In this episode, starring Joey Lawrence as HydroGen’s CEO Aaron Stark, you will learn about the various ways that crimeware services, such as automated bots, can be used to bypass multi-factor authentication methods.

702 ATTACK OF THE APPS

SECURITY TOPIC
Malicious Apps

OVERVIEW
Over 300,000 Android users have been hit with Banking Trojan Malware that allows hackers to steal login credentials for banking websites. The malware was installed on victim devices when they downloaded malicious apps from the Google Play app store.

703 TROUBLED WATERS

SECURITY TOPIC
Watering Hole Attacks

OVERVIEW
A major vulnerability called “Log4J” has left an alarming number of companies and software vendors exposed to extreme risk of compromise. The vulnerability allows bad actors to manipulate data, infect systems with malware, and potentially gain control of systems altogether. One example of how this attack may put an even wider group at risk is through watering hole attacks.

704 GONE CATPHISHING

SECURITY TOPIC
Catphishing

OVERVIEW
The Netflix documentary “Tinder Swindler” has cast a spotlight on catfishing — spelled with an “f” — where con artists use romance to break hearts and bank accounts by tricking victims into sending money. Another variety is Catphishing — with a “ph” — where con artists trick corporate victims into sending sensitive information such as login credentials or access to sensitive data.

705 WHOLE>SUM

SECURITY TOPIC
Cybersecurity Culture

OVERVIEW
When geopolitical conflict is high, cyberthreats increase – making heightened awareness more critical than ever. Organizations that are successful in building a cybersecurity awareness culture have a greater chance of mitigating the risk, as everyone plays a crucial role. In this episode, with Joey Lawrence as Aaron Stark, you will learn about the importance of cultivating a strong cybersecurity awareness culture at your organization and the critical role each individual has in maintaining an organization’s security.

706 HELP WANTED

SECURITY TOPIC
Insider Threat

OVERVIEW
The cybercrime group – LAPSUS$ – made headlines recently by hacking such big name corporations as NVIDIA, Samsung, Microsoft and identity management platform — Okta. One vector LAPSUS$ used involves recruiting insiders through online advertisements offering to pay employees for access to their company’s network.

707 CLIFFHANGER

SECURITY TOPIC
Ransomware

OVERVIEW
Tire manufacturer, Bridgestone, recently experienced a ransomware attack that shut down production at its factories, putting added pressure on an already struggling supply chain. Ransomware attacks are increasing in sophistication and affecting thousands of organizations worldwide.

708 THE PLAYBOOK

SECURITY TOPIC
Spear Phishing

OVERVIEW
Blockchain bridge, Horizon, recently revealed that hackers stole $100 million in cryptocurrency. Researchers speculate the breach was the result of a “private key compromise,” where hackers obtained the password required to gain access to a crypto wallet. Spear phishing is a common technique bad actors use to compromise such credentials.

709 CALL ME

SECURITY TOPIC
Call Center Scams

OVERVIEW
Flagstar Bank was compromised in a data breach that stole the personal information of more than 1.5 million customers. Call center scams are an increasingly prevalent threat that can lead to such incidents. In this episode, starring Tia Carrere as Heidi, you will gain direct insight into how common call center scams work. Watch to learn more about call center scams so you can identify and prevent these types of threats!

710 SLEUTH OR CONSEQUENCES

SECURITY TOPIC
Credential Hygiene

OVERVIEW
Networking & security giant, Cisco, revealed a threat actor breached their network by tricking one of their employees using a multi-prong targeted attack. Protecting your login credentials with good credential hygiene is paramount to effective security.

711 UPDATE WITH DESTINY

SECURITY TOPIC
Security Updates

OVERVIEW
Apple recently urged its users to update their iPhones, iPads and Mac computers after a security flaw allowed hackers to take over these devices. Updating your software in a timely manner is crucial to keeping your devices and information secure.

712 GAME DAY DECISION

SECURITY TOPIC
Verify Before You Trust

OVERVIEW
Grand Theft Auto video game developer, Rockstar, and ride-share giant, Uber, both suffered recent, similar attacks that occurred within a few days of each other. Both incidents could have been avoided by employees adhering to a strict policy of – ‘verify before you trust.’

601 WIRE TRIPPIN’

SECURITY TOPIC
Wire Fraud

OVERVIEW
Recently, hair salon company “Sport Clips” filed a lawsuit claiming a security breach at the company’s advertising firm led to a $541,000 payment being wired to a scammer. In this episode starring Jon Lovitz as Richard, the company mistakenly wires $600,000 to what appears to be the correct vendor, but had Richard done his due diligence by confirming the last minute change of account numbers with a phone call to the sender of the email, the fraudulent wire transfer could have been avoided. See what happens and learn how to protect yourself and your organization from attacks like this!

602 DANGEROUS COMMUNIQUÉ

SECURITY TOPIC
Macro Malware

OVERVIEW
As the Coronavirus pandemic rages on, cybercriminals are becoming more and more savvy with leveraging current event attacks, to circumvent one’s better judgement. Email-based attacks promising new job opportunities, or lists of rehires, are becoming increasingly common. In this episode starring Jon Lovitz as Richard, a supposed “Rehire List” is emailed to him and – being that he has been unemployed for some time and eager to return to work – Richard hurriedly opens the document and enables macros without first verifying the file’s authenticity. Debbie, a coworker, helps him discover that the email and attached “Rehire List” were malicious in nature, and helps point out a few key ways to avoid macro-based attacks. See what happens and learn how to protect yourself from attacks like this!

603 LOUIE LOUIE

SECURITY TOPIC
Privacy and PII

OVERVIEW
Food delivery service DoorDash suffered a data breach in which hackers stole the Personally Identifiable Information, or PII, of 4.9 million users. PII is valuable to cybercriminals because they sell it on the dark web and use it to commit various cybercrimes, such a credit card fraud and identity theft. In this episode starring Robert Davi as Louie Sr., we see that Louie has breached their way onto a food delivery service’s network, which granted them access to 3 million customer records. However, Louie ran into an issue while exfiltrating the data and has to call in an old business partner to help him out. Watch to find out who Louie calls and learn more about Privacy and PII!

604 GONE CATPHISHING

SECURITY TOPIC
Push Notification Scams

OVERVIEW
An increasing number of websites are asking visitors to approve “push notifications.” In many cases these are harmless. But occasionally, the communication pathways these establish are exploited by cybercriminals. In this episode starring Tia Carrere as Cass, we see Cass help save her mother Doris from falling victim to a cybercrime via a push notification, supposedly from her bank’s website. Watch to learn more about push notifications and safe push notification interaction behavior.

605 THAT’S A WRAP

SECURITY TOPIC
Job Post Scams

OVERVIEW
Social engineering is the manipulation of people’s emotions to trick them into divulging private information or performing actions they normally wouldn’t do. In this episode, Liz is managing a video project which she suspiciously hasn’t been paid for yet even though she and her team have just finished shooting the project. This sparks a conversation with her colleague Harlan – played by Alex Thomas – where Harlan informs Liz of social engineering through job post scams which can often be represented as great opportunities. Watch to learn more from Harlan and Liz about social engineering through job post scams.

606 THE OFFER

SECURITY TOPIC
PII

OVERVIEW
The Personally Identifiable Information, also known as “PII” or “Personal Data”, of 26 million military veterans was stolen from the Veteran’s Administration after an employee took the data home on an unsecure device. Properly securing personal data and eliminating personal data is crucial to preventing such cybercrimes. In this episode, we get the follow-up story to 603’s “Louie Louie” and see Louie Sr. and son confront Nico to help them steal personal data. After some convincing, Nico agrees and we learn more about how this trio of bad actors were able to obtain sensitive information!

607 SEE SOMETHING, DO SOMETHING

SECURITY TOPIC
Proactive Security Awareness

OVERVIEW
The hacking group “DarkSide” has claimed responsibility for the Colonial Pipeline ransomware attack, which disrupted fuel shipments to the entire Eastern Seaboard of the United States. When you encounter cyber threats, being proactive in reporting them is crucial to avoiding attacks such as this. In this episode we see Jeff Winston, an employee at Provincial Pipeline, encounter a suspicious email claiming to be an “urgent” software update. Stacy Keach portrays our news anchor who emphatically drives home the message: “If you see something, do something”. This resonates with Jeff, but he is still intrigued by that email he received. Will Jeff fall victim to this cyber-attack, or will he be a proactive cybersecurity citizen?

608 (NOT) SHARING IS CARING

SECURITY TOPIC
Insider Threat

OVERVIEW
Insider threats are an increasing cybersecurity concern, with the number of incidents recently spiking. Urgency coupled with careless sharing of information represents a particular type of insider threat with potentially devastating effects. As this episode opens we see our pilot Maddie, played by Tia Carrere, begin to experience tough visibility in the air and radio in to her Central Command center for support. We quickly learn that they are dealing with a “Logic Bomb” – malicious code that hackers can plant in a system that will disrupt operations if it goes off. This means that Maddie will lose connection to Central Command if it goes off! Watch to learn more about how this “Logic Bomb” ended up in their system via an insider threat and if the Central Command team can disable it in time!

609 SAFETY IN NUMBERS — AND LETTERS

SECURITY TOPIC
Passphrase Protection

OVERVIEW
Kaseya, a supplier of IT software, became the victim of the largest ransomware attack on record. Also known as a “supply chain” attack, it spread from Kaseya to roughly 1,500 of their client companies, impacting users all over the globe. This episode opens with a young boy who is rushing his sick mother into a pharmacy in São Paulo, Brazil. We quickly learn that the pharmacist is unable to access the patient files due to a ransomware attack, which unfortunately is only the beginning to this nightmare scenario. Through the investigation, led by an Interpol Officer played by Damian Chapa, we learn more about passphrase security and the risk of supply chain cyberattacks!

610 VERIFY BEFORE YOU TRUST

SECURITY TOPIC
Stored Document Integrity

OVERVIEW
Wire fraud in the real estate sector has seen an ~1100% increase in recent years. Most are attributable to Business Email Compromise, where fraudsters assume the identity of the real estate agent, escrow officer, or closing solicitor. As hackers continue to invent new ways of scamming people, including using malware to manipulate sensitive documents, the number of victims could rise even further. As this episode opens, we see an escrow/solicitor’s office buzzing with anxious energy as it’s brought to Sam’s attention – as portrayed by Alex Thomas – that six of their clients have unknowingly been given fraudulent wiring instructions in one single day. Upon further investigation by Sam and Rebecca, we find out that the culprit was not the usual “Business Email Compromise”, but actually a piece of malware that scans documents for the word “Wire” and then alters the document with the hacker’s account and routing numbers. Watch to learn more about Stored Document Integrity and verifying before you trust!

611 FIRST COMES LOVE, THEN COMES…SECURITY

SECURITY TOPIC
Identity Protection

OVERVIEW
Cell service provider T-Mobile was recently hacked, resulting in the theft of personal information of 50 million customers. Incidents like these are becoming increasingly common, making it more and more likely each of us had – or will have – our data stolen. Knowing how to protect your identity can help mitigate the damage. This episode, starring celebrity actor Andrew Lawrence as “Mike”, tells a story about the potential ways one’s identity can get stolen and how to proactively and reactively take action to protect yourself.

612 TO SCAN, OR NOT TO SCAN

SECURITY TOPIC
QR Code Phishing

OVERVIEW
Grand Theft Auto video game developer, Rockstar, and ride-share giant, Uber, both suffered recent, similar attacks that occurred within a few days of each other. Both incidents could have been avoided by employees adhering to a strict policy of – ‘verify before you trust.’

501 HOOK, LINE, AND SPOOFER

SECURITY TOPIC
Telephone Scams

OVERVIEW
Telephone scams play off your emotions, creating urgency and legitimacy. Lloyd had a gut feeling that there was a problem, but key details convinced him otherwise.

502 PASSPHRASE FOR DAYS

SECURITY TOPIC
Macy’s Breach

OVERVIEW
Hackers are thorough and research their targets – they just need the perfect opportunity to come along.  When a new employee at Lacy’s posted about their new job status, hackers took note.  All they needed was an easy to crack, recycled password.

503 A COMPROMISING CRASH

SECURITY TOPIC
Business Email Compromise

OVERVIEW
Hackers can be patient threat actors – They can lie dormant in compromised email accounts, watching and learning everything about you until they identify an opportunity to execute an attack. In this episode, we learn to never let our guard down with seemingly benign sensitive requests, especially when urgency is involved.

504 LET’S GET PHYSICAL

SECURITY TOPIC
Physical Security

OVERVIEW
With the increase of employees working from home and social distancing in place if you are working at an office, physical security becomes increasingly more important. In this episode, we learn why it is important to stay vigilant and adhere to physical security policies, as well as stay alert for suspicious behavior. Threat actors count on employees being overly courteous and trusting of others. It’s imperative to report any violations of a policy that could put your company at risk, regardless of deadlines or how convincing a person may be.

505 SCAMS GONE VIRAL

SECURITY TOPIC
Email Attachment Threats

OVERVIEW
Hackers attempt to take advantage of people’s fear, curiosity, and goodwill during times of crisis. In this episode we learn how email attachment threats can result in devastating consequences. Watch how a bad actor steals a family’s entire savings after an unsuspecting user opens an unknown file attachment promising information about COVID-19.

506 CHARITY CASE

SECURITY TOPIC
Money Mule Scams

OVERVIEW
A money mule is a person who transfers money acquired illegally and often times is unaware that they are participating in a money laundering scheme. Hackers trick people into becoming money mules by creating fake organizations or charities as a front for their criminal activities. Watch as an unsuspecting COVID-19 charity volunteer gets arrested by unknowingly laundering funds for a criminal organization.

507 HOUSE OF FRAUD

SECURITY TOPIC
Website Spoofing

OVERVIEW
Home title fraud is becoming a fast-growing scheme for cybercriminals and can result in devastating consequences to its victims. In this episode, featuring Jon Lovitz, watch how a hacker uses a spoofed website to get their victim to provide personal information which then allows the hacker to apply for a fraudulent transfer of ownership and then take-out loans against the value of the victim’s home.

508 402 CHAOS

SECURITY TOPIC
401K Scams

OVERVIEW
In 2019, fraud-related losses grew 15% from the previous year, totaling nearly $17 billion (USD). Part of that figure includes fraud relating to 401K accounts, which have become a growing target of hackers. In this episode, we follow Celeste, who is getting ready for retirement and is surprised to learn that she has become a victim of 401K fraud. See what happens and learn how you can help protect yourself from this particular threat.

509 DEATH SMISH

SECURITY TOPIC
Smishing

OVERVIEW
A hack known as “Blueleaks” recently exposed an enormous amount of highly sensitive law enforcement data, including the personal information of over 700,000 police professionals. Robert Davi (as Frank) stars in this episode as he regretfully notifies Diana, an undercover agent that’s been working on a big case, that her cover has just been blown due to a cybersecurity attack, that all started from a malicious text message.

510 GPS DISTRESS

SECURITY TOPIC
Man in the middle attack

OVERVIEW
The multinational GPS technology company, Garmin, was recently struck by ransomware, with hackers demanding a payment of $10 million U.S. dollars to restore key services. In this episode, a ransomware attack was successfully launched on NavTerrain, where a mountaineer – whose NavGoTek device lost functionality as a result of a “Man-in-the-middle” hack via Chatbot- is left stranded on Mount Everest. Guest stars Jon Lovitz and Robert Davi inform us how a NavTerrain employee fell victim to this MITM attack, and how you can protect yourself from similar attacks.

511 HOMEPHISHED

SECURITY TOPIC
Social Media Spear Phishing

OVERVIEW
When Suprema, a global biometrics management firm was hacked, it exposed fingerprint biometrics information and other sensitive data of millions of users. In this episode, a PhenoScan employee falls victim to a spear phishing attack which gave criminals access to sensitive biometrics information, allowing them to infiltrate businesses and steal equipment. Guest star Laticia Rolle, as Detective Laticia Collins, informs us how to identify and stay safe from similar attacks, especially while working from home.

512 LOCK BEFORE YOU WALK

SECURITY TOPIC
Home VPN Security

OVERVIEW
In this episode we learn about corporate device security and best practices while working from home, after a remote worker’s laptop is the source of a cyber attack that shuts down a hospitals access to critical patient data. Watch to learn more from our guest star Alex Thomas about securely working from home and how to protect you and your organization from cyber attacks.

401 YOU NEVER CALL…

SECURITY TOPIC
Business Email Compromise (BEC)

OVERVIEW
After her husband’s wrongful arrest, Megan desperately researches what might have led to his stolen identity. She uncovers a case of Business Email Compromise, and hurries to share what she’s learned with their lawyer.

402 C’EST LA VIE CHAMONIX

SECURITY TOPIC
Mobile Device Management

OVERVIEW
The hackers have a plan, a way to bypass a large company’s MDM, or Mobile Device Management, software to gain access to their sensitive data. Using inside contacts, custom servers, and text message phishing, they can get everything that they want – as long as the mobile devices in question haven’t had their software and anti-virus kept up-to-date.

403 UP, UPVOTE, AND AWAY

SECURITY TOPIC
Insider Threats

OVERVIEW
Still a little new at his job with a large, widely-followed company, Chris feels like he has a bit to prove. This drive leads him to make a few social forum and social media posts detailing non-confirmed company information. Now he must face the consequences of his actions and learn the meaning of his team’s data classification policies.

404 IT’S NOT WHAT YOU THINK…

SECURITY TOPIC
Email Spoofing

OVERVIEW
The message is shocking and uncomfortable, threatening Stuart with the release of truly embarrassing material if he doesn’t pay hackers thousands of dollars in Bitcoin. Trying to control his destiny, Stuart discusses the email with his boss – but it might not actually be what it seems.

405 SAY IT, DON’T SPRAY IT

SECURITY TOPIC
Password Spraying

OVERVIEW
An undercover operative has gone missing…and now it’s time to turn to a convicted hacker to find out what happened, and how a large hacking syndicate gains access to multiple accounts all over the world.

406 VACATION DEVASTATION

SECURITY TOPIC
Social Media Security

OVERVIEW
When a vacation rental goes horribly wrong, Ava takes an important lesson to heart – friend requests on social media from strangers pose a unique security threat. This is knowledge that she resolves to pass to her daughter as clearly as possible.

407 BLAME GAME

SECURITY TOPIC
Malicious Insider Threats

OVERVIEW
When proprietary information is leaked, the fingers start pointing to find a culprit. Thankfully, Isabel has taken care to document an employee’s suspicious behavior, but now she needs to find out why her reports were never heeded.

408 SMS SOS

SECURITY TOPIC
SIM Card Hijacking

OVERVIEW
Tina and Kate thought that they had done everything that they needed to do to protect themselves by utilizing 2FA on their accounts. When $8000 goes missing, though, with nothing going through to Tina’s phone, they realize that they overlooked a crucial flaw – SIM card hijacking.

409 USB NATION

SECURITY TOPIC
USB Drops

OVERVIEW
Human curiosity opens the door to hackers and scammers. A USB drive, cleverly labelled as something that anybody would want to know, can act as the perfect bait for a large-scale infrastructure attack. Cyber probes are on the rise…

410 VOICEMAIL FAIL

SECURITY TOPIC
Spear Phishing

OVERVIEW
Whether a spear phishing email is created by an insider or by someone who has delved into social media for a user’s information, these targeted attacks present enormous risks. In the wake of a data breach of truly staggering proportions, watch as the Metropolis One security team looks at some of the telltale signs that could have prevented the breach.

411 DISREGARD THE GIFT CARD

SECURITY TOPIC
Gift Card Fraud

OVERVIEW
It’s an urgent request – get fifteen $150 gift cards and send the codes immediately! Before rushing to comply, it’s important to slow down and carefully consider all the details…

412 PLUG AND PLAY

SECURITY TOPIC
Ransomware

OVERVIEW
Free charging cables and other swag? It’s difficult to complain about that – but with some planning from hackers, those charging cables could be something a little more sinister.

301 PHISHING THE STREAM

SECURITY TOPIC
Phishing and Identity Theft

OVERVIEW
Life has been hectic for Mike’s family with his daughter spending 3 months in the hospital, but things are starting to look up – until a crucial loan is denied.  Mike discovers that he was caught in a phishing scheme and suffered identity theft.  Now even his job is in jeopardy as he tries to handle the fallout.  Watch and learn important ways to spot a phish and avoid getting caught by these emails.

302 LAID OFF, PAID OFF

SECURITY TOPIC
Securely working from home and VPN Security

OVERVIEW
Dan, the CFO at a large company, wanted to make everything simple.  He wanted a process so easy that he could access his company’s network from home without any additional authentication.  Going against the recommendations of his IT department, he insisted that his IT department set up a point-to-point VPN connection, but the consequences of his actions are starting to catch up with him.  Watch and learn how important it is that you connect to your network securely.

303 CHICKEN OR SMISH

SECURITY TOPIC
Smishing

OVERVIEW
While chatting over lunch, Megan receives a text from her bank, alerting her to suspicious activity.  Worried, she quickly begins to follow the instructions, but before she can fully act, her friend intervenes with a warning. The text could be a Smish. Watch and learn how important it is to recognize text message phishing.

304 2 FACTOR FAKE OUT

SECURITY TOPIC
2FA Security

OVERVIEW
2-Factor Authentication using your mobile phone (SMS) is a great security measure, and countless end-users have it in place – but that’s bad news for Nico as he tries to use some stolen credentials. Nico and his hacking buddy think of a scheme to get around 2FA via SMS, opening the potential for business email compromise and all sorts of mischief. Watch to see how a hacker might try to get around 2FA via SMS, and how you can avoid becoming a victim of this plot.

305 THE MACRO TROJAN TAKEDOWN

SECURITY TOPIC
Macro Malware

OVERVIEW
A routine day at air traffic control turns dangerous when the system begins to glitch. Macro-based malware made it into the organization’s system, rendering their equipment useless. The result could put innocent lives at stake. Watch to see how to avoid falling victim to macro malware.

306 RANSOMWARE IS EVERYWHERE

SECURITY TOPIC
Ransomware

OVERVIEW
In this episode, an entire city shuts down and panic ensues; crucial city systems are being held up by hackers using ransomware. Either the city can try to gain access themselves or pay the perpetrators. The first step is tracking down where the ransomware came from and understanding the breakdown in simple policies that put them in this dire situation.

307 UPDATE DOUBLE TAKE

SECURITY TOPIC
Malvertising

OVERVIEW
In this episode, a meeting starts late after a link to Amazon prompted a software update – an update that IT knew nothing about. It turns out that the culprit is malvertising. Watch and see how to avoid falling for fake ads and links found from internet searches.

308 CRYPTOMINER PANTS ON FIRE

SECURITY TOPIC
Cryptojacking

OVERVIEW
In this episode, a phone overheats and explodes. It might have been a product failure – but there is a possibility that the user was a victim of cryptojacking. Watch and learn how cryptojacking software might find its way on to your devices and how damaging it can be.

309 STRAWBERRY X FOREVER

SECURITY TOPIC
Wireless Security

OVERVIEW
In this episode, a submarine commander faces a potentially deadly attack. It seems that an enemy obtained confidential data about the submarine’s sensors; the contractor responsible needs to track down what happened and make some changes, fast. Watch and learn how small, portable, and inexpensive devices might be used to gain access to your data.

310 A TERMINAL MISTAKE

SECURITY TOPIC
Spear Phishing

OVERVIEW
When it comes to spear phishing attacks, there are a number of clues that a user can look for to make sure they don’t fall victim to a hacker. These clues were overlooked, and now, the Prime Minister must take the stage to discuss the resulting security breach…as well as her own resignation.

311 DATA LOSS BY THE LOGGER

SECURITY TOPIC
Keystroke Loggers

OVERVIEW
While trying to give his all to a high-profile defense case, Dan chooses to cut a few corners regarding the firm’s IT Security procedures. The result places his entire career at stake when hackers find a way to gain his exact login credentials. This episode focuses on increasing awareness around keystroke loggers and what hackers can do with them.

312 YOUR PAGE IS MY PAGE

SECURITY TOPIC
Passphrase Security

OVERVIEW
When faced with a blackmail threat regarding embarrassing messages, Emily tries to understand how hackers might have accessed her account. Weak password practices could be to blame.