Season
Season 5
Home VPN Security
Lock Before You Walk
Learn corporate device security and WFH best practices after a remote worker’s laptop causes a cyber attack on a hospital’s patient data. Guest: Alex Thomas.
Social Media
Home Phished
A Suprema hack exposed millions of users’ biometrics. A PhenoScan employee falls for spear phishing, leading to business infiltration. Learn to stay safe.
Man in the Middle Attack
GPS Distress
A ransomware attack on NavTerrain strands a mountaineer on Mt. Everest after a “Man-in-the-middle” hack via Chatbot. Guest stars detail the MITM attack.
Phishing, Smishing, & Vishing
Death Smish
The “Blueleaks” hack exposed sensitive police data, blowing the cover of undercover agent Diana. The attack started from a malicious text message.
401K Scams
401 Chaos
Fraud-related losses, including 401K fraud, totaled nearly $17B in 2019. Follow Celeste as she is surprised to become a victim and learn how to protect yourself.
Phishing, Smishing, & Vishing
House of Fraud
Cybercriminals are using home title fraud. A hacker uses a spoofed website to get personal information, fraudulently transfer ownership, and take out loans.
Money Mule Scams
Charity Case
A COVID-19 charity volunteer unknowingly becomes a money mule, transferring illegally acquired funds for a criminal organization and getting arrested for money laundering.
Email Attachment Threats
Scams Gone Viral
Hackers exploit crises by using email attachments to steal savings. An unsuspecting user opens a COVID-19 related file, resulting in devastation.
Physical Security
Let's Get Physical
Physical security is vital with remote work. Stay vigilant, adhere to policies, and report violations, as threat actors exploit courteous and trusting employees.
Business Email Compromise (BEC)
A Compromising Crash
Be wary of patient hackers who lie dormant in compromised accounts, learning about you for an attack. Never let your guard down with sensitive requests, especially urgent ones.
Macy’s Breach
Passphrase For Days
Hackers target Lacy’s after a new employee posts about their job. They used an easy to crack, recycled password for access.
Social Engineering
Hook, Line and Spoofer
Telephone scams use emotions, urgency, and legitimacy. Lloyd felt something was wrong, but specific details convinced him the call was real.