Second Season
Cybersecurity Breaking News

Channel Training / Second Season Episodes

Channel Episode 2.1

ALL CRAZY ABOUT DISCOUNTS / WATERING HOLE
In this episode, we analyse once again a cyber attack technique borrowed from nature: the watering hole technique. The attacker, like a crocodile, waits for his victim.

Channel Episode 2.2

SUCCESSFUL FISHING / WHATSAPP SCAM
In this episode, we narrate a scam which targets a “technologically unprepared” executive. It is a scam based on psychological manipulation in which the hacker, disguised behind a false identity, succeeds in his criminal intentions.

Channel Episode 2.3

CALLING OUT / VISHING & DATA THEFT
We are increasingly accustomed to receiving calls from operators who inform us of unilateral changes to the contracts we have entered into. The perception of risk in these phone calls has decreased to the point of providing sensitive credit card data.

Channel Episode 2.4

“DANGEROUS” CAR PARKS / QUISHING
In this episode we explore a recently spread scam, which relies on an increasingly used code: the QR code. The basic deceptive mechanism is the same as that used for phishing: convincing the potential victim to take an action.

Channel Episode 2.5

TRY, BUT DON’T FORGET / FAKE WEBSITE
Distinguishing the true from the false in the digital dimension can be a really difficult exercise. The danger of becoming the designated victims of cybercriminals is always real. How can we protect ourselves? By engaging in virtuous digital behaviours.

Channel Episode 2.6

COPY WITH TOO MUCH KNOWLEDGE / CEO FRAUD
Compromising corporate accounts and infiltrating corporate email is the threat that cybercriminals use to make executives’ worst nightmares come true, especially when the intruders know perfectly well how to disguise themselves.

Channel Episode 2.7

PHOTO SOUVENIR… TO FORGET / DATA PROTECTION
Nowadays, the ease with which we share data and information can generate very critical situations for our Privacy. Following some simple behavioural precautions, however, can protect us against “indiscreet” sharing.

Channel Episode 2.8

THE EMAIL WAS CRITICAL / SPEAR PHISHING
Phishing is a cyber-attack technique that can take different forms depending on the context. Spear Phishing attacks, such as the one narrated in this episode, are generally more accurate, but hardly “perfect”.

Channel Episode 2.9

BEYOND APPEARANCES / FAKE NEWS
This episode explores in greater depth the threat hidden behind fake news, which now runs amok, undisturbed on the web. Before believing a sensational piece of news found on the web, we must subject it to an accurate X-ray.

Channel Episode 2.10

A “WRONG” DONATION / PHARMING
This episode highlights a particularly sneaky attack technique, which in the creativity of Cybersecurity specialists has taken on a special name: Pharming, the cloned site technique. But what is Pharming?

Channel Episode 2.11

DANGEROUS POSTS / PRIVACY
In the age of social media sharing, does privacy still exist? This episode tells the story of a candidate who was “rejected” from a selection, due to a post published on his social media profiles. A warning for young people, but also for the older ones.

Channel Episode 2.12

A VERY “EXPENSIVE” HOLIDAY / SHARED DEVICES
The essence of this story is the importance that our devices have taken on, both in the private and professional spheres. That’s why we have to be very careful about how we use these tools.

More

Want to know more?

Want to know more?