Menu
Languages

Don’t Click

Social

Understand cyberattacks. Protect yourself better.

Every day, thousands of attacks target businesses and individuals without them even realizing it. Phishing, ransomware, identity theft, hidden vulnerabilities… the web has become an ideal playground for cybercriminals.

In this series — both humorous and educational — Steven Meyer breaks down the ten most common online attacks and shares practical advice on how to protect yourself effectively. Developed in collaboration with ZENDATA and RTS – Radio Télévision Suisse, the series combines expertise, accessibility, and real-life scenarios to turn everyday users into informed digital citizens.

Phishing is a form of digital psychological manipulation used for fraudulent purposes. Its modus operandi is to convince the recipient of an email that the sender is trustworthy, with the ultimate goal of extracting sensitive personal information. Learn here how to protect yourself from phishing.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Online scams — commonly referred to as scamming — all share one key element: they request advance payment from the victim, regardless of the pretext. Initial contact often happens via email, but also through chat platforms like Messenger, social media networks, dating websites, online marketplaces for real estate or used cars, and even job search platforms. Learn here how to protect yourself from online scams.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Identity theft occurs when a hacker impersonates a trusted person or company via email in order to deceive you and ultimately steal your passwords and personal data. Learn here how to protect yourself from identity theft.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Whenever we send an email, visit a website, make an online payment, or share a WhatsApp message, our devices exchange information over the Internet. As this data travels through Wi-Fi signals, routers, and servers, it can be intercepted — and even altered — by a malicious actor. This is known as a Man-in-the-Middle (MitM) attack. Learn here how to protect yourself from Man-in-the-Middle attacks.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Passwords are the most commonly used cybersecurity tools. Yet they are often misused or poorly configured, regularly leading to attacks and breaches. Websites get hacked, people fall victim to phishing, and computers get infected; stolen passwords are then sold on the Dark Web. Learn here how to protect yourself from Dark Web attacks.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

A Brute Force attack is a method used in cryptanalysis to discover a password or a key by systematically trying every possible combination. This approach is generally considered the most straightforward, as it can eventually break any password regardless of the protection in place, although the time required increases with the password’s length. Learn here how to protect yourself from Brute Force attacks.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Web browsers and software can have security flaws in their programs, and these vulnerabilities are what hackers constantly try to exploit. When they succeed, it often comes at the user’s expense — especially for those who haven’t kept their software up to date. Learn here how to make yourself less vulnerable to hackers.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Malware, commonly known as viruses, is malicious code designed to exploit your computer or smartphone. There are several types, including spyware, Trojans, and ransomware. In many cases, malware isn’t after your files but rather your browsing history and the information it contains, such as your online banking details. Learn here how to protect yourself from malware.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Twenty years ago, the USB port was created for data transfer, not for charging devices. Even today, when you connect your smartphone or tablet to a USB port, data can be transferred without your knowledge along with the electrical current. Every time you charge your devices using an unfamiliar USB port, you risk getting infected with malware or having your data stolen. Learn here how to protect yourself from USB ports and drives.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA

Many hackers, once they succeed in compromising your computers, try to use them to spy on you — often through your camera or microphone. Whether their goal is to monetize the information, conduct corporate espionage, monitor someone, or pursue malicious intentions, hackers exploit device peripherals to steal real-world information. Learn here how to protect your microphones and cameras on computers and smartphones.

Production
Jonathan Lemieux
Scripts
Jonathan Lemieux, Steven Meyer
Cybersecurity experts
Steven Meyer, Neïlo Perrin-Ganier
Director, camera, editing and motion design
Thierry Schwob
Camera and lights
Charlotte Aebischer
With the participation of
RTS - Radio Télévision Suisse
In collaboration with
ZENDATA
Next project
Play
info@ourframe.ch