Part 2/5:
The audience is then guided to observe what appears to be a normal browsing session, which quickly turns into an eye-opening demonstration of cyber vulnerabilities.
Access to Cloud Storage and Data Breach Capabilities
One of the key moments in the demonstration involves accessing cloud storage. The hacker, or attacker, demonstrates the ability to view and even save copies of documents stored online remotely. The facilitator shows that with the right malicious app, a hacker could trigger many actions, such as downloading or manipulating files without the user’s knowledge.