<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/global/feed/rss.xslt" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podaccess="https://access.acast.com/schema/1.0/" xmlns:acast="https://schema.acast.com/1.0/">
    <channel>
		<ttl>60</ttl>
		<generator>acast.com</generator>
		<title>No Shit InfoSec</title>
		<link>https://anchor.fm/noshitinfosec</link>
		<atom:link href="https://feeds.acast.com/public/shows/62f7b78a300e0800122199d5" rel="self" type="application/rss+xml"/>
		<language>en</language>
		<copyright>Robert</copyright>
		<itunes:keywords/>
		<itunes:author>Robert</itunes:author>
		<itunes:subtitle/>
		<itunes:summary><![CDATA[The No Shit InfoSec is information security for the average human. This is about stuff that affects you and the ones you love. We also deliver helpful advice to make yourself a harder target for Evil Steve. The show is not an infomercial or watered-down B.S. that isn't relevant. The show does contain language and topics not suitable for children, cute fluffy animals, speaker play in the office, people with thin skins, and Karens. So, grab a tasty adult beverage, sit back, and get ready to rethink how you use this awesome tool we call the Internet!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		<description><![CDATA[The No Shit InfoSec is information security for the average human. This is about stuff that affects you and the ones you love. We also deliver helpful advice to make yourself a harder target for Evil Steve. The show is not an infomercial or watered-down B.S. that isn't relevant. The show does contain language and topics not suitable for children, cute fluffy animals, speaker play in the office, people with thin skins, and Karens. So, grab a tasty adult beverage, sit back, and get ready to rethink how you use this awesome tool we call the Internet!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
		<itunes:explicit>true</itunes:explicit>
		<itunes:owner>
			<itunes:name>Robert</itunes:name>
			<itunes:email>info+62f7b78a300e0800122199d5@mg-eu.acast.com</itunes:email>
		</itunes:owner>
		<acast:showId>62f7b78a300e0800122199d5</acast:showId>
		<acast:showUrl>no-shit-infosec</acast:showUrl>
		<acast:signature key="EXAMPLE" algorithm="aes-256-cbc"><![CDATA[wbG1Z7+6h9QOi+CR1Dv0uQ==]]></acast:signature>
		<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmTHg2/BXqPr07kkpFZ5JfhvEZqggcpunI6E1w81XpUaBscFc3skEQ0jWG4GCmQYJ66w6pH6P/aGd3DnpJN6h/CD4icd8kZVl4HZn12KicA2k]]></acast:settings>
        <acast:network id="62f7b78a300e0800122199d9" slug="j-robert-campbell-sr-62f7b78a300e0800122199d9"><![CDATA[J. Robert Campbell, SR]]></acast:network>
		<acast:importedFeed>https://anchor.fm/s/9c5b8cbc/podcast/rss</acast:importedFeed>
		<itunes:type>episodic</itunes:type>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<image>
				<url>https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg</url>
				<link>https://anchor.fm/noshitinfosec</link>
				<title>No Shit InfoSec</title>
			</image>
			<itunes:new-feed-url>https://feeds.acast.com/public/shows/62f7b78a300e0800122199d5</itunes:new-feed-url>
		<item>
			<title>Breaches ever reaching</title>
			<itunes:title>Breaches ever reaching</itunes:title>
			<pubDate>Tue, 13 Sep 2022 00:52:43 GMT</pubDate>
			<itunes:duration>5:42</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/631fd45be2f8d00012989752/media.mp3" length="5487969" type="audio/mpeg"/>
			<guid isPermaLink="false">631fd45be2f8d00012989752</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://shows.acast.com/no-shit-infosec/episodes/breaches-ever-reaching</link>
			<acast:episodeId>631fd45be2f8d00012989752</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:episodeUrl>breaches-ever-reaching</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZspsHvOu/y0rol6cwinxDL1cyaBusL98GalPn92vFOfJjB0272m9myFnvNps823woc32KBqZ9vrRY5naTJJZyTftWvLNmdCrp5nXRUreeM825d/nzJZAXWCQpfRUDRN9yR]]></acast:settings>
			<itunes:subtitle>A short episode about the reaching effects of breaches and accounts you may have forgotten</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>15</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[<p>A short episode about the reaching effects of breaches and accounts you may have forgotten about.</p><br><p>New Marriot Breach:</p><p>https://techcrunch.com/2022/07/06/marriott-breach-again/</p><br><p>Privacy Fix: How to Find Old Online Accounts from Consumer Reports:</p><p>https://www.consumerreports.org/digital-security/how-to-find-old-online-accounts-a1266305698/</p><br><p>Has you email or phone number been in a breach?</p><p>https://haveibeenpwned.com/</p><br><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>A short episode about the reaching effects of breaches and accounts you may have forgotten about.</p><br><p>New Marriot Breach:</p><p>https://techcrunch.com/2022/07/06/marriott-breach-again/</p><br><p>Privacy Fix: How to Find Old Online Accounts from Consumer Reports:</p><p>https://www.consumerreports.org/digital-security/how-to-find-old-online-accounts-a1266305698/</p><br><p>Has you email or phone number been in a breach?</p><p>https://haveibeenpwned.com/</p><br><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Future of Technology</title>
			<itunes:title>The Future of Technology</itunes:title>
			<pubDate>Mon, 05 Sep 2022 05:00:15 GMT</pubDate>
			<itunes:duration>52:25</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/63150dc68c108e00131a30c1/media.mp3" length="28158746" type="audio/mpeg"/>
			<guid isPermaLink="false">63150dc68c108e00131a30c1</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://shows.acast.com/no-shit-infosec/episodes/the-future-of-technology</link>
			<acast:episodeId>63150dc68c108e00131a30c1</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:episodeUrl>the-future-of-technology</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZspsHvOu/y0rol6cwinxDL1cyaBusL98GalPn92vFOfJhdVOQqV+mcxIIp8WqV+hJl0/T+RuWL2vQF862+zOmj7Osxj05D7LQz10JgK2c28sUYoHrsy5Q7k7yH06/gxWro]]></acast:settings>
			<itunes:subtitle>A philosophical look at the future of technology.</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>14</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[<p>SHOW NOTES:</p><br><p>Brady and I discuss people and technology; where it was, where we are, and where we are going. Put on your philosophy hats!</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Podcast Stuff:</p><br><p>Robert actually had an Atari 1200 XL:</p><p>http://oldcomputers.net/atari-1200xl.html</p><br><p>Ray Ban Smart Glasses:</p><p>https://www.ray-ban.com/usa/electronics/RW4002%20UNISEX%20ray-ban%20stories%20%7C%20wayfarer-shiny%20black/8056597489478?fbclid=IwAR08oSxzKyvMfsPYKa1PtvVkda6rJtAlAyJ24pDFSCo03tIqaIxDnVC9IWw&amp;cid=PM-SBI_080622-1.US-RayBanStories-EN-B-Related-Exact_RayBan_Related_ray+ban+camera+glasses&amp;gclid=c6b5a6ec15e015a94bb7c5f91c52a69c&amp;gclsrc=3p.ds&amp;msclkid=c6b5a6ec15e015a94bb7c5f91c52a69c&amp;utm_source=bing&amp;utm_medium=cpc&amp;utm_campaign=1.US-RayBanStories-EN-B-Related-Exact&amp;utm_term=ray%20ban%20camera%20glasses&amp;utm_content=RayBan_Related</p><br><p>Google Glass is Back:</p><p>https://www.google.com/glass/start/</p><br><p>Microsoft Research:</p><p>https://www.microsoft.com/en-us/research/about-microsoft-research/</p><br><p>Microsoft Open Source Blog:</p><p>https://cloudblogs.microsoft.com/opensource/</p><br><p>Microsoft Open Source Hardware:</p><p>https://azure.microsoft.com/en-us/global-infrastructure/hardware-innovation/</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Picks of the Week:</p><br><p>Brady's Picks</p><p>Defeating the Hacker: A non-technical guide to computer security by Robert Schifreen</p><p>https://www.amazon.com/Defeating-Hacker-non-technical-computer-security/dp/0470025557</p><br><p>Robert's Pick:</p><p>The Satanic Veres by Salman Rushdie&nbsp;</p><p>https://en.wikipedia.org/wiki/The_Satanic_Verses</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>END OF SHOW NOTES</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>SHOW NOTES:</p><br><p>Brady and I discuss people and technology; where it was, where we are, and where we are going. Put on your philosophy hats!</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Podcast Stuff:</p><br><p>Robert actually had an Atari 1200 XL:</p><p>http://oldcomputers.net/atari-1200xl.html</p><br><p>Ray Ban Smart Glasses:</p><p>https://www.ray-ban.com/usa/electronics/RW4002%20UNISEX%20ray-ban%20stories%20%7C%20wayfarer-shiny%20black/8056597489478?fbclid=IwAR08oSxzKyvMfsPYKa1PtvVkda6rJtAlAyJ24pDFSCo03tIqaIxDnVC9IWw&amp;cid=PM-SBI_080622-1.US-RayBanStories-EN-B-Related-Exact_RayBan_Related_ray+ban+camera+glasses&amp;gclid=c6b5a6ec15e015a94bb7c5f91c52a69c&amp;gclsrc=3p.ds&amp;msclkid=c6b5a6ec15e015a94bb7c5f91c52a69c&amp;utm_source=bing&amp;utm_medium=cpc&amp;utm_campaign=1.US-RayBanStories-EN-B-Related-Exact&amp;utm_term=ray%20ban%20camera%20glasses&amp;utm_content=RayBan_Related</p><br><p>Google Glass is Back:</p><p>https://www.google.com/glass/start/</p><br><p>Microsoft Research:</p><p>https://www.microsoft.com/en-us/research/about-microsoft-research/</p><br><p>Microsoft Open Source Blog:</p><p>https://cloudblogs.microsoft.com/opensource/</p><br><p>Microsoft Open Source Hardware:</p><p>https://azure.microsoft.com/en-us/global-infrastructure/hardware-innovation/</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Picks of the Week:</p><br><p>Brady's Picks</p><p>Defeating the Hacker: A non-technical guide to computer security by Robert Schifreen</p><p>https://www.amazon.com/Defeating-Hacker-non-technical-computer-security/dp/0470025557</p><br><p>Robert's Pick:</p><p>The Satanic Veres by Salman Rushdie&nbsp;</p><p>https://en.wikipedia.org/wiki/The_Satanic_Verses</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><br><p>xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx</p><p>END OF SHOW NOTES</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Mis-information, Dis-information, and Fake News. You are a product and target for all of it.</title>
			<itunes:title>Mis-information, Dis-information, and Fake News. You are a product and target for all of it.</itunes:title>
			<pubDate>Mon, 29 Aug 2022 05:00:22 GMT</pubDate>
			<itunes:duration>1:13:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/630a801a1af63f0012b925db/media.mp3" length="39568414" type="audio/mpeg"/>
			<guid isPermaLink="false">630a801a1af63f0012b925db</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://shows.acast.com/no-shit-infosec/episodes/mis-information-dis-information-and-fake-news-you-are-a-prod</link>
			<acast:episodeId>630a801a1af63f0012b925db</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:episodeUrl>mis-information-dis-information-and-fake-news-you-are-a-prod</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZspsHvOu/y0rol6cwinxDL1cyaBusL98GalPn92vFOfJg71vFYiKJdtOcXczrppcNEAmUoOVZboWJJh9qkP/aBBtORQWnnl8Q6H3SdTkiKRkkFbS4qFyo1cElY5FymPtyt]]></acast:settings>
			<itunes:subtitle>Brady and I discuss Mis-information, Dis-information, and Fake News.</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>13</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[<p>Season 1, Episode 13</p><br><p>Mis-information, Dis-information, and Fake News. You are a product and target for all of it.</p><br><p>Brady and I discuss Mis-information, Dis-information, and Fake News. We discuss what it is, how it is used, and we are all a product and target for all of it. We discuss ways to avoid deception which leads to a philosophical discussion about truth, morals, and ethics. Brady takes a moment on the couch discussing how understanding the matrix for what it is can affect you on a personal level.</p><br><p>Links and Resources:</p><br><p>Definitely NOT real NEWS, but FUN to read:</p><br><p>The Onion</p><p>https://www.theonion.com/</p><br><p>The Weekly World News</p><p>https://weeklyworldnews.com/</p><br><p>Mad Magazine</p><p>https://www.madmagazine.com/</p><br><p><br></p><p>Fight Disinformation with Fact Checking Sites:</p><br><p>Snopes</p><p>(almost everything including politics, history, science, and technology)</p><p>https://www.snopes.com/</p><br><p>Politifact</p><p>(all about fact-checking political claims)</p><p>https://www.politifact.com/</p><br><p>FactCheck.org</p><p>(political claims, rhetorics, deception, and lies)</p><p>https://www.factcheck.org/fake-news/</p><br><p>ProPublica</p><p>(deep dive for hidden truth)</p><p>https://www.propublica.org/</p><br><p>OpenSecrets</p><p>(politics)</p><p>https://www.opensecrets.org/</p><br><p>Washington Post Fact Checker</p><p>(critical analysis to what politicians have said this week)</p><p>https://www.washingtonpost.com/news/fact-checker/</p><br><p>Full Fact</p><p>(Fact-checking website focused on the UK and Europe)</p><p>https://fullfact.org/</p><br><p>and for most recent</p><br><p>https://fullfact.org/latest/</p><br><p>Alt News</p><p>(fake claims and political misinformation in India)</p><p>https://www.altnews.in/</p><br><p>BOOM FactCheck</p><p>(fact-checking website in India)</p><p>https://www.boomlive.in/</p><br><p>SM Hoax Slayer</p><p>(fake information on social media platforms)</p><p>https://smhoaxslayer.com/</p><br><p>Reuters Fact Check</p><p>(international news fact checking)</p><p>https://www.reuters.com/fact-check</p><br><p><br></p><p>Picks of the Week:</p><br><p>Brady's Picks</p><br><p>Tobii Pro: Optimizing User Experience and Advertising Research with Eye Tracking</p><p>https://youtu.be/ConsSlIf6n4</p><br><p>Hotjar: Website Heatmaps &amp; Behavior Analytics Tools</p><p>https://www.hotjar.com/</p><br><p>Robert's Pick:</p><p>House of the Dragon: The Game of Thrones prequel</p><p>https://www.hbo.com/house-of-the-dragon</p><br><p><br></p><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Season 1, Episode 13</p><br><p>Mis-information, Dis-information, and Fake News. You are a product and target for all of it.</p><br><p>Brady and I discuss Mis-information, Dis-information, and Fake News. We discuss what it is, how it is used, and we are all a product and target for all of it. We discuss ways to avoid deception which leads to a philosophical discussion about truth, morals, and ethics. Brady takes a moment on the couch discussing how understanding the matrix for what it is can affect you on a personal level.</p><br><p>Links and Resources:</p><br><p>Definitely NOT real NEWS, but FUN to read:</p><br><p>The Onion</p><p>https://www.theonion.com/</p><br><p>The Weekly World News</p><p>https://weeklyworldnews.com/</p><br><p>Mad Magazine</p><p>https://www.madmagazine.com/</p><br><p><br></p><p>Fight Disinformation with Fact Checking Sites:</p><br><p>Snopes</p><p>(almost everything including politics, history, science, and technology)</p><p>https://www.snopes.com/</p><br><p>Politifact</p><p>(all about fact-checking political claims)</p><p>https://www.politifact.com/</p><br><p>FactCheck.org</p><p>(political claims, rhetorics, deception, and lies)</p><p>https://www.factcheck.org/fake-news/</p><br><p>ProPublica</p><p>(deep dive for hidden truth)</p><p>https://www.propublica.org/</p><br><p>OpenSecrets</p><p>(politics)</p><p>https://www.opensecrets.org/</p><br><p>Washington Post Fact Checker</p><p>(critical analysis to what politicians have said this week)</p><p>https://www.washingtonpost.com/news/fact-checker/</p><br><p>Full Fact</p><p>(Fact-checking website focused on the UK and Europe)</p><p>https://fullfact.org/</p><br><p>and for most recent</p><br><p>https://fullfact.org/latest/</p><br><p>Alt News</p><p>(fake claims and political misinformation in India)</p><p>https://www.altnews.in/</p><br><p>BOOM FactCheck</p><p>(fact-checking website in India)</p><p>https://www.boomlive.in/</p><br><p>SM Hoax Slayer</p><p>(fake information on social media platforms)</p><p>https://smhoaxslayer.com/</p><br><p>Reuters Fact Check</p><p>(international news fact checking)</p><p>https://www.reuters.com/fact-check</p><br><p><br></p><p>Picks of the Week:</p><br><p>Brady's Picks</p><br><p>Tobii Pro: Optimizing User Experience and Advertising Research with Eye Tracking</p><p>https://youtu.be/ConsSlIf6n4</p><br><p>Hotjar: Website Heatmaps &amp; Behavior Analytics Tools</p><p>https://www.hotjar.com/</p><br><p>Robert's Pick:</p><p>House of the Dragon: The Game of Thrones prequel</p><p>https://www.hbo.com/house-of-the-dragon</p><br><p><br></p><p>Cool Shit:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Education, Certifications, and sipping on the Socials</title>
			<itunes:title>Education, Certifications, and sipping on the Socials</itunes:title>
			<pubDate>Mon, 22 Aug 2022 22:09:55 GMT</pubDate>
			<itunes:duration>31:50</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/6303feb14acc5c00132f2d79/media.mp3" length="21824825" type="audio/mpeg"/>
			<guid isPermaLink="false">6303feb14acc5c00132f2d79</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://shows.acast.com/no-shit-infosec/episodes/education-certifications-and-sipping-on-the-socials</link>
			<acast:episodeId>6303feb14acc5c00132f2d79</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:episodeUrl>education-certifications-and-sipping-on-the-socials</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZspsHvOu/y0rol6cwinxDL1cyaBusL98GalPn92vFOfJiByLSnkkdpehKIUPdsIaQXnZnymnqRO0rj9togy8kPZZaCCH21mAWljbvVpHmisr5bC5LgxJRL13fgZsZWpjkX]]></acast:settings>
			<itunes:subtitle>I discuss the value of an Education, the value of certifications, and the value of a positive Social Media presence.</itunes:subtitle>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>12</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[<p>I have had a lot of questions over the years about how to proceed with a career, education, and certifications. So, I give my take on these and what they mean relative to my life experiences. Individual mileage may vary. I also discuss the need to have a public facing social media presence that is active and consistent. Hide the private Socials and search to see what actually shows up when searching for yourself. Your future employers will. Just sayin'.</p><br><p>Links:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>I have had a lot of questions over the years about how to proceed with a career, education, and certifications. So, I give my take on these and what they mean relative to my life experiences. Individual mileage may vary. I also discuss the need to have a public facing social media presence that is active and consistent. Hide the private Socials and search to see what actually shows up when searching for yourself. Your future employers will. Just sayin'.</p><br><p>Links:</p><br><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Social Engineering with My Son</title>
			<itunes:title>Social Engineering with My Son</itunes:title>
			<pubDate>Mon, 15 Aug 2022 12:47:40 GMT</pubDate>
			<itunes:duration>31:06</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/62f98ff597c5f70013f14920/media.mp3" length="30190636" type="audio/mpeg"/>
			<guid isPermaLink="false">62f98ff597c5f70013f14920</guid>
			<itunes:explicit>true</itunes:explicit>
			<link>https://shows.acast.com/no-shit-infosec/episodes/social-engineering-with-my-son</link>
			<acast:episodeId>62f98ff597c5f70013f14920</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:episodeUrl>social-engineering-with-my-son</acast:episodeUrl>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZMTtedvdcRQbP4eiLMjXzCKLPjEYLpGj+NMVKa+5C8pL4u/EOj1Vw4h5MMJYp0lCcFAe0fnxBJy/1ju4Qxy1fh8gO4DvlGA40yms2g0/hOkcrfHIopjTygHFqGwwOPKFIai4SuTvs86Lx3UYCyl6ZspsHvOu/y0rol6cwinxDL1cyaBusL98GalPn92vFOfJgnqq2KGSua4zCUoAX1KJRbneeoiJXu5it3h5saG1Hsko3O9PYBkf0RElWxo+simv07kjcWQ5CPBT4uwYmlcsKe]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>11</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[In this episode, I discuss basic social engineering with my son and how he can learn to detect it.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this episode, I discuss basic social engineering with my son and how he can learn to detect it.<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA["Stupid Users" ... no, not those users, the other "stupid users"]]></title>
			<itunes:title><![CDATA["Stupid Users" ... no, not those users, the other "stupid users"]]></itunes:title>
			<pubDate>Mon, 08 Aug 2022 05:00:27 GMT</pubDate>
			<itunes:duration>15:46</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/775b425b-620c-4c9f-af5e-601f01b0ede4/media.mp3" length="15308086" type="audio/mpeg"/>
			<guid isPermaLink="false">775b425b-620c-4c9f-af5e-601f01b0ede4</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Stupid-Users-----no--not-those-users--the-other-stupid-users-e1m7fbe</link>
			<acast:episodeId>62f7b7908cf2d800126b240b</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpZqJpgtnPHYdY6bL/Xl52V2]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>10</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[In this week's episode, I chat with R. Brady Frost about the little plumber vs the gigantic rock. Then we move in to a discussion about the fallacy of stupid users with some great stories of stupid things done by those of us who really should know better. The moral of the story, is that we are all human and nothing will ever change that. Instead, we need to be prepared for when humans are human.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[In this week's episode, I chat with R. Brady Frost about the little plumber vs the gigantic rock. Then we move in to a discussion about the fallacy of stupid users with some great stories of stupid things done by those of us who really should know better. The moral of the story, is that we are all human and nothing will ever change that. Instead, we need to be prepared for when humans are human.&nbsp;<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>One Weird Trick</title>
			<itunes:title>One Weird Trick</itunes:title>
			<pubDate>Mon, 01 Aug 2022 06:37:57 GMT</pubDate>
			<itunes:duration>18:16</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/520c3e30-a277-477e-a1d4-616648247df0/media.mp3" length="17732422" type="audio/mpeg"/>
			<guid isPermaLink="false">520c3e30-a277-477e-a1d4-616648247df0</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/One-Weird-Trick-e1lukp0</link>
			<acast:episodeId>62f7b7908cf2d800126b240c</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpbUJ00BfPwib3Fk60iR5uz+]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>9</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/show-cover.jpg"/>
			<description><![CDATA[<p>In this episode, I talk about getting in to the field of cybersecurity or moving up in the field. I also talk about how keyboards could keep malware from going Boom on your system.</p><p>Links:</p><p>Try This One Weird Trick Russian Hackers Hate</p><p>https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/</p><p><br></p><p>Fake VM Sandbox artifacts - not talked about in this episode</p><p>https://github.com/NavyTitanium/Fake-Sandbox-Artifacts</p><p><br></p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, I talk about getting in to the field of cybersecurity or moving up in the field. I also talk about how keyboards could keep malware from going Boom on your system.</p><p>Links:</p><p>Try This One Weird Trick Russian Hackers Hate</p><p>https://krebsonsecurity.com/2021/05/try-this-one-weird-trick-russian-hackers-hate/</p><p><br></p><p>Fake VM Sandbox artifacts - not talked about in this episode</p><p>https://github.com/NavyTitanium/Fake-Sandbox-Artifacts</p><p><br></p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Internet Security: Child Edition</title>
			<itunes:title>Internet Security: Child Edition</itunes:title>
			<pubDate>Mon, 25 Jul 2022 05:00:28 GMT</pubDate>
			<itunes:duration>42:28</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/a6b4975d-0533-42d1-bcb3-51c6c5f330e1/media.mp3" length="41222342" type="audio/mpeg"/>
			<guid isPermaLink="false">a6b4975d-0533-42d1-bcb3-51c6c5f330e1</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Internet-Security-Child-Edition-e1jr2vc</link>
			<acast:episodeId>62f7b7908cf2d800126b240d</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpY3Zp6i0ixvSsoKrdiZi/CC]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>8</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b240d.jpg"/>
			<description><![CDATA[<p>In this episode, Brady and I have a discussion with our sons, Isaac and Devin, about Internet Security. This is after a security podcast for the average human, and who better fits that bill than our kids? Stayed tuned for outtakes at the end!</p><p><br></p><p>Pics of the week:</p><p>Elden Ring (Video Game)</p><p>https://en.bandainamcoent.eu/elden-ring/elden-ring</p><p><br></p><p>The Boys (Amazon Prime Series)</p><p>https://www.primevideo.com/detail/The-Boys/0KRGHGZCHKS920ZQGY5LBRF7MA</p><p><br></p><p>R. Brady Frost</p><p>https://www.rbradyfrost.com/</p><p>https://www.rbradyfrost.com/blog/category/a-battle-mage-reborn/</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, Brady and I have a discussion with our sons, Isaac and Devin, about Internet Security. This is after a security podcast for the average human, and who better fits that bill than our kids? Stayed tuned for outtakes at the end!</p><p><br></p><p>Pics of the week:</p><p>Elden Ring (Video Game)</p><p>https://en.bandainamcoent.eu/elden-ring/elden-ring</p><p><br></p><p>The Boys (Amazon Prime Series)</p><p>https://www.primevideo.com/detail/The-Boys/0KRGHGZCHKS920ZQGY5LBRF7MA</p><p><br></p><p>R. Brady Frost</p><p>https://www.rbradyfrost.com/</p><p>https://www.rbradyfrost.com/blog/category/a-battle-mage-reborn/</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>The Importance of Data Reduction</title>
			<itunes:title>The Importance of Data Reduction</itunes:title>
			<pubDate>Mon, 18 Jul 2022 05:00:21 GMT</pubDate>
			<itunes:duration>40:39</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/d952d1c9-705c-4dd1-b651-60fd3e2a6a8c/media.mp3" length="39452781" type="audio/mpeg"/>
			<guid isPermaLink="false">d952d1c9-705c-4dd1-b651-60fd3e2a6a8c</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/The-Importance-of-Data-Reduction-e1jr2nv</link>
			<acast:episodeId>62f7b7908cf2d800126b240e</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpZPxgPcSug1XSgsDpjKkmwy]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>7</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b240e.jpg"/>
			<description><![CDATA[<p>In this episode, I have a discussion about data reduction with special guest and author, R. Brady Frost. The discussion revolves around the security risk of keeping too much data available, and things that can be done to mitigate those risks.</p><p><br></p><p>Pics of the week:</p><p>Hackers (The Movie)</p><p>https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1</p><p><br></p><p>Our Flag Means Death</p><p>https://www.imdb.com/title/tt11000902/</p><p><br></p><p>R. Brady Frost</p><p>https://www.rbradyfrost.com/</p><p>https://www.rbradyfrost.com/blog/category/a-battle-mage-reborn/</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this episode, I have a discussion about data reduction with special guest and author, R. Brady Frost. The discussion revolves around the security risk of keeping too much data available, and things that can be done to mitigate those risks.</p><p><br></p><p>Pics of the week:</p><p>Hackers (The Movie)</p><p>https://www.imdb.com/title/tt0113243/?ref_=fn_al_tt_1</p><p><br></p><p>Our Flag Means Death</p><p>https://www.imdb.com/title/tt11000902/</p><p><br></p><p>R. Brady Frost</p><p>https://www.rbradyfrost.com/</p><p>https://www.rbradyfrost.com/blog/category/a-battle-mage-reborn/</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Realtime Global Cyber Attack Map</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Use a Password Manager</title>
			<itunes:title>Use a Password Manager</itunes:title>
			<pubDate>Mon, 11 Jul 2022 05:00:35 GMT</pubDate>
			<itunes:duration>19:08</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/80276613-2695-40c0-aceb-70198754732e/media.mp3" length="18583190" type="audio/mpeg"/>
			<guid isPermaLink="false">80276613-2695-40c0-aceb-70198754732e</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Use-a-Password-Manager-e1jr26g</link>
			<acast:episodeId>62f7b7908cf2d800126b240f</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpbVrfTyidrxFSUvHmOAIsVg]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>6</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b240f.jpg"/>
			<description><![CDATA[<p>Picking up from the last episode, we are now delving in to the security measures we can implement to make ourselves a less attractive for Evil Steve. After implementing 2FA, we should now be setting up and using a password manager. Then we look for and changed passwords involved in known breaches (haveibeenpwned - link in show notes). The show is approximately 19 minutes long.</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Password Manager Reviews:</p><p>https://www.tomsguide.com/us/best-password-managers,review-3785.html</p><p>https://www.pcmag.com/picks/the-best-password-managers</p><p>https://www.nytimes.com/wirecutter/reviews/best-password-managers/</p><p><br></p><p>Stand-Alone Password Managers</p><p>KeePass</p><p>https://keepass.info/</p><p>KeePassXC</p><p>https://keepassxc.org/</p><p><br></p><p>Recent Authenticator App Reviews</p><p>https://www.pcmag.com/picks/the-best-authenticator-apps</p><p>https://www.nytimes.com/wirecutter/reviews/best-two-factor-authentication-app/</p><p><br></p><p>Google password manager articles</p><p>https://privacycrypts.com/password-managers/guides/is-chrome-password-manager-safe/</p><p>https://www.experian.com/blogs/ask-experian/is-google-passwordmanager-secure/</p><p><br></p><p>Apple iCloud Keychain</p><p>https://www.imore.com/icloud-keychain</p><p>https://www.intego.com/mac-security-blog/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works/</p><p>https://www.podfeet.com/blog/2021/06/icloud-keychain-vs-1password/</p><p><br></p><p>iCloud Keychain 2FA - how to</p><p>https://www.guidingtech.com/use-icloud-keychain-two-factor-authentication/</p><p><br></p><p>Apple iCloud Keychain security issues</p><p>https://www.wired.com/story/keysteal-apple-keychain-attack-shenanigans/</p><p><br></p><p>Microsoft Authenticator vs Google Authenticator</p><p>https://www.365tech.ca/which-one-is-better-microsoft-authenticator-or-google-authenticator/</p><p><br></p><p>Google Authenticator</p><p>https://www.techdim.com/what-is-google-authenticator/</p><p><br></p><p>Google Authenticator security issue</p><p>https://privacypros.io/u2f/stop-using-google-auth/</p><p><br></p><p>Microsoft Authenticator</p><p>https://www.androidauthority.com/microsoft-authenticator-987754/</p><p><br></p><p>Microsoft Authenticator security issue</p><p>https://www.transmitsecurity.com/blog/microsoft-authenticator-a-false-sense-of-security</p><p><br></p><p>Permanent link because it's very cool.</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Picking up from the last episode, we are now delving in to the security measures we can implement to make ourselves a less attractive for Evil Steve. After implementing 2FA, we should now be setting up and using a password manager. Then we look for and changed passwords involved in known breaches (haveibeenpwned - link in show notes). The show is approximately 19 minutes long.</p><p><br></p><p>Links:</p><p>Has your password been involved in a breach?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>Password Manager Reviews:</p><p>https://www.tomsguide.com/us/best-password-managers,review-3785.html</p><p>https://www.pcmag.com/picks/the-best-password-managers</p><p>https://www.nytimes.com/wirecutter/reviews/best-password-managers/</p><p><br></p><p>Stand-Alone Password Managers</p><p>KeePass</p><p>https://keepass.info/</p><p>KeePassXC</p><p>https://keepassxc.org/</p><p><br></p><p>Recent Authenticator App Reviews</p><p>https://www.pcmag.com/picks/the-best-authenticator-apps</p><p>https://www.nytimes.com/wirecutter/reviews/best-two-factor-authentication-app/</p><p><br></p><p>Google password manager articles</p><p>https://privacycrypts.com/password-managers/guides/is-chrome-password-manager-safe/</p><p>https://www.experian.com/blogs/ask-experian/is-google-passwordmanager-secure/</p><p><br></p><p>Apple iCloud Keychain</p><p>https://www.imore.com/icloud-keychain</p><p>https://www.intego.com/mac-security-blog/mac-and-ios-keychain-tutorial-how-apples-icloud-keychain-works/</p><p>https://www.podfeet.com/blog/2021/06/icloud-keychain-vs-1password/</p><p><br></p><p>iCloud Keychain 2FA - how to</p><p>https://www.guidingtech.com/use-icloud-keychain-two-factor-authentication/</p><p><br></p><p>Apple iCloud Keychain security issues</p><p>https://www.wired.com/story/keysteal-apple-keychain-attack-shenanigans/</p><p><br></p><p>Microsoft Authenticator vs Google Authenticator</p><p>https://www.365tech.ca/which-one-is-better-microsoft-authenticator-or-google-authenticator/</p><p><br></p><p>Google Authenticator</p><p>https://www.techdim.com/what-is-google-authenticator/</p><p><br></p><p>Google Authenticator security issue</p><p>https://privacypros.io/u2f/stop-using-google-auth/</p><p><br></p><p>Microsoft Authenticator</p><p>https://www.androidauthority.com/microsoft-authenticator-987754/</p><p><br></p><p>Microsoft Authenticator security issue</p><p>https://www.transmitsecurity.com/blog/microsoft-authenticator-a-false-sense-of-security</p><p><br></p><p>Permanent link because it's very cool.</p><p>https://threatmap.checkpoint.com/</p><p><br></p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>To Do List - 2FA</title>
			<itunes:title>To Do List - 2FA</itunes:title>
			<pubDate>Mon, 04 Jul 2022 05:00:51 GMT</pubDate>
			<itunes:duration>15:48</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/01d842c7-3c45-43bf-97c2-56edb9cf6f26/media.mp3" length="15333621" type="audio/mpeg"/>
			<guid isPermaLink="false">01d842c7-3c45-43bf-97c2-56edb9cf6f26</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/To-Do-List---2FA-e1jr24q</link>
			<acast:episodeId>62f7b7908cf2d800126b2410</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpYn7ROmOro6+MOdZwFURbmy]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>5</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2410.jpg"/>
			<description><![CDATA[<p>Picking up from the last episode, we are now delving in to the security measures we can implement to make ourselves a less attractive for Evil Steve. Two Facor Authentication (2FA) is ata the top of the list.</p><p><br></p><p>Links:</p><p>https://www.pcmag.com/picks/the-best-authenticator-apps?</p><p>https://www.ledger.com/es/academy/why-two-factor-authentication-2fa-matters-now-more-than-ever</p><p><br></p><p>Permanent link because it's very cool.</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Picking up from the last episode, we are now delving in to the security measures we can implement to make ourselves a less attractive for Evil Steve. Two Facor Authentication (2FA) is ata the top of the list.</p><p><br></p><p>Links:</p><p>https://www.pcmag.com/picks/the-best-authenticator-apps?</p><p>https://www.ledger.com/es/academy/why-two-factor-authentication-2fa-matters-now-more-than-ever</p><p><br></p><p>Permanent link because it's very cool.</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Who the F&ck is Evil Steve? Part 2]]></title>
			<itunes:title><![CDATA[Who the F&ck is Evil Steve? Part 2]]></itunes:title>
			<pubDate>Mon, 27 Jun 2022 05:00:49 GMT</pubDate>
			<itunes:duration>15:53</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/5f6d8ecd-7373-4e1c-b784-e92e42ee9e9d/media.mp3" length="15418695" type="audio/mpeg"/>
			<guid isPermaLink="false">5f6d8ecd-7373-4e1c-b784-e92e42ee9e9d</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Who-the-Fck-is-Evil-Steve--Part-2-e1jl76l</link>
			<acast:episodeId>62f7b7908cf2d800126b2411</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpb/SgnNKr8QLMsQrXqpHogw]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2411.jpg"/>
			<description><![CDATA[<p>Picking up from Episode 3: Picking up from the last episode, we delve a bit more into the types of threat actors (people) that are attacking us. We explore the run of the mill data theft hacker to the more professional Advanced Persistent Threats (APTs). The show is about 16 minutes long.</p><p><br></p><p>Links to information about Threat Actors listed below:</p><p>https://www.cisa.gov/</p><p>https://www.cisa.gov/cybersecurity</p><p>https://www.cisa.gov/cert</p><p>https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Picking up from Episode 3: Picking up from the last episode, we delve a bit more into the types of threat actors (people) that are attacking us. We explore the run of the mill data theft hacker to the more professional Advanced Persistent Threats (APTs). The show is about 16 minutes long.</p><p><br></p><p>Links to information about Threat Actors listed below:</p><p>https://www.cisa.gov/</p><p>https://www.cisa.gov/cybersecurity</p><p>https://www.cisa.gov/cert</p><p>https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title><![CDATA[Who the F&ck is Evil Steve? Part 1]]></title>
			<itunes:title><![CDATA[Who the F&ck is Evil Steve? Part 1]]></itunes:title>
			<pubDate>Mon, 20 Jun 2022 05:00:55 GMT</pubDate>
			<itunes:duration>14:12</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/bba56021-3fe0-4630-a03f-35d268639ead/media.mp3" length="13794766" type="audio/mpeg"/>
			<guid isPermaLink="false">bba56021-3fe0-4630-a03f-35d268639ead</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Who-the-Fck-is-Evil-Steve--Part-1-e1jl6pt</link>
			<acast:episodeId>62f7b7908cf2d800126b2412</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpbBceZPxxf8aimzl1qXexdB]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>3</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2412.jpg"/>
			<description><![CDATA[<p>Episode 3: Who the Fuck is Evil Steve</p><p><br></p><p>Picking up from Episode 2: Good Idea Fairy Hunting we continue exploring the concept of security as a people problem.</p><p>This week we stop to take a moment to focus on the Who rather than the What is attacking us. In CyberSecurity, we tend to get caught up in things that happen to us, that we forget that it is actually a person attacking us. Learning more about who wants the information we have will tell us the ways they go about stealing it. This gives us information to better protect our assets and begin active threat hunting. The show is about 15 minutes long.</p><p><br></p><p>Links to information about Threat Actors listed below:</p><p>https://www.cisa.gov/</p><p>https://www.cisa.gov/cybersecurity</p><p>https://www.cisa.gov/cert</p><p>https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>Episode 3: Who the Fuck is Evil Steve</p><p><br></p><p>Picking up from Episode 2: Good Idea Fairy Hunting we continue exploring the concept of security as a people problem.</p><p>This week we stop to take a moment to focus on the Who rather than the What is attacking us. In CyberSecurity, we tend to get caught up in things that happen to us, that we forget that it is actually a person attacking us. Learning more about who wants the information we have will tell us the ways they go about stealing it. This gives us information to better protect our assets and begin active threat hunting. The show is about 15 minutes long.</p><p><br></p><p>Links to information about Threat Actors listed below:</p><p>https://www.cisa.gov/</p><p>https://www.cisa.gov/cybersecurity</p><p>https://www.cisa.gov/cert</p><p>https://www.csoonline.com/article/3619011/the-10-most-dangerous-cyber-threat-actors.html</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Good Idea Fairy Hunting</title>
			<itunes:title>Good Idea Fairy Hunting</itunes:title>
			<pubDate>Mon, 13 Jun 2022 22:46:31 GMT</pubDate>
			<itunes:duration>10:34</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/8347b371-f88b-48a9-a51a-9683700506a9/media.mp3" length="10254704" type="audio/mpeg"/>
			<guid isPermaLink="false">8347b371-f88b-48a9-a51a-9683700506a9</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Good-Idea-Fairy-Hunting-e1jth00</link>
			<acast:episodeId>62f7b7908cf2d800126b2413</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpYKJLNDGNxbSn/oVpVliOSI]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>2</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2413.jpg"/>
			<description><![CDATA[<strong>This is the beginning of a series where I am going to discuss how to handle and tackle security as a people problem. We often lose sight of the trees for the forest and vice versa. Let's get out from behind our desks and go meet the people that need our help, even if they don't know it yet.</strong><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<strong>This is the beginning of a series where I am going to discuss how to handle and tackle security as a people problem. We often lose sight of the trees for the forest and vice versa. Let's get out from behind our desks and go meet the people that need our help, even if they don't know it yet.</strong><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>Episode 2 Preview</title>
			<itunes:title>Episode 2 Preview</itunes:title>
			<pubDate>Fri, 10 Jun 2022 00:39:30 GMT</pubDate>
			<itunes:duration>0:37</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/7eb71251-84c1-47e8-857b-d9c665a1cc85/media.mp3" length="611816" type="audio/mpeg"/>
			<guid isPermaLink="false">7eb71251-84c1-47e8-857b-d9c665a1cc85</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/Episode-2-Preview-e1joljd</link>
			<acast:episodeId>62f7b7908cf2d800126b2414</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpZlmmdiQeYb3rUt7KexnSlT]]></acast:settings>
			<itunes:episodeType>trailer</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2414.jpg"/>
			<description><![CDATA[Next week we will discuss Good Idea Fairy Hunting. Be sure to tune in!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[Next week we will discuss Good Idea Fairy Hunting. Be sure to tune in!<hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
		<item>
			<title>When was the last time you changed your password?</title>
			<itunes:title>When was the last time you changed your password?</itunes:title>
			<pubDate>Fri, 03 Jun 2022 22:03:42 GMT</pubDate>
			<itunes:duration>12:29</itunes:duration>
			<enclosure url="https://sphinx.acast.com/p/open/s/62f7b78a300e0800122199d5/e/056527c5-824b-42cb-bbd0-83db12a43b17/media.mp3" length="12118777" type="audio/mpeg"/>
			<guid isPermaLink="false">056527c5-824b-42cb-bbd0-83db12a43b17</guid>
			<itunes:explicit>false</itunes:explicit>
			<link>https://anchor.fm/noshitinfosec/episodes/When-was-the-last-time-you-changed-your-password-e1jfpgn</link>
			<acast:episodeId>62f7b7908cf2d800126b2415</acast:episodeId>
			<acast:showId>62f7b78a300e0800122199d5</acast:showId>
			<acast:settings><![CDATA[FYjHyZbXWHZ7gmX8Pp1rmbKbhgrQiwYShz70Q9/ffXZ/Ynvgc/bVSlxbfa1LTdZ/NS0G6+1uBWmuf3KXrHlJ0izxnDClosxN1ZvN1RuhNrnLfNV3O0PpKvFAJ4moD1bZ5Br4P+i85ISSA78sQ4zYFZVoEZy7GRaRBw+4tHqtCpbBet70IkAVWjyCzpIdezGj]]></acast:settings>
			<itunes:episodeType>full</itunes:episodeType>
			<itunes:season>1</itunes:season>
			<itunes:episode>1</itunes:episode>
			<itunes:image href="https://assets.pippa.io/shows/62f7b78a300e0800122199d5/62f7b7908cf2d800126b2415.jpg"/>
			<description><![CDATA[<p>In this pilot episode we talk about those pesky little things that everyone loves to hate: your password(s). More importantly, we talk about the real threat and things you can do to protect yourself and your family!</p><p><br></p><p>Has your account information been compromised (email or phone number)?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>A cool tool to test password strength. Please don't use your actual password, even though I trust this site. They are also a very highly recommended password manager:</p><p>https://bitwarden.com/password-strength/</p><p><br></p><p>Just because it's cool as shit: The Real-Time Global Cyber Attack Map:</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></description>
			<itunes:summary><![CDATA[<p>In this pilot episode we talk about those pesky little things that everyone loves to hate: your password(s). More importantly, we talk about the real threat and things you can do to protect yourself and your family!</p><p><br></p><p>Has your account information been compromised (email or phone number)?</p><p>https://haveibeenpwned.com/</p><p><br></p><p>A cool tool to test password strength. Please don't use your actual password, even though I trust this site. They are also a very highly recommended password manager:</p><p>https://bitwarden.com/password-strength/</p><p><br></p><p>Just because it's cool as shit: The Real-Time Global Cyber Attack Map:</p><p>https://threatmap.checkpoint.com/</p><hr><p style='color:grey; font-size:0.75em;'> Hosted on Acast. See <a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'>acast.com/privacy</a> for more information.</p>]]></itunes:summary>
		</item>
    	<itunes:category text="Technology"/>
    </channel>
</rss>
