<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://media.rss.com/style.xsl"?>
<rss xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom" xml:lang="en" version="2.0">
  <channel>
    <title><![CDATA[Jared's Technology Podcast Network]]></title>
    <link>https://technology.jaredrimer.net</link>
    <atom:link href="https://media.rss.com/the-technology-blog/feed.xml" rel="self" type="application/rss+xml"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <description><![CDATA[<p>This podcast network will have my main tech program when something comes out which is not security related. Sans News Bites, The Security Box, and other tech nuggets will also be here too. Some adult language may be possible in content, and a disclaimer plays on TSB as its a show on the mix. Enjoy!</p>]]></description>
    <generator>RSS.com 2026.401.141116</generator>
    <lastBuildDate>Thu, 09 Apr 2026 03:10:06 GMT</lastBuildDate>
    <language>en</language>
    <copyright><![CDATA[Jared Rimer]]></copyright>
    <itunes:image href="https://media.rss.com/the-technology-blog/podcast_cover.jpg"/>
    <podcast:guid>80ce4c52-4626-56c8-9eac-e42fa7397fb6</podcast:guid>
    <image>
      <url>https://media.rss.com/the-technology-blog/podcast_cover.jpg</url>
      <title>Jared's Technology Podcast Network</title>
      <link>https://technology.jaredrimer.net</link>
    </image>
    <podcast:locked>yes</podcast:locked>
    <podcast:license>Jared Rimer</podcast:license>
    <itunes:author>Jared Rimer</itunes:author>
    <itunes:owner>
      <itunes:name>Jared Rimer</itunes:name>
    </itunes:owner>
    <itunes:explicit>false</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:category text="Technology"/>
    <podcast:medium>podcast</podcast:medium>
    <item>
      <title><![CDATA[tech podcast 290: IOS 12 coverage and are Internet telephone companies viable]]></title>
      <itunes:title><![CDATA[tech podcast 290: IOS 12 coverage and are Internet telephone companies viable]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 290 of the technology podcast series. IOS 12 with screen time, notifications, comments on the beta cycle process, and SIRI and shortcuts are discussed as part of the first 4 segments.  Finally, are systems like Net By Phone and Internet Speech's Net Echo viable in today's internet? In the final segment, I talk about the net past, and the net today. I also talk about something still ongoing with one company's response to questions and concerns. Contact information is available on both sides of the podcast. I hope you enjoy the program and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895346</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895346/the-technology-blog/2025_02_13_04_05_45_a2f76bd0-169a-4607-8111-bfb285175f8b.mp3" length="71557593" type="audio/mpeg"/>
      <guid isPermaLink="false">9a9fc273-8134-edeb-1ab6-eadcffaf99eb</guid>
      <itunes:duration>4467</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>290</itunes:episode>
      <podcast:episode>290</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Sep 2018 19:39:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d14bb63e20ff3516fe26032d80ecab08.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 289: the end of the scammy behavior, transit app, and IOS 12]]></title>
      <itunes:title><![CDATA[technology podcast 289: the end of the scammy behavior, transit app, and IOS 12]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 289. Jared reveals who has been the culprite of the scammy behavior. Apple releases version 12 of IOS. Transit app has put back a feature, but after the podcast segment, I got a chance to look and connecting lines is not accessible. Finally, I invite Jennifer on board to discuss the revelation of Julia's behavior, and I use Jennifer as a blocking mechanism to show how easy it is to do that no matter the situation.  Contact information is on the blog, and at the end of the podcast.  I hope you'll enjoy the program.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895347</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895347/the-technology-blog/2025_02_13_04_44_35_b31cc71a-0374-4a75-a2c9-52f38cb987a0.mp3" length="58713278" type="audio/mpeg"/>
      <guid isPermaLink="false">e252994e-5a9a-7214-a8bf-8bd1558679d8</guid>
      <itunes:duration>3669</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>289</itunes:episode>
      <podcast:episode>289</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 18 Sep 2018 01:17:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0a218c6f92f81b2af6035238326fac7e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 288: something thats bothering me about going after cybersecurity, Equifax one year later, and an interesting malware with a lot of file types being effected]]></title>
      <itunes:title><![CDATA[Technology podcast 288: something thats bothering me about going after cybersecurity, Equifax one year later, and an interesting malware with a lot of file types being effected]]></itunes:title>
      <description><![CDATA[Welcome to podcast 288, I'm hoping you'll enjoy this podcast. Why are we going after cybersecurity companies, and not the people who are actually doing the hacking? Articles I've read pose this question, and its your job to go find those. Next, <a href="https://blog.trendmicro.com/sound-fury-and-nothing-one-year-after-equifax/">Sound, Fury, And Nothing One Year After Equifax </a> is discussed as we have more questions in regards to Equifax and one year later. Finally, Why don't we take a look at <a href="https://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-locky-poser-pylocky-ransomware/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29">A Closer Look at the Locky Poser, PyLocky Ransomware </a> as we learn about file types that are encrypted that I've never heard of. Contact information is at the end of the podcast, and I hope you enjoy this podcast. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895348</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895348/the-technology-blog/2025_02_13_04_11_58_45f9f7e5-795b-4c40-83b0-1109dcf8ee65.mp3" length="62618312" type="audio/mpeg"/>
      <guid isPermaLink="false">307a6312-a807-7156-ef90-588141e01101</guid>
      <itunes:duration>3909</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>288</itunes:episode>
      <podcast:episode>288</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 15 Sep 2018 19:06:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6c1548f347a9340dd45599a852cea53c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology blog and podcast, podcast 287: we've got scammy behavior]]></title>
      <itunes:title><![CDATA[The technology blog and podcast, podcast 287: we've got scammy behavior]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast number 287. This is the first podcast on Anchor that will be released there. I talk about scammy behavior, even though it wasn't in email form, its good to be on guard.  <a href="http://www.transitapp.com">Transit App </a> has their new version 5 of their app, and I demo a little bit to show you how it works now.  Finally, we bring back the scammy behavior when we talk about an article from Phishlabs entitled <a href="https://info.phishlabs.com/blog/targeted-phishing-attacks">Phishing 101: Targeted Phishing Attacks. </a> Our contact information is also available at the end, as well as our public thanks to Anchor.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895349</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895349/the-technology-blog/2025_02_13_04_05_57_d01f548a-514f-4eae-a2d1-91547ce9d3c3.mp3" length="71874768" type="audio/mpeg"/>
      <guid isPermaLink="false">4d13c987-61a4-ead2-81c9-9db5b3006645</guid>
      <itunes:duration>4487</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>287</itunes:episode>
      <podcast:episode>287</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 10 Sep 2018 15:16:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_627dadbf5ae8a77d2d48d5ca99cd428c.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 286for September 3, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 286for September 3, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 286 of the technology blog and podcast series with Jared Rimer. On this podcast:

<ul>
<li> Skype gets a repreave as Version 7 is loved by many in the blind and sighted alike. This is because its got global hotkeys that are loved by all.  We learn some good news from Michael in Indiana, who lets me know about the Freedom Scientific podcast   and from there, we learn that Skype is going to allow us to use Skype verson 7 for the foreseeable future.  </li>
</ul>

Go to the <a href="http://technology.jaredrimer.net">blog </a> to read the rest of the notes.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895350</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895350/the-technology-blog/2025_02_13_04_09_00_44ae6799-75af-46fb-b80a-a7a0c3fdb153.mp3" length="77834031" type="audio/mpeg"/>
      <guid isPermaLink="false">78ab4c8d-50d4-04b8-e755-d43e2e77580a</guid>
      <itunes:duration>4859</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>286</itunes:episode>
      <podcast:episode>286</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 23:34:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b61ea989867b1aaebde609594633ca4a.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 284 for August 25, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 284 for August 25, 2018]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 284. This podcast has been in the making for almost a month, but it is well worth the wait. Here's what I have for you.  First, I tell you a story about a gentleman who got kicked off of a phone line, and this gentleman claimed to be an independent artist who isn't doing anything anymore.  The activity that got him kicked off is quite interesting, however, do you believe what he has to say in this story that I give you?  Next, a teaching moment.  This teaching moment is two stories in one in a related form.  Third, <a href="https://info.phishlabs.com/blog/phishing-social-media-email">Phishing and Social Media, Will it Over Take Email? </a> This article was very insightful.  Next, a youtube video: <a href="https://youtu.be/WBqnzn77MEE">The rapid growth of the Chinese internet -- and where it's headed - Gary Liu </a> which was quite interesting.  Next, discussing innocent things that could gleam personal information, which  includes a 5 minute segment
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895352</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895352/the-technology-blog/2025_02_13_04_12_53_767bfc99-2dd3-40d6-8a63-45e6a29fcd28.mp3" length="82193574" type="audio/mpeg"/>
      <guid isPermaLink="false">84d6ba00-924c-905f-bcf9-abfad7abe39d</guid>
      <itunes:duration>5131</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>284</itunes:episode>
      <podcast:episode>284</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 23:11:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7f6d9217822fc4e792e5b9b9b2befe6f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 282 for July 25, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 282 for July 25, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 282. <a href="http://technology.jaredrimer.net">our blog </a> has the full show notes of today's program. Its packed with plenty of information that could be useful.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895354</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895354/the-technology-blog/2025_02_13_04_16_40_408d87c0-9211-496f-9535-7af4d466670b.mp3" length="101896559" type="audio/mpeg"/>
      <guid isPermaLink="false">2774e11b-4ccd-cba9-5374-7165615617d2</guid>
      <itunes:duration>6362</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>282</itunes:episode>
      <podcast:episode>282</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 22:44:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_cac08b412b0bcd83011ed98ff74758b8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 278 for June 9, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 278 for June 9, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 278 of the technology podcast with Jared Rimer. I've got several articles I'm going to link to as part of this week's program, as well as a game update from audio game hub.

<ul>
<li> <a href="https://krebsonsecurity.com/2018/05/3-charged-in-fatal-kansas-swatting-attack/">3 Charged In Fatal Kansas ‘Swatting’ Attack </a> Krebs on Security </li>
<li> <a href="https://krebsonsecurity.com/2017/12/kansas-man-killed-in-swatting-attack/">Kansas Man Killed In ‘SWATting’ Attack </a> Krebs on security </li>
<li> <a href="https://krebsonsecurity.com/2018/05/mobile-giants-please-dont-share-the-where/">Mobile Giants: Please Don’t Share the Where </a> Krebs on Security </li>
<li> <a href="https://krebsonsecurity.com/2018/05/why-is-your-location-data-no-longer-private/">Why Is Your Location Data No Longer Private? </a> Krebs on Security </li>
</ul>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895359</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895359/the-technology-blog/2025_02_13_04_09_45_4fe7f458-d2cc-4be5-aeb3-1aa3da6feb1b.mp3" length="69042721" type="audio/mpeg"/>
      <guid isPermaLink="false">086b2e99-7f6a-b615-cea9-baa69283d49e</guid>
      <itunes:duration>4315</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>278</itunes:episode>
      <podcast:episode>278</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:53:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1a3ebf5f88cd65d470a9af9a25034f49.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 274 for April 1, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 274 for April 1, 2018]]></itunes:title>
      <description><![CDATA[There was a bit of a delay, but podcast 274 was released on the first of April.

Welcome to podcast 274. Are you familiar with how someone who would get dressed could do it if they have a disability that prevents them from doing it on their own? A very powerful ted talk will talk about this, in what I'd call the low tech segment.  Are you familiar with Philmore Productions?  A customer gives me a file that was posted to one of their bulletine boards, and asks some questions.  This 33 minute segment talks about my thoughts on the file, and it is not looking good.  I'll let you listen to the segment and decide this on your own, but I call this my thought piece.  Next, have you mistyped domains?  We all have.  In an article pened by Brian Krebs entitled <a href="https://krebsonsecurity.com/2018/03/omitting-the-o-in-com-could-be-costly/">Omitting the “o” in .com Could Be Costly </a> gives some insites that I talk about.  Finally, I started a <a href="http://www.mixcloud.com/jrimer2018">M
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895364</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895364/the-technology-blog/2025_02_13_04_10_20_b2e67eda-fe4c-405b-a859-d9a933d539be.mp3" length="68113180" type="audio/mpeg"/>
      <guid isPermaLink="false">2b93e394-df3d-65a2-0ecc-685a213ef800</guid>
      <itunes:duration>4257</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>274</itunes:episode>
      <podcast:episode>274</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:19:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2ebb9636022004e504ba5eaf6e3446b3.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 273 for March 3, 2018]]></title>
      <itunes:title><![CDATA[tech podcast 273 for March 3, 2018]]></itunes:title>
      <description><![CDATA[March 3, 2018 had an episode of the podcast. 

On this podcast, a ted talk bonus on jackpotting ATM's. Comments on the video with commentary on the Zone's closing, and finally why did we choose our phone of choice? Come have a discussion with us.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895366</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895366/the-technology-blog/2025_02_13_04_26_14_5a70b739-4f3d-40be-9ca4-051e5109238a.mp3" length="70572554" type="audio/mpeg"/>
      <guid isPermaLink="false">f1462286-ef0e-ee4f-22cf-0cffd405af9e</guid>
      <itunes:duration>4406</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>273</itunes:episode>
      <podcast:episode>273</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:09:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3ec49644f64a41312e0aec72b1d075b6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 272 for February 11, 2018]]></title>
      <itunes:title><![CDATA[Technology podcast 272 for February 11, 2018]]></itunes:title>
      <description><![CDATA[Welcome to tech 272. On this edition, an update to podcast 62, which was done way back in 2008. Our main segment is dealing with NVDA and its remote feature.  We talk about how it can be abused and while no damage is done this time, people can get themselves in to trouble.  We hope to talk about this more in future podcasts.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895367</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895367/the-technology-blog/2025_02_13_04_29_56_a8ef482f-0e74-4d2d-b811-c26341c69ace.mp3" length="88634976" type="audio/mpeg"/>
      <guid isPermaLink="false">d3d88765-1d17-e4c8-bdbe-f331a53bdf50</guid>
      <itunes:duration>5539</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>272</itunes:episode>
      <podcast:episode>272</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:02:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f5a0b6908a345cc8d80752760e2c9677.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 271 for January 29, 2018]]></title>
      <itunes:title><![CDATA[Technology podcast 271 for January 29, 2018]]></itunes:title>
      <description><![CDATA[NVDA remote and a demo of the Healow app for IOS to communicate, book appointments, and check on your records from your doctors office.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895369</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895369/the-technology-blog/2025_02_13_04_52_03_54b5bb09-1fb2-4686-bd5c-4bb53b8474c7.mp3" length="74612248" type="audio/mpeg"/>
      <guid isPermaLink="false">1a540b1b-6630-15ea-2ac2-7ca7bdda8c3f</guid>
      <itunes:duration>4658</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>271</itunes:episode>
      <podcast:episode>271</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 03:28:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6b4bba4ba57588a0b67aaa351857e2a7.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 268 for January 5, 2018]]></title>
      <itunes:title><![CDATA[Technology podcast 268 for January 5, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast number 268 for January 15, 2018. On this edition of the program, I talk about a cautionary tale of giving out personal information which I heard on a telephone line where someone gave out the address in which they live. Question: what might happen if you do this?  I'll leave it right there.  Next, the Kansas swatting incident.  Krebs posted two articles which I posted to the blog, and I'll repost them here.  <a href="https://krebsonsecurity.com/2017/12/kansas-man-killed-in-swatting-attack/">Kansas Man Killed In ‘SWATting’ Attack </a> is the first article and <a href="https://krebsonsecurity.com/2018/01/serial-swatter-swautistic-bragged-he-hit-100-schools-10-homes/">Serial Swatter “SWAuTistic” Bragged He Hit 100 Schools, 10 Homes </a> is the second.  Can this get any worse?  Next, I talk about my thoughts on what we might see in the new year and beyond in the security landscape.  Finally, we listen to a video in regards to spector and meltdown.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895373</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895373/the-technology-blog/2025_02_13_04_17_48_1276271f-547f-4a45-97a1-be165e497769.mp3" length="77342534" type="audio/mpeg"/>
      <guid isPermaLink="false">f8dde82a-819e-d86c-90d8-75a0564f24f6</guid>
      <itunes:duration>4828</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>268</itunes:episode>
      <podcast:episode>268</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 02:52:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3b6da2d012fa95b8b2ff00ccf73b9ecd.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 306: lots of stuff here]]></title>
      <itunes:title><![CDATA[Tech podcast 306: lots of stuff here]]></itunes:title>
      <description><![CDATA[On this podcast, we've got braille transcription, talk on articles of varying degrees, and does anyone have any common sense?
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895328</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895328/the-technology-blog/2025_02_13_04_01_58_0413b9ce-5ec9-4dfb-993a-49163c3da4e0.mp3" length="74268994" type="audio/mpeg"/>
      <guid isPermaLink="false">9205fbd7-43af-19d0-0128-dc9a02667468</guid>
      <itunes:duration>4637</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 23 Feb 2019 22:15:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9345bcb55757ee76ecfbd35774a69f6e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast: podcast 305: DNS, Pure Nature, and Ralphs]]></title>
      <itunes:title><![CDATA[The Technology podcast: podcast 305: DNS, Pure Nature, and Ralphs]]></itunes:title>
      <description><![CDATA[<p><br></p><p>Hello everyone, welcome to podcast 305 of the tech series. On this podcast, I talk about <a href="https://en.wikipedia.org/wiki/Domain_Name_System">the domain name system </a> in the first segment. There is a very interesting issue that was recently disclosed, however, it isn't so bad unless you give your credentials out to someone you don't trust.  <a href="http://technology.jaredrimer.net/2019/01/28/alert-aa19-024a/">Alert (AA19-024A) </a> was posted to the blog which links directly to the advisory.  Other news articles also talk about this as well as Security Now's Steve Gibson.  <a href="https://www.applevis.com/apps/ios/lifestyle/pure-nature-3d-soundscapes">Pure Nature </a> and <a href="https://www.applevis.com/apps/ios/shopping/ralphs">the Ralphs Supermarket app </a> are also demoed.  The podcast will last you about an hour and 40 minutes and I hope you enjoy this extended program.  Thanks for listening, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895329</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895329/the-technology-blog/2025_02_13_04_10_25_86b9ecb1-f52f-46e0-9bd7-0ec1396f9147.mp3" length="92354626" type="audio/mpeg"/>
      <guid isPermaLink="false">ca974d63-0d8d-944f-3057-f35eed8b2bf0</guid>
      <itunes:duration>5766</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 29 Jan 2019 21:57:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ac5e1a61c748fab338110723507af715.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 304 for January 21, 2019]]></title>
      <itunes:title><![CDATA[Technology podcast 304 for January 21, 2019]]></itunes:title>
      <description><![CDATA[Welcome to podcast 304 of the technology blog and podcast series. Philmore Productions is back in the spotlight, this time, a very interesting voice mail saying that he's getting a T1 update, but yet, you tell me if he's describing voice ovr ip. I got a very interesting phone call, this happened in the middle of my blog post typing, so i stopped to answer the phone.  The phone call didn't identify itself from a company, but yet, went on to talk about the fact I was due 0 percent APR if I acted immediately. I talk about news notes, and things of interest that I've read including an article that was very interesting in court cases and jail time.  Also, <a href="http://www.filemail.com">File Mail </a> is a service that was discussed briefly from Security Now.  Dice World has an update of interest,  and of course contact information is available at the end of the program.  I hope that you enjoy the program as much as I have putting it together for you.  The program lasts 74 minutes.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895330</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895330/the-technology-blog/2025_02_13_04_13_45_bfdfef7c-8c4a-42db-9948-bdecc55f4742.mp3" length="72027934" type="audio/mpeg"/>
      <guid isPermaLink="false">87ac9ea9-72a2-7c8c-4cbb-547c02ffe575</guid>
      <itunes:duration>4497</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 21 Jan 2019 19:05:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_be4d5b10aeddb1837bede9d579f859f8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 303: swatting, a braille question, and blindfold games interview]]></title>
      <itunes:title><![CDATA[Tech podcast 303: swatting, a braille question, and blindfold games interview]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 303 of the technology blog and podcast series. 

I'd like to start the podcast with something that came across my desk. This first segment deals with Swatting, and its a very interesting topic as now we've got a very interesting story that has a happy ending.  <a href="https://www.zdnet.com/article/facebook-cybersecurity-exec-victim-of-swatting-call/">Facebook cybersecurity exec victim of swatting call </a> is the name of the article that sparked this discussion.  When I retweeted this article, I got some likes and a conversation from someone who has been effected by swatting.  The individual, whom I'm not naming talked to me about some things he's been doing to learn, and he wrote an article <a href="https://www.techrepublic.com/blog/career-management/an-decidedly-creepy-story-of-how-social-media-can-impact-your-life/">A decidedly creepy story of how social media can impact your life. </a> I told him my story of someone who had been wanting information from me, but yet, that individual was talked about on my podcast, and had to serve some time.  He was able to gather that I'm blind, however, that isn't top secret as its posted on my personal page, among other places as well.  I sent some related articles his way which were written by me: <a href="https://longevity.media/bullying-is-this-just-a-disability-problem">Bullying, Is This Just a Disability Problem? </a> and <a href="https://01.media/can-social-media-really-be-bad-for-you">Can Social Media Really Be Bad for You? </a> People need to think about their actions no matter whether they were targets of social engineering or swatting, both can have their own consequences.  I think we really need to continue the conversation, and I'd love to hear from you on ways to curve the swatting and social engineering epidemic that has plagued us for way too long.  Knowing that swatting has been a dacades long problem as of late isn't going to make me feel better, thats for sure.

Next, I found someone with an interesting braille question, dealing with a contraction we've known for the longest time.  While the contraction in question has not changed from English American Braille to Unified English Braille, the question was asked why the word here was spelled out with the "er" contraction and not the "dot 5, h" as we were taught.  I'm curious on whether we have found an issue with the book with an error, or whether it was written that way by someone who doesn't know the rules?  I'm not going to speculate, but I'm putting it out there.

Next, Marty at <a href="http://www.blindfoldgames.org">Blindfold Games </a> comes on the podcast to discuss his company Objective Education.  I talk to him about some of the popular games, some that have dropped off, and about the new company.  He gives his contact information at the end of that segment.

Finally, contact information as a whole, and a teaser on whats coming up on the next available podcast.  

The podcast runs you 76 minutes, and I hope you enjoy!  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895331</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895331/the-technology-blog/2025_02_13_04_04_18_bfa6283a-c0fb-4090-a424-649bf1842808.mp3" length="73782477" type="audio/mpeg"/>
      <guid isPermaLink="false">bf4d9ad9-641f-f552-01f7-76cf65b20576</guid>
      <itunes:duration>4611</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 14 Jan 2019 07:09:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7c4efd7c3f869fcf5de1264f353c69d7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 302: Live wire, BevMo gets Hacked, Skype, and more]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 302: Live wire, BevMo gets Hacked, Skype, and more]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 302 of Jared's technology blog and podcast series. How many of you know about Live Wire and its sister system Ground Zero? If you don't, I have a short segment in regards to both, and include <a href="http://www.livewireusa.net">Live Wire's </a> web site for you to go peruse its offerings.  Next, <a href="https://www.cyberscoop.com/bevmo-online-payment-breach-ncr/">BevMo payment breach affects thousands, with researchers pointing to Magecart </a> is talked about, but yet, BevMo did the best they could.  Next, Skype has some changes, and a potential bug that happened to me could happen to you.  Finally, lesson 8 of the braille transcription course, and reading with Braille 2000 with JFW is demoed, as there is something that I've found that isn't a show stopper, but yet, I've provided the file to Braille 2000 for their review and hopeful resolution.  Contact information is at the end, and please feel free to utalize it.  Thanks for reading the show notes, and enjoy your day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895332</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895332/the-technology-blog/2025_02_13_04_22_25_0701788f-deff-4332-81e5-91f067e6441b.mp3" length="71500626" type="audio/mpeg"/>
      <guid isPermaLink="false">beb6b8ce-fc56-e3d4-acee-daa810cb4b59</guid>
      <itunes:duration>4464</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 11 Jan 2019 04:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_be36666273e62c7bf333e6ad467eaf2f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 301: news, notes, San Diego School District, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 301: news, notes, San Diego School District, and more]]></itunes:title>
      <description><![CDATA[<p>On this extended edition, the podcast has some lengthy segments. We ask you what we should cover. Question, are you keeping up with your finances? News notes, what else did we miss? The San Diego school District got breached, the <a href="http://technology.jaredrimer.net/2018/12/28/hacker-steals-10-years-worth-of-data-from-san-diego-school-district-zdnet/">tech blog </a> links to the breach via an article. Finally, our predictions and how things have changed through the years. &nbsp;Contact information is available at the end of the podcast, and the podcast is extended running an hour and 40 minutes (100 minutes) long. Thanks for listening!1</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895334</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895334/the-technology-blog/2025_02_13_03_48_09_94fd68dd-d3d2-40d6-9d56-5a3d3eaf8097.mp3" length="96708428" type="audio/mpeg"/>
      <guid isPermaLink="false">4d65b8c1-fc0d-72b2-a28a-e8e8aa158cd1</guid>
      <itunes:duration>6038</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 01 Jan 2019 18:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_01aed2bfb83072326ad70e0610fc8ae3.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 300: braille transcription, DDOS and bomb threats get you in trouble, and more]]></title>
      <itunes:title><![CDATA[tech podcast 300: braille transcription, DDOS and bomb threats get you in trouble, and more]]></itunes:title>
      <description><![CDATA[Meet a bomb threat person who also does Denial of Service attacks as the first segment talks about an article entitled <a href="https://krebsonsecurity.com/2018/12/bomb-threat-hoaxer-ddos-boss-gets-3-years/">Bomb Threat Hoaxer, DDos Boss Gets 3 Years </a> which comes from Krebs on Security. We also have a braille transcription update in regards to my grade on lesson 7. I also have a landscape for the podcast, recapping the last several years, how things haven't changed, but yet, we must press on talking about the things that must get out including breaches, and my thoughts on those too.  All of this on a packed podcast.  This is tentitively the last podcast of the year, unless something breaks where we need to get the info out.  Until the next podcast, make it a great day.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895335</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895335/the-technology-blog/2025_02_13_04_10_30_3934c4e8-0e93-4cde-83fa-cc31201ba827.mp3" length="75725003" type="audio/mpeg"/>
      <guid isPermaLink="false">2efe15c9-16a3-fda8-43dc-067e3bee8d26</guid>
      <itunes:duration>4727</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 16 Dec 2018 22:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7fa881f4f02fe6888fe957fb026e3244.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 299: braille transcription, the weather, FTP, and breaches]]></title>
      <itunes:title><![CDATA[tech podcast 299: braille transcription, the weather, FTP, and breaches]]></itunes:title>
      <description><![CDATA[This episode has FTP going away for web browsers, two segments on assignments 5 and 6 of the transcription course, and breaches updates for this time. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895336</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895336/the-technology-blog/2025_02_13_04_05_06_eed9c171-2761-448b-9ed9-c41d566e69a8.mp3" length="67172563" type="audio/mpeg"/>
      <guid isPermaLink="false">20818050-3165-9243-232a-97e3445839f2</guid>
      <itunes:duration>4193</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Dec 2018 23:51:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f9d54598cba1428b2d43b395bc7b3759.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 298: a cautionary tale, braille transcription overview, and blind alive]]></title>
      <itunes:title><![CDATA[Technology podcast 298: a cautionary tale, braille transcription overview, and blind alive]]></itunes:title>
      <description><![CDATA[On this podcast, a cautionary tale in regards to a credit card situation, the braille transcription course is talked about in a multi part series, and blind alive news. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895338</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895338/the-technology-blog/2025_02_13_04_15_27_e0b562e2-949c-4620-97aa-e87613991ffb.mp3" length="67121679" type="audio/mpeg"/>
      <guid isPermaLink="false">664fc073-c4b7-ac2f-6aab-8f4ae7bcec13</guid>
      <itunes:duration>4190</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 26 Nov 2018 18:04:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7a6be6cfddc4006a400cea5b9c9ea13a.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 297: lots of newsy things of interest]]></title>
      <itunes:title><![CDATA[tech podcast 297: lots of newsy things of interest]]></itunes:title>
      <description><![CDATA[Hello everyone, my name is Jared, and I want to take this opportunity to welcome each and every one of you to my technology podcast. On this edition of the podcast, I have lots of news type items including domain registration news, Aira, of course a braille transcription course update, and other newsy types of things. 

The following are links to various items that I thought should be linked for you to read at your own time.  

<ul>
<li> <a href="https://krebsonsecurity.com/2018/11/that-domain-you-forgot-to-renew-yeah-its-now-stealing-credit-cards/">That Domain You Forgot to Renew? Yeah, it’s Now Stealing Credit Cards </a> Krebs on Security </li>
<li> <a href="https://www.noaa.gov/photos-images/noaa-team-sees-florence-and-michael-storm-surge-devastation-first-hand">NOAA team sees Florence and Michael storm surge devastation first-hand </a> NOAA </li>
<li> <a href="http://technology.jaredrimer.net/2018/11/11/cooking-and-technology/">Cooking and Technology </a> technology blog and podcast blog, links to two items from blind bargains </li>
<li> <a href="https://www.blindbargains.com/bargains.php?m=19611">AIRA Killing Unlimited Plan, Raising Prices for Others, Adding $29 Intro Plan </a> blind bargains </li>
</ul>

The program lasts 64 minutes.  Contact information is available at the end of the program.  Thanks for listening, and enjoy your stay!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895339</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895339/the-technology-blog/2025_02_13_04_15_42_1018a3da-354c-4210-8058-24ea4bb363af.mp3" length="61613232" type="audio/mpeg"/>
      <guid isPermaLink="false">39f0aa9c-9d70-156c-8aa0-b92d77e48de2</guid>
      <itunes:duration>3846</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 19 Nov 2018 18:00:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_638cbce2a28d8b56f18e492b8217e5ee.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 296: braille transcription in a different form, and news items]]></title>
      <itunes:title><![CDATA[technology podcast 296: braille transcription in a different form, and news items]]></itunes:title>
      <description><![CDATA[On this edition of the podcast, braille transcription takes a different turn, where I discuss my struggles and show you what was going on. Talk about work arounds, and other things of interest. One of the things that I talk about is the information about the program I chose, <a href>Braille 2000 </a> which is done in such a way, where it could be considered true WYSIWYG. I talk about other programs, but since I don't know much about one, and have used little of the other, I do mention them by name.  I also have news notes items as well.  One of the items effects the mac, whereby, you must be using a crypto wallet, and a very specific one.  <a href="https://labsblog.f-secure.com/2018/11/02/spam-campaign-targets-exodus-mac-users/">Spam campaign targets Exodus Mac Users </a> is the article referenced in the second news notes file.  I hope you enjoy the program as much as I have putting it together for you.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895340</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895340/the-technology-blog/2025_02_13_04_10_45_36132c8a-0ecb-453b-b488-72eb8d989c4a.mp3" length="68070266" type="audio/mpeg"/>
      <guid isPermaLink="false">06a668b3-937e-36f9-a8a1-f7e6202e3789</guid>
      <itunes:duration>4249</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 10 Nov 2018 20:22:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ea71b56534f768ac9c9ad8a228ec8e4f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 295: Trick bot is back, Philmore Productions, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 295: Trick bot is back, Philmore Productions, and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 295 of the Technology blog and podcast series, I'm Jared Rimer. We're packed with a wide variety of stuff. We've also got several articles that complement the podcast content for you.

<ul>
<li> IOS 12.1 is out.  <a href="http://technology.jaredrimer.net/2018/11/01/ios-12-1-has-been-released-fixing-bugs/">blog post from the tech blog </a> links to the apple vis post where you can read more.  </li>
<li> What do you get when you update a banking trojan that we've not heard from in a long time?  The banking trojan is trick bot, and its packed with new features.  <a href="https://blog.trendmicro.com/trendlabs-security-intelligence/trickbot-shows-off-new-trick-password-grabber-module/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29">Trickbot Shows Off New Trick: Password Grabber Module </a> comes from Trend Micro.  </a>
<li> 30 years ago, someone released a program to do something.  It lead to what we now know as Ddos.  <a href="https://www.cyberscoop.com/morris-worm-mirai-scott-shackelford-indiana-university/">30 years ago, the world's first cyberattack set the stage for modern cybersecurity challenges </a> is the article, and it was quite interesting. </li>
<li> <a href="https://youtu.be/NkRtZfTPaGE">This Stuck in traffic video from last month </a> talks about Ransomware.  It is back in the news, as I saw an article from Trend Micro that says that we are on the decline, but yet, we could see an increase in Ransomware in the future.  <a href="http://technology.jaredrimer.net/2018/11/04/ransomware-threat-continues-how-infections-take-place/">This blog post </a> leads to the article from Trend Micro that discusses this.  </li>
<li> Philmore productions must love the negative press.  In podcasts 212 and 213, a big time issue was talked about, and it was downplayed as not a big deal.  Instead, the people who talked about the issue were trashed, and one of them  was called when they talked to me non the phone.  This time, I hear about a story where someone wanted to cancel service, but yet, someone else was braught up in a term the company uses called "dirty pool."  <a href="http://technology.jaredrimer.net/2018/11/04/philmore-productions-continues-to-trash-its-customers/">This blog post </a> is an article I pened in regards to that issue.  </li>
<li> SMS is short for short message service.  This is how we send and receive messages via the cellular network.  Its now being used for profit in an article Krebs on Security pened entitled <a href="https://krebsonsecurity.com/2018/11/sms-phishing-cardless-atm-profit/">SMS Phishing + Cardless ATM = Profit </a> and while it isn't new, its becoming more prevelant.  This is quite interesting.  </li>
</ul>

The podcast lasts you 76 minutes in length.  I hope you enjoy the program, and I'll see you on another edition.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895341</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895341/the-technology-blog/2025_02_13_04_11_17_30f7d8fd-f14c-4ccf-9093-45a5068c4241.mp3" length="73590012" type="audio/mpeg"/>
      <guid isPermaLink="false">dbc66056-8422-d07b-53b4-1793ac290922</guid>
      <itunes:duration>4594</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 06 Nov 2018 17:47:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a5a2cedc2bdf208623ee8c9e7b8ed157.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 294: braille transcription, Yahoo, and Rutgers]]></title>
      <itunes:title><![CDATA[Tech podcast 294: braille transcription, Yahoo, and Rutgers]]></itunes:title>
      <description><![CDATA[Hello everyone. Welcome to podcast number 294 of the technology blog and podcast series. We're packed with two braille transcription segments, one talking about Unified English Braille changes that I'm learning as part of taking the braille transcription course.  The 2nd file that talks about the transcription aspect of things talk about my report for lesson 3, something that may actually happen to anything, including some oversite issues.  

Between the two files, we've got Yahoo! having to pay a large amount of money for dealing with their breach issues, and Rutgers University has an update in regards to a story with an interesting technological aspect.  This has nothing to do with the 8 football players that got arrested or suspended by the law or school due to the bitcoin issues with putting money on a school card.  Our contact information is at the end of the program.

We've got articles to which you may want to read as part of today's program.  They're linked below.

<ul>
<li> <a href="https://www.nj.com/news/index.ssf/2018/10/former_ru_student_hacker_ordered_to_pay_86m_in_res.html">Former Rutgers U. student hacker gets home confinement, has to pay $8.6M in restitution </a> NJ.com </li>
<li> <a href="https://krebsonsecurity.com/2018/10/mirai-co-author-gets-6-months-confinement-8-6m-in-fines-for-rutgers-attacks/">Mirai Co-Author Gets 6 Months Confinement, $8.6M in Fines for Rutgers Attacks </a> Krebs On Security </li>
<li> <a href="https://www.lifewire.com/how-to-change-a-drive-letter-2626069">How to Change a Drive Letter  </a> lifewire.com </li>
<li> <a href="https://www.cyberscoop.com/yahoo-class-action-settlement-85m-data-breach-lawsuit/">Yahoo to pay up to $85m to settle data breach lawsuit </a> Cyberscoop.com  </li>
</ul>

Thanks so much for listening, and remember to leave that feedback.  It is important.  I want to know what you think.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895342</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895342/the-technology-blog/2025_02_13_04_11_15_99c48e6a-7695-4f6d-83b6-f75af65fed8a.mp3" length="65563853" type="audio/mpeg"/>
      <guid isPermaLink="false">dd413a35-2f43-62b1-281c-1593cc6235a3</guid>
      <itunes:duration>4093</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Nov 2018 18:47:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d0a5b743b7944cc4e055d37d0a024b18.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 293: braille transcription, bounty hunting, and the supply chain issues]]></title>
      <itunes:title><![CDATA[Tech podcast 293: braille transcription, bounty hunting, and the supply chain issues]]></itunes:title>
      <description><![CDATA[Welcome to podcast 293. On this podcast, I continue the braille transcription course coverage by talking about my thoughts on lesson 2's report. Each report is going to be different, but I talk about moine and how I can understand what they want us to do.  Since that taping, I've talked to a transcriber, and they also gave me some tips, but definitely getting the braille version of the book I need will be more helpful than the braille formatted files for the note taker.  I'll be working on that.  Next, J. Wolfgang G. had a very interesting talk that I had listened to.  <a href="https://youtu.be/sMH1G4ZlU18">Bounty Hunters </a> is the talk, and I hope that you enjoy this.  Finally, I talk about something that I found of interest, but did it a little bit differently.  The third segment is talking about the supply chain.  I talk about the articles, but also put it in to daily life.  <a href="https://krebsonsecurity.com/2018/10/supply-chain-security-is-the-whole-enchilada-but-whos-willing-to-pay-for-it/">Supply Chain Security is the Whole Enchilada, But Who’s Willing to Pay for It? </a> is the first article and <a href="https://krebsonsecurity.com/2018/10/supply-chain-security-101-an-experts-view/">Supply Chain Security 101: An Expert’s View </a> is the 2nd.  Both articles are good, and I hope you enjoy the talk.  Contact information is at the beginning and the end of the program.  Enjoy the program, it runs you 84 minutes.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895343</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895343/the-technology-blog/2025_02_13_04_05_56_ea58a651-8b9f-4c98-906a-294720c8093d.mp3" length="81080571" type="audio/mpeg"/>
      <guid isPermaLink="false">ea2904a2-9953-0ec7-5c73-a83c24c6236b</guid>
      <itunes:duration>5062</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Oct 2018 01:35:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_206b0ec7541d731e6cb1ca4f7649a124.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 292: braille transcription, security researchers turn cybercriminal, drones and w]]></title>
      <itunes:title><![CDATA[Technology podcast 292: braille transcription, security researchers turn cybercriminal, drones and w]]></itunes:title>
      <description><![CDATA[We have a lot for you. Here are the show notes for each and every one of you.

Welcome to podcast 292 of the technology blog and podcast series. We've got a bunch of stuff for you, and i hope you enjoy the program as much as I have bringing it to you.  The program is 83 minutes in length.

<ul>
<li> Braille Transcription course and learning UEB.  My thoughts on learning UEB as a transcriber, and not just as a reader. I also have some corrections from last podcast.  </li>
<li> A very interesting article which is entitled <a href="https://krebsonsecurity.com/2018/10/when-security-researchers-pose-as-cybercrooks-who-can-tell-the-difference/">When Security Researchers Pose as Cybercrooks, Who Can Tell the Difference? </a> and boy it gives a real true tale that happened to Brian.  The article was written on the 2nd of October, and I discuss my thoughts on it.  </li>
<li> The third segment deals with a Youtube segment, and it is a short video.  <a href="https://youtu.be/D3BWpoJ6ijs">drones verses the california wildfires </a> is the video and I introduce this one.  I honestly don't remember where I saw it, but I think it is quite interesting. </li>
<li> Winamp gets an update.  <a href="http://www.winamp.com">Winamp's web site </a> has an announcement that I was tipped off to in regards to its development.  Not being touched in quite awhile, Winamp 6 is coming soon, but they gave us a functioning 5.8 which I was provided.  I'll let you know how it works.  Hopefully, the new company who is doing winamp, keeps the accessibility in place we in the blind community are accustomed to.  Wishing and hoping.  </li>
<li> Finally, <a href="https://krebsonsecurity.com/2018/10/voice-phishing-scams-are-getting-more-clever/">Voice Phishing Scams Are Getting More Clever </a> caught my attention.    I do talk about something I got by a voice message a few weeks ago, where I've not returned the call, and yet, I'm also still here.  Do you want to learn more about voice phishing?  If you do, please go to the <a href="https://en.wikipedia.org/wiki/Voice_phishing">voice phishing page on Wikipedia </a> so you are educated.  </li>
</ul>

Our contact information is at the end of the program as well, as well as  briefly  at the beginning.  Please remember to utalize the info if you have any comments, questions, or concerns.  Thanks so much for listening to this program, and I hope you'll join me for another podcast soon.  More great interesting info is coming I thought you'd enjoy too.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895344</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895344/the-technology-blog/2025_02_13_04_41_27_35ce096b-3d9e-48e2-8241-306fd28d3b37.mp3" length="81901535" type="audio/mpeg"/>
      <guid isPermaLink="false">314fa2db-9989-29a4-6301-3570d5c0a25c</guid>
      <itunes:duration>5113</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 22 Oct 2018 01:56:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d62b73cd5dbc13206550a677fca8a908.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 291, facebook, braille transcription, chips and implants, and more]]></title>
      <itunes:title><![CDATA[tech podcast 291, facebook, braille transcription, chips and implants, and more]]></itunes:title>
      <description><![CDATA[On this podcast, we welcome a new podcast provider, welcome aboard! I briefly describe what the podcast is. Then, we start the program talking about facebook's bug. After that, two files dealing with braille transcription, chips with implants, or do I have it backwards, microsoft's big time error for windows update, and vorail making a change. When we have more info on vorail's change, we'll post it on the blog and make sure the podcast is updated.   Thanks for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895345</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895345/the-technology-blog/2025_02_13_04_41_41_8b276b8d-2649-42bd-a2fa-bd500a1a8cc4.mp3" length="78706926" type="audio/mpeg"/>
      <guid isPermaLink="false">c95fb66c-efe6-b704-25ee-aa597dbaf8ae</guid>
      <itunes:duration>4914</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 14 Oct 2018 23:30:41 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6c6e4cbe6d5d20973bb7c33b18cf6278.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 285 for August 29, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 285 for August 29, 2018]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 285 for August 29, 2018. On this extended edition of the podcast, we've got quite a number of items for you, and the podcast will last you 113 minutes. 

<ul>
<li> We start with a demo of <a href="http://www.mixcloud.com">Mixcloud. </a> Mixcloud can be considered similar to streaming services like <a href="http://www.pandora.com">Pandora </a> except they have the advantage of you listening to podcasts. I talk about the web site, demo the app, and the app is interesting but some accessibility issues are present. </li>
<li> Stuck in traffic has a series called stuck in traffic. In this segment, Wulf talks about tech support scams. <a href="https://youtu.be/ZeuKrwvz4Wc">Here's the youtube link for those who want to watch it. </a> </li>
</ul>

There's more, go to the <a href="http://technology.jaredrimer.net">the blog </a> to read the full notes. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895351</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895351/the-technology-blog/2025_02_13_04_22_56_618779ac-49f7-445e-acd4-027a43e64c95.mp3" length="109117033" type="audio/mpeg"/>
      <guid isPermaLink="false">9544fffc-b42d-61ab-77d1-8dac07b558e9</guid>
      <itunes:duration>6812</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 23:25:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c6e30238596daa1f4f2bbe6695d4aae6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 283 for July 30, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 283 for July 30, 2018]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 283 of the independent technology podcast, different than other tech podcasts. I say we're different because we don't do things the same as other podcasts, and if you've not given the podcasts this year a listen, you might want to and see what interests you. This week, we're going to talk about a virginia bank who got hacked twice, Lifelock had a problem luckily that was reported by a security researcher, I demo the wells fargo app.  Hope you enjoy the show.

<ul>
<li> <a href="https://krebsonsecurity.com/2018/07/lifelock-bug-exposed-millions-of-customer-email-addresses/">LifeLock Bug Exposed Millions of Customer Email Addresses </a> Krebs on security July 25, 2018 </li>
<li> <a href="https://01.media/a-virginia-bank-breached-twice-and-no-fix">A Virginia Bank Breached Twice and No Fix </a> 01.media July 26, 2018  </li>
</ul>

Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895353</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895353/the-technology-blog/2025_02_13_04_14_24_9a892df0-325f-4f00-b541-504d03d9e86c.mp3" length="77399807" type="audio/mpeg"/>
      <guid isPermaLink="false">d575651e-f219-65a6-d8ad-aab04cc44c70</guid>
      <itunes:duration>4832</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 22:52:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_760c6795021f6d98ce6f5aa40ebd8b3e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 281 for July 20, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 281 for July 20, 2018]]></itunes:title>
      <description><![CDATA[On this podcast, we link to quite a few different articles and other things that may be of interest. <a href="http://technology.jaredrimer.net">Go to the blog </a> under podcasts, to see the complete show notes. Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895355</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895355/the-technology-blog/2025_02_13_04_14_42_6efc6075-3862-466d-a2ac-a4763045f700.mp3" length="104841784" type="audio/mpeg"/>
      <guid isPermaLink="false">62dfc588-0045-10b0-2d95-75f5fd72461e</guid>
      <itunes:duration>6545</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 22:15:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3d65666aec364021663039c6847c5fe8.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 280 for July 15, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 280 for July 15, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 280. My name is Jared Rimer, an I hope that you enjoy the program as much as I am bringing it to you. Three segments but they are good segments and they include links.  The links are as follows:
<ul>
<li> <a href="https://www.cyberscoop.com/chinese-linked-hackers-breached-top-australian-defense-university-report/">Chinese-linked hackers breached top Australian defense university, report says </a> Cyberscoop </li>
<li> <a href="https://www.amazon.com/Kingpin-Hacker-Billion-Dollar-Cybercrime-Underground-ebook/dp/B004IK8Q2M">Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground Kindle Edition  </a> amazon.com </li>
<li> <a href="https://blog.lastpass.com/2018/07/multi-factor-authentication-important-now-ever.html/">Multi-Factor Authentication: More Important Now than Ever </a> lastpass.com and their blog </li>
</ul>

Thanks so much for participating in the program, and feel free to leave those thoughts!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895357</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895357/the-technology-blog/2025_02_13_04_14_29_bd1f3109-2941-40b0-a20a-2f61ea3f1b24.mp3" length="69048984" type="audio/mpeg"/>
      <guid isPermaLink="false">6d36a03b-fac8-5fc7-a9ea-b01a11ba36a2</guid>
      <itunes:duration>4311</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 22:07:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ed2a4d4c1e5703fc30a0e4e0224aec5f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 279 for July 8, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 279 for July 8, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 279. This podcast is long awaited, and I need to get back to doing things more promptly. The news here is not so outdated, but I definitely need to work on getting stuff out more timely.  Today, I talk about learning a braille transcription program which I'm continuing to learn.  Next, do you know about top level domains?  ICANN is allowing new TLD's to be released, and in this article entitled <a href="https://krebsonsecurity.com/2018/06/bad-men-at-work-please-dont-click/">Bad .Men at .Work. Please Don’t .Click </a> published on the 11th of June, talks about several bad domains, over 50 percent of whose URL's are "bad" and the word bad is in quotes because it needs to be.  Finally, since time had elapsed, a compilation of various news items.  Each segment is over 20 minutes, but maybe of interest.  I'll try to get more podcasts out more often.  Thanks for listening!  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895358</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895358/the-technology-blog/2025_02_13_04_15_20_2a9fc809-ec11-4fb8-b770-3e2dbbb2a7c5.mp3" length="72481745" type="audio/mpeg"/>
      <guid isPermaLink="false">1246b432-8649-9329-821d-31944f4761c8</guid>
      <itunes:duration>4525</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 22:00:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f3d37b35c70f9b1edcfaf0bc969a5de0.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 277 for May 22, 2018]]></title>
      <itunes:title><![CDATA[Tech podcast 277 for May 22, 2018]]></itunes:title>
      <description><![CDATA[Welcome to podcast 277 of the technology podcast series with Jared Rimer. Is diction a security risk, especially when it comes to habits as dictating medical and other history that you may text to someone that you feel isn't a problem? A podcast I heard dealing with the disabled braught this up, and I thought about it.  Its quite interesting, and the security experts call this a trade off.  Next, we have a 6 part series dealing with cyberland, and its many adventures.  F-secure posted this in their youtube channel, and I thought it should be shared.  Next, <a href="https://krebsonsecurity.com/2018/05/t-mobile-employee-made-unauthorized-sim-swap-to-steal-instagram-account/">T-Mobile Employee Made Unauthorized ‘SIM Swap’ to Steal Instagram Account </a> is discussed.  I've also put similar thoughts out on the phone lines.  Finally, our contact information.  I hope you'll enjoy the program as much as I have, and I'll be back soon with another one.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895360</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895360/the-technology-blog/2025_02_13_04_48_14_435c8caf-1dbb-4456-8097-3cd0922b3405.mp3" length="140731179" type="audio/mpeg"/>
      <guid isPermaLink="false">8443bc30-ef5c-7367-c1ee-07254a91208e</guid>
      <itunes:duration>8795</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:43:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_340f4b39fbb04d309045f8c84d27df76.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 276: the tech retrospective, one week later]]></title>
      <itunes:title><![CDATA[Technology podcast 276: the tech retrospective, one week later]]></itunes:title>
      <description><![CDATA[Published on April 29th. On this podcast, I talk about dad, what he did in regards to me and technology. I also talk about a tech glitch that I found through some comments, and how I'm planning to fix it. I hope you enjoy the podcast. <a href="https://jrimer80.livejournal.com/884664.html">Read the full 2 and a half page letter to dad </a> including any comments by clicking on the link. Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895362</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895362/the-technology-blog/2025_02_13_04_23_13_97c404df-4f6d-4e13-b9fa-5a8df1189f25.mp3" length="72604054" type="audio/mpeg"/>
      <guid isPermaLink="false">02ae8e33-4f8e-b6ea-98ef-d857ffb42d62</guid>
      <itunes:duration>4533</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:31:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f9dc0322c92f77632cdf310f6e27d377.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 275 for April 10, 2018]]></title>
      <itunes:title><![CDATA[tech podcast 275 for April 10, 2018]]></itunes:title>
      <description><![CDATA[There is a lot on our notations for this podcast. It would be best to find the show notes on our <a href="http://technology.jaredrimer.net">blog </a> under the podcasts category. Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895363</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895363/the-technology-blog/2025_02_13_04_23_40_139ff3fd-c718-4076-bed7-9e0bd4e4292b.mp3" length="59813099" type="audio/mpeg"/>
      <guid isPermaLink="false">9824d466-eb03-378b-03eb-5a06eca3f0f7</guid>
      <itunes:duration>3734</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 21:26:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7ee83c565ba9dcf8311e9d204ff3e10f.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 270]]></title>
      <itunes:title><![CDATA[technology podcast 270]]></itunes:title>
      <description><![CDATA[On this edition of the podcast, we've got a mac demo, a bonehead award of the day, and an interesting video on how cybercrime hides in the underbelly of the internet. Hope you enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895371</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895371/the-technology-blog/2025_02_13_04_16_25_2f526336-03f2-4d72-ae4d-62766e9139c6.mp3" length="60630654" type="audio/mpeg"/>
      <guid isPermaLink="false">ef008926-e394-dec5-4dfc-a48f709b5ee4</guid>
      <itunes:duration>3785</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 03:20:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4a93606c00ea4882191256a7dfc237a5.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 269]]></title>
      <itunes:title><![CDATA[technology podcast 269]]></itunes:title>
      <description><![CDATA[UEB, better late than never. Can Augmented reality and tech help with surgeries? Fake handbags are nothing new, but can this type of fake item really funnel crime rings? An interesting ted talk by someone who investigates such things. Also, comments on an article about Alexa being a blindness specific tool. It can help, but it should not be just a blindness tool. Contact info at the end.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895372</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895372/the-technology-blog/2025_02_13_04_18_04_79073276-8567-4fe5-9047-87ea33187476.mp3" length="80140314" type="audio/mpeg"/>
      <guid isPermaLink="false">f5051f5d-b905-2014-7dc7-9364801e4524</guid>
      <itunes:duration>5003</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Sep 2018 03:12:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5f12f7f4bd345f002c09df5d7641902c.jpg"/>
    </item>
    <item>
      <title><![CDATA[TikTok and Jacket.fm on podcast 384 of the technology blog and podcast]]></title>
      <itunes:title><![CDATA[TikTok and Jacket.fm on podcast 384 of the technology blog and podcast]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 384 of the technology blog and podcast.  This is Jared Rimer.  </p><p>What the hell is going on with TikTok and our government?  On April 9, 2025, we celebrated the fact that it has been one year since the publication of what TikTok collects.  Here is that <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/2024/04/09/are-you-still-using-tiktok-heres-something-you-need-to-know/"&gt;blog</a> post  if you want to reread that post from Kim and my reaction.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Stop"&gt;https://technology.jaredrimer.net/2025/04/05/stop-fucking-around-ban-tiktok-or-dont/"&gt;Stop</a> fucking around … ban TikTok or don’t!  is another post you should read as it is just new within the past little while known as a month.  </p><p>Then we learn that <a href="<a target=" rel="noopener noreferrer nofollow">TikTok"&gt;https://technology.jaredrimer.net/2025/04/04/so-tiktok-by-bytedance-not-following-competitive-bids-more/"&gt;TikTok</a> hasn't followed competitive bids  which makes it worse.  And let's not forget to write in our notes that China apparently needs to sign off on the deal. Like they're going to do that.</p><p>Our final segment talks about a new application which is approaching 36 weeks as we write this up.  <a href="<a target=" rel="noopener noreferrer nofollow">Jacket.fm"&gt;http://www.jacket.fm"&gt;Jacket.fm</a>  is a new social media platform.  Look for my profile on my web site under social media.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://technology.jaredrimer.net/2025/04/10/jacket-fm-an-audio-social-media-network/"&gt;Here</a> is the write up  I gave them.  </p><p>Contact info is given, come say hello!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1983209</link>
      <enclosure url="https://content.rss.com/episodes/316363/1983209/the-technology-blog/2025_04_11_18_20_55_803f9c7a-ddff-468d-aa99-c1573033f78f.mp3" length="85499072" type="audio/mpeg"/>
      <guid isPermaLink="false">7c3311c2-7f98-4f5e-8d12-c324e434d0e3</guid>
      <itunes:duration>5338</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>384</itunes:episode>
      <podcast:episode>384</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 14 Apr 2025 20:30:14 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 382: contact forms, passwords and power school]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 382: contact forms, passwords and power school]]></itunes:title>
      <description><![CDATA[<p>Welcome to the technology blog and podcast, podcast 382.  We're continuing where we left off last podcast by starting with something I posted from the blog, and we'll talk about something that probably should be old by now.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">I’ve"&gt;https://technology.jaredrimer.net/2025/03/15/ive-been-getting-these-emails-all-day-today-it-seems-maybe-the-last-few-days/"&gt;I’ve</a> been getting these emails all day today it seems. Maybe the last few days.  shows one of many emails I've been getting as of late dealing with how you can get TikTok followers to come to your website.  Sorry to break it to you, but that is not how this works, folks.  </p><p>Next, can you believe that passwords are being handed out through the phone lines again?  While this podcast was out on the lines for some time, we hear an announcement on how people are doing this and if caught, they will be removed from the line permanently.  <a href="<a target=" rel="noopener noreferrer nofollow">Learn"&gt;http://www.livewire.us"&gt;Learn</a> more about Live Wire  if you wih.  </p><p>Finally, what's going on with Power School?  They're not forthcoming on their breach they had.  <a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://technology.jaredrimer.net/2025/03/12/here-is-some-more-news-about-power-school-and-its-still-looking-grim/"&gt;Here</a> is some more news about Power School and its still looking grim  is the latest update including the accompanying article.  Have fun with this one.  </p><p>Please feel free to contact me through <a href="<a target=" rel="noopener noreferrer nofollow">my"&gt;http://www.jaredrimer.net"&gt;my</a> web site  or contact info given in the cast.  Thanks so much for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1952446</link>
      <enclosure url="https://content.rss.com/episodes/316363/1952446/the-technology-blog/2025_03_21_18_37_54_49bb5409-d6c5-4c5f-8225-e42c338c7629.mp3" length="52024211" type="audio/mpeg"/>
      <guid isPermaLink="false">c79b9bce-c66f-4a99-9c3d-5ad6d2e08924</guid>
      <itunes:duration>3248</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>382</itunes:episode>
      <podcast:episode>382</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Mar 2025 20:30:11 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB: episode dealing with AI and hallucinations]]></title>
      <itunes:title><![CDATA[TSB: episode dealing with AI and hallucinations]]></itunes:title>
      <description><![CDATA[<p>Welcome everyone to podcast 270 of the Security Box.  I know that Sans is way behind, but I've been involved in other stuff and that the display has also had problems and we also have been busy.  </p><p>We taped on April 1, 2026 and releasing on April 2, 2026.  </p><p>But this podcast must continue and we will be talking about AI hallucinations.  </p><p>Some of the discussion is tied back to podcasts 268 and 269 of this program.  </p><p>We'e had several AI discussions, podcasts 267 and 270 as well as it coming up in other discussions throughout this series.  </p><p>No videos or any other major updates this time, we've got plenty more to put out, so we'll try and get things out now that the computer seems to be back up and running in great form.</p><p>I hope that everyone enjoys, and we'll see you on April 22, 2026 as I have a meeting to attend on April 15, 2026 that might be of importance.  </p><p>Thanks for listening, do make it a great day!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2684746</link>
      <enclosure url="https://content.rss.com/episodes/316363/2684746/the-technology-blog/2026_04_02_20_15_35_6674c2a9-026c-4332-aa7f-aae7f5b7ff38.mp3" length="279271526" type="audio/mpeg"/>
      <guid isPermaLink="false">dcf4436c-fcb7-49d6-b2c3-66a708253871</guid>
      <itunes:duration>17436</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>270</itunes:episode>
      <podcast:episode>270</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Apr 2026 02:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20260403_120425_466c3da1edc0c7a980bb5f3305531e86.png"/>
      <podcast:transcript url="https://transcripts.rss.com/316363/2684746/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[TSB: Why can't companies protect our Protected Health Information?]]></title>
      <itunes:title><![CDATA[TSB: Why can't companies protect our Protected Health Information?]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program 269.  On this episode, we've got several different items for you, and we'll redo one of our segments because our second file became an issue and we just didn't have time in dealing with rerecording it.</p><p>&lt;</p><ul>&gt;<p></p><p></p><li> There was someone who posted a message to a phone line, who got our moron of the podcast.  Its not necessarily about the content of the message, but where the message was posted in relativity to their location. </li><p></p><p></p><li> Three segments dealing with scams, scams and AI, scams and the inbox, and three questions you can ask which should thwart most scams.  We'll redo this segment for podcast 270 as there were gremblins within the machine.  </li><p></p><p></p><li> Nick Espinosa is along with one of the 11 videos we recently downloaded dealing with the NFL and an ad that could have privacy implecations.  </li><p></p><p></p><li> Our main topic talks about our personal health information and why it is not being protected by companies even though they claim it is.  </li><p></p><p></p></ul><p></p><p>PHI actually stands for Protected Health Information, but this was written well before the Internet and well before the troubles we've seen in recent times.</p><p>Please listen to the show or find info on how to contact us through Jared's web site.  </p><p>We hope you enjoy this 5 hour 51 minute podcast.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2622085</link>
      <enclosure url="https://content.rss.com/episodes/316363/2622085/the-technology-blog/2026_03_12_04_58_33_5d398c2e-6ace-4994-85ce-46d28e1b586c.mp3" length="341804700" type="audio/mpeg"/>
      <guid isPermaLink="false">d1abfda4-b783-40f8-ae8d-15cc533324e8</guid>
      <itunes:duration>21341</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>269</itunes:episode>
      <podcast:episode>269</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Mar 2026 22:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20260312_040323_1aa179740f9908c8d892b6d00fb70b13.png"/>
      <podcast:transcript url="https://transcripts.rss.com/316363/2622085/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[TSB: Why does MENVI and the JRN never have a breach?]]></title>
      <itunes:title><![CDATA[TSB: Why does MENVI and the JRN never have a breach?]]></itunes:title>
      <description><![CDATA[<p>The Security Box is back with another episode. We’re currently working through a continuing series, and when major developments happen, we may release additional episodes using an A, B, C format so we can respond quickly while still keeping the overall podcast structure consistent.</p><p>We also have several videos queued for discussion. Some of these may be released as supplemental A/B/C segments to keep regular TSB episodes at a reasonable length, since we are no longer broadcasting weekly.</p><p>Some of the topics discussed here were briefly introduced during this past week’s Throwback Saturday Night. The difference between the two programs is simple:</p><p></p><ul><p></p><p></p><li> Throwback Saturday Night is more relaxed and conversational. </li><p></p><p></p><li> The Security Box goes deeper, offering detailed analysis and discussion. </li><p></p><p></p></ul><p></p><p>Topics Covered in This Episode</p><p></p><ul><p></p><p></p><li> ChatGPT and App Recommendations We discuss AI tools and productivity apps, prompted by serious accessibility and workflow issues with applications I rely on daily. </li><p></p><p></p><li> Video Segment: "Microsoft’s Backdoor Into Our Encryption…" This video was originally intended for Podcast 267 but did not air. We review and discuss its implications here. </li><p></p><p></p><li> Why Not Move to Gemini? — Training and Trust After DJ Terry asked why I couldn’t simply switch to Gemini, we take a deeper look at training models, ecosystem differences, and practical limitations. </li><p></p><p></p><li> Main Topic: Why MENVI and the JRN Have Never Had a Breach How have smaller organizations like the Jared Rimer Network (JRN) and the Music Education Network for the Visually Impaired (MENVI) avoided major security incidents?  We examine operational practices, scale advantages, and why smaller entities sometimes manage data protection better than large corporations. </li> <p></p><p></p></ul><p></p><p>If you would like to contact me, please use the contact information available through the blog, my website, or the details mentioned throughout the podcast.</p><p>Thanks so much for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2559355</link>
      <enclosure url="https://content.rss.com/episodes/316363/2559355/the-technology-blog/2026_02_18_23_59_22_ef7f373b-c64f-4d1a-bdb5-ae86e3ef4ab9.mp3" length="202816826" type="audio/mpeg"/>
      <guid isPermaLink="false">80d14ebd-5134-471b-8ea5-e6a7e7990c89</guid>
      <itunes:duration>12676</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>268</itunes:episode>
      <podcast:episode>268</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Feb 2026 00:15:17 GMT</pubDate>
      <podcast:transcript url="https://transcripts.rss.com/316363/2559355/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, AI and its usage]]></title>
      <itunes:title><![CDATA[The Security Box, AI and its usage]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to another edition of The Security Box.</p><p>This week’s program focuses on AI and its usage, where it’s helping, where it’s being misused, and where the risks are starting to show up in real-world security, privacy, and accessibility scenarios.</p><p>AI continues to move fast, and not always in ways users understand or consent to. We’ll talk about how AI is being deployed, what assumptions are being made on behalf of users, and where responsibility still needs to remain firmly human.</p><p>As part of this discussion, we may touch on:</p><p></p><ul><p></p><p></p><li> AI in everyday consumer tools and services </li><p></p><p></p><li> Security and privacy implications of AI-driven systems </li><p></p><p></p><li> Automation vs. accountability </li><p></p><p></p><li> Accessibility impacts — where AI helps and where it creates new barriers </li><p></p><p></p><li> The growing gap between marketing claims and real-world behavior </li><p></p><p></p></ul><p></p><p>As always, this is a discussion-driven program. Topics may evolve as the conversation unfolds, and recent events or examples may be referenced as part of the broader AI landscape.</p><p>If you’d like to support what we’re doing, you can:</p><p></p><ul><p></p><p></p><li> Donate to the network </li><p></p><p></p><li> Subscribe to <em>The Security Box</em> discussion list </li><p></p><p></p><li> Reach out using the contact information mentioned during the program or available on the blog </li><p></p><p></p></ul><p></p><p>We do have videos that will be mixed within the program from Nick Espinoza which include the following</p><p>:</p><p></p><ul><p></p><p></p><li> AI regulation arriving </li><p></p><p></p><li> Governments Shouldnt Use AI For Pics &amp; Vids </li><p></p><p></p><li> Microsofts Backdoor Into Our Encryption... </li><p></p><p></p><li> Tesla Cars = Super Hackable! </li><p></p><p></p><li> We Are Never Getting Rid Of Deepfakes </li><p></p><p></p><li> Your Breaches of the Week! January 12 to January 18, 2026 </li><p></p><p></p><li> Your Breaches of the week, January 26, 2026 to February 1, 2026 </li><p></p><p></p></ul> <p></p><p>Thanks for listening, reading, and learning with us. We can’t do this alone — and we appreciate you being part of the conversation.</p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2534226</link>
      <enclosure url="https://content.rss.com/episodes/316363/2534226/the-technology-blog/2026_02_08_21_15_43_24c1ae54-ddca-4bc3-a585-2af2064aa201.mp3" length="303609037" type="audio/mpeg"/>
      <guid isPermaLink="false">ebde30ac-9f5a-4d58-a21f-fb0f590f9631</guid>
      <itunes:duration>18956</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>267</itunes:episode>
      <podcast:episode>267</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 08 Feb 2026 23:13:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20260208_090203_249e5d18e8c7553100e4bdedfff2a6a6.png"/>
      <podcast:transcript url="https://transcripts.rss.com/316363/2534226/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[6 ransomware strains decrypted, hundreds arrested, no end in site?]]></title>
      <itunes:title><![CDATA[6 ransomware strains decrypted, hundreds arrested, no end in site?]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the next TSB, pprogram 266.  </p><p>This week, we are going to talk about a 2025 story dealing with hundreds being detained and several ransomware strains being decrypted through tools available to the public.  </p><p>The blog post leads to the article.  The blog is titled <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/12/26/6-ransomware-strains-decrypted-hundreds-detained/"></a><a href="https://technology.jaredrimer.net/2025/12/26/6-ransomware-strains-decrypted-hundreds-detained/">6 ransomware strains decrypted, hundreds detained </a>  which sparked some comment last podcast.</p><p>As part of discussion: <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/11/02/here-we-go-again-with-more-domains-being-registered-sits-there-with-possible-plans/"></a><a href="https://technology.jaredrimer.net/2025/11/02/here-we-go-again-with-more-domains-being-registered-sits-there-with-possible-plans/">Here we go again with more domains being registered, sits there with possible plans </a> should be read from our November diatribes list.</p><p>We do have videos from Nick Espinosa which include items like the world cup being invaded by AI, breaches of the week, mobile phones being not very secure soon, and a question: Why does your supermarket need your biometrics?  Preston Gaylor is along with comments as well.  </p><p>When we were looking at blogs and articles, we saw something about a CSAM article that talked about a suspect who was involved in CSAM and actually getting some substantial jail time.  </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/13/csam-suspect-jailed-for-close-to-10-years/"></a><a href="https://technology.jaredrimer.net/2026/01/13/csam-suspect-jailed-for-close-to-10-years/">CSAM suspect jailed for close to 10 years </a> is the blog post where I take this article apart.  </p><p>Now to our question from last podcast.  Did you get it correct?</p><p>The question last week was: Let’s get this Monday moving, Jared. You know how sometimes a name change can make everything feel new? Like when The Artist Formerly Known as Prince became a symbol, or when Dunkin’ ditched “Donuts” and got all minimalist on us.  </p><p>Well, Mark Zuckerberg had a major rebrand moment, too, swapping out “Facebook” for “Meta” to match his metaverse vision. But in doing so, he triggered an awkward translation situation. Meta, in Hebrew, means what? A) Chaos, B) Nightmare, C) Dead or D) Broken. The answer is chilling at the end.  </p><p>The answer: C) “Dead.” When Zuckerberg swapped “Facebook” for “Meta,” he might’ve been thinking “next-gen digital frontier,” but Hebrew speakers heard something closer to a funeral announcement. “Meta” sounds like the feminine form of the Hebrew word for “dead” (“מתה”), sparking a wave of memes and mock headstones.  </p><p>Congrats to those who got this right!  See you on another podcast coming soon and make it a great day!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2476444</link>
      <enclosure url="https://content.rss.com/episodes/316363/2476444/the-technology-blog/2026_01_22_01_39_46_df4a9d28-20ed-49bc-a473-6294cfaea6c2.mp3" length="283194661" type="audio/mpeg"/>
      <guid isPermaLink="false">dcbe966e-54ad-4657-aad1-7e8ab8148485</guid>
      <itunes:duration>17681</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>266</itunes:episode>
      <podcast:episode>266</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Jan 2026 15:48:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 265: This is an open forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 265: This is an open forum]]></itunes:title>
      <description><![CDATA[<p>Welcome to TSB, episode 265.  </p><p>The Trivia Question this time is:</p><p>Let’s get this Monday moving, Jared. You know how sometimes a name change can make everything feel new? Like when The Artist Formerly Known as Prince became a symbol, or when Dunkin’ ditched “Donuts” and got all minimalist on us.  </p><p>Well, Mark Zuckerberg had a major rebrand moment, too, swapping out “Facebook” for “Meta” to match his metaverse vision. But in doing so, he triggered an awkward translation situation. Meta, in Hebrew, means what? A) Chaos, B) Nightmare, C) Dead or D) Broken. The answer is chilling at the end.  </p><p>Please feel free to call and leave your guess at (888) 405-7524 and give us your name or name you want to go by as well as your guess.  </p><p>Since we've been gone, we're trying to catch up the blog with podcast announcements with full length show notes of past programs including Sans and TSB.</p><p>Also, as we announced, we're going to change this show to every two weeks.  We're doing this because this will give us more time to find something to talk about, but yet we won't feel burned out.  </p><p>Here are things we might talk about during this open edition of the program.</p><p></p><ul><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/06/here-we-go-another-click-fix-attack/"></a><a href="https://technology.jaredrimer.net/2026/01/06/here-we-go-another-click-fix-attack/">Here we go … another click fix attack </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/04/update-on-crypto-currency-thefts-and-an-old-breach/"></a><a href="https://technology.jaredrimer.net/2026/01/04/update-on-crypto-currency-thefts-and-an-old-breach/">Update on Crypto Currency thefts and an old breach </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/04/covenant-health-is-covered-in-recent-breaches-of-the-week/"></a><a href="https://technology.jaredrimer.net/2026/01/04/covenant-health-is-covered-in-recent-breaches-of-the-week/">Covenant Health is covered in recent breaches of the week </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/03/the-stupid-fucks-of-the-year/"></a><a href="https://technology.jaredrimer.net/2026/01/03/the-stupid-fucks-of-the-year/">The Stupid fucks of the year </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/03/diatribes-of-2025/"></a><a href="https://technology.jaredrimer.net/2026/01/03/diatribes-of-2025/">Diatribes of 2025 </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2026/01/03/disney-to-pay-a-pretty-penny-for-coppa-violations/"></a><a href="https://technology.jaredrimer.net/2026/01/03/disney-to-pay-a-pretty-penny-for-coppa-violations/">Disney to pay a pretty penny for Coppa violations </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/12/30/health-breaches-and-denmark-goes-digital/"></a><a href="https://technology.jaredrimer.net/2025/12/30/health-breaches-and-denmark-goes-digital/">Health breaches and denmark goes digital? </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/12/26/6-ransomware-strains-decrypted-hundreds-detained/"></a><a href="https://technology.jaredrimer.net/2025/12/26/6-ransomware-strains-decrypted-hundreds-detained/">6 ransomware strains decrypted, hundreds detained </a> </li><p></p><p></p></ul><p></p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2439942</link>
      <enclosure url="https://content.rss.com/episodes/316363/2439942/the-technology-blog/2026_01_08_17_58_52_e7c6d182-3baa-4b6c-81db-fbbcf5664c57.mp3" length="285575186" type="audio/mpeg"/>
      <guid isPermaLink="false">c6d7df2a-2bf2-4741-aa69-a524709f4855</guid>
      <itunes:duration>17830</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>265</itunes:episode>
      <podcast:episode>265</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 Jan 2026 18:42:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20260108_080129_762119ca47ef82d7964b6b563ca65eb2.png"/>
    </item>
    <item>
      <title><![CDATA[Its time for  Year End stuff and sans talk for TSB]]></title>
      <itunes:title><![CDATA[Its time for  Year End stuff and sans talk for TSB]]></itunes:title>
      <description><![CDATA[<p>If you haven't gotten the picture yet, this will be the last TSB  program of the year.</p><p></p><p>Feel free to visit the <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net"></a><a href="http://technology.jaredrimer.net">blog </a> to learn more about what's going on and I may even post too.</p><p></p><p>Sans will not be going anywhere, and we'll continue to work on catching that up.  </p><p></p><p>Some ADA stuff, end of year predictions and chatter about Sans stuff too.  </p><p></p><p>Hope you enjoy!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2399528</link>
      <enclosure url="https://content.rss.com/episodes/316363/2399528/the-technology-blog/2025_12_18_19_23_20_66eb75b3-6784-4270-b212-5282c57b20aa.mp3" length="315954460" type="audio/mpeg"/>
      <guid isPermaLink="false">37f522a0-3211-45ea-be6f-7f0314b539ae</guid>
      <itunes:duration>19727</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>264</itunes:episode>
      <podcast:episode>264</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Dec 2025 20:46:46 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The SECURITY box, podcast 254: its an open forum!]]></title>
      <itunes:title><![CDATA[The SECURITY box, podcast 254: its an open forum!]]></itunes:title>
      <description><![CDATA[<p>Hello gang!  Its an open forum day today, talking about Metro specific stuff, the list, and lots more.</p><p></p><p><a href="http://www.jaredrimer.net">Here is my web site </a> where you can learn more about me and if you want to donate, there's a link to do so. Its much appreciated!</p><p></p><p>Join the email list or send an email if you wish to do so.  </p><p></p><p>We apologize for the delay in releasing podcasts as of late, I've been very sick but I'm doing better now and I hope to be on the mend.  </p><p></p><p>See you next time!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2232378</link>
      <enclosure url="https://content.rss.com/episodes/316363/2232378/the-technology-blog/2025_09_25_00_40_41_63e1192a-d924-41a4-89a0-68e65f162ab8.mp3" length="184671077" type="audio/mpeg"/>
      <guid isPermaLink="false">6642f9a4-b676-47fb-a2d6-deeac0203786</guid>
      <itunes:duration>11530</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>254</itunes:episode>
      <podcast:episode>254</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Sep 2025 19:30:13 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 243: The Multi Billion Dollar Cybercrime Industry]]></title>
      <itunes:title><![CDATA[The Security box, podcast 243: The Multi Billion Dollar Cybercrime Industry]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to podcast 243 of the technology program known as the Security Box.  On this program, we've got plenty of news notes and the landscape, and a very interesting topic that deals with the economy of the Cybercrime Industry.  </p><p>The title of the program is </p><p></p><p></p><p>Let's get started by talking about our Trivia.  </p><p>The question this week is:</p><p>Which series predicted smartwatches decades before they existed: A) The Jetsons, B) Star Trek, C) Knight Rider or D) Dick Tracy? The answer awaits you at the end, no time travel required.</p><p>So what was last week's trivia?</p><p>According to the Kim Komando Newsletter in the Web Watercooler section, what is the percentage of Gen Zers who are OK of sharing their data for free?</p><p></p><ul><p></p><p></p><li> A: 25% </li><p></p><p></p><li> B: 50% </li><p></p><p></p><li> C: 80% </li><p></p><p></p><li> D: 88% </li><p></p><p></p><li> E: 95% </li><p></p><p></p><li> F: 100% </li><p></p><p></p><li> G: less than 25% </li><p></p><p></p></ul><p></p><p>Now, for the answer for last week's question if you'd rather read.</p><p>Answer: D: 88%</p><p>"That’s how many Gen Zers are cool with sharing their data for free. Now, <a target="_blank" rel="noopener noreferrer nofollow" href="http://Verb.AI">Verb.AI</a>’s giving them a reason to actually profit  from the surveillance. Gen Z: simultaneously terrified of phone calls and totally fine letting a startup track their every digital move. “It’s not stalking if it’s opt-in,” apparently."</p><p>Thanks for playing!</p><p></p><p></p><p></p><p></p><p>We've talked about the criminal underground on a regular when it comes to the various groups that create ransomware and force your average person to pay because their files are locked up.  </p><p>But there's another aspect  of the underground that we have not talked about, at least not directly.  </p><p>Did you know that the people that are used to scam you are actually taken from other parts of the country and held in places that are designed for them to do their job?  They're promised that they'll get paid, and some may escape as they've never gotten paid but got kidnapped.</p><p><a href="<a target=" rel="noopener noreferrer nofollow">Multi-billion"&gt;https://technology.jaredrimer.net/2025/04/22/multi-billion-dollar-cybercrime-industry-moves-around/"&gt;Multi-billion</a> dollar cybercrime industry moves around  is the blog post I wrote, introducing the article <a href="<a target=" rel="noopener noreferrer nofollow">Multi-billion-dollar"&gt;https://cybernews.com/cybercrime/multi-billion-dollar-cyberscam-industry-spreading-worldwide-un-says/"&gt;Multi-billion-dollar</a> cyberscam industry spreading worldwide, UN says   which came from Cyberscoop.  </p><p>As part of this, I surprised the group and we talked about things that you can do to verify like looking them up through an application like Find  My Friends, now known as Find My for IOS.  I'm not sure, but there may be a similar app for Google, please consult someone with more experience.  If we find something, we'll update in a future podcast, but I thought I heard of people using things like Find My to do this unless its only for devices.  That's our research, if we find anything new, we'll bring it out.</p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2082782</link>
      <enclosure url="https://content.rss.com/episodes/316363/2082782/the-technology-blog/2025_06_20_19_29_40_c26249cd-9683-40cd-9c1d-83a56c135644.mp3" length="267258989" type="audio/mpeg"/>
      <guid isPermaLink="false">89e705d3-5ae2-4243-aafc-25c0ea8ff499</guid>
      <itunes:duration>16686</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>243</itunes:episode>
      <podcast:episode>243</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 20 Jun 2025 19:32:47 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB podcast 236: Open forum part 2 including a cautionary tale]]></title>
      <itunes:title><![CDATA[TSB podcast 236: Open forum part 2 including a cautionary tale]]></itunes:title>
      <description><![CDATA[<p>Lots to ponder here on episode 236.  This includes a cautionary tale.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2009743</link>
      <enclosure url="https://content.rss.com/episodes/316363/2009743/the-technology-blog/2025_04_30_22_15_19_a9906066-b113-4bba-b0a9-55a5bbed074f.mp3" length="145574354" type="audio/mpeg"/>
      <guid isPermaLink="false">957bcca5-ef1a-4f8f-8f6e-9a2edcee355e</guid>
      <itunes:duration>9089</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>236</itunes:episode>
      <podcast:episode>236</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 May 2025 19:30:08 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[A crocodile that can't be trusted: episode 234 of The Security Box]]></title>
      <itunes:title><![CDATA[A crocodile that can't be trusted: episode 234 of The Security Box]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to the security box, podcast 234.  There is quite a bit of things coming down the pike as it comes to news including the extension of the ban which was supposed to take affect already.  We've got a topic dealing with Crocodilus   coming up, and of course our answer on the trivia from last week.  </p><p>If you'd like to contact the show, contact information is available on the show, or go to <a href="<a target=" rel="noopener noreferrer nofollow">the"&gt;http://www.jaredrimer.net"&gt;the</a> web site  to learn how to do so.  </p><p></p><p></p><p></p><p></p><p></p><ul><p></p><p></p><li> <a href="<a target=" rel="noopener noreferrer nofollow">A"&gt;https://technology.jaredrimer.net/2025/04/03/a-hacker-within-the-mix-of-the-doge/"&gt;A</a> hacker within the mix of the Doge?  </li><p></p><p></p><li> <a href="<a target=" rel="noopener noreferrer nofollow">Europol"&gt;https://technology.jaredrimer.net/2025/04/03/europol-took-down-a-vast-pedophile-network/"&gt;Europol</a> took down a vast pedophile network  </li><p></p><p></p></ul><p></p><p>Find anything else not listed?  Let us know! Other news will be posted that we go in to more detail on during the show but there is not room on these notes.</p><p></p><p></p><p></p><p></p><p>We don't name these, so don't yell at us.  <a href="<a target=" rel="noopener noreferrer nofollow">Crocodilus"&gt;https://technology.jaredrimer.net/2025/03/31/crocodilus-is-new-steals-crypto-wallets-abuses-accessibility-features/"&gt;Crocodilus</a> is new, steals crypto wallets, abuses accessibility features  is the blog post and <a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/"&gt;New</a> Crocodilus malware steals Android users’ crypto wallet keys   is the article itself.  </p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1980276</link>
      <enclosure url="https://content.rss.com/episodes/316363/1980276/the-technology-blog/2025_04_09_21_12_16_97515ada-cb79-4056-ac38-e9d442be3338.mp3" length="154593702" type="audio/mpeg"/>
      <guid isPermaLink="false">9aca2896-3971-4866-9045-a35d716e3f35</guid>
      <itunes:duration>9652</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>234</itunes:episode>
      <podcast:episode>234</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Apr 2025 18:00:29 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program 233: OneRep]]></title>
      <itunes:title><![CDATA[The Security box, program 233: OneRep]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program 233.  On this edition of the podcast, we've got news, notes and the landscape.  We've even got our topic dealing with 1rep.  What are they up to and why is it hitting the news in such a bad way?  </p><p></p><p>Full notes will be on our blog at <a target="_blank" rel="noopener noreferrer nofollow" href="http://technology.jaredrimer.net">http://technology.jaredrimer.net</a> where you can read them without things breaking.  </p><p></p><p>We've got tons of news, tons of notes, Trivia is in here and much more.  Strong Language is possible.  Its not heavy but its there.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1970544</link>
      <enclosure url="https://content.rss.com/episodes/316363/1970544/the-technology-blog/2025_04_02_21_57_28_72d6d0d1-a3ec-4c62-81bd-ed6bd3023f9d.mp3" length="175898291" type="audio/mpeg"/>
      <guid isPermaLink="false">45e59268-27d2-4608-baf8-2135d6a106ce</guid>
      <itunes:duration>10982</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>233</itunes:episode>
      <podcast:episode>233</podcast:episode>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 03 Apr 2025 20:10:19 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Phishing and virtual wallets]]></title>
      <itunes:title><![CDATA[Phishing and virtual wallets]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program 232.  Phish data can be used in all kinds of things, including apple wallets.  Google is also affected, so don't be complacent.  Find out more about this within our podcast.  This will be our main topic.  We have news, notes and the landscape, some of which are highlighted within the notes on the RSS feed and full notes on the blog.</p><p>Full news notes will be on the blog.  </p><p></p><p></p><p></p><p></p><p>Let's make things clear.  This is not just an apple problem.  This is also a Google problem.  The article we're using for this topic is coming from Krebs on Security and is titled <a href="<a target=" rel="noopener noreferrer nofollow">How"&gt;https://krebsonsecurity.com/2025/02/how-phished-data-turns-into-apple-google-wallets/"&gt;How</a> Phished Data Turns into Apple &amp; Google Wallets  so if you have not read it, you should.  This is going to get very interesting and we know that this is not going to be over any time soon.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1959731</link>
      <enclosure url="https://content.rss.com/episodes/316363/1959731/the-technology-blog/2025_03_26_22_18_17_81fce593-1bf8-4c4a-a2b7-6d50747c1bfd.mp3" length="194221032" type="audio/mpeg"/>
      <guid isPermaLink="false">dbe114db-5944-4170-9007-2e2566b5b4cc</guid>
      <itunes:duration>12126</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>232</itunes:episode>
      <podcast:episode>232</podcast:episode>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 27 Mar 2025 15:00:42 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program 226: The Stupid Jungle]]></title>
      <itunes:title><![CDATA[The Security box, program 226: The Stupid Jungle]]></itunes:title>
      <description><![CDATA[<p>Welcome to program number 226.  On this program, we're going to have a discussion on what has happened across the network the prior month, including the scare of the fires.  But the main topic does talk about a company in which did things completely wrong.</p><p>So, what should I read you ask?  Read the post mortem report: <a href="<a target=" rel="noopener noreferrer nofollow">Post"&gt;https://technology.jaredrimer.net/2025/02/11/post-mortem-how-important-are-mailing-lists-across-the-jrn/"&gt;Post</a> Mortem: How important are mailing lists across the JRN?  which will discuss the bulk of what we discuss.  </p><p>We do cover news including some IOS 18.3 updates which Kim Komando says to go ahead and install on phones now.  </p><p>We also have Trivia from last week and a very interesting question we did write down this time.  </p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1898320</link>
      <enclosure url="https://content.rss.com/episodes/316363/1898320/the-technology-blog/2025_02_14_18_35_03_507dc694-0737-441d-915f-67f9326a7929.mp3" length="223406113" type="audio/mpeg"/>
      <guid isPermaLink="false">f698e381-ca1e-4fdd-aa4c-f27f7d5d1f7d</guid>
      <itunes:duration>13948</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>226</itunes:episode>
      <podcast:episode>226</podcast:episode>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 14 Feb 2025 18:40:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20250214_060238_fc7e37c22e99ca1be2fdd36b36fbf772.png"/>
    </item>
    <item>
      <title><![CDATA[Sans newsletter for January 13, 2026 is finally here!]]></title>
      <itunes:title><![CDATA[Sans newsletter for January 13, 2026 is finally here!]]></itunes:title>
      <description><![CDATA[<p>Sorry we're so late everyone, between being sick, technical issues with the PC, and other commitments, we're finally here.  Some of this news still may be of value, and we're glad to still put it out.</p><p></p><p>Also, starting with this podcast, we're using transcripts.  They may not be perfect, but hope they help people.  Let me know if it is usable and whether they should be left on.</p><p></p><p>Welcome to Sans, episode 38.  This will cover the newsletter that was released on January 13, 2026.  </p><p>Sounds like a group we've talked about is back in the news as they're the top story in "top of the news."</p><p>We have an Instagram story that we saw through Malware Bytes, but we decided not to blog it.  We'll talk about it anyway.</p><p>We've got some Privacy Protection news from California, it looks like we've got good news from Spanish authorities and we've got a whole lot more.</p><p>If you would like to read the newsletter, <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=c45fde0807365599178081bda8f1a021b439558b699d4f917827882c4ee1ad6d0ab45c8bcfd59bedf7906a6642d194654d3caec3b328f0b696b2b815739e23d24be870c7cf6a9e5781a1d6a3f3eedc46"></a><a href="https://view.email.sans.org/?qs=c45fde0807365599178081bda8f1a021b439558b699d4f917827882c4ee1ad6d0ab45c8bcfd59bedf7906a6642d194654d3caec3b328f0b696b2b815739e23d24be870c7cf6a9e5781a1d6a3f3eedc46">please use this link to do so. </a></p><p>Here is what is in the top of the news.</p><p></p><ul><p></p><p></p><li> Salt Typhoon Threat Actors Reportedly Responsible for New Congressional Email Breach </li><p></p><p></p><li> Spanish Energy Company and Supplier Disclose Data Breach </li><p></p><p></p><li> LLMs and Healthcare: ChatGPT, Claude, and Google Overviews </li><p></p><p></p></ul><p></p><p>What do you think about the LLM story which is item 3 of the top of the news section?</p><p>Here's what is in the rest of the news.</p><p></p><ul><p></p><p></p><li> LLM APIs Targeted by Threat Actors and Gray-Hat Hackers </li><p></p><p></p><li> Instagram Password Reset Emails are Unrelated to Alleged Data Breach </li><p></p><p></p><li> BreachForums Member Data Leaked  </li><p></p><p></p><li> California Privacy Protection Agency Fines Texas Firm for Failing to Register as a Data Broker with the State </li><p></p><p></p><li> Spanish Authorities Arrest 34 in Connection with Cyber Crime Network </li><p></p><p></p><li> Printing Error Prompts Recall of Nearly 13,000 Recent Irish Passports </li><p></p><p></p><li> CISA Retires 10 Emergency Directives </li><p></p><p></p></ul><p></p><p>This can't be good in regards to the Irish Passport story.  </p><p>Comment on the newsletter by leaving me your thoughts. Contact info is within the program. Thanks so much for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2710195</link>
      <enclosure url="https://content.rss.com/episodes/316363/2710195/the-technology-blog/2026_04_08_16_43_43_06247bf7-1d98-4315-92ab-9f90cbb61f9a.mp3" length="147449472" type="audio/mpeg"/>
      <guid isPermaLink="false">580aea5f-bef7-4553-8119-d3520b3249b8</guid>
      <itunes:duration>9206</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Apr 2026 22:30:00 GMT</pubDate>
      <podcast:transcript url="https://transcripts.rss.com/316363/2710195/transcript" type="text/vtt"/>
    </item>
    <item>
      <title><![CDATA[Sans 36: The Newsletter that is for January 6, 2026]]></title>
      <itunes:title><![CDATA[Sans 36: The Newsletter that is for January 6, 2026]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to program 36 of the Sans series here at the Jared Rimer Network.  I'm Jared Rimer.  Here's the thing.  We're not taking anything away from any other podcast, we just want to put out the news and things from this great educational institution and put our thoughts in to it.  With that said, we'll see what happens, as the News Bites series continues.  </p><p>Sans 35 covered ouch! for January <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/newsletters/ouch/fake-tech-support-fixing-your-bank-account?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1551501_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757"></a><a href="https://www.sans.org/newsletters/ouch/fake-tech-support-fixing-your-bank-account?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1551501_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757">Fake Tech Support: The Only Thing They’re Fixing Is Your Bank Account, </a>  so 36 will be the first News Bites of the year.</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=8c61350b3f85535e72ed1c4bd06056468e314ea1e49260fccbb6a1fd4e7bf641247782cc7b1023887fa258d0b93451fd9dbdd35e7f481c713b08c792bf70e77ff6988262e8dc60f46889bb955be608bc84df0821b2b35b1b"></a><a href="https://view.email.sans.org/?qs=8c61350b3f85535e72ed1c4bd06056468e314ea1e49260fccbb6a1fd4e7bf641247782cc7b1023887fa258d0b93451fd9dbdd35e7f481c713b08c792bf70e77ff6988262e8dc60f46889bb955be608bc84df0821b2b35b1b">Here is the link  to read the Newsletter online </a> and we'd love to hear your thoughts! Again, this is the newsletter for January 6, 2026.   </p><p>Call (888) 405-7524 and drop your messages there, or find contact information throughout the podcast.</p><p>Here is what is in the top of the news for this newsletter.</p><p></p><ul><p></p><p></p><li> Patch MongoDB Now to Fix Exploited Memory Leak  </li><p></p><p></p><li> Guilty Plea from Former Cybersecurity Pros Turned Extortionists  </li><p></p><p></p><li> Fortinet CVE-2020-12812 is Being Actively Exploited Again </li>&lt;<p></p><p></p></ul><p></p><p>Guilty pleas within the top of the news makes my heart very happy.  Let's see what else we can find good within this industry this year, shall we?  </p><p>Here is what else is happening in the rest of the week's news section of the newsletter.</p><p></p><ul><p></p><p></p><li> South Korean Government Report Says KT Mishandled Femtocell Security, Leading to Snooping and  Micropayment Fraud </li><p></p><p></p><li> Check Local Network for Kimwolf Residential Proxy Botnet Infection  </li><p></p><p></p><li> Sedgwick Government Solutions Acknowledges Cybersecurity Incident Affecting File Transfer System </li><p></p><p></p><li> KEV Additions: Digiever DS-2105 Pro Network Video Recorders and MongoDB Server </li><p></p><p></p><li> New Zealand Healthcare Portal Acknowledges Cybersecurity Incident </li><p></p><p></p><li> Covenant Health Breach Follow-up: Nearly 480,000 Individuals Affected </li> <p></p><p></p><li> HIPAA Journal Lists Largest Healthcare Data Breaches of 2025; Aflac Updates Individuals Affected by June Incident to 22.65 Million </li><p></p><p></p></ul><p></p><p>We thank you for listening to the tech series, and please let us know what your thoughts are.   I do want to know!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2451850</link>
      <enclosure url="https://content.rss.com/episodes/316363/2451850/the-technology-blog/2026_01_10_00_37_25_a0425f92-30b9-4e0e-a557-1979e71fc4da.mp3" length="133453231" type="audio/mpeg"/>
      <guid isPermaLink="false">28be547c-f454-49cf-ac17-6d37a1ebdb88</guid>
      <itunes:duration>8332</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 10 Jan 2026 00:39:43 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans Institute talks about Technical Support Scams in January's Ouch! Newsletter]]></title>
      <itunes:title><![CDATA[Sans Institute talks about Technical Support Scams in January's Ouch! Newsletter]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to another Sans episode with Jared Rimer.</p><p>Today, we have Ouch, the newsletter for January 2026.  In it, it talks about technical support scams.  I've even heard some discussion on other podcasts including Scam Squad, so this means that they're back with a vengeance.  </p><p>The problem is, they don't use the same tactics, techniques and  procedures they used to.  While the example herein is a popup from a website, it may arrive in an unsolicited text message, or even on social media.  I don't think it has hit social media yet, but it could go there, so just be on the lookout.</p><p>We have headings that are within the newsletter.  They include: </p><p></p><ul><p></p><p></p><li> How a “Helpful” Call Turned Costly </li><p></p><p></p><li> What Are Tech Support Scams? </li><p></p><p></p><li> What Are They After? </li><p></p><p></p><li> How These Scams Work </li><p></p><p></p><li> How to Protect Yourself </li><p></p><p></p><li> Final Thoughts </li><p></p><p></p></ul><p></p><p>Each section listed above has something for you, and of course the newsletter is now part of San's podcast series.  </p><p>Here are other links you'll need.</p><p></p><ul><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/podcasts/ouch"></a><a href="https://www.sans.org/podcasts/ouch">Here is a link to the Ouch Podcast on Sans Institute's web site </a> </li><p></p><p></p><li> <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/newsletters/ouch/fake-tech-support-fixing-your-bank-account?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1551501_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757"></a><a href="https://www.sans.org/newsletters/ouch/fake-tech-support-fixing-your-bank-account?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1551501_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757">Fake Tech Support: The Only Thing They’re Fixing Is Your Bank Account </a> written by Jennifer Cox  </li><p></p><p></p></ul><p></p><p>Thanks so much for listening, and make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2425788</link>
      <enclosure url="https://content.rss.com/episodes/316363/2425788/the-technology-blog/2026_01_02_22_08_55_346517f6-5dea-4cae-8cec-4d700e500efd.mp3" length="28043168" type="audio/mpeg"/>
      <guid isPermaLink="false">376b6d2d-250a-4d9f-86ec-df8e8a9695ab</guid>
      <itunes:duration>1750</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 02 Jan 2026 22:14:54 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans covers the newsletter for January 9, 2026]]></title>
      <itunes:title><![CDATA[Sans covers the newsletter for January 9, 2026]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to another Sans Podcast.  </p><p>I know we're quite behind, and my goal was to do these podcasts between TSB episodes, but the week of the 17th had two meetings, one of which went to a second meeting I decided to stay for.  For those who are not clear by this, the two meetings I were to attent happened on two different days, but then one meeting I stayed for happened on the first day and it isn't a regular meeting I stay for.</p><p>This podcast is going to cover the newsletter that was released way back on January 9th, 2026.  My goal is to get us caught up, and I'm going to do my best.  </p><p>Would you like to read the newsletter?  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=00db82e0acb8d73c1d4c6079907d14dc6ccfb09668871bc3b48d05321ba9b5f2de93bfd507135235bc1b41c27a605c00251428723ef393acc9190dded3945cf24aba91181763351c50c277fa3f399850"></a><a href="https://view.email.sans.org/?qs=00db82e0acb8d73c1d4c6079907d14dc6ccfb09668871bc3b48d05321ba9b5f2de93bfd507135235bc1b41c27a605c00251428723ef393acc9190dded3945cf24aba91181763351c50c277fa3f399850">Here is the link to read January 9, 2026 and its newsletter </a> if you wish.</p><p>I believe one of the biggest stories may be this web page California residents can go to so they can opt out of stuff.  </p><p>Let's see what is in the top of the news.</p><p></p><ul><p></p><p></p><li> California's New Privacy Law Lets Consumers Submit One Demand for All Registered Data Brokers to Stop Collecting Their Information </li><p></p><p></p><li> Threat Actor’s Breach was a Resecurity Honeypot </li><p></p><p></p><li> Hospitality Staff, Beware ClickFix Attacks that Mimic BSOD  </li><p></p><p></p></ul><p></p><p>Here is what they covered for the rest of the week's news for this newsletter.</p><p></p><ul><p></p><p></p><li> Cisco Releases Updates for ISE and Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities </li><p></p><p></p><li> n8n Releases Patches for Two Critical Vulnerabilities in One Week </li><p></p><p></p><li> Veeam Update Addresses Four Vulnerabilities </li><p></p><p></p><li> CISA KEV Adds Code Injection Vulnerabilities in HPE OneView and Microsoft Office PowerPoint </li><p></p><p></p><li> Critical Missing Authentication Vulnerability in WHILL Electric Wheelchairs </li><p></p><p></p><li> European Space Agency Acknowledges Infosec Breach </li><p></p><p></p></ul><p></p><p>I hope you all enjoy the program as much as I am bringing it to you, and make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2478747</link>
      <enclosure url="https://content.rss.com/episodes/316363/2478747/the-technology-blog/2026_01_22_23_31_44_45a8c9ba-742d-417e-8852-4649231ebccd.mp3" length="107225989" type="audio/mpeg"/>
      <guid isPermaLink="false">6699458e-42ef-44ef-bfc9-219d118e2572</guid>
      <itunes:duration>6694</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Jan 2026 23:32:45 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans Newsletter for Dec 23, 2025is covered on this episode ]]></title>
      <itunes:title><![CDATA[Sans Newsletter for Dec 23, 2025is covered on this episode ]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to Sans, episode 34.  </p><p>On this episode, we will learn about a ten year anniversary of something that a certain nation state did, Russia.  Looks like we've got a couple of more breaches to talk about, and much more.  </p><p>While I will put in the info from the newsletter, the newsletter will have more info including links which I will not include.  </p><p>This will be the last version of the newsletter for now.  In the table of contents, under Internet Storm Center which are articles to various things, they mention this. Once recorded, that will be the last podcast until January 2026.  Happy new year!</p><p>Would you like to read the newsletter?  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=c5452618966fb1fdfb0b06afe6846dd9675999623904dbd791cb404cfc939cf7f89edb0b55a148bb695cecba8ba991cc37d3d67e167df2c677b75428f9cc9bbca83ce50b306598b830b092616eddde25c93f6cbfbdc9e345"></a><a href="https://view.email.sans.org/?qs=c5452618966fb1fdfb0b06afe6846dd9675999623904dbd791cb404cfc939cf7f89edb0b55a148bb695cecba8ba991cc37d3d67e167df2c677b75428f9cc9bbca83ce50b306598b830b092616eddde25c93f6cbfbdc9e345">Here is the link for December 23, 2025 </a> for your convenience.</p><p></p><p></p><p></p><ul><p></p><p></p><li> Ransomware Attack on Romanian Water Management Authority Affected More than 1,000 Systems </li><p></p><p></p><li> Widespread Microsoft 365 OAuth Attacks  </li><p></p><p></p><li> Patch WatchGuard Fireware OS for Exploited Critical Flaw </li><p></p><p></p></ul><p></p><p></p><p></p><p></p><ul><p></p><p></p><li> Nigerian Authorities Arrest RaccoonO365 Suspects  </li><p></p><p></p><li> Indictments Charge 54 People in Connection with ATM Jackpotting Scheme Using Ploutus Malware </li><p></p><p></p><li> UK Foreign Office Says it is Investigating Breach </li><p></p><p></p><li> University of Phoenix Sends Notifications After Oracle Breach  </li><p></p><p></p><li> Malicious npm Package Steals WhatsApp Data </li><p></p><p></p><li> University of Sydney Discloses Data Breach, Reviews Data Practices  </li><p></p><p></p><li> NIST Internet Time Services May Be Inaccurate After Pre-emptive Power Outage in Colorado </li><p></p><p></p></ul><p></p><p></p>&gt;<p></p><p>Contact me through my <a href="<a target=" rel="noopener noreferrer nofollow">my"&gt;http://www.jaredrimer.net"&gt;my</a> web site  or listen to the program to learn how you can contact me.  All of the methods are available for you.</p><p>Thanks so much for listening, and make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2417155</link>
      <enclosure url="https://content.rss.com/episodes/316363/2417155/the-technology-blog/2025_12_28_23_57_57_3c21379c-187c-4640-bbb1-ea6648fbe5fe.mp3" length="119757225" type="audio/mpeg"/>
      <guid isPermaLink="false">4f5d86b5-630f-4c16-b496-f5447feb7a09</guid>
      <itunes:duration>7477</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 29 Dec 2025 00:00:37 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[We have more maximum severity bugs in the newsletter of Sans for Dec 19, 2025]]></title>
      <itunes:title><![CDATA[We have more maximum severity bugs in the newsletter of Sans for Dec 19, 2025]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to sans, episode 33.  This is going to cover the newsletter for December 19th, which means we're pretty much caught up.  Yeah!</p><p>would you like to view the newsletter to see what might be of interest to you?  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=aef3d115e8377c55f8d08c852cbfab72d42b17398aa10dcb57e851bdd70b9a913306573977349dc128b4361923a1613aa4dea81e727feb1f995226ff7c644b938b3e4ceecf62a4acc3de792a0dec494ef4415385e1fa8dee"></a><a href="https://view.email.sans.org/?qs=aef3d115e8377c55f8d08c852cbfab72d42b17398aa10dcb57e851bdd70b9a913306573977349dc128b4361923a1613aa4dea81e727feb1f995226ff7c644b938b3e4ceecf62a4acc3de792a0dec494ef4415385e1fa8dee">Here's the newsletter for December 19, 2025. </a>  </p><p>Here is what is in the top of the news and we've got to start with yet another maximum severity flaw.</p><p></p><ul><p></p><p></p><li> Cisco AsyncOS Unpatched Maximum-Severity Flaw Exploited  </li><p></p><p></p><li> SonicWall Addresses Actively Exploited Vulnerability in SMA 100 Series Appliances; CISA Adds Flaw to KEV with a One-Week Mitigation Deadline </li><p></p><p></p><li> Known Critical Flaws in Fortinet Products are Being Actively Exploited </li><p></p><p></p></ul><p></p><p>Are you surprised about the fortinet stuff?  Seems like they're in Sans practicly every newsletter it seems, even though we missed time due to illness.</p><p>Here is what is in the rest of the week's news and we start again with a maximum severity bug but this time with an RCE.</p><p></p><ul><p></p><p></p><li> Patch HPE OneView to Fix Maximum-Severity RCE Flaw  </li><p></p><p></p><li> ASUS Live Update Vulnerability Added to KEV </li><p></p><p></p><li> RAT Allegedly Discovered on Mediterranean Ferry  </li><p></p><p></p><li> NHS Technology Supplier Discloses Cybersecurity Incident </li><p></p><p></p><li> Virginia Mental Health Authority Breach </li><p></p><p></p><li> Follow-Up: French Ministry of the Interior Cyberattack  </li><p></p><p></p><li> Law Enforcement Dismantles Infrastructure for Alleged Ransomware Money Laundering Service </li><p></p><p></p></ul><p></p><p>I can't wait to see what the update on the French Ministry is.  It sounded like the beginning of a particular investigation which was just getting started last podcast and newsletter for December 16.  </p><p>Please contact me through my <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.jaredrimer.net"></a><a href="https://www.jaredrimer.net">web site </a> or listen to the podcast to learn how to contact me.  Thanks so much for listening, and make it a happy holiday season!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2411031</link>
      <enclosure url="https://content.rss.com/episodes/316363/2411031/the-technology-blog/2025_12_24_21_26_41_7abab8b7-d8c7-4730-84b2-579c7db151c2.mp3" length="102420097" type="audio/mpeg"/>
      <guid isPermaLink="false">4b8c9975-a90d-48ae-9ca9-5353e9015cb5</guid>
      <itunes:duration>6394</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Dec 2025 21:27:34 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Remember Dan Kaminsky and the Newsletter for Dec 16, 2025]]></title>
      <itunes:title><![CDATA[Remember Dan Kaminsky and the Newsletter for Dec 16, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Sans program with Jared Rimer.  I hope that everyone will enjoy the program this time.  </p><p>This episode will be talking about the newsletter from December 16, 2025.  </p><p>Would you like a link to the newsletter?  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=849d82f8c26904d906cfd319f8367ad625f0a91094a8aa73c0ee028377225173171f16dd7f56bec1610804fc6940b1f00b70cb457fb2ca9db7a79e6c013df218d3b6ccdcf83f9bbdb3aa8c059bac27a4a1f8a8af5d0f8e85"></a><a href="https://view.email.sans.org/?qs=849d82f8c26904d906cfd319f8367ad625f0a91094a8aa73c0ee028377225173171f16dd7f56bec1610804fc6940b1f00b70cb457fb2ca9db7a79e6c013df218d3b6ccdcf83f9bbdb3aa8c059bac27a4a1f8a8af5d0f8e85">Why not check out the newsletter for December 16, 2025 </a> and we'll see what it covers.</p><p>At the top of the newsletter, they paid a tribute to <a target="_blank" rel="noopener noreferrer nofollow" href="https://en.wikipedia.org/wiki/Dan_Kaminsky"></a><a href="https://en.wikipedia.org/wiki/Dan_Kaminsky">Dan Kaminsky </a> who was a security researcher and worked tirelessly to make things accessible and found a very serious bug within DNS.  He was born in 1979 and died in 2001.  The link is to his entry on Wikipedia.   </p><p>Here is what's going on with the top of the news for this newsletter.</p><p></p><ul><p></p><p></p><li> Apple WebKit and Google Chrome Zero-Days Exploited and Patched </li><p></p><p></p><li> More React Vulnerabilities </li> <p></p><p></p><li> CISA Adds GeoServer and Sierra Vulnerabilities to KEV </li><p></p><p></p></ul><p></p><p>If you've not patched apple, do so.  I believe this only applies to 26.x as when I asked the phone, it gave me 26.2 and nothing in the 18 series.</p><p>Here's what is in the rest of the week's news for this newsletter.</p><p></p><ul><p></p><p></p><li> MITRE 25 Most Dangerous Vulnerabilities of 2025 </li><p></p><p></p><li> Microsoft is Deprecating RC4 Cipher </li><p></p><p></p><li> JLR Follow-up: Payroll Data Breached </li><p></p><p></p><li> Prosper and 700Credit Disclose Breaches </li><p></p><p></p><li> Coupang Follow-up </li><p></p><p></p><li> French Ministry of the Interior’s Email System Suffers Cyberattack  </li><p></p><p></p></ul><p></p><p>Want to contact me?  Send an email to tech at <a target="_blank" rel="noopener noreferrer nofollow" href="http://menvi.org">menvi.org</a> (put the symbol where it belongs) or give me a call at 888-405-7524.  Do find other contact information within the podcast, or <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.jaredrimer.net"></a><a href="http://www.jaredrimer.net">go to my web site </a> and learn more about me and find info that way.</p><p>We thank you for listening, and do make it a great day.  Thanks for listening, learning and participating with us!  Learning is such a beautiful thing isn't it?  </p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2407359</link>
      <enclosure url="https://content.rss.com/episodes/316363/2407359/the-technology-blog/2025_12_23_03_20_11_0faf8757-4d7e-4ea7-b68f-1e95af5a84d6.mp3" length="95734096" type="audio/mpeg"/>
      <guid isPermaLink="false">e14554df-3196-4f34-b277-1a27405811c5</guid>
      <itunes:duration>5977</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 23 Dec 2025 13:30:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans Newsbites for December 12, 2025: CVE numbers and many CVSS scores of 9s and 10s]]></title>
      <itunes:title><![CDATA[Sans Newsbites for December 12, 2025: CVE numbers and many CVSS scores of 9s and 10s]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to the Sans News Bites podcast covering the newsletter for December 12, 2025.</p><p>I know, we should've been continuing to release, but I also have been involved in other things too and taking some time off, but we plan on catching up as there are no meetings we need to attend until next year.</p><p>I've also been learning about how the RSS features work on getting things linked, and its not as simple as putting the links in place in HTML so we'll continue to improve our show notes and make them better.  </p><p>Do you want to read what is in the newsletter?  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=08a82cff181b811439b70a8f6ff550bda5604621a20762d85848c31c3963955f341998043586f4ba15d9ae96a1ab268c74da3fe88f2a04d88f269c2306972b4080c6ac2361b05c00fccc079f168b59308276a34ba2e8d6ab%22%3Ehere"></a><a href="https://view.email.sans.org/?qs=08a82cff181b811439b70a8f6ff550bda5604621a20762d85848c31c3963955f341998043586f4ba15d9ae96a1ab268c74da3fe88f2a04d88f269c2306972b4080c6ac2361b05c00fccc079f168b59308276a34ba2e8d6ab">here is the link to December 12, 2025 </a> if you want to read it.  </p><p>Here's what is in the top of the news.</p><p></p><ol><p></p><p></p><li> Microsoft Patch Tuesday for December 2025 Includes Exploited Zero-Day  </li><p></p><p></p><li> Patch Fortinet, Ivanti, and SAP Products for Critical Flaws </li><p></p><p></p><li> Patch Fortinet, Ivanti, and SAP Products for Critical Flaws  </li><p></p><p></p><li> Adobe Security Bulletins </li><p></p><p></p></ol><p></p><p>Here's the rest of the news </p><p></p><ol><p></p><p></p><li> Google Patches (Another) Chrome Zero-day </li><p></p><p></p><li> Unpatched Gogs Vulnerability is Being Actively Exploited </li><p></p><p></p><li> IBM Security Bulletins  </li><p></p><p></p><li> CISA and Partners Warn of Attacks Against Critical Infrastructure </li><p></p><p></p><li> Gartner Warns CISOs to Block AI Browsers  </li><p></p><p></p><li> Former Accenture Senior Manager Allegedly Lied About Security Control Compliance </li><p></p><p></p><li> Pierce County Library System Will Notify 340,000 Individuals Affected by April 2025 Data Breach </li><p></p><p></p></ol><p></p><p>I hope that you all enjoy the program as much as I am bringing it together for you.  Remember, this program reads the news items, and comments on them.  We will bring in the editors if they say something I'm thinking as I'm reading the thing.  Its quoted in the braille too.</p><p>Let me know if these show notes are better than past ones.  Thanks for listening, make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2402755</link>
      <enclosure url="https://content.rss.com/episodes/316363/2402755/the-technology-blog/2025_12_20_20_24_53_a216ae50-98a0-4284-a34a-db30a3b40b72.mp3" length="88354460" type="audio/mpeg"/>
      <guid isPermaLink="false">6dd9ae61-0898-44cf-9f48-432ac2195da2</guid>
      <itunes:duration>5522</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 20 Dec 2025 22:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News bites episode 30 for the newsletter that is December 9, 2025]]></title>
      <itunes:title><![CDATA[Sans News bites episode 30 for the newsletter that is December 9, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to sans, episode 30.  This will cover the newsletter that was released on December 9, 2025.  I hope that people will enjoy the program.  </p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=355d7fce8963b461dc208fdc4c34292c456e59d4b09d7deac1d9dcb26ca6fdfa2225568161a725508780c457366df41ca60d063866ebdf7b06ccbe442f6d0271a86d77afaad6e56e3bdbb06da172d2e3d1f4d0109d60f047%22%3EThis"></a><a href="https://view.email.sans.org/?qs=355d7fce8963b461dc208fdc4c34292c456e59d4b09d7deac1d9dcb26ca6fdfa2225568161a725508780c457366df41ca60d063866ebdf7b06ccbe442f6d0271a86d77afaad6e56e3bdbb06da172d2e3d1f4d0109d60f047">This is the link to read the newsletter online. </a></p><p>Thanks for reading!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2391958</link>
      <enclosure url="https://content.rss.com/episodes/316363/2391958/the-technology-blog/2025_12_15_17_37_27_f406d5ee-77af-4535-ae90-85ca86f074b7.mp3" length="94764136" type="audio/mpeg"/>
      <guid isPermaLink="false">c8a91f7c-a014-4605-8a3c-2a52253c7d9d</guid>
      <itunes:duration>5922</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 16 Dec 2025 02:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites episode 29: the newsletter for December 5, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites episode 29: the newsletter for December 5, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to program 29 of Sans.  The link to the December 5, 2025 newsletter is <a href="<a target=" rel="noopener noreferrer nofollow">https://view.email.sans.org/?qs=98500f4c8692dbb312c3051d77038920ed898ed6caa33e4500f4a980442386f2cf208d4038bc473ffe25a888f0f4e9ceafc60e447d83334645b34da0a9bbabbb26d0970656f95232cab5006f8703ffd75d056e09e13503c0"&gt;here for you to peruse </a> if you'd like to take a look at it.  </p><p>The top of the news deals with patching including a CVSS of 10 which is the maximumn on this score scale.</p><p>We've got a couple of breaches, India is rolling back their requirement for security software on phones, and more.</p><p>Thanks so much for listening to the show, and thanks for learning with us on what is going on in this landscape.  It's a lot, but don't take it in all at once.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2387106</link>
      <enclosure url="https://content.rss.com/episodes/316363/2387106/the-technology-blog/2025_12_13_03_07_53_e30943e4-b907-47b0-bfd6-798550d1d6a2.mp3" length="82831986" type="audio/mpeg"/>
      <guid isPermaLink="false">fc6e038c-b195-45ff-b10a-03e69676492d</guid>
      <itunes:duration>5176</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 15 Dec 2025 16:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites for December 2, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites for December 2, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans, episode 28 across the Jared Rimer Network.  You'll notice a change in the podcast, its Jared's Technology Podcast Network.  Same content as the tech blog and podcast, but now reflects what we're trying to do.</p><p>The Sans issue we're going to cover will be for the newsletter that was for December 2, 2025 as we work to try and catch up.</p><p>Its link is <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=62bd1cdfd2fc6a82768fc7e448b6600e769e048c38c79f4a6762d3a3d16721db97a1760ab11b741a2d8c43e81023b91a1e3e3812b3acaa8defb82ce5336053f54a245fed6321c85337657b9d082be466">https://view.email.sans.org/?qs=62bd1cdfd2fc6a82768fc7e448b6600e769e048c38c79f4a6762d3a3d16721db97a1760ab11b741a2d8c43e81023b91a1e3e3812b3acaa8defb82ce5336053f54a245fed6321c85337657b9d082be466</a> if you want to view it.</p><p>Thanks so much for listening, reading the blog, and participating in podcasts!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2378140</link>
      <enclosure url="https://content.rss.com/episodes/316363/2378140/the-technology-blog/2025_12_09_03_58_20_b5f07de6-73e5-4d29-8bfa-329192142f54.mp3" length="71227551" type="audio/mpeg"/>
      <guid isPermaLink="false">4381c02e-696c-42f1-a695-32bd8558dfe6</guid>
      <itunes:duration>4451</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 09 Dec 2025 03:58:51 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program number 263: The Worst Passwords of 2025]]></title>
      <itunes:title><![CDATA[The Security box, program number 263: The Worst Passwords of 2025]]></itunes:title>
      <description><![CDATA[<p>We are so sorry that this is being released late. Its been a bit busy lately.</p><p></p><p>This podcast was aired last wednesday and covers news notes from what people have found as well as our topic of the worst passwords of 2025.</p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">Stop"&gt;https://www.forbes.com/sites/zakdoffman/2025/11/06/stop-using-every-password-now-thats-on-this-list/"&gt;Stop</a> Using Every Password Now That's On This List  is the title of this one.  </p><p>Did I mention we have trivia too?  To participate, call 888-405-7524 or follow instructions in the program.  Enjoy!</p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2374857</link>
      <enclosure url="https://content.rss.com/episodes/316363/2374857/the-technology-blog/2025_12_07_20_29_01_93ca0871-4b78-49bb-8144-196ffedb6a77.mp3" length="305098306" type="audio/mpeg"/>
      <guid isPermaLink="false">5d72d50a-a9aa-4a04-abed-d42390260267</guid>
      <itunes:duration>19049</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 08 Dec 2025 20:30:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/ep_cover_20251208_051220_83022886bfa1d8bd0418ec48888022d9.png"/>
    </item>
    <item>
      <title><![CDATA[Sans News Bites for the newsletter for Friday, September 21, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites for the newsletter for Friday, September 21, 2025]]></itunes:title>
      <description><![CDATA[<p>We now come with the newsletter for September 21, 2025.  We have three idiots going to be talked about, and we even talk about Pharming, that is P H, not F.  We neglected it last podcast.</p><p></p><p>Welcome to Sans, episode 27.  On this episode, we'll cover Farming, something I realized we didn't cover from last podcast.  </p><p>Then, we'll cover the newsletter, and we'll see what types of comments I have.</p><p>  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://view.email.sans.org/?qs=f988f4249ca0dde285b162c304984dddee170f21a233dfd1669a01d16ebaf9cb60e47212daec371d9aa1ab1f2153e9a7da9c4ff4fd84984614ad984f92541af7431e0284ea2182095892b1d9085c4ef0"&gt;Here</a> is the link to the newsletter for November 21, 2025.   </p><p></p><p>Thanks so much for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2346834</link>
      <enclosure url="https://content.rss.com/episodes/316363/2346834/the-technology-blog/2025_11_25_16_59_45_dd1b91f8-dc16-4b86-8405-ee8e39c5f3e1.mp3" length="82498652" type="audio/mpeg"/>
      <guid isPermaLink="false">57a4aaba-2b79-4fc7-bb96-75259792cf06</guid>
      <itunes:duration>5156</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 25 Nov 2025 17:13:07 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites episode 26 covering the newsletter for November 18, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites episode 26 covering the newsletter for November 18, 2025]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the program for Sans News Bites.  This is episode 26 and it'll cover the newsletter for November 18, 2025. <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=a584bedbbeeab05256f36840ed3a3b5f6ebd043f83ccc0a22f51e1952fcbec363ca329ff413074db4293d2a42993b82060eaa63e867df6f38746d83b603a5ca54a02875e671648404d041881205efbfc8ea1d51d8b25b02a"&gt;This</a> is the link to the newsletter  if you want to read it.</p><p>Thanks so much for reading.  Thanks so much for listening. And thanks so much for learning with us.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2342086</link>
      <enclosure url="https://content.rss.com/episodes/316363/2342086/the-technology-blog/2025_11_22_22_36_13_34a4caa0-f625-48bb-8449-576db7a996dd.mp3" length="71063646" type="audio/mpeg"/>
      <guid isPermaLink="false">2b0c227f-bf33-4bff-87d4-a60450c928d9</guid>
      <itunes:duration>4441</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 23 Nov 2025 12:30:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program 262: Freight shippers and being targeted]]></title>
      <itunes:title><![CDATA[The Security box, program 262: Freight shippers and being targeted]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to the Security box, podcast 262.  On this episode, we're going to learn about actors who abuse the privelage of day to day operations to get shipments from one place to another.</p><p>We did a deep dive of this through my blog and its a 7 minute read titled <a href="<a target=" rel="noopener noreferrer nofollow">Hackers"&gt;https://technology.jaredrimer.net/2025/11/04/hackers-to-use-tools-to-breach-freighters-steal-shipments/"&gt;Hackers</a> to use tools to breach freighters, steal shipments. </p><p>This leads to the full article titled <a href="<a target=" rel="noopener noreferrer nofollow">Hackers"&gt;https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/"&gt;Hackers</a> use RMM tools to breach freighters and steal cargo shipments  which comes to us from Bleeping Computer.  </p><p>We'll have news, notes and the landscape, and an email which may be making a comeback.  We'll have breaches of the week as usual and we'll also see what other stuff we can find as well.</p><p>I hope you enjoy the program, thanks so much for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2338608</link>
      <enclosure url="https://content.rss.com/episodes/316363/2338608/the-technology-blog/2025_11_20_15_34_49_b14590ef-2139-4645-92a8-4c5d783ea5a9.mp3" length="204353490" type="audio/mpeg"/>
      <guid isPermaLink="false">f3228942-7446-45f7-9f35-dd3cf4e6d595</guid>
      <itunes:duration>12759</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Nov 2025 15:36:46 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites returns with episode 25: Covering the newsletter for November 14, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites returns with episode 25: Covering the newsletter for November 14, 2025]]></itunes:title>
      <description><![CDATA[<p>Hello gang, its been a long time since we did Sans, and I want to do Sans as it gives us insites in to the landscape.  Insite that we don't have otherwise.</p><p></p><p>Let me know if you find a moron of the podcast.  </p><p></p><p>Hope you enjoy!</p><p></p><p>Welcome to Sans, episode 25.  Yes, its been awhile and I know it.  I wanted to get back in to Sans in October but it just wasn't possible with what happened sick wise. </p><p>I was better in November, but lots of things have been  going on but now I want to try and do an episode.</p><p><a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=37dfcc22b7a299ad2af3e3862f664503344a6f6a7b899e99e92e3318e2d7399f15d3ceefc5c91165fac68f723d04bf1924fc9d47b457a566030e6154718e161ce910174565545f09a5a5177fd85c131a"&gt;This</a> link is for the newsletter put out Friday November 14, 2025.  Since December will be a lot quieter, I hope I can try to get back in to these. </p><p>I think its a great edition to the podcast set and I've personally missed doing this show.  </p><p>Thanks for everyone's support during my recovery. I greatly appreciate it!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2330173</link>
      <enclosure url="https://content.rss.com/episodes/316363/2330173/the-technology-blog/2025_11_16_05_47_04_963c8133-43cb-46bc-bc9e-f981c99f7b44.mp3" length="75305634" type="audio/mpeg"/>
      <guid isPermaLink="false">79f807b8-0b18-46d7-93da-30fef05e813c</guid>
      <itunes:duration>4706</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 16 Nov 2025 14:30:08 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 261: we've got a new malware in town and this one abuses API access]]></title>
      <itunes:title><![CDATA[The Security box, podcast 261: we've got a new malware in town and this one abuses API access]]></itunes:title>
      <description><![CDATA[<p>SesameOp  seems to be new in town.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://technology.jaredrimer.net/2025/11/05/sesameop-malware-abuses-openai-api/"&gt;This</a> is the blog post  about it.</p><p>We've not had time to post to the blog, but I did post to the list a few items.</p><p>We hope you enjoy the show, and we do have a comment from Mr. J. about something we may talk about on our cast as well.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2324994</link>
      <enclosure url="https://content.rss.com/episodes/316363/2324994/the-technology-blog/2025_11_13_00_41_02_7e153902-4b33-4adb-8a85-acc17ab355d1.mp3" length="308532380" type="audio/mpeg"/>
      <guid isPermaLink="false">2e6f7fc1-1d8c-46ff-95bf-b0fae285233c</guid>
      <itunes:duration>19263</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Nov 2025 07:45:08 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 260 for November 5, 2025]]></title>
      <itunes:title><![CDATA[The Security box, podcast 260 for November 5, 2025]]></itunes:title>
      <description><![CDATA[<p>Sorry this podcast is so late.  I merged the files on Thursday and never got the files up here.  I may have dated the cast for Tjhursday and its still not here.  </p><p></p><p>I'm fixing that now.</p><p></p><p>Welcome to the Security box, podcast 260.  This is the first time we've done show notes since NCSAM, but that's OK.  </p><p>On this program, we're going to run through the landscape as well as have another interesting topic on EDR stuff.  </p><p>For those who are not familiar with EDR, and you're joining us for the first time, EDR stands for end point detection and response. This is part of some Antivirus tools. </p><p>There is malware out there that disables this technology and we've been talking about this for quite awhile, even though we've not uploaded to the TSB directory in quite while.  </p><p>The article this time comes from Bleeping Computer and is titled <a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/"&gt;New</a> EDR-Freeze tool uses Windows WER to suspend security software  which caught Nick's attention.  </p><p>If I remember, Windows WER  stands for the "Windows Error Reporting" tool.  So if this is the case, this is going to be bad.  </p><p>We'll break this down and we'll see what else the team is going to want to cover.  </p><p>Thanks so much for listening, and make it a great day!</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2317352</link>
      <enclosure url="https://content.rss.com/episodes/316363/2317352/the-technology-blog/2025_11_08_20_52_11_5bd964d7-5a2b-49e6-8164-a0ac19e85744.mp3" length="284345552" type="audio/mpeg"/>
      <guid isPermaLink="false">4d6bfd5f-ad27-4347-aee5-a42c6d3c577a</guid>
      <itunes:duration>17753</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 08 Nov 2025 20:52:33 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 259: NCSAM week 5: shopping, domains and erata]]></title>
      <itunes:title><![CDATA[The Security box, podcast 259: NCSAM week 5: shopping, domains and erata]]></itunes:title>
      <description><![CDATA[<p>Hello gang. Final NCSAM for you and plenty of tunes at the end for you to enjoy. Several different videos too, to keep you on your toes.  </p><p></p><p>See you next time!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2299810</link>
      <enclosure url="https://content.rss.com/episodes/316363/2299810/the-technology-blog/2025_10_30_17_02_05_bc7e016d-afee-422d-926e-1cb230b23a33.mp3" length="293761632" type="audio/mpeg"/>
      <guid isPermaLink="false">c24229b9-ec1a-470c-a3a3-c5e07eb63b15</guid>
      <itunes:duration>18341</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 Oct 2025 17:04:56 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 258: NCSAM week 3, Scams, social media and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 258: NCSAM week 3, Scams, social media and more]]></itunes:title>
      <description><![CDATA[<p>Hello gang,</p><p></p><p>I've started blogging again and we've got a few videos that might be of interest too.</p><p></p><p>This may be about 5 hours for the podcast but we've got stuff here including breaches, blockchain stuff, AI stuff and more.</p><p></p><p>Feel free to contact me using the contact information from within the podcast or web site.</p><p></p><p>Enjoy!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2286592</link>
      <enclosure url="https://content.rss.com/episodes/316363/2286592/the-technology-blog/2025_10_23_02_51_09_03dd45b2-4c16-4ff0-9ab1-248a7d8e8fd8.mp3" length="288723198" type="audio/mpeg"/>
      <guid isPermaLink="false">defe10f0-55f0-4c18-9319-9efc07c7f4e1</guid>
      <itunes:duration>18027</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Oct 2025 17:00:22 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 257: week 3 of NCSAM talking about transportation]]></title>
      <itunes:title><![CDATA[The Security box, podcast 257: week 3 of NCSAM talking about transportation]]></itunes:title>
      <description><![CDATA[<p>Sorry for the podcasting delay, its been a bit busy with a few items, hope we can get the podcast out in a better time frame this next week.</p><p></p><p>We talk about any news and notes from the landscape, and then we talk about transportation, apps and more.  </p><p></p><p>My various web sites where things are linked are given including <a href="http://www.whitecanetravel.com">White Cane Travel </a> and <a href="http://www.jaredrimer.com">my Metro page </a> but you can also search these things out too.  </p><p></p><p>This coming week, we'll talk about social media.  Hope you enjoy the NCSAM stuff and we'll be in touch!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2278753</link>
      <enclosure url="https://content.rss.com/episodes/316363/2278753/the-technology-blog/2025_10_19_19_23_03_b8fc74e5-1580-496f-9342-08028299061c.mp3" length="233012794" type="audio/mpeg"/>
      <guid isPermaLink="false">b45f3ece-1bab-4617-9915-a14731235486</guid>
      <itunes:duration>14548</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 19 Oct 2025 21:00:35 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 256; credit cards, debit cards and banking]]></title>
      <itunes:title><![CDATA[The Security box, podcast 256; credit cards, debit cards and banking]]></itunes:title>
      <description><![CDATA[<p>OK folks, we're covering quite  bit of things including news, notes, and different types of cards and options for banking.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2263145</link>
      <enclosure url="https://content.rss.com/episodes/316363/2263145/the-technology-blog/2025_10_09_19_02_42_19b37a4a-3d19-4dca-87ba-5ac8f1524f91.mp3" length="273987427" type="audio/mpeg"/>
      <guid isPermaLink="false">c1d05f51-051f-4533-be17-817ef426987f</guid>
      <itunes:duration>17106</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Oct 2025 17:50:09 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB podcast 255: NCSAM week 1: Tying everything to the password]]></title>
      <itunes:title><![CDATA[TSB podcast 255: NCSAM week 1: Tying everything to the password]]></itunes:title>
      <description><![CDATA[<p>Did you know that a lot of attacks start with the first basic thing you do when you sign up for an account?  That is ... setting up passwords.</p><p></p><p>Passwords are all over the place including, email, streaming services, banking, and even your favorite app which may include social media.</p><p></p><p>There are good practices and bad practices.  </p><p></p><p>Each person will make their own decisions, but we tie all of this to the first line of your defense, the password.  </p><p></p><p>Please feel free to find contact info on the JRN web site at <a target="_blank" rel="noopener noreferrer nofollow" href="http://www.jaredrimer.net">www.jaredrimer.net</a> or use what is available within the podcast.  </p><p></p><p>Let's hear from you!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2250065</link>
      <enclosure url="https://content.rss.com/episodes/316363/2250065/the-technology-blog/2025_10_02_19_07_55_c14716bc-dfda-4405-b136-b8571544a3cd.mp3" length="247094159" type="audio/mpeg"/>
      <guid isPermaLink="false">877b4488-9eac-4024-a57a-120fad108ba1</guid>
      <itunes:duration>15427</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 Oct 2025 21:30:13 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 253: Ramp and Dump for September 17, 2025]]></title>
      <itunes:title><![CDATA[The Security box, podcast 253: Ramp and Dump for September 17, 2025]]></itunes:title>
      <description><![CDATA[<p>The goal was to release this podcast on the 20th but I fell ill again, and so we're releasing it today.  Truly sorry for the lengthy delay!  </p><p></p><p>Here, we talk about Ramp and Dump amongst other topics that either came across the list or the blog.  </p><p></p><p>We've not touched the blog much due to illness, but that will change.  </p><p></p><p>Here are our notes.</p><p></p><p></p><p></p><p></p><p>Hello gang, welcome to podcast 253.  I've been under the weather, but trying to blog a little bit since I've been better.  </p><p>We've got an interesting topic Nick picked out called Ramp and Dump and Nick picked this out.  Its on an old scheme, but new too.  </p><p>I hope we took enough of the article to discuss this one.  <a href="<a target=" rel="noopener noreferrer nofollow">Mobile"&gt;https://krebsonsecurity.com/2025/08/mobile-phishers-target-brokerage-accounts-in-ramp-and-dump-cashout-scheme/"&gt;Mobile</a> Phishers Target Brokerage Accounts in ‘Ramp and Dump’ Cashout Scheme  is  the article and thanks so much for reading, participating and learning with us!</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2231389</link>
      <enclosure url="https://content.rss.com/episodes/316363/2231389/the-technology-blog/2025_09_24_14_55_15_b722c029-996d-4e9a-9f42-5680da7d8679.mp3" length="223459216" type="audio/mpeg"/>
      <guid isPermaLink="false">5c100752-6e6a-449e-a102-2b95e5ad6044</guid>
      <itunes:duration>13952</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Sep 2025 01:00:20 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans 24: No fanfare, just passkeys for Septembers ouch! Newsletter]]></title>
      <itunes:title><![CDATA[Sans 24: No fanfare, just passkeys for Septembers ouch! Newsletter]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans,, episode 24.  We know that News Bites is taking off, but it must be time for the  Ouch! Newsletter.  This time, they tackle something called Passkeys.  Links for the podcast as well as translations are available.  </p><p>Want to read ouch for the month of september?  <a href="<a target=" rel="noopener noreferrer nofollow">Passkeys"&gt;https://www.sans.org/newsletters/ouch/passkeys-simpler-safer-way-sign-in?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1517060_ouch_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757"&gt;Passkeys</a> – A Simpler and Safer Way to Sign In  is the newsletter title for this episode.  </p><p>Enjoy learning!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2194532</link>
      <enclosure url="https://content.rss.com/episodes/316363/2194532/the-technology-blog/2025_09_02_01_50_30_da3f9f50-962e-419e-a1a1-ae168e371593.mp3" length="10245193" type="audio/mpeg"/>
      <guid isPermaLink="false">af2ac821-b06a-48c4-952a-941d7e83f918</guid>
      <itunes:duration>640</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 02 Sep 2025 01:50:45 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans 23 for the newsletter for August 29th, 2025]]></title>
      <itunes:title><![CDATA[Sans 23 for the newsletter for August 29th, 2025]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to sans episode 23.  Just a side note, the next newsletter won't be till the 5th of September, they mention it in the newsletter.</p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://view.email.sans.org/?qs=6cacbd89bbf5b903451a7385bfe544edb7af35b8521cdf2f113018ed98ba04677685a3b1a3ec57721cb034ea7c7d44d19846c046cd1c795d3358e4535bb744c7e77f3d1697a6ab78ab606288f57dc279"&gt;Here</a> is the link to the newsletter for August 29th  if you wish to read it.  </p><p>Per usual, we'll credit them where needed, but the comments are our own unless we specify.  </p><p>We're bringing this to people so you get a wide range of coverage from around the landscape.  If their thoughts align to mine, we'll put them and indicate its theirs.  </p><p>Attribution on who edits Sans is at the end of every podcast.  </p><p>Thanks for listening, make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2191634</link>
      <enclosure url="https://content.rss.com/episodes/316363/2191634/the-technology-blog/2025_08_30_21_39_41_2cef541e-428e-464c-ba5b-259488d165fd.mp3" length="63606072" type="audio/mpeg"/>
      <guid isPermaLink="false">2a31aa91-f5d8-4f21-94f0-8db8d45eb235</guid>
      <itunes:duration>3975</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 31 Aug 2025 03:00:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News bites episode 22: the newsletter August 26, 2025]]></title>
      <itunes:title><![CDATA[Sans News bites episode 22: the newsletter August 26, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans episode 22.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=daf62d748db43a9471c4e1d5df1539428e593f2d162ab8d22432b38dec2ce1cc042855ab63a90ffe08d9b00e3cbeb5344c66e19b3eac67a79c2970f5dc40a516be0f0e5927998e08f79df9af8b567b44f2bfc29b429e680f"&gt;This</a> is the link to the newsletter  which was released on Tuesday, August 26th.  </p><p>Don't worry, we're not going to try and catch up, sometimes its best to just move forward.  </p><p>Find anything of value you want to comment on?  Please do so!  (888) 405-7524 or send an email or an imessage.  Contact info is given within this program.  Thanks for listening, make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2190434</link>
      <enclosure url="https://content.rss.com/episodes/316363/2190434/the-technology-blog/2025_08_29_19_50_03_621fd1c9-49ce-423e-ab25-9faba12330a0.mp3" length="79075287" type="audio/mpeg"/>
      <guid isPermaLink="false">0d6afe81-af6e-4cd4-a6bc-43ce50656cc2</guid>
      <itunes:duration>4942</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 29 Aug 2025 22:00:22 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 252: more EDR Killer stuff]]></title>
      <itunes:title><![CDATA[The security box, podcast 252: more EDR Killer stuff]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 252.  This is the second of two podcasts talking about the subject of EDR.  We've got news, notes, the landscape, trivia and of course the said topic.  </p><p>I even have something I found on Facebook that I thought was worth sharing that was posted to a group by a follower. I don't normally read these, but I think its worth sharing.  Its not necessarily tech related, but still worth it.  </p><p></p><p></p><p></p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://technology.jaredrimer.net/2025/08/15/new-edr-killer-was-used-by-8-different-ransomware-groups-several-are-unknown-to-me/"&gt;New</a> EDR killer was used by 8 different ransomware groups, several are unknown to me  is the blog post.   It links to <a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/"&gt;New</a> EDR killer tool used by eight different ransomware groups   if you want to read it.  That's the article for discussion and its a doozie.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2187695</link>
      <enclosure url="https://content.rss.com/episodes/316363/2187695/the-technology-blog/2025_08_28_02_27_35_7d212d36-1518-4f3a-bf09-9d14508381c5.mp3" length="251763670" type="audio/mpeg"/>
      <guid isPermaLink="false">5a940d3b-192f-4150-b75a-c266fe420606</guid>
      <itunes:duration>15719</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 28 Aug 2025 17:08:16 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans news bites, episode 21: Newsletter for august 8, 2025]]></title>
      <itunes:title><![CDATA[Sans news bites, episode 21: Newsletter for august 8, 2025]]></itunes:title>
      <description><![CDATA[<p>Sorry for the lengthy delay! Lots of stuff happening that pulled me away.  </p><p></p><p></p><p></p><p></p><p>Hello folks, welcome to Sans episode 21.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=8af3fac98aa539544a129d4670435689b58085cf821afd2661d81f113695359975b2496b59f270830a15c844dd5cfd36261a9910afd7d6520c5744e95837d90bd59234909e53e38dd10c32594e815063"&gt;This</a> is the link for the newsletter.   This is the newsletter for August 8, 2025 which will be more current.  We hope you enjoy the program!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2179032</link>
      <enclosure url="https://content.rss.com/episodes/316363/2179032/the-technology-blog/2025_08_22_19_09_02_cca649fc-db95-4d68-8362-1d610bce8154.mp3" length="57467567" type="audio/mpeg"/>
      <guid isPermaLink="false">76883bf8-d641-4911-86ad-6865be388829</guid>
      <itunes:duration>3591</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 22 Aug 2025 19:12:18 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 251 for August 20, 2025]]></title>
      <itunes:title><![CDATA[TSB 251 for August 20, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 251 of the security box.  Its interesting, we did pass 250 episodes but episode 250 had a tech issue I did not realize until I ended the program.  We'll recap things so everyone can be heard, then we'll get in to the news, notes and the landscape.  </p><p>Also this week, one of two EDR articles that we've come across, one by Nick and one by myself.  </p><p>We may have trivia as well.  </p><p>Hope you enjoy the program, thanks so much for listening!</p><p></p><p></p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2177370</link>
      <enclosure url="https://content.rss.com/episodes/316363/2177370/the-technology-blog/2025_08_21_16_44_04_1ecb52dd-8cb5-4c5d-9d5b-e993d52ff051.mp3" length="208969239" type="audio/mpeg"/>
      <guid isPermaLink="false">bcc317dc-e544-475f-80d3-f4f44d97509f</guid>
      <itunes:duration>13047</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 21 Aug 2025 16:48:15 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 250: FileFix]]></title>
      <itunes:title><![CDATA[TSB 250: FileFix]]></itunes:title>
      <description><![CDATA[<p>I realized that on our second segment, not everyone was heard. This is the first Ive done this, sorry about that!  Follow the topic in the show notes and we'll recap next week.  </p><p></p><p>Hello folks, welcome to the security box, podcast 250.  We've finally reached our 250th episode!  This is definitely a momentous day.</p><p>On this program, we're going to have any news, notes and the landscape; we'll have a very interesting trivia question, and we also will have a topic dealing with a brand new attack which we predicted after our June first look when in July we got the first attack of such a thing.  The thing we're talking about is called file fix.  First termed click fix, it was one of the top problems we've had but now its been revamped and its not good.</p><p>Thanks so much for listening, please make it a great day!</p><p></p><p></p><p></p><p></p><p>What does the word "malware" stand for?  Its a two word phraise where all of the letters are used within the two words.  (888) 405-7524 or find full contact information on our podcast you can use to submit your answer.</p><p></p><p></p><p></p><p></p><p>Well, we start in June when we posted <a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://technology.jaredrimer.net/2025/06/24/new-click-fix-may-soon-become-file-fix/"&gt;New</a>! Click Fix may soon become File Fix  which we talked about.  Then, in mid-July, our prediction came true.  <a href="<a target=" rel="noopener noreferrer nofollow">We"&gt;https://technology.jaredrimer.net/2025/07/14/we-now-have-our-first-file-fix-attack/"&gt;We</a> now have our first file fix attack  is the blog post that we have which leads to the article in question that we'll be pulling from.  Thanks so much for having an interest!  We're not done yet.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2165562</link>
      <enclosure url="https://content.rss.com/episodes/316363/2165562/the-technology-blog/2025_08_13_22_07_41_1260ee07-18d5-4be1-8c95-c6cc0d9b4136.mp3" length="207873771" type="audio/mpeg"/>
      <guid isPermaLink="false">fb377842-a8e0-4a5d-ba82-818ed93395c3</guid>
      <itunes:duration>12979</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Aug 2025 22:09:21 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 20: The Newsletter for August 1, 2025]]></title>
      <itunes:title><![CDATA[Sans episode 20: The Newsletter for August 1, 2025]]></itunes:title>
      <description><![CDATA[<p>Finally trying to get some sans done.</p><p></p><p>Hello folk, welcome to sans episode 20.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=6c6bf7745a6e10ca90dbd3dfb79e37ee5b5b30285e0d2c7cb2a344b6be02a7874049916174aaccc38c9c3f27247f1b143d9e90df510dc717878006377296f8dbd7c6decc5f93c9673759879863a0e48afa6ccd62a9e98093"&gt;This</a> is the link for the news bites  if you'd like to read it.  This is a very interesting episode where Dropbox discontinued their password manager, Project Zero from Google is becoming more transparent, St. Paul, Minnesota calls the  National Guard and much more.  This is crazy!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2156303</link>
      <enclosure url="https://content.rss.com/episodes/316363/2156303/the-technology-blog/2025_08_07_20_16_30_61648d80-0763-4cf1-b081-216ba63e06a9.mp3" length="37746542" type="audio/mpeg"/>
      <guid isPermaLink="false">5fb6abe0-70a5-4564-b0fe-75dccb208424</guid>
      <itunes:duration>2359</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 07 Aug 2025 22:20:11 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 249: Anubis]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 249: Anubis]]></itunes:title>
      <description><![CDATA[<p>Hello gang, this is going to be the show notes for TSB, podcast 249. We cover lots of trivia and their answers, something called Anubis, and something that I think developers need to know.  Here are the full notes.</p><p></p><p></p><p></p><p></p><p>Hello folks, welcome to TSB, podcast 249.  We've got a trivia question this week, maybe not so much news as everyone has been busy, but our topic this time is going to be on Anubis.  This is a bit confusing, so maybe we can figure this out together.  </p><p>We hope that you'll enjoy the program as much as we have bringing it together for you.</p><p></p><p></p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">What"&gt;https://technology.jaredrimer.net/2025/06/14/what-is-anubis/"&gt;What</a> is Anubis?  is our blog.  It leads to the article <a href="<a target=" rel="noopener noreferrer nofollow">Anubis"&gt;https://www.bleepingcomputer.com/news/security/anubis-ransomware-adds-wiper-to-destroy-files-beyond-recovery/"&gt;Anubis</a> ransomware adds wiper to destroy files beyond recovery   coming from Bleeping Computer.  I guess we'll see how this goes in trying to explain it.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2156056</link>
      <enclosure url="https://content.rss.com/episodes/316363/2156056/the-technology-blog/2025_08_07_17_07_50_c52cc744-e818-448d-90df-e8205d0909f8.mp3" length="192983694" type="audio/mpeg"/>
      <guid isPermaLink="false">06c6c4f6-8388-4ab0-91b8-df1e9ecc6f7b</guid>
      <itunes:duration>12049</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 07 Aug 2025 19:30:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans 19: a familiar topic and job scams]]></title>
      <itunes:title><![CDATA[Sans 19: a familiar topic and job scams]]></itunes:title>
      <description><![CDATA[<p>Sans 19 covers August's Ouch! Newsletter.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://www.sans.org/newsletters/ouch/spotting-online-job-scams?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1509356_ouch_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757"&gt;This</a> is the article  that will be discussed in this 17 minute piece.  Contact info is also given, and we'll be back with another podcast real soon.  Stay safe out there!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2151232</link>
      <enclosure url="https://content.rss.com/episodes/316363/2151232/the-technology-blog/2025_08_04_18_48_21_5528933d-ad6b-4328-b27f-2bb7f2acd886.mp3" length="16726160" type="audio/mpeg"/>
      <guid isPermaLink="false">f3397955-a8a1-411c-8c4d-5762fb6e5f61</guid>
      <itunes:duration>1045</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 04 Aug 2025 22:00:16 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites, episode 18: The newsletter that was published July 25, 2025]]></title>
      <itunes:title><![CDATA[Sans News Bites, episode 18: The newsletter that was published July 25, 2025]]></itunes:title>
      <description><![CDATA[<p><a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=d5a452bed9227bc10deec759d6d5eaa86319c4f6f9440a9c90ac7b315a8c2fb1025642285cbf040737242f66a1717b21f5cfac64627b67002e3113414820e2885dd2f8669a3e1c0ae26838bb19d29ebc1240ae6cecc299bf"&gt;This</a> is the link for Sans News Bites for the 25th. </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2148492</link>
      <enclosure url="https://content.rss.com/episodes/316363/2148492/the-technology-blog/2025_08_02_21_30_27_fcd95580-3f4a-40c6-990d-58a457893b1a.mp3" length="72509988" type="audio/mpeg"/>
      <guid isPermaLink="false">a884de90-a239-446f-8f88-3d09b03bc739</guid>
      <itunes:duration>4531</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 02 Aug 2025 23:00:22 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 248: I get interviewed]]></title>
      <itunes:title><![CDATA[The Security box, podcast 248: I get interviewed]]></itunes:title>
      <description><![CDATA[<p>i get interviewed today. News, notes, the landscape and much more.  We've also got trivia.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2144962</link>
      <enclosure url="https://content.rss.com/episodes/316363/2144962/the-technology-blog/2025_07_31_01_54_44_3ff44255-7df7-4d05-ae54-b07b08305fde.mp3" length="250833681" type="audio/mpeg"/>
      <guid isPermaLink="false">d6e4b8af-2899-4655-a3dd-723d2989b713</guid>
      <itunes:duration>15661</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 31 Jul 2025 17:53:49 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 247: Digital and Physical Security]]></title>
      <itunes:title><![CDATA[The Security box, podcast 247: Digital and Physical Security]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 247.  On this program, we've got lots of stuff for you today including Agentic AI enabled cybercrime, a very short diatribe from our very own Mr. J., trivia and more.  The topic will be coming from Phishlabs and their article talking about digital and physical security.  </p><p>We hope you enjoy the program as much as we have bringing it together for you, and make it a great day!</p><p></p><p></p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">Millennials"&gt;https://www.komando.com/news/security/millennials-are-the-newest-scam-target/"&gt;Millennials</a> are the newest scam target   was in the newsletter.  I went to record a file from the newsletter, but I had to resort to the web to get this one.  Glad I finally got this recorded, we're continuing to see these scams ourselves.</p><p></p><p></p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">When"&gt;https://www.phishlabs.com/blog/the-need-for-executive-protection"&gt;When</a> Digital and Physical Threats Intertwined: The Need for Executive Protection  is our topic for today.  Can this be a real problem?  </p><p></p> <p></p><p></p><p></p><p>What was the amount of money that was stolen from a  schoolteacher in North Texas?  It was their life savings. Was it:</p><p>A: 15,000</p><p>B: 30,000</p><p>C: 32,000</p><p>D: 45,000</p><p>e: higher than 45,000</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2133886</link>
      <enclosure url="https://content.rss.com/episodes/316363/2133886/the-technology-blog/2025_07_23_21_39_46_302d914d-6abf-4b4f-b5dc-ad8cf1c24db0.mp3" length="150425641" type="audio/mpeg"/>
      <guid isPermaLink="false">757e4590-2884-4c91-9ea9-1bbec7de404e</guid>
      <itunes:duration>9392</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Jul 2025 01:00:31 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 246: MFA can now be bypassed]]></title>
      <itunes:title><![CDATA[The Security box, podcast 246: MFA can now be bypassed]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program number 246.  We hope that  you will enjoy the program as much as we are putting it together. On this program, Trend Micro and their podcast series on YouTube will talk about zero days and patches. Michael in Arkansas, formerly Indiana, will come along with commentary about the McDonalds debacle with the third party provider and one of the stupidest passwords we've found, Jared will be along with a portion of the diatribe about the same McDonalds story and our topic will talk about multi-factor and the criminals trying to break it.  </p><p>Oh yes, we've also got our trivia, the news, the notes and the landscape.  </p><p>We hope you enjoy the program as much as we are bringing it together for you.  Enjoy!</p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p>This was actually posted to the list and maybe the title of this isn't quite appropriate.  The Ars Technica article is titled <a href="<a target=" rel="noopener noreferrer nofollow">Why"&gt;https://arstechnica.com/security/2025/05/phishing-attacks-that-defeat-mfa-ar=e-easier-than-ever-so-what-are-we-to-do/"&gt;Why</a> MFA is getting easier to bypass and what to do about it   which is a short article.  Talks about a protocol I'm not too familiar with.  We'll see how this goes.</p><p></p><p>News, notes, the landscape and lots more!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2118169</link>
      <enclosure url="https://content.rss.com/episodes/316363/2118169/the-technology-blog/2025_07_17_02_34_30_c505f40d-a99a-457e-972d-9003b8afea4b.mp3" length="244122501" type="audio/mpeg"/>
      <guid isPermaLink="false">a4f72539-0c8d-4a90-aefa-3f9e62d0663a</guid>
      <itunes:duration>15242</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 17 Jul 2025 18:00:24 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News Bites, episode 17]]></title>
      <itunes:title><![CDATA[Sans News Bites, episode 17]]></itunes:title>
      <description><![CDATA[<p>After a couple of months, I'm happy to resume Sans.  We cover the newsletter that was issued on July 11th. Lots of stuff here, hope you enjoy!</p><p></p><p></p><p></p><p></p><p>This is Sans number 17.  Its been quite awhile since we did sans, but we'll pick it up with July 11th and <a href="<a target=" rel="noopener noreferrer nofollow">this"&gt;https://view.email.sans.org/?qs=bf4c72d8e4d79fcfbd7bb8645afb5d302bc0f3fbe5225ebbbd25a27ed2a8e4dfa39085d69133f279fd41cfd0b9c7f0ca3790b9972ee217d5c6ba1cf173953d33f873167f49fca3168e6f4182886d98841dd9f0326997d2fe"&gt;this</a> is the link to read the newsletter.  Enjoy!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2115948</link>
      <enclosure url="https://content.rss.com/episodes/316363/2115948/the-technology-blog/2025_07_15_17_13_29_68830af6-cf0f-4532-a118-fdd9fd9c9f43.mp3" length="59347135" type="audio/mpeg"/>
      <guid isPermaLink="false">61421a8d-d320-4d2f-8cf7-d73cfc9d6723</guid>
      <itunes:duration>3709</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 15 Jul 2025 22:00:20 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 245: Spain and their DDoS issues as well as news, notes and the landscape]]></title>
      <itunes:title><![CDATA[The Security box, podcast 245: Spain and their DDoS issues as well as news, notes and the landscape]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 245.  We ope that you have enjoyed your 4th of July holiday and we're glad to be back on the airwaves.</p><p>On this program, we're going to cover the news, the notes and the landscape since we have been away as well as any thoughts from anyone who may be joining us during the live taping.</p><p>We also have trivia as well, and we'll be sure to get the trivia to the list for those who want to participate through that method.  </p><p>Files we'll be adding will include: a discussion on CSAM, otherwise known as child sexual abuse material, a joke I found on Mastodon that is not tech related, we'll read something that was found from DevaOnBreaches that is true today more than ever, and of course our topic being Spain and their DDOS being increased over 100 percent!</p><p>The blog will have links to topics as usual.</p><p></p><p></p><p></p><p></p><p></p><p></p><p>As I'm going through Mastodon, I find the following boosted toot.</p><p>Alex Chapman: Boosting mattcurtis (mattcurtis): trump mobile is the worst type of phone plan you can ask for, first you pay $61.00 for the sim, and then, you use your data up? your phone data gets shut off completely, want proof?</p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.youtube.com/watch?v=KUtSo7dASg0">https://www.youtube.com/watch?v=KUtSo7dASg0</a></p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://www.youtube.com/watch?v=KUtSo7dASg0"&gt;Here</a> is the link to the 30 minute video  if you want to watch. This came in after we got the intro together, just take a look if you're interested in this service.</p><p></p><p></p><p></p><p></p><p>The blog post this time is <a href="<a target=" rel="noopener noreferrer nofollow">DDOS"&gt;https://technology.jaredrimer.net/2025/05/07/ddos-attackers-targeting-spain/"&gt;DDOS</a> attackers targeting spain  and this is quite interesting.  This is research from Group IB, who we've talked about on this podcast before.  As I indicated in the intro created for this podcast, its well over 100 percent.  In fact, its up quite a lot.  The full article is titled <a href="<a target=" rel="noopener noreferrer nofollow">DDoS"&gt;https://cybernews.com/security/moscow-aligned-hackers-drive-ddos-attacks-surge-in-europe/"&gt;DDoS</a> attacks surge by 88% in March, Spain emerges as top target   if you'd like to read it.  It'll be helping us with this discussion.  </p><p>We hope you enjoy!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2108240</link>
      <enclosure url="https://content.rss.com/episodes/316363/2108240/the-technology-blog/2025_07_09_22_46_19_3c725071-a032-4cdb-bf69-713ffb44323c.mp3" length="233275387" type="audio/mpeg"/>
      <guid isPermaLink="false">78224f56-645c-4922-a4b1-0a7e8440c774</guid>
      <itunes:duration>14565</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Jul 2025 03:50:11 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 244 for June 24, 2025]]></title>
      <itunes:title><![CDATA[TSB 244 for June 24, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 244.  On this podcast, its open forum.  Lots of newsy items including some videos from the landscape.  We even have Trivia.  </p><p></p><p>I'm also working on tech issues, and hopefully I'll find something better.  We push on.  </p><p></p><p>This is another extended 4 and a half hour program.</p><p></p><p>There is no program for the July fourth holiday  week. We're taking the week off.</p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate </a> to the network,  <a href="h	ttps://<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2091109</link>
      <enclosure url="https://content.rss.com/episodes/316363/2091109/the-technology-blog/2025_06_27_00_29_43_ef0eb7ec-a259-404a-ae16-2fc77e02f147.mp3" length="269263960" type="audio/mpeg"/>
      <guid isPermaLink="false">136d2c07-ea0d-46bb-90aa-375fcd3fa021</guid>
      <itunes:duration>16812</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 27 Jun 2025 16:28:24 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 242: Cookie Bite]]></title>
      <itunes:title><![CDATA[The security box, podcast 242: Cookie Bite]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to podcast 242 of the security box podcast.  Do you want some cookies?  Yes, I ate a whole box, but they were sma;ll cookies and I intended not to do that.  </p><p>These cookies however are not to be eaten, and you'll find out all about it.  </p><p>We'll have news, notes and the landscape as well as trivia.  </p><p>We hope you enjoy the program as much as I have putting it together for you.</p><p></p><p></p><p>According to the Kim Komando Newsletter in the Web Watercooler section, what is the percentage of Gen Zers who are OK of sharing their data for free?</p><p></p><ul><p></p><p></p><li> A: 25% </li><p></p><p></p><li> B: 50% </li><p></p><p></p><li> C: 80% </li><p></p><p></p><li> D: 88% </li><p></p><p></p><li> E: 95% </li><p></p><p></p><li> F: 100% </li><p></p><p></p><li> G: less than 25% </li><p></p><p></p></ul><p></p><p>Call (888) 405-7524 or 818-527-4754 or find me on social media.  You can also text/WhatsApp 804-442-6975 and leave your guess there too.  Good luck!</p><p></p><p>You think of cookies as things that you eat.  But there are cookies on your computer which tell sites that you're logged in to an account you control and they contain your preferences.  But what would happen if someone was able to steal them and get in to those sites bypassing even the 2-factor authentication we have been telling you to use?  Yes, if my memory serves me, that is what Cookie Bite does.  </p><p></p><p>Blog post: <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/04/23/dont-bite-now-cookie-bite-proof-of-concept-extension-steals-session-cookies/">https://technology.jaredrimer.net/2025/04/23/dont-bite-now-cookie-bite-proof-of-concept-extension-steals-session-cookies/</a></p><p></p><p>Read the rest of the show notes on the blog at <a target="_blank" rel="noopener noreferrer nofollow" href="http://www.jaredtech.help">http://www.jaredtech.help</a> including the answer to last week's question and other things of importance.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2070500</link>
      <enclosure url="https://content.rss.com/episodes/316363/2070500/the-technology-blog/2025_06_12_15_59_29_d27663b1-238f-4c5c-86b1-2abbc00accea.mp3" length="208851740" type="audio/mpeg"/>
      <guid isPermaLink="false">a457d54f-87bc-42f8-ba5c-7bbded7e792d</guid>
      <itunes:duration>13040</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 Jun 2025 23:00:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program 241: these things are continuing to be sent via email, text, and social media]]></title>
      <itunes:title><![CDATA[The Security box, program 241: these things are continuing to be sent via email, text, and social media]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box, program 241.  We've got plenty of news, notes and much more.  We've also got Trivia as well.  </p><p></p><p>Trivia from last week:</p><p></p><p>Here's the trivia from this past week.</p><p>How fast did Nvidia-grade AI hardware cracked your 8-character password?  Is the answer:</p><p>A: 5 minutes</p><p>B: 10 minutes</p><p>C: 15 minutes</p><p>D: 20 minutes</p><p>E: 25 minutes</p><p>F: 30 minutes</p><p>G: over 30 minutes</p><p></p><p>The answer:</p><p></p><p>30 minutes ... How fast Nvidia-grade AI hardware can crack your 8-character password. Hive Systems ran the numbers, and yeah, it’s bleak for your  bare-minimum login. It can also crack a numbers-only string in about three hours. Pro tip: Save yourself some peace of mind by using the same password manager I do.</p><p></p><p>This week's question:</p><p></p><p>What is the percentage of email that comes out of the US that is considered spam? Also, out of that, what is the percentage that is malware or phishing?</p><p>A: 25% Spam 10% phishing and malware</p><p>B: 50% spam 75% phishing and malware</p><p>C: 57% spam 67% phishing and malware</p><p>D: 80% spam 100% phishing and malware</p><p>E: Higher than 80% on both</p><p>F: lower than 25% on both</p><p>(888) 405-7524 or find contact info in the podcast to submit your guess.</p><p></p><p>Our topic:</p><p></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/newsletters/ouch/cybercriminals-exploit-your-emotions/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1474676_spot_red_flags_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757">https://www.sans.org/newsletters/ouch/cybercriminals-exploit-your-emotions/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1474676_spot_red_flags_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757</a> is the article for this episode taken from Sans 12.  How your emotions are triggered by things we continue to see on a regular basis. </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2060754</link>
      <enclosure url="https://content.rss.com/episodes/316363/2060754/the-technology-blog/2025_06_05_19_40_27_5b82cf6d-fa4b-4900-91ca-f2f87d151cfb.mp3" length="189551476" type="audio/mpeg"/>
      <guid isPermaLink="false">583a61fa-a398-422f-bee8-e2a504f228c6</guid>
      <itunes:duration>11835</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 06 Jun 2025 12:30:20 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 240: Dragon Force]]></title>
      <itunes:title><![CDATA[TSB 240: Dragon Force]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program 240.  On this program, we're going to have the news, the notes and the landscape.  We're also going to have our topic talking about Dragon Force.  We're also going to review the trivia for last week and issue the question  for this week too.  We hope you enjoy the program as much as we have bringing it to you!</p><p></p><p>Trivia:</p><p></p><p>Here is the trivia for podcast 239.</p><p>Crypto hackers get crafty: A hacker group called FreeDrain has built an entire phishing empire targeting desperate crypto users. They do it by poisoning search results with over how many malicious links? Victims are lured by fake wallet support pages, asked for their seed phrases and drained faster than a Solana transaction. The heist? Already in the millions.</p><p>Is the answer:</p><p>A: 100,000</p><p>B: 250,000</p><p>C: 650,000</p><p>D: over 650,000</p><p>E: under 100,000</p><p>The answer</p><p>Crypto hackers get crafty: A hacker group called FreeDrain has built an entire phishing empire targeting desperate crypto users. They do it by poisoning search results with over 200K malicious links. Victims are lured by fake wallet support pages, asked for their seed phrases and drained faster than a Solana transaction. The heist? Already in the millions.</p><p>This week's question:</p><p>How fast did Nvidia-grade AI hardware cracked your 8-character password?  Is the answer:</p><p>A: 5 minutes</p><p>B: 10 minutes</p><p>C: 15 minutes</p><p>D: 20 minutes</p><p>E: 25 minutes</p><p>F: 30 minutes</p><p>G: over 30 minutes</p><p>Call (888) 405-7524 and let me know what you think.</p><p>Also, last week, we asked about Gen Z and the percentage of those who use social media to get their news and the answer there according to Kim Komando is 60%.  Problem much?</p><p></p><p>Our topic: Dragon force</p><p></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/04/27/another-threat-actor-indicates-they-wont-go-after-hospitals-cancer-centers/">https://technology.jaredrimer.net/2025/04/27/another-threat-actor-indicates-they-wont-go-after-hospitals-cancer-centers/</a> is the blog post leading to the topic for today and <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/05/27/dragon-force-is-causing-more-havoc-goes-after-msp/">https://technology.jaredrimer.net/2025/05/27/dragon-force-is-causing-more-havoc-goes-after-msp/</a> is the link.</p><p></p><p>We hope you enjoy today's show and thanks for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2049370</link>
      <enclosure url="https://content.rss.com/episodes/316363/2049370/the-technology-blog/2025_05_29_02_19_45_e01cdaa4-1066-4bbb-9fc6-71ca50112c9f.mp3" length="218931994" type="audio/mpeg"/>
      <guid isPermaLink="false">7703db25-66bd-45b6-b48f-df182f931e32</guid>
      <itunes:duration>13669</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 May 2025 19:50:07 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans 16: News that ended for their newsletter dated May 20, 2025]]></title>
      <itunes:title><![CDATA[Sans 16: News that ended for their newsletter dated May 20, 2025]]></itunes:title>
      <description><![CDATA[<p>Sans 16 will have sans for May 20th.  Sorry for the lateness folks, its been busy but we've got a free period and we'll try to get better here.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=b9ce492d9e364f03cc6d2c15c07ecf76c822c55539a6e5b086024ab2c7ea77da2671f8c503a8ae9cab0e48503bc10a79a4c1c930779487f0c1813f4e9ae58613008cd596529184a7ab8d51454a9a9ae1725b807810f4aee3"&gt;This</a> is the link to read the newsletter in full.  </p><p>On this newsletter, Voicmail, texts and deepfakes, a Cyberdefense law is passed, the UK gets breached again with law applicants getting owned and much more.  </p><p>We hope that you enjoy the program, thanks for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2046159</link>
      <enclosure url="https://content.rss.com/episodes/316363/2046159/the-technology-blog/2025_05_27_02_09_43_73df9b87-340b-43f1-aa38-01452b738b01.mp3" length="53906094" type="audio/mpeg"/>
      <guid isPermaLink="false">545cd901-8e1b-4e76-8240-3260bd9d15b6</guid>
      <itunes:duration>3369</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 27 May 2025 17:30:19 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 239: Interlock]]></title>
      <itunes:title><![CDATA[The Security box, podcast 239: Interlock]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to the security box, podcast 239.  Our topic today is dealing with Interlock.  This is something you don't want.  News, notes, and the landscape as well.  News, notes and the landscape as well.</p><p></p><p>Our topic is going to be on Interlock.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/04/20/interlock-becoming-more-dangerous-threatens-legal-problems-if-you-dont-pay/">https://technology.jaredrimer.net/2025/04/20/interlock-becoming-more-dangerous-threatens-legal-problems-if-you-dont-pay/</a> is the blog post leading to the article, but I don't think we mentioned that it will threaten legal action if you do not pay.  </p><p></p><p>We've got two questions, one as part of news notes and one at the end as we discuss what we're going to do for the Security Hour on Saturday.</p><p></p><p>The full show notes link to some of the newsy items we've got that might be of interest, and those notes will have a lot of other linked items too.  </p><p></p><p>See you all next week!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2039504</link>
      <enclosure url="https://content.rss.com/episodes/316363/2039504/the-technology-blog/2025_05_21_21_20_49_2df3ac1e-559f-45b9-ab91-332d78b30b99.mp3" length="119994915" type="audio/mpeg"/>
      <guid isPermaLink="false">1cf7c75f-b1a8-4612-a031-cc25face120a</guid>
      <itunes:duration>7492</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 May 2025 20:50:09 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans news bites for May 13, 2025 episode 15 issued 5-18]]></title>
      <itunes:title><![CDATA[Sans news bites for May 13, 2025 episode 15 issued 5-18]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans episode 15.  On this episode, we've got patch tuesday stuff from Microsoft and others, compitition between the EU and US when it comes to vulnerability databases, Gartner says we can't patch our way out of threat debt, Chrome gets updated, advanced protection comes to Android 16 and much more.  </p><p></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=e6fcbe2d6740edd4a19d81c2fb3dcb46d18f61723a828ac4ebaa209613a73b851b0e0afba8636113af8926df584ef00cdc38b22dd69d71d3476b4045f474f5c244016c8d96920354e414fa27fe797e94">https://view.email.sans.org/?qs=e6fcbe2d6740edd4a19d81c2fb3dcb46d18f61723a828ac4ebaa209613a73b851b0e0afba8636113af8926df584ef00cdc38b22dd69d71d3476b4045f474f5c244016c8d96920354e414fa27fe797e94</a> is the link where you can view the newsletter as these are some of the lights of what you'll hear.</p><p></p><p>I need to continue to slow down, and try not to go too fast.  There may be some mistakes, more than I usually do, sorry about that.</p><p></p><p>This episode is for the newsletter from Friday, May 16, 2025.  Thanks for listening, reading and learning together!</p><p></p><p>I hope you enjoy the show!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2036600</link>
      <enclosure url="https://content.rss.com/episodes/316363/2036600/the-technology-blog/2025_05_19_23_23_43_6f57c598-7c25-4d9a-948c-823557287292.mp3" length="61453853" type="audio/mpeg"/>
      <guid isPermaLink="false">a104eb2c-d4f7-4e9f-9bd7-af825094e8fe</guid>
      <itunes:duration>3840</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 20 May 2025 01:00:14 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN 12: Sans Ouch! May 2025]]></title>
      <itunes:title><![CDATA[TSN 12: Sans Ouch! May 2025]]></itunes:title>
      <description><![CDATA[<p>If you did not hear Sans 12, you get to on this Saturday Night's throwback Saturday Night program on the independent channel of <a target="_blank" rel="noopener noreferrer nofollow" href="http://986themix.com">986themix.com</a></p><p></p><p>Direct link to the independent channel is at <a target="_blank" rel="noopener noreferrer nofollow" href="http://magnatune.jaredrimer.net">http://magnatune.jaredrimer.net</a> and I hope you join us at 7 PM CT, 5 PT for music and more followed by 8 PM with the topic from May.</p><p></p><p>Didn't read Ouch! for this month?  Find it here by using <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/newsletters/ouch/cybercriminals-exploit-your-emotions/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1474676_spot_red_flags_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757">https://www.sans.org/newsletters/ouch/cybercriminals-exploit-your-emotions/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1474676_spot_red_flags_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757</a> as your link.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2032980</link>
      <enclosure url="https://content.rss.com/episodes/316363/2032980/the-technology-blog/2025_05_16_21_09_54_fd7b459a-66bc-427d-8263-bc3419f0da28.mp3" length="2367919" type="audio/mpeg"/>
      <guid isPermaLink="false">94ec53ff-f905-49ac-87b1-b2888d9e8e66</guid>
      <itunes:duration>147</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 16 May 2025 23:30:15 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans news bites, episode 14 for May 13, 2025]]></title>
      <itunes:title><![CDATA[Sans news bites, episode 14 for May 13, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans 14.  We're skipping a week of Sans due to me being unavailable to tape.  </p><p>This time, a big company in the education system is hacked, Apple secures IOS and other projects, Google Settles Texas privacy suit, Florida's E2EE crashes and burns and Asus gets fixed although the entry has the text from the prior item.</p><p></p><p>The newsletter can be found by using <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=f7031841e4a7fae735eb0784e9b805486cab63b0c33dcb06122c11704cd3a9b277e3e1c28433d3c50acc96485ed2a5c1c2b70935e5532d8b373d775d7fc8b1896e1c5bd430a4eeb1f821b01221a3899c">https://view.email.sans.org/?qs=f7031841e4a7fae735eb0784e9b805486cab63b0c33dcb06122c11704cd3a9b277e3e1c28433d3c50acc96485ed2a5c1c2b70935e5532d8b373d775d7fc8b1896e1c5bd430a4eeb1f821b01221a3899c</a> if you wish to read it.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2032970</link>
      <enclosure url="https://content.rss.com/episodes/316363/2032970/the-technology-blog/2025_05_16_20_54_15_1b3d5900-f2c7-4c9d-a373-53b8e5d91af6.mp3" length="59817279" type="audio/mpeg"/>
      <guid isPermaLink="false">b82e68af-7d80-49e7-a3cb-f1849bfc02ee</guid>
      <itunes:duration>3738</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 16 May 2025 23:00:13 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 238: news, notes and the landscape; accessible security software]]></title>
      <itunes:title><![CDATA[TSB 238: news, notes and the landscape; accessible security software]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, program 238.  On this program, we're going to have news, notes and the landscape as well as trivia and a discussion of accessible software and the lack there of when it comes to software we can use in the security landscape.  Please feel free to contact the podcast by email, imessage, text and the comment line at (804) 442-6975.  Thanks so much for listening!</p><p>Here's our trivia question for today.  How many seconds does it take to crack a 6-character password?  Is it </p><p>A. 15 seconds</p><p>B: 30 seconds</p><p>C: 45 seconds</p><p>D: less than a second</p><p>E: 1 minute</p><p>Call (888) 405-7524 if you have any guesses.  Leave a name or the name you want to go by and your guess.  Answers revealed next week.  </p><p>Last week's question was: </p><p>It’s Thursday, friend. Ever notice those tiny bumps on your keyboard’s F and J keys? They serve a legit and genius purpose. </p><p>I’ll give you some hints for why they’re there: A) “Home base” for your fingers, B) Grip for high-speed typing, C) Braille, or D) Random factory defect we’ve all accepted. Go ahead, stare at your keyboard like you just discovered aliens. You can find the answer at the end! </p><p>The answer to the FJ mystery is, drumroll please … A) So your fingers know where to “home”! The little bumps on F and J are like miniature bumpers, guiding touch-typists back to center stage without even looking. So next time you’re speed typing that Yelp review, use the 50-year-old typewriter tech at your fingers’ disposal.</p><p>News:</p><p>A new dating app has been hiding the fact that it didn't keep its promise and revealed your data.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/05/12/were-a-dating-app-and-we-just-fucked-up-by-exposing-your-data-to-anyone-who-wants-it/">https://technology.jaredrimer.net/2025/05/12/were-a-dating-app-and-we-just-fucked-up-by-exposing-your-data-to-anyone-who-wants-it/</a></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2025/05/12/lockbit-bitten-again-but-not-by-a-takedown/">https://technology.jaredrimer.net/2025/05/12/lockbit-bitten-again-but-not-by-a-takedown/</a></p><p>Our topic:</p><p>Is software that is to protect us from worms, trojans and the like accessible?  A 2020 post shows it isn't and this hasn't changed. <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2020/07/06/what-is-the-state-of-antivirus-today-is-it-about-dead/">https://technology.jaredrimer.net/2020/07/06/what-is-the-state-of-antivirus-today-is-it-about-dead/</a> is the article, and let's see what you say.</p><p>One of the companies even went so far as to sell our data to advertisors.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://technology.jaredrimer.net/2024/02/24/avast-caught-collecting-lots-of-info-selling-it-to-other-companies/">https://technology.jaredrimer.net/2024/02/24/avast-caught-collecting-lots-of-info-selling-it-to-other-companies/</a></p><p>If you search AntiVirus, you'll find other posts, but these are the big ones.  </p><p>We hope you enjoy the show!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2029266</link>
      <enclosure url="https://content.rss.com/episodes/316363/2029266/the-technology-blog/2025_05_14_21_44_25_02bfe2c2-d2f4-47d0-914f-8a3d340ad718.mp3" length="147579765" type="audio/mpeg"/>
      <guid isPermaLink="false">27ef9c2a-fc17-4cf6-a105-773f5501d643</guid>
      <itunes:duration>9214</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 May 2025 19:30:09 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN 11: DevaOnBreaches with an item, news notes and the landscape]]></title>
      <itunes:title><![CDATA[TSN 11: DevaOnBreaches with an item, news notes and the landscape]]></itunes:title>
      <description><![CDATA[<p>Hello gang, I recorded this on Friday for tomorrow's throwback Saturday Night show.  </p><p></p><p>On the security hour, we're going to cover something we also covered as part of TSB 237 which also got released today because we've been busy.</p><p></p><p>We'll have news notes from the landscape if any and it'll mainly be an open forum.</p><p></p><p>Show is on Saturday, 7 pm CT, 8 ET on the independent channel at <a target="_blank" rel="noopener noreferrer nofollow" href="http://magnatune.jaredrimer.net">http://magnatune.jaredrimer.net</a>  so why not join?</p><p></p><p>See you next time!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2021893</link>
      <enclosure url="https://content.rss.com/episodes/316363/2021893/the-technology-blog/2025_05_09_18_13_38_33fe2008-3912-4c89-ae73-527378d35388.mp3" length="2377180" type="audio/mpeg"/>
      <guid isPermaLink="false">1b786159-859c-473d-8ef1-42832333c10a</guid>
      <itunes:duration>148</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 10 May 2025 00:00:21 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB podcast 237 for May 7, 2025: CISA and Mitre contract]]></title>
      <itunes:title><![CDATA[TSB podcast 237 for May 7, 2025: CISA and Mitre contract]]></itunes:title>
      <description><![CDATA[<p>Hello gang, sorry for the late release its been busy.  </p><p></p><p>We've got news, notes and trivia today.  </p><p></p><p>Here's the Trivia for this week.  It’s Thursday, friend. Ever notice those tiny bumps on your keyboard’s F and J keys? They serve a legit and genius purpose. </p><p>I’ll give you some hints for why they’re there: A) “Home base” for your fingers, B) Grip for high-speed typing, C) Braille, or D) Random factory defect we’ve all accepted. Go ahead, stare at your keyboard like you just discovered aliens. You can find the answer at the end! </p><p></p><p>Call (888) 405-7524 if you want to guess.  One guess per caller. Let me know if you want your guess aired.  Leave a name or a name you want to go by so we can log the answer.</p><p></p><p>The topic is coming from the article titled CISA reverses course, extends MITRE CVE contract  and whose link is <a target="_blank" rel="noopener noreferrer nofollow" href="https://cyberscoop.com/cisa-reverses-course-extends-mitre-cve-contract/">https://cyberscoop.com/cisa-reverses-course-extends-mitre-cve-contract/</a> if you want to read it.</p><p></p><p>We hope you enjoy the show, thanks so much for listening!  And oh yes, the answer to podcast 235 is also revealed too.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2021737</link>
      <enclosure url="https://content.rss.com/episodes/316363/2021737/the-technology-blog/2025_05_09_16_41_05_ee2a2528-0e10-4642-8a31-1b440c077704.mp3" length="172762506" type="audio/mpeg"/>
      <guid isPermaLink="false">24ea5d32-26fe-4791-8c9b-bfe91e334237</guid>
      <itunes:duration>10786</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 09 May 2025 20:00:21 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 13: More vulns and some good out of the bad]]></title>
      <itunes:title><![CDATA[Sans episode 13: More vulns and some good out of the bad]]></itunes:title>
      <description><![CDATA[<p>Sans 13 will be releasing after 12, and we're now all caught up.</p><p></p><p>Welcome to Sans, episode 13.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=6dc4120f1b77a95c7cf4ce4cd833f7454db9893d83c0674e789006dd8cd6812ed7fca17eaacce81bdd8dd2995972b696348c261f745add4e84cbc846682d8a7ee877e6dced0706bf45e756ebdaaf3091"&gt;This</a> is the link you'll use to go to the newsletter. </p><p>If you use windows, look for the story dealing with remote desktop and their use and acceptance of old passwords that may have been changed.  Apple has an RCE dealing with airplay, more breaches and two more British companies hit with a cyberattack.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2014676</link>
      <enclosure url="https://content.rss.com/episodes/316363/2014676/the-technology-blog/2025_05_05_03_58_58_6876887d-a5e7-40a2-8708-ac47644d41a4.mp3" length="55748440" type="audio/mpeg"/>
      <guid isPermaLink="false">da7d41a5-9092-431e-80f9-dc7c0746f221</guid>
      <itunes:duration>3484</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 06 May 2025 00:00:46 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 12: Ouch! May 2025: Common scams we've seen before]]></title>
      <itunes:title><![CDATA[Sans episode 12: Ouch! May 2025: Common scams we've seen before]]></itunes:title>
      <description><![CDATA[<p>Sans episode 12 is going to cover ouch! and its newsletter.  They also just did a podcast too.</p><p><a href="<a target=" rel="noopener noreferrer nofollow">How"&gt;https://www.sans.org/newsletters/ouch/cybercriminals-exploit-your-emotions/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1474676_spot_red_flags_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757"&gt;How</a> Cybercriminals Exploit Your Emotions  is your article.  We'll have Sans News Bites coming in the coming days for this past Friday.  I think this would be best as sans is lengthy and this may not be too lengthy.  Ouch! was debuted  in Sans episode 3 before Sans turned in to braille which is working out better for us.  I just need to slow down.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2013157</link>
      <enclosure url="https://content.rss.com/episodes/316363/2013157/the-technology-blog/2025_05_03_20_53_55_c2320911-21b3-4a3f-86f3-a85d0cf6e832.mp3" length="29641402" type="audio/mpeg"/>
      <guid isPermaLink="false">81b99a2a-3b1f-4c7a-89f7-00fe301b0da0</guid>
      <itunes:duration>1852</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 05 May 2025 20:00:25 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 10: DOGE and what they're up to]]></title>
      <itunes:title><![CDATA[TSN episode 10: DOGE and what they're up to]]></itunes:title>
      <description><![CDATA[<p>Lock and Code has a very interesting episode on the DOGE, the department of government efficency.  Are they efficient?  Is what they're doing legal?  Its discussed within this episode you'll hear on the independent channel Saturday at 7 CT for music and 8 CT in the evening for the topic.  </p><p></p><p>News, notes and the landscape as well.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2012102</link>
      <enclosure url="https://content.rss.com/episodes/316363/2012102/the-technology-blog/2025_05_02_18_11_26_7b9f60f0-9f99-4d55-8907-e0aa56e07761.mp3" length="2543939" type="audio/mpeg"/>
      <guid isPermaLink="false">1b3144aa-2507-4596-a660-ca3579ba2441</guid>
      <itunes:duration>158</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 03 May 2025 00:00:31 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 11: more 2024 news out there we're now finding out about]]></title>
      <itunes:title><![CDATA[Sans episode 11: more 2024 news out there we're now finding out about]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans episode 11.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=e1a57787ccf48b69bad6f779276d2ce579777c139d486b992e76ab9f610665531d0543b63785c87f1c9d30b9bf212050c56944926bfe4f400976966986680bbcfeddf9c5f4ef689cf1ced4263e2dc8db8434c12165628f8e"&gt;This</a> is the link to the newsletter for Apr 29  if you want to read it.</p><p>One of the items in the top of the news covers malicious USB chargers.  Make sure you're using your own charger.  </p><p>I heard about the power outage, but from what I have heard, it may not be cyber related at all.  </p><p>We have more news on the city in Texas we recently talked about as well.  </p><p>Make sure you leave your thoughts and we can have them aired.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2010016</link>
      <enclosure url="https://content.rss.com/episodes/316363/2010016/the-technology-blog/2025_05_01_02_53_54_b522aa99-810f-41e0-b4e9-f93353b7003b.mp3" length="45609475" type="audio/mpeg"/>
      <guid isPermaLink="false">bec4e970-63bd-4c7d-8ec5-a7b01a52ee92</guid>
      <itunes:duration>2850</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 May 2025 23:00:22 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 10: here we go again with more health care breaches]]></title>
      <itunes:title><![CDATA[Sans episode 10: here we go again with more health care breaches]]></itunes:title>
      <description><![CDATA[<p>Are we surprised about some of the stories in here?  Several breaches and several may not be from any actor at all.  </p><p></p><p>Here are the notes.</p><p></p><p>I know we're behind with another Sans to be released soon, but we're doing the best we can.  </p><p>Lots of news including one that I did see an article about on Bleeping but I decided not to cocer it as I don't think the users here use the tool or software.</p><p>You can <a href="<a target=" rel="noopener noreferrer nofollow">view"&gt;https://view.email.sans.org/?qs=d156b8f498db80b16c01cfc8a99db54de0cee1864496cd67ad1b0ebb85cd531ff9c12cebd324005d677cfd3bd5d1b06a7020a353ad15ee4c7c252b20f063d04256783637c912849d22c205c8bc2bf0f5"&gt;view</a> the newsletter as a web page  and this newsletter is for April 25, 2025.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2008076</link>
      <enclosure url="https://content.rss.com/episodes/316363/2008076/the-technology-blog/2025_04_30_01_41_15_8a344d41-b31e-4b84-8fb2-aa036b141622.mp3" length="46947124" type="audio/mpeg"/>
      <guid isPermaLink="false">5c557682-058d-4965-a1f4-1989f20c5a30</guid>
      <itunes:duration>2934</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Apr 2025 12:30:14 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans news bites episode 9]]></title>
      <itunes:title><![CDATA[Sans news bites episode 9]]></itunes:title>
      <description><![CDATA[<p>Episode 9 was for the newsletter for April 22nd. There was a comment to the accompanying blog post of one of the stories which was shared by TSB staff during a news notes segment.  </p><p></p><p>Here are the notes for episode 9.  </p><p></p><p>Welcome to episode 9 of Sans.  This is for the Newsletter that is released on April 22.  Several of these items are on the blog, and <a href="<a target=" rel="noopener noreferrer nofollow">this"&gt;https://view.email.sans.org/?qs=e408d7e646202b4bf5159051ce27ed075e7e9bca62bb7605eea29fd3ce6542bef88e931db0bdebb0a927ccac6d682e8f2429704936d6b88a8f000f5b2bdadb6fdd02c2de82874e6eb46a26f15b698d16"&gt;this</a> is the link to the newsletter  you'll need.  We hope you enjoy what's news, and we'll see you again on another edition of the program very soon.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/2006109</link>
      <enclosure url="https://content.rss.com/episodes/316363/2006109/the-technology-blog/2025_04_29_00_27_28_4446c3fe-677d-479e-8062-95e14746d68b.mp3" length="58422531" type="audio/mpeg"/>
      <guid isPermaLink="false">6dc39fbf-4ad2-470c-a517-0a1a3ae23c2a</guid>
      <itunes:duration>3651</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 29 Apr 2025 00:30:32 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 9: Apple and the UK]]></title>
      <itunes:title><![CDATA[TSN episode 9: Apple and the UK]]></itunes:title>
      <description><![CDATA[<p>Apple is in hot water with the UK laws indicating they need to have a backdoor in their software so they can see what's going on.  Good or bad?  This episode talks about some news we may have covered, but if we find other stuff, we're blogging it too if found.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1990722</link>
      <enclosure url="https://content.rss.com/episodes/316363/1990722/the-technology-blog/2025_04_17_03_15_57_9e2355ac-4b52-405b-ac2c-6775d0e33de0.mp3" length="5254328" type="audio/mpeg"/>
      <guid isPermaLink="false">7ff0e34d-41cd-4ed0-b0bb-f5f4eb827716</guid>
      <itunes:duration>328</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 25 Apr 2025 22:00:31 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB episode 235: open forum]]></title>
      <itunes:title><![CDATA[TSB episode 235: open forum]]></itunes:title>
      <description><![CDATA[<p>There is going to be some srong language and a topic we try not to make too sexual in this program as sex and tech could mix.  </p><p></p><p>Something airing twice, once as a discussion and once as a things to ponder.  </p><p></p><p>Trivia, news notes and the landscape.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1999416</link>
      <enclosure url="https://content.rss.com/episodes/316363/1999416/the-technology-blog/2025_04_23_21_34_52_0370f95f-137d-4039-95a9-602aee23ba8c.mp3" length="164174411" type="audio/mpeg"/>
      <guid isPermaLink="false">3151f4d4-2a56-4161-9739-2eb955539f68</guid>
      <itunes:duration>10250</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 25 Apr 2025 07:30:11 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans NewsBites for April 18, 2025]]></title>
      <itunes:title><![CDATA[Sans NewsBites for April 18, 2025]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans, episode 8.  The CVE program has gotten funding for another year, CISA needs to issue guidance after Oracle's latest disaster and the UK commissioners office is fining a law firm  for a breach.  Those are the top three stories of this episode.  There are 6 others in the rest of the news.  Oracle also gets a mention, and so does a company called the Landmark Insurrance company.  Check <a target="_blank" rel="noopener noreferrer nofollow" href="http://jaredtech.help">jaredtech.help</a> for some of what we have fund before the newsletter was issued.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://view.email.sans.org/?qs=480e4cfa3d0abec605627cc2ed396a5fc495dba430393f6a5b47a734fe3a9435b48f4aef28c72d83e9f2ba6ad75bd3d301b9a6ee3c16a9245348a301a8134c2c6d40c35b5ebac16f42fc7e23d3e7e1e5"&gt;Here</a> is the link to the April 18th newsletter  if you want to follow along.  </p><p>See you next time!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1993769</link>
      <enclosure url="https://content.rss.com/episodes/316363/1993769/the-technology-blog/2025_04_19_19_08_47_9cf9d228-732a-4840-a10b-529d818e1e75.mp3" length="55738395" type="audio/mpeg"/>
      <guid isPermaLink="false">26859aa9-5d8c-45ce-addd-347658f1c95a</guid>
      <itunes:duration>3483</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 20 Apr 2025 21:10:07 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 8: TikTok is not banned yet?]]></title>
      <itunes:title><![CDATA[TSN episode 8: TikTok is not banned yet?]]></itunes:title>
      <description><![CDATA[<p>Why is TikTok not banned yet?  What is collected there anyway and what is the problem with it?  </p><p></p><p>From episode 384 which was released on Monday, come learn what seems to be the problem.  We played the podcast Friday the 11th, as we put it together, but for this audience, we'll go in to a discussion about it.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1984159</link>
      <enclosure url="https://content.rss.com/episodes/316363/1984159/the-technology-blog/2025_04_12_21_18_01_faad9042-0b0c-4341-a4ff-10fa6b97cf81.mp3" length="6524125" type="audio/mpeg"/>
      <guid isPermaLink="false">472e9b0d-2a65-486b-87e5-6f6c3d1ca334</guid>
      <itunes:duration>407</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 18 Apr 2025 23:00:17 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 7: Microsoft, Hertz and More]]></title>
      <itunes:title><![CDATA[Sans episode 7: Microsoft, Hertz and More]]></itunes:title>
      <description><![CDATA[<p>Welcome to episode 7 of Sans.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=9afad2caee0214f8be073cdcbaffd7d6cc9e6a4e911d1d73f0f3102f20acf07f1b89d7dd614732fe183bca679e49146662e6905c077fe1cc706ce0d9d3ca5b583d3463e36f15d4ff151d4ed73b745473c3c405f656d822bb"&gt;This</a> is the link for the newsletter for April 15, 2025.    </p><p>One of the things I found of interest is the rate of Certs to expire to be 47 days in 5 years.  Very interesting.  Found something you found of interest?  Get in touch.</p><p>Thanks for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1990690</link>
      <enclosure url="https://content.rss.com/episodes/316363/1990690/the-technology-blog/2025_04_17_02_55_16_daab34c4-cade-4023-92d6-a32c53fb1a35.mp3" length="50562511" type="audio/mpeg"/>
      <guid isPermaLink="false">56f2b0a9-193c-4487-94a5-d5742991d006</guid>
      <itunes:duration>3160</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 17 Apr 2025 19:00:14 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 6: Fortinet needs help, WhatsApp needs updating ... more]]></title>
      <itunes:title><![CDATA[Sans episode 6: Fortinet needs help, WhatsApp needs updating ... more]]></itunes:title>
      <description><![CDATA[<p>Welcome to Sans, episode 6.  <a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=20237604152745c3a8505cf5303ac7f4fe43d81bd4d4ccb4a5a65c3bd2e8c03821ac78c95fec019dabab841f3124326e562dcac84014fc59d33b69d3597a09e45b9947a13b95aec9852f656693e44e2e"&gt;This</a> is the link to the newsletter  if you wish to read it.  </p><p>WhatsApp needs updating, Fortinet needs more help, Oracle denies having a breach, and more.  Have fun!</p><p>We're going to try something different, read the newsletter that is of importance and add our own twist where applicable.  After episode 5's mistake, its not worth making that mistake again.  </p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1984135</link>
      <enclosure url="https://content.rss.com/episodes/316363/1984135/the-technology-blog/2025_04_12_20_41_59_81f93b4d-6eb1-4753-b013-929e93a4ca59.mp3" length="49135074" type="audio/mpeg"/>
      <guid isPermaLink="false">75f5f6b1-1e98-422f-9d8c-e54f03b382ac</guid>
      <itunes:duration>3070</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 13 Apr 2025 03:00:13 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 7: are your devices listening?]]></title>
      <itunes:title><![CDATA[TSN episode 7: are your devices listening?]]></itunes:title>
      <description><![CDATA[<p>On a recent Lock and Code podcast, they discuss whether your device i actually listening or not.  While I have some initial thoughts, they may change based on what I hear from this podcast.  </p><p></p><p>To join the conversation join us on the independent channel at <a target="_blank" rel="noopener noreferrer nofollow" href="http://magnatune.jaredrimer.net">http://magnatune.jaredrimer.net</a> or email/imessage throwback@986themix.com.  If you want your comments aired, let them know and it'll be taken care of.  </p><p></p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1980294</link>
      <enclosure url="https://content.rss.com/episodes/316363/1980294/the-technology-blog/2025_04_09_21_28_59_9d6574f8-2476-466f-ab5b-9ee9a0a320fc.mp3" length="6843462" type="audio/mpeg"/>
      <guid isPermaLink="false">526fbbec-2531-4c62-9995-fc9e093e85d9</guid>
      <itunes:duration>427</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 12 Apr 2025 20:42:42 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 6: How to protect yourself from social engineering]]></title>
      <itunes:title><![CDATA[TSN episode 6: How to protect yourself from social engineering]]></itunes:title>
      <description><![CDATA[<p>Gang,</p><p></p><p>This week, we're going to hear about how to protect yourself from social engineering attacks through the Proofpoint discarded podcast.  </p><p></p><p>You can <a href="http://magnatune.jaredrimer.net">Go to the magnatune page </a> to find links to listen on Saturday starting at 7 CT, 5 PT.  </p><p></p><p>See you then!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1977289</link>
      <enclosure url="https://content.rss.com/episodes/316363/1977289/the-technology-blog/2025_04_07_21_52_15_1e15a73d-11d2-4551-ac3f-8334df90437e.mp3" length="10013800" type="audio/mpeg"/>
      <guid isPermaLink="false">c68817dd-712c-436d-bb50-b275edda49b2</guid>
      <itunes:duration>625</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 12 Apr 2025 00:00:30 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 5: UMMC, Apple, the UK and more]]></title>
      <itunes:title><![CDATA[Sans episode 5: UMMC, Apple, the UK and more]]></itunes:title>
      <description><![CDATA[<p>Hello gang, welcome to the Sans update from the newsletter for April 8, 2025.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">This"&gt;https://view.email.sans.org/?qs=a8c8f1dfe2785f921ee2a5fe5035ead56b7fe073f3d5fc1f4f2c8e7971a0374ee04429146ebb9f485a18655db4d31e3aceb33dfe75136c02bc1ef7a5a044d7a7b1ff99f17772db75193ef0c0a3467d9b094f422858c95897"&gt;This</a> is the link  you'll need to access the newsletter.</p><p>If you've spotted something you want to comment on, please call the comment line at (888) 405-7524 and thanks for listening!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1979853</link>
      <enclosure url="https://content.rss.com/episodes/316363/1979853/the-technology-blog/2025_04_09_16_07_23_2de154f4-8073-4f37-b161-09c454ad62d2.mp3" length="13950000" type="audio/mpeg"/>
      <guid isPermaLink="false">2d36877a-93c4-4d2c-a469-c69208847666</guid>
      <itunes:duration>871</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Apr 2025 01:30:17 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[tech 383: Android talk and domains]]></title>
      <itunes:title><![CDATA[tech 383: Android talk and domains]]></itunes:title>
      <description><![CDATA[<p>Welcome to program 383 of the Technology blog and podcast series.  </p><p>On this program, we're going to talk about an article I recently spotted that talks about malware and more abuse of the accessibility of Android for people who are blind or disabled.  </p><p>This is a Bleeping Computer article and you can also find the blog post on our blog.  Search Android accessibility if you wish.  </p><p>The article is titled <a href="<a target=" rel="noopener noreferrer nofollow">New"&gt;https://www.bleepingcomputer.com/news/security/new-crocodilus-malware-steals-android-users-crypto-wallet-keys/"&gt;New</a> Crocodilus malware steals Android users’ crypto wallet keys  if you are an Android user and are interested on what this does.</p><p>Finally, we're going to listen to Discarded and the threat research trenches dealing with Takedowns of domains and my thoughts on the domain industry as a whole.  </p><p>This was aired on Throwback Saturday Night for March 8, 2025.  </p><p>If you have questions, comments and or want to say hey, feel free to do so.  The email is tech at <a target="_blank" rel="noopener noreferrer nofollow" href="http://menvi.org">menvi.org</a> as well as imessage.  Text/WhatsApp 804-442-6975 and feel free to leave a comment at 888-405-7524.  Have fun with this cast!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1965111</link>
      <enclosure url="https://content.rss.com/episodes/316363/1965111/the-technology-blog/2025_03_31_01_59_42_24ce6ffe-d4a7-41a7-a2db-fa8693d5d876.mp3" length="116792911" type="audio/mpeg"/>
      <guid isPermaLink="false">edbcf81f-b2f6-4dd1-b84e-3efe0faafbf9</guid>
      <itunes:duration>7292</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Mon, 07 Apr 2025 21:30:16 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans episode 5: Sans News Apr 4]]></title>
      <itunes:title><![CDATA[Sans episode 5: Sans News Apr 4]]></itunes:title>
      <description><![CDATA[<p>Episode 5 is just the news bites for April 4, 2025.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=2a1b51b9ae0bee328944ac35970ec9af0a176952e7e38295ad505b16775b786d5b41c6db58cd9c033854aac48663b94d77c05b9cf302a031f1d72eddd4a9397957d8096981d0014008fab9ba942f5a28">https://view.email.sans.org/?qs=2a1b51b9ae0bee328944ac35970ec9af0a176952e7e38295ad505b16775b786d5b41c6db58cd9c033854aac48663b94d77c05b9cf302a031f1d72eddd4a9397957d8096981d0014008fab9ba942f5a28</a> is its link.  </p><p></p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1973841</link>
      <enclosure url="https://content.rss.com/episodes/316363/1973841/the-technology-blog/2025_04_05_01_23_34_5e54d1b9-a4fb-43c5-8566-7a3695013023.mp3" length="11170653" type="audio/mpeg"/>
      <guid isPermaLink="false">0ba65b34-e65c-4608-be67-18bd356947d8</guid>
      <itunes:duration>698</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 05 Apr 2025 03:30:17 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Throwback Saturday Night preview episode 5: Dark Net Diaries and the Kill List]]></title>
      <itunes:title><![CDATA[Throwback Saturday Night preview episode 5: Dark Net Diaries and the Kill List]]></itunes:title>
      <description><![CDATA[<p>There is an apparent site out there where you can pay people to kill people.  But is it really true and is it still out there today?  </p><p></p><p>We know there's a paid podcast out there and the stories are quite shocking.</p><p></p><p>Join Throwback Saturday at 5 PT, 7 CT for music and conversation and Security stuff at 8.  </p><p></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://www.darknetdiaries.com">http://www.darknetdiaries.com</a> for dark net diaries.</p><p></p><p><a target="_blank" rel="noopener noreferrer nofollow" href="http://magnatune.jaredrimer.net">http://magnatune.jaredrimer.net</a> to listen to the server.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1973270</link>
      <enclosure url="https://content.rss.com/episodes/316363/1973270/the-technology-blog/2025_04_04_16_58_37_af91b55a-0ef8-445c-9219-2651523bcfdc.mp3" length="4511330" type="audio/mpeg"/>
      <guid isPermaLink="false">eaa72fa6-4bfc-44e4-8198-4ff6bdc853f9</guid>
      <itunes:duration>281</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 05 Apr 2025 00:00:25 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans news bites episode 3: Ouch! and the bites for Apr 1]]></title>
      <itunes:title><![CDATA[Sans news bites episode 3: Ouch! and the bites for Apr 1]]></itunes:title>
      <description><![CDATA[<p>On this episode of Sans, we're going to cover two items.  The first, Sans Ouch! newsletter.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/newsletters/ouch/account-takeovers-emotional-predators/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1464682_ouch_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757">https://www.sans.org/newsletters/ouch/account-takeovers-emotional-predators/?utm_medium=Email&amp;utm_source=HL-GL&amp;utm_content=1464682_ouch_article_button&amp;utm_campaign=OUCH&amp;utm_rdetail=Global&amp;utm_goal=Community_Growth&amp;utm_type=SSA&amp;is=551b434744de4aefe4d6ece8bf1e298e24df99defd5f7ad7037383755fd2d757</a> is the link to the newsletter and they talk about social media takeovers and a few scams that you might see.  </p><p>I do try to keep the spirit of the newsletter but make it my own by making up a story in which you could believe if my account(s) were taken over.  </p><p>Alsoo in the newsletter, they introduce a new podcast.  <a target="_blank" rel="noopener noreferrer nofollow" href="https://www.sans.org/podcasts/ouch/">https://www.sans.org/podcasts/ouch/</a> is the link, and you can search Sans Ouch! (with the exclaim mark) to find it.  Its the first one if you include the exclaim.</p><p>For Sans News Bites, the link to that is <a target="_blank" rel="noopener noreferrer nofollow" href="https://view.email.sans.org/?qs=2d679d7bbfaeb64102bc1d697d3ea79bde17cb508bee7d51ff425742f12bbc42f8e65e8fc776f58583b3340ae69a575df32b84f2ae487258f0180de03fabe871f14948f9d02c256fd23976cfbacab5a8">https://view.email.sans.org/?qs=2d679d7bbfaeb64102bc1d697d3ea79bde17cb508bee7d51ff425742f12bbc42f8e65e8fc776f58583b3340ae69a575df32b84f2ae487258f0180de03fabe871f14948f9d02c256fd23976cfbacab5a8</a> and as always, you can read what is of interest to you.</p><p>Thanks so much for listening, make it a great day!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1972574</link>
      <enclosure url="https://content.rss.com/episodes/316363/1972574/the-technology-blog/2025_04_04_06_31_47_714fa7cb-5974-4127-b512-ca97a62e3d78.mp3" length="36878853" type="audio/mpeg"/>
      <guid isPermaLink="false">6a4fcda6-2813-448b-a9aa-8933fad85525</guid>
      <itunes:duration>2304</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 04 Apr 2025 19:30:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News bites episode 2 for March 28, 2025]]></title>
      <itunes:title><![CDATA[Sans News bites episode 2 for March 28, 2025]]></itunes:title>
      <description><![CDATA[<p>Sans News Bites covers several different items, one of which we've read, another in which we have covered, and another in which might not be surprising.  </p><p>Have you read the newsletter?  What did you think?  </p><p>If you have not read the newsletter, <a href="<a target=" rel="noopener noreferrer nofollow">here"&gt;https://view.email.sans.org/?qs=a93c3ebf1ea9caac5b6981b78d834685e0662448439563b9098ea40f1f5dfb4e58d82edd90a7b75366d9e35fa3e240fc71de7dcba9b9d3907685d787d00f858e26ce086bcb663763a58270e2103023190adf2b30db0e328b"&gt;here</a>  you go.   Have a great day, and see you soon!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1963375</link>
      <enclosure url="https://content.rss.com/episodes/316363/1963375/the-technology-blog/2025_03_29_17_47_30_30530661-3cdd-4b71-a714-c87f590d90b4.mp3" length="13063929" type="audio/mpeg"/>
      <guid isPermaLink="false">a5555b3d-d9a3-4a7d-8e1b-617681bec518</guid>
      <itunes:duration>816</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 29 Mar 2025 19:30:12 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Throwback Saturday Night's security hour, episode 4]]></title>
      <itunes:title><![CDATA[Throwback Saturday Night's security hour, episode 4]]></itunes:title>
      <description><![CDATA[<p>Here, I talk about what's going on this week.  We take the Cyber Wire Daily episode dealing with highjacking.  More specificly, remote hijacking.</p><p></p><p>News, notes and the landscape too.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1958514</link>
      <enclosure url="https://content.rss.com/episodes/316363/1958514/the-technology-blog/2025_03_26_02_06_47_df9cadbb-540f-429b-b90c-9bdf07219698.mp3" length="3585850" type="audio/mpeg"/>
      <guid isPermaLink="false">99377f4a-89a1-4efa-a5c6-818f27e2ce7d</guid>
      <itunes:duration>224</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 28 Mar 2025 23:50:08 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Sans News bites episode 1: a wordpress plug in needs to be updated, chrome and more]]></title>
      <itunes:title><![CDATA[Sans News bites episode 1: a wordpress plug in needs to be updated, chrome and more]]></itunes:title>
      <description><![CDATA[<p>Sans News bites is going to be a news specific thing where we go through the newsletter and tell you what might be big from within it.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://view.email.sans.org/?qs=31db83278ea7bc191ebc9de98fb22ea413065346a3ba7095d2eb0f7a5640deba06764173c87ac4597e25dd6e77af58c2e3fdd5ecb14d6522005f56ecaa90b02c6e1826492158dd7121d788f2242fc9d1"&gt;Here</a> is the link for March 25, 2025  and we hope you check it out to see what is of importance.  </p><p>This short podcast will be released Wednesday and Saturday and this will give us time to get it read and recorded.  </p><p>See you next time!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1958470</link>
      <enclosure url="https://content.rss.com/episodes/316363/1958470/the-technology-blog/2025_03_26_01_46_55_aa9ec3f9-b7ad-4f2f-8904-efeff6653e48.mp3" length="9864541" type="audio/mpeg"/>
      <guid isPermaLink="false">5961ad5d-ee40-4afc-8b0e-2cc1fd490d0f</guid>
      <itunes:duration>616</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Mar 2025 16:00:32 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN 3: LLMS and scams?]]></title>
      <itunes:title><![CDATA[TSN 3: LLMS and scams?]]></itunes:title>
      <description><![CDATA[<p>While calling Preston one day, I heard about a podcast through N2K networks called the Fight Files.  It covers AI and tech and the legal aspect of all of this.  Listen to this 50 minute podcast as we wlearn about services that are used to make this possible.  </p><p></p><p><a href="http://magnatune.jaredrimer.net">The Independent channel </a> will have the program at 5 pm PT, 7 CT and it'll be available through podcast <a href="http://www.986themix.com/throwback">through this link. </a> We hope you can join!  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1942446</link>
      <enclosure url="https://content.rss.com/episodes/316363/1942446/the-technology-blog/2025_03_16_16_40_26_ddd041fc-9979-4802-9c80-2558718237f8.mp3" length="6782892" type="audio/mpeg"/>
      <guid isPermaLink="false">53fc5d78-1069-4f0d-9586-047cc7f81380</guid>
      <itunes:duration>423</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 22 Mar 2025 00:00:24 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB podcast 231: Encrypthub]]></title>
      <itunes:title><![CDATA[TSB podcast 231: Encrypthub]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 231.  On this podcast, a very interesting ransomware program out there called EncryptHub.  What can it do?  This is bad in its own way.  News, notes, trivia answers and more.</p><p></p> <p></p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">EncryptHub"&gt;https://www.bleepingcomputer.com/news/security/encrypthub-breaches-618-orgs-to-deploy-infostealers-ransomware/"&gt;EncryptHub</a> breaches 618 orgs to deploy infostealers, ransomware   is the article from Bleeping Computer.  This may be the new type of Ransomware, and if so, this could be very bad.  </p><p>Have you read this article or the blog post on it that I wrote?  </p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1948913</link>
      <enclosure url="https://content.rss.com/episodes/316363/1948913/the-technology-blog/2025_03_19_22_45_55_b7c4d80f-337f-45be-9da5-8f76ebb5563f.mp3" length="221652264" type="audio/mpeg"/>
      <guid isPermaLink="false">8df0ef13-348a-40eb-9dbd-4575164a97ac</guid>
      <itunes:duration>13839</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Mar 2025 18:30:10 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 381: Trend Micro, a man getting potential prison and more]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 381: Trend Micro, a man getting potential prison and more]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to program 381 of the technology blog and podcast series.  We are going to start with an interesting video with Trend Micro that talks about customer success.  Making sure customers are happy is the key to having a successful company, and this does not matter what the business is.  </p><p>Next, in our first article we're going to talk about, we're talking about one that should really have more of a punishment than 10 years.  The article talks about a guy who basicly sabotoged his former employer after he got terminated.  Thinking that he wouldn't be caught at whatever he got caught doing, he put in a kill switch which disabled the company computer network.  </p><p>If you read the article titled <a href="<a target=" rel="noopener noreferrer nofollow">Developer"&gt;https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/"&gt;Developer</a> guilty of using kill switch to sabotage employer's systems  from Bleeping Computer, what did you think of it?  Do you agree with the 10 years he ould get if found guilty?  Why or why not?  Email, imessage, text, WhatsApp or call and leave a comment on the comment line.  Let me know if your comments should be aired.  </p><p><a href="<a target=" rel="noopener noreferrer nofollow">Microsoft"&gt;https://krebsonsecurity.com/2025/03/microsoft-6-zero-days-in-march-2025-patch-tuesday/"&gt;Microsoft</a>: 6 Zero-Days in March 2025 Patch Tuesday   comesfrom Krebs On security as we have a segment on Windows Update.  If you can, get those updates going.  </p><p>Email/Imessage tech at <a target="_blank" rel="noopener noreferrer nofollow" href="http://menvi.org">menvi.org</a></p><p>text/WhatsApp: 804-442-6975</p><p>Leave a message or talk to me: (888) 405-7524 or (818) 527-4754.  </p><p>Enjoy the program!</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1940952</link>
      <enclosure url="https://content.rss.com/episodes/316363/1940952/the-technology-blog/2025_03_14_23_24_47_9c544742-121d-449d-8a77-69db8a24550e.mp3" length="43781427" type="audio/mpeg"/>
      <guid isPermaLink="false">0d47bdc1-8ef5-444d-9832-47e32499b509</guid>
      <itunes:duration>2733</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 17 Mar 2025 16:00:44 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSN episode 2: Kim Komando]]></title>
      <itunes:title><![CDATA[TSN episode 2: Kim Komando]]></itunes:title>
      <description><![CDATA[<p>Lots of varying things coming from Kim Komando including a word not to use because its in scams, a DJI drone hit a plane used to deal with firefighting and much more.</p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1934361</link>
      <enclosure url="https://content.rss.com/episodes/316363/1934361/the-technology-blog/2025_03_10_18_11_22_5bf80c8f-6f76-42d7-ba38-1c1210210ded.mp3" length="7287755" type="audio/mpeg"/>
      <guid isPermaLink="false">74086915-81d7-4228-9459-21d185d3c353</guid>
      <itunes:duration>455</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 15 Mar 2025 00:00:14 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 230: Darcula, the next biggest threat]]></title>
      <itunes:title><![CDATA[TSB 230: Darcula, the next biggest threat]]></itunes:title>
      <description><![CDATA[<p>With the trivia, note that we can accept multiple answers today. Those who guessed already can't change their answers.</p><p></p><p>Welcome to program 230 of the Security Box.  I can't believe we've made it to program 230, but here we are.  Between this milestone, and the relaunch of the tech podcast releasing 380, this is going to get very interesting.  On this edition of the program, we're going to hear from Preston in regards to one of the newsletters from Kim Komando.  We're going to hear from Trend Micro about the threat landscape thanks to one of their podcasts through Youtube, and we also have an interesting video about a London Story with a guy climbing Big Ben.  Yes, its not security related, but you'll see why we've included it here and i'll talk about it for those who did not see it.  </p><p></p><p></p><p></p><p></p><p>If you'd like to watch this, let us know what's going on.  We know it is a demonstration and I have no problem with it, but doing this with no shoes?  <a href="<a target=" rel="noopener noreferrer nofollow">Here"&gt;https://www.youtube.com/watch?v=SIkowhcFdfE"&gt;Here</a> is the video from a news source  if you wish to take a look.  </p><p></p><p></p><p><a href="<a target=" rel="noopener noreferrer nofollow">Phishing"&gt;https://technology.jaredrimer.net/2025/02/20/phishing-as-a-service-darcula-may-become-the-next-best-thing/"&gt;Phishing</a> as a service Darcula may become the next best thing  is the blog post that leads to the article in which we're going to use.  This is one of a few items that we will need to watch.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1938185</link>
      <enclosure url="https://content.rss.com/episodes/316363/1938185/the-technology-blog/2025_03_13_01_52_55_a38b4861-4181-4500-8f59-5c814caadc7d.mp3" length="176408215" type="audio/mpeg"/>
      <guid isPermaLink="false">ff8dc354-ed4f-4664-84c3-7c7e9395f27e</guid>
      <itunes:duration>11014</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Mar 2025 20:50:07 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, program 380: New Ideas for the program]]></title>
      <itunes:title><![CDATA[The Technology podcast, program 380: New Ideas for the program]]></itunes:title>
      <description><![CDATA[<p>Hello tech podcast subscribers.  This has been awhile in the making, as i've been thinking of this podcast for awhile.  I've already got some things lined up, but since now I can schedule items, I can put podcasts out once a week and have them dated too.  </p><p>So now this feed has three items:</p><p></p><ul><p></p><p></p><li> The Tech podcast </li><p></p><p></p><li> TSB </li><p></p><p></p><li> News on the security hour for throwback saturday night </li><p></p><p></p></ul><p></p><p>Each show has a set release schedule.  This program will be on Mondays.  TSB on Thursday or Friday, 24-48 hours of it being recorded  live on the independent channel.  TSN, short for Throwback Saturday Night will be released 24 hours before airing on the independent channel talking about what we'll talk about on the show.  </p><p>On this program, I'll talk about my ideas for the tech program, and we'll talk about the RSS feed and why it has changed from Anchor to where it is.  </p><p>Where is it now, you say?  We're on the plan for networks on a web site called <a href="<a target=" rel="noopener noreferrer nofollow">rss.com"&gt;http://ww.rss.com"&gt;rss.com</a>.   Learn more about what they're offering.  </p><p>I hope that this finds you well, and we'll see you on another edition of the program!  This is going to be quite interesting and fun.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1931782</link>
      <enclosure url="https://content.rss.com/episodes/316363/1931782/the-technology-blog/2025_03_08_18_32_09_d88f18b2-560c-477d-bc08-13837c7c06b8.mp3" length="22838629" type="audio/mpeg"/>
      <guid isPermaLink="false">5e6dcd97-b93f-4c9b-a577-e6996aec05a5</guid>
      <itunes:duration>1425</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 10 Mar 2025 16:30:16 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Throwback Saturday Night Security hour, episode 1: March 8, 2025]]></title>
      <itunes:title><![CDATA[Throwback Saturday Night Security hour, episode 1: March 8, 2025]]></itunes:title>
      <description><![CDATA[<p>Discarded comes along this time and we're listening to how the defenders take down domains which may or may not lead to arrests.  Its a disruption tactic which can work in examples given in the podcast.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1929163</link>
      <enclosure url="https://content.rss.com/episodes/316363/1929163/the-technology-blog/2025_03_06_17_55_12_00157261-20d4-486e-a23a-4db6efd1abf8.mp3" length="6884914" type="audio/mpeg"/>
      <guid isPermaLink="false">4496bda9-819d-41e0-9828-5a8b5f2b5da8</guid>
      <itunes:duration>430</itunes:duration>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 08 Mar 2025 02:00:24 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TSB 229: Evading Antivirus Again?]]></title>
      <itunes:title><![CDATA[TSB 229: Evading Antivirus Again?]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 229.  On this podcast, we've got three trivia questions from one Kim Komando Newsletter, we've got the news notes and landscape, and a topic dealing with a country that is messing with more stuff with something we definitely need to be aware of.  </p><p></p><p></p><p></p><p></p><p>According to KMOX, identity theft is up.  <a href="<a target=" rel="noopener noreferrer nofollow">Here's"&gt;https://www.ivoox.com/en/identity-theft-resource-center-reports-massive-spike-in-audios-mp3_rf_127374273_1.html"&gt;Here's</a> a link to the podcast from the identity resource center.  </p><p></p><p></p><p></p><p></p><p>There is something out there called APV.  <a href="<a target=" rel="noopener noreferrer nofollow">Chinese"&gt;https://technology.jaredrimer.net/2025/02/18/chinese-hackers-are-abusing-more-microsoft-stuff/"&gt;Chinese</a> hackers are abusing more Microsoft stuff  leads to a blog that talks about this APV thing.  Don't worry, if you think this is bad, than you haven't been reading the blog.  We have more topics picked out so you'll want to give this a look and stay tuned to more podcasts for other topics that could be similar to this that you need to know about.</p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1929112</link>
      <enclosure url="https://content.rss.com/episodes/316363/1929112/the-technology-blog/2025_03_06_17_25_08_01ac16aa-ac19-4b35-93f3-dfd71a0a24d0.mp3" length="186667199" type="audio/mpeg"/>
      <guid isPermaLink="false">31f075b5-89d4-4703-9284-1b567f2d614c</guid>
      <itunes:duration>11654</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 06 Mar 2025 19:40:07 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security box, program 228: What is going on with TLDs today?]]></title>
      <itunes:title><![CDATA[The Security box, program 228: What is going on with TLDs today?]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security box, podcast 228 for the last week of February.  With 28 days in February, this will be the last podcast of the month.  I can't believe it!  On this podcast we're going to cover news, notes, the landscape and thanks to the <a href="<a target=" rel="noopener noreferrer nofollow">Pennsylvania"&gt;https://patf.us/"&gt;Pennsylvania</a> Assistive Technology Foundation  we're bringing you a webinar that you're going to get something out of that talks about identity theft.  We'll also talk about domains.  Yes, we're seeing ones that were talked about in the past in new twists, so we better rehash this topic and talk about how you can stay safe.  </p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1916241</link>
      <enclosure url="https://content.rss.com/episodes/316363/1916241/the-technology-blog/2025_02_27_01_29_52_01b95714-a992-4be3-b56d-e41f7f982ff3.mp3" length="271658952" type="audio/mpeg"/>
      <guid isPermaLink="false">72076da0-f650-4706-a802-fd244a383883</guid>
      <itunes:duration>16961</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 Feb 2025 19:00:41 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 227: Lifelock]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 227: Lifelock]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 227 of the Security box.  On this program, we're going to talk about Lifelock.  They're now promoting how good their services are, but yet, we found a program through A&amp;E and other channels.  Let's see what you think. Also, there are going to be different findings either on Youtube or other places talking about experiences.  </p><p></p><p></p><p></p><p></p><p></p><ul><p></p><p></p><li> <a href="<a target=" rel="noopener noreferrer nofollow">Bug"&gt;https://technology.jaredrimer.net/2018/07/25/bug-in-lifelock-exposes-millions/"&gt;Bug</a> in lifelock exposes millions  July 25, 2018 </li><p></p><p></p><li> <a href="<a target=" rel="noopener noreferrer nofollow">The"&gt;https://technology.jaredrimer.net/2023/01/18/the-fcc-is-to-strengthen-breach-notifications-it-cant-come-soon-enough/"&gt;The</a> FCC is to strengthen breach notifications … it can’t come soon enough  uly 18, 2023 </li><p></p><p></p><li> <a href="<a target=" rel="noopener noreferrer nofollow">Lastpass"&gt;https://technology.jaredrimer.net/2023/01/17/lastpass-is-not-the-only-one-target-norton-life-lock-is-now-the-next-victim/"&gt;Lastpass</a> is not the only one target, Norton Life Lock is now the next victim  January 17, 2023 </li><p></p><p></p></ul> <p></p><p></p><p></p><p></p><p></p><p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="<a target=" rel="noopener noreferrer nofollow">donate"&gt;http://www.jaredrimer.net/donations.html"&gt;donate</a> to the network,  <a href="<a target=" rel="noopener noreferrer nofollow">subscribing"&gt;https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com"&gt;subscribing</a> to the security box discussion list  or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="<a target=" rel="noopener noreferrer nofollow">blog"&gt;https://technology.jaredrimer.net/contact-admins/"&gt;blog</a> page found here.   Thanks so much for listening, reading and learning!  We can't do this alone.  </p>]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1906041</link>
      <enclosure url="https://content.rss.com/episodes/316363/1906041/the-technology-blog/2025_02_19_22_59_26_f3a0579f-4c94-4363-b5e3-f7509c6e08e5.mp3" length="194833067" type="audio/mpeg"/>
      <guid isPermaLink="false">fafaa34e-ae49-4bc5-a978-15d37424d4ef</guid>
      <itunes:duration>12164</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 20 Feb 2025 13:00:32 GMT</pubDate>
      <podcast:transcript url="https://transcripts.rss.com/316363/1906041/transcript" type="application/x-subrip"/>
    </item>
    <item>
      <title><![CDATA[TSB 225: Mastercard and its stupidity]]></title>
      <itunes:title><![CDATA[TSB 225: Mastercard and its stupidity]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 225. On this program, we're going to talk about a company that earned our stupid fuck award for January. We'll also cover the news, notes, landscape and more. 


 Newsy items 

<ul>
<li> Not that we care, but Microsoft Defender is disabling VPN. <a href="https://technology.jaredrimer.net/2025/02/03/microsoft-kills-of-defender-privacy-protection-vpn-services/">Microsoft kills of Defender Privacy protection VPN services </a> for more. </li>
<li> Deep Seek is being abused, not much of a surprise here, but worth looking at.  <a href="https://technology.jaredrimer.net/2025/02/03/should-this-not-be-surprising-deepseek-now-being-abused/">Should this not be surprising, DeepSeek now being abused </a> for more. </li>
<li> Gemini and other tools are being abused, and some have been abused more than others.  Enter the AI aspect of these tools and we've penned an article titled <a href="https://technology.jaredrimer.net/2025/02/01/gemini-ai-tools-are-being-abused-so-are-others/">Gemini AI tools are being abused … so are others </a> if you want to read it.  </li>
<li> Globe Life is yet another breach with yet another update.  <a href="https://technology.jaredrimer.net/2025/02/01/globe-life-confirms-breach-after-investigation-850k-more-affected/">Globe life confirms breach after investigation, 850k more affected </a> if you wish. </li>
<li> <a href="https://technology.jaredrimer.net/2025/01/31/meta-is-in-chaos-mode-it-seems/">Meta is in Chaos mode, it seems </a> should not be surprising to some, maybe surprising to others. You decide. </li>
<li> <a href="https://technology.jaredrimer.net/2025/01/31/tata-tech-hit-with-ransomware/">Tata tech hit with ransomware </a> </li>
<li> <a href="https://technology.jaredrimer.net/2025/01/31/youve-got-to-be-kidding-me-another-two-databases-open-but-now-closed/">You’ve got to be kidding me … another two databases open but now closed? </a> if you've not read it already. </li>
</ul>



 Who got charged this podcast? 

<ul>
<li> A Canadian Man got charged this month with pilfering $65m in Crypto.  Our blog post <a href="https://technology.jaredrimer.net/2025/02/03/canadian-man-charged-with-stealing-65m-using-crypto-exploits/">Canadian man charged with stealing $65m using crypto exploits </a> has the entire details. </li>
</ul>

 

 Who got our stupid fuck award in January we're talking about now? 

We mentioned this as part of podcast 224, but it became our topic.  Its the Krebs On Security article <a href="https://krebsonsecurity.com/2025/01/mastercard-dns-error-went-unnoticed-for-years/">MasterCard DNS Error Went Unnoticed for Years </a> which really is stupid.  We'll stop to explain some things on the way, and we hope this leads to some great conversations.  



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894709</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894709/the-technology-blog/2025_02_13_02_44_24_e7181696-eab0-411e-92a9-909890e33bcb.mp3" length="176503520" type="audio/mpeg"/>
      <guid isPermaLink="false">91fae2e3-87be-4724-860a-1ab05f20f183</guid>
      <itunes:duration>11020</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 05 Feb 2025 23:01:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_897e137d2e91d45c5eab08d711cd1ed7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 224: A day in the life as a voice phisher]]></title>
      <itunes:title><![CDATA[The Security box, podcast 224: A day in the life as a voice phisher]]></itunes:title>
      <description><![CDATA[Hello gang, welcome to podcast 224 of the security box. On this program, we're going to talk a little bit about something I spotted through Brian Krebs, an article that really goes in to how voice phishing really works. 

Also, we'll cover the news and landscape, with a brand new model which started a discussion from within the group which I saw a few items on and we'll see what else comes along.  



 Our topic: Voice Phishing  
Have you read this interesting article titled <a href="https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/">A Day in the Life of a Prolific Voice Phishing Crew </a> by Brian Krebs before?  Its going to lead our discussion.  Talk about an insight, this article I think does it.  



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894711</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894711/the-technology-blog/2025_02_13_02_44_29_2c8218af-652f-4ca0-baf8-5b90c4e3261f.mp3" length="208383987" type="audio/mpeg"/>
      <guid isPermaLink="false">eb702e80-3a34-4265-89ce-387cccab2067</guid>
      <itunes:duration>13010</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 29 Jan 2025 23:26:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_65bfc9b0430f73d290519b252f95d228.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 223: Q4 Social Media]]></title>
      <itunes:title><![CDATA[The Security box, podcast 223: Q4 Social Media]]></itunes:title>
      <description><![CDATA[I realize in one part of the intro I said 2024, but another I said 2025 as I wrote the show notes intro which were read. Sorry about that! <br> <br>

Hello folks, welcome to program number 223 for Wednesday, January 22, 2025. Its already been a busy month, and now its time to tackle our first topic dealing with a Q4 report from Phishlabs. We also have news, notes, the landscape and we also will talk about our new blog post talking about the stupid fucks of the year.  Contact info will always be given throughout the program.<br> <br>



 Our topic: Risky social media 

For the first major topic of 2025, an article talking about a Q4 report that Phishlabs did.  <a href="https://www.phishlabs.com/blog/riskiest-social-media-platforms-q4-2024">Riskiest Social Media Platforms, Q4 2024 </a> is tthe article.  This is going to get very interesting.  



Please find full show notes including links to some of the news we talk about on our <a href="http://technology.jaredrimer.net">blog. </a> <br> <br>

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894713</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894713/the-technology-blog/2025_02_13_02_46_11_8d72956e-c82a-4c62-b0d1-59615106b3bb.mp3" length="230417779" type="audio/mpeg"/>
      <guid isPermaLink="false">c9e3b7a4-2669-4c8e-a1d4-62dbe2e02fa3</guid>
      <itunes:duration>14386</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 23 Jan 2025 00:37:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e1d90a383c7cefcc4b69b2a944dcadb6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 222: Scams and natural disasters]]></title>
      <itunes:title><![CDATA[The Security box, podcast 222: Scams and natural disasters]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 222. This week, we take a look at the fact that we in California have had it bad in some counties and what scammers are up to. 

This is unfortunate, and while I'm in California, I think the bad news of what they are doing will not help.  

Here are some resources and articles covering the ordeal.

<ul>
<li> <a href="http://www.audacy.com/knxnews/news/local/l-a-wildfire-devastation-heres-how-to-help">L.A. wildfire devastation: Here's how to help </a> KNX </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/mayor-bass-issues-executive-order-to-expedite-fire-recovery">Mayor Bass issues executive order to expedite fire recovery </a> KNX </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/3-arrested-for-allegedly-setting-fires-in-sfv-west-l-a">3 arrested for allegedly setting fires in San Fernando Valley, West L.A. </a> KNX </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/looter-in-la-caught-posing-as-firefighter">Looter in LA caught posing as firefighter <</a> KNX </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/8-charged-with-looting-homes-during-l-a-fires-da">8 charged with looting homes during L.A. fires: DA </a> KNX </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/lawsuits-claim-eaton-fire-started-by-socal-edison-equipment">Lawsuits claim Eaton Fire started by SoCal Edison equipment </a> KNX </li>
</ul>

For complete details, please visit some of these news sites in no particular order:

<ul>
<li> <a href="http://www.knx1070.com">KNX </a> </li>
<li> <a href="http://www.ktla.com">KTLA Los Angeles </a> </li>
<li> <a href="http://www.nbcla.com">NBC Los Angeles </a> </li>
<li> <a href="http://www.cnn.com">CNN National News </a> </li>
<li> <a href="http://www.msnbc.com">MSNBC </a> </li>
<li> <a href="http://www.foxla.com">Fox 11, Los Angeles </a> </li>
</ul>

The list here is not exhaustive and you can find other news sites that might cover this.  Always use thes or other news sites to get your news, and also social media you trust with these and other sources you trust.

Want to help out?  <a href="http://www.redcross.org">Here's the link to the red cross. </a>



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894714</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894714/the-technology-blog/2025_02_13_02_46_24_f792012d-670a-45a4-b022-cae036b40b0d.mp3" length="120213551" type="audio/mpeg"/>
      <guid isPermaLink="false">2dc0144a-f79c-4169-901b-bf4a5c28c330</guid>
      <itunes:duration>7505</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 15 Jan 2025 22:05:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8ebc38749e1ec08485b465833c19e3ef.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 221: Happy New Year!]]></title>
      <itunes:title><![CDATA[The Security box, podcast 221: Happy New Year!]]></itunes:title>
      <description><![CDATA[missing description]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894716</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894716/the-technology-blog/2025_02_13_02_46_02_99249c58-16bc-405c-86e9-2ea541f610e6.mp3" length="170509836" type="audio/mpeg"/>
      <guid isPermaLink="false">21bfd490-5d85-455d-a6c1-c7fb12c5940f</guid>
      <itunes:duration>10656</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 09 Jan 2025 19:43:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4f884e36ff2957da9b9958377014e48e.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 220 for Dec 18, 2024]]></title>
      <itunes:title><![CDATA[TSB podcast 220 for Dec 18, 2024]]></itunes:title>
      <description><![CDATA[<p>Sorry we're late on this, other commitments. We've got the news, the landscape and much more as the team takes the rest of the year off. Next scheduled program will be on January 8th. Happy new year!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894718</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894718/the-technology-blog/2025_02_13_02_54_49_733bf379-204e-4acb-854b-9aa0bd9748d8.mp3" length="207475338" type="audio/mpeg"/>
      <guid isPermaLink="false">d203cdb8-a6d9-437a-b7b7-c4037ee86294</guid>
      <itunes:duration>12954</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Sat, 21 Dec 2024 21:06:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ffa1c5812ba2087fa5af379d32f4d7d4.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 219: 3 trivia questions and lots in the landscape]]></title>
      <itunes:title><![CDATA[TSB 219: 3 trivia questions and lots in the landscape]]></itunes:title>
      <description><![CDATA[<p>Lots of stuff in the landscape. Three thrivia questions and no show next week. We'll have one more in 2 weeks.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894720</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894720/the-technology-blog/2025_02_13_02_46_20_67f9d38c-25db-4191-b0f0-64d6df4a22c4.mp3" length="170638043" type="audio/mpeg"/>
      <guid isPermaLink="false">f5b95852-39d6-4af2-9628-6f747425c9a1</guid>
      <itunes:duration>10654</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 06 Dec 2024 22:38:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4319bfb5fdb34ae49dfb964c3097a8db.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 218: open forum]]></title>
      <itunes:title><![CDATA[TSB 218: open forum]]></itunes:title>
      <description><![CDATA[<p>News, notes and the landscape. Other odds and ends too including a trivia question. (888) 405-7524 or 818-527-4754 iss the way to participate or use other contact info during the show.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894722</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894722/the-technology-blog/2025_02_13_02_44_54_3a365354-f815-4a80-beb8-e1a11ce968a6.mp3" length="148273694" type="audio/mpeg"/>
      <guid isPermaLink="false">e030f711-0dc9-45b0-9d24-a9b10903eff0</guid>
      <itunes:duration>9257</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 20 Nov 2024 23:46:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3f814fa60e279688ba45cafaaabcc4f6.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 217: What the hell is the braille space and why is it being discussed?]]></title>
      <itunes:title><![CDATA[TSB podcast 217: What the hell is the braille space and why is it being discussed?]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box, podcast 217. Its been a long time since we did how notes, as NCSAM doesn't necessarily need show notes per see. We've got a great topic on something I blogged and we talked about awhile back about the braille space. No, not the way braille is written as you know it, but a hexidecimal character used to cause havoc. We'll explain on this podcast.

Besides that, we're going to have the news, the notes, the landscape, answers to trivia and more.

Please feel free to participate.  Starting with this podcast, we're going to have our click to call wigit available so you can feel free to use it to call the comment line and leave your message or talk to us, depending on availability.

Thanks so much for listening to the program, and we hope you enjoy!



 The braille space 

When writing braille, it is no different than writing print. But braille can be written with hexidecimal characters just like other languages using a computer keyboard.  

We found an article talking about the fact that this braille character is used to actually hide file extensions, amking you think you're opening one type of file, but opening another.  

On September 16, 2024: Robert Stepp responded to the email I sent him iquiring to the braille space as a character, and he wrote the following.

  Hi,

 There is nothing special about a "braille" space. The 0x2800 character is simply a space in the 8-dot braille page of Unicode (three bytes in UTF-8). Apparently 0x2800 is interesting because is shows as nothing but is parsed as non-whitespace. A bogus filename  SomeName.pdfxxxxxxxxxxxxxxxxxxxx.hta where x is the braille space, when written to a FileName box (whose length is too short to show the final .hta without scrolling) appears to be a .pdf file when it is actually a .hta (private malware) file. Any Unicode character, not known by Windows controls to be whitespace (space, thin-space, zero-width- space, etc) would work just as well for this visualization spoof.  

To read the entire blog post including the article which will lead to our discussion, <a href="https://technology.jaredrimer.net/2024/09/17/i-did-not-know-there-was-something-called-a-braille-space/">I did not know there was something called a braille space </a> is the article in which I wrote, linking to the article from Bleeping Computer.  

For those that just want to dive in to the Bleeping computer article, <a href="https://www.bleepingcomputer.com/news/security/windows-vulnerability-abused-braille-spaces-in-zero-day-attacks/">Windows vulnerability abused braille “spaces” in zero-day attacks  </a> will be your article.

Thanks Bob for your great insite!  Its much appreciated.



 Contacting the podcast 

If you would like to contact the podcast folk, please use the following info which goes to Jared and can be shared with the rest of the contributors as needed:

<ul>
<li> Email/imessage: jaredrimer@986themix.com or tech@menvi.org which go to Jared. </li>
<li> Text or WhatsApp: 804-442-6975 
</li><li> Call the comment line at (888) 405-7524 or use the click to call button located in the show notes. If available, Jared can take your call below. You may also call long distance by calling (818) 527-4754. </li>
</ul>

 <a href="https://acctmgr.evoice.com/AcctMgr/ClickToCall/ClickToConnectSession.aspx?key=5ef4d00d-d9f7-46ea-84d6-3712e0b25148"></a>  


 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Inte]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894724</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894724/the-technology-blog/2025_02_13_02_46_37_b982bc43-9c03-4c8b-a7e2-1d1af825f2f4.mp3" length="188221981" type="audio/mpeg"/>
      <guid isPermaLink="false">4bbc8da3-5844-4cad-a498-67ba0b2f2f3e</guid>
      <itunes:duration>11751</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 15 Nov 2024 17:42:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1f121298e8eea6755eee551a63006fe5.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 216 reissue]]></title>
      <itunes:title><![CDATA[TSB 216 reissue]]></itunes:title>
      <description><![CDATA[<p>This is a reissue. Unfortunately, it has come to my attention that the podcast was only 7 seconds, and I don't know why. So we're retrying the program upload again.</p>
<p><br /></p>
<p>On this program, we've got the news, the notes and the landscape. We've got the book discussion and what we think. We apologize for the inconvenience this causes you!</p>
<p><br /></p>
<p>More later.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894727</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894727/the-technology-blog/2025_02_13_02_51_56_833a697a-7f4f-4ce1-864e-a002c7c65229.mp3" length="217100813" type="audio/mpeg"/>
      <guid isPermaLink="false">e5cbb2de-73bc-4196-bf41-7d3a0ffe33bf</guid>
      <itunes:duration>13555</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 15 Nov 2024 17:36:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c4bc1e07775f159102d7e84ed61e8629.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 216]]></title>
      <itunes:title><![CDATA[The Security box, podcast 216]]></itunes:title>
      <description><![CDATA[<p>On this episode, we're going to cover the landscape, the news, the notes and even a very interesting email we got. Is this really a writer? I think not.</p>
<p><br /></p>
<p>Want to participate during the trivia? Call (888) 405-7524 or (818) 527-4754.</p>
<p><br /></p>
<p>No purchase necessary, learning is the key. Enjoy the show!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894729</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894729/the-technology-blog/2025_02_13_02_47_47_bdf7ed13-2ab9-4688-a74c-ce3359ee54a3.mp3" length="125013" type="audio/mpeg"/>
      <guid isPermaLink="false">88f7484b-a578-4661-8c52-7b279da787d9</guid>
      <itunes:duration>7</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 07 Nov 2024 18:24:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_367cbfc8443282220376452d567547cb.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 215: Lots of stuff including news, notes, the landscape, credit cards and more]]></title>
      <itunes:title><![CDATA[TSB 215: Lots of stuff including news, notes, the landscape, credit cards and more]]></itunes:title>
      <description><![CDATA[<p>Wooo! This podcast is packed! </p>
<p><br /></p>
<p><br /></p>
<p>On this edition of the podcast, we've got tons of topics including one we wrote about prior to going on air.  We're going to cover the landscape and things that Nick has wanted to comment on since he missed a few weeks, participating only through SMS.  </p>
<p><br /></p>
<p>We even have a replay of a 36 minute segment from podcast 193 where we take you through the setting up of virutal cards on Capital One's app.  </p>
<p><br /></p>
<p>I hope that each and every one of you have enjoyed this extended version of the show as much as we have bringing it together for you.  </p>
<p><br /></p>
<p>Next week, books.  We'll see you then!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894731</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894731/the-technology-blog/2025_02_13_02_47_36_9f5057de-e66b-44a3-8241-c9c305d5cb86.mp3" length="247757578" type="audio/mpeg"/>
      <guid isPermaLink="false">e8eb3ce1-1d8a-4861-a605-8ad6f0e87b43</guid>
      <itunes:duration>15469</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 30 Oct 2024 23:31:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d310287e48ce64c0cceabd21d04dce66.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 214: NCSAM continues with social media and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 214: NCSAM continues with social media and more]]></itunes:title>
      <description><![CDATA[<p>Sorry for the late release. If I put this up before, I apologize for the inconvenience.</p>
<p><br /></p>
<p>We talk about all kinds of stuff including our aforemention topic of social media. </p>
<p><br /></p>
<p>We hope you enjoy the program.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894733</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894733/the-technology-blog/2025_02_13_02_55_45_3b492f36-1099-44fa-9728-c37f0a2eea13.mp3" length="190482342" type="audio/mpeg"/>
      <guid isPermaLink="false">7e8e5a53-8be9-4caf-a6c1-a0fb5dbb3e2d</guid>
      <itunes:duration>11893</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Sat, 26 Oct 2024 17:54:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_80c985a6aabe118a51323e80579d5ebe.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 213: upgrading software]]></title>
      <itunes:title><![CDATA[The security box, podcast 213: upgrading software]]></itunes:title>
      <description><![CDATA[<p>Upgrading software is important. But sometimes it may not be so good, and we discuss thoughts as part of NCSAM. Trivia and more on this edition of the program.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894734</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894734/the-technology-blog/2025_02_13_02_49_46_d873a97a-c1e4-4eed-af0a-f0b2fad3f368.mp3" length="174691518" type="audio/mpeg"/>
      <guid isPermaLink="false">12a42dc1-b911-4ed5-a6a7-c8088f180df8</guid>
      <itunes:duration>10918</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 17 Oct 2024 18:00:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_444bd262bccbcae08cf31515f14830c8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, program 212: week 2 of NCSAM: scams]]></title>
      <itunes:title><![CDATA[The Security box, program 212: week 2 of NCSAM: scams]]></itunes:title>
      <description><![CDATA[<p>Scams are everywhere. We break down an article we found, talk about the news and the landscape and much more. We hope you enjoy the program.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894736</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894736/the-technology-blog/2025_02_13_02_48_42_5d8f0993-7fec-495d-88eb-bc82684ff8e9.mp3" length="196128850" type="audio/mpeg"/>
      <guid isPermaLink="false">22bbc5d3-c744-4b5d-a105-0bd8168deb64</guid>
      <itunes:duration>12245</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 10 Oct 2024 16:15:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_72f98a711526b178c2fffd1003131fbc.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 211: week 1 of the 2024 NCSAM discussion]]></title>
      <itunes:title><![CDATA[TSB 211: week 1 of the 2024 NCSAM discussion]]></itunes:title>
      <description><![CDATA[<p>On this podcast, passwords, password managers, news, notes, multi-factor and more. Thanks for joining!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894738</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894738/the-technology-blog/2025_02_13_02_49_35_966558bf-31ba-4c97-a696-024df6e2bce7.mp3" length="169980282" type="audio/mpeg"/>
      <guid isPermaLink="false">6e6ff092-7ce8-4e87-af83-0f36114e80c5</guid>
      <itunes:duration>10623</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 03 Oct 2024 21:23:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b5b125b0d081ec382bce8df80bc86d2b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 210: OCR can be used for bad?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 210: OCR can be used for bad?]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to program number 210 of the security box. What do you think when it comes to OCR? If you're disabled, you know that it helps you identify print in to spoken word for you to know what is on the printed page. However, this is not what we're talking about. OCR is now being used to get information, and it may be information you don't want escaping.  

Besides this topic, we're going to have the news, the notes, and the landscape as well.  

We appreciate those of you who are downloading and listening to our podcast whether its through RSS, the direct links we provide through TSB's directory or blog, or even if you listen through replays through your respective channel or the independent channel directly.

 OCR used for bad 

Yes, we said OCR for bad.  This is bad.  <a href="https://technology.jaredrimer.net/2024/09/07/how-many-android-applications-are-known-to-be-using-something-to-steal-crypto-currency/">How many Android applications are known to be using something to steal Crypto currency? </a> is the blog post which leads to the article <a href="https://arstechnica.com/security/2024/09/found-280-android-apps-that-use-ocr-to-steal-cryptocurrency-credentials/">Found: 280 Android apps that use OCR to steal cryptocurrency credentials. </a> 

I guess we'll have to see what happens with this, but if this is any indication, Android is going to be a big breed and IOS may end up following in their own way too.  Stay tuned!



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894740</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894740/the-technology-blog/2025_02_13_02_48_46_1f2dd01d-3fd8-4e3d-bb02-58aca5a8da01.mp3" length="179349240" type="audio/mpeg"/>
      <guid isPermaLink="false">35f36d5a-1f45-4723-ad88-506b3dbd7a70</guid>
      <itunes:duration>11198</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 27 Sep 2024 16:49:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_48fd857a8395448cbd2498fdd92e407a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 209: Volt Typhoon is back in the news]]></title>
      <itunes:title><![CDATA[The Security box, podcast 209: Volt Typhoon is back in the news]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 209. On this program, we'll do questions by hand, and some will be from the news. Of course besides the news, we've got to talk about Volt Typhoon again. If anyone has any questions we can answer, we'll do that as well.

 Volt Typhoon in the news again 

KrebsOn Security takes on a journey of <a href="https://krebsonsecurity.com/2024/08/new-0-day-attacks-linked-to-chinas-volt-typhoon/">New 0-Day Attacks Linked to China’s ‘Volt Typhoon’. </a> which caught our attention. I wrote this up, in a way I think is fair, as we take the article apart. 



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894742</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894742/the-technology-blog/2025_02_13_02_47_39_d2177f61-af93-4668-a0db-e3d1b607ae67.mp3" length="233039708" type="audio/mpeg"/>
      <guid isPermaLink="false">3cd9aca1-1655-413c-8ab6-e3725d9db68a</guid>
      <itunes:duration>14550</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 20 Sep 2024 17:39:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b71fc5c07f9fd02034e9ac233cbc86b2.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 208 for Sept 11, 2024]]></title>
      <itunes:title><![CDATA[The Security box, podcast 208 for Sept 11, 2024]]></itunes:title>
      <description><![CDATA[missing description]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894744</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894744/the-technology-blog/2025_02_13_02_50_21_8a4c2696-7b75-4d17-a6fc-cc4b1ff162b5.mp3" length="200684177" type="audio/mpeg"/>
      <guid isPermaLink="false">2386ebad-01cd-4fe0-a7bc-bbad887c783a</guid>
      <itunes:duration>12530</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 12 Sep 2024 01:36:37 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5ef01a232718cde5ffe3ab9b36b780d7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 207: open forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 207: open forum]]></itunes:title>
      <description><![CDATA[<p>Open forum, an a very interesting set of emails.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894746</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894746/the-technology-blog/2025_02_13_02_49_46_10bebda3-497c-463e-b984-eaf9c8c14649.mp3" length="163952673" type="audio/mpeg"/>
      <guid isPermaLink="false">ffcd2856-7d7c-484b-aa7b-715ebd534fd1</guid>
      <itunes:duration>10236</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 04 Sep 2024 23:40:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_40c2e76dfddf18fd670c16279d1440a3.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 206: EDR Kill Shifter]]></title>
      <itunes:title><![CDATA[The Security box, podcast 206: EDR Kill Shifter]]></itunes:title>
      <description><![CDATA[Hello, welcome to program number 206. We've got tons of questions that could lead our news discussion, we've got an interesting discussion on a type of malware that could be disruptive and Antivirus may not help and more. 

Here are the questions.  
<ul>
<li> What happens when someone decides to be a complete moron?  We talk about it, and this story is just out of this world.  Who was it, what did they do, and how much trouble will he be in?  </li>
<li> Next, what happened to a telecom company who also did moronic things who also deserves our moron of the podcast? </li>
<li> What type of technique has been around since 2017 and is now being used for delivering something we've been talking about for a number of years now? </li>
<li> Who in Russia recently got arrested because he stole from a certain ransomware group? Name the group, and while we don't know the suspect, name him by the initials given within the article. </li>
<li> Speaking of arrests, which new ransomeware group which was once known as Conti had a member arrested?  What was his position?  What is his fine as a minimum  and what might his prison sentence  as a minimum according to the article be? </li>
<li> What type of malware is now going to break records if last year's number was 1.1 billion dollars alone?  What was it that I thought could be the number for this year based on last year's  number and what was the percentage? </li>
<li> Finally for our topic, what new ransomware might we be talking about this time, that kills a certain type of antivirus protection? </li>
</ul>

I hope that you enjoy the program as much as we are bringing it together.  Thanks for listening and make it a great day!



 Our complete morons of the podcast 

Get a load of this for our first moron.  This guy's name is Jesse Kipf and he's got a wrapsheet.  <a href="https://technology.jaredrimer.net/2024/08/22/man-sentenced-for-hacking-registry-to-fake-his-own-death/">Man sentenced for hacking registry to fake his own death </a> is the first blog  post and it did get a comment  from Shaun.  But that wasn't all.  Once I went on Ars Technica, I found <a href="https://technology.jaredrimer.net/2024/08/22/weve-got-more-on-the-dad-who-refused-to-pay-child-support/">We’ve got more on the dad who refused to pay child support </a> which I blogged after reading the story.  On page 2 of the story, it talks about the wrapsheet he's going to face.  

Speaking of facing wrapsheets, <a href="https://technology.jaredrimer.net/2024/08/23/karakurt-negociater-arrested-sent-to-u-s/">Karakurt negociater arrested, sent to U.S. </a> could be talked about because of that potential sentencing for the suspect, but we'll have to see about that.  

Speaking of morons, <a href="https://technology.jaredrimer.net/2024/08/21/telecommunications-company-to-pay-1-million-dollars/">Telecommunications company to pay 1 million dollars </a> should be read if you haven't read it already.  We even found ><a href="https://technology.jaredrimer.net/2024/08/22/heres-more-on-the-lingo-telecom-fiasco/">Here’s more on the lingo telecom fiasco </a> which has an update.  



 Our Topic EDR Kill Shifter 

Our topic is quite interesting and one in which we also need to talk about.  <a href="https://technology.jaredrimer.net/2024/08/17/ransomware-gang-deploys-malware-that-kills-security-programs/">Ransomware gang deploys malware that kills security programs </a> is the  blog post in which we talk about this and it leads to the article.  It leads to the article itself <a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-deploys-new-malware-to-kill-security-software/">Ransomware gang deploys new malware to kill security software </a> which comes to us from Bleeping computer.  



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinf]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894747</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894747/the-technology-blog/2025_02_13_02_48_23_88505f6b-e5f1-47de-9c0b-7d4abc6961bb.mp3" length="150485864" type="audio/mpeg"/>
      <guid isPermaLink="false">ec1b6351-1e85-4c79-ba6b-0be0e8df1d23</guid>
      <itunes:duration>9395</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 28 Aug 2024 22:14:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3bebead7971ae18345b578333b82f727.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 205: Magniber]]></title>
      <itunes:title><![CDATA[The Security box, podcast 205: Magniber]]></itunes:title>
      <description><![CDATA[Welcome to the security box, program number 205. Which Ransomware gang is now responsible for deploying ransomware that actually disables security programs? Which types of security programs are affected?  Which major company which was talked about last podcast confirmed that there was a breach that occured and when did it occur?  Which car company is recalling  cars that have not been serviced for a 9 year old problem?  Finally, for those who haven't participated in the discussion, do you share your location or accounts with your spouse or partner?

This week's topic talks about something we may have talked about called Magniber.  We hope you enjoy the program, thanks so much for listening!



 Magniber back in the news 

<a href="https://technology.jaredrimer.net/2024/08/12/magniber-is-back-old-decryptors-dont-work/">Magniber is back, old decryptors don’t work </a> is the blog post that people can read.  It leads to this article titled <a href="https://www.malwarebytes.com/blog/news/2024/08/magniber-ransomware-targets-home-users">Magniber ransomware targets home users. </a>

This article leads to another article from Bleeping computer, so there's no need for us to link to it.  

We also talk about the reorganization of 6 different items.  But wait, we even talk about our guide we wrote on how to check links if the malicious things you get are by links.  <a href="https://technology.jaredrimer.net/getting-link-information-via-access-technology/">Getting Link information via access technology </a>  is the link.  Please utalize it!



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894748</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894748/the-technology-blog/2025_02_13_02_50_43_39aa78c9-a0dc-49b0-a70e-60d45801a4ef.mp3" length="176422704" type="audio/mpeg"/>
      <guid isPermaLink="false">f01ba274-b5fd-4e26-8a80-979b86ca31d9</guid>
      <itunes:duration>11015</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 21 Aug 2024 22:27:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_05b336a184bc5fb0485df2b070ce877f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 204 for August 14, 2024]]></title>
      <itunes:title><![CDATA[The Security box, podcast 204 for August 14, 2024]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 204. What big story is coming out about a company who has apparently gained access to tons of data illegally? The names, potential relative information, possible address information and social security numbers may be affected.  

Our topic today talks about how IT workers are getting hit with a new ransomware strain called Rino.  

All of this as well as the news, notes, questions and comments from any participents that may come in.



 The next possible biggest breach 

There's a lot of conflicting information, especially when it comes to which particular group supposedly hacked the company to begin with.  

This particular incident reminds me of the OPM breach of 2018.   <a href="https://technology.jaredrimer.net/?s=opm+breach">search the blog for opm breach </a> 

Here are our blog posts which talk about the subject as of writing these notes.  There's still a lot for us to learn.

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/08/11/weve-got-more-on-this-npd-databreach/">We’ve got more on this NPD databreach </a> was written on august 11, 2024 and it links to a Bleeping Computer article.  There are a lot of questions here including the exact number of people and the fact that there are conflicts within the data that was seen by the publication. </li>
<li> <a href="https://technology.jaredrimer.net/2024/08/08/2-9-billion-users-national-public-data-gained-data-illegally/">2.9 billion users, National public data gained data illegally </a> is the blog post that links to the hackread article that Kim Komando linked to within her newsletter.  This one talks about a lawsuit and that lawsuit deals with the fact that this company got the info illegally and orders the court to delete the illegal data.  We highlighted this article on the Throwback Saturday Night program for August 10th. <a href="http://www.986themix.com/throwback">The RSS for that show is on this link. </a> </li>
</ul>



 What is Sharp Rino? 

<a href="https://technology.jaredrimer.net/2024/08/07/ransomware-gnangs-target-it-workers-with-sharp-rino-malware/">Ransomware gangs target IT workers with sharp rino malware </a> is the blog post which leads to today's discussion from Bleeping Computer titled <a href="https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-gang-targets-it-workers-with-new-sharprhino-malware/">Ransomware gang targets IT workers with new SharpRhino malware </a>  which should be a very interesting discussion.



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894749</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894749/the-technology-blog/2025_02_13_02_50_00_ea9e9fa4-dd48-4848-a8d4-bd04fc3b4a35.mp3" length="150731541" type="audio/mpeg"/>
      <guid isPermaLink="false">bc8e1b88-2c38-4c09-8c0b-fb2f02a4a0f5</guid>
      <itunes:duration>9411</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 15 Aug 2024 20:06:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ba47bbdbe7bff2317646bcbb78c156f6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 203: Data breach victims up 1k percent thanks to a study]]></title>
      <itunes:title><![CDATA[The Security box, podcast 203: Data breach victims up 1k percent thanks to a study]]></itunes:title>
      <description><![CDATA[What is the number of percentage points that we recently saw when it came to our data being pilfered as victims go? What email seems to be making a comeback that we've not seen in a number of years, yet a customer of mine has gotten two of them within days of each other? What might be the subject matter of these emails and what are they trying to get this customer to do?  Hint, its something we talked about probably in 2018 when The Mix and the JRN got these types of emails.  

Besides all of these questions, we're going to cover the landscape and some of what we've blogged or spotted in the news.  

We hope that you enjoy the program, and thanks for listening!

 What percentage of victims are up when it comes to Data Breaches? 

We <a href="https://technology.jaredrimer.net/2024/07/29/number-of-data-breach-victims-up-over-1000-percent-this-is-not-a-typo/">blogged our thoughts </a> on this topic, as well as <a href="https://www.malwarebytes.com/blog/news/2024/07/number-of-data-breach-victims-goes-up-1000">linked to the original Article </a> thanks to MalwareBytes.  

The number is staggering, although it would be a lot less percentage wise except for a couple of breaches as part of a Q2 report.  

If you guessed close to 500 percent, you're not far off, that number is only there at 490% without the breaches at Snowflake and other companies.  The correct answer is 1,000%  and we played the article as part of Saturday's Throwback Saturday Night program.  <a href="http://www.986themix.com/throwback">Here is the link to their RSS. </a>

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894751</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894751/the-technology-blog/2025_02_13_02_51_10_9ec3818b-0b49-4aeb-8dc1-7351d40351d4.mp3" length="178541179" type="audio/mpeg"/>
      <guid isPermaLink="false">b57f9034-aecb-41a2-9581-5b0584aa3f87</guid>
      <itunes:duration>11147</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 07 Aug 2024 23:28:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_83585366aed9ef5f2f081f75d3c6695b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 202: the CFAA, revisited]]></title>
      <itunes:title><![CDATA[The security box, podcast 202: the CFAA, revisited]]></itunes:title>
      <description><![CDATA[<p>On podcast 202 of the Security box, we revisit a topic that we think isn't doing any good today. That is, the Computer Fraud and Abuse Act. We take from Wikipedia's article discussing it, and we discuss whether its worth having it or doing something else.  </p>
<p><br></p>
<p>We also covered the news and the landscape, and yes, we had people out and about this week.  We push on.  </p>
<p><br></p>
<p>Enjoy the program and thanks for listening!  </p>
<p><br></p>
<p>Thanks to our affiliates for playing our program, and those that provide the content for publishing it.  See you next time!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894753</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894753/the-technology-blog/2025_02_13_02_55_36_61dad5fa-f212-4c95-90cd-829b1330bff6.mp3" length="177285257" type="audio/mpeg"/>
      <guid isPermaLink="false">3b1221c9-0dc0-4f15-a8a1-964eee0f881a</guid>
      <itunes:duration>11069</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 31 Jul 2024 22:34:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_74d8203554d8b555520ac5ff67455434.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 201: traffic lights and controlers on the Internet]]></title>
      <itunes:title><![CDATA[The Security box, podcast 201: traffic lights and controlers on the Internet]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box. There might be a light news week this week, but we do have now a topic which came out of something read over the weekend. Traffic lights on the Internet. We'll cover what news and notes we have, then dive right in to our topic and answer anything people have.

 Traffic lights 

<a href="https://techcrunch.com/2024/07/18/hackers-could-create-traffic-jams-thanks-to-flaw-in-traffic-light-controller-researcher-says/">Hackers could create traffic jams thanks to flaw in traffic light controller, researcher says </a> is the article, we're taking from and it was read this weekend that passed.  

This is one of those theoretical things, and one that could be out there. The researchers were slapped with a legal threat with one company, was that right or wrong?


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894756</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894756/the-technology-blog/2025_02_13_02_56_29_0dd24402-ff5a-4e07-ae2e-4a12190ee02a.mp3" length="160424112" type="audio/mpeg"/>
      <guid isPermaLink="false">aa25d96d-fb9f-42ff-b2cc-70e8838f0e67</guid>
      <itunes:duration>10016</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Sun, 28 Jul 2024 20:37:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d6cd6098f750654e313279cf51f1fa07.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 200: Our 4th year anniversary show]]></title>
      <itunes:title><![CDATA[The Security box, podcast 200: Our 4th year anniversary show]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to program 200. On this edition, we're going to cover the landscape, one of the biggest breaches that will possibly affect everyone in one form or another, as well as hear from participents on what they found of value from the last 4 years. Thanks so much for listening!

 AT&T breach 

Snowflake is going to be the biggest talk in town.  One of the biggest carriers got hit by this disaster.  

Here are blog posts that might be of interest.

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/07/15/cybernews-reports-att-paid-hackers-to-delete-data/">Cybernews reports: AT&T paid hackers to delete data </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/07/14/here-are-some-thoughts-from-someone-on-mastodon-about-the-recent-att-breach/">Here are some thoughts from someone on Mastodon about the recent AT&T breach </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/07/12/now-its-time-to-guess-who-is-next-in-the-snowflake-fiasco/">Now its time to guess, who is next in the snowflake fiasco? </a> </li>
</ul>

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894758</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894758/the-technology-blog/2025_02_13_02_51_16_65caf33d-c7c9-4405-b7a9-551158fdc592.mp3" length="202726253" type="audio/mpeg"/>
      <guid isPermaLink="false">4ec96eb4-ef6f-403a-a6e4-fc69e129e865</guid>
      <itunes:duration>12657</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 18 Jul 2024 14:19:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f7b7d1244615e1b269b8a0919e39bede.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 199: Don't be Blinded by Snowblind]]></title>
      <itunes:title><![CDATA[The Security box, podcast 199: Don't be Blinded by Snowblind]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box. On this edition of the podcast, we're going to talk about something called Snowblind. We also have news, notes, te landscape; and something I heard via a podcast that we can discuss in regards to scams.  We also have a laugh that might have you laughing as well.  We hope you enjoy the program!



 How about a laugh 

We have a good one that we will read.  Its not necessarily tech related, but worth the share.  We even have a comment on it by Shaun.  <a href="https://technology.jaredrimer.net/2024/07/06/something-to-laugh-at/">Here's the link to the blog post. </a> I hope you enjoy!

 Don't be Blinded by Snowblind 

Our topic this week comes to us from Bleeping Computer  <a href="https://technology.jaredrimer.net/2024/06/28/dont-get-blinded-by-snowblind-snowblind-will-blind-you-and-take-data/">Here's my blog post </a> and <a href="https://www.bleepingcomputer.com/news/security/snowblind-malware-abuses-android-security-feature-to-bypass-security/">here is the article we'll be taking from. </a> 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894760</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894760/the-technology-blog/2025_02_13_02_48_18_5958b7f8-403c-4cd2-8fbc-3ae0f5fb03ca.mp3" length="176296802" type="audio/mpeg"/>
      <guid isPermaLink="false">8d82d9be-a4e4-475b-bed5-8620ab97fa6c</guid>
      <itunes:duration>11007</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 11 Jul 2024 16:19:37 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ccd10a20d501a731006fd4083c43f625.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 198: Week 2 of the 2 weeks of open forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 198: Week 2 of the 2 weeks of open forum]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box. On this program, an open forum full of stuff from scams, to articles on the blog and the most important ones of those. Hope you enjoy the program. Running time, 4 hrs, 5 minutes.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894762</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894762/the-technology-blog/2025_02_13_02_53_40_99627d2f-26ba-4a8f-aebc-d19d7a01a9fa.mp3" length="236300036" type="audio/mpeg"/>
      <guid isPermaLink="false">8139222d-669a-49bd-bc91-f7b08ca74bd6</guid>
      <itunes:duration>14753</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 04 Jul 2024 19:31:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_98190544f54a0105f6a3c84fbb492b69.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 197 intermediate a: The Language of the Business]]></title>
      <itunes:title><![CDATA[The Security box, podcast 197 intermediate a: The Language of the Business]]></itunes:title>
      <description><![CDATA[Welcome to podcast 197, intermediate A. J Wolfgang Goerlich is along with a very interesting talk. While I've not listened to it in full, I did think of putting this out as it talks about risk.  Maybe its a risk you don't know much about, so let's learn together.

 J Wolfgang Goerlich: My RSA talk is up. Join me in dismantling the myth of the weakest link, and building human-centric and human-first security programs.

The Language of the Business: Applying Behavior Science for Risk Management https://www.youtube.com/watch?v=BFkM9FxTP8g 

<a href="https://www.youtube.com/watch?v=BFkM9FxTP8g">link to the video </a>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894764</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894764/the-technology-blog/2025_02_13_02_48_56_a18c5bd5-53ac-4f1d-b84f-37fb4b5bdf47.mp3" length="50586658" type="audio/mpeg"/>
      <guid isPermaLink="false">71c74f6e-14e4-4d26-bb49-556b2550807d</guid>
      <itunes:duration>3158</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 Jul 2024 19:25:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c2ff8b2a17ae23f30528354abfcec32f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 197: week 1 of two for open forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 197: week 1 of two for open forum]]></itunes:title>
      <description><![CDATA[<p>We realize after the podcast was created that we did not put the file in for thanking our affiliates. This was an oversite and that should not happen again. </p>
<p><br></p>
<p>The podcast had lots of discussion though, and I hope you enjoy it.  We'll have another week of open forum, next week.  We hope you enjoy.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894766</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894766/the-technology-blog/2025_02_13_02_53_16_6bb414f1-5d71-4a0d-bd22-f1e410d3d44d.mp3" length="166972453" type="audio/mpeg"/>
      <guid isPermaLink="false">c70a49fe-1fa3-4583-b43b-22dfb7014c0e</guid>
      <itunes:duration>10425</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 27 Jun 2024 02:20:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_07c81c2203225d7d9a25c614814605c6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 195: What Are .env Files and why should I care?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 195: What Are .env Files and why should I care?]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 195 of the security box. Let's start off with a set of questions that came out of something we did not cover as part of last week's box. If you listen via the podcast, please submit your guesses before the answers are revealed.  I'll personally give you credit where credit is due, and we can work out what you will get upon correct answers.  The questions are: What 8 companies, 1 of which was part of the big ticket master breach were attacked?  What small time actor group took responsibility for these 8 company attacks?which two companies disputed the hack? Finally, what was the most recent company that came out with confirming they were part of the actors fiasco?  We also are going to cover the news, the landscape, Lastpass' recent fiasco that can happen to anyone and more.  Our topic this week will be the talking about environment files that are used to store secrets including keys, usernames and passwords.  Apparently these files, known as .env files are wide open and can be  taken for use.  Enjoy the program and thanks so much for listening!  

 Our Scam of the Week 

Kelly, formerly Kelly Services has been targeting users who know the JRN's work.  Kelly informed the JRN that this scam has been going around in this form for at least 5 months.  The first report came from TSB's participant, Preston Gaylor.  The second came from another subscriber who assists me in another capacity.  Please read <a href="https://technology.jaredrimer.net/2024/06/10/new-scam-from-work-provider-kelly-formerly-kelly-services/">this blog post titled New scam from work provider, Kelly (formerly Kelly Services) </a> for complete details on this.  We link to the official web site where you too, can alert them about this scam.  The representative informed me that they have over 500 copies of this and asked about the version that is going around.  We'll be discussing this as part of the program, don't worry!





 Our Question 

If you intend to play, please do not look at the answers given below.  We also are linking to sources of further reading too.

 Our Question 

What 8 companies, 1 of which was part of the big ticket master breach were attacked?  What small time actor group took responsibility for these 8 company attacks?which two companies disputed the hack? Finally, what was the most recent company that came out with confirming they were part of the actors fiasco? 
 The Answer: Skip if you intend to participate and win 
Answer: Snowflake, Anheuser-Busch, State Farm, Mitsubishi, Progressive, Neiman Marcus, Allstate, and Advance Auto Parts.  Progressive and Mitsubishi disputed the threat actor’s claims while Advance Auto Parts  recently came out with details of their breach.  
 Sources from the blog: 
<ul>
<li> <a href="https://technology.jaredrimer.net/2024/05/31/live-nation-confirms-breach-at-ticketmaster/">Live Nation confirms breach at Ticketmaster </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/06/07/advance-auto-parts-confirms-breach-numbers-dont-match/">Advance auto parts confirms breach, numbers don’t match </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/06/09/snowflakes-breach-may-be-bigger-than-we-think-lets-add-yet-another-company-to-the-mix/">Snowflake’s breach may be bigger than we think, let’s add yet another company to the mix </a> </li>
</ul>

The links lead to our blog, where you can read more.  



 Lastpass needs a break here, this can happen to anyone 

This can happen to anyone.  While people want to jump ship because of this most recent outage, I don't blame  them.   It turns out, it was because of their chrome extension that somehow went completely ape and could have sent a DDOS attack.  I don't want to go that far, but it was a 12-hour outage if not longer.  I recently had to sign in and I was successful, and this happened on Thursday, June 6, 2024.  <a href="https://technology.jaredrimer.net/2024/06/07/this-can-happen-to-anyone-lastpass-had-a-bad-extension-c]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894769</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894769/the-technology-blog/2025_02_13_03_00_11_ff1a04d9-29ca-4bbf-92f3-cee75c07eda3.mp3" length="292130384" type="audio/mpeg"/>
      <guid isPermaLink="false">1ddc7b4d-ae39-400e-a689-d1e90c16ec18</guid>
      <itunes:duration>18239</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 14 Jun 2024 03:10:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1eec320adc5e31fdee15dfdcaf6a565a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 194: News, notes and section 230 discussion]]></title>
      <itunes:title><![CDATA[The Security box, podcast 194: News, notes and section 230 discussion]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box podcast 194. On this podcast, we're going to talk about section 230 and its potential repeal. We've also got the news, the notes and the landscape.  True stories are also told, one dealing with crypto and one dealing with a potential job.  Running time, 4 hrs 21 minutes.  We hope that you enjoy the program as much as we have.  



 News and notes 

Here's what we're reading and potentially talking about.  This list may not all be covered, but at the same time, some folk may miss things. Some may also be blogged too, so make sure you check out the blog where its free to register and comment. 

<ul>
<li> <a href="https://www.bleepingcomputer.com/news/security/over-90-malicious-android-apps-with-55m-installs-found-on-google-play/">Over 90 malicious Android apps with 5.5M installs found on Google Play </a> </li>
<li> <a href="https://krebsonsecurity.com/2024/05/is-your-computer-part-of-the-largest-botnet-ever/">Is Your Computer Part of ‘The Largest Botnet Ever?’ </a> </li>
<li> <a href="https://krebsonsecurity.com/2024/05/treasury-sanctions-creators-of-911-s5-proxy-botnet/">Treasury Sanctions Creators of 911 S5 Proxy Botnet </a>  </li>
<li> <a href="https://cyberscoop.com/yunhe-wang-911s5-proxy-arrested/">Chinese national arrested for operating proxy service linked to billions in cybercrime </a>  </li>
<li> <a href="https://www.bleepingcomputer.com/news/security/police-seize-over-100-malware-loader-servers-arrest-four-cybercriminals-operation-endgame/#google_vignette">Police seize over 100 malware loader servers, arrest four cybercriminals </a> </li>
<li> <a href="https://www.bleepingcomputer.com/news/security/police-seize-over-100-malware-loader-servers-arrest-four-cybercriminals-operation-endgame/#google_vignette">Police seize over 100 malware loader servers, arrest four cybercriminals </a> </li>
<li> <a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2024-kb5037959-windows-11-preview-update-causes-taskbar-crashes/">Microsoft: Windows 11 preview update causes taskbar crashes </a> </li>
<li> <a href="https://www.bleepingcomputer.com/news/security/live-nation-finally-confirms-massive-ticketmaster-data-breach/">Live Nation finally confirms massive Ticketmaster data breach </a>   </li>
<li> <a href="https://www.bleepingcomputer.com/news/security/macos-version-of-elusive-lightspy-spyware-tool-discovered/">macOS version of elusive 'LightSpy' spyware tool discovered </a> </li>
<li> <a href="https://arstechnica.com/tech-policy/2024/05/tiktok-vaguely-disputes-report-that-its-making-a-us-only-app/">TikTok vaguely disputes report that it’s making a US-only app </a>  </li> 
<li> <a href="https://techcrunch.com/2024/06/03/x-tweaks-rules-to-formally-allow-adult-content/">X tweaks rules to formally allow adult content </a>  </li> 
<li> <a href="https://www.theregister.com/2024/06/03/usdod_data_dump/">Crooks threaten to leak 3B personal records 'stolen from background check firm' </a> </li>
<li> <a href="https://www.bleepingcomputer.com/news/legal/data-firm-execs-convicted-for-helping-fraudsters-target-the-elderly/">Data firm execs convicted for helping fraudsters target the elderly </a> </li>
</ul>



 Section 230 

<a href="https://arstechnica.com/tech-policy/2024/05/lawmakers-say-section-230-repeal-will-protect-children-opponents-predict-chaos/">Lawmakers say Section 230 repeal will protect children—opponents predict chaos  </a> is a two page article on the subject of section 230 and its potential update.  We'll try to do our best and give you a fair balance of both sides.  If you have not read this, what do you think?  

 Other coverage from the blog on section 230 

<ul>

<li> <a href="https://technology.jaredrimer.net/2023/05/21/section-230-is-still-valid-holds-up-for-now/">Section 230 is still valid, holds up for now </a> </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/09/any-time-the-government-comes-up-with-a-bill-critics-say-something-for-good-reason/">Any time]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894772</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894772/the-technology-blog/2025_02_13_02_53_16_2ee1623f-2b7d-465d-86bc-65d6a3d921f6.mp3" length="251694341" type="audio/mpeg"/>
      <guid isPermaLink="false">f2436a4f-19cd-4c9b-a783-b919764f475e</guid>
      <itunes:duration>15715</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 06 Jun 2024 19:28:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_13611904801de05eabd8664e5897c4d7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 193: a discussion on AI and tools for the disabled]]></title>
      <itunes:title><![CDATA[The Security box, podcast 193: a discussion on AI and tools for the disabled]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box, podcast 193. On this program, we're going to talk in an open forum about AI. 

We'll find some articles, but we aren't going to cover articles in full but in passing.  

We'll also cover the news, the landscape and more including a demo on the capital one application and virtual cards.



 Things to ponder 

<ul>
<li> Capital One has added the ability of doing virtual cards to their mobile application.  You can still use the Eno extension, but I never got that to work, so I've set up one for a demo and will be moving to merchant specific cards for better security.  </li>
<li> Have I Been Pwned has a couple of updates while Exposed doesn't.  Both sites are good for what they do, and both should be checked if you're interested. </li>
<li> Kim Komando is reporting that Vapes are being sent through the mail through secret words.  Parents, check those packages.  If an article is found on this, I'll be sure to publish it.  Still think TikTok is safe to use? </li>
</ul>



 News 

Lots of different things the news could bring up, some of which will be listed below.

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/05/28/we-found-articles-on-the-sanctions-of-proxy-911-folk/">We found articles on the sanctions of proxy 911 folk </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/28/proxy-911-just-got-sanctioned-brian-posted-on-maston/">Proxy 911 just got sanctioned, Brian posted on Maston </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/28/now-we-have-to-be-aware-of-shrinklocker/">Now, we have to be aware of … Shrinklocker </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/28/x-ai-looking-for-workers/">x.ai looking for workers </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/25/city-in-dutch-got-owned-looks-to-be-internal/">City in dutch got owned, looks to be internal </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/25/indian-man-steals-37k-may-get-20-years/">Indian man steals 37k, may get 20 years </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/24/intercontinental-to-pay-10m-fine/">Intercontinental to pay $10m fine </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/24/exposed-data-walmart-employees-exposed-in-merrill-email-leak/">Exposed data: Walmart employees exposed in Merrill email leak </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/24/patriot-cell-phone-carrier-owned/">Patriot cell phone carrier owned </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/23/t-mobile-wants-to-raise-prices-i-say-no/">T-Mobile wants to raise prices, I say no </a> (opinion piece) </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/22/actress-sues-open-ai-as-voice-is-similar-to-theirs/">Actress sues open AI as voice is similar to theirs </a> from last week's show </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/22/lockbit-taking-responsibility-of-london-drugs-case/">LockBit taking responsibility of London Drugs case </a> </li>
</ul>



 AI articles 

These are more recent AI articles, but there are plenty of others we either don't have or don't know about.  This section is going to be in open forum format.

<ul>
<li> <a href="https://cyberscoop.com/ai-companies-election-transparency/">AI companies promise to protect our elections. Will they live up to their pledges? </a> Cyberscoop </li>
<li> <a href="https://cyberscoop.com/klobuchar-ai-election-bill-senate-markup/">Three bills governing AI in elections pass Senate committee </a> Cyberscoop </li>
<li> <a href="https://www.audacy.com/knxnews/news/local/ai-gives-new-life-to-old-scam-targeting-seniors">AI gives new life to old scam targeting seniors </a> KNX 1070 97.1 FM </li>
<li><a href="https://technology.jaredrimer.net/2024/05/20/fbi-arrests-man-charged-with-generating-ai-child-abuse-material-the-first-of-its-kind/">FBI arrests man, charged with generating AI Child Abuse Mater]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894774</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894774/the-technology-blog/2025_02_13_03_00_04_9e37f791-bb08-49b0-8e3c-6a9aa596f1ab.mp3" length="205848837" type="audio/mpeg"/>
      <guid isPermaLink="false">0572fae8-ceb2-493b-9f7c-c8f8c0eaf0a0</guid>
      <itunes:duration>12852</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 30 May 2024 17:31:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6a4c666b567723a60c1535a00899370f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 192: Open Forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 192: Open Forum]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to program 192 of the security box. This week, its going to be an open forum. We'll cover the news, we'll answer any questions that people have, and we'll traverse the landscape.  No major topic, but a big piece of news about an arrest.  

 News, Notes and the landscape 

 Incognito 

The biggest news coming out of the landscape is incognito's demise  for good. the main man was arrested at a New York Airport.  If convicted, he's going to spend a lot of time in jail.  Each article is written a bit differently, and we want to be fair in our coverage and give you different perspectives.

<ul>
<li> 
<li> <a href="https://www.bleepingcomputer.com/news/security/owner-of-incognito-dark-web-drugs-market-arrested-in-new-york/#google_vignette">Owner of Incognito dark web drugs market arrested in New York  </a> Bleeping Computer </li>
<li> <a href="https://www.justice.gov/opa/pr/incognito-market-owner-arrested-operating-one-largest-illegal-narcotics-marketplaces">The Press Release from the Justice Department: “Incognito Market” Owner Arrested for Operating One of the Largest Illegal Narcotics Marketplaces on the Internet  </a> The Justice Department </li>
<li> <a href="https://arstechnica.com/tech-policy/2024/05/23-year-old-man-accused-of-running-100-million-online-narcotics-marketplace/">23-year-old man accused of running $100 million online narcotics marketplace | Ars Technica.  </a> Ars Technica </li>
</ul>

 

 AI CSAM 

This blew my mind.  I don't know about anyone else, but this was wild.  <a href="https://www.404media.co/fbi-arrests-man-for-generating-ai-child-sexual-abuse-imagery/">FBI Arrests Man For Generating AI Child Sexual Abuse Imagery  </a> comes from 404 media.  This will prove that doing something like this, even if you start with other perps will eventually get you in trouble.   



 An Arrest out of Arizona 

<a href="https://cyberscoop.com/arizona-woman-arrested-and-charged-in-north-korean-it-worker-scheme/">Arizona woman arrested and charged in North Korean IT worker scheme  </a> comes to us from Cyberscoop.  She was not alone, there's another suspect mentioned and it goes in to details on who gets what if convicted.  



 More potential news 

The following are linked from the blog.  Accompanying articles are linked within.

<ul> 
<li> <a href="https://technology.jaredrimer.net/2024/05/20/windows-11-recall-ai-coming-to-a-windows-11-near-you/">Windows 11 recall AI coming to a Windows 11 near you </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/20/ios-and-ipad-17-5-1/">IOS and Ipad 17.5.1 </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/19/putty-winscp-targeted-in-malware-campaign/">PuTTY, Winscp targeted in Malware campaign </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/16/do-you-use-quick-assist-ive-never-heard-of-it/">Do you use Quick Assist? I’ve never heard of it! </a> </li>
</ul>



 Our Things to ponder segment 

It seems as though Better Help is more in trouble than we thought.  Besides the potential breaches, we spotted a video that talks about all kinds of stuff.  Its 16 minutes, but I feel that this is of value.  <a href="https://www.youtube.com/watch?v=03CfvR0sTfo">This is the link to the Youtube Video </a> that we linked to from our blog post.  If you want to see it, you may.  This came from the mastodon account, Today I learned.  Also read: <a href="https://technology.jaredrimer.net/2023/03/07/better-help-shares-data-to-facebook/">Better help shares data to facebook </a> as this is mentioned in the video.



 Our complete moron of the podcast 

This has to be the moron of the podcast.  While you can carry around cards like drivers licenses digitlly, this guy who is named in the article did not.  He also either stopped after starting a chase, or the owner was able through the app to stop the truck.  Besides theft, the suspect has no license at all.  Nice going!  <a href="https://cybernews.com/news/stealing-tesla-cybertruck/#googl]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894776</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894776/the-technology-blog/2025_02_13_02_54_18_e59fec38-5d1f-463d-968d-0dc00f89f819.mp3" length="205848837" type="audio/mpeg"/>
      <guid isPermaLink="false">4ae0d2fc-1d93-4401-a447-ae0bb070eac6</guid>
      <itunes:duration>12852</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 22 May 2024 23:51:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_35ae315c2cd193bb26cc98be73f57999.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 191: Our Lax Damn Cybersecurity]]></title>
      <itunes:title><![CDATA[The Security box, podcast 191: Our Lax Damn Cybersecurity]]></itunes:title>
      <description><![CDATA[On podcast 187 of the security box, we covered water security and this podcast is no different. On this podcast, we're going to talk about lax our damn security is. The title of this program  Our Lax Dam Cybersecurity  is not meant to be taken as swaring as dam is defined as a stopping point for water.  Once that breaks, water can cause tons of havoc, so it is actually a good thing.  Besides this topic, we'll have our news, notes and more.  



 Things that might be discussed 

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/05/11/black-basta-breached-over-500-organizations-to-date/">Black Basta breached over 500 organizations to date </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/10/del-computers-had-a-databreach/">https://technology.jaredrimer.net/2024/05/10/del-computers-had-a-databreach/ </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/09/so-whats-going-on-with-the-vistamo-guy-and-his-sentence/">So … What’s going on with the vistamo guy and his sentence? </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/14/so-is-lockbitsupp-completely-wrong-in-him-saying-they-have-the-wrong-man/">So, is lockbitsupp completely wrong in him saying they have the wrong man? </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/13/whats-going-on-with-ascension/">What’s going on with Ascension ? </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/13/lockbit-is-still-out-there-sent-through-other-network/">Lockbit is still out there, sent through other network </a> </li>
</ul>




 Lax Dam Cybersecurity 

I thought we blogged this, but it looks like we did not.  Luckily for searching this out as I knew I had it in my inbox, the article comes from Cyberscoop.  The article is titled <a href="https://cyberscoop.com/dam-cybersecurity-ferc-congress/">Congress sounds alarm on lax dam cybersecurity  </a> which was a good one.  If you read the article, what did you think?



 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894777</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894777/the-technology-blog/2025_02_13_02_54_07_98781e20-6991-4137-b950-a22b0de23e62.mp3" length="131346212" type="audio/mpeg"/>
      <guid isPermaLink="false">27f9a354-2b98-4466-a290-e4d0f42db116</guid>
      <itunes:duration>8200</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 15 May 2024 23:30:14 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d83d5cfffd04cb323e2fab48b33722a9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 190: Is Age Verification Legal?The Security box, podcast 190: Is Age Verification Legal?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 190: Is Age Verification Legal?The Security box, podcast 190: Is Age Verification Legal?]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 190 of the security box. The big question is here on this week's podcast, and it is: "Is Age Verification legal?"

Besides finding out  the answer to this, we'll have the news, the notes and the landscape.  Hope you'll enjoy the show as much as we are bringing it to you.



 LockbitSupp identified 

Huge news coming out of the press in regards to the mastermind of Lockbit.  Don't be surprised if you find more coverage, but these are the articles from our sources.

<ul>
<li> <a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-admin-identified-sanctioned-in-us-uk-australia/">LockBit ransomware admin identified, sanctioned in US, UK, Australia </a> Bleeping Computer </li>
<li> <a href="https://cybernews.com/news/lockbit-administrator-identity-revealed/">LockBit gang leader exposed in FBI ransomware breakthrough </a> CyberNews </li>
<li> <a href="https://krebsonsecurity.com/2024/05/u-s-charges-russian-man-as-boss-of-lockbit-ransomware-group/">U.S. Charges Russian Man as Boss of LockBit Ransomware Group </a> KrebsOnSecurity </li>
<li> <a href="https://arstechnica.com/security/2024/05/the-mastermind-of-the-prolific-ransomware-group-lockbit-has-finally-been-unmasked/">Ransomware mastermind LockBitSupp reveled in his anonymity—now he’s been ID’d </a> Ars Technica </li>
</ul>

As stated, there may be more than this around the web and the JRN will be blogging two, possibly all three or more if we find them.  

In the second, we not only know who he is, but what he's charged with. At the time of writing this in to the show notes, the JRN has not read Brian's article yet and only spotted signs of it on Mastodon as he does.  



 Other Newsy things from the blog 

These items may be braught up as part of the blog and news segment.  They are in no particular order.

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/05/08/are-we-surprised-that-tiktok-will-sue-the-u-s-government/">Are we surprised that TikTok will sue the U.S. Government? </a> </li>
<li><a href="https://technology.jaredrimer.net/2024/05/06/chinese-banks-hit-again/">Chinese banks hit again </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/06/jack-dorsey-praises-twitter-for-being-freedom-technology/">Jack Dorsey praises Twitter for being “freedom technology” </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/06/fake-tech-support-scams-and-sponsored-search-results/">Fake tech support scams and sponsored search results </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/06/the-yahoo-boys-are-people-you-need-to-be-aware-of-scripts-scams-and-more-await/">The Yahoo boys are people you need to be aware of: Scripts, scams and more await </a> </li>
<li> <a href="https://technology.jaredrimer.net/2024/05/04/notice-from-dropbox/">Notice from Dropbox </a> </li>
</ul>

There may be others not listed here, and this could be a subset.  



 Is Age Verification Legal? 

This segment may contain adult themes.  According to an article that was read and blogged, age verification has been found to be legal.  With Coppa in various parts of the world, and sites that need to make sure they're dealing with adults per content law, we think that this is a clear and cut open and closed case. But how do we do this now that most do the bear minimum but yet nothing in place to verify anything entered?

For example, staff that do this show could say they're over age on a site like Live Journal when for example, the mix opened its blog there but yet the mix was not even of age.  This could be an example used.

 What to read 

<ul>
<li> <a href="https://technology.jaredrimer.net/2024/03/12/age-verification-is-lawful/">Age Verification is lawful </a> the technology blog and podcast </li>
<li> <a href="https://cybernews.com/news/age-verification-adult-sites-texas/">Court makes it clear – age verification on adult sites is constitutional  </a> Cybernews </a> </li>
</ul>

What do you think?  If this i]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894780</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894780/the-technology-blog/2025_02_13_02_53_29_5b6312a1-a821-4faa-b8a4-6cf24b69cb3a.mp3" length="181543058" type="audio/mpeg"/>
      <guid isPermaLink="false">b1fe446c-5c5c-4f55-9284-9838f7738f8c</guid>
      <itunes:duration>11334</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 08 May 2024 23:22:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2b0d4f06b2b4498abe8b6f9004085469.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 379: Xposedornot.com]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 379: Xposedornot.com]]></itunes:title>
      <description><![CDATA[missing description]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894781</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894781/the-technology-blog/2025_02_13_02_53_51_514532e3-9e75-4003-9b44-efca638dc408.mp3" length="36387518" type="audio/mpeg"/>
      <guid isPermaLink="false">aaf1a079-9075-45f4-9c93-d932264bc03f</guid>
      <itunes:duration>2271</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 May 2024 21:50:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e43a01daab29361d7f79e69c9c0b850f.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 189: eSIM and Sim Swapping]]></title>
      <itunes:title><![CDATA[TSB 189: eSIM and Sim Swapping]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to the security box, podcast 189. On this program, we're going to cover news and notes, the landscape and esim whcih may or may not be as secure as you think. 

 ESIM and sim swapping 

ESIM  is relatively new, but one of my buddies has it.  He says its much better since you don't need a Sim card.  But is it?

The blog post is titled <a href="https://technology.jaredrimer.net/2024/03/15/e-sim-is-not-as-safe-as-you-think/">E-sim is not as safe as you think </a> and the article is titled <a href="https://www.bleepingcomputer.com/news/security/sim-swappers-hijacking-phone-numbers-in-esim-attacks/">SIM swappers hijacking phone numbers in eSIM attacks. </a>

We'll take the most important paragraphs I think, but the article is linked here.  And now that we have the RSS working to show HTML, you can now follow along through RSS too.  Woohoo! 

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894782</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894782/the-technology-blog/2025_02_13_02_56_50_bffa8854-27ce-4582-9c33-a29eeb17648e.mp3" length="184361186" type="audio/mpeg"/>
      <guid isPermaLink="false">08b4b042-85ff-4691-ba0d-bc637db0c0cc</guid>
      <itunes:duration>11510</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 02 May 2024 00:44:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_42b6d88d1066305da547f1d520d231c5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 188: Incogni]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 188: Incogni]]></itunes:title>
      <description><![CDATA[Incogni claims that it can remove your personal info. How? We'll talk about it with an article that talked about them and I'll talk about where the JRN first heard of this valuable service. We'll also talk about the news, any notes, we've got corrections to xposedornot.com and the work I'm doing with them as testing is going well, and more.

 Xposed or not 

I'm not employed at Xposed, but I found some thing that got fixed.

<ul>
<li> The table as well as tree view of the exposures page not properly giving correct dates, I.E. the table was showing 2023 items while the default view was not quite showing current dated items added to the site. </li>
<li> We learn about the news page and its purpose while asking questions. </li>
<li> We found a very interesting post about data exposures and their categories.  At the time of writing, I don't have a blog post on this yet. </li>
</ul>



 Incogni 

I earlier blogged <a href="https://technology.jaredrimer.net/2024/03/20/there-are-many-data-brokers-only-one-company-that-might-help/">There are many data brokers, only one company that might help </a> which links to an article titled <a href="https://cybernews.com/editorial/data-brokers-profit-from-your-data/">Your data, their profit: the data brokers you know nothing about  </a> goes in to what's going on and who might be able to help.  Yes, Incogni might just be the one that might do the job.  Step on forward and learn.

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  



 Internet Radio affiliates airing our program 

Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894783</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894783/the-technology-blog/2025_02_13_02_55_06_2a2d9418-fcbe-41f1-b4b8-51545aa4ea91.mp3" length="232494435" type="audio/mpeg"/>
      <guid isPermaLink="false">5c6ad779-320b-485a-9431-b0aba57a2158</guid>
      <itunes:duration>14516</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 24 Apr 2024 23:06:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e2586be7e36f1b7ba2c4ef6f39dae6bd.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 187: What's going on with our drinking water?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 187: What's going on with our drinking water?]]></itunes:title>
      <description><![CDATA[<p>Hello everyone, welcome to program number 187 of the security box. On this program, we're going to talk about our drinking water. No, not the fact that it could taste bad or that it is the best water ever, we'll  talk about the security aspect of where our drinking water comes from.  Besides that, the news, the notes and the landscape. Remember to contact us with your questions, comments or concerns.  If we don't know, we've got people that do, so get those questions in.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Open forum: A New Service </h4></p>
<p><br></p>
<p>Recently, the Jared Rimer Network discovered a service in which we are happy to use.  While <a href="http://www.haveibeenpwned.com">haveibeenpwned.com </a> is good, I do find some things that don't work well accessibly.  While I got the domains to work, and those instructions were easy to follow, I did have issues with the service I'm about to recommend.  I got it to work and it is more accessible.  Even the exposed breaches may not be that extensive, both services get their breaches through verification.  To learn more about the service Exposed or not, please view the latest blog post <a href="https://technology.jaredrimer.net/2024/04/16/we-have-a-new-service-up-accessible-too/">We have a new service up, accessible too </a> for complete details.  The service is spelled xposedornot.  Drop the E.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Some of the newsy items </h4></p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/04/16/unconfirmed-trust-wallet-could-be-at-risk-with-a-zero-day/">Unconfirmed, trust wallet could be at risk with a zero day </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/04/16/bot-attacks-as-a-top-threat-this-year/">Bot attacks as a top threat this year </a> was supposed to be posted earlier but it missed its schedule </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/04/16/sans-news-bites-for-april-16-2024/">Sans News Bites for April 16, 2024 </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/04/11/lawfirms-now-have-ai-generated-lawyers/">Lawfirms now have AI Generated lawyers? </a> </li></p>
<p></ul></p>
<p><br></p>
<p>Some may bring these up, but may bring other things as well.  We'll have to see.  Keep on reading!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Topic: Our Drinking Water </h4></p>
<p><br></p>
<p>I've never really liked the taste of water.  Especially from our faucets.  But this podcast isn't  talking about whether we like water, which we're told we should drink to keep ourselves healthy.  </p>
<p><br></p>
<p>I know, I know, I'm just as guilty as the rest when it comes to that.  But this podcast isn't about whether we like the stuff, its about the security of how it gets to us.  We know it goes through pipes, but do we honestly know how it gets to those pipes to how we drink it, cook with it, or use it in our coffee?  There's an elaborate  system, but is it as secure as it can be?  </p>
<p><br></p>
<p>Apparently, hackers can get in to these systems, and this is where we could be in some real trouble.  The latest blog post I penned on this subject is titled <a href="https://technology.jaredrimer.net/2024/03/23/hackers-interrupting-critical-drinking-water/">Hackers interrupting critical drinking water </a> which links to the CyberNews article <a href="https://cybernews.com/security/us-officials-warn-hackers-target-drinking-water/">US officials warn of hackers disrupting the “critical lifeline” of drinking water  </a> which was an interesting read.  </p>
<p><br></p>
<p>If you search for water by itself, you'll find other blogs like:</p>
<p><ul></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/11/cyber-attack-cuts-off-water-for-2-days/">Cyber Attack cuts off Water for 2 days </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/12/05/iran-hits-pennsylvania-water-fascility/">Iran hits Pennsylvania water ]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894785</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894785/the-technology-blog/2025_02_13_02_55_52_bf41bca6-59cd-4309-8f39-613fae6a846a.mp3" length="210677921" type="audio/mpeg"/>
      <guid isPermaLink="false">2437248a-2bbd-4e40-9164-1f52f9e1311a</guid>
      <itunes:duration>13154</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 18 Apr 2024 01:28:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d886bb7d552afc355b59127da6147747.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 186: Tycoon 2FA bypasses 2fa of major providers]]></title>
      <itunes:title><![CDATA[TSB podcast 186: Tycoon 2FA bypasses 2fa of major providers]]></itunes:title>
      <description><![CDATA[missing description]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894786</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894786/the-technology-blog/2025_02_13_02_59_21_008983c7-5ee0-4635-82b1-72be5dfd0f8b.mp3" length="187670031" type="audio/mpeg"/>
      <guid isPermaLink="false">5bc26ac5-4609-4411-88df-ab0cc4222139</guid>
      <itunes:duration>11717</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 11 Apr 2024 17:24:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_40aa04942e9faf70f4e1c7b3a36d3aff.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 185: AcidRain and AcidPour]]></title>
      <itunes:title><![CDATA[TSB podcast 185: AcidRain and AcidPour]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 185. We have several things in Erata that we'll read, one coming in just before I was supposed to leave although that trip got postponed. While that thing we'll read is a week old, its still valuable.  We also put in the Facebook thing I saw prior which might get people to chuckle.  Our topic today is one dealing with Russia, and another Wiper Malware.  The article we take from is from CyberNews, and we also blogged the thing.  We'll have news, notes and more.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Common Vector Tactics </h4></p>
<p><br></p>
<p>While I still seem to be a week behind, I'm going to sites on my own to find things of value so I can try to keep up.  </p>
<p><br></p>
<p>In my perusal of Mastodon, I found this, and thought it should be posted.  <a href="https://technology.jaredrimer.net/2024/04/01/here-are-common-vector-attacks-behind-data-breaches/">Here are common vector attacks behind data breaches </a> is the blog post, where Diva on Breaches takes us through <u> 7 </u> different items in her post.  </p>
<p><br></p>
<p>This is also in our show notes and will be read out for those who listen but do not read the blog on a regular.  Thanks Devanand  for continuing to share the knowledge we can share.  We recently read one of her recent posts in a prior podcast.</p>
<p><br></p>
<p>Knowledge is power!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our Topic: Acid Rain and Acid Pour </h4></p>
<p><br></p>
<p>Our blog post <a href="https://technology.jaredrimer.net/2024/03/27/new-malware-acidpour/">New Malware, AcidPour </a>  has a link to the Cybernews article.  As usual, we'll take some of the paragraphs to aid in the discussion.If you just want the article without going to the blog, no problem.  <a href="https://cybernews.com/security/russia-dangerous-wiper-acidpour/">Russia unleashes dangerous new wiper  </a> is the article.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894789</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894789/the-technology-blog/2025_02_13_03_02_05_e961feb2-e787-4c39-90b0-25da73972852.mp3" length="226465142" type="audio/mpeg"/>
      <guid isPermaLink="false">93fccf99-be3e-4caa-87fe-cfc9c2d4b1c6</guid>
      <itunes:duration>14139</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 04 Apr 2024 00:27:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9238917561d01eb8ee87e292457765e6.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 184: PixPirate]]></title>
      <itunes:title><![CDATA[TSB 184: PixPirate]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security Box, podcast 184. On this edition of the podcast, we're going to talk about PixPirate. Its an Android application known as a Trojan.  It is hard to detect, and its hard to get rid of.  Besides this, we'll cover the news, notes and and questions and answers that we may need to take care of.</p>
<p><br></p>
<p><h4> PixPirate </h4></p>
<p><br></p>
<p>This time, we're talking about a piece of malware known as a <u> trojan. </u>  The article comes from Bleeping Computer and is titled <a href="https://www.bleepingcomputer.com/news/security/pixpirate-android-malware-uses-new-tactic-to-hide-on-phones/">PixPirate Android malware uses new tactic to hide on phones. </a> If you want to read my pick apart on this, <a href="https://technology.jaredrimer.net/2024/03/15/pixpirate-uses-new-tactic-to-hide-on-phone/">this is the blog post that'll let you do that.  Its titled: PixPirate uses new tactic to hide on phone. </a></p>
<p><br></p>
<p>What do you think of the topic?  Have you heard of it before?</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894790</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894790/the-technology-blog/2025_02_13_02_51_31_af504c54-ddeb-42a4-a898-2fd296b75775.mp3" length="197871824" type="audio/mpeg"/>
      <guid isPermaLink="false">ebc37985-75a2-4b84-92b7-7c440cfe978d</guid>
      <itunes:duration>12354</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 27 Mar 2024 23:04:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ed68ce68ae8db3c5ab69192874f12465.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 183: An update on Pig Butchering]]></title>
      <itunes:title><![CDATA[TSB podcast 183: An update on Pig Butchering]]></itunes:title>
      <description><![CDATA[<p>After a week off, we're back with another podcast. We hope you enjoy!</p>
<p><br></p>
<p>Hello everyone, welcome to the Security Box, podcast 183. On this program, we're going to catch you up on the landscape from the last couple of weeks. We've also got an update on what's going on with our favorite topic called Pig Butchering.  Of course we'll take your comments as well and of course those questions.  Thanks so much for listening!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our topic: What's going on with Pig Butchering? </h4></p>
<p><br></p>
<p>Pig Butchering is not necessarily going anywhere, but there have been some studies and money recovered.  The article <a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-moves-to-recover-23-million-from-pig-butchers-on-binance/">US moves to recover $2.3 million from “pig butchers” on Binance  </a> is the latest article we've seen on the topic.  </p>
<p><br></p>
<p>Of course, we had a topic but seemed to have lost it, but that's what happens some times.  This article will be taken apart to help the discussion and of course comments and questions are welcome.  </p>
<p><br></p>
<p>As a side note, we can probably tie this in to Phishing as a whole, as the deployment of the beginning of how this works is an email, text, or other platform of communication.  What are your thoughts on that?  We even talk about it as part of Throwback Saturdaynight for the 16th in our first segment.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894793</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894793/the-technology-blog/2025_02_13_02_54_44_493c2f17-61d4-4215-919d-7f905668e07a.mp3" length="163469439" type="audio/mpeg"/>
      <guid isPermaLink="false">58036f23-e139-4abe-aaf2-54ff29ce8438</guid>
      <itunes:duration>10206</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 20 Mar 2024 21:36:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fe1eff46822e64cd35ef74d09906e937.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB podcast 182: Savvy Seahorse]]></title>
      <itunes:title><![CDATA[TSB podcast 182: Savvy Seahorse]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box, podcast 182. On this podcast, besides the news and notes of the week, we're going to learn about a new potential threat by a new potential actor called Savvy Seahorse. If you've read the blog, you'll already know, but if you only listen to the podcast, this is going to change the way malware is delivered.  Of course we'll see what our participants want to talk about as well.</p>
<p><br></p>
<p><h4> Our Topic, Savvy Seahorse </h4></p>
<p><br></p>
<p>The article comes to us by our newest partner, Cybernews.  Its titled <a href="https://cybernews.com/news/threat-actor-phishing-facebook-spoofing/">Threat actor uses Facebook to lure victims, sends cash to Russia  </a> and covers Savvy Seahorse.  This is going to be something we'll need to track, and we'll explain it all.  </p>
<p><br></p>
<p>Let's just say that it uses the Cname aspect of domain hosting.  Stay tuned!</p>
<p><br></p>
<p>If you want to read our blog post on it, <a href="https://technology.jaredrimer.net/2024/02/28/savvy-seahorse-uses-facebook-for-investment-scams/">Here is that post titled Savvy Seahorse uses facebook for investment scams. </a></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894795</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894795/the-technology-blog/2025_02_13_02_58_49_3aa89019-60b9-46e9-9828-150f0c84eb54.mp3" length="207960081" type="audio/mpeg"/>
      <guid isPermaLink="false">0a1fcc4e-0d79-4037-b422-0e5dfd799ced</guid>
      <itunes:duration>12984</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 07 Mar 2024 15:20:41 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7292eac0a8d921d1fd0ec710d9a33dc7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 181: Phishing Sites impersonating social media]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 181: Phishing Sites impersonating social media]]></itunes:title>
      <description><![CDATA[<p>Hello everyone, welcome to the Security Box, podcast 181. In Q4 of 2023, Phishlabs is reporting that a record of phishing sites impersonate social media to target victims. Question for the listener, what do you think you should look for when you get communication that talks about social media before you click, tap, double tap or press enter on a keyboard? We'll have the news and landscape as well as your comments and concerns.  We hope you enjoy the show!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> News, notes and the landscape </h4></p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/02/25/you-have-to-be-kidding-me-1-year-later-and-the-dod-is-sending-out-notifications/">You have to be kidding me, 1 year later and the DOD is sending out notifications? </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/02/25/2-5-million-private-plane-owners-breached/">2.5 million private plane owners breached </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/02/24/911-proxy-is-back-new-name-cloud-router-still-dangerous/">911 proxy is back, new name: cloud router: still dangerous </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/02/24/avast-caught-collecting-lots-of-info-selling-it-to-other-companies/">Avast caught collecting lots of info? Selling it to other companies? </a> </li></p>
<p></ul></p>
<p><br></p>
<p>There are other smaller news items, but these might be the bigger ones.  If yours isn't on this list, what fancies you? <a href="http://www.jaredrimer.net/contact.htm">Contact me through jaredrimer.net </a>  and let me know.  You can also send things to ponder files which can be played as well.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4>  Our Topic: Phishing Sites up and impersonating social media </h4></p>
<p><br></p>
<p><a href="https://www.phishlabs.com/blog/record-number-phishing-sites-impersonate-social-media-target-victims-q4">Record Number of Phishing Sites Impersonate Social Media to Target Victims in Q4 </a> comes to us from Phishlabs this week.  Let us know what you think good, bad or indifferent.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894798</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894798/the-technology-blog/2025_02_13_02_58_44_f9eea627-301d-4169-a61b-90ebc30b952e.mp3" length="178046988" type="audio/mpeg"/>
      <guid isPermaLink="false">ead8dd46-141d-4e2e-b607-233693745bb2</guid>
      <itunes:duration>11116</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 29 Feb 2024 01:38:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2030cb2e53f1e10413164877d30456a0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 180: Phishing as a Service]]></title>
      <itunes:title><![CDATA[The Security box, podcast 180: Phishing as a Service]]></itunes:title>
      <description><![CDATA[<p>Hello everyone, welcome to the security box, podcast 180. On this podcast, Phishlabs will guide us through something I don't think we have ever seen. It talks about a service that is a web host service, but it is a completely different type of web host.  They didn't classify it as bulletproof hosting, but something called phishing as a service.  Two different companies are mentioned.  Besides that, we've got news, notes, the landscape and your thoughts. Thanks so much for listening!</p>
<p><br></p>
<p><br></p>
<p><br></p>
<p><h4> Big News of the week, Lockbit </h4></p>
<p><br></p>
<p>The big news it seems that is coming out this week is talking about Lockbit.  Looks like their infrastructure has been taken over by all kinds of law enforcement  partners from all around the world.  While we don't intend to give you an exhaustive list, here is some of the coverage we know about.</p>
<p><br></p>
<p><ul></p>
<p><li> The Cyberwire Daily: February 20, 2024 will talk about this in their news notes for the episode. <a href="http://www.thecyberwire.com">Here's a link to the Cyberwire. </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/02/20/lockbit-your-time-is-up-now-its-time-to-go-find-real-work/">Lockbit, your time is up! Now its time to go find real work </a> is my blog post, leading to <a href="https://cybernews.com/news/lockbit-disrupted-operation-cronos/">LockBit cartel disrupted “at every level” – Europol  </a> if you don't want to read mine. I am not offended. I do take this article apart though, so give mine a read if you wish. </li></p>
<p><li> <a href="https://krebsonsecurity.com/2024/02/feds-seize-lockbit-ransomware-websites-offer-decryption-tools-troll-affiliates/">Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates </a> comes directly from Brian Krebs. At the time of Writeup, the JRN has not read this yet. </li></p>
<p></ul></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our topic: Phishing as a service </h4></p>
<p><br></p>
<p>This week, we're going to talk about Phishing as a service.  It is a new concept, and you can probably say it is similar to Ransomware as a service.  This week's article is titled <a href="https://www.phishlabs.com/blog/phishing-service-profile-labhost-threat-actor-group">Phishing-as-a-Service Profile: LabHost Threat Actor Group </a> and it covers two different hosts.  This, will get interesting.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894800</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894800/the-technology-blog/2025_02_13_03_01_13_66ddebc9-cc32-4a54-8cf2-d5243d1391eb.mp3" length="178707527" type="audio/mpeg"/>
      <guid isPermaLink="false">3862c2fe-57d8-4506-ad65-4dc814f3a462</guid>
      <itunes:duration>11157</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 22 Feb 2024 00:58:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4053b5003107f26120c3c6c15af1da0b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 179: Romance Scams]]></title>
      <itunes:title><![CDATA[The Security box, podcast 179: Romance Scams]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box. This is program 179. This time, we'll venture off the path a bit and talk a little bit about romance scams. Instead of using the article as a guide, we'll talk about it in more general terms. Did you know that Valentines Day is one of the biggest times for this type of scam?  Besides that, we'll have news, notes and the landscape as we always do.  Thanks for listening and make it a great day!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our topic: romance scams  </h4></p>
<p><br></p>
<p>With Valentines coming, romance scams are going to be on the rise.  <a href="https://technology.jaredrimer.net/2024/02/07/with-valentines-day-coming-its-time-for-the-romance-scams-in-full-force/">With Valentines Day coming, its time for the romance scams in full force </a> is a blog post leading to the article we'll use for this discussion although we won't use it like we normally do.  We'll use it as a starting point.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894802</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894802/the-technology-blog/2025_02_13_03_03_18_73d7d135-c707-4dd6-b544-516d24a72ecb.mp3" length="219530473" type="audio/mpeg"/>
      <guid isPermaLink="false">85f684e2-80dc-4b09-81c5-16abf3abefa3</guid>
      <itunes:duration>13706</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 14 Feb 2024 23:49:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_063befdb9a8f0abd27518fbb9c25ba86.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 178: Let's Unravel the Threats of Social Engineering]]></title>
      <itunes:title><![CDATA[The Security box, podcast 178: Let's Unravel the Threats of Social Engineering]]></itunes:title>
      <description><![CDATA[<p>Hello everyone! Welcome to the security box, podcast 178. On this podcast, we're going to talk about the landscape, the news, and the crazy.  We are also going to talk about the threats of Social Engineering as well.  We give you the best blog posts of the week as well.  We hope you enjoy the program, and make it a great day!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our topic and accompanying true story </h4></p>
<p><br></p>
<p>Today, Lastpass will lead the discussion with <a href="http://blog.lastpass.com/2024/01/unraveling-the-threats-of-social-engineering/">Unraveling the Threats of Social Engineering </a> which was a great find.  I don't know about you guys, but we need to be on guard and ready as much as we can.  We can all be phished, scammed and Cory Doctorow's article is linked to <a href="https://technology.jaredrimer.net/2024/02/05/even-the-best-can-be-scammed-check-this-article-out/">Even the Best can be Scammed, check this article out </a> which I wrote in my response to the article.  So since we can all be targets, it starts with knowing what to look for by reading Lastpass's article and learning what we could do differently and learning by the other true story.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
<p><br></p>
<p>For full show notes including things talked about, please see the blog.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894804</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894804/the-technology-blog/2025_02_13_02_58_22_4bbc84d1-1019-4830-a16c-6e7403ef620d.mp3" length="225660916" type="audio/mpeg"/>
      <guid isPermaLink="false">1ed70de4-7049-4ce8-a8f2-660366ebf370</guid>
      <itunes:duration>14089</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 08 Feb 2024 00:47:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7fe72919b69b642b3212cc53975abbbc.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 177: passwords, Oh My! The Perils of Employee Password Misuse]]></title>
      <itunes:title><![CDATA[The Security box, podcast 177: passwords, Oh My! The Perils of Employee Password Misuse]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 177 of the Security Box. On this podcast, we seem to be on a password discussion, as lots of articles have come out in regards to the subject. Our topic even will include talking about passwords.  We'll also have things to ponder, possibly some morons, and a great time as always!</p>
<p><br></p>
<p>These notes are annotated for RSS. Full notes on the blog.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our moron(s) </h4></p>
<p><br></p>
<p>Mercedes, its your turn.  Apparently, you had something open on your  Github account.  The thing is, you're not the first car company to have issues, although you never said that there wasn't a problem, you did fix it with Github assisting as well.  <a href="https://technology.jaredrimer.net/2024/01/27/a-password-is-mistakenly-published-source-code-blueprints-and-more-once-at-risk/">A password is mistakenly published, source code, blueprints and more once at risk </a> is the blog post where you can read more about this one.  Good job, guys! </p>
<p><br></p>
<p>Microsoft, you aught to be ashamed of yourself.  You decided to give a test account admin privelages, then let the account go to legacy status. Then, because its an administrative account, someone finds it and abuses your systems.  Great job!  Ars Technica has the complete details. <a href="https://arstechnica.com/?p=1999478">In major gaffe, hacked Microsoft test account was assigned admin privileges </a> is the article.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Password reuse </h4></p>
<p><br></p>
<p>We haven't blogged this at the time of these notes, but this is a good topic.  <a href="http://blog.lastpass.com/2024/01/the-perils-of-employee-password-reuse/">The Perils of Employee Password Reuse </a> comes to us from Lastpass and Amber Steel.  Let us know what you think.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894806</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894806/the-technology-blog/2025_02_13_03_04_10_302a465d-5496-4a17-8cd8-d89e64fb86c7.mp3" length="225660916" type="audio/mpeg"/>
      <guid isPermaLink="false">6c6555c5-dfe2-475a-9774-167c19ef0389</guid>
      <itunes:duration>14089</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 31 Jan 2024 23:49:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_43650e6ff2968ee4d9f82d4ce42dde69.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 176: open forum, and one of the biggest breaches we've seen to date]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 176: open forum, and one of the biggest breaches we've seen to date]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box, podcast 176. This podcast is mainly going to be an open forum, but we will have some topics coming. We might have some morons, some things to ponder, and whatever is on the minds of those that come on live.  </p>
<p><br></p>
<p><h4> Things that might be talked about </h4></p>
<p><br></p>
<p>This is not meant to be exhaustive, but the following blog posts may be talked about in no particular order.  Some may be talked about but not listed here, so check the blog for complete details.</p>
<p><br></p>
<p><ul title="things that might be talked about"></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/23/16-6-million-people-affected-no-info-on-what-was-taken/">16.6 million people affected, no info on what was taken </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/22/breach-forums-maintainer-gets-time-served-never-spent-time-in-jail-lots-of-restrictions-placed-on-him/">Breach forums maintainer gets time served, never spent time in jail, lots of restrictions placed on him </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/21/trezor-gets-owned-for-a-second-time/">Trezor gets owned for a second time </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/20/15-million-trello-users-apparently-breached/">15 million Trello users apparently breached </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/20/ta866-is-back-to-sending-out-email/">TA866 is back to sending out email </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/19/new-sets-of-data-including-have-i-been-pwned-data-out-in-the-wild/">New sets of data, including have I been pwned data out in the wild </a> (naz.api breach) </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/23/sans-news-bites-for-january-19-2024/">Sans news bites for January 19, 2024 </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/17/three-are-three-domains-that-i-wouldnt-buy/">Three are three domains that I wouldn’t buy </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2024/01/24/sans-news-bites-for-january-23-2024/">Sans news bites for January 23, 2024 </a> </li></p>
<p></ul></p>
<p><br></p>
<p><hr></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894808</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894808/the-technology-blog/2025_02_13_03_06_33_87cf5eae-a97c-4b41-9d24-34b9358f4fdd.mp3" length="187122475" type="audio/mpeg"/>
      <guid isPermaLink="false">56853e30-2dcb-48e4-876e-f6b8a63a0cd3</guid>
      <itunes:duration>11683</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 25 Jan 2024 01:58:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b8160197b2bee20914fbfe3b2bc15d2e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 175: Threats targeting the airline industry through the dark web]]></title>
      <itunes:title><![CDATA[The Security box, podcast 175: Threats targeting the airline industry through the dark web]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box, podcast 175. I've been out sick, and now we're back to bring you what we wanted to bring you this past week. We've got news, notes, the landscape, two morons, things to ponder  and a topic dealing with dark web threats targeting the airline industry.  Thanks so much for listening and make it a great day!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our Morons </h4></p>
<p><br></p>
<p>We have to start with the moron who thought it would be a good idea that a database be left wide open for people to peruse the data.  This database is a Mongo DB database, its similar to SQL where data is held and can be gotten at when needed.  While this is a real estate app, this was definitely not done with security in mind.  <blockquote> <a href="https://technology.jaredrimer.net/2024/01/11/mongo-db-database-open-everyone-using-app-affected/">blog post </a> </blockquote></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>If we've not had enough with Chat GPT, this aught to stand your hair right up.  This data breaches article talks about how Chat GPT was made to give out ransomware software and now 4 are arrested.  This aught to get more interesting.  <blockquote> <a href="https://www.databreaches.net/chatgpt-aided-ransomware-in-china-results-in-four-arrests-as-ai-raises-cybersecurity-concerns/">ChatGPT-aided ransomware in China results in four arrests as AI raises cybersecurity concerns </a> </blockquote></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Things to ponder </h4></p>
<p><br></p>
<p>Carrying over some items that we just will run as part of this week's program, we've got some doozies.  We'll blog anything we didn't yack about as I continue to recover.  </p>
<p><br></p>
<p><ul></p>
<p><li> 23 and me must be wanting to play the blame game.  They claim that their incident is our fault, and they then are going to fix whatever security holes were caused by whathappened?  Yes, we are at fault with reusable passwords, but you don't have two-factor on any accounts, so its a double whammy and part of it is yours.  Here's <a href="https://technology.jaredrimer.net/2023/12/09/weve-got-an-update-on-23-and-me-and-its-still-not-great-over-there/">my blog post from 2023 </a> about this particular problem.  I don't think its gotten any better there and they haven't really  been better. </li></p>
<p><li> Sans News Bites is back, and I still need to blog some others.  My goal was to get two done, but I have the one from the 5th of January. As we move forward from my illness, we'll record them as we get them.  Check the blog for ones not covered in audio.  <a href="https://technology.jaredrimer.net/2024/01/06/sans-news-bites-for-january-5-2024/">Here's my blog post for Jan 5th </a> for those who want to find it easily.  </li></p>
<p><li> We're interested in audio dealing with predictions and Trend Micro has one for their predictions.  This comes from their trend talks threats podcast series on their youtube  channel.  </li></p>
<p><li> We also have top breaches that I found from Have I been Poned that I recorded before my illness took over.  This list changes, and we'll bring this to you each week.  </li></p>
<p></ul></p>
<p><br></p>
<p>Find something that you want to talk about?  Use a file sharing service to get us the audio and you'll be featured.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our topic </h4></p>
<p><br></p>
<p>Our topic this week comes to us from Phishlabs.  <a href="https://www.phishlabs.com/blog/dark-web-threats-targeting-the-airline-industry/">Dark Web Threats Targeting the Airline Industry </a> is the article and we'll step through this one.  Hope you'll find it of interest as everyone travels.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894810</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894810/the-technology-blog/2025_02_13_02_56_04_4543f57a-49dc-4254-afda-2c9d42fe4dee.mp3" length="175247286" type="audio/mpeg"/>
      <guid isPermaLink="false">a7191e1e-61c4-4e6c-b717-1f0f84536c4b</guid>
      <itunes:duration>10941</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 17 Jan 2024 22:24:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_40450da2acd1a55e024026e7068aecdd.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 174 for January 3, 2023]]></title>
      <itunes:title><![CDATA[The Security box, podcast 174 for January 3, 2023]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 174. On this podcast, we're just traversing the landscape and some of our longer posts and things that caught our attention. In most ways, this isn't complete, but just some. Terry, Nick and I take you along for the ride.  Enjoy!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894813</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894813/the-technology-blog/2025_02_13_02_58_43_2ba29bc9-e43f-44c1-9dca-d4c88f198cc9.mp3" length="134076340" type="audio/mpeg"/>
      <guid isPermaLink="false">908ed045-c39f-4120-829d-ece344d00500</guid>
      <itunes:duration>8371</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 03 Jan 2024 22:13:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c8fd37e69d36d984034a4d46fb604e2c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 173: HHS not doing anything except for ransomware]]></title>
      <itunes:title><![CDATA[The Security box, podcast 173: HHS not doing anything except for ransomware]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to podcast 173. This is going to be the last podcast of the year as it comes to live programming. Don't worry, we'll continue to blog things of importance, and I'll look through our podcast notations for some good things and put out a final podcast of the year.  Our next live program will be on January 3, 2024.  On this edition of the program, we'll have our news and notes segments, the moron, two things to ponder which are extended versions and of course our topic dealing with the HHS and their fine on an agency who got breached.  </p>
<p><br></p>
<p><h4> Our Things to Ponder </h4></p>
<p><br></p>
<p>We have two things to ponder segments and both are extended versions and information packed.  The first one  is being cross posted through this podcast and our Security Hour which may air it any time it wishes.  The segment talks about 1 in 4 people falling for scams and getting in to trouble.  Besides falling for scams, there is one thing most people don't do and it'll shock you.  <a href="https://technology.jaredrimer.net/2023/12/07/1-in-4-fall-for-scams/">Read More on the tech blog with the blog post titled 1 in 4 fall for scams </a> to learn what is going on and what is recommended.  The second talks about a very interesting email I got and how it could actually fool someone.  At recording time, the domain was unreachable, although the group was given a different file which could not be resurrected for airplay here.  <a href="https://technology.jaredrimer.net/2023/12/11/did-you-think-you-were-going-to-get-me-youve-got-to-try-harder/">Here is the blog post titled Did you think you were going to get me? You’ve got to try harder </a> if you  wish to read it.  It too, will be crossposted, but I didn't mention that here. </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> This is a complete set of morons </h4></p>
<p><br></p>
<p>Our set of morons are completely interesting.  They thought they'd steal a car, taking everything from one person, but yet doing something that they weren't expecting.  These guys were expecting an Iphone, found an Android and handed it back.  They still took the car and possibly other items.  <a href="https://technology.jaredrimer.net/2023/12/08/thieves-steal-android-hand-it-back/">Read the blog post </a> with the accompanying article.  You won't believe this one.  Or will you?</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our Topic: HHS settles with ransomware case </h4></p>
<p><br></p>
<p>You must be kidding me, right?  Lots of breaches, ransomware cases and the like yet the HHS doesn't do much to enforce anything in my opinion.  We have several articles on the HHS settling in certain cases like the Ransomware we're talking about today, or the HIPPA violations in another case, but most of the time its unchecked.  </p>
<p><br></p>
<p>This week, <a href="https://technology.jaredrimer.net/2023/11/09/hhs-announces-settlement-on-ransomware-case/">HHS announces settlement on ransomware case </a> is our article.  It is a good start, but as we've said, there have been a lot more.  Let us know what you think.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894814</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894814/the-technology-blog/2025_02_13_03_04_34_7632102e-311f-4349-8576-a78ec1da2e9d.mp3" length="174061123" type="audio/mpeg"/>
      <guid isPermaLink="false">e04a12f5-bd1b-4691-b614-01d6023fdb63</guid>
      <itunes:duration>10867</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 14 Dec 2023 03:58:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_579c4563998ad48c6c66c2791204e8c3.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 172: The Q3 Payload report]]></title>
      <itunes:title><![CDATA[The Security box, podcast 172: The Q3 Payload report]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the Security Box, podcast 172. On this podcast, we've got two different morons, a look at the landscape, a few things to ponder and our topic dealing with the Q3 report on the landscape which includes QBot and other variants out there causing havoc.</p>
<p><br></p>
<p>For things to ponder, check <a href="http://technology.jaredrimer.net">the blog. </a> </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our Morons </h4></p>
<p><br></p>
<p>These are the morons of the podcast. </p>
<p><br></p>
<p><ul title="Morons"></p>
<p><li> Montana, you have got to be kidding me. We talked about this in May of this year, and now, it seems you lose.  Seems like your law is unconstitutional and it questions what you're trying to do.  While we support you, you've really got to prove why Montana should be allowed to ban the app as just banning it doesn't fix the overall problem.  As we've asked, how are you going to enforce it?  <a href="https://technology.jaredrimer.net/2023/12/02/montana-loses-battle-to-block-tiktok-for-now-still-thinks-they-have-a-case/">Here is the blog post titled Montana Loses battle to block Tiktok for now … still thinks they have a case </a> which links to prior coverage and arguments. Have fun with this one. </li></p>
<p><li> We have two Ukraine stories in recent posts, but one of these is our moron.  <a href="https://technology.jaredrimer.net/2023/12/02/ukrainian-gets-8-years/">Ukrainian gets 8 years </a> argues that 8 years is still not enough for stealing and selling personally identifiable information on the darkweb and profiting from it.  At least this suspect got caught, and we can celebrate just a little bit.  The JRN did not copy his name. </li></p>
<p></ul></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Topic: The Q3 Payload report </h4></p>
<p><br></p>
<p>On this week's program, the Q3 Payload report is going to be the topic.  Looks like QBot is still at the top, even though they were dismantled.  This was quite interesting.  There are two different Rats that are part of the problem now, and these aren't rodants. These are Trojans.  In this terminology, Rat stands for Remote Access Trojan.  Phishlabs has this article and its titled <a href="https://www.phishlabs.com/blog/q3-payload-report/">Q3 Payload Report </a> and you should read it in full if you wish to do so.  You'll thank us later.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894816</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894816/the-technology-blog/2025_02_13_03_00_03_37a3cf43-011f-41fa-a917-c9e440fa70d8.mp3" length="164225417" type="audio/mpeg"/>
      <guid isPermaLink="false">8017dd05-899e-48ae-900e-8db1d91315bd</guid>
      <itunes:duration>10253</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 07 Dec 2023 06:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f017f149eeb3200a4ca5d5f6140e0137.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 171: The top level domain that harbors a malicious shortener is ...]]></title>
      <itunes:title><![CDATA[The Security box, podcast 171: The top level domain that harbors a malicious shortener is ...]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security box, podcast 171. We hope that each and every one of you have had a happy Thanksgiving and have recharged your batteries. On this edition, we're making it official and am bringing back the things to ponder.  We'll explain what we're going to do and we put it in practice last podcast.  If these things to ponder have blog posts, we'll link them from right within the program's show notes so you can read what we're talking about.  We'll also have news, notes, any moron of the podcast  and our topic talking about URL shorteners and a recent trend with them.  We hope you enjoy the show as much as we have bringing the show for you!</p>
<p><br></p>
<p>For full notations, please see <a href="http://www.jaredtech.help">The Blog </a> as we'll link to other things we don't have room here to cover.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> The top level domain that harbors a malicious shortener is ... </h4></p>
<p><br></p>
<p>According to a recent article from Brian Krebs, the most prolific domain now that has a URL shortening service that pumps out scams, phishing and just all around bad is the TLD that belongs to the United States.  Read my thoughts and find a link to the article right here.  <a href="https://technology.jaredrimer.net/2023/11/04/the-top-level-domain-for-the-united-states-now-harbors-malicious-url-shortening-service/">The Top level domain for the United States now harbors malicious URL shortening service </a> is the article title, and I hope you give it a gander.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894818</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894818/the-technology-blog/2025_02_13_03_00_32_2688c392-e362-4679-8038-843688268443.mp3" length="207214286" type="audio/mpeg"/>
      <guid isPermaLink="false">4abd6934-0eec-42f7-a7c1-d819dfa3b775</guid>
      <itunes:duration>12937</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 30 Nov 2023 09:30:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c03d4b7f55e7a7ee65935b8ad85ee483.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 170: Password managers]]></title>
      <itunes:title><![CDATA[The Security box, podcast 170: Password managers]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the podcast. We're talking about password managers in a big way today. Links to the major managers are given.  Its not a complete list, and there may be others I'm not aware of that may be trusted or we don't know much about.    We bring back things to ponder in a different way and you'll get a taste of this in this podcast.  I hope you enjoy the program as much as we have bringing it together for you.  Happy holidays from all of us at the JRN!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Things to ponder </h4></p>
<p><br></p>
<p>Today, we've got two for you and they're both blog posts.</p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/11/20/how-much-does-social-media-cost-underground/">How much does social media cost underground? </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/11/20/cleanup-on-isle-1-really-experian-you-still-can-sign-up-and-take-ones-account-over/">Cleanup on Isle 1! Really Experian? You still can sign up and take one’s account over? </a> </li></p>
<p></ul></p>
<p><br></p>
<p>Want your opinion known in this segment?  Send an audio file!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Password managers </h4></p>
<p><br></p>
<p>Below, please find the list of managers we talked about.  Again, this isn't a complete list.  Make sure you listen to the first segment which explains why we decided to put this podcast together.  </p>
<p><ul></p>
<p><li> <a href="http://www.1password.com">1password </a> </li></p>
<p><li> <a href="http://www.lastpass.com">Lastpass </a> </li></p>
<p><li> <a href="https://keepass.com/">Keepass </a> </li></p>
<p></ul></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Internet Radio affiliates airing our program </h4></p>
<p><br></p>
<p>Our Internet Radio stations that carry us include <a href="http://bluestreakradio.com">Blue Streak Radio </a> and <a href="http://internationalfriendsnetwork.godaddysites.com">International Friends Radio Network.  </a> The program is also carried live through <a href="http://magnatune.jaredrimer.net">the Independent Channel </a> which is part of <a href="http://www.986themix.com">98.6 the mix, KKMX, International. </a> If you want to carry us, please use <a href="http://www.jaredrimer.net">the Jared Rimer Network site </a> to do that and let me know about your station.  Please allow 3-4 hours for airplay, although we try to go 3 hours for this program.  Thanks so much!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894821</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894821/the-technology-blog/2025_02_13_03_07_48_0f7837b8-f13c-485e-9e1b-d3d792426b46.mp3" length="82221304" type="audio/mpeg"/>
      <guid isPermaLink="false">6412c19f-9770-4607-a21e-ce7646be7688</guid>
      <itunes:duration>5133</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Nov 2023 20:45:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6530f814ea0d830f3d415b3c97b34c20.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 168: Threat Actir %g1 Profile %g Strox as a service]]></title>
      <itunes:title><![CDATA[The Security box, podcast 168: Threat Actir %g1 Profile %g Strox as a service]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box, podcast 168. On this program, we'll see if we've got any morons, a service that is a phishing service, news, notes and more.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> The "You Stupid fuck" awards of the podcast </h4></p>
<p><br></p>
<p>If this isn't a moron, I don't know what is. The blog post is titled <a href="https://technology.jaredrimer.net/2023/11/04/tech-ceo-sentenced-to-ip-addressing-scheme/">Tech CEO sentenced to IP addressing scheme </a> which is coming from our blog.  It leads to the article we spotted talking about this guy.  We may have talked about Micfo LLC before, but this is probably the end of this.  Problem: the JRN thinks that 5 years isn't going to be enough and isn't a harsh sentence for the crime.  Please sound off if you believe that this is the case.  </p>
<p><br></p>
<p>-----------------------------</p>
<p><br></p>
<p>If you are prone to email scams, you might want to pay attention to this.  One of my MENVI staff was smart enough to contact me to ask if they needed to do what the action in the email indicated.  The bad news is that the site truly wasn't MENVI's, it looked nasty and never redirected as I thought it might.  <a href="https://technology.jaredrimer.net/2023/11/02/an-email-pretending-to-come-from-cpanel-isnt-cpanel-can-you-smell-trouble/">An email pretending to come from Cpanel, isn’t cpanel … can you smell trouble? </a> has the complete details of this one.  Sound off if you've seen something similar to this and whether you fell for it or not.  Its OK if you did. There should be no shame!  </p>
<p><br></p>
<p>----------------------------------------------------------</p>
<p><br></p>
<p>Solar Winds is getting sued.  Seems as though they were never as secure as they should have been, and the CEO among others are getting sued.  We thought that something was wrong, seeing how we later found out about how that compromise was completely done.  Whether they were compromised by Russia or not isn't the point of the lawsuit, says the article, but boy ... this is probably as bad as you get when it comes to a supply chain attack.  Here is the <a href="https://technology.jaredrimer.net/2023/11/04/sec-sues-solar-winds-for-fraud-says-they-are-secure-and-the-charges-are-baseless/">blog post titled SEC sues Solar Winds for fraud, says they are secure and the charges are baseless </a> for your perusal.  It can't get any better than this, can it?</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4>  Our topic: Phishing as a service </h4></p>
<p><br></p>
<p>Today, we are going to have a very interesting topic that might be known later as a threat.  This comes from our friends at Phishlabs.  The article is titled <a href="https://www.phishlabs.com/blog/threat-actor-profile-strox-phishing-as-a-service/">Threat Actor Profile: Strox Phishing-as-a-Service </a> and it was a good one.  We'll break this down, as phishing as a service now takes hold.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><br></p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894823</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894823/the-technology-blog/2025_02_13_03_09_45_da9201e9-2378-4bda-a37b-f5719c9d976e.mp3" length="184212217" type="audio/mpeg"/>
      <guid isPermaLink="false">a66a5368-f6f8-4820-ba82-d0692710017d</guid>
      <itunes:duration>11501</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 09 Nov 2023 02:13:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_979c3e086c2eaedc1a26366619abb691.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 378: A True Story of a potential scam]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 378: A True Story of a potential scam]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to another technology podcast. On this podcast, we're going to listen to a story on how someone who is blind was looking for something and how he got taken for $1,000. It isn't as simple as it could be, seeing how he used the Twitter web site and we know how that could be since Twitter, know known as X, got rid of their accessibility team.  </p>
<p><br></p>
<p>Back in August, I blogged <a href="https://technology.jaredrimer.net/2023/08/02/this-is-a-true-story-of-a-blind-man-losing-to-a-scam-this-is-a-must-read/">This is a true story of a blind man losing to a scam … this is a must read </a> which links to a Wired article.  The podcast you're about to hear comes from Discarded, a proofpoint podcast.  It aired in October of this yeqar and I recently listened to it.  </p>
<p><br></p>
<p>For those who are Apple, here's a link to the podcast.  <a href="https://podcasts.apple.com/us/podcast/discarded-tales-from-the-threat-research-trenches/id1612506550">DISCARDED: Tales From the Threat Research TrenchesProofpoint  </a></p>
<p><br></p>
<p>The podcast is also available through Overcast if you use that.  </p>
<p><br></p>
<p>I hope people find this story of interest, and thanks so much for listening!  We'll see you next time.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894824</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894824/the-technology-blog/2025_02_13_03_03_16_75b0ba46-65e5-4f7f-b94c-96bc14cae67b.mp3" length="31050423" type="audio/mpeg"/>
      <guid isPermaLink="false">155f0c1f-94d0-4ef4-9f16-c335e799bb55</guid>
      <itunes:duration>1938</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Nov 2023 02:09:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f79f300b09f1fc91948873767fd2b097.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 377: Bec trends and impersonation webinar]]></title>
      <itunes:title><![CDATA[Tech podcast 377: Bec trends and impersonation webinar]]></itunes:title>
      <description><![CDATA[<p>This webinar in July covered email impersonation and BEC things for 2023. Hope you enjoy this webinar from Fortra.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894826</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894826/the-technology-blog/2025_02_13_02_59_21_64619d54-97fb-4d27-b19a-9f6854b7900a.mp3" length="50035789" type="audio/mpeg"/>
      <guid isPermaLink="false">c84ef35c-4c5d-4076-bb18-7a144190be20</guid>
      <itunes:duration>3123</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 Nov 2023 19:52:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dae7172553d96358c8332fb47e3a2fb9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 376: impersonation lookalike webinar]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 376: impersonation lookalike webinar]]></itunes:title>
      <description><![CDATA[<p>Domains. They're everywhere! In podcast 376 of the tech podcast, we're going back to a webinar that talks about impersonation and look-alike domains.  This still happens today, and while it is over 2 months old, it is still valuable.  I hope you enjoy the program for this time, and we'll have another webinar next time talking about BEC attacks and domains and email and the like.  I hope you'll enjoy.  Thanks, Fortra/Phishlabs for putting this together.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894827</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894827/the-technology-blog/2025_02_13_02_57_19_e68520cf-cb96-4102-8804-9f574fa7178a.mp3" length="62363274" type="audio/mpeg"/>
      <guid isPermaLink="false">ff3b43bc-f61f-4899-8b60-9023794db358</guid>
      <itunes:duration>3893</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 27 Oct 2023 21:03:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c6258fc09c68f06d068dd999aaabe02e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 375: Chat GPT, the good, the bad and the ugly]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 375: Chat GPT, the good, the bad and the ugly]]></itunes:title>
      <description><![CDATA[<p>While I love webinars, we must be mindful that they aren't mind and must give presenters the opportunity to distribute them. I believe this is Phishlab's webinar, although I could be wrong. Sorry about that if I am.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>Welcome to podcast 375.  On this podcast, we're going to give you a webinar.  This webinar is dealing with Chat GPT.  You'll learn the good, the bad and the ugly.  It was a very interesting webinar.  </p>
<p><br></p>
<p>Per usual, we give the presenters an opportunity to get it through their network.  I believe this is a Phishlabs webinar but i could be wrong.  </p>
<p><br></p>
<p>If I am, I apologize.  </p>
<p><br></p>
<p>We hope you enjoy the program as much as I did listening to it and bringing it to you now.  Contact info at the beginning.</p>
<p><br></p>
<p>Sorry for any tech issue sounding, I'm getting it rectified.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894829</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894829/the-technology-blog/2025_02_13_03_08_21_e2844224-dec2-441d-bbb3-98d99d4a55c8.mp3" length="63599020" type="audio/mpeg"/>
      <guid isPermaLink="false">77ce24ba-d94e-4ba8-804e-5f77877b2d51</guid>
      <itunes:duration>3970</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 10 Oct 2023 00:35:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f07f65359bb52652cfb031f346570f00.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 163: NCSAM week 1: passwords and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 163: NCSAM week 1: passwords and more]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the Security Box, podcast 163. On this episode, we go through the news, talk about a very interesting interview and then tackle our first topic of NCSA<M whoicjh is passwords.</p>
<p><br></p>
<p>We talk briefly about <a href="https://technology.jaredrimer.net/2023/10/01/ncsam-week-1-how-about-them-passwords/">this blog post about passwords, </a> the reason why it isn't a good idea to share passwords <blockquote> <a href="https://technology.jaredrimer.net/2023/10/02/is-it-a-good-idea-to-share-passwords-not-so-fast/">blog post </a> </blockquote> and a bit about Multi Factor authentication. <a href="https://technology.jaredrimer.net/2023/10/02/more-about-multi-factor-authentication/">This blog post </a> will talk more about multi factor authentication.  </p>
<p><br></p>
<p>You may see terms like two-step, two-factor or multi factor.  All pretty much are the same thing.  </p>
<p><br></p>
<p>We hope you enjoy the program as much as we have bringing it together for you, and make it a great day!</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894830</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894830/the-technology-blog/2025_02_13_03_10_08_55027db1-a1ed-4e12-9195-a029b7b10848.mp3" length="170508314" type="audio/mpeg"/>
      <guid isPermaLink="false">8e9534e5-f91d-43ab-9b81-63f0a0d14262</guid>
      <itunes:duration>10645</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 05 Oct 2023 17:19:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_07d90fb49e98ec2e330b7b39f19f5e37.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 162: open forum, week 2]]></title>
      <itunes:title><![CDATA[The Security box, podcast 162: open forum, week 2]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 162. On this edition of the podcast, we'll run through the blog and list, anything else on audience insights and more. This is week 2 of the open forum.  Hope you enjoy the program!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894832</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894832/the-technology-blog/2025_02_13_03_02_22_3380c260-b860-4eaf-aaf4-5eed58465144.mp3" length="155623188" type="audio/mpeg"/>
      <guid isPermaLink="false">82b9714b-273b-46f5-8bcf-d9c8f59de7d9</guid>
      <itunes:duration>9716</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Fri, 29 Sep 2023 16:20:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5a3b58f41b6c5aeed82560ebccd86dfc.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 161: Week one of Open Forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 161: Week one of Open Forum]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 161. On this podcast, we're covering a few notations of the recently released IOS 17, tons of articles from the blog, and having ourselves an open forum. We hope that you enjoy the program as much as we did putting it together for you.  </p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894834</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894834/the-technology-blog/2025_02_13_03_03_27_8860e849-4398-4982-9d9c-fdeb47d4b946.mp3" length="155451670" type="audio/mpeg"/>
      <guid isPermaLink="false">c3347feb-d519-4c94-b5f9-7a1526828105</guid>
      <itunes:duration>9705</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 21 Sep 2023 20:44:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fe45c0a79deb2be41f022c0c3402f233.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 160: Freenom sued, drops free domains, more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 160: Freenom sued, drops free domains, more]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to podcast 160. On this week's edition, we'll reveal the sudden absence of TSB, we'll have news and notes from around the landscape that folks may have read, and aa very interesting topic that deals with Freenom and the phishing landscape.  Apparently, Facebook is in this too.  Of course, we'll have any questions answered that people have too.  Thanks for your support of TSB and thanks so much for listening!</p>
<p><br></p>
<p><h4> The Absense of TSB </h4></p>
<p><br></p>
<p>The sudden departure of TSB was not one the JRN was necessarily prepared for.  While we have from time to time rescheduled TSB, and/or took specific holidays off like the Christmas break, Thanksgiving week, and possibly others, this was so sudden.  </p>
<p><br></p>
<p>While working on TSB's release and catching up its <a href="http://www.emailhostsecurity.com/tsb.php">EMHS page </a>  we got a message on Dice World.  While that wasn't out of the ordinary, as I have gotten messages on Dice World before, the source and what the message contained was one of shock and grave concern.  </p>
<p><br></p>
<p>The short version is that the JRN's MENVI helper, Janet Quam, passed away on the 30th of the month of August.  While I have been told numerous things, a letter which I published on September 10th goes in to what Janet did with the network from various podcasts which don't exist anymore, to tech skills and a willingness to learn.  </p>
<p><br></p>
<p>There was no health related stuff discussed except to state that we were aware of health concerns.  To read the letter, please <a href="https://technology.jaredrimer.net/2023/09/10/a-death-across-the-network-heres-a-letter/">read the blog post titled A death across the network, here’s a letter. </a></p>
<p><br></p>
<p>It links to a Youtube copy of the funeral.  MENVI's links page also has a link to the Obituary.  We thank you for your support!  A song appropriate will be played at the end of the program when we play music.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Meta, Freenom and phishing domains </h4></p>
<p><br></p>
<p>Our topic comes to us today from an article which was published to Krebs on Security on 5/31.  Its titled <a href="https://krebsonsecurity.com/2023/05/phishing-domains-tanked-after-meta-sued-freenom/">Phishing Domains Tanked After Meta Sued Freenom. </a> As we've talked about on Throwback, we've now got other issues because of this suit, and other top level domains that are now taking what the free domains did.  We'll make sure to bring this up.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894836</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894836/the-technology-blog/2025_02_13_03_00_20_3e4f39ac-7808-4a76-8f8b-beb5a58ae2f3.mp3" length="112764745" type="audio/mpeg"/>
      <guid isPermaLink="false">624727e8-1ba0-4f3b-9189-a83ca506f3fc</guid>
      <itunes:duration>7040</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 14 Sep 2023 00:12:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e47eb4766b2404224b541f6cfe221af2.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 159: Fraudulent activity, Retail and the dark web]]></title>
      <itunes:title><![CDATA[The Security box, podcast 159: Fraudulent activity, Retail and the dark web]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 159. On this podcast, we're going to have a two-part article discussion dealing with fraudulent activity when it comes to retail and the dark web.  This came to us via Phishlabs.  Besides that, we may have some stupid fucks to talk about, the landscape as usual, and your comments and questions if any.  </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> The Stupid Fuck award </h4,></p>
<p><br></p>
<p>I found an article I posted to the blog on August 30th that talks about the U.K. wanting to ban IOS updates unless its approved.  Like that's going to solve anything except problems for us useers who may either travel to the UK or live there.  <a href="https://technology.jaredrimer.net/2023/08/30/heres-the-latest-banning-an-entire-update-at-wil/">Here's the blog post I wrote </a> that posted before the show.  Good job, UK government for earning the stupid fuck award.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Fraudulent Activity on the dark web with retail </h4></p>
<p><br></p>
<p>This is a two part article coming to us from Phishlabs.  </p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://www.phishlabs.com/blog/top-fraudulent-activity-targeting-retail-on-the-dark-web/">Top Fraudulent Activity Targeting Retail on the Dark Web </a> </li></p>
<p><li> <a href="https://www.phishlabs.com/blog/top-fraudulent-activity-targeting-retail-on-the-dark-web-part-two/">Top Fraudulent Activity Targeting Retail on the Dark Web – Part Two </a> </li></p>
<p></ul></p>
<p><br></p>
<p><br></p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894838</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894838/the-technology-blog/2025_02_13_03_11_48_425522f3-b184-42d9-809e-e44837f5bd85.mp3" length="159451818" type="audio/mpeg"/>
      <guid isPermaLink="false">3d51c08d-ac12-498d-8b5e-882a9203383e</guid>
      <itunes:duration>9955</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 30 Aug 2023 22:08:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9408f68d8268a892ec2e0350cfa0fb18.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 158: The 1.3B Facebook fine]]></title>
      <itunes:title><![CDATA[The Security box, podcast 158: The 1.3B Facebook fine]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 158 of the Security Box. On today's podcast, we've got at least one moron, we've got an interesting topic that deals with Facebook getting fined, again, and of course we'll cover the landscape and what has been read and blogged as of late. </p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> The You Stupid Fuck award section </h4></p>
<p><ol></p>
<p><li> Who the hell is Global phishing 16 service? Well, someone or multiple someones have been picked up.  <a href="https://krebsonsecurity.com/2023/08/karma-catches-up-to-global-phishing-service-16shop/">Karma Catches Up to Global Phishing Service 16Shop </a> comes to us from Krebs on Security and was quite an interesting read.  According to Krebs, this outfit has been around since 2017 and really had a name for itself when it came to having people pay on time, making sure their tools were not given to anyone who did not pay and more.  While the concept was novel, people got caught, so please enjoy your stupid fuck award.  </li></p>
<p><li> Nice to see some arrests of a couple dozen more stupid fucks in this one.  <a href="https://cyberscoop.com/africa-cybercrime-operation-interpol/">Two dozen arrested, hundreds of malicious IPs taken down in African cybercrime operation </a> comes to us from Cyberscoop.  While the article isn't long, we now learn there is a new threat that knows what they're doing.  Better read this one! </li></p>
<p></ol></p>
<p><hr></p>
<p><h4> Topic: The 1.3 Billion dollar fine and what it means for privacy regulation </h4></p>
<p><br></p>
<p>The article we're going to take from is an article we posted back in May.  The title of this article is <a href="https://cyberscoop.com/eu-fine-meta-privacy-global-internet/">What the record-breaking $1.3 billion Meta fine means for the US-EU clash over spying programs </a> and it comes from Cyberscoop.  </p>
<p><br></p>
<p>I guess we'll have to see what happens with this, as I don't think we'll be done with this yet.  If there are any updates, we'll be posting these updates to our list and blog where applicable.</p>
<p><hr></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894840</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894840/the-technology-blog/2025_02_13_03_13_43_9ce53165-7b21-4caa-ad0b-a1e3024e64cb.mp3" length="156755415" type="audio/mpeg"/>
      <guid isPermaLink="false">e58b0ec4-58b7-4ed0-9472-cbc97be22dd5</guid>
      <itunes:duration>9787</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 24 Aug 2023 17:40:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_cfd1132e2f3e02bfed1f89b8fd5bfd38.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 157: A Different type of Ransomware Demand]]></title>
      <itunes:title><![CDATA[The Security box, podcast 157: A Different type of Ransomware Demand]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 157. This week, we ay be talking about a very interesting topic coming out of connecticut which might or might be a moron. We'll talk about other news and notes from the landscape, and yes, today's topic is on ransomware groups and one which says you should pay the money to charity instead of the group itself.</p>
<p><br></p>
<p><h4> Morons of the podcast </h4></p>
<p><br></p>
<p>We are going to link to the stories that deal with our moron(s) of the podcast.  </p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://www.databreaches.net/10-people-including-16-year-old-youth-arrested-for-suspected-involvement-in-malware-scams/">10 people, including 16-year-old youth arrested for suspected involvement in malware scams </a> Databreaches </li></p>
<p><li> <a href="https://www.databreaches.net/five-arrested-in-poland-for-running-bulletproof-hosting-service-for-cybercrime-gangs-europol/">Five arrested in Poland for running bulletproof hosting service for cybercrime gangs — Europol </a> databreaches </li></p>
<p><li> <a href="https://www.databreaches.net/florida-healthy-kids-notified-by-maximus-of-moveit-breach/">Florida Healthy Kids notified by Maximus of MOVEit breach </a> databreaches </li></p>
<p><li> <a href="https://krebsonsecurity.com/2023/08/diligere-equity-invest-are-new-firms-of-u-k-con-man/">Diligere, Equity-Invest Are New Firms of U.K. Con Man </a> Krebs On Security </li></p>
<p></ul></p>
<p><br></p>
<p>Florida Healthy Kids is a very interesting story, mainly because of who they are partnering with.  I guess we'll see what happens with them.  </p>
<p><br></p>
<p><h4> Ransomware group says: Pay a Charity </h4></p>
<p><br></p>
<p>Today's topic comes to us from Cyberscoop way back in May.  I've not seen another group do this, and I think its a one of a kind deal.  I wish I were on that charity list, although I don't take crypto, but proof of donation would all that it would be.</p>
<p><br></p>
<p>Today's article is titled <a href="https://cyberscoop.com/ransomware-charity-malaslocker/">A different kind of ransomware demand: Donate to charity to get your data back </a> which should be read just the same.  If someone you know was hit by this group, did they get their files back?</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894841</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894841/the-technology-blog/2025_02_13_03_01_45_c77fe011-24f4-48fc-8178-dabc2aa82b96.mp3" length="153683202" type="audio/mpeg"/>
      <guid isPermaLink="false">7ca01843-9a9d-4358-a4ea-73419ab82923</guid>
      <itunes:duration>9595</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 17 Aug 2023 21:09:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_24ef3ac763c5873286967c271977fa37.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 156: What have we learned from the Russia/Ukraine war and how to protect ourselves?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 156: What have we learned from the Russia/Ukraine war and how to protect ourselves?]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the Security Box. This is program number 156. On this episode of the program, we're going to talk about a very interesting article that was published back in April on what we've learned about stopping Russia's hackers since the war has started.  Also, this program will have news, notes, the landscape and much more.</p>
<p><br></p>
<p><h4> Morons of thde podcast </h4></p>
<p><br></p>
<p>The following two articles are related and one may have more than the other.  Is possible sentencing guidelines enough that fit the crimes?</p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://cyberscoop.com/nyc-couple-guilty-bitfinex-hack/">NYC couple pleaded guilty to money laundering in Bitfinex hack </a> Cyberscoop </a> </li></p>
<p><li> <a href="https://www.databreaches.net/husband-and-wife-plead-guilty-to-money-laundering-conspiracy-involving-the-hack-and-theft-of-billions-in-cryptocurrency/">Husband and Wife Plead Guilty to Money Laundering Conspiracy Involving the Hack and Theft of Billions in Cryptocurrency </a> databreaches.net </li></p>
<p></ul></p>
<p><br></p>
<p><br></p>
<p><h4> Topic: What we've learned from the war on Ukraine </h4></p>
<p><br></p>
<p>This is an April article titled <a href="https://cyberscoop.com/russian-hackers-cyberwar-ukraine/">What we know about Russian hackers — and how to stop them — after a year of cyberwar in Ukraine </a> coming to us from Cyberscoop.  </p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894843</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894843/the-technology-blog/2025_02_13_03_00_01_40f79559-646f-4f46-ad8d-6e5f5fe3e616.mp3" length="139023443" type="audio/mpeg"/>
      <guid isPermaLink="false">ef6014bd-4200-4a47-a3fe-f46fe44996a1</guid>
      <itunes:duration>8680</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 10 Aug 2023 00:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2548b28d3c8de8640ba6b863cbfffea3.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 155: What's going on with age Verification?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 155: What's going on with age Verification?]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security box, podcast 155. On this program, we've got an update to Age Verification which we've not seen any update since. This Verge article may be something that could be of interest if it turns out to be true.  We'll also talk about the news and notes from the landscape and much more.</p>
<p><br></p>
<p><h4> What's going on with Age Verification? </h4></p>
<p><br></p>
<p>We've covered age verification through the years, and <a href="https://technology.jaredrimer.net/2023/05/15/weve-got-an-update-on-age-verification/">this blog post from May 2023 </a> covers the Verge's article in which we're going to take from.  <a href="https://www.theverge.com/23721306/online-age-verification-privacy-laws-child-safety">This is their article titled Online age verification is coming, and privacy is on the chopping block  </a> which I link to in my post.  What do you guys think?</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894845</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894845/the-technology-blog/2025_02_13_03_00_38_63ef3c97-61ce-40c5-a0f3-0a60aabfd83b.mp3" length="175536736" type="audio/mpeg"/>
      <guid isPermaLink="false">68e358d0-bad0-4cfd-89c1-5df2ae3a962b</guid>
      <itunes:duration>10959</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Thu, 03 Aug 2023 16:03:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_bc28299ff6ba0ef69f547f8689a58b71.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 153: 13 DDoS for Hire services shut down]]></title>
      <itunes:title><![CDATA[The security box, podcast 153: 13 DDoS for Hire services shut down]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to program 154. On this edition of the program, come with us for some news and notes, a recollection of someone who can change after making mistakes, and a topic talking about DDoS for hire services that have been shut down within recent times which could be a good thing. </p>
<p><br></p>
<p><h4> A Note on a passing of a recent Security Expert </h4></p>
<p><br></p>
<p>Kevin Mitnick recently passed away on July 16, 2023.  He did have an interesting career, a criminal in his early years to a security consultant after the fact.  </p>
<p><br></p>
<p>Brian Krebs sent the news through on Mastodon, and we <a href="https://technology.jaredrimer.net/2023/07/20/8766/">blogged about it </a> on the same day ... July 20, 2023.  </p>
<p><br></p>
<p>Below, please find the books Kevin wrote.  Note that the blog post does mention these and what is available also on BARD.  I attended one of his webinars that KnowBe4 put on and it was excellent!</p>
<p><br></p>
<p><h5> The books </h5></p>
<p><br></p>
<p><img src="http://www.emailhostsecurity.com/books-clipart-sm.png" alt="picture of multiple colored books in clipart form."></p>
<p><br></p>
<p><ul title="author"></p>
<p><li> Kevin Mitnick, Steve Wozniak and William L. Simon </li></p>
<p><ul title="books"></p>
<p><li> <a href="https://www.amazon.com/Ghost-Wires-Adventures-Worlds-Wanted-ebook/dp/B0047Y0F0K/ref=sr_1_1?crid=18GSRMHKT9GEA&keywords=Ghost+in+the+wires&qid=1678812371&s=digital-text&sprefix=ghost+in+the+wires%2Cdigital-text%2C333&sr=1-1">Ghost in the Wires: My Adventures as the World's Most Wanted Hacker </a> </li></p>
<p><li> <a href="https://www.amazon.com/Art-Deception-Controlling-Element-Security-ebook/dp/B006BBZHAK/ref=sr_1_1?crid=2FLJFRO6QG53&keywords=The+art+of+deception&qid=1678812655&s=digital-text&sprefix=the+art+of+deception%2Cdigital-text%2C327&sr=1-1">The Art of Deception: Controlling the Human Element of Security  </a> </li></p>
<p><li> <a href="https://www.amazon.com/Art-Intrusion-Exploits-Intruders-Deceivers-ebook/dp/B000S1M0DG/ref=sr_1_1?crid=25TSUEGPWT076&keywords=The+art+of+intrusion&qid=1678812922&s=digital-text&sprefix=the+art+of+intrusion%2Cdigital-text%2C349&sr=1-1">The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers  1st Edition </a>  </li></p>
<p></ul></p>
<p><li> Kevin Mitnick and Mikko Hypponnen </li></p>
<p><ul title="books"></p>
<p><li> <a href="https://www.amazon.com/Art-Invisibility-Worlds-Teaches-Brother-ebook/dp/B01GZY28CW/ref=sr_1_1?crid=3UORMRA09DJCW&keywords=The+Art+of+Invisibility&qid=1678813081&s=digital-text&sprefix=the+art+of+invisibility%2Cdigital-text%2C286&sr=1-1">The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data  </a> </li></p>
<p></ul></p>
<p></ul></p>
<p><br></p>
<p><h4> DDos for hire services shut down </h4></p>
<p><br></p>
<p>We blogged about this on the blog, and now its time for it to be talked about.  This is a Krebs on Security article titled <a href="https://krebsonsecurity.com/2023/05/feds-take-down-13-more-ddos-for-hire-services/">Feds Take Down 13 More DDoS-for-Hire Services </a> which I found was quite good.  Let's see what you think and our contact info will be given throughout the program.</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894846</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894846/the-technology-blog/2025_02_13_03_02_31_8e2d9eaa-1d86-49a9-a97a-ee5a0af9a0fa.mp3" length="144896837" type="audio/mpeg"/>
      <guid isPermaLink="false">f1a0593d-8d56-4280-992c-fd31e7cbf169</guid>
      <itunes:duration>9046</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Wed, 26 Jul 2023 21:42:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7a885c2770c48462e8caa3c27470679c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 153: Bould Spy]]></title>
      <itunes:title><![CDATA[The Security box, podcast 153: Bould Spy]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the Security box. This is program 153 and on this edition of the program, we're going to talk about a potential new threat that we might need to learn about. We'll also have potential morons that has crossed our desk, news and notes from around the landscape and more.</p>
<p><br></p>
<p><h4> If you don't read anything else, you should read this </h4></p>
<p><br></p>
<p><a href="https://technology.jaredrimer.net/2023/07/18/think-im-harping-too-much-on-checking-your-stuff-heres-why-you-really-should-this-is-a-true-story/">Think I’m harping too much on checking your stuff? Here’s why you really should … this is a true story </a>  shouldbe read.  It links to a file which will only be available for a limited time which has the story. This came from Cybercrime radio and thanks to DJ Terry for giving us a heads up on this one.  Now people should be happy that I harp on making sure that you are as safe and secure as possible.  Thank me later!</p>
<p><br></p>
<p><hr></p>
<p><h4> A Data Leak that went absolutely correct </h4></p>
<p><br></p>
<p>There's a difference between a data leak and a breach.  A leak may in most parts be an accident, where a breach was intentional.  My blog post <a href="https://technology.jaredrimer.net/2023/07/18/data-leak-at-virus-total-was-only-a-subset-data-removed/">Data Leak at Virus Total was only a subset, data removed </a> has a link to the story.  Let's just say that Google did everything as right as they could.  Once notified, they removed said data an	d launched an investigation on how the info got on the popular AntiVirus scanning application.  You can't have it any other way.  If a mistake happens, fix it as quickly as possible!  </p>
<p><br></p>
<p><hr></p>
<p><h4> Our Morons </h4></p>
<p><br></p>
<p>Our first moron today comes from a company called HikVision.  <a href="https://technology.jaredrimer.net/2023/07/15/use-hikvision-cameras-you-might-want-to-be-made-aware-of-this/">This blog post titled: Use Hikvision cameras? You might want to be made aware of this </a> goes in to the fact that this company just doesn't understand what might be going on with their network and their devices.  Having QR codes to basicly log in to the camera yields <u> very interesting results. </u>  Better read the accompanying article for more.  You might want to be sitting down for this one.  </p>
<p><hr></p>
<p>Second: From Cyber Crime radio: Magaine: Bangladesh Data Leak Exposes 50M Citizens. This is the topic for their July 13th airing and this has to be a complete joke.  We'll play this file as part of the program.</p>
<p><hr></p>
<p><h4> Our topic </h4></p>
<p><br></p>
<p><a href="https://technology.jaredrimer.net/2023/05/01/move-out-the-way-bold-spy-is-right-there-with-spy-tools-like-pegasus/">Move out the way … Bold Spy is right there with spy tools like Pegasus </a> is the tech blog where you'll find commentary and an article that talks about something called <u> Bold Spy. </u>  Its got tools that others are using and possibly more.  Feel the threat yet?</p>
<p><br></p>
<p><hr></p>
<p><h4> Finally an extra </h4></p>
<p><br></p>
<p>Did you read <a href="https://technology.jaredrimer.net/2023/07/18/think-im-harping-too-much-on-checking-your-stuff-heres-why-you-really-should-this-is-a-true-story/">Think I’m harping too much on checking your stuff? Here’s why you really should … this is a true story </a> yet?  As an extra, we play the audio podcast from <a href="http://www.cybercrime.radio">CyberCrime Radio </a> which sparked the blog post.  This is of course within the last music set.  Listen to the Cybercrime Radio piece, it really hit home on why this accompanying blog post was written.  </p>
<p><br></p>
<p><br></p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894848</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894848/the-technology-blog/2025_02_13_03_08_14_0a858f31-a188-4568-81f1-27a0cf2224b3.mp3" length="216498475" type="audio/mpeg"/>
      <guid isPermaLink="false">5d338c7e-ad34-461a-9a3d-71894420e6a0</guid>
      <itunes:duration>13517</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Jul 2023 22:33:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5063b9f542cbe477273367fd309a0e10.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast podcast 374: Adnroid accessibility discussion]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast podcast 374: Adnroid accessibility discussion]]></itunes:title>
      <description><![CDATA[<p>On this podcast, a great video that was posted to Mastodon talking about what's coming to Android in 2023. But then I have questions dealin with the abuse of accessibility tools. Using Yellow Camera as an example, are these changes meant that people might be safer if they make a mistake? Contact info at the end. Thanks for listening!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894849</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894849/the-technology-blog/2025_02_13_03_06_04_0e1bd0b1-5afb-45e0-bae8-74d7938c008d.mp3" length="41516411" type="audio/mpeg"/>
      <guid isPermaLink="false">40e58cb8-e72e-457e-81a0-969182c11ce5</guid>
      <itunes:duration>2592</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 18 Jul 2023 18:39:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4adcac0ae5ec2a8e49d81d2cfe72c219.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 152: our three year anniversary]]></title>
      <itunes:title><![CDATA[The Security box, podcast 152: our three year anniversary]]></itunes:title>
      <description><![CDATA[<p>On this edition of the program, we've got an open forum of topics. Lots of them have been covered through the years while others have been covered on the blog or TSB's email list. We hope that you enjoy the program as much as we put this together for you. See you next time!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894852</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894852/the-technology-blog/2025_02_13_03_09_10_de5ebd37-3961-4422-ad9f-6ca4ac0df464.mp3" length="195758140" type="audio/mpeg"/>
      <guid isPermaLink="false">65742fff-a481-4329-a6e7-eece50fc17bd</guid>
      <itunes:duration>12222</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>true</itunes:explicit>
      <pubDate>Sat, 15 Jul 2023 17:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6096640cdb35e7c2758f10b41102fd03.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 151: BEC is back, let's learn what might be new]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 151: BEC is back, let's learn what might be new]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 151. I hope that each and every one of you have had a great July 4th holiday. On today's podcast, we're going to have an updated discussion on BEC which stands  for Business Email Compromise.  On top of that, we'll see what else the landscape has to offer.  We hope you enjoy the program and thanks for listening!</p>
<p><br></p>
<p><h4> Stitcher closing </h4></p>
<p><br></p>
<p>Stitcher is closing.  If you are affected by the change, please contact me at jaredrimer at 986themix.com and let me know about it.  Let me know what podcast you're coming from so I can get you a new link.  They've let us know that they're shutting down as of August 29th, 2023.  Thanks for your support of our podcast!</p>
<p><br></p>
<p><h4> Our Topic: update on BEC </h4></p>
<p><br></p>
<p>This time, our article comes from Phish Labs.  Its a good one, and probably updates our stats on one of the businesses biggest problems, Business Email compromise.  <a href="https://www.phishlabs.com/blog/what-to-know-about-business-email-compromise-bec-scams/">What to Know About Business Email Compromise (BEC) Scams </a> was written in April.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894853</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894853/the-technology-blog/2025_02_13_03_04_41_018d0dae-8498-413b-ab35-14ec69b9a6bc.mp3" length="156014961" type="audio/mpeg"/>
      <guid isPermaLink="false">42e655a3-4871-4827-94a5-4038c50824e5</guid>
      <itunes:duration>9741</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 07 Jul 2023 20:10:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2208696a4003ec173749941da96cbd64.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 150: Ransomware Gangs giving us ransomware witha helping of zero-days]]></title>
      <itunes:title><![CDATA[The security box, podcast 150: Ransomware Gangs giving us ransomware witha helping of zero-days]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the Security Box, podcast 150. We're made it! On this podcast, we're going to talk about Ransomware gangs and the fact they're now using zero days.  We may or may not have a moron, we'll cover the news and we'll see what else people have to say as the program progresses. <u> Some Strong Language. </u></p>
<p><br></p>
<p><h4> Stitcher closing </h4></p>
<p><br></p>
<p>Stitcher is closing.  If you are affected by the change, please contact me at jaredrimer at 986themix.com and let me know about it.  Let me know what podcast you're coming from so I can get you a new link.  They've let us know that they're shutting down as of August 29th, 2023.  Thanks for your support of our podcast!</p>
<p><br></p>
<p><h4> Our topic, Ransomware gangs and zero days </h4></p>
<p><br></p>
<p>This week's article comes to us from Cyberscoop.  Its titled <a href="https://cyberscoop.com/microsoft-zero-day-patch-tuesday-ransomware/">Ransomware gangs increasingly deploy zero-days to maximize attacks </a> and was tagged as a topic.  For the 150th episode, this couldn't be more appropriate.</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894856</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894856/the-technology-blog/2025_02_13_03_17_49_9dbad75f-3fe4-4af8-bd8b-dbb7df9efec7.mp3" length="189351623" type="audio/mpeg"/>
      <guid isPermaLink="false">86677e90-8763-4c0c-9f49-6d717e672524</guid>
      <itunes:duration>11822</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 Jun 2023 00:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_88886d1a07e7c559392369ba4daddf52.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 149: Emotet is back, bigger and badder than ever]]></title>
      <itunes:title><![CDATA[The Security box, podcast 149: Emotet is back, bigger and badder than ever]]></itunes:title>
      <description><![CDATA[<p>We did have some participation, full notes are here. No replay on Clubhouse though, sorry about that!</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>Welcome to the Security box, podcast 149. On this podcast, we may or may not have a moron, we'll definitely have news, notes and the landscape and a topic talking about a threat we thought was long gone.</p>
<p><br></p>
<p><br></p>
<p><br></p>
<p><h4> Good Job India, welcome to the moron of the podcast </h4></p>
<p><br></p>
<p>I stumbled across a video from a Youtube Channel which I am not familiar with. While Nick was in my JRN working room, I decided to see if there was an article about this.  While the podcast gets a 9 minute video, check out this article titled <a href="https://tutanota.com/blog/posts/apps-banned-india">India first democracy to ban encrypted messaging apps on massive scale. </a> from a site called tutanota.com.  They must be a news related site, name sounds familiar to me.   Have fun with this one!  </p>
<p><br></p>
<p>Here's the <a href="https://www.youtube.com/watch?v=rCZDV6RIaxA">youtube video from Mental Outlaw </a> if you want to watch this instead of listening to it.  </p>
<p><br></p>
<p><h4> Topic: Emotet is back, now a threat </h4></p>
<p><br></p>
<p>The article comes to us this time from Phishlabs.  <a href="https://www.phishlabs.com/blog/emotet-returns-from-hiatus-trails-qbot-in-q1-volume/">Emotet Returns from Hiatus, Trails QBot in Q1 Volume </a> is the title.  </p>
<p><br></p>
<p>Are you surprised that this is the case?  We know that Emotet was taken down in a crqackdown, but like most things, they come back in this industry.  Feel free to view the article for complete details or download your copy of the show to hear our thoughts.</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894857</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894857/the-technology-blog/2025_02_13_03_11_54_f2df3453-0bc8-4bb2-a851-737536c22170.mp3" length="118073462" type="audio/mpeg"/>
      <guid isPermaLink="false">3678acbd-ba82-4c44-bbc8-f8d1cd0398fa</guid>
      <itunes:duration>7372</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Jun 2023 20:34:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d71143b475472a3a7ee6c3c905dd7af8.jpg"/>
    </item>
    <item>
      <title><![CDATA[TSB 148: Nation-State Actors go after cloud providers who have customers that have weak passwords]]></title>
      <itunes:title><![CDATA[TSB 148: Nation-State Actors go after cloud providers who have customers that have weak passwords]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 148. On this podcast, I may have a complete moron with a company, we'll have news, notes and more. The topic deals with passwords and it isn't looking that great.  </p>
<p><br></p>
<p><h4> Morons </h4></p>
<p><br></p>
<p>We stand in solidarity with you, Reddit users.  Reddit is taking advantage of the situation just like Twitter did so many months before.  </p>
<p><br></p>
<p>Apparently, Reddit has decided to do the same thing.  One article says they're only charging $0.24 per 1,000 calls to their API, but people indicate its much different.  The cost is $12,000 per month or roughly <u> up to $20 million per year </u> according to some estimates.  Here are the blog posts as of writing in regards to Reddit.  </p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/06/11/accessibility-apps-will-be-free-for-api-use-on-reddit/">Accessibility apps will be free for API use on Reddit </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/06/08/reddit-communities-to-go-dark-on-june-12th-setting-themselves-to-private/">Reddit communities to go dark on June 12th, setting themselves to private </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/06/05/reddit-to-charge-12k-for-50k-calls-to-api/">Reddit to charge $12k for 50k calls to API? </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/06/14/its-official-apollo-shutting-down/">Its Official, Apollo shutting down </a> </li></p>
<p><li> <a href="https://technology.jaredrimer.net/2023/06/14/heres-an-ars-article-on-apollo/">Here’s an ars article on Apollo </a> </li></p>
<p></ul></p>
<p><br></p>
<p>Van Nuys is not too far from where I live in a town called Woodland Hills.  I go through there every time I take the bus.  According to a KNX article which is very short, it says a guy from there was caught selling drugs on the dark web.  <a href="https://technology.jaredrimer.net/2023/06/08/van-nuys-man-pleads-not-guilty-to-selling-drugs-online/">Here is the blog post from the tech blog titled Van Nuys man pleads Not Guilty to selling drugs online </a> which links to the KNX article.  </p>
<p><br></p>
<p><h4> In Case you Missed it </h4></p>
<p><br></p>
<p>In Case you missed it, I finished <u> Tracers in the Dark. </u>  It was a very interesting book, one I didn't want to put down until I did.  <a href="https://technology.jaredrimer.net/2023/06/05/book-review-tracers-in-the-dark-by-andy-greenberg/">Book Review: Tracers in the dark, by Andy Greenberg </a> is the blog post and I'm not giving anything away.  </p>
<p><br></p>
<p><h4> Our Topic: Weak Passwords </h4></p>
<p><br></p>
<p>Our topic comes to us from Cyberscoop.  It was an interesting read.  The article is title <a href="https://cyberscoop.com/google-cloud-threat-password-report/">Nation-state actors are taking advantage of weak passwords to go after cloud customers, Google says </a> and I found it interesting.  This proves again that we need to make sure that our users are using strong passwords or pass phraises.  Don't worry, Cyber Security Awareness Month is coming up, so TSB will be starting all over again with basic stuff when it comes to your security.  </p>
<p><br></p>
<p>I hope that every single person will enjoy today's program, and thanks so much for listening!</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894859</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894859/the-technology-blog/2025_02_13_03_13_46_3c3b7a59-2924-4784-839f-7edee66c94db.mp3" length="139891060" type="audio/mpeg"/>
      <guid isPermaLink="false">46f8579d-6bc8-4d35-b283-b3011a726ea0</guid>
      <itunes:duration>8734</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Jun 2023 02:01:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_bb5c530b762a9fd9ab39b3d1692a9059.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 147: Unpacking the Structure of a Ransomware Group's Business Model]]></title>
      <itunes:title><![CDATA[The Security box, podcast 147: Unpacking the Structure of a Ransomware Group's Business Model]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 147. On this edition of the program, I believe I have a very interesting but true story that must be told with the names being changed to protect the innocent, or is it guilty? We've got a very interesting article talking about the structure of ransomware groups, and no, we're not talking about specific named groups, just something that probably wouldn't surprise someone who reads this type of news.  We'll see what else the landscape has to offer with news, notes, questions and more.  </p>
<p><br></p>
<p><h4> A true story that might include a moron? </h4></p>
<p><br></p>
<p>Someone recently got someone fired as part of a grudge where someone heard something they said and decided to look them up and email a copy of what they said to the employer.  This is the first time we've seen this in the phone world and we hope it isn't going to happen again.  Live version with names changed to protect the innocent, or are we protecting the guilty?</p>
<p><br></p>
<p><h4> Topic: What's going on with Ransomware groups? </h4></p>
<p><br></p>
<p>The following is a Trend Micro article which we found very valuable.  <a href="https://www.trendmicro.com/en_us/research/23/d/unpacking-the-structure-of-modern-cybercrime-organizations--.html">Unpacking the Structure of Modern Cybercrime Organizations </a> is the title of this article and well worth the read.  Question for readers and listeners to the live or podcast edition listeners, are you surprised?  Let's discuss this one.</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894862</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894862/the-technology-blog/2025_02_13_03_05_34_abe480a8-b0cd-44ee-9c4a-1afb7bf20df4.mp3" length="160389088" type="audio/mpeg"/>
      <guid isPermaLink="false">54cea136-3568-4891-8acd-644d976de285</guid>
      <itunes:duration>10014</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Jun 2023 22:01:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8acad3fb7ac2365a4191dc4ec522a03c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 146: A name to the faceless proxy service]]></title>
      <itunes:title><![CDATA[The Security box, podcast 146: A name to the faceless proxy service]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 146. On this podcast, we may have multiple morons; one is a definite, news, notes and a very interesting topic about the proxy services and what they're up to.  </p>
<p><br></p>
<p><h4> Potential Morons </h4></p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://news.slashdot.org/story/23/05/24/1931213/48-states-sue-phone-company-that-allegedly-catered-to-needs-of-robocallers?utm_source=rss1.0mainlinkanon">48 States Sue Phone Company That Allegedly Catered To Needs of Robocallers  </a> talks about the majority of the U.S. and how they're suing a telephone company in Arizona who seems to be catering to the robocallers by allowing  customers to spoof caller ID among other things.  </li></p>
<p><li> <a href="https://www.hackread.com/free-vpn-service-supervpn-leaks-user-records/">Free VPN Service SuperVPN Exposes 360 Million User Records. </a> was found on Monday, the 29th.  Class, what can we learn from this article? </li></p>
<p></ul></p>
<p><br></p>
<p><h4> Topic </h4></p>
<p><br></p>
<p>This time, we're going to talk about a very interesting KrebsOnSecurity article titled <a href="https://krebsonsecurity.com/2023/04/giving-a-face-to-the-malware-proxy-service-faceless/">Giving a Face to the Malware Proxy Service ‘Faceless’ </a> which was quite interesting.  </p>
<p><br></p>
<p>The first paragraph says: <blockquote> For the past seven years, a malware-based proxy service known as “Faceless” has sold anonymity to countless cybercriminals. For less than a dollar per day, Faceless customers can route their malicious traffic through tens of thousands of compromised systems advertised on the service. In this post we’ll examine clues left behind over the past decade by the proprietor of Faceless, including some that may help put a face to the name. </blockquote></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894864</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894864/the-technology-blog/2025_02_13_03_06_07_3c2edd97-abcd-4471-8ffe-db46dbc624cb.mp3" length="216611376" type="audio/mpeg"/>
      <guid isPermaLink="false">17d650aa-6932-48b5-863b-16af696b3a23</guid>
      <itunes:duration>13524</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Jun 2023 03:40:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_813135b98693648eaca11ad758fb8f90.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 145: BabLock Ransomware]]></title>
      <itunes:title><![CDATA[The Security box, podcast 145: BabLock Ransomware]]></itunes:title>
      <description><![CDATA[<p>This program may contain some strong language.</p>
<p><hr></p>
<p>Welcome to the security box, podcast 145. On this podcast, we're going to talk about anothr Ransomware group that is out there that may be of value because while they may ot be targeting the states yet, they're attacking and we <u> must </u> be aware of what's happening.  </p>
<p><br></p>
<p>Besides this, we may have at least one  moron, maybe more, we'll see what others have to say, we'll talk about the landscape and we'll also make sure you're informed the best we can.</p>
<p><br></p>
<p><h4> Topic </h4></p>
<p><br></p>
<p>Bablock is a very interesting piece of ransomware out there.  The ransomware is based off of Lockbit, but may be different.  Trend Micro will help us with this one.  <a href="https://www.trendmicro.com/en_us/research/23/d/an-analysis-of-the-bablock-ransomware.html">An Analysis of the BabLock (aka Rorschach) Ransomware </a> is the article title and we hope you enjoy the program!</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894866</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894866/the-technology-blog/2025_02_13_03_09_00_f4247d9c-15eb-45a8-96e2-8ee47f770a19.mp3" length="185388576" type="audio/mpeg"/>
      <guid isPermaLink="false">17bb733f-b9ed-4ebe-a9e3-13494c068aeb</guid>
      <itunes:duration>11575</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 May 2023 00:29:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6cc8bdc4981eb1e6aa4dac79b9e3b8e7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 144: its an open forum show]]></title>
      <itunes:title><![CDATA[The Security box, podcast 144: its an open forum show]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 144. This show is an open forum. We had no particular topic in mind, but we talk about books, the landscape and more.  The show may contain some adult themes, but it is very light at all.  This may contain language or other situations.  Please be aware of it.  Thanks for participating and make it a great day!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894869</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894869/the-technology-blog/2025_02_13_03_10_35_01c1721a-97bd-45fb-a32a-39b0d44d020f.mp3" length="179690379" type="audio/mpeg"/>
      <guid isPermaLink="false">a45c9928-bc7d-43c9-b0ef-38f9a0537273</guid>
      <itunes:duration>11219</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 May 2023 15:15:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1b3ed8bac443a1fc5060c9f9c988a6e8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 143: Let's discuss the relationship between Ransomware and Phishing]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 143: Let's discuss the relationship between Ransomware and Phishing]]></itunes:title>
      <description><![CDATA[<p>Welcome to the security box, podcast 143. Today, we're going to have a very interesting discussion about the Relationship between Ransomware and Phishing. We know of at least one moron of the podcast, and there is possibly going to be one more.  Of course, we'll have news, notes and any questions from the Clubhouse audience.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Morons of the Podcast </h4></p>
<p><br></p>
<p><h5> First Moron, a Russian on the Run </h5></p>
<p><br></p>
<p>There are two different articles out there about this one.  One from Krebs and the other from Cyberscoop.  </p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://krebsonsecurity.com/2023/05/10m-is-yours-if-you-can-get-this-guy-to-leave-russia/">$10M Is Yours If You Can Get This Guy to Leave Russia </a> Krebs on Security </li></p>
<p><li> <a href="https://cyberscoop.com/russian-charged-try2check-credit-card/">Russian national charged for role in stolen credit card verification scheme </a> Cyberscoop </li></p>
<p></ul></p>
<p><br></p>
<p><h5> How <u> Not! </u> to notify people of a databreach </h5></p>
<p><br></p>
<p>I saw a boost on Saturday about a breach with a company named Western Digital.  That's nice, we have covered many breaches before.  What I found was disturbing from Western Digital according to the boost.  While they sent email out, the email was not accessible for those of us who use access technology; namely screen reading technology.  </p>
<p><br></p>
<p>I don't know about you, but I would expect the info not in graphical form, I would expect it in text just like you and I communicate already.  <a href="https://technology.jaredrimer.net/2023/05/06/western-digital-apparently-suffer-databreach-sends-email-to-customers-in-inaccessible-way/">Here is my blog post from May 6th </a> that mentions this.  As of show note creation time, we do not have any official articles from the tech press, but when we do, we'll be sure to pass it along.  <u> Don't put breach notifications in picture form! It doesn't do anyone with disabilities any good. </u></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Our main Topic </h4></p>
<p><br></p>
<p>The main topic comes from Phishlabs.  The article is titled <a href="https://www.phishlabs.com/blog/what-is-the-relationship-between-ransomware-and-phishing/">What is the Relationship Between Ransomware and Phishing? </a> and was written at the end of March, 2023.  This is going to get interesting.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894872</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894872/the-technology-blog/2025_02_13_03_03_45_84333bde-65bc-4515-8224-606062456759.mp3" length="165247814" type="audio/mpeg"/>
      <guid isPermaLink="false">e15829b9-ee56-45a1-9c56-937b0265fe23</guid>
      <itunes:duration>10317</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 May 2023 23:22:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_63b1458e87cf2170c00cc338d5d0442e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 142: The New U.S. Cybersecurity Strategy highlights]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 142: The New U.S. Cybersecurity Strategy highlights]]></itunes:title>
      <description><![CDATA[<p>This show has sections of strong language, but not a lot. The disclaimer is in there just in case, but it is not much in the wake of strong language.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>Welcome to the Security box. This is program number 142 of the series and this time, we've got a topic which hasn't been covered before at least on our podcast. The topic covers a very interesting endeavor by the government to deal with Cybersecurity.  Besides this, we'll see who gets a moron, we'll cover the landscape, and we'll see what else is of value.  Hope you enjoy the program!</p>
<p><br></p>
<p><h4> Morons of the podcast </h4></p>
<p><br></p>
<p>One may not completely be a moron, but it qualifies as a group not just what the first item covers.  The second, however, you'll just have to read to believe.</p>
<p><hr></p>
<p><br></p>
<p>1.  I'll put this one as a moron, but I really don't understand what seems to be going on over at schools lately.  Its ok to keep information on children that have nothing to do with you giving them an education, and that information may include behavioral issues, SSN's and more.  <blockquote> <a href="https://technology.jaredrimer.net/2023/04/27/this-is-beyond-repair-another-school-district-targeted-children-with-special-needs-targeted-as-well/">blog post </a> </blockquote></p>
<p><br></p>
<p>Brian Krebs boosted (retweeted) the following to his followers.  Note that my blog post has the linked article, so I'm not going to link it within this section. It says:</p>
<p><br></p>
<p><blockquote> Doug Levin: NBC: Students’ psychological reports, abuse allegations leaked by ransomware hackers https://www.nbcnews.com/tech/security/students-psychological-reports-abuse-allegations-leaked-ransomware-hac-rcna79414 #edtech #databreach @brett via @kevincollier </blockquote></p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>2.  Our second moron is more of the moron than the first, but <a href="https://technology.jaredrimer.net/2023/05/02/t-mobile-do-you-still-want-me-as-a-customer-i-dont-think-so/">here's a blog post titled T-Mobile, do you still want me as a customer? I don’t think so! </a> which has the latest on what they have been up to.  It links to yet another article, talking about yet another breach.  Should we be surprised in this industry?</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Topic: Highlights from the New U.S. Strategy </h4></p>
<p><br></p>
<p>This is a Krebs on Security article that we're taking from.  He was tooting (tweeting) about this on Mastodon.  </p>
<p><br></p>
<p>The article is titled <a href="https://krebsonsecurity.com/2023/03/highlights-from-the-new-u-s-cybersecurity-strategy/">Highlights from the New U.S. Cybersecurity Strategy </a> and it was interesting.  I wonder what will eventually happen with this?  Haven't seen anything since this article was written, but maybe they're working on it and we'll see something soon.  Only time will tell.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894874</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894874/the-technology-blog/2025_02_13_03_08_43_1f65d976-9305-494b-95b8-d3ebdabf2235.mp3" length="210787154" type="audio/mpeg"/>
      <guid isPermaLink="false">77474897-208a-43d8-80ba-00e0e1aa9072</guid>
      <itunes:duration>13160</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 May 2023 04:19:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_822e8e2a6c410e245a6d31b3e7815927.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, program 141A: The Billion Dollar Scam]]></title>
      <itunes:title><![CDATA[The Security box, program 141A: The Billion Dollar Scam]]></itunes:title>
      <description><![CDATA[<p>This is an episode that affiliates can run, and the program is under an hour. We'd like to thank the BBC for doing this research. Its definitely eye opening.  </p>
<p><br></p>
<p>The show notes, which include a link to the video on YouTube follows.</p>
<p><br></p>
<p><hr></p>
<p><br></p>
<p>Welcome to the security box, podcast 141A.  On this podcast, we're going to provide you with a video.  This video comes from the BBC, and it does leave some very interesting questions.  Contact info is given at the end.</p>
<p><br></p>
<p>What sparked this?  This toot from Brian Krebs is what sparked this.  It says:</p>
<p><br></p>
<p><blockquote> https://www.youtube.com/watch?v=w6JXZ3GzSCQBrianKrebs: Simona Weinglass of The Times of Israel is my new hero. Her video reporting on crypto investment scams is well worth watching.</p>
<p><br></p>
<p>Tl;dw, it appears the biggest crypto investment scams targeting people in the UK were promoted by at least a half dozen of England's premiere football (soccer) leagues. These scammers managed to rake in at least a billion dollars, and could afford lucrative sponsorships that got their brand everywhere. As the former scammers explained, there's nothing real about the investment "earnings" shown to people who get roped into these scams: It's all just a digital mirage, and any money invested is gone.</p>
<p><br></p>
<p>Her video series on the BBC zeroes in on who's responsible. Involves ride-alongs with German police as they worked w/ investigators in the country of Georgia to raid call centers working the phones for these fraudsters.</p>
<p><br></p>
<p>https://www.youtube.com/watch?v=w6JXZ3GzSCQ </blockquote></p>
<p><br></p>
<p>If you're just here for the video, <a href="https://www.youtube.com/watch?v=w6JXZ3GzSCQ">this is the youtube link to the video </a> we give in audio.  </p>
<p><br></p>
<p>Thanks Brian for posting this!  I found it very eye opening, and it even made me mad, but that's probably what we'd expect with what you'll hear.  I don't blame them though, but you should hear or watch this and make up your own mind.  </p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894875</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894875/the-technology-blog/2025_02_13_03_09_42_55d26d9a-2ddd-49c8-a2ed-b5acbab3e10a.mp3" length="49761254" type="audio/mpeg"/>
      <guid isPermaLink="false">07572bd5-3848-49f2-acfb-6abc71f7d737</guid>
      <itunes:duration>3106</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 30 Apr 2023 23:49:37 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ed91a8768d639c7cd0722eaa8c398441.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 141: Dark Bit, a new threat that starts with a grudge]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 141: Dark Bit, a new threat that starts with a grudge]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security box, podcast 141. On this podcast, Cyberscoop is along to help us diagnose yet another ransomware group. They actually start by attacking Israeli schools, but will it stop there?</p>
<p><br></p>
<p>Besides that, we'll have the news, notes from around the landscape, possibly some morons, and of course your thoughts.</p>
<p><br></p>
<p>Our topic today comes from <a href="https://cyberscoop.com/new-cybercrime-group-darkbit-israel/">this Cyberscoop article titled New cybercrime group calling itself DarkBit attacks Israeli university </a> which we sent to the list in mind February.</p>
<p><br></p>
<p>While we've not seen anything else on this, it isn't for us to keep our mind down as they could attack anything they want.</p>
<p><br></p>
<p>We hope to see you on the show, thanks so much for listening!  </p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894877</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894877/the-technology-blog/2025_02_13_03_12_43_80afb942-a5eb-4444-99f2-99e4813b0dcd.mp3" length="217303425" type="audio/mpeg"/>
      <guid isPermaLink="false">3e075de0-5c79-4a27-919a-de7a1297e303</guid>
      <itunes:duration>13567</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Apr 2023 23:43:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2204bc06c264bed7d60a796c8caa8a44.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 140: The FDIC and banks]]></title>
      <itunes:title><![CDATA[The Security box, podcast 140: The FDIC and banks]]></itunes:title>
      <description><![CDATA[<p>This program may contain some infrequent occurences of strong language.</p>
<p><hr></p>
<p>Welcome to podcast 140 of the Security box. On this edition of the podcast, we've got two morons at least and a great topic that may still be relevant even though the SVB fiasco is now past us.  We'll also have the landscape from people who found things of interest as well.  We hope you enjoy the show!</p>
<p><br></p>
<p><h4>  Morons of the podcast </h4></p>
<p><br></p>
<p>We have two morons of the podcast.</p>
<p><br></p>
<p><ul></p>
<p><li> <a href="https://cyberscoop.com/trial-and-error-in-kuwait/">Trial and error in Kuwait </a> tells the story of a cyber security expert who almost went to jail for tweeting on something he found which is part of protecting everyone.  The article itself is quite interesting, but what is more interesting is the fact that the bank didn't want this info out there to begin with. This came from Cyberscoop. </li></p>
<p><li>  <a href="https://www.databreaches.net/lawsuit-claims-mount-nittany-health-shared-private-patient-information-with-facebook-google/">Lawsuit Claims Mount Nittany Health Shared Private Patient Information with Facebook, Google (update1) </a> comes to us from databreaches.net.  The fact that you didn't even notify customers or anyone else about the issue is just mindblowing.  This definitely doesn't make any sense. </li></p>
<p></ul></p>
<p><br></p>
<p><h4> The FDIC and banks </h4></p>
<p><br></p>
<p>The FDIC did step up when it came to the SVB ordeal, but what about it and bank securituy?  A watchdog says that they're not doing enough.  </p>
<p><br></p>
<p>The article <a href="https://cyberscoop.com/watchdog-warning-fdic-cybersecurity/">Watchdog warns FDIC fails to test banks’ cyberdefenses effectively </a> is one that you should read.  We'll be taking this article apart as part of the discussion.  Do you think they're doing enough?</p>
<p><br></p>
<p><h4> Supporting the podcast </h4></p>
<p><br></p>
<p>If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  </p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894880</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894880/the-technology-blog/2025_02_13_03_17_23_95458b0e-1dce-4dc4-b24f-76ca93de771c.mp3" length="233968838" type="audio/mpeg"/>
      <guid isPermaLink="false">f78029f7-4dd7-4bbb-be74-ff3472027a93</guid>
      <itunes:duration>14608</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 21 Apr 2023 17:10:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2064c94d9f299febd8b2cfeca5756446.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 373: Metro Micro]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 373: Metro Micro]]></itunes:title>
      <description><![CDATA[This podcast may not mean much for some, but to others, it might. 

This app is still much in development and is called Metro Micro. 

Los Angeles Metro is also getting a copy of the cast for their review.  Here are the full show notes.


Hello folks, welcome to the technology podcast.  On this podcast, you'll learn about an app called Metro Micro.  It is a new project by Los Angeles Micro which they're trying out.  

You'll have to search for Metro Micro in your respective app store if you want to take a look.  You may also <a href="http://micro.metro.net">go to the Metro Micro page on metro.net </a> to learn more.  

While most people may not need this, I figured some might, and we reach a wide variety of people so I'm going to put it out there.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894881</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894881/the-technology-blog/2025_02_13_03_06_00_3be8467f-0a31-4d0e-b891-56aa4eaa745c.mp3" length="34371493" type="audio/mpeg"/>
      <guid isPermaLink="false">39c58fd0-a2c3-4bf1-9eb9-ce9cc716e403</guid>
      <itunes:duration>2145</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Apr 2023 19:49:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3c8dad27748763100665174a7e3e9890.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 139: Email, Ransomware and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 139: Email, Ransomware and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to program 139 of the security box. On this episode, let us talk about email for a bit. Yes, the thing you use to receive announcements about this podcast, maybe other programs you are interested across the network and other places and a way for businesses to communicate with you.  According to an article, this method is still the best way to get ransomware and other things on your device.  Why is that?  We're going to have news and notes as well, maybe we'll find out as we post things between now and show time if there are morons, and we'll also see what the landscape brings. 

 Topic: Email as a vector 

Today, let's talk about email. <a href="https://www.phishlabs.com/blog/ransomware-attacks-why-email-is-still-the-most-common-delivery-method/">Ransomware Attacks: Why Email Is Still THE Most Common Delivery Method </a> comes from Phishlabs.  We'll step through this article and see what people think.  

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894883</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894883/the-technology-blog/2025_02_13_03_12_28_632fecd3-f02a-401a-b6b9-4507d0a54861.mp3" length="227945605" type="audio/mpeg"/>
      <guid isPermaLink="false">0152a08d-2bde-4370-91c8-67e111dd63a7</guid>
      <itunes:duration>14232</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 Apr 2023 23:46:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_80ec1cd96e44b749525b856c61557ceb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 138: Mimic Ransomware]]></title>
      <itunes:title><![CDATA[The Security box, podcast 138: Mimic Ransomware]]></itunes:title>
      <description><![CDATA[Find news through the blog. 

Welcome to program 137 of the Security box. We've got a very interesting musings piece which we've blogged as well as another threat we need to talk about.  

 Musing 

I've started yet another musings post, and this one came from Mastodon.  I am not going to put the older posts in this category but will put new ones in this category.  <a href="https://technology.jaredrimer.net/2023/03/30/a-very-interesting-musing-thought-piece/">A very interesting musing thought piece </a> is the article.  The boost is quoted with the links linked as numbers for you.

 Maybe a Moron or just a news item? 

<a href="https://technology.jaredrimer.net/2023/04/01/no-april-fools-joke-man-arrested-for-making-swatting-calls-faces-10-felony-counts/">No April fools joke, man arrested for making swatting calls, faces 10 felony counts </a> was the only post posted on April 1st.  This was no April fools joke.  The gentleman in question used Discord to post and share these videos and luckily nobody got hurt.  You'll want to check out this article to determine what you think, and we'll determine where it goes and do it appropriately.

 Mimic ransomware 

<a href="https://www.trendmicro.com/en_us/research/23/a/new-mimic-ransomware-abuses-everything-apis-for-its-encryption-p.html">New Mimic Ransomware Abuses Everything APIs for its Encryption Process </a> comes from Trend Micro.  This may be just as bad as Sandworm, if not worse.  We'll discuss this Trend Micro article.  

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894886</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894886/the-technology-blog/2025_02_13_02_57_15_38a5fdd3-37ba-480d-a3d0-e4e267ec25c5.mp3" length="228338356" type="audio/mpeg"/>
      <guid isPermaLink="false">0172add5-c424-4f3e-aa39-a93c622d3538</guid>
      <itunes:duration>14256</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Apr 2023 23:42:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dfbcd26874192dc369d561445ed36c58.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 372 for April 3, 2023]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 372 for April 3, 2023]]></itunes:title>
      <description><![CDATA[I know I tried to get more podcasts out and this time I've got one. We'll see how things go, and thanks for listening!



Welcome to the technology blog and podcast. On this edition of the podcast, we have got two different items.

<ul>
<<li> Roger Grimes has written a bunch of books, and he's also taught for as long as I have if not longer.  He has a webinar on Cyber Security, and yes, we could play it on TSB but TSB is more for you to communicate with us on what you have questions on and what things we see.  Take a listen to this and see what might be of value to you. </li>
<li> Los Angeles Metro and Transit App are ending their partnership.  Is this a great move?  I don't honestly know.  Metro did have a pretty bad app which I hated to use.  The data was the samem, but I really like Transit App's interface.  <a href="https://technology.jaredrimer.net/2023/04/03/los-angeles-metro-will-be-discontinuing-partnership-of-transit-app-as-their-official-app/">Los Angeles Metro will be discontinuing partnership of Transit App as their official app </a> is my blog post after reading the source's post on this.  </li>
</ul>

Contact info is given at the beginning and end, feel free to utalize any or all of it.  Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894888</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894888/the-technology-blog/2025_02_13_03_17_15_ecc8e387-d326-44e8-ad57-534e5d611df8.mp3" length="77783172" type="audio/mpeg"/>
      <guid isPermaLink="false">422c42ae-b508-49c1-9990-44eb87afeeec</guid>
      <itunes:duration>4856</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 03 Apr 2023 21:11:42 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f1e58680d1ce7030db6d4957c940c82b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 137: What's happening with Sandworm?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 137: What's happening with Sandworm?]]></itunes:title>
      <description><![CDATA[Welcome to the Security box. This is podcast 137 of the program and we're not slowing down. At least, not yet.  On this edition of the program, we've got at least one moron of the podcast, we've got a very interesting update on Sandworm and of course we're going to have some great news items as well as anything else from the audience.

 Morons of the podcast 

<a href="https://technology.jaredrimer.net/2023/03/24/kroger-has-serious-breach-affects-82000-people-of-postal-prescription-issues/">This blog post titled Kroger has serious breach, affects 82,000 people of postal prescription issues </a> should be spotted.  While Kroger is well-known for their super market chains, they apparently have a pharmacy department and that is what we're talking about here.  

They have the capability of sending prescriptions through the mail, and 82,000 people were recently notified.  

This is going to get very interesting.  

<a href="https://krebsonsecurity.com/2023/03/two-us-men-charged-in-2022-hacking-of-dea-portal/">Two U.S. Men Charged in 2022 Hacking of DEA Portal </a> was sent to TSB.  Hacking in to a DEA portal that many agencies use must be put in as the moron of the podcast for sure.  Nick messaged while show notes were still being put together and this was mentioned via voice.  Great one, guys!

 Some news items 

Some of the news items may include but not limited to:

<ul>
<li> <a href="https://technology.jaredrimer.net/2023/03/24/opinion-piece-article-talks-about-how-tiktok-didnt-make-a-case-for-itself/">Opinion piece: article talks about how TikTok didn’t make a case for itself </a> </li>
<li> <a href="https://technology.jaredrimer.net/2023/03/22/move-out-of-the-way-55-vulnerabilities-tracked-in-2022-and-these-are-zero-days/">Move out of the way, 55 vulnerabilities tracked in 2022 and these are zero-days </a> </li>
<li> <a href="https://technology.jaredrimer.net/2023/03/21/another-hacking-forum-shut-down-this-is-the-breach-forums/">Another hacking forum shut down … this is the breach forums </a> </li>
<li> <a href="https://technology.jaredrimer.net/2023/03/21/306000-plus-out-of-476000-plus-domains-reported-as-phishing/">306,000 plus out of 476,000 plus domains reported as phishing </a> </li>
</ul>

Some we may have talked about, but these may be some that people could be braught up.  Feel free to check out the accompanying articles and let us know what interests you!

I happened to pop on Facebook for my once in a while look.  Someone I follow happened to like Q-Link Wireless.  OK, that's cool, but we need to remind people that Q-Link may be good for free cell phone service, but what about your privacy and safety?  TSB will not tell you what you should use, just putting news out there about the things we read.   <a href="https://technology.jaredrimer.net/2021/04/14/why-is-there-no-password-required-when-accessing-accounts-what-not-to-do-when-setting-up-accounts-for-services/">Why is there “no password required” when accessing accounts? What not to do when setting up accounts for services </a> <a href="https://technology.jaredrimer.net/2021/04/15/the-security-box-podcast-39-for-april-14-2021/">podcast 39's blog post </a> 

NVDA is now released for 2023.1.  <a href="https://technology.jaredrimer.net/2023/03/27/nvda-2023-1-is-now-available/">This blog post </a> talks about what's up with it with a link to the release.  

 Topic: Sandworm 

Did you read Sandworm?  <a href="https://technology.jaredrimer.net/2023/02/02/sandworm-a-new-era-of-cyberwar-and-the-hunt-for-the-kremlins-most-dangerous-hackers/">This is the blog post about the book titled: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers </a> and <a href="https://technology.jaredrimer.net/2023/02/24/book-review-sandworm/">here is the book review titled: Book review: Sandworm. </a>

We found a very interesting article which we may have blogged.  The blog post is titled <a href="https://cyberscoop.com/sandworm-wiper-ukraine-russia-military-in]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894889</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894889/the-technology-blog/2025_02_13_03_18_58_9bb15b27-8828-4be9-a28a-9f3a3a678f18.mp3" length="186444824" type="audio/mpeg"/>
      <guid isPermaLink="false">e334ea75-f3eb-4615-baf9-88aab63ea752</guid>
      <itunes:duration>11641</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Mar 2023 23:26:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b4d83a1c0f170d151fff8d391521f962.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 136: Vice Society]]></title>
      <itunes:title><![CDATA[The Security box, podcast 136: Vice Society]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 136 of the security box. On this edition of the program, we're going to talk about a group that has quite a bit up its sleve. We also have a bunch of news from around the landscape, a familiar foe that could in theory get the moron of the podcast yet again and much more.  We hope that you enjoy the program and thanks for listening!

 Possible moron 

I wrote a thought article on my blog with no accompanying article.  <a href="https://technology.jaredrimer.net/2023/03/17/tiktok-says-were-embedded-in-to-the-operating-system/">Here is that blog post titled TikTok says: “We’re embedded” in to the operating system.  </a> I am not sure if this will be it, and if someone puts something else in, we'll add it to this list.  We could in theory add <a href="https://technology.jaredrimer.net/2023/03/16/it-seems-to-be-confirmed-bite-dance-surveiled-u-s-citizens/">this blog post about Bite Dance Surveiling journalists </a> to this too.  

 Topic: Vice Society 

<a href="https://www.trendmicro.com/en_us/research/23/a/vice-society-ransomware-group-targets-manufacturing-companies.html">This blog post titled Vice Society Ransomware Group Targets Manufacturing Companies </a> is probably the beginning.  This seems to be a new group and it seems pretty dangerous.  While it hasn't targetted the United States yet, we know that anything is possible in this crazy world.

  Supporting our podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894892</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894892/the-technology-blog/2025_02_13_02_59_11_1cfbd0ca-5809-48ae-8dbb-06c2155a5b4f.mp3" length="179029302" type="audio/mpeg"/>
      <guid isPermaLink="false">b42204df-8707-4480-9dab-b03c0a312986</guid>
      <itunes:duration>11178</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Mar 2023 00:13:35 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6e94ee623be5f663df549a27b5fed281.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 135: The NSO group can now be sued, says the Supreme Court]]></title>
      <itunes:title><![CDATA[The Security box, podcast 135: The NSO group can now be sued, says the Supreme Court]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 135 of the security box. On this podcast, we're going to talk about the court system allowing the lawsuit to continue against one of the most proliferated companies who continue to claim they don't do anything wrong and their software that is used by law enforcement to solve crimes. Who is that group?  The NSO group out of Israel.  We'll also have news, notes, at least one moron of the podcast, but rumor has it that we have a few, and much more.  



 Morons of the podcast 

George Santos has some revelations that has come out and an investigation has since been started.  

The blog post in question is <a href="https://technology.jaredrimer.net/2023/03/09/george-santos-masterminded-2017-fraud-case/">right here, and is titled George Santos masterminded 2017 fraud case. </a>  It leads to a lengthy read about what the investigations entale although we don't know what will eventually happen.  

If you really want to talk about Morons, <a href="https://technology.jaredrimer.net/2023/03/09/the-fbi-admits-to-buying-data/">the FBI admitted to buying data </a> which really should not be a surprise.  We could possibly add <a href="https://technology.jaredrimer.net/2023/03/09/musk-makes-a-rare-apology-fires-disabled-worker-claims-he-wasnt-working/">Elon Musk apologizing for firing a disabled worker of twitter </a> as well.  

<a href="https://technology.jaredrimer.net/2023/03/11/heres-some-very-interesting-news-on-twitter/">This blog post about twitter news </a> covers the fact that the root certificate has now expired and Elon Musk has since fired everyone of alue including the one who has delbt with the Root CA which was internal to the company, so now ... they're screwed.  

Don't forget the Freenom ordeal too.  <a href="https://technology.jaredrimer.net/2023/03/10/freenom-haults-registrations-possible-issue-with-icann-lawsuit-by-meta/">This blog post leads to Krebs on Security talking about this.  </a>  I also put in some discussion about this too.  

Have any other possible morons?  Do you disagree on some of these not being complete morons?  I completely understand, but we do have at least two of them listed and others may just be complete stories within themselves.  



 Musing 

I found this quite interesting in regards to Mastodon VS the rest of the Social Media universe such as Facebook, Twitter, Instagram and Tiktok.  It says:  Earle Zwicker: Boosting Ethan Schoonover (ethanschoonover): Stop thinking of Twitter, TikTok, IG, (et al) as social media sites.

They are **Content Refineries.**

Like processed food manufacturers they take user content & extract the most addicting/engaging content. Brains eat it up but in an unhealthy “devour the whole bag of chips” way.

They make hyper-processed social media junk food.

Mastodon is more like a potluck. We're all bringing dishes. It's a mess. Kids are running all over. But we are, at least, real people sharing real things. 



 Our topic, the NSO group 

<a href="https://www.cyberscoop.com/supreme-court-whatsapp-nso-group-spyware/">Supreme Court clears way for WhatsApp case against NSO Group, opening spyware firm to more lawsuits </a> is the article that comes to us from Cyberscoop.  Its going to be a very interesting discussion.  We'll just have to see how it goes.  



Support our podcast. Let us know what you think or suggest topics. Thanks!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894893</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894893/the-technology-blog/2025_02_13_03_00_51_f92b3e6e-6eec-4097-a1bb-4e2fba8888e5.mp3" length="109297809" type="audio/mpeg"/>
      <guid isPermaLink="false">0d9a9073-3240-459f-bd96-3e3ecf3e42d0</guid>
      <itunes:duration>6824</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Mar 2023 00:01:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_635f50cf9e455c1c59524bda6e2c9e9d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 134: news notes and the landscape, as well as PBKDF2]]></title>
      <itunes:title><![CDATA[The Security box, podcast 134: news notes and the landscape, as well as PBKDF2]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the Security box, podcast 134. This podcast is going to talk about PBKDF2, an encryption algorithm  that is used in certain situations.  We'll also have a moron of the week, maybe two, maybe more!  We'll also dip our toes in the landscape and see what is on other folks minds.

 Morons of the podcast 

This first one is quite dumb.  In fact, when I saw the boost which saw it, I had to title this the way I did.  <a href="https://technology.jaredrimer.net/2023/03/02/you-stupid-fk-its-not-going-to-look-good-for-you-now-when-you-get-picked-up/">You Stupid F**k … its not going to look good for you now when you get picked up </a> is my blog post on an article coming from a site called news24.com.  

Not only is this guy found guilty, you're going to read that he just chose not to even show up!  How dumb can you be?

This second one comes from <a href="https://technology.jaredrimer.net/2023/03/06/now-ive-got-the-article-the-worst-type-of-scam-i-never-want-to-be-a-part-of/">this blog post about TikTok's newest challenge. </a> There is some strong language with this post, and from at least two people, it is well warranted.  I try not to use strong language in my posts, but this one is definitely beyond repair.  

The short of this, for those who may be offended by strong language, is that scammers will stop at nothing to either get their wares out or to cause as much harm as possible.  In this latest twist, we have someone going aroudn claiming they can turn loved one's ashes to a sculpture or even a painting.  They claim its free ... but it isn't.  The article leads to <a href="https://www.komando.com/social-media/tiktok-cremation-scam/878762/?utm_medium=nl&utm_source=notd&utm_content=2023-03-05">this Kim Komando article talking about the TikTok Scam.  </a>  If it isn't mentioned as part of this segment, which it just may, please feel free to weigh in on this one.  

 Our topic, PBKDF2 

PBKdf2 is one of many encryption types for passwords and the like. <a href="https://en.wikipedia.org/wiki/PBKDF2">Here's the Wikipedia article on it </a> as we take from the first two sections for now.  There are replacements for it and its covered within this article, but we'll let you look this up later.  

 Book Selection: Tracers in the dark 

I chose my next book.   Tracers in the Dark  by Andy Greenberg.  During the podcast, we'll check in with folks to see where they are in this ... or other books that are on our list.  <a href="https://technology.jaredrimer.net/2023/03/02/book-selection-tracers-in-the-dark/">This is my blog post talking about Tracers in the dark </a> if you need it.

I finally got my book review up for  If it's smart, its vulnerable  by Mikko Hypponnen.  <a href="https://technology.jaredrimer.net/2023/03/06/book-review-if-its-smart-its-vulnerable-1st-edition-by-mikko-hypponen/">Here's that blog post </a> if you're interested to see what I have to say about it.

  Supporting our podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894895</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894895/the-technology-blog/2025_02_13_03_20_52_f7772525-176a-4ca8-95ee-e08675583592.mp3" length="123546623" type="audio/mpeg"/>
      <guid isPermaLink="false">4f2efb60-1e2b-4f31-a508-a9d2f02f44a5</guid>
      <itunes:duration>7713</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Mar 2023 22:09:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_30cf811a97d417f0717fbf090f1a173c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 133: Open forum]]></title>
      <itunes:title><![CDATA[The Security box, podcast 133: Open forum]]></itunes:title>
      <description><![CDATA[We have a round table today on the security box. 

Domains, schemes, scams, tiktok, the landscape and much much more on this open forum of the program. Hope you all enjoy the program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894897</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894897/the-technology-blog/2025_02_13_03_11_36_5fa141df-3ff7-465c-a338-8ba14457f215.mp3" length="170575595" type="audio/mpeg"/>
      <guid isPermaLink="false">4dd883f1-c73c-4a12-beb5-706e7afe208a</guid>
      <itunes:duration>10650</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Mar 2023 23:47:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_19e84a58de1cbe211ffd518fe425584a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 132: What or Who is Dark pink?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 132: What or Who is Dark pink?]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 132. On this edition of the program, we're going to talk about a newcomer I think, one that might be and up and comer. We have a rumor that we might have at least one moron, but who knows how many.  We'll have news, notes and other commentary as well.  Rumor has it, we've got a surprise while making a phone call before last Saturday's  security hour that someone who I thought wouldn't read books is reading the same book several of us are reading.  Find out as you listen to the podcast edition of the program.

 Moron of the podcast 

Nick, our normal staple now a day, mentioned this story in passing.  Turns out that do have a moron as you'll see in the accompanying blog post.  

As it turns out, other articles about this 90 million dollar takeover can be found, but my blog post <a href="https://technology.jaredrimer.net/2023/02/16/this-was-mentioned-as-our-possible-moron-of-the-podcast-a-suspect-found-guilty-but-attorney-will-appeal/">This was mentioned as our possible moron of the podcast … a suspect found guilty but attorney will appeal </a> has the details and some very interesting questions I think we need to talk about as this gentleman, Vladislav Klyushin,  is our moron of the podcast.  You should've stayed with cybersecurity and you would have been OK.  Enjoy your award, the hammer is down on you this time.  

 Dark Pink 

This week, we learn about a new group out there called Dark Pink.  <a href="https://www.cyberscoop.com/dark-pink-hacking-campaign-southeast-asia/">Dark Pink, a newly discovered hacking campaign, threatens Southeast Asian military, government organizations </a> is the article and it comes from Cyberscoop.  Come with us as we take this malware apart and talk about what its up to.  It comes from a group as you've probably read if you found the article through our list or even blog.  This is going to get very interesting.  

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894899</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894899/the-technology-blog/2025_02_13_03_13_43_7402770e-f44d-4972-a9a6-ac9f8567e2cc.mp3" length="137929311" type="audio/mpeg"/>
      <guid isPermaLink="false">8fbac751-3dbf-4c45-acd6-15346d7783e4</guid>
      <itunes:duration>8611</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Feb 2023 22:22:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0af09a7b20fa21cbd36fc4b6016ad5c2.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 131: The Q4 threat trends and intelligance report]]></title>
      <itunes:title><![CDATA[The Security box, podcast 131: The Q4 threat trends and intelligance report]]></itunes:title>
      <description><![CDATA[One sware word within the first hour and 15 minutes. A note has been placed in the audio for folks who need to be aware of it. Full notes below.

Hello everyone. Welcome to program 131 of the Security box.  I hope you'll enjoy what we have to offer you today.  On this podcast, we have a rumor that indicates that we'll definitely have at least one moron of the podcast, maybe more.  We'll also have the topic of the Q4 threat trends Report from Phishlabs as well as questions, comments and more.  We hope you'll enjoy the program and thanks for listening!

 Here's a moron set for you 

There were two articles in which broke this, and it definitely fits our Moron of the podcast.  <a href="https://technology.jaredrimer.net/2023/02/10/when-you-have-two-publications-covering-the-same-story-you-know-it-has-to-be-good-and-big/">This blog post from February 10th </a> has links to each of the articles and initial thoughts.  

Also, I'm not too sure about this one, but we could probly fit <a href="https://technology.jaredrimer.net/2023/02/10/whats-going-on-with-the-irs/">this IRS update from February 10th </a> as well as <a href="https://technology.jaredrimer.net/2023/02/10/a-crypto-mixer-that-claims-they-wont-be-touched/">this blog post talking about an article by Andy Greenberg </a> and a guy who thinks that he won't be caught as he apparently got a mixer going on and he's supposedly taken the right precautions.  

If you have anything in this category, feel free to mention it by sending us an email, an imessage, find me on Mastodon and even text or whats app me.  

 Our topic 

Seems like QBot is back in the news as the top threat in this last quarters report from Phishlabs and Fortra.  The article is titled <a href="https://www.phishlabs.com/blog/qbot-campaigns-overwhelmingly-lead-reported-payloads-in-q4/">QBot Campaigns Overwhelmingly Lead Reported Payloads in Q4 </a> is the article we'll be taking from.  It was posted to TSB's list last December, and of course, I do try and cover it.  The threat may still be there, and with all of what we'll be talking about here, all of these threats have not gone away.  

 Supporting our podcast and work 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894900</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894900/the-technology-blog/2025_02_13_03_06_17_d57294d9-4553-41bb-99cf-a5fe6d9af3f1.mp3" length="136528900" type="audio/mpeg"/>
      <guid isPermaLink="false">91fffb6a-5a48-4680-9f9c-d3ab9c014d59</guid>
      <itunes:duration>8524</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Feb 2023 00:07:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_892cc9ce349216ee04b07a4bd7ac5660.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 130A: Tracers in the dark]]></title>
      <itunes:title><![CDATA[The security box, podcast 130A: Tracers in the dark]]></itunes:title>
      <description><![CDATA[Hello everyone. Welcome to podcast 130A. We're going to rebroadcast a podcast from <a href="http://www.cybercrime.radio">Cyber Crime Magazine </a> about the book <a href="https://www.amazon.com/Tracers-Dark-Global-Crime-Cryptocurrency/dp/0385548095/ref=sxts_entity_rec_bsx_s_def_r00_t_aufl?content-id=amzn1.sym.a36c3969-f821-4d5b-a8e8-be129cf4aa4a%3Aamzn1.sym.a36c3969-f821-4d5b-a8e8-be129cf4aa4a&crid=214EBNC9SMHPW&cv_ct_cx=Andy+Greenberg&keywords=Andy+Greenberg&pd_rd_i=0385548095&pd_rd_r=692512d3-72d5-479a-b6bd-c77c41c89346&pd_rd_w=nIDQX&pd_rd_wg=rtg00&pf_rd_p=a36c3969-f821-4d5b-a8e8-be129cf4aa4a&pf_rd_r=FH2QQAZXS7ZNMTE7T8VW&qid=1675185171&s=books&sprefix=andy+greenberg%2Cstripbooks%2C240&sr=1-1-ef9bfdb7-b507-43a0-b887-27e2a8414df0">Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency  </a>  which is also linked on our resources page.  

I found the program of interest, and this could in theory be my next book.  I hope that everyone enjoys this interview about the book!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894902</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894902/the-technology-blog/2025_02_13_03_19_55_1152c596-b7c0-4cc0-81ac-5a9543fb77d1.mp3" length="36275976" type="audio/mpeg"/>
      <guid isPermaLink="false">de434480-27f4-45c3-a732-7b9f25d72b23</guid>
      <itunes:duration>2264</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 12 Feb 2023 22:36:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ace40f13296045b5a5ed25bc2136101f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 130: Congress and the government can't fix Coppa?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 130: Congress and the government can't fix Coppa?]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 130. On this show, we're going to talk about a very interesting article that covers the fact that Coppa is out of date and congress hasn't done anything about it. We'll have news, notes, commentary and more.  Who knows, will we have a bonehead award of the podcast?  We'll have to see.

 Topic: Coppa and Congress 

I blogged this one, and on this podcast, we're going to discuss <a href="https://www.cyberscoop.com/california-age-appropriate-design-code-oregon-privacy/">State legislators aren't waiting for Congress to regulate children's online privacy.  </a>  It was quite interesting to see that Coppa is needing to be changed yet companies aren't really following it like they should.  

 Adult disclaimer 

This program may contain some strong language.  Parental desgression is advised.  This means its an infrequent occurrence, but there.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894903</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894903/the-technology-blog/2025_02_13_03_14_23_0c5facbe-6a31-49c9-bbcd-4a427edbd5cd.mp3" length="151504744" type="audio/mpeg"/>
      <guid isPermaLink="false">c65ed8d5-b6d0-4d0d-9079-87d6c82a78a1</guid>
      <itunes:duration>9459</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Feb 2023 22:31:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0cec6e0ccd6b9374637ae7809c00bde8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 129: Government watchdog says there's more to do]]></title>
      <itunes:title><![CDATA[The Security box, podcast 129: Government watchdog says there's more to do]]></itunes:title>
      <description><![CDATA[There is one spot where some strong language is used within the following podcast. We want people to be aware of that. Its only one word, but due to rules and regs, we must bring this up to the listener.

Hello folks, welcome to the security box podcast 129.  Last week, we talked about the government, but there's more to the story in which people may not be aware of.  

Apparently, there has been a watch dog group out there taking reports on what the government has or has not done.  

The article is titled <a href="https://www.cyberscoop.com/government-watchdog-cybersecurity-recommendations/">Government watchdog: Feds fail to implement vast majority of cybersecurity recommendations </a> and was covered by Cyberscoop.  

This is a very interesting article which we'll be stepping through.  

Besides that, my hunch may indicate that we'll have a moron of the podcast, people may have questions, and we'll see what the show has in store.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894905</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894905/the-technology-blog/2025_02_13_03_14_16_8e1c2584-bc86-44bf-896d-0204be1a9048.mp3" length="151975119" type="audio/mpeg"/>
      <guid isPermaLink="false">3f64edb4-62d6-4508-b937-72f83b0fbfe6</guid>
      <itunes:duration>9488</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 01 Feb 2023 23:04:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f1d01d406fea2d4d4932f1e029a2dd82.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 128: What's going on with CISA?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 128: What's going on with CISA?]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 128. On this podcast, we probably have two morons of the podcast, one of which should've gotten it before we came up with the idea. We also ask the question, What's going on over at CISA?  This acronuym stands for Cybersecurity and Infrastructure Security  Agency.  

Seems as though they don't know what's going on, or at least might be confused.  

 Moron of the podcast 

We have listed both morons of the podcast by listing the basics of the story and links to the stories themselves.  

1.  It seems as though T-Mobile has had yet another breach with at least another estimated 37 million consumers, whether prepaid or postpaid.  

<ul>
<li> <a href="https://krebsonsecurity.com/2023/01/new-t-mobile-breach-affects-37-million-accounts/">New T-Mobile Breach Affects 37 Million Accounts </a> Krebs on Security </li>
<li> <a href="https://www.cyberscoop.com/t-mobile-investigates-yet-another-data-breach-this-one-affecting-37-million-accounts/">T-Mobile investigates yet another data breach, this one affecting 37 million accounts </a> Cyberscoop </li>
</ul>

2.  The second moron goes to a guy in Russia that thought it would be fun to launder crypto currency.  Not only was he funneling Crypto, but he was the founder of a crypto currency exchange.  <a href="https://www.cyberscoop.com/cryptocurrency-bitzlato-exchange-ransomware-profits-arrested/">Russian founder of a cryptocurrency exchange known for funneling ransomware profits arrested </a> comes to us from Cyberscoop and hasn't been blogged as of yet, but will be.  

 Topic: What's going on at CISA? 

CISA has been known to send notifications via an email list that people can subscribe to.  How I got on it, I don't remember, but it has since changed the way things are sent.  Regardless, the article <a href="https://www.cyberscoop.com/cisa-dhs-easterly-cyber-mission/">Insiders worry CISA is too distracted from critical cyber mission </a> is our article that will help us with our discussion.  It also comes from Cyberscoop.  

 Other stuff 

I know that Nick missed last week's program so we'll give him an opportunity to get on the program and talk about anything from last week.  We'll go through news, notes and other things too.  

 Supporting the podcast 

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894906</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894906/the-technology-blog/2025_02_13_03_18_03_5fc39e58-ffee-42dd-8027-62526f53a653.mp3" length="133771792" type="audio/mpeg"/>
      <guid isPermaLink="false">941e55ee-e8d3-401d-b110-a4b45ba91ade</guid>
      <itunes:duration>8352</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Jan 2023 23:12:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7c7a9106511a5b709a0208ed214a9572.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 371: Philmore video voicemail updates and lastpass and notifying customers on what's really going on]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 371: Philmore video voicemail updates and lastpass and notifying customers on what's really going on]]></itunes:title>
      <description><![CDATA[On this podcast, a video voice mail update and why didn't Lastpass let us know what's really going on with their breach?

<a href="https://technology.jaredrimer.net/2023/01/19/u-s-notifications-and-the-lastpass-breach/">here is the blog post </a> that I wrote with the accompanying article that I talked about during the second segment. 

Contact info is at the beginning and end of the program.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894907</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894907/the-technology-blog/2025_02_13_03_09_51_78fd278a-0aa4-4d96-bc24-10fb749400aa.mp3" length="22658190" type="audio/mpeg"/>
      <guid isPermaLink="false">807b8ff6-d2d4-470e-b61d-d3132b4c8e4b</guid>
      <itunes:duration>1414</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Jan 2023 23:44:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_90f7f7fc106aa6a0164ecfdab012a960.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 127: Bullet Proof Hosting]]></title>
      <itunes:title><![CDATA[The Security box, podcast 127: Bullet Proof Hosting]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 127. This time, we're going to talk about something I don't think any podcast has ever covered. What that might be?  That would be Bullet Proof Hosting.  What is it?  Why is it such a problem?  How can you stay away from companies that allow such a thing?  

We'll take from <a href="https://en.wikipedia.org/wiki/Bulletproof_hosting">Wikipedia's write up on Bullet proof hosting </a> but we aren't taking the entire thing.  This term (written as bulletproof hosting) will be also included in this week's EMHS updates.  

The podcast will also have any news and notes, updates on the particulars of screen readers and what they have to help us deal with the ongoing threats for looking at links, and much more.

If you'd like to support our efforts on what this podcast is doing, you can feel free to <a href="http://www.jaredrimer.net/donations.html">donate to the network, </a> <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the the security box discussion list </a> or sending us a note through contact information throughout the podcast.  You can also find contact details on our <a href="https://technology.jaredrimer.net/contact-admins/">blog page found here. </a>  Thanks so much for listening, reading and learning!  We can't do this alone.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894908</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894908/the-technology-blog/2025_02_13_03_17_53_613f6924-c811-4899-b0da-21c4eec7d134.mp3" length="112226312" type="audio/mpeg"/>
      <guid isPermaLink="false">0b2f8c07-f9f5-4078-8354-0e52f0351bea</guid>
      <itunes:duration>7007</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Jan 2023 21:24:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_235b9e13d9f881796adf60072af9c2e8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 370: Philmore Video Voicemail]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 370: Philmore Video Voicemail]]></itunes:title>
      <description><![CDATA[<p>We like innovation. &nbsp;Philmore Productions has now released Video Voicemail to the public. &nbsp;He first showed it at CES, the Consumer Electronics Show. &nbsp;Feel free to check it out, look it up and see if it is something you want to use. &nbsp;Commentary on what a caller experienced is given and thoughts on this as well.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894909</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894909/the-technology-blog/2025_02_13_03_18_08_7fe1077c-f899-44d4-bd8e-817aa615b421.mp3" length="16582347" type="audio/mpeg"/>
      <guid isPermaLink="false">423e736c-009c-44ce-a5ec-1056c32170c6</guid>
      <itunes:duration>1035</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 16 Jan 2023 20:38:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dbf7ea8ca03ac2a1b7b44c5d7b0d8338.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 126: Your Security posture]]></title>
      <itunes:title><![CDATA[The Security box, podcast 126: Your Security posture]]></itunes:title>
      <description><![CDATA[This program does not contain any strong language or adult content.

Hello folks, welcome to the security box. On this edition of the program, we're going to talk about your security posture. We've got two bonehead of the day awards and plenty of discussion both in news and our main topic!  Stay tuned for our next podcast, we'll be here again soon! 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894911</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894911/the-technology-blog/2025_02_13_03_19_44_0f3ea123-3478-4e85-bf51-251ae1ede60b.mp3" length="98874953" type="audio/mpeg"/>
      <guid isPermaLink="false">1c55fb92-f503-41a9-8893-c933463e8ecf</guid>
      <itunes:duration>6173</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 11 Jan 2023 21:49:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_84de84b581d82450d3bea49cfd0a9d44.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 369: What's going on with domain registries and the who is directory?]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 369: What's going on with domain registries and the who is directory?]]></itunes:title>
      <description><![CDATA[On this podcast, learn about the domain registry, a company who basicly lied to me and told me something I couldn't even do to begin with. Turns out this company is a liar, possibly a scammer and no, they won't be linked as their web site is not all that accessible as I asked. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894912</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894912/the-technology-blog/2025_02_13_03_19_58_185d47d4-a9f0-40d3-98df-61a56d19b678.mp3" length="27659412" type="audio/mpeg"/>
      <guid isPermaLink="false">1dca03d4-6622-400e-b28b-9279c532cd59</guid>
      <itunes:duration>1726</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 09 Jan 2023 21:50:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fd91ccb979437872467f26a6b11cc440.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 125: What happened in 2022 and what do you think about 2023?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 125: What happened in 2022 and what do you think about 2023?]]></itunes:title>
      <description><![CDATA[Welcome to podcast 125 of the Security Box series. On this edition, let's talk about a new book we found during the break, one in which might be of interest since we're going to talk about security posture later. The book is titled <a href="https://www.amazon.com/Ransomware-Hunting-Team-Improbable-Cybercrime-ebook/dp/B09NTKJLDQ/ref=sr_1_1?crid=2KUCMSJ6JL7WI&keywords=The+ransomware+hunting+team&qid=1671490077&s=books&sprefix=the+ransomware+hunting+team%2Cstripbooks%2C356&sr=1-1">The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime </a> by Renee Dudley and Daniel Golden.  While it doesn't cover your posture per say, it does cover a team who is behind you in the fight and understands the struggles.  You see, its not all your fault, we understand that.  You could even do everything right, including having the right training.  

Next, we're going to cover two articles that cover the year end review and what is coming up in predictions for 2023.  

<ul>
<li> <a href="https://www.phishlabs.com/blog/financials-see-increase-in-phishing-attacks-compromised-sites-lead-staging-methods-in-q3/">Financials See Increase in Phishing Attacks, Compromised Sites Lead Staging Methods in Q3 </a> Phishlabs </li>
<li> <a href="https://www.phishlabs.com/blog/financials-and-card-data-top-q3-targets-on-dark-web/">Financials and Card Data Top Q3 Targets on the Dark Web </a> Phishlabs </li>
</ul>

We may have blogged these, but if we haven't, they'll be blogged as part of the podcast show notes which these are.  

Besides that, we'll have plenty of things in news if we can remember it all, and of course, we'll have lots of discussion on things that might not be in the roundup.  We hope you enjoy this edtion of the podcast, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894914</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894914/the-technology-blog/2025_02_13_03_07_53_2f284fb4-2fd2-4a5a-aca8-a35d4092dd86.mp3" length="154632932" type="audio/mpeg"/>
      <guid isPermaLink="false">2360ceab-c4a7-4603-a45c-d44f7d312216</guid>
      <itunes:duration>9654</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Jan 2023 23:30:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3c53eba2cddc9ba76d2e99eabcdad159.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 368: Fintok ... or Financial advice on TikTok]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 368: Fintok ... or Financial advice on TikTok]]></itunes:title>
      <description><![CDATA[Hello everyone. Welcome to podcast 368 of the technology podcast series. On this podcast, we're going to put out the file that talks abot Tiktok being used for financial advice.  <a href="https://technology.jaredrimer.net/2022/12/30/tiktok-is-at-it-again-now-we-have-fintok/">TikTok is at it again, now we have fintok </a> was blogged on December 30, 2022 with an article talking about this by our digital goddess Kim Komando.  

While Social Media is not knew, TikTok has been treading on thin waters.  You can search Tiktok for all of the news coverage we have on our blog.  

We've decided to put out this and other things for discussion and to keep this podcast going.  I hope that this will be of interest, and we'll see how it goes.  

Contact information is available on the blog and within the podcast itself.  Thanks for listening, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894916</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894916/the-technology-blog/2025_02_13_03_14_05_1338eeb5-cb7d-40d7-b59c-8d12d16bb19c.mp3" length="15764428" type="audio/mpeg"/>
      <guid isPermaLink="false">8df8aa71-9a3f-412e-9e3c-9cee27d98500</guid>
      <itunes:duration>984</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 03 Jan 2023 18:59:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9aec50bf48b69c2dfa6930d11f0d1187.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 367: Utech has updated to v2x of their app]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 367: Utech has updated to v2x of their app]]></itunes:title>
      <description><![CDATA[On this edition, we talk about utech's update to version 2. We also have thoughts on how we might be able to keep this podcast going. This is the last podcast of the year from the network. Enjoy! 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894917</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894917/the-technology-blog/2025_02_13_03_15_09_cae208c3-dc21-4b7a-9be0-9e8f8ebffdb6.mp3" length="38746085" type="audio/mpeg"/>
      <guid isPermaLink="false">395ca417-70fd-4c33-959c-6b69a2736a3f</guid>
      <itunes:duration>2419</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 23 Dec 2022 20:53:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ec8ebb2f79d2cee4cdca42568d066668.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 124: Ransomware reaches a billion dollars]]></title>
      <itunes:title><![CDATA[The Security box, podcast 124: Ransomware reaches a billion dollars]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 124. On this podcast, we've got news coming out of Security Now about another root Certificate company that is no more. We've got news and notes from around the landscape, and Ransomware payments have hit at least a billion dollars.  All this, including questions, comments and other miscellanious activity on today's show.

 Trust Core 

Security Now podcast 900 is full of questions.  One of which for this podcast talks about another trust certificate authority that isn't.  The apparent company is called  Trust Core.    This reminds me of the Hong Kong post office and why they were a trusted certificate authority.  We've never covered certificate authorities and maybe we need to.  Let's just say that they intercepted traffic and installed malware.  

 EUFY not telling the truth 

I don't have any articles, but SN 900 covered this and I saw a notice from Malware Bytes.  They say that footage from their cameras are not send to the cloud, but an Ars Technica article mentioned by Stieve indicates otherwise.  The company Anker (not to be confused with Anchor) says this is not the case.  

  Ransomware costing a billion dollars 

<a href="https://www.cyberscoop.com/ransomware-payments-cost-treasury/">Ransomware costs top $1 billion as White House inks new threat-sharing initiative </a> is a Cyberscoop article and our main topic.  If we can share intelligence,  maybe we can better defend against these problems and maybe Ransomware can be slowed down.  We'll see how it goes.  


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894919</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894919/the-technology-blog/2025_02_13_03_18_46_51f24299-1840-402e-8b7d-5d919f636621.mp3" length="174284427" type="audio/mpeg"/>
      <guid isPermaLink="false">7c8ee386-0b82-4544-8820-d100f33f74f8</guid>
      <itunes:duration>10881</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Dec 2022 00:13:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_80bf5a891169787e006f114109f1cb31.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 123: The Passwords of psychology report, 2022 and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 123: The Passwords of psychology report, 2022 and more]]></itunes:title>
      <description><![CDATA[I'd personally like to thank Herbie Allen for his time running the stream during our internet outage today. Thanks friend!

Below, please find the show notes for today's program. I hope to see you all next week!



Welcome to the security box, podcast 123.  Today, we're going to cover the psychology of passwords 2022 report. We'll also have the news from around the landscape, maybe an asshole award of the podcast if one is warranted and much more.  I hope you enjoy the program as much as I enjoy bringing it to you.

 The Psychology of Passwords report 

The article we're going to take from this time is <a href="https://blog.lastpass.com/2022/11/new-report-2022-psychology-of-passwords/">New Report: 2022 Psychology of Passwords </a> from Lastpass.  

Wile most people receiving some cyber security training during the pandemic probably learn a few things,  62 percent still reuse passwords. The article links to the full report but we'll only talk about what is in the article itself.  Maybe we can apply it to this community and give our thoughts on how this community should shift its thinking.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894921</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894921/the-technology-blog/2025_02_13_03_08_40_d4c487b0-422f-4c78-b569-2a63de394445.mp3" length="139497967" type="audio/mpeg"/>
      <guid isPermaLink="false">f530d065-1dfc-4947-9247-d999f746d149</guid>
      <itunes:duration>8709</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 Dec 2022 01:11:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4ee60745e90057b15c1c9cedfd959bbe.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 122: EBT cards and the disabled]]></title>
      <itunes:title><![CDATA[The Security box, podcast 122: EBT cards and the disabled]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to the Security Box. We did get a callin that we didn't know wanted to call in to let us know some things, but we got it all working out. This may affect may different people and we hope that this is a learning experience for you.  Please stay safe.



Welcome to the Security Box, podcast 122.  On this podcast, we will be covering some news that came out of Freshbooks on Wednesday, November 23, 2022.  We'll also be covering Card Skimming and how it disproportionately is a disadvantage  to people who use EBT cards.   We'll also have plenty of news and notes from around the landscape and we'll also see what else people want to talk about as we return from our Thanksgiving break. 

 Freshbooks 

As we blogged on November 23, 2022, Freshbooks became victim to Phishing.  The company itself did not get phished, but people who are customers and non-customers were hitting Freshbooks's Twitter asking if emails were real or not.  Freshbooks reports that these emails are fake, and said that emails come from freshbooks.com or any of its properties and not from anywhere else.   <a href="https://technology.jaredrimer.net/2022/11/23/freshbooks-being-bait-for-phishing-please-be-warned-if-youre-a-customer-of-the-jrn/">The technology blog and podcast's coverage of this event </a> 

On November 29, 2022, they indicated to the JRN that while there was no incident, the phishing uses other domains that is outside of Freshbooks itself.  They linked to an FAQ titled <a href="https://support.freshbooks.com/hc/en-us/articles/360058625651-What-Emails-Are-Sent-Out-of-My-Account-">What Emails Are Sent Out of My Account? </a> Please read this FAQ if you're a freshbooks customer or get email from them as a customer of someone who pays to send invoices.  

 EBT cards are now a target 

In our main topic, we're going to talk about EBT cards and what is happening with them.  We also learn that there's a lawsuit to get states to actually do something if something goes wrong.  You'll understand why as the discussion is done.  Here are the articles:
<ul>
<li> <a href="https://krebsonsecurity.com/2022/10/how-card-skimming-disproportionally-affects-those-most-in-need/">How Card Skimming Disproportionally Affects Those Most In Need </a> Krebs on Security </li>
<li> <a href="https://krebsonsecurity.com/2022/11/lawsuit-seeks-food-benefits-stolen-by-skimmers/">Lawsuit Seeks Food Benefits Stolen By Skimmers </a> Krebs on Security </li>
</ul>

We thank each and every one of you for listening, participating and most of all, reading the blog.  Without your participation and listenership, this program wouldn't be what I'm trying to make it.

Remember to check out <a href="http://emailhostsecurity.com">email host security </a> which is a site that'll help you navigate the Phishing landscape.  This site is sponsored by the <a href="http://www.jaredrimer.net">Jared Rimer Network </a> and I hope people will learn what it is about, check out the companies and resources and of course the terms.  

Starting with this podcast, the podcast is commercial free thanks to a donor through the JRN.  If you'd like to donate, <a href="http://jaredrimer.net/donations.html">go over to our donations page </a> where there is a Paypal button and links available to use to donate one time.  If you want to make a monthly donation using a credit card, let me know and we can make that work.  We thank you! 

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894924</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894924/the-technology-blog/2025_02_13_03_23_50_6aee09bf-47d6-4254-90f7-0e8fbf524bd4.mp3" length="155260548" type="audio/mpeg"/>
      <guid isPermaLink="false">c1670531-c843-4486-aacc-cd28f5e211a1</guid>
      <itunes:duration>9693</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Nov 2022 22:27:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_791c97660294e5bf9dba35828ef77550.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 121: The Insecurity or lack there of when using check in services]]></title>
      <itunes:title><![CDATA[The Security box, podcast 121: The Insecurity or lack there of when using check in services]]></itunes:title>
      <description><![CDATA[On TSB 121, we're going to talk about whether it is a good idea to be using various services like 4sqare, facebook and other check in services to check in to places and post to social media. This started after someone complained on Facebook about how the auto checkin broke, and how they wanted to have it work so their friends on the other side of the world can be confident he made it OK. We'll also have news, notes and conversation about other things that people want to talk about as well.  Thanks so much for listening!

 Asshole of the podcast 

We haven't blogged about this yet, but the article is titled <a href="https://www.cyberscoop.com/lockbit-ransomware-suspect-arrested/">LockBit ransomware suspect arrested in Canada, faces charges in US </a> which comes from Cyberscoop.  We'll be sure to blog this one.  

 Other things 

I went through the blog and we discussed some of the things that have been posted.  Make sure you check out the blog for other stuff including this linked article and feel free to comment.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894925</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894925/the-technology-blog/2025_02_13_03_19_05_2f2a6a59-8bc4-4eeb-a1e6-313fffd7957f.mp3" length="132436316" type="audio/mpeg"/>
      <guid isPermaLink="false">e15c2258-ee03-444f-98b1-c57c9133bb9c</guid>
      <itunes:duration>8268</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Nov 2022 23:29:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e4a94183926a861d25355affb2968aaf.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 120: News notes and a discussion on how to shop safely]]></title>
      <itunes:title><![CDATA[The Security box, podcast 120: News notes and a discussion on how to shop safely]]></itunes:title>
      <description><![CDATA[The Security box, podcast 120 has plenty in this program which is over 3 hours in length. We have at least one asshole of the podcast, possibly two, you judge. This podcast talks about the landscape and your money, talking about tools and techniques that you might be able to use to make sure you're as safe as possible.  We talk about the podcast scheduling, what's coming up, and the scheduled breaks. 

 Asshole award of the podcast and related content 

<a href="https://technology.jaredrimer.net/2022/11/08/hacker-charged-hacked-psychotherapy-center-demanded-ransome-and-went-after-patients-to-pay/">This blog post I title Hacker charged, hacked psychotherapy center, demanded ransome and went after patients to pay </a> leads to an article with a very interesting story.  This guy has been charged with ransoming and later bankruptring a psychotherapy center.  Apparently, the suspect named has been convicted with over 50k of various cybercrimes since the age of 17.  There's more, read the linked blog post and article for complete details.

Also in a related asshole of the podcast this blog post tilted <a href="https://technology.jaredrimer.net/2022/11/05/weve-got-an-jupdate-on-the-raccoon-developer/">We’ve got an update on the raccoon developer </a> talks about an article where the developer of the latest piece of malware got in trouble because his girlfriend decided to post their whereabouts on the all too famous "Instagram."  Shoudlv'e thought about this possibly?

There are other news things we cover, so visit the blog for complete details.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894927</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894927/the-technology-blog/2025_02_13_03_21_42_d0791ed9-baac-4684-a942-0eb372fcd059.mp3" length="164410978" type="audio/mpeg"/>
      <guid isPermaLink="false">821152bb-6fc3-4f68-b171-baa3db1c6f59</guid>
      <itunes:duration>10265</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Nov 2022 00:51:46 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0fbcfc48d7af468a5756f5e3ddeb124c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 119: The Intricacies of social media]]></title>
      <itunes:title><![CDATA[The Security box, podcast 119: The Intricacies of social media]]></itunes:title>
      <description><![CDATA[On this podcast, we cover the launch of my newest project, then get in to social media and the intricacies of it. Hope you enjoy the show! I enjoyed doing this show, and this is one of those that may go over like this one did. Its not common, but it does happen. This is program 119 of this series.  Thanks again for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894929</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894929/the-technology-blog/2025_02_13_03_14_46_67569701-5ac3-4088-a958-fae17fd87566.mp3" length="179413523" type="audio/mpeg"/>
      <guid isPermaLink="false">084a1548-f152-4304-b3ec-149303c6cbf3</guid>
      <itunes:duration>11202</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Nov 2022 22:55:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ae4590c08f78ff712dbc36558e25d8a1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 366: using technology independently]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 366: using technology independently]]></itunes:title>
      <description><![CDATA[On this podcast, Armando from the Mix and I talk about technology and independence. In no way are we saying to be independent on everything, but research and contacting support when you need it is key. Enjoy the show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894931</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894931/the-technology-blog/2025_02_13_03_14_15_003060f0-4b5e-4a1e-a5c4-e185d0731ed7.mp3" length="44808939" type="audio/mpeg"/>
      <guid isPermaLink="false">bdcad4ed-f1a9-4c50-8245-fad378a0cc15</guid>
      <itunes:duration>2797</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Nov 2022 22:49:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dd8dde1696d6037ad6f4f4bb68267ebd.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 118: Let's discuss books Welcome to podcast 118 of the Security Box.  On this show, we're going to talk about books.  Not all books may be covered due to timein the industry!]]></title>
      <itunes:title><![CDATA[The Security box, podcast 118: Let's discuss books Welcome to podcast 118 of the Security Box.  On this show, we're going to talk about books.  Not all books may be covered due to timein the industry!]]></itunes:title>
      <description><![CDATA[Welcome to podcast 118 of the Security Box. On this show, we're going to talk about books. Not all books may be covered due to time constraints, but we'll list all of the ones here.  Question is, what kind of books?  These books are dealing with security in one way or another.  

The list may contain multiple books, and are split up in to authors.  We'll have this in a multi-list format where the main list is in author, and sublist will have the books.

Books may be available via other sources that the blind and disabled can access including <a href="http://www.bookshare.org">Bookshare, </a> <a href="http://loc.gov/nls">the NLS, </a> and apple books.  The NLS Bard page can only be accessed by eligible patrons and will not be linked here.  All linked books come from <a href="http://www.amazon.com">Amazon or its affiliates, but you can search the book titles separately to find the price that fits your budget unless bard has it already.  </p>

From this list, we do know that BARD only has one book, but that could change.  Check Bard often, you never know what will be posted there. 

Besides that, we'll have news, notes and more.  Now, here are the books and thanks for listening!

<ul>
<li> Mark Russinovich </li>
<ul>
<li> <a href="https://www.amazon.com/Zero-Day-Jeff-Aiken-Novel-ebook/dp/B00457X7XQ/ref=sr_1_4?crid=3ARUJ2ZQK5HLP&keywords=Mark+Russinovich&qid=1666381544&qu=eyJxc2MiOiIzLjQ5IiwicXNhIjoiMy4yOSIsInFzcCI6IjMuMzMifQ%3D%3D&s=books&sprefix=mark+russinovich+%2Cstripbooks%2C395&sr=1-4">Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1) </a> </li>
<li> <a href="https://www.amazon.com/Trojan-Horse-Jeff-Aiken-Novel-ebook/dp/B007PP2J9I/ref=sr_1_5?crid=3ARUJ2ZQK5HLP&keywords=Mark+Russinovich&qid=1666381544&qu=eyJxc2MiOiIzLjQ5IiwicXNhIjoiMy4yOSIsInFzcCI6IjMuMzMifQ%3D%3D&s=books&sprefix=mark+russinovich+%2Cstripbooks%2C395&sr=1-5">Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2) </a> </li>
<li> <a href="https://www.amazon.com/Rogue-Code-Mark-Russinovich-audiobook/dp/B00K1HOZFS/ref=sr_1_6?crid=3ARUJ2ZQK5HLP&keywords=Mark+Russinovich&qid=1666381544&qu=eyJxc2MiOiIzLjQ5IiwicXNhIjoiMy4yOSIsInFzcCI6IjMuMzMifQ%3D%3D&s=books&sprefix=mark+russinovich+%2Cstripbooks%2C395&sr=1-6">Rogue Code: A Jeff Aiken Novel  </a> </li>
</ul>
<li> Scott Schober </li>
<ul>
<li> <a href="https://www.amazon.com/Hacked-Again-Scott-N-Schober-ebook/dp/B01CFCHAHG/ref=sr_1_2?crid=1PZIQHYA7CWYV&keywords=Scott+Schober&qid=1666388449&qu=eyJxc2MiOiIxLjk0IiwicXNhIjoiMS45NiIsInFzcCI6IjEuMzcifQ%3D%3D&s=books&sprefix=scott+schober%2Cstripbooks%2C278&sr=1-2">Hacked Again </a> </li>
<li> <a href="https://www.amazon.com/Cybersecurity-Everybodys-Business-Security-Puzzle-ebook/dp/B07X4419B6/ref=sr_1_1?crid=1PZIQHYA7CWYV&keywords=Scott+Schober&qid=1666388449&qu=eyJxc2MiOiIxLjk0IiwicXNhIjoiMS45NiIsInFzcCI6IjEuMzcifQ%3D%3D&s=books&sprefix=scott+schober%2Cstripbooks%2C278&sr=1-1">Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home </a> </li>
<li> <a href="https://www.amazon.com/Senior-Cyber-Security-Practices-Golden-ebook/dp/B08TGF7M59/ref=sr_1_3?crid=1PZIQHYA7CWYV&keywords=Scott+Schober&qid=1666388449&qu=eyJxc2MiOiIxLjk0IiwicXNhIjoiMS45NiIsInFzcCI6IjEuMzcifQ%3D%3D&s=books&sprefix=scott+schober%2Cstripbooks%2C278&sr=1-3">Senior Cyber: Best Security Practices for Your Golden Years </a> </li>
</ul>
<li> Kim Zetter </a> </li>
<ul>
<li> <a href="https://www.amazon.com/Countdown-to-Zero-Day-audiobook/dp/B00P89SN0C/ref=sr_1_1?crid=3SGALJI5NI3TK&keywords=Kim+Zetter&qid=1666457775&qu=eyJxc2MiOiIyLjAxIiwicXNhIjoiMS41NSIsInFzcCI6IjEuNzkifQ%3D%3D&s=books&sprefix=kim+zetter%2Cstripbooks%2C349&sr=1-1">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon  </a> </li>
</ul>
<li> Mikko Hyponnen </li>
<ul>
<li> <a href="https://www.amazon.com/If-Its-Smart-Vulnerable-ebook/dp/B0B544M8N4/ref=sr_1_1?crid=3R0A5K9O4M6HL&keyword
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894932</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894932/the-technology-blog/2025_02_13_03_17_11_d014686e-883d-4af1-8b92-4443190a1c8b.mp3" length="130731546" type="audio/mpeg"/>
      <guid isPermaLink="false">c301084f-5f15-48f5-9075-07be224eef8a</guid>
      <itunes:duration>8162</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Oct 2022 21:44:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dc32eeba3a3c28b1a412c1352f0aec36.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 117: DKIM is finally discussed as well as news notes EMHS development and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 117: DKIM is finally discussed as well as news notes EMHS development and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the Security Box. On today's program, besides talking about the <a href="http://www.jaredrimer.net/emhs">beta of EMHS </a> which is still in development, we finally touch on something I tried to cover in earlier podcasts. What is that, you say?  That's <a href="https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail">DomainKeys Identified Mail </a> otherwise known as DKIM.  We've been needing to cover this for quite awhile, but I'm not familiar if whether we did, and while other topics we've covered on NCSAM this year we've covered in the past, this one I don't think we did.  We also cover the news from the blog and other things on participents minds.  I hope that you enjoy the program as much as I have bringing it together for you, and thanks so much for listening!  We can't do the show without you.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894934</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894934/the-technology-blog/2025_02_13_03_18_22_32e96ca0-56df-4a9a-a679-57da6144a43b.mp3" length="144134556" type="audio/mpeg"/>
      <guid isPermaLink="false">f0038515-d78d-4981-a9a6-e05f9f4a3b0b</guid>
      <itunes:duration>8999</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Oct 2022 22:44:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_bba2cee36778c83dd5370c9548491c2a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 116: SMS and its interesting problems]]></title>
      <itunes:title><![CDATA[The Security box, podcast 116: SMS and its interesting problems]]></itunes:title>
      <description><![CDATA[On this program, I'm alone today talking about <a href="https://en.wikipedia.org/wiki/SMS">SMS </a> and its very interesting issues. I'm not saying its a bad thing, but there are things about it that can be of interest. The linked article may need work, but can be used to gain knowledge.  Knowledge is power, and we don't cover it word for word.    I hope you all enjoy the program as much as I have bringing it to you, and we'll be back next week.

The podcast today is sponsored comercial free by <a href="http://www.jaredrimer.net">The Jared Rimer Network. </a> Visit me on the web to learn more about me and maybe you'll find something of interest.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894936</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894936/the-technology-blog/2025_02_13_03_09_09_a9d607f5-ce08-4fa3-80c2-8b373cf322fa.mp3" length="96307837" type="audio/mpeg"/>
      <guid isPermaLink="false">ab0270b4-af70-4611-99e1-f4bf4eb8dee1</guid>
      <itunes:duration>6013</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 Oct 2022 20:18:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_bdb32e5c1bc3ad4b269ca037060e8fd6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 115: NCSAM week 2, talking about domains]]></title>
      <itunes:title><![CDATA[The Security box, podcast 115: NCSAM week 2, talking about domains]]></itunes:title>
      <description><![CDATA[Welcome to program 115 of the Security box. Today, we talk about domains and SSL and plenty of news stuff too. The first hour and a half of the over 3 hour program is news related, check the blog for complete details on things or subscribe to the TSB list itself.

Some of the stuff we talk about is already on the blog, others are not, but plan to be.  

As far as domains go, when we talked about <a href="https://en.wikipedia.org/wiki/Phishing">Phishing </a> we mentioned the fact that I published several resources on checking whether a domain exists and when it was registered and possibly by who. This was in reference to an article talking about Ian Phishing scams that might be out there now.  Please be safe! 

Here are two resources:

<ul>
<li> <a href="https://lookup.icann.org/en">ICANN Lookup </a> </li>
<li> <a href="https://www.networksolutions.com/domains/whois">Who Is Lookup from Network Solutions </a> </li>
</ul>

There are other tools to look up domains, and we can't forget about <a href="https://www.icann.org/">the ICANN web site </a> and their work to keep domains at least here in the states in good working order.  

Another thing we talked about but not in great detail is <a href="https://en.wikipedia.org/wiki/Transport_Layer_Security#SSL_1.0,_2.0,_and_3.0">Transport Layer Security </a> which SSL is now known as.  We're providing the Wikipedia page as a reference since I didn't go in to a lot of detail on it.  If people want me to, I can do that.  

If we've forgotten something that we should mention as part of this discussion, please send a note and let me know about it.  There is always something to talk about in this space, and I can't think of everything, or think it may be too technical.

You can always contact me through <a href="http://www.jaredrimer.net">my web site </a> and I thank each and every one of you for participating this week.  See you next week!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894938</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894938/the-technology-blog/2025_02_13_03_25_03_adf0d34a-2025-4d23-a4d1-85806c64f887.mp3" length="206902566" type="audio/mpeg"/>
      <guid isPermaLink="false">8542c8bd-fcf1-43a4-b079-7ea1f25ee812</guid>
      <itunes:duration>12918</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 06 Oct 2022 23:25:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5083f4c3362c56d944b78ca5859ad3cb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 114: news, notes and NCSAM week 1]]></title>
      <itunes:title><![CDATA[The Security box, podcast 114: news, notes and NCSAM week 1]]></itunes:title>
      <description><![CDATA[Welcome everyone to the Security box, podcast number 114 on the technology podcast series. 

On this podcast, we cover some of the news from around the landscape, and then we start NCSAM. 

What is NCSAM you ask?  It stands for National Cyber Security Awareness month, and various countries call it something different, and may cover different things.

On week 1, which officially starts on October 1, we talk about passwords.  Besides learning about 10 passwords that you should probably not use, the artivle we take from takes this in to aidifferent demention, covering different categories like food and drink, curse words, sports and more.  

The article is titled <a href="https://cybernews.com/best-password-managers/most-common-passwords/">Most common passwords: latest 2022 statistics </a> and it comes from Cybernews.  Looks like they did a great job with it!

We hope you enjoy the program, and thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894940</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894940/the-technology-blog/2025_02_13_03_17_14_214a0622-97fb-4938-96b4-ee2938ac5a85.mp3" length="191358952" type="audio/mpeg"/>
      <guid isPermaLink="false">2bd12bbb-537c-454d-b0f4-72552150bd75</guid>
      <itunes:duration>11947</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 Sep 2022 02:46:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9879a476e15f68eb647f3595ba4587a2.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 113: Violence as a service, this turns from Cybercrime to real world crime]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 113: Violence as a service, this turns from Cybercrime to real world crime]]></itunes:title>
      <description><![CDATA[<p>Hello folks, welcome to the security box. &nbsp;We had 10 people in our room today, and we hope you enjoy the program. &nbsp;Here are the show notes of today's program, and we'll see you next week!</p>
<p><br></p>
<p>Welcome to the Security box, podcast 113. &nbsp;On this episode of the program, the biggest topic is "Violence as a service" as it is being talked about on multiple podcasts.</p>
<p><br></p>
<p>Have you read the article by Brian Krebs titled <a href="https://krebsonsecurity.com/2022/09/violence-as-a-service-brickings-firebombings-shootings-for-hire/">Violence-as-a-Service: Brickings, Firebombings & Shootings for Hire </a> and if you did, what did you think about it?</p>
<p><br></p>
<p>Seems as though this is going to get very interesting as actors as they're known in the industry will be changing their tactics to something like this.</p>
<p><br></p>
<p>Besides this, I hope that you'll come join us and comment as we'll have some news from around the landscape, thoughts on other things of interest and of course questions and comments from the audience. &nbsp;</p>
<p><br></p>
<p>Thanks for listening and participating and we'll see you on another edition of the program!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894941</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894941/the-technology-blog/2025_02_13_03_18_49_f5085a94-e54d-4d4b-99cb-a05b2e36a2e3.mp3" length="141861661" type="audio/mpeg"/>
      <guid isPermaLink="false">f5e19651-1816-41f3-9b19-f161ac3776c0</guid>
      <itunes:duration>8857</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Sep 2022 23:36:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_572fefbf3e38d1165b4a2a99ef24795f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 112: Actors want our OTP codes, more in our business endeavors than personal]]></title>
      <itunes:title><![CDATA[The Security box, podcast 112: Actors want our OTP codes, more in our business endeavors than personal]]></itunes:title>
      <description><![CDATA[Who Knew! Podcast 112 is going to talk about one time passcodes being a corporate liability to business, as actors or cybercriminals can take advantage of the common user to give up these codes so they can log in and take control of one account. <a href="https://krebsonsecurity.com/2022/08/how-1-time-passcodes-became-a-corporate-liability/">How 1-Time Passcodes Became a Corporate Liability </a> is the article we'll be referencing, and there is no wrong answer when giving your opinion on this one.

This article comes from Brian Krebs, shortly after the fiasco that we didn't talk about last podcast which the article that finally got published covered, his blundering mistake which wasn't IMHO.  

With that said, we'll have news from around the landscape and we'll see what others within the club have to say about this or anything else on their mind.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894943</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894943/the-technology-blog/2025_02_13_03_19_35_a319a86e-445b-424a-93af-a6a2766eb114.mp3" length="138225053" type="audio/mpeg"/>
      <guid isPermaLink="false">e97568f3-61c1-479f-9826-1e168d582996</guid>
      <itunes:duration>8630</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Sep 2022 16:40:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_882c2cd1dc0fd0fa7934a7689d45d78a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 110: Paypal Phishing scams use paypal invoices to trick users in to clicking!]]></title>
      <itunes:title><![CDATA[The Security box, podcast 110: Paypal Phishing scams use paypal invoices to trick users in to clicking!]]></itunes:title>
      <description><![CDATA[110 is what it is going to be if not hotter this week, so podcast 110 is hot!

Hello folks, welcome to the security box, podcast 110.

On this edition of the podcast, we're going to cover news, notes and other things around the landscape. 

Besides that, it seems like Paypal may be in some big time scam problems as their invoicing system is being abused. Learn about it as we talk about the article <a href="https://krebsonsecurity.com/2022/08/paypal-phishing-scam-uses-invoices-sent-via-paypal/">PayPal Phishing Scam Uses Invoices Sent Via PayPal </a> which was written by Brian Krebs.  

Besides all that, the news as mentioned above, and this topic, we'll see what other topics might come up as the show progresses.  

I hope you enjoy the program as much as I am bringing it to you!  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894945</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894945/the-technology-blog/2025_02_13_03_20_28_0d57e0f5-5007-4f40-ba20-b412b8e099c4.mp3" length="131167953" type="audio/mpeg"/>
      <guid isPermaLink="false">75f5fc5f-512d-4693-832b-69363c5a904f</guid>
      <itunes:duration>8189</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Sep 2022 03:15:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9ad219b73f8b769c11acc566e3c9e112.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 365: The U-Tec Pro smart locks]]></title>
      <itunes:title><![CDATA[Tech podcast 365: The U-Tec Pro smart locks]]></itunes:title>
      <description><![CDATA[Welcome to podcast 365 of the technology blog and podcast series. On podcast 365, we talk about <a href="http://www.u-tec.com">U-Tech </a> and the recent new lock I got. 

Its probably not the best demo I did, and there are some accessibility issues and crashes but I thought I'd put it out anyway.

I hope that you will enjoy the program as much as I am putting it together, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894946</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894946/the-technology-blog/2025_02_13_03_09_31_ca0fd7d4-d91c-41eb-8039-9436cffd03f3.mp3" length="51069893" type="audio/mpeg"/>
      <guid isPermaLink="false">7151889a-4696-4987-a51f-9f1056889bcb</guid>
      <itunes:duration>3188</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 26 Aug 2022 20:48:41 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a9c4ac0e70c64197435ae3f0f8f55123.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 364: The Threat trends and intelligence report q2]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 364: The Threat trends and intelligence report q2]]></itunes:title>
      <description><![CDATA[On this podcast, learn about what threats we face as part of the q2 report from Phishlabs. Go over to the <a href="http://info.phishlabs.com/blog">blog </a> for complete details in articles and ways to download the report. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894948</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894948/the-technology-blog/2025_02_13_03_24_12_977909a7-b149-460f-b0bb-5a66693aa4bd.mp3" length="56074897" type="audio/mpeg"/>
      <guid isPermaLink="false">48798b0a-9e8d-4654-b523-aaf11edff0f7</guid>
      <itunes:duration>3501</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Aug 2022 18:33:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6b3e7cf763906a1fa5705a44de5bee44.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 109: August 24, 2022]]></title>
      <itunes:title><![CDATA[The Security box, podcast 109: August 24, 2022]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 109. On this podcast, besides doing a recap of the news because of our tech problems, we're going to cover some court news that probably doesn't surprise some of us. 

The article is titled <a href="https://www.cyberscoop.com/wyden-scotus-privacy-federal-courts-letter/">Federal courts left Americans' data exposed, senator tells Supreme Court chief justice </a> and it comes from Cyberscoop.  

We'll also see who may be in clubhouse, brings up any questions to ask, and we'll see what else the program has to offer.

Find something you'd like to have us talk about?  Why not subscribe to our discussion list through the mix, or find a link on the blogroll for the security box email list.    We would love to have you.  Feel free to say hey!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894950</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894950/the-technology-blog/2025_02_13_03_20_07_05c19591-7d9f-432c-b6ff-93d33a51763e.mp3" length="124078473" type="audio/mpeg"/>
      <guid isPermaLink="false">72a6c4e2-3e5f-4b64-8102-f2083f01095a</guid>
      <itunes:duration>7747</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Aug 2022 21:55:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f985b51c3d329fea3b3f48a74571a3c8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 108: What Happened to all of these proxy services from another podcast?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 108: What Happened to all of these proxy services from another podcast?]]></itunes:title>
      <description><![CDATA[The show got off to a rocky start, but what show doesn't have tech problems? We cover the news, and we cover two topics and we're comercial free.

On podcast 103 of the Security box, we talked about some proxy services that could have been deemed bad proxies. 

Now, in another two-part section, we learn that all of these proxies are now down.  What happened to these proxies?

<ul>
<li> <a href="https://krebsonsecurity.com/2022/07/911-proxy-service-implodes-after-disclosing-breach/">911 Proxy Service Implodes After Disclosing Breach </a> </li>
<li> <a href="https://krebsonsecurity.com/2022/08/no-socks-no-shoes-no-malware-proxy-services/">No SOCKS, No Shoes, No Malware Proxy Services! </a> </li>
</ul>

Both of these articles are by Krebs on Security and both were very interesting to read.

Besides this, we're going to cover the news, we'll see what people have decided to bring up, and we'll see what else we can find for this program.  Hope you will enjoy the show, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894952</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894952/the-technology-blog/2025_02_13_03_11_42_d455795d-e654-4a89-9f6e-5542a2868bb9.mp3" length="145482704" type="audio/mpeg"/>
      <guid isPermaLink="false">5c4127e3-3c81-4f87-8b4c-50cd32f82714</guid>
      <itunes:duration>9083</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Aug 2022 22:13:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b02feba99b3bd69f5f76f35f209f6ae6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 107: Fileless Malware, what is it, how can it get on the computer and what is this Gootkit  loader have to do with it?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 107: Fileless Malware, what is it, how can it get on the computer and what is this Gootkit  loader have to do with it?]]></itunes:title>
      <description><![CDATA[Welcome to program 107 of the Security box series. On this edtion, we're going to talk about something not too many people know about. Its called  Gootkit Loader’s   and they can be very dangerous.  These can contain something called  fileless malware  which makes detecting them harder.  Trend Micro has talked about fileless malware before, and you can put in fileless malware plus adding trend micro to find postings covering this topic.

The article we're going to cover on podcast 107 is titled <a href="https://www.trendmicro.com/en_us/research/22/g/gootkit-loaders-updated-tactics-and-fileless-delivery-of-cobalt-strike.html">Gootkit Loader’s Updated Tactics and Fileless Delivery of Cobalt Strike </a> and it does come from Trend Micro.  

I hope that you enjoy this discussion, because it can affect you if you don't know the signs of what to look for as it can come in many forms including email.

Besides this, we'll see what people in clubhouse or the list want to talk about, and we'll go through news and other things posted as well.  

Thanks for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894954</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894954/the-technology-blog/2025_02_13_03_25_44_9e8b57b1-feb6-40dc-b523-189f6eb5e00a.mp3" length="164618625" type="audio/mpeg"/>
      <guid isPermaLink="false">cd98f5d6-3cdb-412c-8413-b8695d7ec993</guid>
      <itunes:duration>10278</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Aug 2022 17:22:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a48324010fc81b30e3f8402c4b61510c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 106: What Is Pig Butchering  when it comes to the Cybersecurity Field?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 106: What Is Pig Butchering  when it comes to the Cybersecurity Field?]]></itunes:title>
      <description><![CDATA[Welcome to podcast 106 of the Security Box. No, we're not covering animals, but there is a new term called  Pig Butchering  that is now out there. 

According to the article, it seems to be covering a lot of varying scams which may include Crypto, romance, and investment  just to name a few.

Don't let me tell you about it in the show notes, the article is titled <a href="https://krebsonsecurity.com/2022/07/massive-losses-define-epidemic-of-pig-butchering/">Massive Losses Define Epidemic of ‘Pig Butchering’ </a> and it comes from our buddy Brian Krebs.

Besides that, we'll go through the blog, we'll see what other things participents  want covered, and maybe we'll answer any questions that might come across.

Thanks so much for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894956</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894956/the-technology-blog/2025_02_13_03_26_17_c897d5ab-2459-4b69-8e68-76b5163e2f4f.mp3" length="195367926" type="audio/mpeg"/>
      <guid isPermaLink="false">03139bf4-d4c4-4c7f-be06-c2eca693902d</guid>
      <itunes:duration>12198</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 Aug 2022 15:35:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1494244fe8c5833ad508f2e554284bd8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 105: Vehicle Trackers are in deep trouble and there's nothing we can really do about it]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 105: Vehicle Trackers are in deep trouble and there's nothing we can really do about it]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 105. On this program, we're going to talk about GPS systems and something that may affect everyone who drives and uses a certain product. 

This is a Cyberscoop article titled <a href="https://www.cyberscoop.com/vulnerabilities-gps-tracker-cisa-warns/">Attackers can surveil, disrupt vehicles outfitted with popular GPS tracker, CISA warns </a> which was quite interesting.  I also spotted this being covered by Kim Komando and her staff.  I blogged about it <a href="https://technology.jaredrimer.net/2022/07/21/kim-komandos-team-has-more-on-this-vehicle-gps-ordeal/">in this blog post </a> for those who want to link to it.  

We also will have news from around the landscape and whatever else people want to cover that they have read.  Hope you enjoy the show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894958</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894958/the-technology-blog/2025_02_13_03_21_39_7872b062-95b1-460e-90f5-5a872f2d4bbe.mp3" length="171384150" type="audio/mpeg"/>
      <guid isPermaLink="false">85b28303-ec70-44b7-b8b5-ed7e978e6cef</guid>
      <itunes:duration>10700</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Jul 2022 21:42:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fc5df360e519fd9f8a45bb24e5c8c5aa.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 363: Scalars Publishing and their educational book and more]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 363: Scalars Publishing and their educational book and more]]></itunes:title>
      <description><![CDATA[Hello flks, I am going to say that this is the first podcast we've done in about 2 months or so, maybe more. 

I'm happy to finally have something to present today, and this is going to get rather interesting for a 104 minute podcast. Here are the notes!



On this episode, ><a href="http://www.scalarspublishing.com">Scalars Publishing </a> has an educational book for learning UEB.  They have other books as well, but we talk about the educational book today.  How did I find out?  Through a student who has asked for some help.  Perky Duck from <a href="http://www.duxburysystems.com">Duxbury Systems </a> is discussed and demoed, and we also have some IOS news for those who don't know.  This news is in regards to voices that some may know of, but some may not as we have sighted listeners that may not know.  I hope to have another podcast soon!

Thanks so much for listening, and I'll be back real soon!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894959</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894959/the-technology-blog/2025_02_13_03_22_51_f18ecbe3-2e3c-46b4-a1e8-71148610959b.mp3" length="100807521" type="audio/mpeg"/>
      <guid isPermaLink="false">e10a1073-c5d8-499b-a085-ebf016ecf5b3</guid>
      <itunes:duration>6294</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 21 Jul 2022 21:02:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1b81ec2a6e48a7a3cb61bdb6abba1afb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 104: Even Law Enforcement is not immune to the breach department and its probably not the first time either]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 104: Even Law Enforcement is not immune to the breach department and its probably not the first time either]]></itunes:title>
      <description><![CDATA[Welcome to podcast 104 of the Security Box program. I hope that each and every one of you enjoyed our look back at the two year anniversary and what might have interested people during the past year.

As I prepare for podcast 104, if you, the listener, want to contribute thoughts on what interested you from the past year or even since the show's inception, please contact me through <a href="http:///www.986themix.com/djcontact">the contact the DJ's page on 986themix.com </a> or listen to the program for full contact details.  

On this edition of the program, we're going to talk about an older article titled <a href="https://krebsonsecurity.com/2022/05/dea-investigating-breach-of-law-enforcement-data-portal/">DEA Investigating Breach of Law Enforcement Data Portal. </a> Its a Krebs on Security article which was sent to the Security Box list in the month of May.  The sad thing is, we've not heard anything since, and that may not necessarily be a good thing.  

Besides that, we'll check with listeners who have decided to join us on Clubhouse and other participants to see what has caught their attention through the landscape.  

If there are questions by people who are new to the program who have basic questions, we always allow those, so please submit them to us or participate live.  I don't claim to know everything, and even the best don't, but with all of us working together, we can learn and give some advice to try that might help.  

I look forward in continuing this program, and I hope that people will at least check it out to see if they find it of value.  

I thank those people in the industry that post articles that we can ponder, discuss and possibly question.  Thanks for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894961</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894961/the-technology-blog/2025_02_13_03_22_09_d25cb935-5003-4433-9a71-be217183cb8c.mp3" length="128290009" type="audio/mpeg"/>
      <guid isPermaLink="false">3b55288d-d758-4ca9-a6e2-714b96a7bd22</guid>
      <itunes:duration>8009</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Jul 2022 21:40:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9af9ab2b14d208a976eff6e78b49cca4.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 103: 1 person, multiple bad jobs]]></title>
      <itunes:title><![CDATA[The Security box, podcast 103: 1 person, multiple bad jobs]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to the Security bbox, podcast 103.

With only one week missed due to commitments, we've reached the two year anniversary of this program on the mix. I hope that we can continue to provide plenty of material as this community still needs to learn what is out there to protect themselves. Nobody is perfect, even yours truly has made mistakes.  The question is, do you learn from yours?

As we reflect, podcast 52 which was on July 14th of last year, delbt with the water hacks which could have done some serious damage.  While we overcame that and learned from that, we've got a bigger issue and that has been the war that Russia has been involved with as Ukraine was its first target and now they're going ahead and targeting other nations.  We talked about this war and its potential impacts on this very program and other rooms on Clubhouse.  Now, some of what you might see and discussed on this and other circles will be coming true as predicted.  No expert said when it would happen and if, but it seems that it is.  

With that said, today's main topic is going to cover two articles and one man.  

The first article is titled <a href="https://krebsonsecurity.com/2022/06/meet-the-administrators-of-the-rsocks-proxy-botnet/">Meet the Administrators of the RSOCKS Proxy Botnet </a> which was quite a read if I should say so myself.  The second one even gets more interesting.  Its titled <a href="https://krebsonsecurity.com/2022/06/the-link-between-awm-proxy-the-glupteba-botnet/">The Link Between AWM Proxy & the Glupteba Botnet </a> and maybe you'll have comments on this.  

Besides that, we'll have other topics that may not be listed here in our notes, like for example, things that caught people's eye from our list and or blog.

Want to subscribe to our list? <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">The Security Box list </a> can be found by clicking on the link and going to its page through our partner, <a href="http://www.986themix.com">The Mix. </a>

I hope that you enjoy the program as much as the JRN and its participants enjoy bringing it to you.  Remember, we can learn together.

Thanks so much for listening, reading, and participating!  Keep learning!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894963</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894963/the-technology-blog/2025_02_13_03_23_52_0584c1db-3f89-4cce-94bb-189b677d846b.mp3" length="195184915" type="audio/mpeg"/>
      <guid isPermaLink="false">5da0b3bb-9a23-40cd-ad16-9e5e0790aa46</guid>
      <itunes:duration>12186</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Jul 2022 22:17:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7b8deddf5af7787cfad7281a73a02c4e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 102: July 6, 2022]]></title>
      <itunes:title><![CDATA[The Security box, podcast 102: July 6, 2022]]></itunes:title>
      <description><![CDATA[Hello everyone! Welcome to podcast 102 of the podcast. On this edition of the podcast, we'll step through one of the best emails I've ever seen. I saw this at the end of June, and it woke me right up.  It is the best email that would prompt an issue that may not be the case, if you actually stop, look and do your due dilligance.   <a href="https://technology.jaredrimer.net/2022/06/30/this-is-very-funny-the-geek-squad-sending-me-an-email-of-a-charge-that-doesnt-exist/">blog post </a> 

As our topic, we're going to talk about the Cyberscoop article <a href="https://www.cyberscoop.com/congress-data-brokers-legislation-foreign-sale/">Lawmakers want to restrict user data sales to nations like China, Russia </a> which was read.  The article will end up getting blogged, so check the blog for thoughts on this one.

We'll also see what else comes up in the landscape that people want to talk about as well.  Hope you enjoy the program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894965</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894965/the-technology-blog/2025_02_13_03_25_46_5cac89f3-150e-42fb-819e-90d3c4bcdcf6.mp3" length="182359632" type="audio/mpeg"/>
      <guid isPermaLink="false">1da0075b-4119-4fc3-8ad3-e8f8b7a8e722</guid>
      <itunes:duration>11385</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Jul 2022 23:02:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3694bc790ed55bdf144261cf457bb6e4.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 101: Google finds Italian Spyware campaign that targets victimsWelcome to podcast 101 of the Security Box Podcast series.  On this podcast, we did find another "Asshole of th]]></title>
      <itunes:title><![CDATA[The Security box, podcast 101: Google finds Italian Spyware campaign that targets victimsWelcome to podcast 101 of the Security Box Podcast series.  On this podcast, we did find another "Asshole of th]]></itunes:title>
      <description><![CDATA[Welcome to podcast 101 of the Security Box Podcast series. On this podcast, we did find another "Asshole of the podcast" award. We also are going to talk about Google finding something very interesting in their research department.

 Asshole of the Week 

This time, our Asshole comes from an article by Brian Krebs of Krebs on Security titled <a href="https://krebsonsecurity.com/2022/06/downthem-ddos-for-hire-boss-gets-2-years-in-prison/">“Downthem” DDoS-for-Hire Boss Gets 2 Years in Prison </a> which was quite interesting.  Wondering why only two years when DDOS is quite significant and can cause a lot of headaches among what's going on and how to fix it?  

 Google 

This time, <a href="https://www.cyberscoop.com/google-reveals-sophisticated-italian-spyware-campaign-targeting-victims-in-italy-kazakhstan/">Google reveals sophisticated Italian spyware campaign targeting victims in Italy, Kazakhstan </a> comes from Cyberscoop.  Found this article quite interesting, and I bet you do too.

Besides that, we'll see what the people on the Clubhouse have to say as well as possibly other things that might not be blogged or sent to the list.  

Thanks for listening to the show, and we'll see you on another edition!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894967</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894967/the-technology-blog/2025_02_13_03_11_36_88175481-3028-4950-9010-e1d1858e6be1.mp3" length="133857230" type="audio/mpeg"/>
      <guid isPermaLink="false">9fff5182-e535-4881-be83-fe66fc281f92</guid>
      <itunes:duration>8357</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 Jun 2022 23:03:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_96478337b295801530a67ebe74f96481.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 100 for June 22, 2022]]></title>
      <itunes:title><![CDATA[The Security box, podcast 100 for June 22, 2022]]></itunes:title>
      <description><![CDATA[Welcome to podcast 100 of the Security Box. I can't believe this series is already at 100, and its been growing strong with lots of discussion, and of course comments on things that people have found of interest.

I hope that the show can continue to grow, and with partners in the industry, we will continue to bring you things that might not be covered elsewhere in much detail if any. 

Today, we're going to bring the bonehead award, with an article we'll summarize in a segment called interestingly, the "asshole award of the podcast."  For this podcast, the article <a href="https://www.cyberscoop.com/us-marshal-cell-phone-location-data-charged-securus/">U.S. marshal used controversial cell phone location service to illegally access data, DOJ says </a> from Cyberscoop.  The Marshall definitely needs this award, and you never know who will be next.  Don't abuse the privelage  of the access you're granted to do your job or you'll possibly get caught.  

On this episode as well, we'll cover two different topics.  The first, <a href="https://www.cyberscoop.com/privacy-legislation-online-identity-fraud/">Privacy legislation might provide a powerful guard against online identity fraud </a> might have some teeth if everyone is on board.  I definitely think that this should be covered because we talk about the fact that companies have our data with no recourse  if something goes wrong..  Maybe that'll change?

In a related note, we've been getting calls from various folks about vehicle warranties, other notices from companies that don't identify themselves and the like.  In an article titled <a href="https://www.cyberscoop.com/interpol-raids-hundreds-of-scammy-call-centers-in-sweep/">INTERPOL raids hundreds of scammy call centers in sweep </a>  it talks  about how many different people have been picked up due to the number one thing that gets people, social engineering.  If you've not read this article, <i> you should. </i>  It might be a start to something that hopefully should go down at some point.

Of course, we'll have comments from others who participate in the taping and live broadcast on Wednesdays, and possibly other topics not listed here too.  

Thanks for reading, participating, and listening!  I greatly appreciate your support.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894969</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894969/the-technology-blog/2025_02_13_03_25_09_1f86af6a-20ca-43c8-8f34-115eb9ad03c8.mp3" length="138573607" type="audio/mpeg"/>
      <guid isPermaLink="false">44cfdb98-ddda-4a7c-b031-ab800f2bdd4c</guid>
      <itunes:duration>8652</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Jun 2022 21:31:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_de2a78d1c3dbc17a1d771cb0d98a0016.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 99: Shields Up! The New Normal in Cyberspace]]></title>
      <itunes:title><![CDATA[The security box, podcast 99: Shields Up! The New Normal in Cyberspace]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 99. We're excited to bring you another great show.

First, in our chat section, we're going to talk about <a href="https://krebsonsecurity.com/2022/06/krebsonsecurity-in-new-netflix-series-on-cybercrime/">KrebsOnSecurity in New Netflix Series on Cybercrime </a> which I've already bookmarked as I signed up for Netflicks. I also watched another movie titled <a href="https://www.netflix.com/title/81354041?source=35">Cyber Hell.  (subscription required) </a>  Movies and documentaries like these are great to get out in the community, and the Cyber Hell movie I heard of somewhere, probably on clubhouse.  There's more including one I talked about some time back, but this will get us started.

If people have things they want us to talk about during other news, we can definitely talk about it.

In our main segment, we're going to talk about Shields Up.  No, not GRC's program, no not a submarine shield, but our shield.  <a href="https://www.cyberscoop.com/shields-up-easterly-inglis-op-ed/">'Shields Up': the new normal in cyberspace </a> is our Cyberscoop article.

All this, your thoughts, comments and other things on this week's edition of The Security box.  Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894971</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894971/the-technology-blog/2025_02_13_03_23_39_2453cfa5-e57d-4de8-9e0b-8a9abe3d380d.mp3" length="117134314" type="audio/mpeg"/>
      <guid isPermaLink="false">7d8bc30b-eea4-4726-8898-3dbce4a83896</guid>
      <itunes:duration>7313</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Jun 2022 17:53:31 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b7b8937aedb6f6a8a336e7f2e495efc9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 98: China and 88 percent of searches on news sites]]></title>
      <itunes:title><![CDATA[The Security box, podcast 98: China and 88 percent of searches on news sites]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 98. This is a bit of a technical difficulty show, starting with Clubhouse having some sort of trouble, and then the software too. Despite these, the show went on.  

We had a chat session that talked about social media and Paypal, see the blog for Paypal.

The main topic is <a href="https://www.cyberscoop.com/chinese-state-media-88-percent-news-results/">Chinese state media propaganda found in 88% of Google, Bing news searches  </a> which we step through.  

If you have any questions or comments, please reach out.  Thanks so much for having an interest in our show, and we'll be back next week!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894972</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894972/the-technology-blog/2025_02_13_03_26_29_10e70441-2b7d-43f8-a857-683cf0077b24.mp3" length="139811677" type="audio/mpeg"/>
      <guid isPermaLink="false">1bf38cd4-9b02-4dae-9437-56c77887485c</guid>
      <itunes:duration>8729</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 08 Jun 2022 22:02:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1fba3fcdf64dbde7751b40f9d0d9e654.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 97: Breach Fatigue]]></title>
      <itunes:title><![CDATA[The Security box, podcast 97: Breach Fatigue]]></itunes:title>
      <description><![CDATA[Hello everyone. Breach Fatigue is probably on everyone's minds, and I think its time that we talk about it.  Luckily, there's an article titled <a href="https://blog.lastpass.com/2022/04/combatting-breach-fatigue/">Combatting Breach Fatigue </a> comes from Lastpass and I thought it should be talked about.  

Even though last week's podcast had some good content and could in some minds be non-security related, between all of that stuff and this, who could blame me for last week?  

Besides all of that, we will see what people have for what they want to talk about in the news notes section.

All of this and other thoughts will be part of the program. Enjoy what we have for you and I hope no tyraid today.  Thanks for listening!  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894974</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894974/the-technology-blog/2025_02_13_03_13_03_0ee658c0-bd73-45c8-a476-65926a1e1493.mp3" length="95111352" type="audio/mpeg"/>
      <guid isPermaLink="false">ae700900-f598-4f32-8945-36866e45c8cb</guid>
      <itunes:duration>5938</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 Jun 2022 18:26:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_56dbf95dcdc2a8292abac97cac5a766e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 96: 2 health care places targeted with ransomware]]></title>
      <itunes:title><![CDATA[The Security box, podcast 96: 2 health care places targeted with ransomware]]></itunes:title>
      <description><![CDATA[Welcome to podcast 96 of the security box podcast series. We're going to bring back news notes for this program, and we've picked out some good stuff. Some may be on this blog, other may not be on this blog.

Our main topic is going to talk about the Health Care Industry and whether it is as secure as possible.  The reason why we're going to talk about it is plain and simple, there have apparently been two more attacks on the health care industry, yet, one of them is a non-profit.  

The article is titled <a href="https://www.cyberscoop.com/ransomware-us-hospital-system-healthcare/">Ransomware group strikes second U.S. health care system in the last two months.  </a> I bet that there will be a lot of talk on this one, even as we read the notes on this.  

I've got plenty more things lined up for the podcast, so please feel free to stay tuned and learn with us.  Some may be a bit older, but yet worth talking about.

Remember to subscribe to <a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">The Security Box list </a> as we post items and you're welcome to discuss them on list.

We thank you for listening to the program and we'll see you on another edition of the program next time!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894976</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894976/the-technology-blog/2025_02_13_03_28_05_334f03e0-a72b-4bad-b742-9a5b0d3b63e1.mp3" length="142076805" type="audio/mpeg"/>
      <guid isPermaLink="false">bd71916e-070f-4591-846f-b51e616b35f1</guid>
      <itunes:duration>8870</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 May 2022 02:09:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_00076060282f89ec64eb0c54cf5f14e6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 95: A vulnerability of 9.8 in a Big-IP appliance]]></title>
      <itunes:title><![CDATA[The Security box, podcast 95: A vulnerability of 9.8 in a Big-IP appliance]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to the security box, podcast 95. On this program, we're going to talk about one vulnerability that affects big internet appliances at a CVSS score of 9.8. 

We'll see what else comes up including some Crypto news and things posted to our list and what type of order it'll all be in.

The main article we'll be covering is titled <a href="https://arstechnica.com/?p=1853107">Hackers are actively exploiting BIG-IP vulnerability with a 9.8 severity rating </a> which comes from Ars Technica..  

Ars is probably not going to be the only one covering this, there will be others out there too.  

The JRN hopes you enjoy the program, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894977</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894977/the-technology-blog/2025_02_13_03_27_53_e9c128f0-b1a0-45e1-ae0e-4345122ce3a9.mp3" length="98519854" type="audio/mpeg"/>
      <guid isPermaLink="false">aec8f091-db7e-44de-bc86-b9b4a315dbec</guid>
      <itunes:duration>6151</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 May 2022 21:29:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f2ea303f4268278034a9742e9bdaa746.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 94: EDR's real or fake]]></title>
      <itunes:title><![CDATA[The Security box, podcast 94: EDR's real or fake]]></itunes:title>
      <description><![CDATA[Welcome to podcast 94 of the security box. On this edition of the program, we're going to talk about emergency direct requests (EDR's) as there are now actors out there that will use Fake EDR's for getting what they want. 

There are two articles, both which I read.

<ul>
<li> <a href="https://www.cyberscoop.com/twitter-emergency-disclosure-request-lalartu-aleksandr-sikerin-revil-ransomware-researcher-threats/">Twitter may have given user's private data to a ransomware hacker, who then ran a researcher offline </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2022/04/fighting-fake-edrs-with-credit-ratings-for-police/">Fighting Fake EDRs With ‘Credit Ratings’ for Police </a> Krebs on Security </li>
</ul>

I read the Krebs article first, and some time later, I found the Cyberscoop article which was quite interesting.  

Besides that, we'll be seeing what others have read, although I've been working and not blogging much between podcasts.

I hope that you enjoy the program as much as we are putting it together, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894979</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894979/the-technology-blog/2025_02_13_03_24_33_098e5829-5077-4213-b42f-1db2b202ec3b.mp3" length="104203048" type="audio/mpeg"/>
      <guid isPermaLink="false">d42dfdd3-cd51-490b-b477-da14bb03c920</guid>
      <itunes:duration>6506</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 12 May 2022 01:08:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d8a038f2298f5d4ee7f08a052961001f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, podcast 93: Earth Berberoka]]></title>
      <itunes:title><![CDATA[The security box, podcast 93: Earth Berberoka]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 93. We do cover some very interesting topics today including the recent news about our Amazon devices. <blockquote <a href="https://technology.jaredrimer.net/2022/04/30/lets-talk-a-little-bit-about-our-alexa-devices/">blog post </a> 

Besides our amazon devices, we're going to talk as well about an Antivirus program with interesting accessibility isues but also coming with a VPN that can monitor what you're doing.  Maybe a problem much?

Our final topic is a big huge problem which we need to be aware of.  The article is titled <a href="https://www.trendmicro.com/en_us/research/22/d/new-apt-group-earth-berberoka-targets-gambling-websites-with-old.html">New APT Group Earth Berberoka Targets Gambling Websites With Old and New Malware </a> which is quite interesting and really worth the read.

While it is only targeting gambling sites for now, this thing is packed full of problems and problems which can really cause you not to have a computer if you still have one.  

Have comments for the show?  Contact details are in the program, and I hope you enjoy!

This program was aired on the Independent channel on May 4, 2020 and was rebroadcasted on May 6, 2020 through <a href="http://bluestreakradio.com">Blue Streak Radio. </a>  It airs through their network on Fridays from 8 am CT until its conclusion.  

I hope that each and every one of you enjoy the program as much as I am bringing it to you, and next week, we've got a great topic dealing with emergency data requests.  You don't want to miss it! See you all then!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894982</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894982/the-technology-blog/2025_02_13_03_25_53_790f849d-e320-46e7-8e2d-547924e73404.mp3" length="165588231" type="audio/mpeg"/>
      <guid isPermaLink="false">d48a7b2f-a6af-4370-b2dd-e83cbac6001b</guid>
      <itunes:duration>10338</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 May 2022 16:45:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f1aeabca280b29685dcfac24edc8a02f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 92: Conti did not do what they said they would do, attacks health care providers and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 92: Conti did not do what they said they would do, attacks health care providers and more]]></itunes:title>
      <description><![CDATA[Hello everyone! Welcome to the security box, and this is program 92. On this program, we're going to talk about Conti, again. 

The article is titled: <a href="https://krebsonsecurity.com/2022/04/contis-ransomware-toll-on-the-healthcare-industry/">Conti’s Ransomware Toll on the Healthcare Industry </a> which was quite interesting when I read it.  

Besides that, we'll see what others found of interest through the landscape and I'll talk about some stuff as well including the Who's Who directory and updates on it.

I hope that you enjoy the program as much as I have bringing it to you, and welcome <a href="http://bluestreakradio.com">Blue Streak Radio </a> to the program.  They'll air this program on Friday morning Central time.

Thanks so much for having an interest on the program.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894984</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894984/the-technology-blog/2025_02_13_03_24_57_ef3289d2-8559-44ce-be6c-84e568d231cf.mp3" length="161125989" type="audio/mpeg"/>
      <guid isPermaLink="false">36334aab-31c2-4692-a283-a33058aaf541</guid>
      <itunes:duration>10060</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 27 Apr 2022 23:25:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2c7f94d546abbe37b52274ad127c0aed.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 91: APT, the advanced persistent teenager]]></title>
      <itunes:title><![CDATA[The Security box, podcast 91: APT, the advanced persistent teenager]]></itunes:title>
      <description><![CDATA[Hello folks, we're releasing two podcasts on the same day on two different set of subjects. This one, the security box. I hope you all enjoy the program, and below, please find the show notes!

Hello everyone, welcome to podcast 91.  We're dealing with the teenage hacker in two different articles.  As I've determined, there is only one article on the advanced persistent teenager which can also be labeled APT.  

The first article we're covering is: <a href="https://krebsonsecurity.com/2022/03/a-closer-look-at-the-lapsus-data-extortion-group/">A Closer Look at the LAPSUS$ Data Extortion Group </a> which was read all the way back near the end of March.  

This will then lead us in to our other article <a href="https://krebsonsecurity.com/2022/04/the-original-apt-advanced-persistent-teenagers/">The Original APT: Advanced Persistent Teenagers </a> which was also good and in depth.  I got confused by headings, but this article is only one article part long.  

We'll also be taking any comments and questions from the audience on Clubhouse and we'll see what else we have to offer.  

Make sure you check the blog for continuing article writing, we continue to post stuff although there was a lapse of posting lately, but it hasn't been that long.  

Thanks so much for listening and enjoy the program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894986</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894986/the-technology-blog/2025_02_13_03_27_14_7fa8b656-14be-488a-b5a7-0980347aaf91.mp3" length="209001564" type="audio/mpeg"/>
      <guid isPermaLink="false">491ecd5d-72dd-40d6-a7cf-1e1a87ba8ae8</guid>
      <itunes:duration>13049</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Apr 2022 23:14:49 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_63caaef02b8c5de33b38d633962ca8f6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 362: Michael in Tennessee]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 362: Michael in Tennessee]]></itunes:title>
      <description><![CDATA[I'm looking to bring back the tech podcast after some time. On this podcast, we've got Michael in Tennessee. Here areh the notes from this program.



Hello folks, welcome to the tech podcast.  Its been quite awhile since we've done a tech podcast, but its appropriate seeing how the Security Box ran almost 3 and a half hours.  Today on the first tech podcast since 2021, we're going to have Michael in Tennessee talking about some of the security landscape and what he's read of late.  Lots to talk about and maybe there might be some solutions that people can think about here too.  The program is over 1 and a half hours and I'm glad I did it this way.  

I'll be looking at releasing some more stuff soon!  Thanks for reading, listening and finding what we have to say of value.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894988</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894988/the-technology-blog/2025_02_13_03_27_37_588758df-90c7-460e-a947-6d793bcce7e0.mp3" length="85395438" type="audio/mpeg"/>
      <guid isPermaLink="false">ffaf47ab-c1cc-47bd-ae48-359d4bde7c05</guid>
      <itunes:duration>5331</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Apr 2022 23:10:29 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f4a3514f0b13ebc5c069e15a022d1594.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 90: 11 android apps to remove from your device and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 90: 11 android apps to remove from your device and more]]></itunes:title>
      <description><![CDATA[I thought the podcast was uploaded here, but I uploaded it to my other feed. Sorry about that folks!

Here are the show notes.



Hello everyone, welcome to podcast 90. On this edition of the podcast, we're going to have our main topic on <a href="https://www.phonearena.com/news/millions-android-users-delete-apps-removed-from-google-play-store_id139477">Millions of Android users should delete these 11 apps after Google kicked them out of the Play Store </a> which is an article talking about 11 different applications that we need to be aware of that may have been causing harm.  I'd say that IOS users like myself should be aware of these in case these apps make it to the app store and we get messages from places to download them as well.

Besides that, we'll have anything that comes from the community on things they want to talk about and I even think I can do my intros a little bit differently.  I hope that you all enjoy the program and thanks for listening!



If you go to the blog and you don't see it in RSS, please contact me so I can fix it quicker.  Thanks.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894989</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894989/the-technology-blog/2025_02_13_03_28_29_a49f2f06-6238-4d15-a13e-7a641ab88da3.mp3" length="123300253" type="audio/mpeg"/>
      <guid isPermaLink="false">e5919ef0-20a1-4392-a41d-f5299ad7ae45</guid>
      <itunes:duration>7698</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 15 Apr 2022 18:35:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0e5902d332bf5de30ca6d85785973f03.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 89: Spring4Shell that didn't spring]]></title>
      <itunes:title><![CDATA[The Security box, podcast 89: Spring4Shell that didn't spring]]></itunes:title>
      <description><![CDATA[Hello folks, I thought I uploaded the show from Thursday, sorry about that. Notes are below.


Hello folks, on today's podcast, we're going to cover <a href="https://arstechnica.com/?p=1845362">Explaining Spring4Shell: The Internet security disaster that wasn’t </a> as our main topic. 

We will cover some of the other landscape as well as any other topics the public has to offer.

Note that today's program was done on Thursday to account for an event I attended the day before.  

We should be able to return to a Wednesday schedule next week.  Enjoy the program and thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894990</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894990/the-technology-blog/2025_02_13_03_24_04_273cfa34-2e76-4a95-a30a-7fd660dcb5db.mp3" length="72713408" type="audio/mpeg"/>
      <guid isPermaLink="false">d51d620f-31e0-4b7f-a1d2-8368332a5ab9</guid>
      <itunes:duration>4539</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 10 Apr 2022 15:51:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_01c6bdc5a73357d1c5722c5fe981270c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 88: The Different types of internet]]></title>
      <itunes:title><![CDATA[The Security box, podcast 88: The Different types of internet]]></itunes:title>
      <description><![CDATA[Happy Thursday! The podcast file was created yesterday, but we're relasing now. I hope you enjoy the program and thanks for listening!



The Internet is a complex thing.  There are different types of internet connections, some are most common than others, but all are important.  In a recent article I spotted, the connection known as Sattelite Internet was targeted apparently by Russia, but that is not confirmed.  The article is titled <a href="https://arstechnica.com/?p=1843265">A mysterious satellite hack has victims far beyond Ukraine. </a>  

We'll also have other topics that might be of interest and we'll see what others have to say as well.  Thanks so much for listening and enjoying the program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894991</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894991/the-technology-blog/2025_02_13_03_29_01_ad192e32-15f2-4d0f-82e7-6b43f44b2501.mp3" length="108313133" type="audio/mpeg"/>
      <guid isPermaLink="false">9b6ba1f0-39d4-4f0c-a35b-87cab910e7b8</guid>
      <itunes:duration>6762</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 31 Mar 2022 16:16:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_39851e80f56927dd978ce5834e76faf9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 87: SMS PVA: What is it and should we be concerned?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 87: SMS PVA: What is it and should we be concerned?]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to podcast 87 of the security box. On this podcast, we talk about a wide range of topics, but we also talk about a three part article set dealing with SMS services that can be used to sign you, the consumer up for services that you may not even know about or even want. 

While the applications discussed here are potentially Android based, we need everyone to know what is out there in case something is developed for IOS or any other system you may use.  

Below, please find the links to the articles we are going to be taking from as part of this discussion.  <ul>
<li> <a href="https://www.trendmicro.com/en_us/research/22/b/sms-pva-cybercriminals-part-1.html">SMS PVA Part 1: Underground Service for Cybercriminals </a> </li>
<li> <a href="https://www.trendmicro.com/en_us/research/22/b/sms-pva-cybercriminals-part-2.html">SMS PVA Part 2: Underground Service for Cybercriminals </a> </li>
<li> <a href="https://www.trendmicro.com/en_us/research/22/c/sms-pva-countries-part-3.html">SMS PVA Part 3: Countries Most Impacted by Service </a> </li>
</ul>

What caught me on wanting to talk about this is the fact that the United States is affected by this, although we don't know by how much.  

Understand that I think everyone should be aware of what is out there, and hopefully the articles and information can give you a sense on how you can stay as safe as possible.  Thanks for listening, reading and participating in this important topic.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894992</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894992/the-technology-blog/2025_02_13_03_27_59_001b0f1b-4f1a-4199-b9b5-6e250a6146d9.mp3" length="200491192" type="audio/mpeg"/>
      <guid isPermaLink="false">c0d811f7-89bb-4f84-818a-79423e95c563</guid>
      <itunes:duration>12518</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Mar 2022 20:27:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a83dd8d4069f42c1d8da6db96b31c66f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 86: Windows Updates, emoticons potentially going to be an issue, books and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 86: Windows Updates, emoticons potentially going to be an issue, books and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 86. On this podcast, we'll cover Windows Update. I only have one article now instead of the two, so we'll have to see how I can get the other back.  Besides that, we'll have comments from the Clubhouse room and other topics they may want to bring up.

<ul>
<li> <a href="https://krebsonsecurity.com/2022/03/microsoft-patch-tuesday-march-2022-edition/">Microsoft Patch Tuesday, March 2022 Edition </a> Krebs On Security </a> </li>
</ul>

I hope you'll enjoy the program as much as I am bringing it to you.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894993</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894993/the-technology-blog/2025_02_13_03_16_36_036aea69-1e33-405e-8fc2-c3b8e98fb42c.mp3" length="152214002" type="audio/mpeg"/>
      <guid isPermaLink="false">29612b60-3642-48bd-89c9-1701caadf298</guid>
      <itunes:duration>9503</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Mar 2022 22:17:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_43e9ea164233f3c0ad01b46145228e1c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 85: A look at how I got in to this industry, some newsy stuff and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 85: A look at how I got in to this industry, some newsy stuff and more]]></itunes:title>
      <description><![CDATA[Today, the Security box takes a break from day to day activity although we've covered some scam type activities and even went through how I got started in this industry and how I think information can be given out successfully. 

We also have some tracks that play as well. 

The program lasts almost 3 and a half hours, and I hope you enjoy it.  

I even talk about why we've temporarily retired the normal theme we use for the program.

Check the blog for complete details on things that may have been mentioned.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894994</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894994/the-technology-blog/2025_02_13_03_30_43_21206cb8-1615-474a-b76e-1b2f70e52aba.mp3" length="209099747" type="audio/mpeg"/>
      <guid isPermaLink="false">1c113056-0016-4dbc-9362-91daf4d5fe00</guid>
      <itunes:duration>13055</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Mar 2022 00:11:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5d99e1dbf6915c7f80f8ea95f8d50be5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 85: What's happening with Russia? They're at it again!]]></title>
      <itunes:title><![CDATA[The Security box, podcast 85: What's happening with Russia? They're at it again!]]></itunes:title>
      <description><![CDATA[Russia is the hot topic right now, and with good reason. On this podcast, we'll talk a little bit about what we've learned, talk about the scams, recommend books and more. Here are the complete show notes for this week's podcast.



Welcome to podcast 84 of the security box.  This time, let's discuss Russia's involvement in pure problems.  Now, they have decided to go to war, and its against Ukraine.  They've been known to do DDOS attacks, ransomware attacks, spreading information that is not true or partially true or even completely false, denying many different things through the years ike the 2016 and 2020 presidential campaigns, and even more may be in the pipeline.  

Below, please find links to some of the recent blog posts that I've done since the war started.  In no way am I linking to everything, but you need to understand what's going on so you can make the most informed decision on your needs based on what is actually happening.

<ul>
<li> <a href="https://technology.jaredrimer.net/2022/02/27/mcdonalds-apparently-hacked-russia-has-started-going-after-u-s-businesses/">McDonalds apparently hacked? Russia has started going after U.S. businesses </a> </li>
<li> <a href="https://technology.jaredrimer.net/2022/02/26/conti-supports-russia-threatens-retaliation/">Conti supports Russia, threatens retaliation </a> </li>
<li> <a href="https://technology.jaredrimer.net/2022/02/26/ukrainian-officials-warn-of-new-phishing-attacks/">Ukrainian officials warn of new phishing attacks </a> </li>
<li> <a href="https://technology.jaredrimer.net/2022/02/26/russia-vs-ukraine-could-it-affect-us-info-from-kim-komandos-weekend-newsletters/">Russia VS Ukraine, could it affect us? Info from Kim Komando’s Weekend Newsletters </a> </li>
	<li> <a href="https://technology.jaredrimer.net/2022/02/24/the-war-starts-with-ddos-attacks-against-ukraine-this-is-the-beginning-of-things/">The war starts with DDOS attacks against Ukraine, this is the beginning of things </a> </li>
<li> <a href="https://technology.jaredrimer.net/2022/02/24/russia-and-ukraine-the-battle-has-begun/">Russia and Ukraine, the battle has begun </a> </li>
<li> <a href="https://technology.jaredrimer.net/2022/02/26/cyber-security-experts-weigh-in-on-the-war-on-ukraine/">Cyber Security Experts weigh in on the war on Ukraine </a> </li>
</ul>

I put the link to the video last, because while informative, we know that things are changing rapidly.  I put McDonalds first because it was the last we posted and most viewed on linkedin.  It got a retweet in France according to a comment.  

What should you read?  There are several books you can definitely read.  

<ul>
<li> <a href="http://zerodaythebook.com/books/zero-day/">Zero Day: A Novel </a> </li>
<li> <a href="http://zerodaythebook.com/books/rogue-code/">Rogue Code: A Novel </a> </li>
<li> <a href="http://www.zerodaythebook.com/books/trojan-horse/">Trojan Horse: A Novel </a> </li>
</ul>

All of these books are written by Mark Russinovich , someone who works at Microsoft.  To learn more about Mark, the various books he's written including those I've linked in these notes, please visit <a href="http://www.zerodaythebook.com">zero day the book </a> which is his web site.  All books linked from his site I've read, zero day may be more of what we're dealing with possibly right now.  Some books may be available through NLS's bard and Amazon as well as Apple Books.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894995</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894995/the-technology-blog/2025_02_13_03_30_12_ae01d5bd-27de-49e4-b3c1-417132e68984.mp3" length="158531185" type="audio/mpeg"/>
      <guid isPermaLink="false">d9a30d2b-3e05-4570-b01e-d1333731a497</guid>
      <itunes:duration>9898</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 03 Mar 2022 18:44:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ae57c666913f824b6c4e8f578421ac3f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 83: Sim Swapping and Trick Bot]]></title>
      <itunes:title><![CDATA[The Security box, podcast 83: Sim Swapping and Trick Bot]]></itunes:title>
      <description><![CDATA[Hello folks,

This is Jared here, and its time for another Security Box. In this almost three hour program, we cover the olden days of Spam and what someone was seeing during our live program.

Besides that, we've got Trick Bot and Sim Swapping as our two main topics. 

Here are the show notes with links, and we'll be back on another show!



Hello folks, welcome to podcast 83.

Let's start with something that came to my attention on Monday.  Let's recap a little bit about Sim Swapping.

This actually came up on Monday when someone who comes to assist me was saying to me that someone they knew had their phone cloned.  They told me that T-Mobile, the company they were with, told them the phone was cloned.  

As we know, T-Mobile was breached, and I don't know about you, but I definitely don't trust them.  Remember the following?

<ul>
<li> <a href="https://technology.jaredrimer.net/2021/10/14/are-you-a-t-mobile-customer-better-pay-attention-to-this/">Are you a T-Mobile customer? Better pay attention to this </a> </li>
<li> <a href="https://technology.jaredrimer.net/2021/06/05/are-you-a-t-mobile-customer-better-read-this-one/">Are you a T-mobile customer? Better read this one </a> </li>
<li> <a href="https://technology.jaredrimer.net/2021/01/04/another-t-mobile-breach-the-4th-in-several-years/">Another t-mobile breach, the 4th in several years </a> </li>
</ul>

Remember too, that <a href="https://technology.jaredrimer.net/2021/06/09/the-security-box-podcast-47-security-is-our-theme-with-lots-of-stuff-in-regards-to-it/">Podcast 47 </a> covered this in news notes and comments came in too.  So there is plenty I covered.

Please also read <a href="https://en.wikipedia.org/wiki/SIM_swap_scam">SIM swap scam </a> from Wikipedia.  </a>

As our main topic, I want to catch people up on what is going on with Trick Bot.  The article <a href="https://www.cyberscoop.com/trickbot-analysis-check-point-research/">TrickBot developers continue to refine the malware's sneakiness and power </a> from Cyberscoop will be used in this discussion.

The public on Clubhouse got in to a Spam discussion with one talking about the spam messages they were getting.  While educational, we did some good laughs in this program and we thank everyone for participating on clubhouse's platform.  Tunes were also played during the program.  

We thank you so much for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894996</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894996/the-technology-blog/2025_02_13_03_29_47_93bc31b8-c5c4-4c5d-bb9b-4117628f7f53.mp3" length="163651069" type="audio/mpeg"/>
      <guid isPermaLink="false">a6a3d289-80e6-4f2f-9725-f477b8daec54</guid>
      <itunes:duration>10217</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Feb 2022 01:18:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_944f228a8c28ded02496f4f5de1fd564.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 82: Windows update, Scam talk and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 82: Windows update, Scam talk and more]]></itunes:title>
      <description><![CDATA[I ended up falling sick, sorry for the delayed release of Wednesdays program. I'll be fine and have already started the process of getting medicated.

This past Wednesday, we had several people on Clubhouse and we talked about Windows Update and a bunch of other stuff too. Here are the show notes.



Hello everyone!  Welcome to podcast 82 of the Security Box.  This week, we'll catch up on Windows Update, and we will also cover a lot of other stuff from the blog as well.  We'll also see what else the listenership and participents in Clubhouse want to talk about.

What happened in Windows Update?  Our good buddy Brian Krebs from Krebs on Security has the full details.  <a href="https://krebsonsecurity.com/2022/02/microsoft-patch-tuesday-february-2022-edition/">Microsoft Patch Tuesday, February 2022 Edition </a> is the article.  Lots of linked material that we links to some CVE numbers if you're interested.  


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894997</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894997/the-technology-blog/2025_02_13_03_31_19_9305a4d4-c724-44d0-bb61-ecdd2d847540.mp3" length="146592996" type="audio/mpeg"/>
      <guid isPermaLink="false">dd850286-5e20-4dab-a025-272ff4f018b1</guid>
      <itunes:duration>9152</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 18 Feb 2022 18:17:37 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d157100392f463e2a9b8d01ce20a8c1d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 81: Fake Investor does not go away, Fake investor is back and still the same]]></title>
      <itunes:title><![CDATA[The Security box, podcast 81: Fake Investor does not go away, Fake investor is back and still the same]]></itunes:title>
      <description><![CDATA[ Title: Fake Investor does not go away, Fake investor is back and still the same 

Hello folks, welcome to podcast 81 of the Security Box! It seems like its time for an update on a very interesting character isn't it? Its time for another update on the fake investor we've covered since podcast 10.  I know that I've linked somewhere on the blog all of the podcasts we've covered John Bernard, and this is going to be one of those podcasts.  

What has he done lately?  <a href="https://krebsonsecurity.com/2022/01/fake-investor-john-bernard-sinks-norwegian-green-shipping-dreams/">This article titled Fake Investor John Bernard Sinks Norwegian Green Shipping Dreams </a> from Krebs on Security has the entire details on what he has been up to now and a reminder of his past.  

Besides all of this, we'll step through the news that has been posted to the TSB list as well as on our blog.  

We also had a new person come in and aask some stuff they've heard and we debunk the myths and facts of everything.  

Want to subscribe to the Security Box discussion list?  We'll post stuff we're reading, you can discuss it with us, and even post your own stuff too.  

<a href="https://www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">Here is a link to the Security Box discussion list </a> hosted through 986themix.  Just put your email address and name if you wish, and hit that subscribe button.  Follow any email instructions you get.  Just subscribing will not get you on by default.  Confirmations last about 3 days.  

I hope you enjoy the program as much as I am bringing it to you!  Its going to be a great show.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894998</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894998/the-technology-blog/2025_02_13_03_30_14_5a52b945-cfee-44b1-ac7d-77d69b0bbf6c.mp3" length="144133605" type="audio/mpeg"/>
      <guid isPermaLink="false">ee121aa7-0b7b-4e21-b8fe-e03d65a683bf</guid>
      <itunes:duration>8999</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 10 Feb 2022 02:56:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_cef8612f0f0c496991566cfd45774922.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 79: This App is completely safe to use]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 79: This App is completely safe to use]]></itunes:title>
      <description><![CDATA[Welcome to podcast 80 of the Security box. On this edition, let's talk about Wordpress. While it is a good platform for people to use for web sites and even blogging as I do, it can come with risks we need to be aware of.

Part of those risks include keeping it up to date and of course the plug ins you install.  

A lot of plugins can be found through the install section of your plug ins management  facility, but you can also install plugins manually.  

The article we're going to cover today comes to us from Ars Technica and was sent by our godd friend, Michael.  <a href="https://arstechnica.com/?p=1827592">Supply chain attack used legitimate WordPress add-ons to backdoor sites </a> is the article.  I hope that you find the discussion of interest, and if you saw the write up, you found it of value.  

We'll also touch on other things blogged as well as ask any audience members what they learned and/or read during our discussion today.  

Remember, you can always contact me through the tech blog or even through the show's contact info as well.  Thanks so much for listening, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1894999</link>
      <enclosure url="https://content.rss.com/episodes/316363/1894999/the-technology-blog/2025_02_13_03_29_54_01ba01ab-73cd-4b46-8cf8-9b1c1aab7e3e.mp3" length="155738954" type="audio/mpeg"/>
      <guid isPermaLink="false">799321ec-0700-4e66-9821-fcb3a35156b1</guid>
      <itunes:duration>9723</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Feb 2022 22:57:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_07fe1bf83225670827a16fc404f14a45.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 79: The Security Box, podcast 79: This App is completely safe to use]]></title>
      <itunes:title><![CDATA[The Security box, podcast 79: The Security Box, podcast 79: This App is completely safe to use]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 79. I probably am not surprised really about what we're going to talk about, and it was talked about on Throwback Saturday Night's security segment. Now, we're going to take our time on it, because I feel we need to.

What are we talking about you might ask? <a href="https://www.cbc.ca/sports/olympics/beijing-olympic-app-security-1.6318925">Toronto lab finds security vulnerabilities, censorship framework in Olympic app </a> is an article talking about the olympics and a new app the IOC basically says is completely safe to use. Researchers are saying differently, and one major problem that two of us see brings this to full circle.

I'd like to thank DJ Terry of <a href="http://www.986themix.com">The Mix </a> for calling and asking about this after he heard very little on his news channel.  With the games so close away now, this is the perfect time for someone to take advantage and do something they think is a good idea to do in their mind.

Thanks for listening whether live or through the podcast or replay, and we'll catch up with you very soon!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895001</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895001/the-technology-blog/2025_02_13_03_28_41_c81dedd9-2a4a-43da-895b-00258e862a0f.mp3" length="82332151" type="audio/mpeg"/>
      <guid isPermaLink="false">8dc364d8-2f85-4834-a6de-749a39948e4d</guid>
      <itunes:duration>5145</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 26 Jan 2022 21:30:24 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_23dfc5ba6ca953d6d55bf0cf429fa737.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 78: Windows Update includes a Wormable Flaw]]></title>
      <itunes:title><![CDATA[The Security box, podcast 78: Windows Update includes a Wormable Flaw]]></itunes:title>
      <description><![CDATA[The Security box, podcast 78: Windows Update includes a Wormable Flaw

Welcome to podcast 78 of the Security Box. As we do typically on the podcast, we spend some time catching people up on what has been going on in Redmond, Washington with Windows Update. 

We've only got one article, however, News of the week for January 14th has the other article.  

<a href="https://krebsonsecurity.com/2022/01/wormable-flaw-leads-january-2022-patch-tuesday/">‘Wormable’ Flaw Leads January 2022 Patch Tuesday </a> comes to us from Krebs on Security, and it covers this huge problem and others across Redmond and others too.  

Please feel free to send your messages, topics and the like for consideration.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895002</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895002/the-technology-blog/2025_02_13_03_15_44_41812098-3e85-4440-81c9-ae48559c1f2a.mp3" length="98118987" type="audio/mpeg"/>
      <guid isPermaLink="false">c0759bb1-09ce-40d5-92f6-06843d2c32e9</guid>
      <itunes:duration>6132</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 Jan 2022 17:52:56 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4a788074c3105039b6ad105327b45d4d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 77: Google, this wasn't a critical bug?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 77: Google, this wasn't a critical bug?]]></itunes:title>
      <description><![CDATA[I realized I said podcast 75 at some point in my audio, this is podcast 77. Too late for me to change it however.

Below is the notations which include a link to today's program. 

We return to a Wednesday schedule next week.



Hello folks, welcome to the security box, podcast 77.  <a href="https://arstechnica.com/?p=1823613">Google fixes nightmare Android bug that stopped user from calling 911 </a> is our main topic of today's program, but I also cover other tech and other odds and ends too.  We did have one guest available to chat with us, and we thank them for coming.  We hope you enjoy the program and the few tracks at the end, and thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895003</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895003/the-technology-blog/2025_02_13_03_18_26_91002c24-edf1-4bec-8d39-f85fc1acffc1.mp3" length="90350379" type="audio/mpeg"/>
      <guid isPermaLink="false">4c291c7e-1182-424e-a7d9-422db4826cff</guid>
      <itunes:duration>5646</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 14 Jan 2022 02:17:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_56209ee412efa3fa01e6a94dd99c6200.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 76: Advertisers sucking up student data]]></title>
      <itunes:title><![CDATA[The Security box, podcast 76: Advertisers sucking up student data]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 76. On this podcast, we're going to talk about advertisers who are sucking up student data, even though legal action was taken. We'll also have comments and news items from the public if any, maybe some other topics if it turns in to one, and we'll see what else comes up.

 Topic 

<ul>
<li> <a href="https://www.cyberscoop.com/advertisers-are-sucking-up-student-data-even-after-courts-crack-down-researchers-say/">Advertisers are sucking up student data, even after legal action, researchers say </a> Cyberscoop </li>
</ul>


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895004</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895004/the-technology-blog/2025_02_13_03_29_00_d39e0e7f-fde0-4cf7-8276-4a90c35d6392.mp3" length="67682781" type="audio/mpeg"/>
      <guid isPermaLink="false">3d827de1-1dac-4dcd-969e-155ec1578d2c</guid>
      <itunes:duration>4230</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Jan 2022 20:52:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b17b9f636e81797c513c3284b02aa7a0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 75: Predictions 2022]]></title>
      <itunes:title><![CDATA[The Security box, podcast 75: Predictions 2022]]></itunes:title>
      <description><![CDATA[Besides the hour plus discussion we had, we've got music too for the holiday. Hope you have a happy holiday season. No TSB next week unless something breaks, see you in 2022!



Welcome to the Security Box, podcast 75.  On this edition of the podcast, come with me as we do a little predicting for 2022 with a Trend Micro article titled  Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022.   We'll also have thoughts on recent news read, and its been decided that the full news notes segment will be no more in favor of topics that need discussion.  This doesn't mean that we won't cover news, but we'll cover it a little differently.

 Topic 
<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/l/pushing-forward-key-takeaways-from-trend-micros-security-predict.html">Pushing Forward: Key Takeaways From Trend Micro’s Security Predictions for 2022 </a> Trend Micro </li>
</ul>


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895005</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895005/the-technology-blog/2025_02_13_03_31_37_fd6e61f1-a457-4e17-9df1-a4b58f6eb041.mp3" length="84745965" type="audio/mpeg"/>
      <guid isPermaLink="false">ea726cd4-a450-4b7c-893a-a772f0c0c5d0</guid>
      <itunes:duration>5296</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Dec 2021 22:35:17 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4c4d15a8b216b0686101088c4bb914b1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 74: Log4J]]></title>
      <itunes:title><![CDATA[The Security box, podcast 74: Log4J]]></itunes:title>
      <description><![CDATA[Hello folks,

This is still developing and there are more articles than listed here. We'll provide the show notes as is, and check the blog and future podcasts for more. Thanks so much for listening!



Welcome to the Security Box, podcast 74.  On this podcast, something breaking this week called Log4j.  We'll break down three different articles that talk about this.  Instead of me doing news notes, we'll ask listeners if they have any thoughts on what they have read.  There may be questions, comments and other topics not mentioned here for you to enjoy too.  

 Topic 

<ul>
<li> Log4J </li>
<ul>
<li> <a href="https://www.cyberscoop.com/log4j-cisa-easterly-most-serious/">CISA warns 'most serious' Log4j vulnerability likely to affect hundreds of millions of devices </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/log4j-cisa-vulnerability/">CISA to brief critical infrastructure companies about urgent new Log4j vulnerability </a> Cyberscoop </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/l/patch-now-apache-log4j-vulnerability-called-log4shell-being-acti.html">Patch Now: Apache Log4j Vulnerability Called Log4Shell Actively Exploited </a> Trend Micro </li>
</ul>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895006</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895006/the-technology-blog/2025_02_13_03_30_10_8a5e5a74-e8f4-408c-a572-8f4252286718.mp3" length="113076910" type="audio/mpeg"/>
      <guid isPermaLink="false">99f1f966-b82e-41d2-ac5f-b9be3e327508</guid>
      <itunes:duration>7067</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 16 Dec 2021 17:11:37 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_40f89565dc2330aa2205c33e69ce4fdf.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 73: AT&T has a vulnerable device you need to know about, news notes and much more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 73: AT&T has a vulnerable device you need to know about, news notes and much more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box, podcast 73. On this podcast, plenty of news notes and a very interesting topic dealing with AT&T and appliances that are made to bridge the gap between the ISP and the managing of phone calls, conference video systems and similar real-time applications. We hope that you'll enjoy the program and thanks for listening!  

 Topic 

Business customers need to be aware if they use AT&T products of potential malware.  

<ul>
<li> <a href="https://arstechnica.com/?p=1817122">Thousands of AT&T customers in the US infected by new data-stealing malware </a> Ars Technica </li>
</ul>

 News Notes 

Here are the links to News Notes.  Some may be blogged already through the blog, so see if there is something that interests you.

<ul>
<li> There are two articles here talking about the same thing.  This is a very interesting story about a guy that worked for Ubiquiti  until he was recently arrested.  <a href="https://krebsonsecurity.com/2021/12/ubiquiti-developer-charged-with-extortion-causing-2020-breach/">Ubiquiti Developer Charged With Extortion, Causing 2020 “Breach” </a> from Krebs on Security and <a href="https://www.cyberscoop.com/fbi-hack-ubiquit-nikolas-sharp/">Former Ubiquiti employee charged with stealing data, extorting employer </a> from Cyberscoop are the two articles.  They both are similar, but both worth the read.  </li>
<li> <a href="https://techcrunch.com/2021/12/01/hacker-jailed-sim-swapping/">US hacker jailed for role in multimillion-dollar SIM swapping campaign </a> Tech Crunch </li>
<li> <a href="https://techcrunch.com/2021/12/04/uk-internet-of-things-cybersecurity-bill/">Is the UK government’s new IoT cybersecurity bill fit for purpose? </a> Tech Crunch </li>
<li> <a href="https://arstechnica.com/?p=1817677">Ransomware attack on Planned Parenthood steals data of 400,000 patients </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1817891">Emails show what happened before Missouri gov. falsely called journalist a “hacker” </a> Ars Technica </li>
</ul>

Please enjoy the program and thanks so much for listening.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895007</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895007/the-technology-blog/2025_02_13_03_20_00_2a97fcee-7957-4360-8e13-5ec246c79545.mp3" length="133406863" type="audio/mpeg"/>
      <guid isPermaLink="false">b69ae07f-465e-4aeb-b63f-bd0c6eefdcfe</guid>
      <itunes:duration>8337</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Dec 2021 16:29:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3454edf8cea9d0e301a781df36750365.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 72: A Linux vulnerability, news notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 72: A Linux vulnerability, news notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 72. On this program, we're going to play with Linux a little bit as we discuss a vulnerability in the way it works as it can cause DNS cache poisoning. We'll also have news, notes, commentary and more if people have things they want to share.  

 Our Linux Vulnerability 

<ul>
<li> <a href="https://arstechnica.com/?p=1813667">Linux has a serious security problem that once again enables DNS cache poisoning </a> Ars Technica </li>
</ul>

 News Notes 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/11/the-zelle-fraud-scam-how-it-works-how-to-fight-back/">The ‘Zelle Fraud’ Scam: How it Works, How to Fight Back </a> Krebs On Security </li>
<li> <a href="https://krebsonsecurity.com/2021/11/tech-ceo-pleads-to-wire-fraud-in-ip-address-scheme/">Tech CEO Pleads to Wire Fraud in IP Address Scheme </a> Krebs On Security </li>
<li> <a href="https://krebsonsecurity.com/2021/11/sms-about-bank-fraud-as-a-pretext-for-voice-phishing/">SMS About Bank Fraud as a Pretext for Voice Phishing </a> Krebs On Security </li>
<li> <a href="https://www.cyberscoop.com/mandiant-sabbath-arcane-ransomware-rebrand/">Ransomware gang targeting schools, hospitals reinvents itself to avoid scrutiny </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/apple-sues-nso-group-spyware-vendor-known-for-helping-governments-hack-critics/">Apple sues NSO Group, spyware vendor known for helping governments hack critics </a> Cyberscoop </li>
</ul>

More may be on the blog, thanks so much for listening and participating!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895008</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895008/the-technology-blog/2025_02_13_03_35_30_f4f8a968-ab82-48ba-be66-6241c6fef6dd.mp3" length="221359267" type="audio/mpeg"/>
      <guid isPermaLink="false">20a60794-0f98-4cd2-ad63-01880c098426</guid>
      <itunes:duration>13834</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 02 Dec 2021 17:13:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9c1047dcc0746fc31f30f8f25b211c91.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 71: Windows Update, Treat Trends Report, News notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 71: Windows Update, Treat Trends Report, News notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 71. On this podcast, we're going to cover things we did not cover last podcast including windows update and a very interesting report dealing with the threat trends for November 2021. We'll have news notes and plenty of it too.  Hope you enjoy the show!

 Patch Tuesday 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/11/microsoft-patch-tuesday-november-2021-edition/">Microsoft Patch Tuesday, November 2021 Edition </a> Krebs On Security </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/k/november-continues-streak-of-quiet-patch-tuesdays.html">November Continues Streak of Quiet Patch Tuesdays </a> Trend Micro </li> 
</ul>

 Threat trends and intelligence report 

<li> <a href="https://www.phishlabs.com/">new-quarterly-threat-trends-intelligence-report-available </a> Phishlabs </li>
</ul>

 News Notes 

Below, please find the links for the news items that are going to be talked about for this week.  We may have blog posts on some of these, so make sure you check out the blog for complete details  on things and maybe you'll find something you want to comment on.

<ul>
<li> <a href="https://arstechnica.com/?p=1812582">The US closes Huawei loophole, will no longer grant exceptions for ISPs </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/11/1000-android-phones-found-infected-by-creepy-new-spyware/">More than 1,000 Android phones found infected by creepy new spyware </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1814211">Malware downloaded from PyPI 41,000 times was surprisingly stealthy </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1811461">US charges Ukrainian and Russian nationals over ransomware attacks </a> Ars Technica </li>
<li> <a href="https://techcrunch.com/2021/11/17/cisa-iran-hackers-ransomware/">US says Iran-backed hackers are now targeting organizations with ransomware </a> Tech Crunch </li>
<li> <a href="https://arstechnica.com/?p=1812080">Researchers wait 12 months to report vulnerability with 9.8 out of 10 severity rating </a> Ars Technica </li>
</ul>

I hope you enjoy the program, we'll have more news notes and another great program next time.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895011</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895011/the-technology-blog/2025_02_13_03_29_50_a91c94c8-1b4f-4f69-934c-258ec6dde3d0.mp3" length="150471300" type="audio/mpeg"/>
      <guid isPermaLink="false">8af1c985-2fc6-44db-baf2-b0d3887ce6b0</guid>
      <itunes:duration>9404</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 25 Nov 2021 16:35:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_620280e54863aacdbf2325146958745e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 70: Its an open forum edition!]]></title>
      <itunes:title><![CDATA[The Security box, podcast 70: Its an open forum edition!]]></itunes:title>
      <description><![CDATA[Hello folks, better late than never. We have a full open forum show for TSB for this week. While only two of us in the room, we cover quite a bit of various things.  See you next week!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895015</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895015/the-technology-blog/2025_02_13_03_32_06_92adf6cd-4f19-4a81-b2ca-ce930a6581a7.mp3" length="161216613" type="audio/mpeg"/>
      <guid isPermaLink="false">6e2881cc-9387-4358-bf43-826c4b37e6df</guid>
      <itunes:duration>10076</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 19 Nov 2021 21:12:39 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_ef895a3ec53f24ada15793618096c097.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 69: Bullying over the phone lines?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 69: Bullying over the phone lines?]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 69. On this edition of the podcast, we turn our attention to another story, bullying over the telephone lines. We have some news, notes and commentary as well, but the bulk of this program is to think about what might go on these lines whether it is one you are on now, or one you've been on.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895020</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895020/the-technology-blog/2025_02_13_03_25_06_e7002fa6-1c59-4f9e-91cf-5bb4ced77189.mp3" length="161062804" type="audio/mpeg"/>
      <guid isPermaLink="false">c51af854-014e-4e19-81bf-597ea70204cb</guid>
      <itunes:duration>10066</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 10 Nov 2021 22:58:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7ac7933d457bb1fb3296ed6bea3bd927.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 68: NCSAM Extra! Social Media and other aspects to go along with it]]></title>
      <itunes:title><![CDATA[The Security box, podcast 68: NCSAM Extra! Social Media and other aspects to go along with it]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 68. On this edition of the program, let's talk about social media and phone line issues as it relates to cyberbullying and other related topics. We'll also have news, notes and more.

  Social Media discussion 

In a very interesting turn of events, I wasn't necessarily going to put anything in to this section because I was going to do a full vocal discussion.  But when I saw my own digest on my blog, I saw a very interesting post dealing with Social Media and other things related that I'll link here.  I'll still do vocal talk with no notations, but this post is worth bringing up.

,<ul>
<li> <a href="https://technology.jaredrimer.net/2021/10/29/dont-miss-whats-happening-people-on-twitter-are-not-the-first-to-know/">Don’t miss what’s happening People on Twitter are not the first to know. </a> The Technology blog and Podcast's Shaun Everiss </li>
</ul>

 News Notes 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/10/zales-com-leaked-customer-data-just-like-sister-firms-jared-kay-jewelers-did-in-2018/">Zales.com Leaked Customer Data, Just Like Sister Firms Jared, Kay Jewelers Did in 2018 </a> Krebs On Security </li>
<li> <a href="https://www.cyberscoop.com/schreiber-foods-cyber-event-ransomware-agriculture-food/">'Cyber event' knocks dairy giant Schreiber Foods offline amid industry ransomware outbreak </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/evil-corp-nra-ransomware/">A Russian-speaking ransomware gang says it hacked the National Rifle Association </a> Cyberscoop </li>
</ul>

We hope you enjoy the program, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895024</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895024/the-technology-blog/2025_02_13_03_31_42_9b4ffd59-42db-4c66-a54c-1e465d14f181.mp3" length="153895640" type="audio/mpeg"/>
      <guid isPermaLink="false">6c7a0839-52f4-4402-94f4-c7a43f2f4b84</guid>
      <itunes:duration>9618</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 04 Nov 2021 16:21:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3098d3389092f0ec738b9fa5dd01ed49.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 67: Protecting Your Children Online]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 67: Protecting Your Children Online]]></itunes:title>
      <description><![CDATA[Welcome to Week 4 of NCSAM. This week, we're going to cover protecting your children online. Notations are taken from a presentation I heard about the topic, and I've summarized it to tell possibly some stories that may be similar to something you've heard or seen.  We'll also have news, notes and other comments as the program gets started.  

 Protecting Our Children online

<ul>
<li> Protecting your kids online.  Including topics like grooming, cyberbullying and more. </li>
</ul>

 News Notes 

The following are some of the items that have been read within the past week.  Feel free to read the ones that are of interest to you.  

<ul>
<li> <a href="https://arstechnica.com/?p=1806806">FBI, others crush REvil using ransomware gang’s favorite tactic against it </a> Ars Technica </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/j/purplefox-adds-new-backdoor-that-uses-websockets.html">PurpleFox Adds New Backdoor That Uses WebSockets </a> Trend Micro </li>
<li> <a href="https://www.cyberscoop.com/sinclair-broadcast-group-suffers-ransomware-attack-the-latest-affecting-media/">Sinclair Broadcast Group suffers ransomware attack, the latest affecting media </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/candy-corn-hack-halloween/">Candy corn producer says ransomware incident 'not likely' to sour Halloween supplies </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/10/conti-ransom-gang-starts-selling-access-to-victims/">Conti Ransom Gang Starts Selling Access to Victims </a> Krebs On Security </li>
</ul>

I'll try and blog some of this older news we've got, so stay tuned.  Hope you enjoy the show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895028</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895028/the-technology-blog/2025_02_13_03_24_03_b1210a77-415e-4492-88f5-fe5475868a46.mp3" length="160974614" type="audio/mpeg"/>
      <guid isPermaLink="false">66b47afa-d4fc-4083-ba90-bce8b4c38b23</guid>
      <itunes:duration>10060</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 28 Oct 2021 18:28:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_095261b3457732249f37122aa9063b1c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, ppodcast 66: Verizon, T-Mobile, AT&TT, Oh My!]]></title>
      <itunes:title><![CDATA[The Security box, ppodcast 66: Verizon, T-Mobile, AT&TT, Oh My!]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 66. Is 66 a lucky number? T-Mobile and Verizon are in the news with Spam messages, AT&T is in the mix as well in passing, Google is getting in the mix with two-factor authentication on more accounts, as well as news, notes and more. 

 Topics 

<ul>
<li> <a href="http://feedproxy.google.com/~r/PhoneArena-LatestNews/~3/RRtGyD5ZhpI/verizon-subscribers-need-to-watch-out-for-this-scam_id135618">Verizon subscribers are the target of a phishing expedition; do not respond to this text message </a> Phone Arena </li>
<li> <a href="http://feedproxy.google.com/~r/PhoneArena-LatestNews/~3/aWmmkZ79dj8/t-mobile-customers-targeted-for-spam-texts_id135518">T-Mobile customers are receiving spam texts possibly related to August's data breach </a> Phone Arena </li>
</ul>

 NCSAM 
<ul>
<li> <a href="http://feedproxy.google.com/~r/PhoneArena-LatestNews/~3/mANY8PpzEzQ/google-to-turn-on-two-step-verification-by-default-for-150-million-accounts_id135520">Google will enable two-step verification by default on 150 million accounts before year's end </a> Phone Arena </li>
</ul>

 News Notes read from around the landscape 

The following are links to  stories that have been read from across the landscape.  In October, we do news notes live so that you, the listener, can get a benefit of this being a discussion.  If you like the way this is being done, please let us know and I may do it full time.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/10/how-coinbase-phishers-steal-one-time-passwords/">How Coinbase Phishers Steal One-Time Passwords </a> Krebs On Security </li>
	<li> <a href="http://feedproxy.google.com/~r/PhoneArena-LatestNews/~3/Foa5l8fWMtw/some-android-users-not-able-to-opt-out-of-sharing-of-personal-data_id135694">Some versions of Android share users' personal data with no chance to opt-out </a> Phone Arena </li>
<li> <a href="https://arstechnica.com/?p=1801922">US gov’t will slap contractors with civil lawsuits for hiding breaches </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1802529">Millionaire Twitch streamers react to their leaked earnings </a> Ars Technica </li>
</ul>

Hope you all enjoy the program, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895032</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895032/the-technology-blog/2025_02_13_03_41_14_7c874886-93e5-4e65-ad2a-1c7c6534edad.mp3" length="153881847" type="audio/mpeg"/>
      <guid isPermaLink="false">57d465ce-21e0-4951-bd68-4e37d01ec8cd</guid>
      <itunes:duration>9617</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 23 Oct 2021 15:12:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0ff3f000696f7ba624922d4ca88d2776.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 65: Twitch, NCSAM, News Notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 65: Twitch, NCSAM, News Notes and more]]></itunes:title>
      <description><![CDATA[A few technical issues, but what is a show without those? In this 3 hour episode, we've got quite a lot for you, so sit back and check out the links to the following items for your perusal.



Welcome to the Security Box, podcast 65. On this podcast, let's discuss an article we read after the release of last week's program in regards to Twitch and their recent breach we were alerted to during the live taping of the program.  After that, we're going to cover more NCSAM and even have some news notes.  We'll do news notes the same as we did last week, as it turned in to a lively discussion.  I hope you'll enjoy the program, and thanks so much for listening!

 Breach topics 
<ul>
<li> <a href="https://www.cyberscoop.com/twitch-hack-leak-source-code-payment-data/">Stolen Twitch source code, creator payment data revealed in apparent data leak </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/twitch-leak-hack-amazon-4chan/">Trolls defaced Twitch's website with pictures of Jeff Bezos, the latest security concern </a> Cyberscoop </li>
</ul>

 NCSAM: Scam apps 
<ul> 
<li> <a href="https://arstechnica.com/?p=1800102">Hundreds of scam apps hit over 10 million Android devices </a> Ars Technica </li>
</ul>

 News Notes read from around the landscape 

<ul>
<li> <a href="https://arstechnica.com/?p=1798812">Electronic Frontier Foundation will deprecate HTTPS Everywhere plugin </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1801405">Company that routes SMS for all major US carriers was hacked for five years </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/email-fraud-business-email-compromise-td-bank-america/">Former TD Bank, Bank of America employee allegedly helped email scammers launder money </a> Cyberscoop </li> 
<li> <a href="https://www.cyberscoop.com/apt41-india-blackberry-china/">Suspected Chinese hackers masqueraded as Indian government to send COVID-19 phishing emails </a> Cyberscoop </li>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895033</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895033/the-technology-blog/2025_02_13_03_32_38_d6ce43cf-a2db-47a0-886a-b4cc9e0f9a51.mp3" length="179733458" type="audio/mpeg"/>
      <guid isPermaLink="false">ff3b6d8c-a93c-44ad-abdb-740302a5df40</guid>
      <itunes:duration>11233</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 13 Oct 2021 22:25:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7959f0ac39dd61c2a90dc5925c4982ca.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 64: NCSAM week 1: News notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 64: NCSAM week 1: News notes and more]]></itunes:title>
      <description><![CDATA[NCSAM is now in full swing, this week, <a href="https://blog.lastpass.com/2021/10/are-you-cyber-smart-a-checklist/">Are You Cyber Smart? A Checklist </a> from Lastpass will be what you need to look at with 5 great tips and things that might be of interest to you. In my writeup of this, I talked about <a href="https://www.cyberscoop.com/neiman-marcus-data-breach-customer-letter/">the Neiman Marcus   </a> breach and how people should be aware of it even if they aren't affected.  We'll have news, notes and more.  Hope you'll enjoy the show!

 News Notes 

<ul>
<li> <a href="https://www.cyberscoop.com/europol-ukraine-ransomware-raid-revil/">Police raid in Ukraine results in arrests of 2 alleged ransomware hackers </a> Cyberscoop </li> 
<li> <a href="https://krebsonsecurity.com/2021/09/the-rise-of-one-time-password-interception-bots/">The Rise of One-Time Password Interception Bots </a> Krebs On Security </li>
</ul>

Thanks so much for reading and participating in the show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895034</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895034/the-technology-blog/2025_02_13_03_31_06_d61f3311-bd1f-4ee3-b857-e0ccfc18a8d1.mp3" length="154187793" type="audio/mpeg"/>
      <guid isPermaLink="false">f01712b2-0c1e-4dcf-afdc-32c4230cd41f</guid>
      <itunes:duration>9636</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Oct 2021 21:50:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a4f87fd7aee3c1c37560edf4891e89ad.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 63: Psychology of passwords 2021, ransomware paid or not, news notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 63: Psychology of passwords 2021, ransomware paid or not, news notes and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast number 63 of the Security Box series. On this podcast, come and learn about the password trends of 2021, thanks to lastpass's article. Next, a 5.9 million dollar ransomware paid by a farming co-op and a very interesting discussion I heard recently about this.  We'll definitely have some news and notes from around the landscape, and even some commentary from any guests that participated through Clubhouse on the live program as well as anyone else through email, imessage and other contact points.

 Topics 
<ul>
<li> <a href="https://blog.lastpass.com/2021/09/new-report-2021-psychology-of-passwords/">New Report: 2021 Psychology of Passwords </a> Lastpass </li>
<li> <a href="https://arstechnica.com/?p=1796953">$5.9 million ransomware attack on farming co-op may cause food shortage </a> Ars Technica </li>
</ul>

<ul>
<li> <a href="https://www.cyberscoop.com/phone-scammers-use-covid-19-vaccine-appointments-to-try-tricking-victims-into-downloading-malware/>">Phone scammers use COVID-19 vaccine appointments to try tricking victims into downloading malware  </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/?p=1796814">Nation-state espionage group breaches Alaska Department of Health </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/captcha-email-hack-scam-proofpoint/">Hackers are using CAPTCHA techniques to scam email users </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/?p=1797268">Apple users warned: Clicking this attachment will take over your macOS </a> Ars Technica </li>
</ul>

Thanks so much for listening to today's program, and we'll be back for a month of NCSAM.  Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895035</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895035/the-technology-blog/2025_02_13_03_41_16_e77b52d7-0d0a-4a56-9c1d-a5c452f765d8.mp3" length="121410598" type="audio/mpeg"/>
      <guid isPermaLink="false">2e7fd6de-e2d0-4707-869e-43e2d93eb2cd</guid>
      <itunes:duration>7588</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Sep 2021 23:18:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_55082c1be8faf644d20a69cdaa0dfb99.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 62: Windows Update, a very interesting botnet, news notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 62: Windows Update, a very interesting botnet, news notes and more]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security box, program number 62. &nbsp;On this program, we're going to cover Windows Update as well as a very interesting article from Krebs about a new botnet that seems to have done quite a bit of damage. &nbsp;It is an IOT botnet called Meris. &nbsp;We'll also have news, notes and lots more.</p>
<p><br></p>
<p><h3> Windows Update </h3></p>
<p><br></p>
<p>There are the usual two articles on Windows Update. &nbsp;This time, Krebs has quite a bit on these updates while Trend Micro covers the highlights but also gives some info of value too. &nbsp;They're both good for their reasons, so read them both.</p>
<p><br></p>
<p><ul title="windows update"></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/microsoft-patch-tuesday-september-2021-edition/">Microsoft Patch Tuesday, September 2021 Edition </a> Krebs on Security </li></p>
<p><li> <a href="https://www.trendmicro.com/en_us/research/21/i/september-patch-tuesday--66-bulletins--only-3-critical.html">September Patch Tuesday: 66 Bulletins, Only 3 Critical </a> Trend Micro </li></p>
<p></ul></p>
<p><br></p>
<p><h3> Meris </h3></p>
<p><br></p>
<p>There is one article which we're taking from for this one, but did you listen to podcast 836?</p>
<p><ul title="Meris Botnet"></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/krebsonsecurity-hit-by-huge-new-iot-botnet-meris/">KrebsOnSecurity Hit By Huge New IoT Botnet “Meris” </a> Krebs On Security </li></p>
<p></ul></p>
<p>	</p>
<p><h3> News Notes </h3></p>
<p><br></p>
<p><ul title="news notes"></p>
<p><li> <a href="https://arstechnica.com/?p=1794117">Security researchers at Wiz discover another major Azure vulnerability </a> Ars Technica </li></p>
<p><li> <a href="https://arstechnica.com/?p=1794411">Apple patches “FORCEDENTRY” zero-day exploited by Pegasus spyware </a> &nbsp;Ars Technica </li></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/trial-ends-in-guilty-verdict-for-ddos-for-hire-boss/">Trial Ends in Guilty Verdict for DDoS-for-Hire Boss </a> Krebs On Security </li></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/customer-care-giant-ttec-hit-by-ransomware/">Customer Care Giant TTEC Hit By Ransomware </a> Krebs On Security </li></p>
<p></ul></p>
<p><br></p>
<p>I hope you enjoy the program and thanks so much for listening!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895036</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895036/the-technology-blog/2025_02_13_03_44_43_4915dcb0-c8be-4787-843b-fd76b6139332.mp3" length="136456293" type="audio/mpeg"/>
      <guid isPermaLink="false">2bed2319-1d70-4376-9050-a3ae13c04f93</guid>
      <itunes:duration>8528</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Sep 2021 23:10:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0add0d6adbda19bbe63396dc0d7b5dd6.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 361: A very interesting security discussion]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 361: A very interesting security discussion]]></itunes:title>
      <description><![CDATA[<a href="https://www.clubhouse.com/@scottbvs">Scott Schober </a> is on Clubhouse, and he invited me over to his club which talks about cyber security topics. <a href="https://www.clubhouse.com/club/cybersecurity-club">Here is a link to his Cyber Security club </a> where members can join the conversation. The discussion started with whether we've gotten the vaccine or not, whether restaurants and other places are collecting that data let alone securely, and more.  I decided to join the stage and while I applauded the conversation about covid-19 vaccines, what aout other problems we're still dealing with lik the open databases problem?  Take a listen to this, and let's discuss whether I'm right, or whether we need to be concerned about this.  I'll have more talks soon.  

<a href="http://www.scottschober.com">Scott Schober's web site </a>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895037</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895037/the-technology-blog/2025_02_13_03_30_48_f5417748-102e-4b82-a947-0cf9ca677aae.mp3" length="60821588" type="audio/mpeg"/>
      <guid isPermaLink="false">b58b8b6b-cfeb-4813-a2f3-86766d35bcc9</guid>
      <itunes:duration>3797</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 20 Sep 2021 17:14:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f2203e3a6330afaf8aafc0cbb5fc0cb5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 61: CSAM gets updated by Apple as they listened to some stuff from the security industry and much more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 61: CSAM gets updated by Apple as they listened to some stuff from the security industry and much more]]></itunes:title>
      <description><![CDATA[<p>Welcome to the Security Box, podcast 61. &nbsp;On this podcast, let's discuss the updates on CSAM as it pertains to Apple. &nbsp;We'll have news, notes and more. &nbsp;</p>
<p><br></p>
<p><h3> Topics </h3></p>
<p><br></p>
<p><ul title="topics"></p>
<p><li> <a href="https://www.cyberscoop.com/apple-child-sex-abuse-imagery-delay-privacy/">Under fire from privacy advocates, Apple delays controversial photo scanning plan </a> Cyberscoop </li></p>
<p></ul></p>
<p><br></p>
<p><h3> News Notes </h3></p>
<p><ul title="News Notes"></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/fudco-spam-empire-tied-to-pakistani-software-firm/">“FudCo” Spam Empire Tied to Pakistani Software Firm </a> Krebs On Security </li></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/15-year-old-malware-proxy-network-vip72-goes-dark/">15-Year-Old Malware Proxy Network VIP72 Goes Dark </a> Krebs on Security </li></p>
<p><li> <a href="https://krebsonsecurity.com/2021/09/microsoft-attackers-exploiting-windows-zero-day-flaw/">Microsoft: Attackers Exploiting Windows Zero-Day Flaw </a> Krebs on Security </li></p>
<p><li> <a href="https://www.cyberscoop.com/irs-ukraine-scammer-vape-store-receipts/">IRS used vape store receipts to gather evidence against alleged Ukrainian scammer </a> Cyberscoop </li></p>
<p></ul></p>
<p><br></p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895039</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895039/the-technology-blog/2025_02_13_03_34_48_dd655450-6b57-4bc9-a07a-35c83613c031.mp3" length="131240162" type="audio/mpeg"/>
      <guid isPermaLink="false">4f9a5331-4838-4751-9c14-360a2e550cda</guid>
      <itunes:duration>8202</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 19 Sep 2021 21:05:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_cee6270f11329a9b4108a403a0965fbf.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 60: The Security Landscape as it relates to the latest in T-Mobile land]]></title>
      <itunes:title><![CDATA[The Security box, podcast 60: The Security Landscape as it relates to the latest in T-Mobile land]]></itunes:title>
      <description><![CDATA[The Security box, podcast 60: The Security Landscape as a whole from broadcasting software and web site services to T-Mobile's Fiasco

What has changed on the security landscape? We learn about T-Mobile's recent failure, and even web sites are braught up as well as broadcasting software among other things. This turned out to be a very interesting show.  What do you think has changed?  What have we done wrong?  What do you think it'll take to fix it if it can be fixed at all?  No news notes this week, but they'll be back next week.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895041</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895041/the-technology-blog/2025_02_13_03_32_32_11e2368e-b357-48a8-9cb4-3300e95658b2.mp3" length="130525034" type="audio/mpeg"/>
      <guid isPermaLink="false">a485272d-7582-446e-921c-2fe4cfcc3f4a</guid>
      <itunes:duration>8157</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Sep 2021 16:52:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a738d4d27ec38f7b4cdf33417ef8b3e7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 59: Scott Schober, the q2 intelligence report and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 59: Scott Schober, the q2 intelligence report and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the Security box, podcast 59. On this edition of the program we have two different prerecorded segments for you. 

First, we interview Scott Schober of Berkeley Varitronics Systems, Inc.  He's written various books which we talk about, as well as some of what is going on in the security landscape.

Next, we have a talk that was done by Phishlabs, who did the Quarter 2 Phishing Trends report.  

To top it all off, we'll have news and notes from around the landscape as well as questions and comments after each segment if any.

><ul title="URLs"
<li> <a href="http://www.bvsystems.com">BV Systems </a> </li>
<li> <a href="http://www.scottschober.com">Scott's Web Site </a> </li>
<li> <a href="https://www.phishlabs.com/blog/new-quarterly-threat-trends-intelligence-report-now-available/">new-quarterly-threat-trends-intelligence-report-now-available </a> Phishlabs </li>
</ul>

 News Notes from around the web 

<ul>
<li> <a href="https://www.cyberscoop.com/ransomware-hack-phone-call-fbi-hive/">FBI warns that Hive ransomware hackers are calling victims by phone </a> Cyberscoop </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/h/what-the-norton-avast-merger-means-for-cybersecurity.html">What the Norton-Avast Merger Means for Cybersecurity </a> Trend Micro </li>
<li> <a href="https://www.cyberscoop.com/jacob-wohl-john-burkman-fcc-robocall-voter-surpression/">FCC proposes record $5 million robocall fine for voter suppression scam </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/poly-network-hack-sec-cryptocurrency/">Poly Network fully recovers assets stolen in unusual $600M cryptocurrency hack </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/microsoft-azure-cloud-vulnerability/">Microsoft Azure vulnerability exposed thousands of cloud databases </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/europol-cahterine-de-bolle-belgium-scam/">Scammers impersonate Europol chief in an effort to defraud Belgians </a> Cyberscoop </li>
</ul>

Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895046</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895046/the-technology-blog/2025_02_13_03_38_30_87a958a7-ddb9-4e56-aa8e-3fc3713b9c7d.mp3" length="255037583" type="audio/mpeg"/>
      <guid isPermaLink="false">d749be76-ae2b-4e76-935f-2d7b101b2b36</guid>
      <itunes:duration>15939</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 03 Sep 2021 15:42:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f8fe663cdcebe721b3d40b41f6d9b4a9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 58: What the hell is up with T-mobile?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 58: What the hell is up with T-mobile?]]></itunes:title>
      <description><![CDATA[The Security Box, podcast 58: What's the matter with T-mobile? Why are system failures on the rise? News Notes and More

Hello Everyone, welcome to the Security Box, podcast 58. Question: what the hell is going on with T-Mobile and their inconsistancies of containing breaches and lying about what they were going to do when they were granted the murger with Sprint? Who is ENISA  and why are they saying that system failures are on the rise? Finally, what is the Chaos Ransomware and why could it have impacts beyond a proof of concept?  We explore all of these topics, as well as news and notes from around the landscape on this edition of the podcast. Fasten your seatbelts!

 T-Mobile 

Here are the articles read that deal with T-Mobile to date.  We're still learning more and nothing is very clear yet.  The investigation continues.
<ul>
<li> <a href="https://arstechnica.com/?p=1787524">T-Mobile apparently lied to government to get Sprint merger approval, ruling says </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/?p=1788185">Hackers who breached T-Mobile stole personal data for ~49 million accounts </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/t-mobile-hack-data-breach-investigation/">T-Mobile investigates potentially massive breach of consumer data </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/08/t-mobile-investigating-claims-of-massive-data-breach/">T-Mobile Investigating Claims of Massive Data Breach </a> Krebs On Security </li>
<li> <a href="https://krebsonsecurity.com/2021/08/t-mobile-breach-exposed-ssn-dob-of-40m-people/">T-Mobile: Breach Exposed SSN/DOB of 40M+ People </a> Krebs On Security </li>
<li> <a href="https://www.cyberscoop.com/t-mobile-breach-2021-data-hack/">T-Mobile confirms breach of more than 8 million customers' data </a> Cyberscoop </li>
</ul>

 Other Topics 
<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/h/chaos-ransomware-a-dangerous-proof-of-concept.html">Chaos Ransomware: A Proof of Concept With Potentially Dangerous Applications </a> Trend Micro </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/h/enisa-says-system-failure-is-on-the-rise.html">ENISA says System Failure is on the Rise </a> Trend Micro </li>
</ul>

 News Notes from around the landscape 

<ul>
<li> <a href="https://www.cyberscoop.com/nicholas-farber-hacker-stalker-plattsburgh-sentence/">New York man sentenced to 3 years for stealing students' nude photos after hacking their accounts </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/demonware-nigeria-ransomware-abnormal-security/">Researchers nab wannabe ransomware scammer trying to convince victims to help hack their employer </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/helix-dark-web-cryptocurrency-harmon/">Ohio man pleads guilty to role in $300-million cryptocurrency laundering service </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/tokio-marine-ryan-specialty-group-ransomware-cyber-insurance/">Japan's Tokio Marine is the latest insurer to be victimized by ransomware </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/iot-vulnerability-through-tek-baby-monitor/">Mandiant, CISA urge ThroughTrek customers to fix software bug in millions of baby monitors, cameras </a> Cyberscoop </li>
</ul>

End of notes
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895049</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895049/the-technology-blog/2025_02_13_03_34_24_56d968ef-1a2d-4088-912a-7ef54ae91aef.mp3" length="158471039" type="audio/mpeg"/>
      <guid isPermaLink="false">1c552632-dc18-4610-866d-7b8943f20eb2</guid>
      <itunes:duration>9904</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Aug 2021 16:04:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a0280669b36f2494cf39c602bb859bb0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 56: The Life Cycle of a breached database and government cybersecurity]]></title>
      <itunes:title><![CDATA[The Security box, podcast 56: The Life Cycle of a breached database and government cybersecurity]]></itunes:title>
      <description><![CDATA[Originally released on August 11th, we found out that I put it up in download form but not RSS. Sorry about that!

Welcome to the security box, podcast 56. Two comments will start us off as someone commented on the replay of our show from last week. Both are good comments worth bringing up.  Next, we've got a topic that might be of interest talking about the lifecycle of a breached database.  Next, let's find out how the government is doing with their Cyber Security.  What did the senate report find? Find out in our second topic.  We'll have news notes and commentary as well. 

 Topics 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/07/the-life-cycle-of-a-breached-database/">The Life Cycle of a Breached Database </a> Krebs on Security </li>
<li> <a href="https://www.cyberscoop.com/senate-homeland-federal-cybersecurity-ig-report/">Federal agencies are failing to protect sensitive data, Senate report finds </a> from Cyberscoop  and <a href="https://arstechnica.com/?p=1784956">The State Department and 3 other US agencies earn a D for cybersecurity </a> from Ars Technica go hand in hand.   Both articles are good, but ars has a very interesting table and other stuff too. </li>
</ul>

 News Notes read from around the landscape 

<ul>
<li> <a href="https://www.bleepingcomputer.com/news/security/google-play-protect-fails-android-security-tests-once-more/">Google Play Protect fails Android security tests once more </a> Bleeping Computer </li>
<li> <a href="https://www.cyberscoop.com/anne-neuberger-ransomware-cryptocurrency/">A US official explains why the White House decided not to ban ransomware payments </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/italy-lazio-covid-19-vaccine-registration-system/">Cyberattack knocks Italian vaccine registration portal offline </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/facebook-nyu-research-misinformation/">Facebook stops NYU researchers from examining misinformation, is criticized for 'silencing' transparency efforts </a> Cyberscoop </li
<li> <a href="https://www.cyberscoop.com/suspected-chinese-hackers-took-advantage-of-microsoft-exchange-vulnerability-to-steal-call-records/">Suspected Chinese hackers took advantage of Microsoft Exchange vulnerability to steal call records </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/criminals-call-centers-ransomware-microsoft/">Criminals are using call centers to spread ransomware in a crafty scheme </a> Cyberscoop </li>
</ul>

There is more news, but this is some of what we've read throughout the past week.  I'll be blogging some more news, and of course, the list will have plenty more.

End of program
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895051</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895051/the-technology-blog/2025_02_13_03_40_18_63d6d4f4-b324-4bd2-95ff-f579249096a0.mp3" length="153019179" type="audio/mpeg"/>
      <guid isPermaLink="false">f112d5ab-a4be-410f-8897-922c39d929b7</guid>
      <itunes:duration>9563</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Aug 2021 15:57:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0f395129187e4f5d407c44c0f0aa175b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 57: the name game of Ransomware Gangs, Windows Update, and CSAM and apple products]]></title>
      <itunes:title><![CDATA[The Security box, podcast 57: the name game of Ransomware Gangs, Windows Update, and CSAM and apple products]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 57. We have three topics for you today, and I hope that you will enjoy them. The first topic for this podcast will be talking about the name game of the ransomware gangs we have out there.  The second topic which was totally forgotten is of course Windows Update and what is happening with that operating system.  Finally, probably the most contravercial topic we have to date, Apple and how they're handling the images that people may have that are backed up in to icloud that deal with children and the potential of abusive images of a sexual nature.  We will also have news notes and commentary  as well, buckle up as you don't know what'll happen with these topics!  The program may contain adult content, and listener disgression is advised.  

 Topics 
<ul>
<li> <a href="https://krebsonsecurity.com/2021/08/ransomware-gangs-and-the-name-game-distraction/">Ransomware Gangs and the Name Game Distraction </a> Krebs On Security </li>
<li> Windows Update </li>
<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/h/august_patch_tuesday.html">August Patch Tuesday: A Quiet Month for Microsoft </a> Trend Micro </li>
<li> <a href="https://krebsonsecurity.com/2021/08/microsoft-patch-tuesday-august-2021-edition/">Microsoft Patch Tuesday, August 2021 Edition </a> Krebs On Security </li>
</ul>
<li> <a href="https://arstechnica.com/?p=1785740">Apple says it will refuse gov’t demands to expand photo-scanning beyond CSAM </a> Ars Technica </li>
</ul>

 News and Notes from around the landscape 

The following are items that will be linked here and discussed in news notes for this week.  There may be items that are not article related that may not be shown here in the notes.

<ul>
<li> <a href="https://www.cyberscoop.com/rutters-capital-one-clark-hill-breach-forensic-reports-mandiant-kroll/">Courts order handover of breach forensic reports in trend welcomed by consumers, feared by defendants </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/08/phishing-sites-targeting-scammers-and-thieves/">Phishing Sites Targeting Scammers and Thieves </a> Krebs On Security </li>
<li> <a href="https://www.cyberscoop.com/alphabay-dark-web-fbi-flashpoint/">Four years after FBI shut it down, AlphaBay dark web marketplace claims it's back in business </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/europol-bec-ireland-netherlands-romania-23/">European police round up 23 suspected scammers accused of $1.2 million fraud </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/qqaazz-cybercrime-hacking-money-laundering-crypto/">Two members of QQAAZZ, which laundered funds from cybercrime, plead guilty </a> Cyberscoop </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/h/detecting-printnightmare-exploit-attempts-with-trend-micro-vision-one-and-cloud-one.html">Detecting PrintNightmare Exploit Attempts using Trend Micro Vision One and Cloud One </a> Trend Micro </li>
<li> <a href="https://arstechnica.com/?p=1787517">Hospitals hamstrung by ransomware are turning away patients </a> Ars Technica </li>
</ul>

There may be more, please check out our blog and email list for more.  Thanks for reading and listening to our show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895053</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895053/the-technology-blog/2025_02_13_03_34_20_feead303-5033-4e42-bdb2-3b9a7b2a16e2.mp3" length="120988877" type="audio/mpeg"/>
      <guid isPermaLink="false">5b69da3c-d9c1-4914-98d7-76ce862a87f2</guid>
      <itunes:duration>7561</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Aug 2021 16:57:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_bc789027d65e732cb361ec95126311c1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 55: Who Is PlugWalk Joe?]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 55: Who Is PlugWalk Joe?]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 55. On this edition of the podcast we've got two Sans News Bites headlines, topics including a very interesting story on someone named "PlugwalkJoe" I.E. Joseph O'Connor, a topic on a new ransomware gang called Black Matter, and we've also got several news items including one that isn't an article but intrigued me when listening to the TWIT network.  All of this plus anyone who had questions, comments or took part in the discussion, as podcast 55 gets started.   

 Topics 

Here are the topics for today.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/07/plugwalkjoe-does-the-perp-walk/">PlugwalkJoe Does the Perp Walk </a> Krebs on Security </li>
<li> <a href="https://www.cyberscoop.com/blackmatter-darkside-revil-ransomware-successor/">Threat intel firms suggest ransomware gang 'BlackMatter' has ties to DarkSide, REvil hackers </a> Cyberscoop </li>
</ul>

 Sans News Bites 

These are the Sans Newsletters that have been read.  Links to them are also on the blog.

<ul>
<li> <a href="https://view.email.sans.org/?qs=0201bad8c93739fd7f230f8552695e47d7d4fbf6443e3944fefd36a8fbb304d1d8750035e9927577e44ce4c7d17507e99084b097ffc8f713e4f3d1ac978b3b475adfbf75d78bda7e">Sans News Bites July 27, 2021              Vol. 23, Num. 058 </a> Sans Institute </li>
<li> <a href="https://view.email.sans.org/?qs=ac13c94fffa61bb488724a19e42b7196473864f376b0f94ce874832e92f1bca6a964e04a993eadfecbf19c0acc47ebe92165b4063f1ffe97575ffe5c0f1142cee1a8959299f18ef2">Sans News bites for July 30, 2021 </a> Sans Institute </li>
</ul>

 News Notes read from the web 
<ul>
<li> <a href="https://arstechnica.com/gadgets/2021/07/malicious-pypi-packages-caught-stealing-developer-data-and-injecting-code/">Software downloaded 30,000 times from PyPI ransacked developers’ machines </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/07/feds-list-the-top-30-most-exploited-vulnerabilities-many-are-years-old/">Feds list the top 30 most exploited vulnerabilities. Many are years old </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/07/new-bank-fraud-malware-called-vultur-infects-thousands-of-devices/">New bank-fraud malware called Vultur infects thousands of devices </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/ftcs-right-to-repair-ruling-is-a-small-step-for-security-researchers-giant-leap-for-diy-hackers/">FTC's right-to-repair ruling is a small step for security researchers, giant leap for DIY hackers </a> Cyberscoop </li>
</ul>

End of program
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895055</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895055/the-technology-blog/2025_02_13_03_47_05_2cf40b09-6d8f-4f08-aa05-9f022f210408.mp3" length="116614098" type="audio/mpeg"/>
      <guid isPermaLink="false">591affb6-4fea-49eb-b722-a2c662603d1e</guid>
      <itunes:duration>7288</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 04 Aug 2021 22:19:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2510ca538b4ae0dfe937dd299cb4d913.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 54: Scammers Will Stop At Nothing]]></title>
      <itunes:title><![CDATA[The Security box, podcast 54: Scammers Will Stop At Nothing]]></itunes:title>
      <description><![CDATA[Hello Everyone! Welcome to podcast 54 of the Security Box. On this edition of the program, learn about Windows 11, the latest Microsoft operating system and what scammers are doing to monitize even while this version is still in beta. Next, come with us and learn about the latest in the average ransomware payments as it looks like they are declining, for now. We'll have news, notes, hopefully calls with questions or discussion throughout.  If you want to leave feedback and you're listening through the podcast, call 602-887-5198 or email, imessage, whats app, or text your thoughts.  The lines of communication are given throughout and I welcome what you have to say. 

 Topics 

Here are the topics for today's program.
<ul>
<li> <a href="https://www.cyberscoop.com/microsoft-11-fake-installer-kaspersky-malware/">Scammers are using fake Microsoft 11 installers to spread malware </a> </li>
<li> <a href="https://www.cyberscoop.com/average-ransomware-payment-decline-2021/">Average ransomware payment declined by 38% in second quarter of 2021, new Coveware report says </a> Cyberscoop </li>
</ul>

 Sans News Bites 

Here are links to Sans News Bites, a newsletter by Sans Institute.  While we may cover some of the items in these newsletters, you should read these to determine if something affects you.

<ul>
<li> <a href="https://view.email.sans.org/?qs=f784e0310877a380a16db015ec17df32ae46149cfdeb7584166fe9e758ceaf6a9c1027a66cc5987fa881ad877ba6ecee4da68833958e56866f105cfe92ae75d81ef5510113a5febc">Sans News Bites for June 20, 2021 </a> Sans News Bites </li>
<li> <a href="https://view.email.sans.org/?qs=68f3d48ff4d51a00a328620f61e084c475e91d472a64c821742fc43b89fa99be500538a9eb8111c8f95c14ea526dbc0b8b74f84b421c790e20ca0ae221a16a5119090dfa45630be3">Sans News bites for July 23, 2021 </a> Sans Institute</li> 
</ul>

 News that have been read from around the web 

The following is news that have been read from arount the web.  Some may be blogged, some may not have been blogged.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/07/serial-swatter-who-caused-death-gets-five-years-in-prison/">Serial Swatter Who Caused Death Gets Five Years in Prison </a> Krebs on Security </li>
<li> <a href="https://krebsonsecurity.com/2021/07/spam-kingpin-peter-levashov-gets-time-served/">Spam Kingpin Peter Levashov Gets Time Served </a> Krebs On Security </li>
<li> <a href="https://www.cyberscoop.com/dutch-police-fraud-family-group-ib-phishing-fraud-as-a-service/">Dutch police bust alleged 'Fraud Family' phishing service members </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/kaseya-ransomware-russia-revil/">Kaseya obtains decryption key for victims of massive ransomware attack </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/information-technology/2021/07/an-explosive-spyware-report-shows-limits-of-ios-android-security/">An explosive spyware report shows limits of iOS, Android security </a> Ars Technica </li>
</ul>

We hope you enjoy the program as much as we have bringing it together for you!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895058</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895058/the-technology-blog/2025_02_13_03_40_05_e301d227-6a89-4c49-981f-f1d375d1561c.mp3" length="131174543" type="audio/mpeg"/>
      <guid isPermaLink="false">50293d26-2cd1-4c00-b6d5-66e8e1b896d2</guid>
      <itunes:duration>8198</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Jul 2021 21:27:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4ab76343afea300f5f8cbc9d4ef5d5a0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 53: Better Get Your Windows Update on ... especially if you print]]></title>
      <itunes:title><![CDATA[The Security box, podcast 53: Better Get Your Windows Update on ... especially if you print]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to the security box, podcast 53. On this edition, we'll be talking about some of the things that articles talk about in regards to Windows Update that came out the week of July 16, 2021. Seems like we had good success with last week where we opened the phone lines for others to participate in an open forum, so we'll do that again and see what happens and if people participate or not.  You can always comment after the fact by calling our voice mail line at 602-887-5198 and letting me know you want your comments aired.  We'll also have some news notes and maybe a discussion on those as well.

 Windows Update 

Here are the articles that deal with Windows Update.  One is by Trend Micro and one is done by Brian Krebs from Krebs on Security.

<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/g/july-patch-tuesday--dns-server--exchange-server-vulnerabilities-.html">July Patch Tuesday: DNS Server, Exchange Server Vulnerabilities Cause Problems </a> Trend Micro </li>
<li> <a href="https://krebsonsecurity.com/2021/07/microsoft-patch-tuesday-july-2021-edition/">Microsoft Patch Tuesday, July 2021 Edition </a> Krebs on Security </li>
</ul>

 Sans News bites 

<ul>
<li> <a href="https://view.email.sans.org/?qs=34e1f25b3fdf4f8044b0bd9f7bf9216a93863030439e882167082795e93c92d9e5397d036836c6b5894509844f97ad2528324daccf817347aaa00d08b930fb26da5cdb860de39044">Sans News bites for July 15, 2021 </a> Sans Institute </li>
</ul>

 News Notes from around the web >
<ul>
<li> <a href="https://www.cyberscoop.com/revil-ransomware-gang-sites-go-dark-offline/">REvil ransomware gang sites go dark, for reasons that remain unclear </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/jen-easterly-cisa-director-senate-vote/">Senate confirms former White House, NSA official Jen Easterly as CISA director after delay </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/information-technology/2021/07/facebook-catches-iranian-spies-catfishing-us-military-targets/">Facebook catches Iranian spies catfishing US military targets </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/07/morgan-stanley-discloses-data-breach-that-resulted-from-accellion-fta-hacks/">Morgan Stanley discloses data breach that resulted from Accellion FTA hacks </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/07/microsoft-says-hackers-in-china-exploited-critical-solarwinds-0-day/">day gave Chinese hackers privileged access to customer servers
Hackers IDed </a> Ars Technica </li>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895061</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895061/the-technology-blog/2025_02_13_03_48_46_ff197f8b-d481-4304-bdd8-586ed33905df.mp3" length="193004916" type="audio/mpeg"/>
      <guid isPermaLink="false">8571f0a0-bd39-475d-b163-e86e65ef1574</guid>
      <itunes:duration>12062</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Jul 2021 15:25:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_52e653878422ed0342e9b31463882898.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 52: What is going on with the water supply hacks? Password discussion, news notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 52: What is going on with the water supply hacks? Password discussion, news notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 52. On this podcast, let's talk about the water supply hacks and the growing threat of them through the help of an interesting article by Last Pass. After that, we'll see if people partook in an open forum of topics they want to talk about and of course news, notes and highlights from the landscape that have been read.

 Topic: The Water Supply and the landscape 

<ul>
<li> <a href="https://blog.lastpass.com/2021/07/the-growing-threat-of-water-supply-hacks/">The Growing Threat of Water Supply Hacks </a> Trend Micro </li>
</ul>

 News Notes 

Below, find links to items that are of interest we've read from around the landscape.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/07/intuit-to-share-payroll-data-from-1-4m-small-businesses-with-equifax/">Intuit to Share Payroll Data from 1.4M Small Businesses With Equifax </a> Krebs on Security </li>
<a href="https://www.cyberscoop.com/25-bogus-google-play-store-apps-promised-to-mine-cryptocurrency-for-a-fee-scamming-wannabe-investors/">25 bogus Google Play store apps promised to mine cryptocurrency for a fee, scamming wannabe investors </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/kaseya-malwarebytes-malspam/">Malware spammers aim to leverage Kaseya ransomware drama in email campaign </a> Cyberscoop </li>
<li> <a href="https://www.imore.com/report-icloud-private-relay-could-spell-end-ios-ad-fingerprinting?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheIphoneBlog+(iMore)">Report: iCloud+ Private Relay could spell the end of iOS ad fingerprinting But it isn't perfect </a> imore.com </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895063</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895063/the-technology-blog/2025_02_13_03_27_58_26867afd-e584-4d04-b2fc-d6f078e7aab5.mp3" length="161026441" type="audio/mpeg"/>
      <guid isPermaLink="false">f9c1869e-ea32-4313-85fb-fca735bb9c73</guid>
      <itunes:duration>10064</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Jul 2021 17:17:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8708dbf06269939d84d573aca3825db0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 51: domains and their security, an email mistake and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 51: domains and their security, an email mistake and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box, podcast 51. On this edition of the program, we continue with Phishlabs and their q1 Phishing and intellegence report talking about Top Level Domains and certificate abuse. Next, Michael in Tennessee sent me an article talking about one email which exposed hundreds of email addresses. We'll also have news and notes, people can call and comment as usual, and we'll see where the show takes us.  

 Topics 
<ul>
<li> <a href="https://info.phishlabs.com/blog/breaking-down-phishing-site-tlds-and-certificate-abuse-in-q1">Breaking Down Phishing Site TLDs and Certificate Abuse in Q1 </a> Phishlabs </li>
<li> <a href="https://techcrunch.com/2021/07/01/one-medical-exposed-customers-email-addresses/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29">An email sent by One Medical exposed hundreds of customers’ email addresses </a> Tech Crunch </li>
</ul>

 News Notes 
<ul>
<li> <a href="https://www.cyberscoop.com/doublevpn-vpn-security-privacy-hackers-fbi/">International cops seize DoubleVPN, a service allegedly meant to shield ransomware attacks from investigators </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/07/another-0-day-looms-for-many-western-digital-users/">Another 0-Day Looms for Many Western Digital Users </a> Krebs on Security </li>
<li> <a href="https://techcrunch.com/2021/06/30/doj-files-7-new-charges-against-alleged-capital-one-hacker/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29">DOJ files 7 new charges against alleged Capital One hacker </a> Tech Crunch </li>
<li> <a href="https://arstechnica.com/tech-policy/2021/07/us-hits-anti-robocall-milestone-but-annoying-calls-wont-stop-any-time-soon/">US hits anti-robocall milestone but annoying calls won’t stop any time soon </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/kaseya-revil-ransomware/">Kaseya hit with suspected cyberattack, raising fears of major supply chain incident </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/afghanistan-chinese-hackers-indigozebra-check-point/">Chinese hackers suspected of using Dropbox to snoop on Afghan officials </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/06/we-infiltrated-a-counterfeit-check-ring-now-what/">We Infiltrated a Counterfeit Check Ring! Now What? </a> Krebs On Security </li>
</ul>

We hope you enjoy the program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895068</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895068/the-technology-blog/2025_02_13_03_42_41_48a533b2-6a03-4bd5-8f85-7c44f09ca9b0.mp3" length="86061282" type="audio/mpeg"/>
      <guid isPermaLink="false">4ff1a475-0211-498f-905b-b39426217d7a</guid>
      <itunes:duration>5378</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Jul 2021 21:27:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_13af758e7b486a5f133e4f0e774889dc.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 50: 62% of free services are abused]]></title>
      <itunes:title><![CDATA[The Security box, podcast 50: 62% of free services are abused]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 50. On the big 50th episode, we've got quite a bit of news notes to cover this week. Besides that, we're continuing with Phishlabs and their ongoing rundown of the Q1 Intelligence Report, this time, talking about free tools and their abuse.  We hope that users find this of interest like I did. Of course, the lines of communication are always open whether on the show or podcast.  

 Topic: 
<ul>
<li> <a href="https://info.phishlabs.com/blog/62-of-phishing-sites-abuse-free-tools-or-services">62% of Phishing Sites Abuse Free Tools or Services </a> Phishlabs </li>
</ul>

 Sans News Bites 
<ul>
<li> <a href="https://view.email.sans.org/?qs=592b74bba5b8735e5095f60a24d31c74b2bf23ced8e65cd596e78c597b68a1fe9f19a955818ce9f84265af27d03f2f81e7625879d252895e16ce038427d94f5f978dad2c84163a84">Sans News Bites for June 25th, 2021 </a> covers tons of stuff including Del, Vmware and more </li>
</ul>

 News Notes 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/06/mybook-users-urged-to-unplug-devices-from-internet/">MyBook Users Urged to Unplug Devices from Internet </a> Krebs on Security </li>
<li> <a href="https://arstechnica.com/gadgets/2021/06/mass-data-wipe-in-my-book-devices-prompts-warning-from-western-digital/">“I’m totally screwed.” WD My Book Live users wake up to find their data deleted </a> Ars Technica </li> 
<li> <a href="https://www.cyberscoop.com/grand-theft-auto-hack-sims-monero/">Hackers are using bootleg copies of 'Grand Theft Auto V' game to mine Monero </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/conti-ransomware-tulsa-police-hack/">Tulsa police say 18,000 files are leaked after Conti ransomware hack </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/information-technology/2021/06/nfc-flaws-let-researchers-hack-an-atm-by-waving-a-phone/">NFC flaws let researchers hack an ATM by waving a phone </a> Ars Technica via Wired </li>
<li> <a href="https://www.cyberscoop.com/john-mcafee-dead-suicide-spain-jail/">John McAfee found dead after Spanish court approved extradition to US </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/andrii-kolpakov-fin7-hacker-prison/">Andrii Kolpakov, who supervised hackers for FIN7, sentenced to 7 years in prison </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/06/ukrainian-police-nab-six-tied-to-clop-ransomware/">Ukrainian Police Nab Six Tied to CLOP Ransomware </a> Krebs On Security </li>
<li> <a href="https://krebsonsecurity.com/2021/06/first-american-financial-pays-farcical-500k-fine/">First American Financial Pays Farcical $500K Fine </a> Krebs on Security </li>
<li> <a href="https://www.cyberscoop.com/russian-hackers-microsoft-solarwinds-cozybear/">Russian hackers breached Microsoft customer support to try phishing targets in 36 countries </a> Cyberscoop </li>

</ul>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895074</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895074/the-technology-blog/2025_02_13_03_49_04_57879bd5-8d82-487d-b9e6-ce61f1451bb3.mp3" length="119472521" type="audio/mpeg"/>
      <guid isPermaLink="false">0b38870a-eaa3-4c70-afd2-ba6b42dbc046</guid>
      <itunes:duration>7466</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 30 Jun 2021 23:59:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0010cdac0dac8edcf474273691c3da6b.jpg"/>
    </item>
    <item>
      <title><![CDATA[the Security Box, podcast 48: Can you believe what is going on with Russia?]]></title>
      <itunes:title><![CDATA[the Security Box, podcast 48: Can you believe what is going on with Russia?]]></itunes:title>
      <description><![CDATA[Thank you Michael in Tennessee for being our guest throughout the program! We really appreciate it. 



Welcome to the Security Box, podcast 48.  On this edition of the podcast, we've got two topics for you.  The first is probably one you can file in the "I can't believe I read this crap" department, while the second deals with Windows Update and what we had to look forward to there.  We've got news notes with quite a number of very interesting items, as well as taking your calls, voice messages and stories to boot.  

 Topics 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/06/adventures-in-contacting-the-russian-fsb/">Adventures in Contacting the Russian FSB </a> Krebs on Security </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/f/june-patch-tuesday-internet-explorer-finally-laid-to-rest.html">June Patch Tuesday: Internet Explorer Finally Laid to Rest </a> from Trend Micro and <a href="https://krebsonsecurity.com/2021/06/microsoft-patches-six-zero-day-security-holes/">Microsoft Patches Six Zero-Day Security Holes </a> from Krebs should be read for Patch Tuesday.  Worth the read as usual.  </li>
</ul>

 News and notes from around the landscape 

We may have a lot of the things listed here in articles and commentary on the blog.  Feel free to check out the articles and have your voice heard.

<ul>
<li> <a href="https://arstechnica.com/gadgets/2021/06/under-exploit-vmware-vulnerability-with-severity-rating-of-9-8-out-of-10/">This is not a drill: VMware vuln with 9.8 severity rating is under attack </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/trickbot-indictment-alla-witte-russia/">Trickbot indictment demonstrates how one hacking tool built on older malware </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/ransomware-iconstituent-congress/">Ransomware hits iConstituent, a service lawmakers use to communicate with voters </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/biden-executive-order-tiktok-wechat/">Biden revokes TikTok ban, issues new guidance for evaluating foreign apps </a> Cyberscoop </li>
<li> <a href="https://info.phishlabs.com/blog/47-phishing-increase-in-q1">47% Phishing Increase in Q1 </a> Phishlabs blog </li>
<li> <a href="https://www.phonearena.com/news/samsung-smartphones-security-vulnerabilities-let-hackers-read-sms-modify-files_id132792?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PhoneArena-LatestNews+%28Phone+Arena+-+Latest+News%29">Unpatched vulnerability in Samsung phones could let hackers read your messages </a> Phone Arena </li>
<li> <a href="https://www.cyberscoop.com/moviepass-password-ftc-settlement-price/">MoviePass settles with the FTC over exposing private information, misleading consumers </a> Cyberscoop </li>
<li> <a href="https://blog.lastpass.com/2021/06/rockyou2021-breach-how-to-keep-your-data-secure-now/">RockYou2021 Breach: How to Keep Your Data Secure Now </a> Lastpass </li>
<ul>

For full show notes including articles we didn't cover but read, check the blog.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895077</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895077/the-technology-blog/2025_02_13_03_44_05_eacadc29-8770-4c75-bd1a-5770b1714e64.mp3" length="141238164" type="audio/mpeg"/>
      <guid isPermaLink="false">01e2d43c-13cc-4a3e-8fa6-59fcf119c1e0</guid>
      <itunes:duration>8827</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Jun 2021 22:21:23 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e00aff8e401127bc1a1fb63f482e89f7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 47: Security in the forefront of everything we do]]></title>
      <itunes:title><![CDATA[The Security box, podcast 47: Security in the forefront of everything we do]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 47. On this podcast, we're going to talk about Security. A video which I found on Ted Talk's youtube channel will lead this discussion.  We're also going to talk about an article from Lastpass  talking about protecting your business from data breach trends.  It talks about something we've talked about, supply chain attacks.  Speaking of supply chain attacks, Jennifer talks about our top story from our show notes, and we'll address any concerns from that as well.  We'll have news, notes, questions, comments and more. Want to leave a message by phone? Call 602-887-5198 to do so. Thanks so much for listening!

 Topics 

<ul>
<li> What do you think when you have Cybersecurity issues that keep croping up? Do you talk about your experience?  <a href="https://youtu.be/PzJLO-OsEJo">Better cybersecurity starts with honesty and accountability  </a> is a Ted Talk done by Nadya Bartol which I think we  need to talk about.  Let's do so! </li>
<li> <a href="https://blog.lastpass.com/2021/05/protect-your-business-from-these-dangerous-data-breach-trends/">Protect Your Business From These Dangerous Data Breach Trends  </a> is a Lastpass article which I think we need to talk about as well.  </li>
<li> Commentary from our top story from the News Notes program from last week </li>
</ul>

 News Notes 
</ul>
<li> <a href="https://www.cyberscoop.com/revil-ransomware-meat-jbs-fbi-russia/">FBI blames REvil gang for JBS ransomware hack as global meat supplier gets back to work </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/fujifilm-ransomware-japan-shutdown/">Fujifilm shuts down computer systems following apparent ransomware intrusion </a> Cyberscoop </li>
<li> <a href="https://arstechnica.com/gadgets/2021/05/vulnerability-in-vmware-product-has-severity-rating-of-9-8-out-of-10/">Vulnerability in VMware product has severity rating of 9.8 out of 10 </a> Ars Technica </li>
<li> <a href="https://info.phishlabs.com/q1-2021-threat-trends-intelligence-report">Q1 2021 Threat Trends & Intelligence Report </a>  Phishlabs </li>
<li> <a href="https://info.phishlabs.com/blog/q1-2021-threat-trends-intelligence-report">Q1 2021 Threat Trends & Intelligence Report </a> Phishlabs </li>
<li> <a href="https://www.cyberscoop.com/latvia-trickbot-indictment-malware-witte/">Latvian national charged with writing notorious Trickbot malware </a> </li>
<li> <a href="https://www.cyberscoop.com/tokyo-olympics-fujitsu-breach-japan/">Tokyo Olympics organizers' data swept up in Fujitsu hack: report </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/sim-swapping-tmobile-coinbase-cryptocurrency/">SIM swapping victim alleges T-Mobile failed to stop $20,000 cryptocurrency scam </a> Cyberscoop </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895078</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895078/the-technology-blog/2025_02_13_03_31_22_b6b65e53-058a-44ca-a1f6-9ad93edba8d0.mp3" length="93473370" type="audio/mpeg"/>
      <guid isPermaLink="false">7a69c9d0-6375-4f11-aaec-6061f128d493</guid>
      <itunes:duration>5842</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Jun 2021 23:19:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_519783c748b67db1841db84623651d5c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Anatomy of an attack: tech podcast 360]]></title>
      <itunes:title><![CDATA[The Anatomy of an attack: tech podcast 360]]></itunes:title>
      <description><![CDATA[The Anatomy of an attack has been around for quite awhile. I think its within the last couple of years, and I think it is quite important now more than ever. I talk about what has happened with our staple of the box, and how it was an inbound call that started it, but thats not traditionally the case. Listen to this hour long webinar and let's talk.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895080</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895080/the-technology-blog/2025_02_13_03_43_54_ec52098e-e960-44b7-90cf-b03f32b245d1.mp3" length="69924650" type="audio/mpeg"/>
      <guid isPermaLink="false">4083d3ff-a5da-4142-a240-5b57d23f89d8</guid>
      <itunes:duration>4365</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 07 Jun 2021 20:29:25 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2a71a6c17de4e1278eb373e500a94a29.jpg"/>
    </item>
    <item>
      <title><![CDATA[TThe Security box, podcast 46: q-link wireless updates, ransomware isn't going anywhere, billions of dollars and more]]></title>
      <itunes:title><![CDATA[TThe Security box, podcast 46: q-link wireless updates, ransomware isn't going anywhere, billions of dollars and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 46 of the Security Box. On this podcast, Michael in Indiana is along with an update about a company we talked about in News Notes on podcast 39. We've got a topic dealing with a company that has been able to take advantage of the dark marketplace as they dominated this space very quietly  since 2018. We've got a topic also on Ransomware forcing a major speaker manufacturer you all may be aware of, Bose.  We'll have news, notes, questions, comments and more.

During the program, it was announced that we would be switching telephone companies. Our new number is 602-887-5198.  623-263-8934 will give you this new number, probably for several days, but no more than that.  

 Topics 

<ul>
<li> <a href="https://www.cyberscoop.com/hydra-cybercrime-russia-bitcoin-laundering-darkside/">How Hydra, a Russian dark net market, made more than $1 billion in 2020 </a> Cyberscoop </li>
<li> <a href="https://www.cyberscoop.com/bose-ransomware-hack-letter/">Ransomware forced Bose systems offline, exposed personal data of 6 former employees </a> Cyberscoop </li>
</ul>

 News Notes 
<ul>
<li> <a href="https://arstechnica.com/gadgets/2021/06/ransomware-striking-the-worlds-biggest-meat-producer-threatens-shortages/">Shortages loom as ransomware hamstrings the world’s biggest meat producer </a> Ars Technica </li>
<li> <a href="https://9to5mac.com/2021/05/28/have-i-been-pwned-goes-open-source-gets-fbi-data-feed/">Have I been Pwned goes open source, gets FBI data feed </a> 9to5mac.com </li>
<li> <a href="https://www.cyberscoop.com/mexico-atm-scam-florian-tudor-shark/">Fighting, screaming as alleged ATM scammer known as ‘The Shark’ is arrested in Mexico </a> from Cyberscoop and <a href="https://krebsonsecurity.com/2021/05/boss-of-atm-skimming-syndicate-arrested-in-mexico/">Boss of ATM Skimming Syndicate Arrested in Mexico </a> from Krebs on Security are covering the same thing in slightly different contexts. This is big news! </li>
<li> <a href="https://arstechnica.com/information-technology/2021/05/biden-signs-executive-order-to-strengthen-us-cybersecurity/">Biden signs executive order to strengthen US cybersecurity </a> from Ars Technica and <a href="https://www.cyberscoop.com/biden-budget-750-million-solarwinds-fiscal-2022/">Biden budget seeks $750 million to respond to SolarWinds compromises, plus billions more for cyber </a> from Cyberscoop are related as Joe Biden seaks money to try and combat the horrific attacks of the past year. </li>
<li> <a href="https://arstechnica.com/gadgets/2021/05/hackers-exploit-a-macos-0day-that-allows-them-to-screenshot-infected-macs/">Actively exploited macOS 0-day let hackers take screenshots of infected Macs </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/05/exploitable-security-bug-remains-in-ios-and-macos-3-weeks-after-upstream-fix/">No, it doesn’t just crash Safari. Apple has yet to fix exploitable flaw </a> Ars Technica </li>
<li> <a href="https://arstechnica.com/gadgets/2021/05/microsoft-says-solarwinds-hackers-targeted-us-agencies-in-a-new-campaign/">IN  </a> Ars Technica </li>
</ul>

Have something to say?  Let's talk! Get in touch.  602-887-5198 or email/imessage/text. The choice is yours.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895082</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895082/the-technology-blog/2025_02_13_03_36_10_d90c59cc-dc37-4ba6-9d30-66b02bf724e6.mp3" length="153195558" type="audio/mpeg"/>
      <guid isPermaLink="false">1b0e5ffb-3d2a-4f78-b2d6-d09b925e573e</guid>
      <itunes:duration>9574</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 03 Jun 2021 01:31:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fa8b0c1881ef69e4fd5887206b7a4265.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 45: 4 Vulns in Android, Conti ransomware and some news]]></title>
      <itunes:title><![CDATA[The Security box, podcast 45: 4 Vulns in Android, Conti ransomware and some news]]></itunes:title>
      <description><![CDATA[ Topics: 

<ul>
<li> <a href="https://arstechnica.com/gadgets/2021/05/hackers-have-been-exploiting-4-critical-android-vulnerabilities/">4 vulnerabilities under attack give hackers full control of Android devices </a> Ars Technica </li>
<li> <a href="https://www.cyberscoop.com/conti-ransomware-hospital-fbi-alert/">Conti ransomware gang victimized US health care, first-responder networks, FBI says </a> Cyber Scoop </li>
<li> <a href="https://www.cyberscoop.com/ireland-ransomware-hack-decryption/">Irish officials analyze decryption tool as long recovery process from ransomware continues </a> Cyber Scoop </li> 
</ul>

 News and notes from around the landscape 

<ul>
<li> <a href="https://krebsonsecurity.com/2021/05/how-to-tell-a-job-offer-from-an-id-theft-trap/">How to Tell a Job Offer from an ID Theft Trap </a> Krebs On Security </li>
<li> <a href="https://krebsonsecurity.com/2021/05/recycle-your-phone-sure-but-maybe-not-your-number/">Recycle Your Phone, Sure, But Maybe Not Your Number </a> Krebs On Security </li>
<li> Live Wire is looking at changing telephone companies once again. This is more to benefit callers on the system. If we change companies, the telephone number I've been giving will change.  I will announce more if we are changing.  </li>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895085</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895085/the-technology-blog/2025_02_13_03_38_56_72aad9d3-3c76-4669-8c44-ce10e21a488f.mp3" length="96773576" type="audio/mpeg"/>
      <guid isPermaLink="false">2bd50dce-152a-4807-8d9c-bcfe0534cd83</guid>
      <itunes:duration>6048</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 27 May 2021 15:43:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b87735dc1fea7de78d70264560607f31.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 44 for March 19, 2021]]></title>
      <itunes:title><![CDATA[The Security box, podcast 44 for March 19, 2021]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 44. On this episode of the program, its time to make sure we're all caught up on Windows Update and what may be important to you. Next, we'll talk about a task force that hopes to disrupt ransomware payments.  We're not done with Experian yet, and we'll have a things to ponder on this particular article I read about their API which is apparently disabled for at least one vendor.  We'll also have news, notes, commentary and questions from listeners if any, and yes, even podcast listeners can join the fun. Podcast listeners can dial 623-263-8934 to leave a voice message, just follow the prompts. Email, Imessage, text and whatsapp are all given throughout the show.

 Windows Update 

Windows Update is back, and Microsoft has given us only 54 different patches, but a lot of them are critical.  13 of them were from the ZDI program from Trend Micro.  

<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/e/may-patch-tuesday-offers-relative-respite.html">May Patch Tuesday Offers Relative Respite </a> Trend Micro </li>
<li> <a href="https://krebsonsecurity.com/2021/05/microsoft-patch-tuesday-may-2021-edition/">Microsoft Patch Tuesday, May 2021 Edition </a> </li>
</ul>

 Things to ponder 

Looks like Experian is still being talked about.  In this Things to Ponder, <a href="https://krebsonsecurity.com/2021/04/experian-api-exposed-credit-scores-of-most-americans/">Experian API Exposed Credit Scores of Most Americans </a> is the article which we'll be picking apart as your things to ponder.

 A true story of a telephone number not to call and why

Jennifer is now along with a very interesting story, with a very interesting twist and yes, it is a true story.

 A task force that is out there to disrupt ransomware 

I'm happy to read articles like this one, and I want to talk about it as part of the program.  Its not too old, but its something of value to all of us. KrebsOnSecurity has the details. <a href="https://krebsonsecurity.com/2021/04/task-force-seeks-to-disrupt-ransomware-payments/">Task Force Seeks to Disrupt Ransomware Payments </a> is the article to read.

 News Notes 

<ul>
<li> <a href="https://www.cyberscoop.com/eastern-europe-bulletproof-hosting-cybercriminal-rico/">Four men plead guilty to being go-to ‘bulletproof’ hosts for cybercriminals </a> Cyberscoop </li>
<li> <a href="https://krebsonsecurity.com/2021/05/fintech-startup-offers-500-for-payroll-passwords/">Fintech Startup Offers $500 for Payroll Passwords </a> Krebs on Security </li>
<li> <a href="https://krebsonsecurity.com/2021/05/a-closer-look-at-the-darkside-ransomware-gang/">A Closer Look at the DarkSide Ransomware Gang </a> Krebs on Security </li>
<li> <a href="https://info.phishlabs.com/blog/ransomware-playbook-defense-in-depth-strategies-to-minimize-impact">Ransomware Playbook: Defense in Depth Strategies to Minimize Impact </a> Phishlabs </li>
<li> <a href="https://krebsonsecurity.com/2021/05/darkside-ransomware-gang-quits-after-servers-bitcoin-stash-seized/">DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized </a> Krebs on Security </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/e/stop-ransomware-groups-who-weaponize-legitimate-tools.html">Stop Ransomware Groups Who Weaponize Legitimate Tools </a> Trend Micro </li>
<li> <a href="https://blog.lastpass.com/2021/05/worried-about-ransomware-turn-on-mfa/">Worried About Ransomware? Turn on MFA </a> Last pass </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895087</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895087/the-technology-blog/2025_02_13_03_38_04_bf5279cd-175f-445d-aae4-6b565040b762.mp3" length="149992319" type="audio/mpeg"/>
      <guid isPermaLink="false">683cc2f4-7b5c-4644-aa37-fe9b1d3022dc</guid>
      <itunes:duration>9374</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 20 May 2021 16:10:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3da5e98ddbfb1e126f230c54c3b76d23.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 43 for May 12, 2021]]></title>
      <itunes:title><![CDATA[The Security box, podcast 43 for May 12, 2021]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 43. On this edition of the podcast, we've got two topics. The first talks about a fake vaccine web site that is now shut down, thanks to the US Government. The second topic talks about the Exim 21 bug that recently hit headlines.  We'll have news, notes, your questions comments and any catch up from any older podcasts.  

 Topics 

<ul>
<li> <a href="https://threatpost.com/feds-fake-covid-19-vaccine-phishing-website/165872/">Feds Shut Down Fake COVID-19 Vaccine Phishing Website </a> </li>
<li> <a href="https://www.cyberscoop.com/qualys-cybersecurity-email-bugs/">Qualys researchers uncover 21 bugs in Exim mail servers </a> </li>
</ul>

> Sans News Bites 
<ul>
<li> <a href="https://view.email.sans.org/?qs=4af80784db4e44f0939856715d2f0e5b261f163f8d28a28502f2cdb6bdc38287919250b0c50c07dd2e0d6a4c7c6912d554eb5a24c2f536753c0f6b8be644b464061d29639b22fc2c">Sans News Bites for May 7, 2021 </a> </li>
<li> <a href="https://www.politico.com/news/2021/05/08/colonial-pipeline-cyber-attack-485984?cid=apn">'Jugular' of the U.S. fuel pipeline system shuts down after cyberattack </a> </li>
<li> <a href="https://krebsonsecurity.com/2021/05/investment-scammer-john-davies-reinvents-himself/">Investment Scammer John Davies Reinvents Himself? </a> See podcasts <a href="https://www.sendspace.com/pro/dl/bv1hbo">10, </a> <a href="https://www.sendspace.com/pro/dl/l8vvi9">12 </a> and <a href="https://www.sendspace.com/pro/dl/wifjzm">14 </a> for other coverage in different aspects whether news notes or full discussions. </li>
<li> <a href="https://www.cyberscoop.com/homecoming-queen-hack-florida-teen-mom/">Florida homecoming queen faces up to 16 years after alleged scheme to hack high school contest </a> </li>
<li> <a href="https://krebsonsecurity.com/2021/05/malicious-office-365-apps-are-the-ultimate-insiders/">Malicious Office 365 Apps Are the Ultimate Insiders </a> </li>
</ul>

We hope you enjoy the program as much as we have bringing it together for you.  See you next week!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895091</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895091/the-technology-blog/2025_02_13_03_52_22_2b8b247c-885e-441e-addc-330dbc9bdff3.mp3" length="100750876" type="audio/mpeg"/>
      <guid isPermaLink="false">2364e176-40c3-47bf-a850-19742da37cfd</guid>
      <itunes:duration>6296</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 12 May 2021 22:06:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7b88b6f9a487d1de1f9275f187bdb7cd.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 42: Has Experian learned anything?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 42: Has Experian learned anything?]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 42. I think I've got two very interesting topics. One of these topics is the ongoing  saga over at Experian. We know they had a big time breach, but do we really know what else is going on at the company? Brian has the entire details.  Finally in the topic department, we know Ransomware has taken a big toll during the pandemic and there is no slowing down in that department.  According to Cyberscoop, demands are higher by 43 percent so far in 2021. We'll talk about it.  I'll also give you some news and notes, although it may be dated. Your questions and comments are always welcome, so please get in touch! I hope you enjoy the program as much as I have putting it together!

 Topics 

We used to put all of the notations within the file, but I've decided against that unless people want me to do that.  I've heard nothing, so I'm reverting back to linking to the articles, and letting people decide on what interests them.  

<ul>
<li> <a href="https://krebsonsecurity.com/2021/04/experians-credit-freeze-security-is-still-a-joke/">Experian’s Credit Freeze Security is Still a Joke </a> </li>
<li> <a href="https://www.cyberscoop.com/ransomware-extortion-demands-increasing-coveware/">Ransomware demands up by 43% so far in 2021, Coveware says </a> </li>
</ul>

 News Notes 
<ul>
<li> <a href="https://view.email.sans.org/?qs=d8897ac771e12e22094426e29d8a8a670ee16585a8613d744a105134322bd273b859a083c8e1ae43cc7b3fed9a61885946e80b330b0f305a7cce1febda44fd5c16f6b6d0ac768c98">Sans News bites May 3, 2021 </a> Lots of interesting things including IOS 14.5.1 on the heals of 14.5 fixing a zero day. </li>
<li> <a href="https://arstechnica.com/information-technology/2021/04/a-clubhouse-bug-let-people-lurk-in-rooms-invisibly/">A Clubhouse bug let people lurk in rooms invisibly </a> </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895096</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895096/the-technology-blog/2025_02_13_03_53_43_88e30e87-cf86-4d98-a102-f21219dcd824.mp3" length="87797067" type="audio/mpeg"/>
      <guid isPermaLink="false">cae6b911-4fbc-4316-9d61-70d96bf2c49b</guid>
      <itunes:duration>5487</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 May 2021 23:07:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_019e3e808b6323f2450a2bde09f70fe5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 41: Ubiquiti and other stuff]]></title>
      <itunes:title><![CDATA[The Security box, podcast 41: Ubiquiti and other stuff]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 41. On this edition of the podcast, we're going to talk about Ubiquiti and their big time breach, as well as something I recently read from Park Mobile and their potential breach. We'll have news, notes and more.

 Topics: 
<ul>
<li> <a href="https://krebsonsecurity.com/2021/03/whistleblower-ubiquiti-breach-catastrophic/">Whistleblower: Ubiquiti Breach “Catastrophic” </a> </li>
<li> <a href="https://krebsonsecurity.com/2021/04/ubiquiti-all-but-confirms-breach-response-iniquity/">Ubiquiti All But Confirms Breach Response Iniquity </a> </li>
</ul>

Both of these articles are from Krebs on Security and while they're a bit old, you can't deny that it is worth talking about. Company aught to be ashamed of themselves.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/04/parkmobile-breach-exposes-license-plate-data-mobile-numbers-of-21m-users/">ParkMobile Breach Exposes License Plate Data, Mobile Numbers of 21M Users </a> </li>
</ul>

 A bit of sad news: 

:-( Security Researcher Dan Kaminsky died Saturday at age 42 of complications (ketoacidosis) from diabetes, which he had struggled with for years.
     Security Now! researchers know of Dan's discovery of a critical weakness in the DNS servers at the time.
     He will be missed. 

 News Notes 
<ul>
<li> <a href="https://www.cyberscoop.com/malware-video-game-cheat-codes-cisco-talos/">The latest malware hiding in video game cheat codes </a> </li>
<a href="https://www.cyberscoop.com/deepdotweb-tal-prihar-dark-web-darknet/">DeepDotWeb boss pleads guilty to laundering millions </a> </li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/c/building-a-more-secure-future.html">Trend Micro + ROS-I: Building a more secure future </a> </li>
</ul>

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895098</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895098/the-technology-blog/2025_02_13_03_31_12_5bd218f6-0f69-45ca-bbde-64cca4031cf9.mp3" length="78198634" type="audio/mpeg"/>
      <guid isPermaLink="false">0b2e636a-5e97-48fa-b616-a9f03650cb5f</guid>
      <itunes:duration>4887</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 29 Apr 2021 18:36:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0d8974dcaefd7c608ef962bffd627dbb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 40: Windows Update and Ransomware in the Manufacturing landscape]]></title>
      <itunes:title><![CDATA[The Security box, podcast 40: Windows Update and Ransomware in the Manufacturing landscape]]></itunes:title>
      <description><![CDATA[Welcome to podcast 40 of the Security Box. On this podcast, we're going to have our main topic that deals with the Windows Updates which you may have been prompted to install. Instead of news notes, I'll pick a few of the articles and we'll see what you think about them as I'll give my thoughts.  No full news notes this week, but plenty of content to boot.  We hope you enjoy the program, and thanks for listening!

<ul>
<li> <a href="https://www.trendmicro.com/en_us/research/21/d/april-patch-tuesday-sets-record-high-for-2021.html">April Patch Tuesday Sets Record High for 2021 </a> </li>
<li> <a href="https://krebsonsecurity.com/2021/04/microsoft-patch-tuesday-april-2021-edition/">Microsoft Patch Tuesday, April 2021 Edition </a> </li>
</ul>

<ul>
<li> <a href="https://www.cyberscoop.com/honeywell-hack-ransomware-manufacturing-norsk-hydro/">As ransomware stalks the manufacturing sector, victims are still keeping quiet </a> </li>
</ul>

For full notations, check the blog.  Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895101</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895101/the-technology-blog/2025_02_13_03_43_19_01004bc0-150c-4dff-96ea-b760a0e950e0.mp3" length="101412923" type="audio/mpeg"/>
      <guid isPermaLink="false">e53b2d6e-99f9-4211-9fe3-68009ddcb45b</guid>
      <itunes:duration>6338</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 21 Apr 2021 20:49:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3d71ee50948756fd0e9dbe17f4728a2d.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 39 for April 14, 2021]]></title>
      <itunes:title><![CDATA[The Security box, podcast 39 for April 14, 2021]]></itunes:title>
      <description><![CDATA[Welcome to podcast 39 of the Security Box. Looks like we've got commentary from the replay of broadcast 38's airing. We'll answer any questions from those comments if any, as well as talk about yet another story I read afterword in regards to Facebook and why it might be a good idea to remove your telephone number or use something like Google or Text Now as your number instead of your primary one. We'll have news, notes, commentary and more. We hope you enjoy the program as much as I have bringing it to you. Thanks for listening!

Topic: More on Facebook, why Brian Krebs deleted his Facebook account

In an article that I read on April 7th, Brian goes in to detail on why he eventually deleted his Facebook account sometime in 2020.  

According to the article, a paragraph says:  The phone number associated with my late Facebook account (which I deleted in Jan. 2020) was not in HaveIBeenPwned, but then again Facebook claims to have more than 2.7 billion active monthly users.  We know that Facebook has never been trustworthy after any type of incident, and I honestly don't believe that Mr. Krebs couldn't be part of the 533 million people affected by the breach.  Checking with the site, yours truly isn't effected either, but I honestly wouldn't believe it now-a-day especially since news of this is two years old. 

The supposed database has been kicking around the Internet Cybercrime community since Last Summer, according to the article.  I've never seen any of these databases, and with the massive amounts of databases out there and what they contain, who could confirm every piece of data in it? I like what Have I been Poned and what it is trying to offer, so don't get me wrong when it says that I'm not in there when I put my mobile number in the site to check.

We now learn that the database was put up since June 2020 and include names, mobile number, gender, occupation, city, country and marital status.  It includes data for 100 different countries and there is a link to a January 2021  twitter post within the article.  

KrebsOnSecurity goes on to talk about what might happen if someone with malicious intent gets ahold of your mobile number.  One of the things that could happen is your phone number changing hands, otherwise known as a Sim-swapping attack.  This happens because an employee at the store you got service is tricked in to changing the information to the attacker and you don't find out until you use your phone.


Brian talks about how it is probably time to remove your number from services like Facebook once verification of the account is complete.  I'm almost tempted on doing this myself.  There is a very interesting paragraph in which I got interested in. It says:  Why did KrebsOnSecurity delete its Facebook account early last year? Sure, it might have had something to do with the incessant stream of breaches, leaks and privacy betrayals by Facebook over the years. But what really bothered me were the number of people who felt comfortable sharing extraordinarily sensitive
information with me on things like Facebook Messenger, all the while expecting that I can vouch for the privacy and security of that message just by virtue of my presence on the platform.  We can't vouch for a presence  of a sensitive message just because we're on the platform. I've never used Facebook or its messenger client for anything secure anyway, but that paragraph is very important.

<a href="https://krebsonsecurity.com/2021/04/are-you-one-of-the-533m-people-who-got-facebooked/">Are You One of the 533M People Who Got Facebooked? </a> is the question and article title we're talking about in this segment, do read the article.

News notes on the blog. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895103</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895103/the-technology-blog/2025_02_13_03_41_24_5d008b44-027c-40a6-a457-b4beb100d29a.mp3" length="111081991" type="audio/mpeg"/>
      <guid isPermaLink="false">4936d086-b4dc-4d8d-bf8c-c75bb15149a2</guid>
      <itunes:duration>6942</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Apr 2021 00:54:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_281647e5f5ea36ade4b963cc4ee1a464.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 38: we've got Facebook in the spotlight, news, notes and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 38: we've got Facebook in the spotlight, news, notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the Security box, podcast 38. This week, we had planned to go back to DKIM and have a discussion on it, but we aren't going to do that. Why? It looks like news has gotten about Facebooks's 2019 breach and 535 million people whose information may now be out there on the free Internet as well as it already being sold to the dark web when the initial breach occurred. We'll have news, notes and more as well as your thoughts and comments to boot. Enjoy the program!

 Topic: Has Facebook done it again? 

Michael in Tennessee sent me an article from Phone Scoop, as well as me seeing the article we'll be taking from, which came from Cyberscoop. It looks like Facebook is really paying for a 2019 breach in which 500 plus million people's information including phone number were exposed somehow and later patched by Facebook.

 The data, which comes from people from over 100 countries, includes users’ phone numbers, email addresses, full names, birthdates and location, among other
identifiers, according to Insider, which first "reported the news."   The leak, was first reported by Motherboard, according to the article. The only thing that I'm unclear on is the section that talks about the fact that the leak was reported by Motherboard in January. 

The information was made available by paying a Telegram bot a couple of bucks for the details according to the article. According to the article, Facebook removed the ability of searching people by telephone number after the breach. Facebook will be probed by Ireland, and its unclear if the Unnited States will follow suit by the FTC. 

The article goes on on what the actors may do with the information now that the information has been made available for free. The website "have I been poned" has been updated by Mr. Troy Hunt with the information that was made available by the breach. 

For more information and to read the full article, <a href="https://www.cyberscoop.com/533-million-facebook-users-leaked-online-fraud-cybercrime/">533 million Facebook users’ personal data leaked online </a> is the article and do read this.


 News Notes for podcast 38 

<ul>
<li> Office 365 is no stranger to attack.  A Phishlabs article talks about the latest threat. This time, actors can mimic websites by using Google's API through Google Ads that allow redirects to whatever they want. The issue with this one is that once you log in, they capture your credentials as well as sending you to your account. For complete information, <a href="https://info.phishlabs.com/blog/breaking-down-the-latest-o365-phishing-techniques-1">Breaking Down the Latest O365 Phishing Techniques </a> is the article, which will talk about this entire process. </li>
<li> Ubiquiti is back in the news. A post by Krebs on Security talks about the latest drama at the company who now has come out saying that there was a problem.  After making a change that forced people to log in to their network, they were later told to reset their passwords because of a "third-party cloud provider" may have been breached. There's more including the very interesting fact that this company should have invalidated all credentials. <a href="https://krebsonsecurity.com/2021/04/ubiquiti-all-but-confirms-breach-response-iniquity/">Ubiquiti All But Confirms Breach Response Iniquity </a> is the article. This is going to get very interesting now. </li>
<li> Finally, due to time constraints, I've got some good news I want to pass along. Another web boss now has been pleaded and this guy pleaded guilty. This boss was behind selling heroin, firearms and hacking tools. He pleaded guilty on charges of money laundering. Tal Prihar was captured by French authorities. Read Cyberscoop's article <a href="https://www.cyberscoop.com/deepdotweb-tal-prihar-dark-web-darknet/">DeepDotWeb boss pleads guilty to laundering millions </a> for more. </li>
</ul>

Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895105</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895105/the-technology-blog/2025_02_13_03_31_47_327aa923-0c83-4f48-a7b8-f28701a0b6d1.mp3" length="105743398" type="audio/mpeg"/>
      <guid isPermaLink="false">3a773b29-f594-4351-a799-a02fb29e9276</guid>
      <itunes:duration>6608</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 07 Apr 2021 22:07:12 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fcd7383100941102e25c934048ece925.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 37: The beginning of DKIM, other commentary, news, notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 37: The beginning of DKIM, other commentary, news, notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 37. On this episode of the program, we're going to talk about something I don't think people know much about dealing with email, verification of domains in the process, the standards of what it is and how it came to be. We will also cover a very interesting webinar that I listened to by Trend Micro that delbt with the security predictions for 2021.  We'll also have news, notes, questions, comments and more as the show progresses and the listeners choice on whether they have something to contribute. I hope you enjoy the show as much as I have bringing it together for you, and thanks so much for listening!

For full details including links, check out the <a href="http://technology.jaredrimer.net/">the blog </a> and thanks for listening!  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895183</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895183/the-technology-blog/2025_02_13_03_53_53_98af5a87-5a9f-42fe-9a55-42782607b7e3.mp3" length="174861726" type="audio/mpeg"/>
      <guid isPermaLink="false">57a8124b-679b-46fe-b168-46cf240d37fd</guid>
      <itunes:duration>10928</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 02 Apr 2021 21:29:50 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_27c51e28d7d31eeed51f82cd82af72e8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 36: Password Managers, what exactly do you need?]]></title>
      <itunes:title><![CDATA[The Security box, podcast 36: Password Managers, what exactly do you need?]]></itunes:title>
      <description><![CDATA[<p>Welcome to podcast 36 of the security box. &nbsp;On this edition of the program, we'll be talking about password managers. &nbsp;Herbie Allen is along with a Things to Ponder section talking about Scams, one in particular dealing with Amazon. &nbsp;We also have a webinar that will be of interest from F-secure. We'll have news, notes and more. Hope you'll enjoy the program!</p>
<p><br></p>
<p>Full notations willbe provided on the <a href="http://technology.jaredrimer.net">blog </a> so check back often for those. Enjoy!</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895185</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895185/the-technology-blog/2025_02_13_03_51_07_9148ac2e-c04d-47df-a883-73e494f1b19d.mp3" length="163475682" type="audio/mpeg"/>
      <guid isPermaLink="false">03755fd2-b6a2-4c0e-8c6f-be74d0722d06</guid>
      <itunes:duration>10217</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 24 Mar 2021 23:03:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8226e6ba74708cb1435364f7ff475038.jpg"/>
    </item>
    <item>
      <title><![CDATA[Audio Centric applications for podcast 35 of the security box]]></title>
      <itunes:title><![CDATA[Audio Centric applications for podcast 35 of the security box]]></itunes:title>
      <description><![CDATA[On this edition of the podcast, audio-centric applications like clubhouse. News, notes and more. Read the blog for full notations. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895187</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895187/the-technology-blog/2025_02_13_03_50_47_b97e79a7-329b-4d62-9f99-4421c9ce925c.mp3" length="95750412" type="audio/mpeg"/>
      <guid isPermaLink="false">08833f1b-56e8-4d90-aa0c-48bb4b7a07a6</guid>
      <itunes:duration>5984</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Mar 2021 23:52:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c5a240db90e123084d3f129764bd3b0f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 34: The Rest of the Key Logging discussion]]></title>
      <itunes:title><![CDATA[The Security box, podcast 34: The Rest of the Key Logging discussion]]></itunes:title>
      <description><![CDATA[Welcome to podcast 34 of the Security Box. On this edition, we'll pick up where we left off on the Key Logging aspect of our discussion and we'll have news, notes, commentary and more. We also have something from Michael in Tennessee who sent us a video of 12 Android apps you must get rid of. Some of these, are quite interesting. Hope you enjoy the program as much as I am bringing it together for you.

News Notes will be on the <a href="http://technology.jaredrimer.net">blog </a> and I did enjoy the program. Hope you do too. See you next week!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895189</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895189/the-technology-blog/2025_02_13_03_51_30_51c0bb5e-c787-4252-8072-00caed93375d.mp3" length="137297227" type="audio/mpeg"/>
      <guid isPermaLink="false">b0ec24b5-7286-4c46-b2ff-34af7c7b080b</guid>
      <itunes:duration>8581</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Mar 2021 00:29:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_85ffeb6466bc7258c46246a8677b6c0a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 33: Part 2 of the Keylogging discussion and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 33: Part 2 of the Keylogging discussion and more]]></itunes:title>
      <description><![CDATA[On this podcast, we continue where we left off with our Key Logging topic, and we'll also have news, notes, questions, comments and concerns. Hope you'll enjoy the program as much as we have putting it together for you.

Topic: Continuing Key Stroke Logging

This may take several programs, but we must cover keystroke logging. We take from <a href="https://en.wikipedia.org/wiki/Keystroke_logging">the Wikipedia page on keystroke logging </a> so you can follow along. Different heading include, but not limited to: application, software based keyloggers, keystroke logging and writing processes, related features, hardware based keyloggers and history.  There are 4 different headings for this article and a lot to read. I figured it would be a good discussion to have since it has come up in discussions of other things. I hope you enjoy the discussion as much as I am bringing it to you.

There's more, news notes will be posted on the blog for everyone to see what links and items we have. Enjoy the show!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895191</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895191/the-technology-blog/2025_02_13_03_52_41_fb74ace3-a073-4d1e-9934-9a0195544023.mp3" length="147726144" type="audio/mpeg"/>
      <guid isPermaLink="false">71abecaf-7887-478c-9e6d-7db6ad6fa84a</guid>
      <itunes:duration>9232</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 26 Feb 2021 18:35:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c0bf94b011540e2ac8a822feade73acc.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 32: The Beginning of Keyloggers]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 32: The Beginning of Keyloggers]]></itunes:title>
      <description><![CDATA[These are the show notes. For full news notes, please check the blog.



Welcome to the security box, podcast 32. On this edition of the program, we're going to taolk about keystroke loggers. I found a Wikipedia article which is detailed and there could be a possibility that this goes in to multiple weeks. We'll also have news, notes, questions, comments and even a "things to ponder" segment to boot.

 Topic, Keystroke logging: 

This may take several programs, but we must cover keystroke logging. We take from <a href="https://en.wikipedia.org/wiki/Keystroke_logging">the Wikipedia page on keystroke logging </a> so you can follow along. Different heading include, but not limited to: application, software based keyloggers, keystroke logging and writing processes, related features, hardware based keyloggers and history.  There are 4 different headings for this article and a lot to read. I figured it would be a good discussion to have since it has come up in discussions of other things. I hope you enjoy the discussion as much as I am bringing it to you.

 Things to Ponder 

During last week's program, we were still learning about the possible issue in a small town in Florida that could've had some serious problems with its water supply if it weren't for a worker noticing something as simple as a mouse moving.  In this things to ponder segment, I talk about what we've learned to date, and its quite interesting.  To date, I have two sources you can read more, one an article by our good companion Brian Krebs, the other from CISA. You should read them both, and of course listen to what my thoughts are and participate.

<ul>
<li> <a href="https://krebsonsecurity.com/2021/02/whats-most-interesting-about-the-florida-water-system-hack-that-we-heard-about-it-at-all/">What’s most interesting about the Florida water system hack? That we heard about it at all. </a> Krebs on Security </li>
<li> <a href="https://us-cert.cisa.gov/ncas/alerts/aa21-042a">Alert (AA21-042A) Compromise of U.S. Water Treatment Facility  </a> CISA </li>
</ul>

I hope you'll participate in this interesting story.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895192</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895192/the-technology-blog/2025_02_13_03_54_46_4abea1c7-21a9-48bc-9988-3213b6b44013.mp3" length="148057680" type="audio/mpeg"/>
      <guid isPermaLink="false">eccf4e53-4c75-4bbf-87a0-81f1322de67d</guid>
      <itunes:duration>9244</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 17 Feb 2021 23:26:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_01d9bd6916642de6a5f25c7f5b2e9404.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 31: Domain discussion continued, news, notes and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 31: Domain discussion continued, news, notes and more]]></itunes:title>
      <description><![CDATA[The show notes are full of links, and those will be posted to the <a href="http://technology.jaredrimer.net">blog </a> as soon as we can.

The program only has two tracks at the end, and I'm happy with how it turned out I think. While there were no calls, I know this show will have a lot of info, and the podcast notes will explain things by linking to various things.



Welcome to the security box, podcast 31. On this podcast, we're going to continue the discussion of domains with several different things that we couldn't get to from last week. Also, we'll have news, notes, questions, comments and more. I hope you enjoy the program as much as we have putting it together for you.



I hope you all enjoy the program, and see you for keyloggers next week. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895194</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895194/the-technology-blog/2025_02_13_04_00_18_03f93c96-d0f0-460c-b247-7bcf869ba938.mp3" length="108036740" type="audio/mpeg"/>
      <guid isPermaLink="false">f011ce71-2b9d-4830-8572-6717db3a2db5</guid>
      <itunes:duration>6752</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 11 Feb 2021 17:37:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_30b9897a45cd2f388e6cedbfad0c4890.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 30: Domain discussion, security segment, news, notes and Drama]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 30: Domain discussion, security segment, news, notes and Drama]]></itunes:title>
      <description><![CDATA[Welcome to podcast 30 of the Security Box. On this security box podcast, the goal is to talk about domains. We'll talk about what a domain is, how they work, a little bit about the IP system, and some recent news in regards to domains, registration companies, look-alike domains and more. We'll have news, notes, questions, comments and Michael in Tenessee with a segment to boot.

For full show notes, check the tech blog. Some tech issues occurred, but the show must go on.  Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895197</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895197/the-technology-blog/2025_02_13_03_37_54_a07bcbc5-777e-4df0-bdfe-4936c3468e0b.mp3" length="170465632" type="audio/mpeg"/>
      <guid isPermaLink="false">15c30b47-1b2f-4a0e-bce7-7c6a899e22c9</guid>
      <itunes:duration>10654</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 03 Feb 2021 23:22:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6bae9d6dfce3cc9a10538e83f16aa558.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 359 for January 29, 2021]]></title>
      <itunes:title><![CDATA[Tech podcast 359 for January 29, 2021]]></itunes:title>
      <description><![CDATA[Welcome to podcast 359 of the technology podcast. I'm Jared, and its time to bring you another podcast. 

Today, we've got something I think you'll be interested in as I talk about something that has been around awhile that seems to be finally dismantled, at least for now. What might that be? Its called Trick Bot. I heard a podcast about it and how it has pretty much fell, but yet, its still around according to an article I'll be talking about and reading later.  

Next, I talk about Weather Gods.  Its one of many different apps on the app store.  I posted on the tech blog and on Applevis in regards to this topic, and I chose this app because of my needs, and something I feel isn't fair called double extortion.  There is a paid app, and then they want us to pay for a subscription for what I can get for either beta testing, or paying for the subscription. Thoughts are welcome.

Finally, could Net Neutrality be coming back?  According to a podcast, it might be, and I talk about it here instead of the security box. 

Contact info is at the end of the program as usual.

What to read or listen to:
<ul>
<li> <<a href="https://www.thecyberwire.com/podcasts/research-saturday/167/notes">Trickbot may be down, but can we count it out? </a> The Cyber Wire Daily </li>
</ul>

Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895199</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895199/the-technology-blog/2025_02_13_03_55_22_b139bf9e-b61e-4bc8-8ee6-06d1a1c29a9f.mp3" length="58365348" type="audio/mpeg"/>
      <guid isPermaLink="false">e81d6742-7576-4691-8029-a91e25b8b838</guid>
      <itunes:duration>3644</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 29 Jan 2021 19:42:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_06e411730e345b2e354f3c5d5640473c.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 29: messaging apps and security, news, notes and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 29: messaging apps and security, news, notes and more]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 29. On this episode of the podcast, what seems to be the problem with messaging applications such as Whatsapp, Signal and others when it comes to their security? What do you think of for cloud security for 2021 as the pandemic continues? We'll have news, notes, questions, comments and more including bits from Sans News bites, Trend Micro and more.

Topics

<ul>
<li> Security Now episode 802 was released and broadcasted the week of January 19, 2020. On this podcast, are we really concerned about what application we choose to use to message? Steve says that it doesn't honestly matter, as metadata isn't all that big of a deal.  Who really cares if phone numbers, time of messages, and even how long audio messages may be?  There are apps discussed for more private communication, but metadata doesn't cover the content of the message itself.  From Steve's introduction taken from his <a href="http://grc.com/sn">security now page </a> he writes in part:  Then we wrap up by looking at various aspects
of the frenzy caused by WhatsApp's quite predictable move to incorporate its users' conversation metadata into Facebook's monetization ecosystem.  This segment lasts roughly 20 minutes as I play the segment for all to hear. What do you think about this? </li>
<li> What about cloud security for 2021?  <a href="https://www.trendmicro.com/en_us/research/21/a/the-top-worry-in-cloud-security-for-2021.html">The Top Worry In Cloud Security for 2021 </a> is the Trend Micro article, and I found a video on their youtube page that seems to voice the article.  We'll play this video and we'll discuss.  <a href="https://youtu.be/RYcKrBbyvTQ">Cloud Dynamics: Top Cloud Security Challenges for 2021 </a> is the video. Your thoughts are welcome. </li>
</ul>

For complete news notes, please see the tech blog for details. Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895200</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895200/the-technology-blog/2025_02_13_03_38_00_b477fc68-9bf7-4351-b38a-1e6d597c9aea.mp3" length="154213289" type="audio/mpeg"/>
      <guid isPermaLink="false">483a1f8f-42b2-42ee-8a77-27f8de2a93da</guid>
      <itunes:duration>9638</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 28 Jan 2021 20:01:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e0f219d257ec70fd1f6ff3dba83ff188.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 28: Year in Review items Teledildonics, and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 28: Year in Review items Teledildonics, and more]]></itunes:title>
      <description><![CDATA[Welcome to the program. Full news notes will be on the blog, but here are the topics and what is talked about before news notes. Hope you enjoy!



Welcome to podcast 28 of the Security Box. On this podcast, a couple of year in review items, news, notes, something called teledildonics or "The Male Chasity Cage" from a recent Security Now podcast, news, notes, questions, comments  and more.

Topics:

<ul>
<li> <a href="https://info.phishlabs.com/blog/year-in-review-ransomware">Year In Review: Ransomware </a> </li>
<li> <a href="https://info.phishlabs.com/blog/the-year-in-review-how-covid-19-has-changed-cyber-security">The Year In Review: How COVID-19 Has Changed Cyber Security </a> </li>
<li> Security Now has a segment on something that I really don't understand, but yet, caught my attention.  I believe the term used by Steve was Teledildonics. Something we should be concerned about? <a href="http://www.theinternetofdon.gs">The Internet of Dongs </a> </li>
<li> <a href="https://youtu.be/iebvzvvNK8o">Covid-19 scam alert on vaccines </a> 
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895202</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895202/the-technology-blog/2025_02_13_03_54_28_25aa5179-2ec9-4c77-8f8e-e33ca0a429d1.mp3" length="181004472" type="audio/mpeg"/>
      <guid isPermaLink="false">a425d346-8b18-4772-89d9-1aa4c521c64e</guid>
      <itunes:duration>11312</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 20 Jan 2021 23:35:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c050f2d3ba02a96d601bdd9a133d6093.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 27: Trend Micro report, breaches of the year and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 27: Trend Micro report, breaches of the year and more]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the security box, podcast 27. Trend Micro has a report they do each year talking about the trends of the next year and its worth talking about. Did you know about any of the breaches of the past year? We'll go through that thanks to Solutions Review, as well. We'll have news, notes, commentary and more and even a guest to boot if everything goes well. Thanks so much for listening, and make it a great day!

Topics:
<ul>
<li> The Security Predictions from Trend Micro is always something fun to read.  We'll talk about some highlights that might be of interest, and of course, we'll take questions and comments in regards to this. You can <a href>read the article entitled: Takeaways from Trend Micro's 2021Predictions </a> to learn more. I also posted a blog post with my thoughts on this one, and its available for everyone to read. </li>
<li> Are you aware of the biggest breaches of the year?  There is a post with videos and text, and we'll talk about this.  Ben Canner, a follower of mine on twitter, tweeted out <a href="https://solutionsreview.com/security-information-event-management/solutions-review-presents-the-top-data-breaches-of-2020/">Solutions Review Presents: The Top Data Breaches of 2020 </a> and boy, is it something that I think we should cover.  </li>
<li> Cyber Wire Daily has what they call Research Saturday. <a href="https://overcast.fm/+hY0mzODz4">This is a link to January 9th's episode on Emotet </a> and I will be summarizing this as part of this week's program.  There is a link to read show notes, and thanks to Overcast for providing a link to the episode, I think its worth sharing. </li>
</ul>

News Notes:

I think we're going back to the original format that we started with, its much easier to maintain it that way. If you liked the other format, please let me know.

<ul>
<li> According to Cyberwire Daily, a podcast, President Trump was removed from Twitter for several days, as well as removed from Facebook until he leaves office. The Washinton Post may have an article on this, as they site the post as being where the reports of him being kicked off.  The January 7th program talked about the fact President Trump urged people to show their displeasure, although a tweet said to do it peacefully.  It made no difference, as people demonstrated and caused problems on January 6th and caused the recount to be delayed. It was resumed later in the evening, and president elect Joe Biden was confirmed. <a href="https://www.cyberscoop.com/facebook-bans-trump-indefinitely-risks-simply-too-great-zuckerberg-says/">Facebook bans Trump indefinitely; risks 'simply too great,' Zuckerberg says </a> and <a href="https://www.cyberscoop.com/trump-twitter-facebook-ban/">Facebook, Twitter act on Trump's false messaging after violence at Capitol </a> should be read in regards to the latest on this ordeal. These two articles were read after listening to the podcast.</li>
<li> <a href="https://www.trendmicro.com/en_us/research/21/a/this-week-in-security-news-jan-8.html">This Week in Security News - Jan 8, 2021 </a> has quite a lot of articles, some of which I had meant to cover but haden't had an opportunity to blog about.  </li>
<li> <a href="https://www.cyberscoop.com/andrei-tyurin-jp-morgan-hack-sentencing/">Russian man sentenced to 12 years in prison for massive JPMorgan data heist </a> is a bit of good news after a long bout of wondering if we are going to get some good news.  While I published some good news recently, 2021 has gotten off to a great start with this one.  This J.P. Morgan breach at the time was the biggest to date for that time, but Solar Winds today tops that. This was well orchestrated, and you should read this. </li>
</ul>

There's more, check the blog for complete notes. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895204</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895204/the-technology-blog/2025_02_13_04_11_59_265aaff0-2c66-4caf-a5e9-ee5bbc577126.mp3" length="177915754" type="audio/mpeg"/>
      <guid isPermaLink="false">371d127f-1499-494e-ba9d-d8e4e0dbfb18</guid>
      <itunes:duration>11119</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 14 Jan 2021 16:46:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_41ad1c3c91dae600fa457eb92fe71564.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 358: Stripe demo, people violating terms of service and more]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 358: Stripe demo, people violating terms of service and more]]></itunes:title>
      <description><![CDATA[The show notes are short for this episode, but the program is not short. I hope you enjoy the program as much as I have.

On this edition of the technology podcast, a stripe demo for you on their app. Also, people getting away with blatently violating terms of service. Finally, Dark Net Diaries had an episode on the darknet and someone who got caught in the crosshairs of the law because they baught and sold drugs on the underground. I hope you all enjoy the program. This program lasts 84 minutes. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895206</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895206/the-technology-blog/2025_02_13_03_51_19_0b2f1dc1-e98d-4bb9-b1e1-31ae5f9ddb7c.mp3" length="80811337" type="audio/mpeg"/>
      <guid isPermaLink="false">1d5df75f-6e2e-457d-be65-29c58e1be7f8</guid>
      <itunes:duration>5045</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 11 Jan 2021 17:48:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f44f960ecbed50a8be7ae81f3e6b8a26.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 26 for January 6, 2021]]></title>
      <itunes:title><![CDATA[The Security box, podcast 26 for January 6, 2021]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box for this week. We continue with the breach that is, by catching up with some commentary from Security Now from two episodes. We also have a "things to ponder section" and some News and notes to boot. For full show notes, please go on over to <a href="http://technology.jaredrimer.net">the blog </a> as there may be links to things that might be of interest to you.  I hope that you enjoy the program as much as I have putting it together, and I'll see hyou next week! 

The topic of Shaken and Stir will get its wrapup from podcasts 21 and 23.  

<ul>
<li> <a href="https://www.fcc.gov/call-authentication">Combating Spoofed Robocalls with Caller ID Authentication </a> Federal Communications Commition </li>
<li> <a href="https://en.wikipedia.org/wiki/STIR/SHAKEN">STIR/SHAKEN </a> Wikipedia </li> 
</ul>

This should be the last of this as we don't have far to go with it.

There's more, so remember to check the blog!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895208</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895208/the-technology-blog/2025_02_13_03_58_37_4d7a503a-7f8f-4b23-bf57-c4ec5dffdfc0.mp3" length="240835330" type="audio/mpeg"/>
      <guid isPermaLink="false">0971ef7a-ba3e-4a30-8f7d-6886f8a9592f</guid>
      <itunes:duration>15052</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 07 Jan 2021 20:52:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_422a27c0fbbccc19dbd9d36671420cec.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 25: Year End part 2]]></title>
      <itunes:title><![CDATA[The Security box, podcast 25: Year End part 2]]></itunes:title>
      <description><![CDATA[Welcome to podcast 25 of the security box. This podcast was compiled on Christmas day, but was released on the 30th of December. On it, we go through podcasts 341-357 of tech, playing a few segments which were also covered on this podcast like catphishing, some of the security items throughout the year from the blog, and even other highlights. Highlights the security box and some of what we covered in podcasts including two interviews. This podcast is 167 minutes and is the last of the two podcasts before we resume the first week in January. Hope everyone enjoys the lookback, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895210</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895210/the-technology-blog/2025_02_13_03_55_25_7d9dc117-824a-470a-ae49-752a0d629761.mp3" length="156291146" type="audio/mpeg"/>
      <guid isPermaLink="false">bd9b0449-8367-42e7-a7e7-e63942f04c59</guid>
      <itunes:duration>9758</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 31 Dec 2020 01:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9335b887f16bdbca7f4822e526b274f9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 24: The breach that is, and year end stuff]]></title>
      <itunes:title><![CDATA[The Security box, podcast 24: The breach that is, and year end stuff]]></itunes:title>
      <description><![CDATA[Welcome to podcast 24 of the security box. This is a full podcast, as we're on a two week break. Here is what we have for the podcast.

<ul>
<li> The biggest item that we have in the podcast is the biggest breach in the Solar Winds feasco. We're still learning, check the blog for more. <a href="https://technology.jaredrimer.net/2020/12/14/breaking-the-comerce-department-among-possible-others-breached/">Here is a blog post </a> to get you started with the whole fiasco, but there is definitely more. </li>
<li> Podcasts 333-340 is covered in different segments throughout the year in regards to what has happened throughout the year. We'll continue it next podcast. </li>
</ul>

The podcast is a little over 2 hours including our final track.  Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895211</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895211/the-technology-blog/2025_02_13_03_56_50_ff43ee68-59da-4b32-bf46-8bfeacce7dfb.mp3" length="119982772" type="audio/mpeg"/>
      <guid isPermaLink="false">1b11c013-a3a5-471d-8687-86f1d9caeee9</guid>
      <itunes:duration>7491</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Dec 2020 19:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1e059e76d84da119778e426048f7e257.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 357: Weather Underground]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 357: Weather Underground]]></itunes:title>
      <description><![CDATA[On this edition of the podcast, the final podcast of 2020, we'll demo Weather Underground. I wanted to do two demos, but I think one is enough. I hope you'll enjoy it.Apple Vis has a post in their directory of apps about <a href="https://www.applevis.com/apps/ios/weather/weather-underground-forecast">Weather Underground - Forecast </a> which was written up. While I do like the app, I believe the person writing this has the same points I do. I do find it accurate, but there are definitely some accessibility issues which you'll hear about in the demo.The Security Box will have other podcasted content, so the feed will still be going strong in 2020. On podcast 358, I hope to have another demo of something i learned about, an app that'll assist me with billing credit cards. See you all then!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895212</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895212/the-technology-blog/2025_02_13_03_57_29_931bdb07-60c5-4fb3-a0e6-844189862c8e.mp3" length="51119889" type="audio/mpeg"/>
      <guid isPermaLink="false">c778a69b-64e4-43fd-9c62-28ae8a4c648f</guid>
      <itunes:duration>3191</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 17 Dec 2020 19:39:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8e2d938e679d3580406fa3c3f9eb12e3.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 23: The continuing Education of Shaken and Stir, Philmore and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 23: The continuing Education of Shaken and Stir, Philmore and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 23 of the security box. Picking up where we leave off, we continue with Shaken/Stir and its discussion from podcast 21.

Besides that, we'll go ahead and talk about a company which doesn't really care about the security of its customers. The name has been mentioned in passing, but now its time to talk about some very serious stuff on a podcast.

We'll have news, notes, and more.

Topic:

Shaken/Stir was discussed on podcast 21 of the podcast, and podcast 23 will finish it off. Here are the links, taken from podcast 21's notations.

<ul>
<li> <a href="https://www.fcc.gov/call-authentication">Combating Spoofed Robocalls with Caller ID Authentication </a> Federal Communications Commition </li>
<li> <a href="https://en.wikipedia.org/wiki/STIR/SHAKEN">STIR/SHAKEN </a> Wikipedia </li> 
</ul>

News Notes and more will be on the blog version of the show notes. This address is given throughout the program. News notes was live. Enjoy today's program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895215</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895215/the-technology-blog/2025_02_13_04_00_15_f9222e70-83ae-495d-a27e-d3653be02471.mp3" length="203001664" type="audio/mpeg"/>
      <guid isPermaLink="false">abd972ad-abc9-47a0-afc4-edfb36d3161c</guid>
      <itunes:duration>12687</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Dec 2020 23:50:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_49b612bdf4b6ffda93835f6295328399.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 22: BEC and what it is, a couple of guys who aren't safe and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 22: BEC and what it is, a couple of guys who aren't safe and more]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 22 picking up the podcast with business email compromise.
<ul>
<li> <a href="https://www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)">Business Email Compromise (BEC) definition </a> </li>
<li> <a href="https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/billion-dollar-scams-the-numbers-behind-business-email-compromise">Billion-Dollar Scams: The Numbers Behind Business Email Compromise </a> </li>
</ul>

Besides that, we talk about a couple of people who have been a problem in the phone world, tie it in to phone security, and find out if these guys would be capable of using such tech. Comments also came in about scams when looking for a place to live, and of course some tunes come along with it. Enjoy!
<a href="https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/delving-into-the-world-of-business-email-compromise-bec">Delving into the World of Business Email Compromise (BEC) 
<a href="https://en.wikipedia.org/wiki/Business_email_compromise">Business email compromise </a> 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895217</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895217/the-technology-blog/2025_02_13_04_03_46_97d5f76e-5bd2-4630-af93-bdfcac4925ee.mp3" length="175162657" type="audio/mpeg"/>
      <guid isPermaLink="false">7b33bb21-8974-44f3-83c5-8fb2d64b206d</guid>
      <itunes:duration>10947</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Dec 2020 22:33:47 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c316af85ec425f3a48eed7414915b3b1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 21: the beginning of Shaken and Stir]]></title>
      <itunes:title><![CDATA[The Security box, podcast 21: the beginning of Shaken and Stir]]></itunes:title>
      <description><![CDATA[The beginning of Shaken and Stir, lots of news items and more. For full show notes, go over to the <a href="http://technology.jaredrimer.net">blog </a> to do some reading of anything that interests you.



Welcome to podcast 21 of the security box. This week, I thought it would be interesting to take you through the Shaken and Stir protocol. This protocol is supposed to go through and make sure we get adequate caller ID.

Below, please find resources that we found on the Internet for the Shaken and Stir protocol, and I'll be working on braille material so that I have something in writing. We hope that you enjoy the program today.

Topic:

<ul>
<li> <a href="https://www.fcc.gov/call-authentication">Combating Spoofed Robocalls with Caller ID Authentication </a> Federal Communications Commition </li>
<li> <a href="https://en.wikipedia.org/wiki/STIR/SHAKEN">STIR/SHAKEN </a> Wikipedia </li> 
</ul>


For full news notes, go to the blog and we'll continue shaken and stir in two weeks. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895219</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895219/the-technology-blog/2025_02_13_03_42_06_2ac22d04-aa64-479a-b0e6-cef7beee7c6c.mp3" length="172637765" type="audio/mpeg"/>
      <guid isPermaLink="false">d3ff0697-16b4-4466-a4bd-2661d354d6a9</guid>
      <itunes:duration>10789</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 02 Dec 2020 23:20:01 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e99676e0419a1510d3b28ce8a0495729.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 20: PCIDSS, OCSP Stapling and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 20: PCIDSS, OCSP Stapling and more]]></itunes:title>
      <description><![CDATA[Hello Folks, welcome to episode 20 of the technology podcast series known as the Security Box. A few tech issues but we press on. Please check <a href="http://technology.jaredrimer.net">The Blog </a> for complete notations as we have segmented everything. Both Michaels are on with segments, I continue where we left off last week, and we even talk about an email I posted as part of protecting our security even though it is a little unrelated from the main topic. News, notes, and more. I hope you enjoy the program even though there was a few glitches, I still enjoyed the program. See you all next time!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895223</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895223/the-technology-blog/2025_02_13_03_55_11_61023616-c248-44f8-8f03-ac8518cfc9a1.mp3" length="216505090" type="audio/mpeg"/>
      <guid isPermaLink="false">84b317f8-6196-453e-af53-997d2c1c112c</guid>
      <itunes:duration>13531</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 26 Nov 2020 17:48:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5b6e8e704104d0810e50b50e9ca9d1cb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 366: Braille Transcription, a company in trouble, Mac, IOS, and More]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 366: Braille Transcription, a company in trouble, Mac, IOS, and More]]></itunes:title>
      <description><![CDATA[Welcome to the tech podcast. Assignment 19 was a complete fail, and I know that I had a lot of failure but not all was my fault. You can search out this write up on the blog, but I talk about it here. Next, a company may be getting themselves in some trouble <a href="https://technology.jaredrimer.net/2020/11/09/forget-going-to-a-hotel-especially-since-records-go-back-to-2013-were-you-effected/">Forget going to a hotel … especially since records go back to 2013 … were you effected </a> is the blog post I wrote, are you effected? Next, JFW 2021 and MAC version 11 are out and I taklk about both. Finally, I found some good news in the security field and I even have one more. Finally, a laugh and contact info at the end. Hope that you enjoy the program and I'll see you all later!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895224</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895224/the-technology-blog/2025_02_13_03_58_58_79cea3f3-f398-4d56-9260-c7884c932fb8.mp3" length="68403761" type="audio/mpeg"/>
      <guid isPermaLink="false">e3b53cb7-cb83-40ae-acc6-6bba1ff77b0d</guid>
      <itunes:duration>4270</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 24 Nov 2020 19:12:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_764586ac8808ec2d7702a1b67a9caea2.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Securoity  Box, podcast 19: its all about the credit card: part 1]]></title>
      <itunes:title><![CDATA[The Securoity  Box, podcast 19: its all about the credit card: part 1]]></itunes:title>
      <description><![CDATA[We're going to continue the credit card talk next week, but this should get you started. 

Welcome to podcast 19 of the security box.

This week, let's talk about credit cards, PCIDSS, and more.

<ul>
<li> <a href="https://storekit.com/payments/pci-dss/">PCI DSS Compliance Guide: UK Costs & Checklist </a> </li>
<li> <a href="https://content.hsm.utimaco.com/blog/pci-dss-requirements-for-building-and-maintaining-a-secure-network-and-systems">PCI DSS requirements for building and maintaining a secure network and systems </a> </li>
<li> <a href="https://www.pcisecuritystandards.org/pci_security/">The PCI SECURITY web site </a> </li>
<li> <a href="https://en.wikipedia.org/wiki/Payment_Card_Industry_Data_Security_Standard">Payment Card Industry Data Security Standard </a> 
</ul>

We're putting the Wikipedia link in for reference. Please do not rely on it alone, as the page talks about a lot of unsourced material. We also posted two of those sources as I liked them, and we'll use one of them to talk about what PCIDSS is, and what is required. 

News Notes

<ul>
<li> Thinking about getting an Android phone? Think that its security is better than IOS and what it may have to offer? Thats your choice, and we're not going to change your mind. According to an article from the Register, maybe you should think about this again. According to the article, Google is being sued because it is taking a couple hundred MB from you on your cellular data even if the phone is sitting there quietly not being touched. Why? Because Google is preparing potential ads that might be of interest to you after it collects data in the background. The article goes on to say that Google people agree to multiple terms of service, none of which talks about the passive collection of data that has nothing to do with your use. <a href="https://www.theregister.com/2020/11/14/google_android_data_allowance/">New lawsuit: Why do Android phones mysteriously exchange 260MB a month with Google via cellular data when they're not even in use? </a> is the article, think about this when you decide which operating system you want. </li>
<li> <a href="https://blog.trendmicro.com/this-week-in-security-news-ransomware-gang-is-raking-in-tens-of-millions-of-dollars-and-microsoft-patch-tuesday-update-fixes-17-critical-bugs/">This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs </a> has a bunch of items in it, and we'll let you decide what you want to talk about.  </li>
</ul>

Other news

Looks like we've finally gotten something that might work. After some time, I am now back on MyTelespace, where they have a call in number for callers who do not have the other technology to use. That number is 720-787-1080 and my box number is 8347 over there.  Just another option for people to use.  Thanks so much for listening, and make it a great day.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895226</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895226/the-technology-blog/2025_02_13_04_16_16_91e75879-d4e0-44b8-95f8-1d1616bd6f4d.mp3" length="181682402" type="audio/mpeg"/>
      <guid isPermaLink="false">6ddac44e-5cc9-4bd4-bca5-537b046383eb</guid>
      <itunes:duration>11355</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 19 Nov 2020 04:06:19 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_caf9ebab2f022810128c3132fb996f12.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 18: election stuff, updates on podcast 6, and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 18: election stuff, updates on podcast 6, and more]]></itunes:title>
      <description><![CDATA[The show notes are quite lengthy, so not everything is going to be listed here, but please check the <a href="http://technology.jaredrimer.net">blog </a> under podcasts for the complete notes.



Things to ponder

Disclaimer: The following are going to be things to ponder. Some things could be posted as a blog post, others are just thoughts based on one topic or another and may not be linked to anything. The opinions expressed are those of the presenter, and may not necessarily be those of the JRN, its staff, providers of software and services, or the like. 

<ul>
<li> I got the best email ever. What was so interesting about it was the domain. Normally, I don't comment on Spam, but <a href="https://technology.jaredrimer.net/2020/11/06/just-saw-the-best-email-ever-in-my-inbox-domain-is-relatively-new/">Just saw the best email ever … in my inbox … domain is relatively new </a> is the blog post. You'll see the domain, as well as my thoughts. I talk about this one. </li>
<li> Amazon put a little bit of a scare in me by sending me an OTP when I did not even request one. I did some quick investigating and found I was not compromised, but turn on two factor (2sv) on Saturday, the 7th. I checked my transactions, card history, and other log in activity and didn't find anything suspicious. </li>
<li> On podcast 6 of the Security Box, it was discussed that Michael in Tennessee had a security concern about his apartment WIFI setup. He isn't wrong, as on September 7th, he called in to <a href="https://www.twit.tv/shows/the-tech-guy">Twit' The Tech Guy </a> and asked Leo. On this podcast, we'll play said segment and play Michael's things to ponder segment as we give an update on the worst security ever. If you want to listen to podcast 6 from August 19, 2020 <a href="https://www.sendspace.com/pro/dl/etzmbx">here's the link to use (162162.33mb) </a> for your enjoyment. Also <a href="https://techguylabs.com/episodes/1743/how-can-i-be-secure-my-apartment-wifi-network">read the text from tech guy labs, the tech guy: episode 1743. </a> </li>
</ul>

That is only some of what is up, the blog will have more.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895228</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895228/the-technology-blog/2025_02_13_03_41_23_b0bfc17f-abd3-4d6a-b2d0-2a219a48ddfc.mp3" length="200826187" type="audio/mpeg"/>
      <guid isPermaLink="false">b3a923e4-3afb-43a9-a252-ac25d158c61a</guid>
      <itunes:duration>12551</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 13 Nov 2020 01:19:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_86a775398cd3b6ef8730f0b5583355d1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 17: Catch up, Trend Micro and more]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 17: Catch up, Trend Micro and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 17 of the technology series known as the security box.

Catch up

<ul>
<li> Michael in Tennessee makes an appearance as he was not able to make it last week. We talk about encryption, the lack there of from the government, and companies in general in the security landscape.We are not pointing our fingers at any one company, but mainly an open discussion. </li>
</ul>

Topics:

<ul>
<li> A subset of apps were targeted in an article that indicates that 76 percent of them have at least one vulnerability or bug. The goal is not to write perfect software, but software that can be fixed within a reasonable time frame. Different types of terms are used within this article, none of which I'm too familiar with, but the article I found quite interesting. It came from the folks at help net security. <a href="https://www.helpnetsecurity.com/2020/10/28/applications-security-flaw/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+HelpNetSecurity+%28Help+Net+Security%29">76% of applications have at least one security flaw </a> is the article, let us discuss. </li>
<li> Trend Micro has a program for free called House Call which is accessible. This was actually talked about this past Thursday with Andy and Josh. In the article <a href="https://www.trendmicro.com/en_us/research/20/j/trend-micro-housecall-for-home-networks.html">Trend Micro HouseCall for Home Networks </a> Trend Micro talks about what they've done with the program and how it can benefit you. </li>
<li> URL tracking systems like add words and add cents by Google can be abused just like the URL shorteners before it. <a href="https://info.phishlabs.com/blog/how-url-tracking-systems-are-abused-for-phishing">How URL Tracking Systems are Abused for Phishing </a> comes from Phishlabs, and its well worth the read. This should probably be talked about, because sites use these services including blindness related sites. Do you think it is time to move away from the services in the name of security? </li>
</ul>

News Notes and more

<ul>
<li> In some good news, we've definitely got some. <a href="https://krebsonsecurity.com/2020/11/two-charged-in-sim-swapping-vishing-scams/">Two Charged in SIM Swapping, Vishing Scams </a> is the article penned by Mr. Krebs. Maybe this is a start to something, only time will tell what happens. </li>
</ul>

There may be more news that I didn't cover here or on the podcast of the box, let me know what you want covered.

Books

Due to space limitations, the books section of the show notes can't be reproduced here. <a href="http://technology.jaredrimer.net">The Tech blog </a> will have the entire notations including the books for you to peruse. Thanks so much for listening and contributing!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895230</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895230/the-technology-blog/2025_02_13_04_10_03_3c4412e3-a2b3-4983-af7e-7ce5915e3ade.mp3" length="179906076" type="audio/mpeg"/>
      <guid isPermaLink="false">494f2b7c-8842-4ef4-afc1-0cfb6c556982</guid>
      <itunes:duration>11244</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 05 Nov 2020 00:07:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e854eee8b67a8808af9081f952f19f89.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 16: catch up work, domains, and more]]></title>
      <itunes:title><![CDATA[The Security box, podcast 16: catch up work, domains, and more]]></itunes:title>
      <description><![CDATA[We've got shorten short notes although detailed. Here goes.

Welcome to broadcast 16 of the Security Box.

Time to catch up:

Jennifer, the staple it seems to this program, comes in with 8 different commentary pieces we'll step through in regards to last week's significant program on privacy, personal information online and the like. We'll see how this segment goes when it comes to whether there needs to be anything else said, or whether it'll speak for itself.

Topics:

<ul>
<li> What do you think when it comes to your web host and what they offer? Some web hosts are Windows based, some are linux based, some may have both, and some ... well ... may just not care what they host no matter what the platform. In an article entitled <a href="https://info.phishlabs.com/blog/planetary-reef-cybercriminal-hosting-and-phishing-as-a-service-threat-actor">Planetary Reef: Cybercriminal Hosting and Phishing-as-a-Service Threat Actor </a> which comes from Phish Labs, we'll talk about a company that seems to be under multiple names, yet surves up all kinds of things that most web hosts would not tolerate. The group behind Planetary Reef leases IP space from a large reseller. I'm considered a reseller, selling space given to me, but a large reseller may be under a company that they buy their space from each month and they sell it to others. Let's talk about this as there is a history behind the web space market throughout the years. </li>
<li> In a related topic I covered and didn't originally cover under the rundown, we talk about this Krebs on Security article <a href="https://krebsonsecurity.com/2020/10/qanon-8chan-sites-briefly-knocked-offline/">QAnon/8Chan Sites Briefly Knocked Offline </a> and tie this and the first article together. </li>
<li> Has the Department of Justice not learned anything about why we need security today? I guess they really haven't because a Cyberscoop article entitled <a href="https://www.cyberscoop.com/doj-weaken-encryption-national-security-khanna-cybertalks/">DOJ efforts to weaken encryption place national security at risk, congressman says </a> was written by Shannon Vavra and it is quite well written.  Rep. Ro Khanna has one message for politicians who continue to suggest technology companies should give law enforcement agencies access to encrypted data:
This is a power grab.

The U.S. Department of Justice has long called for technology firms to create software that would allow law enforcement agencies to investigate suspects
who use encryption to hide illegal behavior. For Khanna, a California Democrat, the tradeoff is too dangerous  Most in government do not understand this, and its time that someone really hit the hammer home with this nonsense and lets put it to bed once and for all. </li>
</ul>

News, notes, and more

For a complete news notes overview, watch this space on the blog. I may have posted more than what is covered here, and what I do cover is only a few items from the subset of things I thought would be of interest. We're not going to link to everything, but maybe something else caught your attention that I did not cover. Let us see what you think of the news covered in the program, and of course, the comment boards await you.

Things to ponder

I honestly didn't see this coming. <a href="https://technology.jaredrimer.net/2020/10/26/now-for-a-random-breach-a-psychotherapy-center/">Now, … for a random breach … a psychotherapy center </a> is something I bring up in news notes, but yet it is a serious thing. In things to ponder, I'll give my thoughts on this one. Its beyond repair.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895231</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895231/the-technology-blog/2025_02_13_03_41_12_d44f938e-ce9e-4517-8b65-2988bb51bd96.mp3" length="179706709" type="audio/mpeg"/>
      <guid isPermaLink="false">5093ea87-f3c2-4fd0-8b9e-7d9e62576b22</guid>
      <itunes:duration>11231</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 28 Oct 2020 22:58:26 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a98b3cd2b270891c5c54030ca2c5fecd.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 355: 2020 predictions, what do you think today?]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 355: 2020 predictions, what do you think today?]]></itunes:title>
      <description><![CDATA[As you listen to this podcast, what came true and didn't to date in regards to the 2020 report on what might happen in the security landscape? MyTelespace is currently down, blog posts are on the blog about it, and of course contact info as well. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895233</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895233/the-technology-blog/2025_02_13_04_13_55_bb966cac-1f75-4bd3-8572-cd2864a74a4d.mp3" length="64998500" type="audio/mpeg"/>
      <guid isPermaLink="false">a34cab89-09a3-4f7b-aae6-8a7dfa2b3fdd</guid>
      <itunes:duration>4058</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 23 Oct 2020 21:40:16 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_253211d3882f05584451fdb16dd589a8.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 15: all about the privacy]]></title>
      <itunes:title><![CDATA[The Security box, podcast 15: all about the privacy]]></itunes:title>
      <description><![CDATA[This is episode 15, the show notes follow.

Welcome to the Security box, podcast 15. It was mainly an open forum of privacy talk today. 

<ul>
<li> Armando, a broadcaster here on <a href="http://www.986themix.com">the mix, </a> was on talking about his experience with Covid and other privacy concerns he had in regards to that. We also got in to a twitter discussion with names we've seen. No mention of exact names are mentioned here but we do talk about this. <a href="https://www.sendspace.com/pro/dl/goqtce">The Melting Pot, October 9, 2020 </a> and <a href="https://www.sendspace.com/pro/dl/fx06om">Armando's Testimony </a> can be listened to. These files will eventually expire, so get them while you can. Within the Internet Radio program, go in 86 minutes to hear the discussion. </li>
<li> In hour 2, I start and it continues in to hours 3-4 where we talk about privacy, the Internet, finding information, and other aspects of the discussion as Michael in Tennessee and Indiana both join me for hours 3-4 as part of this discussion. </li>
</ul>

This week's show lasts about 4 hours, and I hope you enjoy! 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895235</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895235/the-technology-blog/2025_02_13_03_56_58_178624a2-6f8c-4bfa-9445-1bf1974427d1.mp3" length="227304319" type="audio/mpeg"/>
      <guid isPermaLink="false">2e7c4d0a-6c61-40e6-be1a-e33168b9ec96</guid>
      <itunes:duration>14206</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 22 Oct 2020 00:56:08 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0e13dd336c1da4337845c0e453e153aa.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 354: m-braille, yahoo groups, and discounts for disabled]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 354: m-braille, yahoo groups, and discounts for disabled]]></itunes:title>
      <description><![CDATA[Welcome to podcast 354 of the technology podcast series. The segments on this podcast are mid-length, but quite interesting I think for a change in pace for this particular podcast. Let's tell you what we're going to cover.

<ul>
<li> <a href="https://technology.jaredrimer.net/2020/10/14/time-to-get-your-m-braille-on/">Time to get your M-braille On </a> is the blog post for written communication, but why gripe when this happens to many pieces of software besides M-Braille? It got fixed, and it now works again. All operating systems has its fallbacks when upgrading, and I talk about this. </li>
<li> Shaun Everiss and I talk about Yahoo. Shaun sent me an email which prompted me to create <a href="https://technology.jaredrimer.net/2020/10/14/yahoo-groups-to-close-on-december-15-2020/">this blog post </a> and segment 2 is all his. Segment 4 is mine. </li>
<li> Its always nice to have a discount, but why do we, the disabled, need a discount? Yes I get it, our software is quite expensive, especially if you use Jaws or the discontinued Window-Eyes. Other pieces of software which include Duxbury and even Braille2000 are expensive. There are discounts for specific cases, but why phones? <a href="https://technology.jaredrimer.net/2020/10/15/a-petition-on-lowering-the-cost-of-an-iphone-for-the-disabled-lets-discuss/">This blog post: A petition on lowering the cost of an iphone for the disabled? Let’s discuss </a> talks about <a href="https://www.applevis.com/forum/other-apple-chat/petition-asking-apple-consider-discounts-people-disabilities">This Apple Vis forum post: A petition asking Apple to consider discounts for people with disabilities. </a> which has quite a number of negitive comments. I see what was tried with this post, but there are already discounts for phones through the carriers and even through Apple itself through care. I'm linking to my blog post and Applevis in this show notes so you can choose which one you want to read. </li>
</ul>

I hope you enjoy the program as much as I have putting it together, and I'll see you all on another edition of the program next time. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895236</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895236/the-technology-blog/2025_02_13_04_00_21_dc0689f8-941d-4e5d-91df-00f32649d05c.mp3" length="74818812" type="audio/mpeg"/>
      <guid isPermaLink="false">7b0f77e3-8f16-4099-8616-b853ed956519</guid>
      <itunes:duration>4671</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 19 Oct 2020 17:04:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c8da5f6e0a03b265bc43bc8ef6856fb1.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 14 for October 14, 2020]]></title>
      <itunes:title><![CDATA[The Security box, podcast 14 for October 14, 2020]]></itunes:title>
      <description><![CDATA[A day late, but its better than not posting at all. The podcast is packed, and I hope you all enjoy it!

The Security Box, podcast 14 must continue with the ongoing saga of John Bernard. We've got an article on that. What do you guys think of a passwordless future? Lastpass talks about it. News, notes, comments, and more.

Topics:
<ul>
<li> What do you think of John Bernard? Apparently, the suspect that has been identified as this person walked away with 30 million dollars, and it doesn't stop there. The end of the article claims from one company that they hope that he comes through with his promise. <a href="https://krebsonsecurity.com/2020/10/promising-infusions-of-cash-fake-investor-john-bernard-walked-away-with-30m/">Promising Infusions of Cash, Fake Investor John Bernard Walked Away With $30M </a> is the article. Could this be the end? </li>
<li>  Passwords have long been one of the leading drivers of security risks and employee frustrations for businesses, which has only increased since organizations
transitioned to working remote. Passwordless authentication, on the other hand, securely connects employees to their work without the need to type a password
through technologies such as biometric authentication, single sign-on and federated identity. Is passwordless authentication the solution to the password
problem?   This is only the first paragraph of this facinating article on a passwordless future which will get interesting. The article <a href="https://blog.lastpass.com/2020/10/lastpass-research-finds-92-of-businesses-believe-passwordless-authentication-is-in-their-organizations-future/">LastPass Research Finds 92% of Businesses Believe Passwordless Authentication Is in Their Organization’s Future </a> is going to be discussed. </li> 
<li> What is up with privacy? Conversations that could go awry  because of an innocent conversation. Listen to the segment and form your own opinion. </li>
</ul>

News Notes:

<a href="https://technology.jaredrimer.net/2020/10/09/what-has-been-read-blogged-and-talked-about-the-last-week-news-ending-october-9-2020/">I've done some reading </a> but what about you? Submit things either by voice or text and lets discuss it. 

Other things:

Twit had an event held on October 8, 2020. <a href="https://www.sendspace.com/pro/dl/7hs64k">Here is a sendspace link to that download </a> which I'll have expire in 8 weeks from today.  This is the property of twit, I'm supplying it as a courtesy to you.  <a href="http://twit.tv">Visit the twit network </a> to learn more about them.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895238</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895238/the-technology-blog/2025_02_13_03_42_40_0742332d-36e2-4f88-9d03-ed8d5318412a.mp3" length="145239287" type="audio/mpeg"/>
      <guid isPermaLink="false">9af86d85-057b-4836-bcce-bfbbabd2eeed</guid>
      <itunes:duration>9077</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 15 Oct 2020 22:58:30 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0bd88d2352c2ec376f4a2d5364be5a93.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 13: A discussion on Identity issues]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 13: A discussion on Identity issues]]></itunes:title>
      <description><![CDATA[The show notes are not lengthy this time, that is because we don't have a whole lot for them. Yes, news notes was covered, yet, we have some interesting discussion.

Below, please find the show notes.



Welcome to podcast 13 of the technology blog and podcast series known as the Security Box/. On this episode, we are going to cover NCSAM, week 1. The big thing now a days are your security and identity protection when it comes to your online safety. The first article <a href="https://blog.trendmicro.com/identity-fraud-how-to-protect-your-identity-data-accounts-and-money-during-the-coronavirus-crisis/">Identity Fraud: How to Protect Your Identity Data, Accounts and Money During the Coronavirus Crisis </a> is discussed in a taped segment. Speaking of identity, Preston from Pensylvania is going to be on with an interview that I did with him talking about experience, stories, and the like. We'll also cover some news if time allows. Please make sure that you tune in to the blog web site for all of the news, as NCSAM will be busy and lots of items will be posted. You may want to decide to subscribe so you don't miss anything. Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895240</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895240/the-technology-blog/2025_02_13_04_17_11_21a7e20e-15a1-4f71-892a-814591458899.mp3" length="188630138" type="audio/mpeg"/>
      <guid isPermaLink="false">55589a7f-96eb-4f8f-ac98-997e69e1ef9e</guid>
      <itunes:duration>11789</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 08 Oct 2020 00:33:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8c2f6e7992e8c3e2c818ad4752fea2cb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 353: NCSAM and Identity, Google and More]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 353: NCSAM and Identity, Google and More]]></itunes:title>
      <description><![CDATA[While the podcast is an hour, I know that I want to do more with the tech podcast in all kinds of tech not just the security landscape. In this podcast, I think I have covered a bit, even talking about some stuff in a different light unlike the Security Box. Here are the show notes.

Welcome to podcast 353 of the technology podcast. 

<ul>
<li> NCSAM is out now, its the month of October and its definitely going to be an interesting month. Our first segment talks about the fact that identity theft may be more of a problem now more than ever. <a href="https://technology.jaredrimer.net/2020/10/02/ncsam-is-back-for-another-year-let-us-see-what-we-can-get-in-to-starting-with-identity-theft/">blog post </a> </li>
<li> KNFB reader was intigrated in to newsline. People were griping about it on Apple Vis, and may have been in social media as well. I looked at the app one day, and I find it quite interesting but still easy to use. They griped because they had to reverify their info, otherwise known as reauthenticate. KNFB Reader lite works well, and I am glad I have choices. <a href="https://technology.jaredrimer.net/2020/09/28/nfb-newsline-3-0-with-knfb-basic-included/">blog post </a> </li>
<li> Michael in Tennessee taught me about Google and pairing to bluetooth devices. While I told my phone to forget the device, I had to go back in to google and get it repaired as I tried to demo how I got it to work. Be that as it may, this was kind of cool. Thanks Michael for this! </li>
<li> On a prior podcast, we covered SSL and what is happening with threat actors today. I intend to write a blog post with my thoughts, but the Security Box definitely covered this. <a href="https://technology.jaredrimer.net/2020/09/30/the-security-box-podcast-12-for-september-30-2020/">Podcast 12 of the box </a> covers this in a talk show format, but I figure it should be covered here for those who don't want the longer program. Tell me what you think. </li>
</ul>

The full program lasts an hour, so I hope you'll enjoy it. Thanks for listening! See you on another edition of the program.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895241</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895241/the-technology-blog/2025_02_13_04_17_28_f2c7aee5-c105-4319-ba64-4126102f9234.mp3" length="58836513" type="audio/mpeg"/>
      <guid isPermaLink="false">02cf17a2-eca7-4d6e-ac35-2a82b1f49ad8</guid>
      <itunes:duration>3673</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 05 Oct 2020 18:26:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c164edbef6255208c6f563d3d6f9af88.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 12 for September 30, 2020]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 12 for September 30, 2020]]></itunes:title>
      <description><![CDATA[Welcome to podcast 12 of the tech podcast series known as the Security Box.

Topics:
<ul>
<li> On <a href="https://technology.jaredrimer.net/2020/09/16/the-security-box-podcast-10-for-september-16-2020/">podcast 10 </a> of the box, we link to an article about due dilligence. It was segment 2 of that podcast. Just recently,, its time to update this, as now Krebs has an article asking the question: <a href="https://krebsonsecurity.com/2020/09/who-is-tech-investor-john-bernard/">Who is Tech Investor John Bernard? </a> Seems to me that this guy, whoever he is, is not a good guy, and I think I visited the page in the first story just to see what it was about. In no way was I going to utalize the services, but I was mainly curious what the main page had to say. It is funny to see that the site has a general closed message on it, and people still come forward afterword to people like Brian and tell him what has happened to them. This is quite funny, and I think I'll have this as my first topic. Did you read the article linked to in podcast 10, and if so, what did you think? What do you think now? </li>
<li> Apparently, another tech company is hitting the news in regards to a ransomware attack. The company in question put out the same type of info that most companies put out in regards to the breach or lack there of when it comes to personal information that may have been taken. The problem is that the investigation is still ongoing, and even though the article was updated after initial printing, we can't say who is telling the truth. <a href="https://krebsonsecurity.com/2020/09/govt-services-firm-tyler-technologies-hit-in-apparent-ransomware-attack/">Govt. Services Firm Tyler Technologies Hit in Apparent Ransomware Attack </a> is the article, and I think this aught to be quite interesting. Only time will tell. </li>
<li> APWG is the Anti Phishing working group. This group does work to try and advise security experts and us on how to be as safe as possible. Now they're saying that SSL should not be used in determining if a website is secure. We've known through Phishlabs articles on the blog that the rate of SSL certificates by actors was on the rise, but now we shouldn't rely on it. <a href="https://info.phishlabs.com/blog/apwg-ssl-certificates-no-longer-indication-of-safe-browsing">APWG: SSL Certificates No Longer Indication of Safe Browsing </a> comes from the Phishlabs folks, and I think its worth the read. We also put it in the news notes rundown, and I am sure it'll garner conversation. </li>
</ul>

News Notes:
<ul>
<li> News Notes has quite a few items even though I have had technical problems as of late. The weather isn't helping with health concerns as well, so it may not be large, but it is good none the less. If you're interested in the news I've gathered, <a href="https://technology.jaredrimer.net/2020/09/29/what-has-been-going-on-in-the-security-landscape-since-weve-spoken-last-news-ending-tuesday-september-29-2020/">head on over to this blog post </a> and check out what might interest you. There may be some overlap, but at the same time, you might find something you want discussed that I didn't read. </li>
</ul>

Podcast segments
<ul>
<li> Michael in Tennessee is on with us for about 37 minutes talking about one particular article that caught his attention. He and I discuss this particular article, and we even bring up other odds and ends tying this up with other revelant but could be off topic stuff as well. The article we reference comes from Cyber Scoop, and its a good one. <a href="https://www.cyberscoop.com/fbi-cyber-strategy-hackers-tonya-ugoretz/">FBI hopes a more aggressive cyber strategy will disrupt foreign hackers </a> which was posted to that site on the 21st of September. This article was written by Sean Lyngaas. </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895243</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895243/the-technology-blog/2025_02_13_04_19_48_ea762a11-7a66-48c8-988b-b1c26b17c20d.mp3" length="185005596" type="audio/mpeg"/>
      <guid isPermaLink="false">d99db122-a343-4a60-903b-6b60eed9783b</guid>
      <itunes:duration>11562</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 01 Oct 2020 02:30:45 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dc96125be0d5039ee1f9db053440f27b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 352 for sep 24, 2020]]></title>
      <itunes:title><![CDATA[Tech podcast 352 for sep 24, 2020]]></itunes:title>
      <description><![CDATA[Voice mail systems, are they gone? Covid-19 and the email landsscape, a webinar and IOS 14 and other OS's and whether apps are updated timely if they are broken. Enjoy this 65 minute podcast!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895244</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895244/the-technology-blog/2025_02_13_03_54_40_1a46b052-52e0-4425-ade9-27578460eb3b.mp3" length="62712279" type="audio/mpeg"/>
      <guid isPermaLink="false">0ddb4c16-bf57-43cf-ba18-11979a27d7ff</guid>
      <itunes:duration>3915</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 24 Sep 2020 16:41:41 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_97e82cd9876412fdf96629ff13ba3257.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 11: a shortened edtion]]></title>
      <itunes:title><![CDATA[The Security box, podcast 11: a shortened edtion]]></itunes:title>
      <description><![CDATA[A shortened edition of the show today, and that is OK. Several topics too.

Welcome to podcast 11 of the Security Box.

Topic:
<ul> 
<li> Ransomware is everywhere. Last week, Michael in Tennessee sent this article during the show, and I finally got a chance to read it. This time, Newhall schools are effected, and while the advice given in the article is sound, we can officially say that nothing is predictable in this strange year. ABC7 in Los Angeles gives us: <a href="https://abc7.com/ransomware-attack-newhall-school-district-cyber/6424803/">Ransomware attack shuts down remote classes in Newhall </a> which has some good points. The article talks about what is being done which includes getting ferenzic folks in there, law enforcement, and other people who may be needed to restore data. The article didn't talk about training. Question, where is the training so people in the district know what to look for when something like this happens again? Ransomware starts with an email in most cases. </li>
<li> TikTok is back in the news, and this can't be good news anyhow.  The article <a href="https://www.cyberscoop.com/tiktok-wechat-ban-security-issues/">Lame-duck versions of TikTok and WeChat are definitely a problem, security experts say </a> is what we're going to talk about, and we'll play <a href="https://youtu.be/6DrFveS5MXU">this CNET video: TikTok, WeChat ban explained. </a> I didn't know WEChat was a problem, but then again, I've not used that app at all.  From what I've heard, its similar to apps for communication like Whats app, and other messaging apps. To top this all off, Michael in Tennessee recently sent me an article in regards to the TikTok Sale to Oracle. <a href="https://techcrunch.com/2020/09/19/tiktok-deal-terms/">The TikTok deal solves quite literally nothing </a> is the article, and it is quite interesting. This whole story aught to get interesting now, but suffice it to say, TikTok is saved, for now. </li>
<li> Open forum: what do you want to talk about? This is your time to shine. </li>
</ul>

News Notes and things
<ul>
<li> The biggest topic right now is TikTok and their very interesting developing story as it continues to unfold.  Besides that, we've got some recent arrest news and other items in <a href="https://technology.jaredrimer.net/2020/09/19/this-week-in-the-security-landscape-for-september-19-2020/">this blog post </a> which has been cut short because of the fact I haden't felt well. The news also covers a Chinese firm who is supposed to do antivirus work being part of apt41. This is going to be interesting. </li>
<li> For the first time to our knowledge, ransomware may have lead to a death for a critically ill patient. The attack was an apparent accident, as the actors gave the hospital the key after it was determined they made a mistake on their target. Hospitals have never really fixed their security problems, mainly because of the lack of funding. This could hurt them now that they know that someone died. <a href="https://www.engadget.com/ransomware-death-at-german-hospital-210309749.html?utm_source=dlvr.it&utm_medium=twitter">Ransomware may have led to the death of a German hospital patientRansomware may have led to the death of a German hospital patient </a> is the article  that talks more about this very interesting story. </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895246</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895246/the-technology-blog/2025_02_13_04_01_25_fbd46619-da85-4688-9d77-51686d40d69f.mp3" length="142806765" type="audio/mpeg"/>
      <guid isPermaLink="false">aa22711b-b795-481b-bf88-d2d7c0f05e97</guid>
      <itunes:duration>8925</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 23 Sep 2020 21:55:05 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d5a166ff85847ea9491bc34196d33202.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 10, sep 16, 2020]]></title>
      <itunes:title><![CDATA[The Security box, podcast 10, sep 16, 2020]]></itunes:title>
      <description><![CDATA[While we didnt have a shot at news notes, we do cover some news and other stuff too. Found something of value? Get in touch!

Welcome to podcast 10 of the security box. On this edition of the program, we're going to leave room for Michael in Indiana to talk to us about phone stuff. We'll also have some other stuff as well.

Topics

<ul>
<li> Phishing has all kinds of forms, and the <a href="https://technology.jaredrimer.net/2020/08/12/the-security-box-podcast-5-phishing-and-its-various-forms/">Security Box, podcast 5 </a> only covered a little bit. <a href="https://technology.jaredrimer.net/2020/05/21/podcast-345-cat-fishing-cat-phishing-and-parcel-tracker/">Podcast 345 of the tech podcast series </a> also covered Phishing. Also, we've covered Phishing in articles that I've read as well. <a href="https://technology.jaredrimer.net/?s=phishing">This search page from the blog </a> will bring up everything on phishing that might be of interest to you. Recently, I've learned about tricky types of phishing using services out there that can produce documents and forms for free or low cost.  <a href="https://www.trendmicro.com/en_us/research/20/i/tricky-forms-of-phishing.html">Tricky Forms of Phishing | Tricky 'Forms' of Phishing </a> is the topic on this first segment of the program today. Did you know there are 13 different sites that can produce documents and forms that could trick users in to divulging information they shouldn't? The only one out of the 13 I've used is Google documents, but I'll talk about the 13 different ones in turn. Time to learn. </li>
<li> Recently, I've read an article talking about doing your due diligence . Do you do yours?  Looks like a scammer knows how to play it well, and the name seems to be well known. The article <a href="https://krebsonsecurity.com/2020/09/due-diligence-that-money-cant-buy/">Due Diligence That Money Can’t Buy </a> talkes about someone by the name of John Bernard. What a facinating story! </li>
<li> Michael in Tennessee came on about a ransomware attack effecting Neuhal. We'll have more next week on this. </li>
<li> Michael in Indiana will be on talking about phone systems, security, and what he has seen in the landscape as an administrator. </li>
</ul>

News

Due to the time of the interview, news did not get aired this week. I'll keep this for a show next week, and we'll reference this next week.  If you find anything from the below section you want covered, you're welcome to have your thoughts heard. Here's the news from this week we didn't cover that might be of interest to you. 
<ul>
<li> <a href="https://technology.jaredrimer.net/2020/09/12/this-week-in-the-security-landscape-news-ending-september-12-2020/">News Notes September 12, 2020 </a> is the main source for news this time. </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895248</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895248/the-technology-blog/2025_02_13_03_43_32_e38983a9-f720-4781-83c2-05f660ae5320.mp3" length="209683996" type="audio/mpeg"/>
      <guid isPermaLink="false">bfe92ca7-cdd5-4cad-bc61-e4ae1eec2b0a</guid>
      <itunes:duration>13105</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 16 Sep 2020 23:00:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4af935ee193eeeb3223d4e14a2689728.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 9: the security box, typosquatting and more]]></title>
      <itunes:title><![CDATA[Episode 9: the security box, typosquatting and more]]></itunes:title>
      <description><![CDATA[Please check the <a href="http://technology.jaredrimer.net">tech blog </a> for full show notes. They are longer than space permits in these notations. I hope you all enjoy the program as much as I have bringing it to you. We'll be back to Wednesday next week.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895250</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895250/the-technology-blog/2025_02_13_04_13_12_f08dce7e-1270-40d7-9454-27eaf27cd0cd.mp3" length="178034872" type="audio/mpeg"/>
      <guid isPermaLink="false">fd97afa0-73dd-4620-bb2b-6c2c83fe215d</guid>
      <itunes:duration>11127</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 09 Sep 2020 01:44:43 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4b396b56412911ba450815772ba7575b.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 351: Telephone stuff, Jaws, and more]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 351: Telephone stuff, Jaws, and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 351 of the podcast. Some people can't stand the changes in regards to one telephone system and what they did. Shaun Everiss and I team up and I created a <a href="http://blindvms.jaredrimer.net">page </a> for it. Jaws had an update and I covered all but two. Here is the <a href="https://technology.jaredrimer.net/2020/08/30/jaws-august-edition-now-out/">blog post </a> on that as well. Finally, Typosquatting is discussed in preparation for the next Security Box. All this, and final thoughts and contact info on this edition of the podcast. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895251</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895251/the-technology-blog/2025_02_13_04_01_03_1097ff6b-0135-452f-8f2c-692de4de12d6.mp3" length="61883855" type="audio/mpeg"/>
      <guid isPermaLink="false">8f3e28e7-4690-495c-ad37-00b306252285</guid>
      <itunes:duration>3863</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 05 Sep 2020 00:16:09 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_db5f9c79afa90102007c092472b9d7b4.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, podcast 8: lots of items today]]></title>
      <itunes:title><![CDATA[The Security box, podcast 8: lots of items today]]></itunes:title>
      <description><![CDATA[The show notes are rather lengthy, so please check <a href="http://technology.jaredrimer.net">the blog </a> for full notations. Commentary, topics, and even a segment on lots of other stuff too. Hope you all enjoy!

See you on another podcast!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895253</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895253/the-technology-blog/2025_02_13_03_44_00_0ea1ecb6-ad0d-469b-ac77-1d22e41e0f2b.mp3" length="162824502" type="audio/mpeg"/>
      <guid isPermaLink="false">981c9f1c-b6fd-49f9-aae8-a0a4f2e47c14</guid>
      <itunes:duration>10176</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 03 Sep 2020 17:33:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_206c730fe533d3382f88f0e9c88a0dea.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security box, episode 7]]></title>
      <itunes:title><![CDATA[The Security box, episode 7]]></itunes:title>
      <description><![CDATA[Welcome to podcast 7 of the Security Box. This week, let's peruse some topics, I'll link to some articles, and you can comment as usual. News, Notes, and much more. Thanks for listening!

<ul>
<li> Election officials have been warned about Typosquatting domains and how they can be used to bring trouble to their particular candidate. Typosquatting is a big problem, and in a future podcast, we'll look in to what this is. In an article entitled <a href="https://www.cyberscoop.com/dhs-bulletin-typosquatting-2020-election-officials/">Feds warn election officials of potentially malicious ‘typosquatting’ websites </a> you'll learn what is the danger in the election scheme of things. </li>
<li> I think its time to really bring out a topic. How many people heard of the dark web? 11.6 billion records have been breached and are on the dark web since 2005 according to this article by Lastpass. Is this something we should be concerned with as a whole, or do you think it isn't a big deal? This can only get worse, and the box wants to hear what you think of this. Each year, more companies are breached than ever before and it is definitely a problem I think. There is a way you can scan the dark web for any type of data like an Email address, but is this enough? Lastpass has the capability of doing this for you. <a href="https://blog.lastpass.com/2020/08/what-are-dark-web-scans/">The article What are dark web scans? </a> goes in to more details on how this is done. </li>

News:
<ul>
<li> Looks like Experian can't keep their mouth shut. According to a Cyberscoop article, 24 million South Africans are now at risk because someone potentially opened their mouth. They said the employee was tricked in to disclosing information on a unknown number of people, but the number seems to be a whopping 24 million. <a href="https://www.cyberscoop.com/experian-south-africa-breach-sabric/">No hacking needed: Someone duped Experian into handing over data in breach affecting 24 million South Africans </a> is the article and boy if Equifax and Experian haven't learned anything from their prior U.S. things, when will they ever learn? The U.S. stuff were hacking attempts but still ... human intervention is the weakest link in this whole ordeal. </li>
<li> <a href="https://blog.trendmicro.com/this-week-in-security-news-trend-micros-zero-day-initiative-celebrates-15-years-and-24-million-customers-affected-after-experian-data-breach/">This week in Security News </a> from August 21st covers another article on the 24 million from South Africa and even some other stuff that might be of interest. The tech blog will also highlight things from this article that might be of interest. </li>
<li> Michael in Tennessee went ahead and gave me a heads up on this one. Turns out that a former CSO was charged in the Uber breach from 2016.  U.S. prosecutors have charged the former Chief Security Officer at Uber with allegedly covering up a data breach at the ride-hailing company that exposed
information tied to roughly 57 million people.

Joe Sullivan was charged Thursday in the U.S. District Court in San Francisco with failing to disclose details of <a href="https://www.nytimes.com/2017/11/21/technology/uber-hack.html">the security incident. </a> to the proper authorities. Sullivan, who now works as the chief information security officer at Cloudflare, allegedly committed two felonies by not informing
investigators about the hack while they probed the circumstances surrounding a prior data breach.  This is great news, and one in which I want to cover in passing. <a href="https://www.cyberscoop.com/joe-sullivan-uber-arrested-2016-data-breach/">Former Uber CSO criminally charged with covering up 2016 data breach </a> has the full details from Cyberscoop. </li>
</ul>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895255</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895255/the-technology-blog/2025_02_13_03_57_07_3ac80c51-27d8-4cc1-a005-d02b9f246c28.mp3" length="140658454" type="audio/mpeg"/>
      <guid isPermaLink="false">9aeb76ab-ccd4-4d44-a9b6-a5cc075a3361</guid>
      <itunes:duration>8791</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 28 Aug 2020 01:38:53 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7d1b0b52ed982724f21d80bbc11449da.jpg"/>
    </item>
    <item>
      <title><![CDATA[The security box, episode 6: is here a mad company? Open forum to boot]]></title>
      <itunes:title><![CDATA[The security box, episode 6: is here a mad company? Open forum to boot]]></itunes:title>
      <description><![CDATA[Welcome to podcast 6 of the Security Box. On this show, we've got a topic, a very interesting news notes where two articles take center stage, and we'll open the lines for comments, questions, and other things. 

Topics:

<ul>
<li> Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren't so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store's rules. <a href="https://applemill.proseful.com/on-ep">On Epic's Fortnite Gambit </a> is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let's discuss this one! </li>
</ul>

News 

<ul>
<li> The news is quite interesting. This week, if Microsoft continues at its current pace, we'r going to have 1300 plus patches for Windows this year. This month, we learn that there are 120 patches, the 6th month in a row where the patches are 100 and over. <a href="https://technology.jaredrimer.net/2020/08/18/last-week-in-security-news-news-ending-august-15-2020/">This Tech post from last week in security </a> covers this and some other stuff too. </li>
<li> The two articles that we talk about in the news notes is a two part article with lots of numbers and things to think about. <a href="https://blog.trendmicro.com/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world/">Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World </a> is the first and <a href="https://blog.trendmicro.com/top-tips-for-home-cybersecurity-and-privacy-in-a-coronavirus-impacted-world-part-2/">Top Tips For Home Cybersecurity And Privacy In A Coronavirus-Impacted World (part 2) </a> is the second. The articles are also linked to the blog post for last week in security, but I am bringing them forward here because I really think people need to read them. </li>
</ul>

Open forum:

<ul>
<li> Michael in Tennessee came on to talk about his apartment complex and their lack of security with the WIFI setup. While they wanted to make it convenient, it could be a parking lot attack at the entire network. </li>
<li> Michael talked about updating software and how inportant it is. </li>
<li> Michael also talked about smart TV's as well. </li>
</ul>


]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895257</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895257/the-technology-blog/2025_02_13_04_06_53_1042f8cb-d08c-4cee-8028-2a87dbfe5ab8.mp3" length="170219036" type="audio/mpeg"/>
      <guid isPermaLink="false">2d38061d-0d03-4095-9030-7202600d5b4d</guid>
      <itunes:duration>10638</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 19 Aug 2020 21:44:11 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dcf3089bf486a1d79ad27c71eaf2171b.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 350: covid stuff, transit app, and epic games not being happy!]]></title>
      <itunes:title><![CDATA[tech podcast 350: covid stuff, transit app, and epic games not being happy!]]></itunes:title>
      <description><![CDATA[Welcome to the technology blog and podcast, podcast 350.

<ul>
<li> I can't believe that we've made it to 350 episodes. In 2017, I didn't publish much because of the constant breaches, but in 2018 we've come to find out that we must continue this work. I reflect on this in the first official segment. </li>
<li> Several segments are videos with Covid 19 stuff as well as a short video segment from Twit dealing with Tik Tok. Nothing is set in Stone. </li>
<li> Katie Monroe from Transit App joined in the AAC meeting from August 13th's meeting. Lots of accessibility work was made and not just for people who are blind. </li>
<li> Herbie sent me a direct message on twitter in regards to Epic games. Seems as though these guys aren't so happy in regards to the decision made about the percentage of money each company whether Apple or Google take, so they want to side load their apps on to your device. According to the article, this is in violation of each app store's rules. <a href="https://applemill.proseful.com/on-ep">On Epic's Fortnite Gambit </a> is the article and it comes from the Apple Mill. The article talks about sideloading apps. Thoughts? Let's discuss this one! If not side loading, what about the terms of service aspect? </li>
</ul>

The program lasts 1 hour, 10 minutes and I hope you enjoy!

]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895259</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895259/the-technology-blog/2025_02_13_04_22_51_9c4ca30c-efd1-4468-838e-a1638e3dc35d.mp3" length="67638741" type="audio/mpeg"/>
      <guid isPermaLink="false">aa2e9091-39f0-48a9-9f97-68b03658f385</guid>
      <itunes:duration>4223</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 15 Aug 2020 00:13:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1b1c3ddd81b1dcf6b5befd0becb7dfeb.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 5: Phishing and its different forms]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 5: Phishing and its different forms]]></itunes:title>
      <description><![CDATA[Today was quite interesting. The numbers in phishing are staggering according to the APWG. Links to the main article we use and a podcast re given. There's plenty more to cover in this space.

Podcast 5 covered Phishing and its various forms. The main option we used was Wikipedia, but we also link to F-secure and a podcast talking about what this is. There is one aspect we did not cover which I think we should. Our things to ponder segment was a little adult in nature but appropriate in today's environment of social media and the things that are allowed and not. 
<ul>
<li> <a href="https://blog.f-secure.com/podcast-phishing/?_ga=2.68487378.218600427.1596114570-436787167.1528514098">Episode 25 | The Psychology of Phishing </a> F-Secure </li>
<li> <a href="https://soundcloud.com/f-secure/025-the-psychology-of-phishing?in=f-secure/sets/cyber-security-sauna">025| The Psychology of Phishing </a> f-secure sound cloud </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/19/what-is-the-cfaa-and-why-has-it-been-a-problem/">What is the CFAA and why has it been a problem? </a> The technology blog </li>
</ul>

The show lasts 3 hours, 32 moinutes, and I hope you enjoy! No major news notes segments.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895261</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895261/the-technology-blog/2025_02_13_04_13_38_398b97bf-867e-4507-a11a-bf2243fc450b.mp3" length="203575940" type="audio/mpeg"/>
      <guid isPermaLink="false">7fe79273-9260-46f3-ad9f-3f1258920821</guid>
      <itunes:duration>12723</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 13 Aug 2020 00:33:33 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1bd1354d5efddc0749a39e269cc0bd14.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 4: News, notes, breaches, the CFAA, and more!]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 4: News, notes, breaches, the CFAA, and more!]]></itunes:title>
      <description><![CDATA[Welcome to podcast 4 of the Security Box. On this show, we've got one main topic, a very interesting talk by Shaun Everess about a big time breach which effects GPS, news, notes, and more!

 Our main topic: 
Our main topic is the Computer Fraud and Abuse act. What is it? How did it come about? Do you think its working?

<ul>
<li> <a href="https://technology.jaredrimer.net/2020/07/19/what-is-the-cfaa-and-why-has-it-been-a-problem/">What is the CFAA and why has it been a problem? </a> The Technology blog and podcast </li>
</ul>

 Shaun's topic 

Shaun Everess talks about some blog stuff, but he also talks about a big time GPS hack that could possibly be effecting all of us in some aspect. The topic is also being cross posted to the technology podcast as a whole, but I'm putting it here for comment by this podcast.

<ul>
<li> This blog post from the Technology blog and podcast <a href="https://technology.jaredrimer.net/2020/07/29/this-has-to-be-the-biggest-breach-to-date/">This has to be the biggest breach to date </a> gives my thoughts, along with Shaun's email. It also links to the story both linked in his email, and actually linked at the bottom. </li>

 Other newsy things 
<ul>
<li>Are you concerned about your news? Find something on a news site you may have heard on the tech blog or another source? <a href="https://technology.jaredrimer.net/2020/07/28/russia-targeting-corona-vaccine-were-no-closer-news-sites-are-late/">https://technology.jaredrimer.net/2020/07/28/russia-targeting-corona-vaccine-were-no-closer-news-sites-are-late/ </a> is the blog post from the tech blog, yet I read about it on one source, and found it on my news source while looking for something else. </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/29/covid-closures-means-more-to-business-id-theft-than-you-think/">COVID closures means more to business ID theft than you think </a> from the blog talks about business compromises that will go beyond your technology. Lines of credit can help you get things for your business including technology things. Ever thought you'd be a problem? </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/28/lastpass-has-an-update-in-regards-to-their-phishing-post-earlier/">Lastpass has an update in regards to their Phishing post earlier </a> is quite interesting as we continue to talk about Phishing. This isn't going to be the only article I blog on the topic, please view the blog article section for more. </li>
</ul>

 Twitter News 

<ul>
<li> <a href="https://technology.jaredrimer.net/2020/07/31/florida-teenager-arrested-in-massive-twitter-hack-two-adults-also-charged/">Florida Teenager arrested in massive twitter hack, two adults also charged </a> The Technology blog and Podcast leading to three articles, two from news specific and one tech related </li>


This isn't possibly the entire news, but some items that may be of interest. Please check the blog for more, contact me to tell me what you want discussed, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895263</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895263/the-technology-blog/2025_02_13_04_05_33_1596f7da-e5e1-4a04-957d-0530a2843e49.mp3" length="188065893" type="audio/mpeg"/>
      <guid isPermaLink="false">ecc7a226-fa96-4af1-9592-195e95c38455</guid>
      <itunes:duration>11754</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 05 Aug 2020 22:59:38 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6983259f306d96e306a8ae95f18aec7d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 349: Jaws, Twitter, Braille2000 and more]]></title>
      <itunes:title><![CDATA[Tech podcast 349: Jaws, Twitter, Braille2000 and more]]></itunes:title>
      <description><![CDATA[Welcome to the technology podcast, podcast 349. This program is almost an hour and a half, and is packed with tons of stuff. Contact information is given throughout the program, so please get in touch!

<ul>
<li> Have you ever seen notations talking about fixes for screen reader users? Firefox fixed a very nasty crash with Jaws, but besides that, other screen reader updates were made to Firefox 79 which has recently been released. You don't normally see fixes for access tech so this is quite a surprise and a welcome change. Thanks Firefox! <a href="https://technology.jaredrimer.net/2020/07/30/firefox-upgrades-fixes-in-the-works-and-a-great-fix-for-jaws-users/">blog post </a> </li>
<li> Shaun Everess, my second admin, is along with a segment talking about one of the biggest breaches I believe we've seen. This one, deals with a well known brand most people will be familiar with. Besides that, Shaun talks about the Spam problem I've been trying to fight for years. ><a href="https://technology.jaredrimer.net/2020/07/29/this-has-to-be-the-biggest-breach-to-date/">blog post on the breach </a> and find updates through the blog in regards to what he did for the Spam problem. </li>
<li> I have a twitter update. <a href="https://technology.jaredrimer.net/2020/07/31/florida-teenager-arrested-in-massive-twitter-hack-two-adults-also-charged/">first blog post </a> and <a href="https://technology.jaredrimer.net/2020/07/31/cyberscoop-has-some-more-news-on-twitter-krebs-adds-to-it-too/">second blog post </a> </li>
<li> B2K is finally talked about on another podcast besides this one. In a long awaited podcast, Blind Bargains Interviews Jared Rimer who talks about the program, braille transcription, and more. Segment starts 15 minutes in. <a href="https://technology.jaredrimer.net/2020/08/03/podcast-released-blind-bargains-interviews-jared-rimer-for-b2k-updates/">blog post </a> </li>
<li> I give a talk on two different articles I've recently read on Krebs on Security dealing with credit and debit card fraud and EMV payment processes. This <a href="https://technology.jaredrimer.net/2020/08/04/what-do-you-think-about-when-you-charge-your-credit-or-debit-card/">recent blog post </a> should've been posted after I recorded the segment, but does link to the two articles. </li>
<li> Michael in Indiana talks about two different items. The first, is a very interesting Comcast story which turned out great. The second, an unconfirmed report about Microsoft buying Tiktok. We talk about TikTok as South Korea was fining this Chinese App maker due to Coppa violations and big time ones too. I also have comments following a video I found through the BBC. <a href="https://technology.jaredrimer.net/2020/07/19/the-childrens-online-privacy-protection-act-is-here-not-following-the-law-by-tik-tok/">blog post </a> </li>
</ul>

Contact information, and information on what is going on in the security box ends the podcast. The total length of the file is 1 hour, 26 minutes. I hope the wide variety of topics is of interest to you. I'll be back with more on the tech podcast very soon. Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895266</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895266/the-technology-blog/2025_02_13_04_04_41_b4dc7b5a-50c8-438e-93c3-f13ff801274c.mp3" length="82705735" type="audio/mpeg"/>
      <guid isPermaLink="false">c4a4316f-fe12-40ef-9c4c-e13a5e1447f8</guid>
      <itunes:duration>5163</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 04 Aug 2020 18:48:40 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_0bcc907a50ac1f32e0863462fe2ba47f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 3: COPPA and its effects]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 3: COPPA and its effects]]></itunes:title>
      <description><![CDATA[Welcome to the Security Box, podcast 3. We really only have one main topic here. We also include news, notes, and other things in passing.

<ul>
<li> <a href="https://en.wikipedia.org/wiki/Children%27s_Online_Privacy_Protection_Act">Children's Online Privacy Protection Act </a> Wikipedia </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/19/the-childrens-online-privacy-protection-act-is-here-not-following-the-law-by-tik-tok/">The Childrens online privacy Protection act is here, not following the law by Tik Tok </a> The Technology blog and podcast </li>
</ul>

We'll have two segments on things to ponder where personal information is concerned, and we'll also have your comments, questions, and concerns. I hope you'll enjoy the show as much as i have putting it together!

Thanks to everyone that decided to participate during the live program. Remember that if you listen through the podcast, your voice still counts, so get those emails, imessages, texts, or whats app messages to me. Contact info is given throughout the program, and thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895268</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895268/the-technology-blog/2025_02_13_04_13_31_23b4d7b9-07ef-4922-9168-920256b8d813.mp3" length="177997256" type="audio/mpeg"/>
      <guid isPermaLink="false">e3e115b8-912c-470a-b850-97a66380ff66</guid>
      <itunes:duration>11124</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 29 Jul 2020 22:35:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_a0ae9456b68772566f80cbc1ac55c64e.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, podcast 2 for July 22, 2020]]></title>
      <itunes:title><![CDATA[The Security Box, podcast 2 for July 22, 2020]]></itunes:title>
      <description><![CDATA[Welcome to the security box, podcast 2. On this podcast, Twitter takes center stage as it suffered a very interesting security problem they need to solve. People have said it was a big time breach, but as you'll soon find out, unless you read the tech blog, there is more to the breach. Yes, accounts got breached, but we know there is other info. Articles are listed here for you to review. Besides that, find out about a big time breach article which was a two year look at many different breaches within a two year period. Also, find out about a piece of malware making a huge return on how it can't! be trackable now a days and what the threat actors are up to. 

Depending on time, not everything may be covered. If you see the rundown and you want things covered we didn't get to, please let us know!

The links to news items are in no particular order, we provide them in the order I put them in. Of course, please contact me through the <a href="http://www.986themix.com/djcontact">contact the dj's page on the mix </a> or through the tech blog itself. 

Thanks so much for listening to the program, and we'll be back with you next time!

<ul>
<li> <a href="https://www.cyberscoop.com/twitter-hack-cryptocurrency-joe-biden-elon-musk/">Scammers hijack Twitter accounts of Joe Biden, Bill Gates and others to promote cryptocurrency </a> Cyberscoop </li>
<li> <a href="https://thehackernews.com/2020/07/joker-android-mobile-virus.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29">Joker Malware Apps Once Again Bypass Google's Security to Spread via Play Store </a> The Hacker News </li>
<li> <a href="https://blog.trendmicro.com/twitter-hacked-in-bitcoin-scam/">Twitter Hacked in Bitcoin Scam </a> Trend Micro </li>
<li> <a href="https://www.cyberscoop.com/twitter-hack-biden-kanye-bitcoin/">Around 130 Twitter accounts targeted in bitcoin scam hack, company says </a> Cyberscoop </li>
<li> <a href="https://info.phishlabs.com/blog/account-takeover-attacks-cause-chaos-twitter">Account Takeover Attacks Cause Chaos @ Twitter </a> Phish Labs </li>
<li> <a href="https://blog.twitter.com/en_us/topics/company/2020/an-update-on-our-security-incident.html">An update on our security incident </a> twitter blog July 18 2020 </li>
</ul>

In a future podcast, let us talk about the CFAA and whether you think its been effective. Even still, lets possibly talk about Coppa.  Have any topics you want discussed security wise? Have terms you don't understand? The box wants to hear from you!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895269</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895269/the-technology-blog/2025_02_13_04_25_55_b2e10e0a-0bc5-464f-8423-e8a2694d8cd6.mp3" length="170587449" type="audio/mpeg"/>
      <guid isPermaLink="false">126651db-a27a-4873-aaca-f08571a3e572</guid>
      <itunes:duration>10650</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 23 Jul 2020 00:30:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_9ab86d3d97c441fdff448bd388e148fe.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast, podcast 348: VAC, Mac, and chinese software]]></title>
      <itunes:title><![CDATA[The Technology podcast, podcast 348: VAC, Mac, and chinese software]]></itunes:title>
      <description><![CDATA[Welcome to podcast 348 of the technology blog and podcast series. I've decided to change it up a little bit with a different spin on the security aspect, as well as talking about a piece of software that I've once used before, but yet, need it again. The setup was quite easy, and I pretty much did it on my own. Then, what do you get when you have to think about the security of your software you use to do your work? What about the type of computer you use such as Windows, Mac or Lynux? Full thoughts and links to items follow. 

<ul>
<li> Virtual Audio Cable is a piece of software that acts like a mixer. We've talked about it once before, and I believe we've demoed it. Its back as I talk about the Security Box and how I'm putting people on air. </li>
<li> What do you think about when you think of the Mac? Its not known for viruses, trojans, and worms. However, with this latest development, I begin to wonder if the Mac will start receiving more problems like Windows has for many years. In this article entitled <a href="https://blog.trendmicro.com/trendlabs-security-intelligence/updates-on-thiefquest-the-quickly-evolving-macos-malware/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29">Updates on ThiefQuest, the Quickly-Evolving macOS Malware </a> from Trend Micro, really makes you think. Its got lots of images for those who are sighted,, so you might want to check it out as I talk about it and other operating systems in general. </li>
<li> Finally, what do you think about if you were told to install something that you had no idea had a back door?  In this article <a href="https://www.cyberscoop.com/chinese-bank-software-tax-programs-backdoors-trustwave/">Chinese banks require clients to use tax programs laced with backdoors, report says </a> posted on Cyberscoop, I talk about it and how I'd handle that. I never saw the day that software would be laced with malware and a bit of social engineering would have you install it just to get your work done. </li>
</ul>

The program is 1 hour and 8 minutes long, and I hope you'll enjoy the program as much as I have putting it together for you. Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895270</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895270/the-technology-blog/2025_02_13_03_56_43_2cbf12fb-7569-4051-847e-59c6927b06e7.mp3" length="65847721" type="audio/mpeg"/>
      <guid isPermaLink="false">83a8be8e-a40c-4078-8f38-fad4dbabadf7</guid>
      <itunes:duration>4111</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 22 Jul 2020 15:12:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8619bf40bbd2932998c997ac145d89f5.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast 347: Blue Leaks, Twitter, and Braille Transcription]]></title>
      <itunes:title><![CDATA[The Technology podcast 347: Blue Leaks, Twitter, and Braille Transcription]]></itunes:title>
      <description><![CDATA[Here are the show notes for this program which is podcast 347 of the main tech series.

Welcome to the technology blog and podcast, this is podcast 347 of the series. On this podcast, a longer segment on the Blue Leaks issue which I take you the article. <a href="https://technology.jaredrimer.net/2020/07/10/blue-leaks-this-is-as-bad-as-it-gets/">Here is the blog post </a> that is linked in the first Security Box which was issued yesterday. Next, Twitter apparently got hacked, or did they?  We've been publishing blog posts as we learn more with my thoughts, and we'll be covering this on the Security Box next week. Finally, i have a braille transcription update as I deal with assignment 19. We'll definitely have more news coming out of the twitter camp. What a mess.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895273</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895273/the-technology-blog/2025_02_13_04_04_21_fbd24802-ff18-4ff4-ae82-f36492684116.mp3" length="64191144" type="audio/mpeg"/>
      <guid isPermaLink="false">5b46cd67-c909-45eb-a978-722887db410d</guid>
      <itunes:duration>4007</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 17 Jul 2020 03:37:34 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c47d7b4a629d359c56fd09593bd3a54f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Security Box, Security podcast 1]]></title>
      <itunes:title><![CDATA[The Security Box, Security podcast 1]]></itunes:title>
      <description><![CDATA[This will be the home of the podcast of the Security Box, just security talk on <a href="http://www.986themix.com">the mix. </a> Articles linked here to topics I've talked about.

Welcome to the security box, podcast 1. While we're playing a wide variety of music, the music will not be part of the notations. We're only going to link to things talked about as part of the show itself. The show will be part of the Tech podcast series, but hosted through the <a href="http://magnatune.jaredrimer.net">independent channel </a> of the suite of servers. I hope that you'll be enlightened by the discussion, and I encourage discussion. If listening through the podcast itself, contact me through my tech address used through the tech podcast. Mix listeners can contact me through the <a href="http://986themix.com/djcontact">contact the DJ's page </a> of the mix. Thanks for listening!

<ul>
<li> <a href="https://en.wikipedia.org/wiki/Dark_web">Dark web </a> Wikipedia </li>
<li> <a href="http://www.securityweek.com/targets-data-breach-commercialization-apt">Target’s Data Breach: The Commercialization of APT | SecurityWeek.Com. </a> Security Week </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/14/there-is-doubt-in-evidence-in-a-case-of-an-alleged-linked-in-and-dropbox-hacker/">There is doubt in evidence in a case of an alleged Linked in and dropbox hacker </a> the Technology blog and podcast </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/14/we-have-an-update-on-a-prior-story-on-a-russian-hacker-who-was-found-guilty/">We have an update on a prior story on a Russian Hacker who was found guilty </a> The Technology blog and podcast </li>
<li> <a href="https://technology.jaredrimer.net/2020/07/10/blue-leaks-this-is-as-bad-as-it-gets/">Blue Leaks, this is as bad as it gets </a> The Technology blog and podcast </li>
<li> <a href="https://krebsonsecurity.com/2020/06/fema-it-specialist-charged-in-id-theft-tax-refund-fraud-conspiracy/">FEMA IT Specialist Charged in ID Theft, Tax Refund Fraud Conspiracy </a> Krebs on Security </li>
/ul>

There may be other things I reference that is not going to be specifically linked here. You can visit the tech blog to read anything of interest, as well as searching out stories for future inclusion. There are sources that I don't have because of the amount I already have to read. As the podcast grows, we may not have so many items, but we'll see over time. I hope you've enjoyed the program listening live, or the podcast if you listen that way. See you next time!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895275</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895275/the-technology-blog/2025_02_13_03_45_01_ac944e69-feaf-4dcd-b0fa-2d5f67dc98e8.mp3" length="174375222" type="audio/mpeg"/>
      <guid isPermaLink="false">c7b789a8-f464-451e-92b8-a8daa35a1164</guid>
      <itunes:duration>10898</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Jul 2020 21:19:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f947a4d99302318c3df1c0c15c52ea8d.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 346: Transit App, Capital One, TNO, and Everify]]></title>
      <itunes:title><![CDATA[Tech podcast 346: Transit App, Capital One, TNO, and Everify]]></itunes:title>
      <description><![CDATA[Welcome to the technology blog and podcast, podcast 346. Last podcast was at the end of May, and a lot has been going on around here health wise. I'm definitely feeling better, and I've got quite a bit for you.

<ul>
<li> At the end of May, beginning of June, Transit App was announced to be the Los Angeles Metro app of choice, changing the landscape of $240,000 in costs. <a href="https://technology.jaredrimer.net/2020/05/21/los-angeles-metro-gets-rid-of-go-metro-as-official-app-endorses-transit-app/">Here is the blog post </a> that I wrote which also links to Los Angeles Metro's blog as well. Let me know your thoughts on this one! </li>
<li> What does Capital One have to hide when it comes to their breach?  After my health issues, I've been thinking about what to put in to the podcast, and I thought this would be good to talk about.  <a href="https://technology.jaredrimer.net/2020/05/30/judge-rules-capital-one-must-hand-over-mandiants-forensic-data-breach-report/">This blog post </a> links to an article that goes in to detail about this intriguing case. We already know Capital One was at fault, why are we continuing to hide it? </li>
<li> I recently penned an article asking about the state of Antivirus after someone emailed asking me to put Eset's web site in a 2017 blog post. Instead of doing that, I mention Eset and several good antivirus products in <a href="https://technology.jaredrimer.net/2020/07/06/what-is-the-state-of-antivirus-today-is-it-about-dead/">this blog post </a> where I quote an email that Shaun Everess wrote in a forward talking about 2004's Windows 10 version.  He's not wrong in his thoughts in the comments, but I still think we're at a disadvantage. </li>
<li> Michael in Indiana has every reason to get mad at TNO.  TNO stands for Trust No One, and he had no idea an app he used was this way.  I also leave my thoughts. </li>
<li> Finally, <a href="https://technology.jaredrimer.net/2020/07/09/another-government-problem-with-a-feature-that-doesnt-even-work/">hot off the presses, a blog talking about another Government web site. </a> The DHS has to be ashamed of itself!  It links to an article recently penned by Brian Krebs about a web site called everify.  We should be passed this ordeal when building web sites, should we not? </li>
</ul>

Do you have anything you want to comment on?  Please get in touch by contacting me. The web site and blog have contact info, so please utalize it.  I hope you enjoy this podcast, and I hope to get back in to podcasting more regularly. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895276</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895276/the-technology-blog/2025_02_13_03_57_17_b750ef1e-f536-4857-b548-121887ce92d5.mp3" length="62346662" type="audio/mpeg"/>
      <guid isPermaLink="false">5772a640-1e3b-49f4-8d8a-2ea01e796515</guid>
      <itunes:duration>3892</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Jul 2020 20:24:20 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d5d6638b8e777fcb6322f944c8c9570f.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast, podcast 345: parcel track and cat fishing]]></title>
      <itunes:title><![CDATA[The technology podcast, podcast 345: parcel track and cat fishing]]></itunes:title>
      <description><![CDATA[Welcome to podcast 345 of the technology podcast series. This time, no covid-19 material as I have quite something different lined up for this podcast. I'm sorry its taken this long to release, I've not been feeling well, but the wait is worth it, as you'll see.

<ul>
<li> What type of app do you use to track your packages? Just before podcast 344's release, I had a hair, and decided to go searching for a replacement. <a href="http://www.parceltrack.de">Parcel Track </a> was found and demoed. Some things including notification fixes were pushed out after the recording, the basic demo will give you an idea on what it is about and how it works. In the first segment, I talk about what I had used before, and introduced Parceltrack. The second segment was the demo itself. </li>
<li> Have you heard of terms such as  catfishing  or  catphishing?  Yes, thats awesome! I have but not really looked up what it meant until I found a Cyberscoop article talking about a well known figure that does cybersecurity work in the government who was impersonated. I did some looking up, and what I found was quite interesting. Both spellings of fish (phish) are used in this and it was quite facinating. <a href="https://technology.jaredrimer.net/2020/05/20/catfishing-catphishing-what-are-they/">Read the featured post for May 20th, Catfishing, Catphishing, what are they? </a> for more on this, and it links to the Cyberscoop article. </li>
</ul>

Contact information is available for everyone at the end, and I hope you enjoy the program as much as I have bringing it together for you! Thanks so much for listening md feel free to reach out.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895277</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895277/the-technology-blog/2025_02_13_03_58_03_76b616e7-ecd4-4c19-9e29-702ea0efe365.mp3" length="68424066" type="audio/mpeg"/>
      <guid isPermaLink="false">25be1134-a817-43af-811e-6b5357086fd1</guid>
      <itunes:duration>4276</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 21 May 2020 03:30:22 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_db7de6aa36387b7289b5df216bd231f0.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 344: lots of interesting stuff]]></title>
      <itunes:title><![CDATA[Tech podcast 344: lots of interesting stuff]]></itunes:title>
      <description><![CDATA[Welcome to podcast 344. On this podcast, we've got quite a bit for you.

<ul>
<li> We've got news notes of varying kind. </li>
<li> I demo and talk about something I recently learn on the iphone thanks to Michael in Indiana. </li>
<li> I talk about Kreb's article about moving money and how one can get duped. <a href="https://krebsonsecurity.com/2020/04/when-in-doubt-hang-up-look-up-call-back/">Krebs on Security: When in Doubt: Hang Up, Look Up, & Call Back </a> which is also talked about on the tech blog. </li>
<li> Getting forms in a different language than you speak? We got two applications at MENVI which we are now not going to process based on advise given to us. </li>
</ul>

I hope to have another podcast really soon. Thanks for listening to this one, and make it a great day
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895278</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895278/the-technology-blog/2025_02_13_04_05_52_c4ddad37-1a77-4f13-93a9-eea4d7e71e65.mp3" length="59519470" type="audio/mpeg"/>
      <guid isPermaLink="false">43f2657a-17d9-445a-9cd8-875401bda33a</guid>
      <itunes:duration>3716</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 Apr 2020 03:10:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fe70de7366225d868e8766d0482f14a0.jpg"/>
    </item>
    <item>
      <title><![CDATA[The tech podcast 343: Covid-19 with lots of twists]]></title>
      <itunes:title><![CDATA[The tech podcast 343: Covid-19 with lots of twists]]></itunes:title>
      <description><![CDATA[Welcome to podcast 343 of the technology podcast series. This podcast is covid-19 based with a <a href="https://technology.jaredrimer.net/2020/03/27/webinar-on-covid19-from-a-guy-that-should-be-giving-this-talk/">webinar done by Mikko Hypponen </a> to a <a href="https://technology.jaredrimer.net/2020/04/08/conspiracy-theories-on-the-novel-corona-virus-make-me-wonder/">conspiracy theory </a> which we'll play the audio and comments from Michael in Tennessee. To boot, a video about 10 minutes dealing with 5G and the prospects of whether it actually gets you sick. The podcast is a little over an hour, and I hope you enjoy it! Thanks so much for listening.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895280</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895280/the-technology-blog/2025_02_13_04_04_36_63139e80-a0e3-4547-a641-774d07db0a43.mp3" length="66334736" type="audio/mpeg"/>
      <guid isPermaLink="false">1c178cd4-d3ac-4157-8a9f-48dba0439f44</guid>
      <itunes:duration>4141</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 10 Apr 2020 23:57:48 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dfa5ff981e6eb2b08e326bf7a0f00609.jpg"/>
    </item>
    <item>
      <title><![CDATA[Episode 342: Corona Virus lures cyber criminals]]></title>
      <itunes:title><![CDATA[Episode 342: Corona Virus lures cyber criminals]]></itunes:title>
      <description><![CDATA[On this podcast, I've got a webinar that I would wait on, but its too important. Cyber criminals are taking advantage of this pendemic. I briefly talk about what the webinar has, then enjoy this 57 minute webinar which ends the podcast. <a href="https://technology.jaredrimer.net/2020/03/17/coronavirus-is-the-latest/">Here's the blog post with the link to the webinar </a> so you may get the slides if you wish. Thanks for listening! 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895281</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895281/the-technology-blog/2025_02_13_04_26_30_b65d60a3-1ff7-412d-b9dc-1fdba2b73705.mp3" length="59396808" type="audio/mpeg"/>
      <guid isPermaLink="false">https://anchor.fm/jared-rimer6/episodes/Episode-342-Corona-Virus-lures-cyber-criminals-ebtbs5</guid>
      <itunes:duration>3708</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Mar 2020 04:11:02 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_e8a1f85a80e1d104568a17541f6f3133.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 341: cheating, B2K, Corona, and mailboxes]]></title>
      <itunes:title><![CDATA[Tech podcast 341: cheating, B2K, Corona, and mailboxes]]></itunes:title>
      <description><![CDATA[Welcome to podcast 341. We've got a bit of stuff for you for an hour podcast.

<ul>
<li> The topic of cheating came up within the dice world community. Dice World is a game that now has chat rooms in it. I've covered this on my cast before, but someone wanted to cheat in other games, and questioned their participation in the tournaments. </li>
<li> I cover Braille2000 and setup as a blind person. I've got a write up on it as well. <a href="https://technology.jaredrimer.net/2020/03/05/getting-started-with-braille2000-as-a-blind-person/">Read the write up: Getting Started with Braille2000 as a Blind Person </a> for more. </li>
<li> I cover a little bit of news on the aweful change in our lives with the Corona virus, although I cover this as a tech related thing. I've got blog posts covering this, so just go peruse that. </li>
<li> Finally, Shaun Everess comes along and asks a question by email about letterboxes and why they've gotten smaller. Here we call them mail boxes, but it is pretty much the same. </li>
</ul>

Our contact info is at the beginning and end of the podcast, and I hope you enjoy the hour long program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895282</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895282/the-technology-blog/2025_02_13_04_26_55_bb6570d7-9022-4f25-8bfa-46c938ea631c.mp3" length="58415597" type="audio/mpeg"/>
      <guid isPermaLink="false">https://anchor.fm/jared-rimer6/episodes/Tech-podcast-341-cheating--B2K--Corona--and-mailboxes-ebkch8</guid>
      <itunes:duration>3647</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 18 Mar 2020 01:25:27 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_c5749e4f610aa843458129e676f0658b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 340: news from NLS, apple, microsoft, phishing, scams, and ssl]]></title>
      <itunes:title><![CDATA[Tech podcast 340: news from NLS, apple, microsoft, phishing, scams, and ssl]]></itunes:title>
      <description><![CDATA[Welcome to podcast 340 of the technology blog and podcast series! This is the shows notations, and there's plenty. 

<ul>
<li> Braille Book Review is a magazine put out by the Library of Congress's <a href="http://loc.gov/nls">National Library Service </a> and there's probably info that may be of interest to some. </li>
<li> Michael in Tennessee and I are to talk about Apple, Microsoft, Phishing, and scams. </li>
<li> SSL and TLS can go hand in hand with that discussion because I had an incident with a cert expiring, and so did the domain. Bad combo! </li>
</ul>

Contact info is found on the podcast both at the beginning and end of the program, and I hope you find this podcast of value. Thanks for listening to the program, and remember to leave those thoughts! They're very valuable. See you on another edition!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895284</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895284/the-technology-blog/2025_02_13_03_43_35_c9401b2e-5660-4c1e-ad7e-07a4060e4a28.mp3" length="63574699" type="audio/mpeg"/>
      <guid isPermaLink="false">f310f0e4-e57c-4a3e-b022-d0ea2222f417</guid>
      <itunes:duration>3969</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 02 Mar 2020 19:56:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_422e2cc2b35a4634b98f9eab898aaaba.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 339: Phishing Insites on Social media, Tmobile and Sprint merge, and news notes]]></title>
      <itunes:title><![CDATA[Tech podcast 339: Phishing Insites on Social media, Tmobile and Sprint merge, and news notes]]></itunes:title>
      <description><![CDATA[Sprint and Tmobile murge, blog updates news notes and more, and Phishing insights and social media scams from a bebinar. Contact info at the beginning and end of the program.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895285</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895285/the-technology-blog/2025_02_13_03_44_45_5ad3f9d7-a247-4c0e-bc3f-0b50ca77aca9.mp3" length="65229912" type="audio/mpeg"/>
      <guid isPermaLink="false">ca146b6e-9ee1-4d83-8200-d970c24d5d03</guid>
      <itunes:duration>4072</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 18 Feb 2020 19:47:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_73c70b00e65c2b9dd613e4c44fc463a9.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Tech podcast: 338: IHS vulnerability research]]></title>
      <itunes:title><![CDATA[The Tech podcast: 338: IHS vulnerability research]]></itunes:title>
      <description><![CDATA[Welcome to podcast 338. I catch up with you on my workings on the Braille Transcription course and the work I'm doing with it now. After that, we bring you the IHS vulnerability research webinar from December 2019. I thought I had the link to the blog post talking about this webinar, but I guess I didn't post it unfortunately. I've posted some but need to do a better job on it.  If this wasn't december's, it must be November's, but be that as it may, its a great webinar.

My contact information is made available at the end of the program as usual, and thanks so much for reading and participating on the blog!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895286</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895286/the-technology-blog/2025_02_13_04_27_20_1c768335-7271-4710-b4a4-294d54aa9ae8.mp3" length="69824346" type="audio/mpeg"/>
      <guid isPermaLink="false">ac1a5131-587f-44c3-9c47-72f6d4a288c5</guid>
      <itunes:duration>4359</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 11 Feb 2020 21:09:06 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_60263664b2d065389fef7a55310bf892.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology blog and podcast, podcast 337]]></title>
      <itunes:title><![CDATA[The Technology blog and podcast, podcast 337]]></itunes:title>
      <description><![CDATA[Welcome to podcast 337. While we've got some corrections by Shaun in regards to last podcast, one of the biggest topics I think you'll want to get your paws on is buildings being connected to the Internet. I'm not kidding! I've got a blog post with the article of the same name: <a href="https://technology.jaredrimer.net/2020/02/04/hackers-are-hijacking-smart-building-access-systems-to-launch-ddos-attacks/">Hackers are hijacking smart building access systems to launch DDoS attacks </a> and this is definitely something to think about. 

Also on the podcast, we've got a dumb criminal award for the podcast. If you're going to commit a crime, you want to try and hide like a lot of America's Most Wanted's criminals did. Thats why they were hard to catch, and eventually, a lot of them were caught. <a href>A great story on how not! to get caught in cybercrime? </a> is my blog post, and I link to Brian Kreb's coverage of this. 

Finally, although not in the exact order of the podcast, we've got my discussion of the infamous 404 page and how it helped me fix a bug on my own web site. <a href="https://technology.jaredrimer.net/2020/02/04/building-a-404-page-that-helps-fix-bugs/">Building a 404 page that helps fix bugs </a> is the article title, and it was definitely something interesting. While the code I wanted displayed didn't show, the fact is, we can fix our error pages to help us fix those pesky mistakes in code.

Contact information is available on the podcast, and even available on the blog.  Feel free to utalize it, and we'll see you on another edition of the cast!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895287</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895287/the-technology-blog/2025_02_13_04_27_13_6e6041f1-6e30-4046-bc28-51c60c021231.mp3" length="61360804" type="audio/mpeg"/>
      <guid isPermaLink="false">22cfd46b-9109-495c-8015-62dfe188aac4</guid>
      <itunes:duration>3831</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 08 Feb 2020 23:28:58 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_24b67f0e9ed96cb379babcea51db421b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 336: lots of topics from Password Managers, reports, Braille, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 336: lots of topics from Password Managers, reports, Braille, and more]]></itunes:title>
      <description><![CDATA[Welcome to podcast 336 of the technology blog and podcast series. I've got quite a number of things of varying topics in today's program.

<ul>
<li> The first segment of this program covers <a href="https://technology.jaredrimer.net/2020/01/19/a-very-comprehensive-password-manager-review/">this blog post: A very comprehensive password manager review </a> and Lastpass gets a poor review even though it has great features, up front postings of any security issue, and no data lost to date. Why? What gives? Thanks to Consumers Advocate for bringing this to our attention by sending an article, but this is definitely sad. Most of those items I've never heard of. </li>
<li> The second segment covers news, notes, and items posted to the blog. The tech blog has posted more since the recording, and you may be interested in a topic that has been posted, so get in touch! </li>
<li> I have a Braille Transcription update on assignment 17. <a href="https://technology.jaredrimer.net/2020/01/24/assignment-17-i-passed/">Assignment 17: I passed! </a> and <a href="https://technology.jaredrimer.net/2020/01/23/assignment-17-has-been-submitted-for-grading/">Assignment 17 has been submitted for grading. </a> I'll have a full write up at some point in regards to assignment 17  through <a href="http://www.jaredrimer.info">Braille Transcription as a blind person </a> at some point. </li>
<li> I've talked about scammers that have contacted me to try and hook up.  They never call. but yet, they want money, gift cards, and hangout connections.  <a href="https://technology.jaredrimer.net/2020/01/30/scammers-hitting-the-blind-same-as-my-talks-earlier/">Scammers hitting the blind, same as my talks earlier </a> is the blog post that talks about this in writing. Dice World wants to know about players who are engaging in this behavior, please contact them if you feel the activity you're experiencing is questionable. Thanks Dice World for listening to the community! You really do care about safety and security, great job! </li>
<li> A recent article sent to us by Mary, a brand new contributer I've made available to the blog. I cover some statistics on this porgram, and <a href="https://technology.jaredrimer.net/2020/02/01/more-than-70-cybercrime-statistics-soon-to-be-a-6-trillion-problem/">More than 70 cybercrime statistics – Soon to be a $6 trillion problem </a> is the blog title and accompanying  article linked within.  More from this facinating report will be discussed on another podcast. </li>
<li> Finally, Shaun Everess is along. He sent me an email recently, and his thoughts got me thinking.  I address his email on the podcast for everyone to hear what I have to say. Facinating stuff, Shaun! </li>
</ul>

Contact info is of course at the end of the program, and this program is over an hour and a half this time. I hope you enjoy the wide variety of topics on this podcast, and I'll be back on another podcast very soon! Thanks so much for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895289</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895289/the-technology-blog/2025_02_13_04_06_40_6450bc5a-cdda-4469-855b-046eb0b8fa5f.mp3" length="80733751" type="audio/mpeg"/>
      <guid isPermaLink="false">ff9d46be-a792-45b0-8743-1df29227ce64</guid>
      <itunes:duration>5040</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 01 Feb 2020 20:41:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_39bc369570f5cce99caedb6547ad1feb.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 335: Predictions, AVA, and an interesting braille display]]></title>
      <itunes:title><![CDATA[technology podcast 335: Predictions, AVA, and an interesting braille display]]></itunes:title>
      <description><![CDATA[Welcome to the Technology podcast, podcast 335. On this edition, we do talk about a few things including security, transportation, and braille, but in a different light. Translation software was talked about in the talk, but nothing too specific. Here are the topics.

<ul>
<li> On our first segment, Trend Micro's 2019 report and 2020 predictions. I talk about the numbers and what sticks out with me.  Incidently, the webinar that they'll do this month is dealing with the predictions for 2020. I'll blog about that after I get a chance to read the email.  If you want to read my blog post about the threat report and predictions please go <a href="https://technology.jaredrimer.net/2020/01/09/question-are-we-looking-for-more-or-less-threats-this-year-and-if-so-what-kind/">to the blog post entitled: Question: Are we looking for more or less threats this year and if so what kind? from blog The Technology blog and podcast </a> and it links to the article in question. </li>
<li> On the second segment, we talk about the automated voice announcement system. Every bus here is supposed to call stops and every train is to call stops too. While it is technology, and it fails, the failure is also within the drivers. It has to work both ways, and my talk which will be presented on Thursday, January 16th, at an Accessibility Awards Luncheon will talk about this.  At some point, we must have drivers and passengers work together to get passengers to where they need to go safely. How is it for you in your area? How is the AVA specifically for you? Lets talk! </li>
<li> Finally, the canute 360 is discussed.  <a href="https://technology.jaredrimer.net/2020/01/10/join-at-guys-on-january-13th-for-an-informal-demo-of-a-brand-new-display/">This blog post </a> which was posted on the 10th talks about where to go and links to Blind Bargains.  I attended this forum, and what I learned was quite interesting.  I didn't stay long for the questions and answers, but the presentation was quite interesting.  Its supposed to be made available for listening at some point.  I do want to catch this so I can take the time to listen to the rest of the questions in case there is something else I can learn. </li>
</ul>

Finally, what is coming up on future podcasts and contact information.  I hope you will enjoy the program as much as I have putting it together for you.  I look forward in hearing from you!

<ul>
<li> email/imessage tech at menvi.org </li>
<li> text/whats app 804-442-6975 </li>
</ul>

If you have other social media, you can use that.  <a href="http://www.jaredrimer.net">The Jared Rimer Network </a> has all contact info made available and links to social media as well. Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895290</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895290/the-technology-blog/2025_02_13_03_59_03_7bd84c0b-8a38-49ea-b152-94dcd1a63ffd.mp3" length="70366514" type="audio/mpeg"/>
      <guid isPermaLink="false">9ce42dd2-b36b-4eab-afa6-c11bd807fe60</guid>
      <itunes:duration>4393</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 Jan 2020 03:43:36 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6469dc02b663ba5f5df3fdde6eaeeebc.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 334: Yahoo! SBC Email, B2K tutorial, and the Internet gone for 24 hours discussion]]></title>
      <itunes:title><![CDATA[Tech podcast 334: Yahoo! SBC Email, B2K tutorial, and the Internet gone for 24 hours discussion]]></itunes:title>
      <description><![CDATA[Lots of things here including a discussion found on the blog in regards to a vdio out there about the Internet being gone for a day. I take that discussion and turn it in to my own.


Hello everyone, welcome to podcast 334 for January 9, 2020. We've got a very interesting podcast comoing up, lets tell you whats on it.

<ul>
<li> What has been going on with SBC Yahoo! mail? Looks like they aren't communicating with their customers about potential problems. I don't think this is right, and my <a href="https://technology.jaredrimer.net/2020/01/06/yahoo-forcing-random-password-resets-am-i-the-only-one-supporting-someone-having-trouble/">blog post entitled Yahoo forcing random password resets … am I the only one supporting someone having trouble? </a> goes in to detail about this in writing. </li>
<li> As I tlak about what I want to do with the podcast, I give you the beginning of the Braille2000 tutorial I have created in regards to the talking edition. <a href="http://www.jaredrimer.info">Go to the Braille Transcribing as a blind person </a> web site to learn more, and download the full tutorial which is based on the documentation. We'll have more from this tutorial over time. </li>
<li> In commentary from last podcast, Shaun Everess talks about how there is a video out there talking about not having the Internet for a day. Instead of linking to it I take this talk a little bit further by talking about it but bringing up the loss of power to boot.  What would we do if one, the other, or both occurred?  Lets take this for a spin. </li>
</ul>

As always, contact information is going to be available at the end of the program, and I hope you enjoy this podcast.  The podcast runs over an hour in length. Thanks for listening, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895291</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895291/the-technology-blog/2025_02_13_04_06_41_dccff5bd-2bbc-4964-bc3f-6cdd8d552923.mp3" length="61648417" type="audio/mpeg"/>
      <guid isPermaLink="false">1557d9b9-b0d2-422a-ae90-be943ec3ac96</guid>
      <itunes:duration>3849</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 09 Jan 2020 18:30:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3e1ca15f1029d21cd3add54313804e82.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 333: January 6, 2020]]></title>
      <itunes:title><![CDATA[Technology podcast 333: January 6, 2020]]></itunes:title>
      <description><![CDATA[Welcome to the first podcast of 2020, podcast 333. Below, please find a list of items and links where applicable as the topics of the podcast are listed below.

<ul>
<li> Breaches galore, the epidemic of whats happened in the last decade. Are we really looking for more trouble, or will it slow down? </li>
<li> Freshbooks: thank you so much for giving me a great reason for talking about you today. On this podcast, I talk about how I had to reinstall the Freshbooks app, and how easy it was to reauthenticate with my account. I was afraid that I was needing to grab my 20 character password and paste in the password field. Not anymore! </li>
<li> <a href="http://twit.tv">Twit.tv </a> has a new sponsor on their list that spomnsors segments on Security Now. Sadly, I can't take advantage of it at this time, but it looks like something we could've and should've had many years ago. Learn about <a href="http://www.privacy.com">privacy.com </a> and see if it will meet your needs. </li>
<li> Michael in Indiana and I talked about software and reminisced about the old days of how downloading the wrong software wasn't fatal, but just a havoc. Today, this isn't the case. I mention Stuxnet as an example of software that was developed and it did some real world damage.  <a href="https://www.amazon.com/Countdown-Zero-Day-Stuxnet-Digital/dp/0770436196">Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: by Kim Zetter </a> is the name of the book and its author.  I read this through Kindle and I may have talked about this on my podcast when I did.  If this is the first actual weapon that destroyed data and things that were going on, is something else being developed we yet don't know about? </li>
</ul>

As usual, our contact information is at the end of the program, and I hope you enjoy this first podcast. I'll be back on another edition very soon. Thanks so much for listening to this 71 minute program!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895293</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895293/the-technology-blog/2025_02_13_03_59_34_d67b84c0-7c13-4064-ade8-4b40a35dc24c.mp3" length="68972948" type="audio/mpeg"/>
      <guid isPermaLink="false">a3195961-14f1-46ee-9f07-6a288a9830c1</guid>
      <itunes:duration>4306</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 06 Jan 2020 18:21:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_8c0eb07fe6a7dbf92f6eb3246d531644.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 332: Iphone 11, awards, and braille transcription]]></title>
      <itunes:title><![CDATA[Tech podcast 332: Iphone 11, awards, and braille transcription]]></itunes:title>
      <description><![CDATA[Merry Christmas, this is the last episode of 2019.

Welcome to the final edition of the technology blog and podcast series for 2019. Trust me, we've got a lot more coming, but this is the final podcast of 2019.

<ul>
<li> My initial thoughts on my brand new, Iphone 11. </li>
<li> Brian Krebs gets an award. Several other members of the security field was also mentioned as needing the award more than Brian, but <a href="https://krebsonsecurity.com/2019/12/ciso-magazine-honors-krebsonsecurity/">CISO MAG Honors KrebsOnSecurity </a> is the article Penned by Krebs. </li>
<li> I have a segment on Braille transcribing as a whole in particular to Braille2000 and not specific to the assignment as a whole. I found this quite interesting, even while I did the talk. </li>
</ul>

In the first podcast of 2020, I'm going to talk about a company I feel we should've had around about 10 years ago if not sooner than now.  Its an advertiser of TWIT, and boy, if it doesn't fit my needs, I feel it may meet others.  We're going to start with that, and even more as we continue the transcription course, my Iphone 11, and who knows what else we'll cover by this podcast as next year gets started and beyond. Until next year, thanks so much for listening to this podcast, and I'll be seeing you very soon!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895294</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895294/the-technology-blog/2025_02_13_03_46_14_7a9fd696-6d13-46be-b06f-cf5156defa66.mp3" length="64943058" type="audio/mpeg"/>
      <guid isPermaLink="false">1742395a-78ec-4981-a80e-a9d298981d6d</guid>
      <itunes:duration>4058</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 25 Dec 2019 18:30:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_14944d0d972c1b72de9067a2621abb0e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 331: Dec 15, 2019]]></title>
      <itunes:title><![CDATA[Tech podcast 331: Dec 15, 2019]]></itunes:title>
      <description><![CDATA[On this podcast, NVDA gets updated and its a breeze! Assignments 17-19 are talked about and I want your thoughts. A webinar that caught my attention, and web design and why links are all over the home page.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895295</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895295/the-technology-blog/2025_02_13_03_59_58_f3eb85f7-09dd-493f-96ae-033f35f5146a.mp3" length="86193598" type="audio/mpeg"/>
      <guid isPermaLink="false">65cb3927-8b68-e4f3-9e3a-e7f97cf1e624</guid>
      <itunes:duration>5381</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 16 Dec 2019 02:06:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_21ca245622695180efc6eef9ec12e2dc.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 330]]></title>
      <itunes:title><![CDATA[Tech podcast 330]]></itunes:title>
      <description><![CDATA[On this podcast, B2k news, domain buying, and news on hospital mortality rates when ransomware and other attacks happen.<a href="https://technology.jaredrimer.net/2019/11/18/hospital-breaches-leading-to-more-heart-attacks-you-bet/">Hospital breaches leading to more heart attacks? You bet! from blog The Technology blog and podcast </a> Thats the name of the article and its linked from me. Very facinating read.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895297</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895297/the-technology-blog/2025_02_13_04_00_07_e0d1e0a5-8e95-4777-b04e-36e67606cbda.mp3" length="53013872" type="audio/mpeg"/>
      <guid isPermaLink="false">9e869dd0-cae3-0ad9-9453-f92a72153e6d</guid>
      <itunes:duration>3309</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 28 Nov 2019 18:34:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d055459a2ac12aeddf1ff08ad5f2dd0f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 329: November 5, 2019]]></title>
      <itunes:title><![CDATA[Tech podcast 329: November 5, 2019]]></itunes:title>
      <description><![CDATA[Welcome to podcast 329. 

<ul> 
<li> How can we keep ourselves as safe as possible when databases that companies hold them online? I completeluy understand the aspect of why they need to do so.  It isn't possible for them to store it like I do, and its just becoming a problem.  <a href="https://technology.jaredrimer.net/2019/11/03/a-telecom-company-breached-mongo-db-to-blame/">A telecom company breached, mongo DB to blame </a> is the blog post referencing this segment. </li>
<li> National Cyber Security month is now complete.  Why?  In this ever changing landscape where everything is online must we have only one month to teach how to be as secure as possible?  Please check out my blog post penning this topic: <a href="https://technology.jaredrimer.net/2019/11/03/ncsam-is-over-shall-we-stop-teaching/">NCSAM is over, shall we stop teaching </a> for my written thoughts on this important topic. Its something we should be discussing, and we should be discussing it all the time. </li>
<li> I found an article through dark reading, and instead of covering that, I think we should try to discuss it in a different light whereby we ask how consumers can be safe in this time of major security problems.  It isn't just the entity that we shop at that should be the main problem, it is in both things.  Merchants need to fix their security, but shoppers need to be careful and some tips are discussed on what we can all good.  
<li> Dice world has some interesting updates and I tie that in to other games and the accessibility landscape.  There is always something to learn and I'm happy to see what happens as we continue to grow. </li>
<li> Michelle Dyer was a dear friend of mine.  I let the domain go because I was under the assumption that the domain was not needed.  Family contacted her closest friend, contacted me, and I've relaunched the domain on October 31st.  Due to some other technical issues I could not fix, the domain is now relaunched and I only made some changes to clean some outdated info. <a href="http://www.michelledyermemorial.com">Please click on this link to go to the Michelle Dyer Memorial page </a> where you'll find tech podcasts to download that she was a part of. We thank each and everyone for your continued support of my work. </li>
</ul>
The track I selected for this podcast comes from the artist <a href="http://magnatune.com/artists/ehren/">Ehren Starks </a> from the depths of a Year.  Contact information is also available at the end of the program.  Thanks so much for listening!  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895298</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895298/the-technology-blog/2025_02_13_04_31_44_48bcced3-22f1-45d8-b7f9-3408c521ff3e.mp3" length="74674338" type="audio/mpeg"/>
      <guid isPermaLink="false">16f3e756-3d7d-7d28-8c79-e9981ea18b67</guid>
      <itunes:duration>4662</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 06 Nov 2019 04:08:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_dd3b96d02586963974208e757750df09.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 328: wrapping up NCSAM and other stuff too]]></title>
      <itunes:title><![CDATA[Tech podcast 328: wrapping up NCSAM and other stuff too]]></itunes:title>
      <description><![CDATA[Hi folks, welcome to podcast 328.

<ul>
<li> Transportation: can we use something like Navi Lens in conjunction with apps like transit app, Go Metro, or other apps to get us around by bus or train? </li>
<li> <a href="https://technology.jaredrimer.net/2019/10/28/making-the-smart-bet-on-cybersecurity/">Making The Smart Bet On Cybersecurity </a> </li>
<li> <a href="https://technology.jaredrimer.net/2019/10/29/whats-going-on-with-web-threats-the-october-webinar-by-trend-micro/">Whats going on with web threats? The October webinar by Trend Micro </a> </li>
<li> <a href="https://technology.jaredrimer.net/2019/10/31/ncsam-protecting-our-kids-online/">Protecting Our Children Online </a> </li>
<li> Contact info </li>
</ul>

I hope you enjoy the program. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895299</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895299/the-technology-blog/2025_02_13_04_11_50_f52e6ac7-68b0-4e75-b926-8f2cc572a693.mp3" length="73889524" type="audio/mpeg"/>
      <guid isPermaLink="false">d65da1fa-9447-47a8-9d76-80bd81c35da6</guid>
      <itunes:duration>4613</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 02 Nov 2019 01:42:32 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3a63d44e037c57594ac7bda65608a69f.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 327 for October 27, 2019]]></title>
      <itunes:title><![CDATA[Technology podcast 327 for October 27, 2019]]></itunes:title>
      <description><![CDATA[Welcome to podcast 327 for October 27, 2019. 

<ul>
<li> What do you think about giving out or phone numbers? I'm not talking about business, I'm talking about phone numbers for personal use. I heard this on a telephone line on a bulletin board, and got to thinking. </li>
<li> VPN services is the next topic. I'm looking at <a href="http://www.expressvpn.com">express vpn </a> as they were talked about on a prior post on the blog through tech warm. My thoughts are on this one. </li>
<li> I'm putting a feeler out there.  On this third segment, I'm curious on your thoughts on the braille transcription course as a whole. I know I have had some struggles, but i'm curious on other people who have taken the course or are still taking it with me. Contact me by email for a phone call, as I'd like to discuss it with you. </li>
<li> <a href="https://krebsonsecurity.com/2019/10/cachet-financial-reeling-from-mypayrollhr-fraud/">Cachet Financial Reeling from MyPayrollHR Fraud </a> is the next segment and the article is linked here. What an interesting story here. </li>
<li> <a href="https://info.phishlabs.com/blog/best-practices-for-defanging-social-media-phishing-attacks">Best Practices for Defanging Social Media Phishing Attacks </a> is the final segment and lots of terms given here and info. This could be put under the NCSAM category as the cyber security awareness month is coming to an end. </li>
</ul>

Please feel free to contact me on the podcast contact info given, and I look forward in hearing from you!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895300</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895300/the-technology-blog/2025_02_13_04_34_48_4db41357-e927-4c70-9ff8-41c38560e115.mp3" length="69817348" type="audio/mpeg"/>
      <guid isPermaLink="false">ec00f6d4-12e0-d538-2dca-3fb8b6587c1d</guid>
      <itunes:duration>4359</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 27 Oct 2019 21:31:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f94f0735b529b27f632aed00dd95666a.jpg"/>
    </item>
    <item>
      <title><![CDATA[The Technology podcast 326: Dice World, NCSAM, braille transcription and more]]></title>
      <itunes:title><![CDATA[The Technology podcast 326: Dice World, NCSAM, braille transcription and more]]></itunes:title>
      <description><![CDATA[<p>On this podcast, Jaws and firefox's latest version. NCSAM should be all the time, yes or no? &nbsp;We've got a braille transcription update, and Dice World has a new layout.</p>
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895301</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895301/the-technology-blog/2025_02_13_04_07_30_dbaf48e0-bb02-4a21-a7a2-701cae4e016f.mp3" length="73691432" type="audio/mpeg"/>
      <guid isPermaLink="false">8447841b-3f55-0469-f33c-2ac0b55373ec</guid>
      <itunes:duration>4600</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 18 Oct 2019 02:00:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_4a4f3a6d862adecb51281b653daaf512.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 325: Door Dash, NCSAM, Scott's new book, and more]]></title>
      <itunes:title><![CDATA[Technology podcast 325: Door Dash, NCSAM, Scott's new book, and more]]></itunes:title>
      <description><![CDATA[Welcome to the technology blog and podcast. 
<ul>
<li> Doordash is the latest major breach, lots of coverage on it. It happened between the release of 324 and now.  Is this the beginning of the end? <a href="https://technology.jaredrimer.net/2019/09/26/fox-los-angeles-reports-door-dash-as-the-next-victim/">Here is the blog post </a> on it. </li>
<li> There is some commentary left by Joseph.  We'd love to hear more on what you have to say, so please leave thoughts on segments. </li>
<li> Password managers and phone calls is the third segment as we start NCSAM.  <a href="https://technology.jaredrimer.net/2019/10/03/ncsam-your-own-phone-number-calling/">Here is the blog post on phone numbers </a> which should be really discussed.  <a href="https://technology.jaredrimer.net/2019/10/01/ncsam-lets-start-with-password-managers/">JHere is the blog post on password managers </a> as well. </li>
<li> Scott Schober wrote a new book.  <a href="https://technology.jaredrimer.net/2019/09/22/the-book-scam-me-if-you-can/#respond">Here is the blog post on this book. </a> I talk about chapter 3 specifically, and my thoughts on it, as it did hit home for me. </li>
<li> Finally, I've got a braille transcription update as I continue to struggle with assignment 15.  I think I'm almost there!  Thoughts? </li>
</ul>
My contact information is available at the end of the program, and thanks for listening.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895303</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895303/the-technology-blog/2025_02_13_04_16_37_fc5cc6d8-3e7b-401e-868c-9b80f269998d.mp3" length="66933159" type="audio/mpeg"/>
      <guid isPermaLink="false">3be32c90-8da2-a225-6cd0-597cd72196d9</guid>
      <itunes:duration>4179</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 06 Oct 2019 23:37:10 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_b409a3189e89773b386aec03b634d28c.jpg"/>
    </item>
    <item>
      <title><![CDATA[tech podcast 324: Scott Schober's new book, one I finished, and two interesting articles]]></title>
      <itunes:title><![CDATA[tech podcast 324: Scott Schober's new book, one I finished, and two interesting articles]]></itunes:title>
      <description><![CDATA[Welcome to podcast 324 of the technology blog and podcast. On this podcast, we've got two different books that are talked about. The first is one that I've already read, the second is one that I'm going to read and preordered through Amazon. Finally, I've got two articles that I talk about.  One is in regards to a school system teaching the parents of their students the dos and don'ts of social media.  Finally, an article which wasn't tech related, but yet it was bullying.  What would have happened if this turned to online bullying and the same type of injury took place because of some cyberbully(s) who wanted to cause him harm?  The only issue is that this child was 8 years of age.  All of this, on this edition of the tech podcast.

<ul>
<li> <a href="https://technology.jaredrimer.net/2019/09/22/the-book-scam-me-if-you-can/">The book Scam Me If You Can </a> the Tech blog and podcast September 22, 2019 </li><li> <a href="https://technology.jaredrimer.net/2019/09/22/scott-schober-writes-new-book-will-be-out-october-1/">Scott Schober writes new book, will be out October 1 </a> The Tech blog and podcast September 22, 2019 </li>
<li> <a href="https://technology.jaredrimer.net/2019/09/22/are-your-kids-being-safe-on-social-media-a-school-district-is-teaching-the-dos-and-donts-of-social-media/">Are your kids being safe on social media? A school district is teaching the dos and don’ts of social media </a> The Tech blog and podcast September 22, 2019 </li>
<li> 
<li> <a href="https://www.fox29.com/news/8-year-old-texas-boy-suffers-brain-injury-after-attack-by-bullies">8-year-old Texas boy suffers brain injury after attack by bullies </a> Fox29 news (no date given) </li>
</ul>

One thing I should mention is that Scott's book is available on Amazon as a non-kindle purchase, Kindle will be released October 1.  He offered to send me a released copy, but since I can't read print, I'll wait for the digital version.  Thanks Scott for offering to send it, it was appreciated. Thanks for reading the notes, and feel free to leave those comments!  Contact information is available at the end of each and every podcast.  
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895304</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895304/the-technology-blog/2025_02_13_04_00_58_51f98928-7c0e-4138-832b-588d847efc01.mp3" length="63802619" type="audio/mpeg"/>
      <guid isPermaLink="false">2c62e7e6-ae37-dc97-feae-813e12102581</guid>
      <itunes:duration>3983</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 29 Sep 2019 22:27:15 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f42bf86f825d694ef991d360563c31dc.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 323: Ecuador gets owned, Philmore, and Braille]]></title>
      <itunes:title><![CDATA[Tech podcast 323: Ecuador gets owned, Philmore, and Braille]]></itunes:title>
      <description><![CDATA[Welcome to podcast 323 of the technology blog and podcast series. On this podcast, we've got several segments for you.

<ul>Blog Post </a> </li>
<li> What do you see when you hear or see the words "heat stroke?"  It isn't anything to do with the sun, and this I saw while working on the prior podcast.  <a href="https://technology.jaredrimer.net/2019/09/14/what-do-you-think-when-you-hear-the-words-heat-stroke/">blog post </a> </li>
<li> Three items in one, dealing with the company Philmore Productions.  Have they learned anything?  Two messages and an accompanying <a href="https://technology.jaredrimer.net/2019/09/19/philmore-admits-confirmation-of-what-the-network-has-said-for-months/">blog post on the subject </a> indicate probably not.  I'll be caucious and indicate that things better change, or it will more than likely be the end.  We'll have to see.  Please read the blog post, as well as listen to two messages in his own words.  Let me know what you think of this one. </li>
<li> In two segments, I cover the transcription course as well as talking about braille in general in regards to paper braille VS display braille. </li>
</ul>

I hope you enjoy the program as much as I have, and thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895305</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895305/the-technology-blog/2025_02_13_04_11_44_32742637-abdf-48fb-9786-0af3e8d1ee4e.mp3" length="74386254" type="audio/mpeg"/>
      <guid isPermaLink="false">fcb202a6-85e4-deab-7d21-86258d02998a</guid>
      <itunes:duration>4644</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 21 Sep 2019 00:21:07 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3992b4fd841dbc43a2cb616dbf81b9cf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 322: Philmore and tech gone wrong, braille transcription, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 322: Philmore and tech gone wrong, braille transcription, and more]]></itunes:title>
      <description><![CDATA[https://en.wikipedia.org/wiki/PhishingWelcome back to the technology blog and podcast, this is podcast 322 of the continuing series covering everything tech including assistive tech, self driving cars, the security landscape and more. This podcast is packed and even three articles that are on one topic, <a href="https://en.wikipedia.org/wiki/Phishing">Phishing. </a> Lets take this opportunity and give you the breakdown of today's program, and I hope you'll consider contacting me with your thoughts and comments on these topics.

<ul>
<li> Philmore Productions has had it bad with the technology as of late.  I put a senario in place as a thought piece. Let me know what you think. </li>
<li> An unofficial report on assignment 15 was released, where I knew I had to fix some things, and yet I have read everything.  Its going to get interesting once I'm ready, and I've sent my official assignment. Still pushing through. </li>
<li> A self driving car has had it bad.  This isn't the first for this make and model, and I have a hunch that this can be fixed.  The strech of highway, according to the article I read, is to blame, where something wasn't fixed, and the car got in to an accident.  Multiple cars got in to an accident at the same spot. <a href="https://technology.jaredrimer.net/2019/09/09/california-highway-barrier-not-repaired-before-fatal-tesla-crash/">California highway barrier not repaired before fatal Tesla crash from blog The Technology blog and podcast </a> is the article, and it links to the article of the same name where you can read more. </li>
<li> In our Phishing segment, three articles come together with some alarming statistics.  Its not going away any time soon. The first article which caps off this segment is entitled <a href="https://info.phishlabs.com/blog/how-social-media-is-abused-for-phishing-attacks">Why Social Media is Increasingly Abused for Phishing Attacks. </a> Just take a look at this stat: "In 2018 we found that the abuse of social media increased by near 200%" and if thats not enough, Phishlabs expects this to increase.  I am not surprised, and this article is linked to other material.  In another article <a href="https://www.zdnet.com/article/cybersecurity-99-of-email-attacks-rely-on-victims-clicking-links/">Cybersecurity: 99% of email attacks rely on victims clicking links </a> which means we need to continue to teach.  Its OK to be curious, but yet, you should know the signs and we need to make sure we slow down and look at what we're clicking on.  Finally, to cap this off, Techwarm, a contributer to the blog, posted <a href="https://technology.jaredrimer.net/2019/09/11/what-is-phishing-learn-how-to-protect-your-company/">What is Phishing: Learn How to Protect Your Company </a> which also links to some things and a great article to boot.  All of these articles are put together in a nice package and tied up with a bow. </li>
</ul>

I hope you enjoy this 73 minute podcast.  I'd also like to thank Amadeus, maintainer of <a href="http://www.livewireusa.net">Live Wire </a>  for putting this podcast as a podcast on Live Wire.  Besides my show at 2276, people who read the RSS can now subscribe to a board to get the podcast if they wish.  That board number is 974, so enjoy your options!  Thanks so much for participating, and we'll see you next time!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895306</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895306/the-technology-blog/2025_02_13_04_17_35_dd9ede8d-92aa-48c7-9e4e-4ac6d3e09b69.mp3" length="70909894" type="audio/mpeg"/>
      <guid isPermaLink="false">3f4624b6-ad10-90ad-cc71-993e88436086</guid>
      <itunes:duration>4427</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Mon, 16 Sep 2019 16:45:51 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d856474f35e3fbbcfe7750bf247c21c7.jpg"/>
    </item>
    <item>
      <title><![CDATA[technology podcast 321]]></title>
      <itunes:title><![CDATA[technology podcast 321]]></itunes:title>
      <description><![CDATA[In the better late than never department, I put podcast 321 together on the 2nd.

Welcome to podcast 321 of the technology blog and podcast. In no way am I complaining at all, but I really think that braille transcription software, no matter what you use, should be a tool. When I started lesson 15, discussed in full in the first segment, I found that I seemed very confused.  Its not graded yet, and I'm sure I have a few things to correct before my first submission, but I'm confident I'll understand it.  This article entitled <a href="https://technology.jaredrimer.net/2019/08/25/transcription-software-cant-do-it-all-even-braille-2000-doesnt-have-every-possibility/">Transcription software can’t do it all: Even Braille 2000 doesn’t have every possibility </a> is a written aspect, but the first 30 minute segment goes in to an audio detail of the lesson and my confusions.  Next, a very interesting ted talk dealing with storing data and DNA.  I mention telephone systems including Live Wire, MyTelespace, and Philmore Productions Voice mail as examples of systems that could utalize this if it were to ever happen and how Philmore Productions could do things better and how Live Wire hasn't lost any data because of a different backup routine.  No trashing is going on here, but the talk and the recent Philmore Productions news about their data made me think about this a little more.  Next, Armando is along with a very interesting talk about the Iphone and how we can utalize it without a home button.  I relate an experience with a supervisor of a company when I showed him how Voice Over worked, and he didn't have a home button.  Contact info on both sides of the program is given.  Thanks for listening!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895308</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895308/the-technology-blog/2025_02_13_04_36_52_1e79ab02-16b3-4289-807c-ec9a07fb85af.mp3" length="81361232" type="audio/mpeg"/>
      <guid isPermaLink="false">19edbcfb-5c84-5b24-506a-a136e4272965</guid>
      <itunes:duration>5085</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sat, 07 Sep 2019 22:05:04 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_2c80898c0070dfc5efc8015333c232cf.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 320: what tech do I have?]]></title>
      <itunes:title><![CDATA[Tech podcast 320: what tech do I have?]]></itunes:title>
      <description><![CDATA[On this podcast, Sonos, google home, the front door lock, and even a braille transcription update as well. Also, Aira and their announcement of a free 5 minute service which I've utalized and its very efficient. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895310</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895310/the-technology-blog/2025_02_13_04_12_35_c6650038-d6a8-4c56-a578-3c833973d9c4.mp3" length="60641084" type="audio/mpeg"/>
      <guid isPermaLink="false">34643c40-55a8-b1e4-7060-818c0c1ab477</guid>
      <itunes:duration>3786</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 25 Aug 2019 18:58:13 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_39630b1cdfeb696e6f8b41a0e62d4f50.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 319: its been awhile, and we're packed]]></title>
      <itunes:title><![CDATA[Technology podcast 319: its been awhile, and we're packed]]></itunes:title>
      <description><![CDATA[We're packed on this episode, but yet I've made sure we've got a wide variety of stuff.

Tech podcast 319 has Philmore, is it getting worse? The Capitalone Breach since we've been gone, Braille Transcription, and more. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895311</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895311/the-technology-blog/2025_02_13_04_38_57_4a9161ea-91a5-4541-a31b-0ab9d13c7117.mp3" length="72690143" type="audio/mpeg"/>
      <guid isPermaLink="false">8bd52d1b-e018-8f78-f55b-4b7f09a33dd3</guid>
      <itunes:duration>4538</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 18 Aug 2019 23:31:52 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_6670c28e48069ffbce2fb23655cb03b0.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 318 for July 2, 2019]]></title>
      <itunes:title><![CDATA[Tech podcast 318 for July 2, 2019]]></itunes:title>
      <description><![CDATA[Welcome to the tech podcast, this is show 318. I'll be in the process of reloacting, so this may be the last podcast until the relocation is complete. I'm hopeful that the relocating process will go well, and I'll be available through contact methods mentioned throughout the program should you have questions and concerns.

<ul>
<li> We talk about URL shorteners.  <a href="http://cutt.us">Cutt.us </a> and similar services can be a target of spam.  This service, along with a couple of others, allow the visitor to report suspicious links.  These services allow the shortening of long URL links to shorten one for sharing.  Reporting suspicious URL's may be a start, but I'm going to try and get recaptcha on one of my biggest sites to see if it can curve this problem. </li>
<li> In segment 2, we finish the talking of shorteners by talking briefly about another service similar to the one I link above, and then we demonstrate braille 2000's grade relaxer.  This particular part of the application was already working, but some accessibility fixes were made, and with the beta, I present to you how the relaxer can be used in a classroom setting. </li>
<li> We take a song break.  In the last segment, we had relaxed <a href="http://magnatune.com/artists/gokul_salvadi/">Gokul Salvadi </a> to demo how this is done.  I thought the music would be perfect to play one track, and you can leave your thoughts. </li>
<li> Finally, Equifax and Myspace are back in the news.  <a href="http://technology.jaredrimer.net/2019/07/01/when-myspace-was-king-employees-abused-a-tool-called-overlord-to-spy-on-users/">When Myspace Was King, Employees Abused a Tool Called ‘Overlord’ to Spy on Users from blog The Technology blog and podcast </a> | <a href>Former Equifax exec sentenced to 4 months in prison for insider trading related to data breach </a> </li>
</ul>

Our contact information is at the end of the program.  I'm hoping that the relocating process goes well for me, and if something big comes out, I'll do my best to get it out quickly.  If not, then I'll be back once I'm settled in.  Thanks for listening, and thanks for your continued support.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895313</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895313/the-technology-blog/2025_02_13_04_39_17_fd0b4a98-6cf0-4fce-a2ec-4160be554b8e.mp3" length="66009734" type="audio/mpeg"/>
      <guid isPermaLink="false">fa9d7311-6405-de63-83e8-190d8f5ad295</guid>
      <itunes:duration>4121</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Fri, 05 Jul 2019 03:15:44 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_3dd0e863df34cc27f2ce41a92c0f43c6.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 317: the security landscape, Braille 2000, and more]]></title>
      <itunes:title><![CDATA[Technology podcast 317: the security landscape, Braille 2000, and more]]></itunes:title>
      <description><![CDATA[Welcome to tech podcast 317.

<ul>
<li> How is our security as of late? Is the landscape good or bad? What are your thoughts on it? </li>
<li> Braille 200 has a very interesting update. <a href="http://technology.jaredrimer.net/2019/06/18/braille-2000-has-interesting-childrens-program-made-accessible/">Braille 2000 has interesting childrens program, made accessible </a> is the article, and I talk about my work with this area of Braille 2000. <a href="http://technology.jaredrimer.net/category/braille-2000/">Here is the Braille 2000 category </a> that you can link to on the blog. It is the entire history of what I've been up too with Bob. We may have talked about this, but there are other odds and ends we tlak about if this was not talked about in this segment.  If not, and you want me to cover it in detail, I can do that.  The segment is Braille 2000 where we are at this point.  </li>
<li> Jaws gets an update that fixes a major bug in Adobe.  It also fixes other odds and ends as well, not just that.  <a href="http://technology.jaredrimer.net/2019/06/14/jaws-gets-an-update-fixes-major-adobe-bug-other-fixes-too/">blog post </a> for those who need it. </li>
<li> Mirai and Trickbot are back in the news.  <a href="http://technology.jaredrimer.net/2019/06/16/trick-bot-is-back-still-on-the-loose/">Blog post </a> on the topic. </li>
<li> I saw an article on email and 5 signs on what to do if its hacked. <a href="http://technology.jaredrimer.net/2019/06/15/what-to-do-if-your-email-gets-hacked/">Blog post. </a> </li>
<li> Phishing sites and their trends.  What do you think will happen?  <a href="https://info.phishlabs.com/blog/more-than-half-of-phishing-sites-use-https">Phish Labs blog post </a> has all the juicy details. </li>
<li> Michael in Indiana has a Philmore update.  A month or so ago, Philmore Productions voice mail went down due to weather related activity.  Its been a month or there abouts, and its still mostly down.  The good news, Philmore did use an array, so the data isn't lost, but the web site remains down.  Listen to all the details. </li>
</ul>

Contact information is available at the end of the program. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895314</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895314/the-technology-blog/2025_02_13_03_46_16_6537b3b1-bdc7-4a43-bb2e-f18eb8515a1a.mp3" length="71544090" type="audio/mpeg"/>
      <guid isPermaLink="false">8578fe38-384e-0dde-fe7a-bf4898306a86</guid>
      <itunes:duration>4466</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 23 Jun 2019 16:14:54 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_97fa128abcb1a6b28d043eef29c7a22b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 316: wetransfer, braille 2000, and IP addresses and scammers]]></title>
      <itunes:title><![CDATA[Tech podcast 316: wetransfer, braille 2000, and IP addresses and scammers]]></itunes:title>
      <description><![CDATA[Hello folks, welcome to the tech podcast, podcast 316. On this podcast, we cover <a href="http://www.wetransfer.com">We Transfer. </a> This is a service that was used to deliver files to me, and I actually like its interface. If it is right, I could see myself paying for it, but right now, I don't need to do that. I talk about this service and what it has to offer. Next <a href="http://technology.jaredrimer.net/2019/05/27/braille-2000-v2-274-take-2-were-getting-better/">Braille 2000 V2.274 take 2: we’re getting better </a> is the accompanying article and I talk about a new menu that will appear once the talking edition becomes available to the general public hopefully very soon. The beta can now be recommended, and you should contact Bob to get your copy.  Finally, Krebs on Security is here with an article <a href="https://krebsonsecurity.com/2019/05/a-tough-week-for-ip-address-scammers/">A Tough Week for IP Address Scammers </a> is discussed.  I hope you enjoy the program as much as I have, and thanks so much for listening to the program!  

 The opinions expressed are those of the show notes, and may not necessarily represent the companies in which they represent. 

See you next time!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895315</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895315/the-technology-blog/2025_02_13_04_18_46_8502af04-dbd9-4051-b481-7dd138b2be89.mp3" length="46539417" type="audio/mpeg"/>
      <guid isPermaLink="false">6af09c88-ff35-3e69-0cbe-a0c5f52ec7a8</guid>
      <itunes:duration>2905</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 30 May 2019 19:02:55 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_818101a526ed8e6a3cf4b687e0c1e03b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 315 fr May 23, 2019]]></title>
      <itunes:title><![CDATA[Technology podcast 315 fr May 23, 2019]]></itunes:title>
      <description><![CDATA[Sorry for the delay in publishing, we've ran in to a technical issue, which I've found a work around. 

On this podcast, lessons 13-15 are talked about of the braille transcription course. Next, IOS 12.3. It does fix one of the bugs I've had. Next, one ring scams, and how it relates to a book I read in 2018 called Hacked Again. Contact info at the end of the program. Enjoy!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895316</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895316/the-technology-blog/2025_02_13_04_08_56_ed8f9a82-7bd0-44bf-b0de-aac4157d1a9e.mp3" length="68987446" type="audio/mpeg"/>
      <guid isPermaLink="false">2789c9cc-398f-d1de-a7d0-8f99a0d8e84c</guid>
      <itunes:duration>4307</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 26 May 2019 17:27:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_d6bc8acad181e91a9becbe33fe407ccb.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 314: new and old tech, braille transcription, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 314: new and old tech, braille transcription, and more]]></itunes:title>
      <description><![CDATA[On this podcast, tech moving too fast: do you think it is? Next, a braille transcription fail, big time. Gaelynn Lea, an artist on CD Baby, is disabled and yet involved in touring and more. I pick a track from this artist and we feature it. Finally, a tech talk dealing with a wristwatch to aid the blind and others in navigation. Search the tedtalk out on Youtube or Ted's website. <a href="https://store.cdbaby.com/Artist/GaelynnLea">CD Baby page for Gaelynn Lea </a> so you can read more about her.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895318</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895318/the-technology-blog/2025_02_13_04_20_43_dba27a1a-4ea6-461c-bdf9-d01955af7dbf.mp3" length="65954514" type="audio/mpeg"/>
      <guid isPermaLink="false">7ccd03c0-2354-b0f5-6b47-e1af9a4363ba</guid>
      <itunes:duration>4117</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Wed, 15 May 2019 01:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_07ea478305f8875d12d682a18d83d970.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 313: Wipro, Braille 2000, and more]]></title>
      <itunes:title><![CDATA[Tech podcast 313: Wipro, Braille 2000, and more]]></itunes:title>
      <description><![CDATA[Welcome to the technology blog and podcast, podcast 313. We've got a lot for you in a wide variety of news, notes, Braille 2000 stuff, and more.

<ul>
<li> Wipro (pronounced We Pro) is in the news big time. There are three articles which are talked about in the first segment. </li>
<li> The 2019 Phishing Trends and Intellegence Report is out.  Some very interesting stats within this article that I discuss. </li>
<li> Julian Assange was recently picked up for violating the CFAA according to a report. I thought I saw multiple articles, but one article was retrieved. I talk about this development. </li>
<li> Braille 2000 is getting ready to release  their next version.  In a segment, I talk about the Braille 2000 percent codes in general, highlighting the entire list that  I have, skipping some which aren't available yet. They're talked about in passing, but no code is discussed in full. The web site has removed Version 1 of the software, and version 2 that has been ran is now on the home page. </li>
<li> Two ted talks about seizures and heart attacks are talked about and the full talks are played in full. You can search the talks separately through YouTube on the ted talks channel. </li>
</ul>

The articles dealing with Wipro are hard to swallow.  Clearly, nobody knows what is happening, but hopefully they've found the issue and corrected it.  Being an IT company, you need to understand these things and do proper PR.  The PR here was not good, and I'm sure they'll feel the reprocussions for awhile.

A list of articles that accompany the podcast follows:

<ul>
<li> <a href="https://info.phishlabs.com/blog/2019-phishing-trends-intelligence-report-the-evolving-threat">2019 Phishing Trends & Intelligence Report: The Growing Social Engineering Threat </a> Phishlabs blog April 16, 2019 </li>
<li> <a href="https://www.cyberscoop.com/anonymous-assange-offshoots-britain-ecuador-attacks/">Anonymous offshoots rush to avenge Assange arrest with cyberattacks </a> Cyberscoop April 19, 2019 </li>
<li> <a href="https://krebsonsecurity.com/2019/04/experts-breach-at-it-outsourcing-giant-wipro/">Experts: Breach at IT Outsourcing Giant Wipro </a> Krebs On Security April 15, 2019 </li>
<li> <a href="https://krebsonsecurity.com/2019/04/how-not-to-acknowledge-a-data-breach/">How Not to Acknowledge a Data Breach </a> Krebs On Security April 17, 2019 </li>
<li> <a href="https://krebsonsecurity.com/2019/04/wipro-intruders-targeted-other-major-it-firms/">Wipro Intruders Targeted Other Major IT Firms </a> Krebs On Security April 18, 2019 </li>
</ul>

Enjoy the podcast, it lasts 72 minutes long.  Thanks for listening and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895319</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895319/the-technology-blog/2025_02_13_03_46_47_cd582939-26e3-4f68-93e7-0815d5e2a45f.mp3" length="69251700" type="audio/mpeg"/>
      <guid isPermaLink="false">ad916003-4fa5-5af7-e874-6c3ce3a26b86</guid>
      <itunes:duration>4323</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 30 Apr 2019 01:00:00 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_fcd52a627f386ec6cb30ece3aec88c6e.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 312: braille transcription software, laced malware, and email signature discussion]]></title>
      <itunes:title><![CDATA[Tech podcast 312: braille transcription software, laced malware, and email signature discussion]]></itunes:title>
      <description><![CDATA[On this podcast, braille transcription software updates using percent codes. A woman got caught with malware on USB drives when going to a place claiming they were there for an event. Finally, we talk about signatures in general, and my thoughts on whether they should have specifics on what device the mail was sent from. Contact info is at the end.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895320</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895320/the-technology-blog/2025_02_13_03_47_37_8b1d0e46-7feb-4ad6-aa62-6698d62fc43e.mp3" length="54583323" type="audio/mpeg"/>
      <guid isPermaLink="false">715fea3b-a505-05f2-462a-ddd5620be753</guid>
      <itunes:duration>3407</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 18 Apr 2019 02:12:03 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_5e46ffd3edf82b674bafab9596b342a5.jpg"/>
    </item>
    <item>
      <title><![CDATA[Tech podcast 311: articles for discussion, transit app, and braille transcription]]></title>
      <itunes:title><![CDATA[Tech podcast 311: articles for discussion, transit app, and braille transcription]]></itunes:title>
      <description><![CDATA[Welcome to the technology podcast, podcast 311. We've got a very interesting braille transcription update which makes me very excited to push forward in this course. Besides that, a transit update, and we start with several articles in discussion.  The articles will be linked, and the podcast runs 82 minutes. I hope you enjoy the program!

<ul>
<li> <a href="https://krebsonsecurity.com/2019/03/alleged-child-porn-lord-faces-us-extradition/">Alleged Child Porn Lord Faces US Extradition </a> Krebs on Security March 22, 2019 </li> 
<li> <a href="https://krebsonsecurity.com/2019/03/facebook-stored-hundreds-of-millions-of-user-passwords-in-plain-text-for-years/">Facebook Stored Hundreds of Millions of User Passwords in Plain Text for Years </a> Krebs on Security March 21, 2019 </li>
<li> <a href="https://krebsonsecurity.com/2019/03/man-behind-fatal-swatting-gets-20-years/">Man Behind Fatal ‘Swatting’ Gets 20 Years </a> March 29, 2019 </li>
</ul>

Thanks so much for listening! That completes the article listings and do feel free to read them if the discussion interests you.  See you next podcast!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895321</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895321/the-technology-blog/2025_02_13_04_09_27_330b782f-4c97-4e9d-8b4f-2d9b228400cd.mp3" length="79640324" type="audio/mpeg"/>
      <guid isPermaLink="false">dace191d-5b24-f298-18fd-8c623c598bb0</guid>
      <itunes:duration>4972</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 07 Apr 2019 01:33:28 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_7a4784f71fa65d8c71383450be1a5bad.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 310: Cyberbullying, phones, privitization of messages, and more]]></title>
      <itunes:title><![CDATA[Technology podcast 310: Cyberbullying, phones, privitization of messages, and more]]></itunes:title>
      <description><![CDATA[Hello everyone, welcome to podcast 310. On this podcast, we've got a very diverse podcast for you.

<ul>Bullying, Is This Just a Disability Problem? </a> longevity.media May 2, 2017 </li>
<li> Privitizing messages in voice mail, is it a big deal?  Live wire made an announcement and change in regards to marking messages private which was received well.  In today's day in age, it is easy to take any private message and make a copy of it if you know how. Good idea? Bad idea? </li>
<li><a href="https://krebsonsecurity.com/2019/03/why-phone-numbers-stink-as-identity-proof/">Why Phone Numbers Stink As Identity Proof </a> is talked about next.  This article was written by Krebs on Security on the 17th of March.  It argues in part that giving out our mobile telephone numbers may be more of a problem, and we should use services including but not limited to Google and disposable numbers from Services like  <a href="https://www.textnow.com/">Text Now. </a> There are several people I know that have used, or are using the service in different ways. I'm sure there are other services that can be used too.
<li> <a href="http://technology.jaredrimer.net/2019/03/25/51-critical-cyber-bullying-statistics-in-2019/">51 Critical Cyber Bullying Statistics in 2019 </a> is linked from the blog to an article sent by Someone named Caroline Black.  She linked in an email to a post of mine from last year where bullying and cyberbullying was talked about.  This article has some very chilling stats, and its talking to others and bringing awareness to the problem that will solve it.  I talk about some of the statistics within this article and have invited Caroline to the podcast to discuss this. </li>
<li> <a href="http://technology.jaredrimer.net/2019/03/25/ios-and-mac-have-updates-today/">IOS and Mac have updates </a> is a short segment.  In this segment, the fact that IOS and Mac have updates is mentioned with info on how to find the posting where you can learn more. </li>
<li> Finally, <a href="http://textreminders.xyz">Text Reminders </a> is talked about.  There is no demo, but a description of the service, the fact it isn't free, and the basics about it.  I worked with the company behind this to make the site accessible. The service works, and I find it valuable. </li>
</ul>

As in all podcasts, contact information including Email, Imessage, and Text Messaging options is given at the end.  If you're listening by phone, leave public feedback, and if you want, have it aired on an upcoming podcast by letting me know.  The podcast lasts over an hour in length. Thanks so much for listening, and make it a great day!
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895323</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895323/the-technology-blog/2025_02_13_04_09_38_b432ebc8-022e-45d7-b807-369a05875e09.mp3" length="63905828" type="audio/mpeg"/>
      <guid isPermaLink="false">e394c036-04d7-237a-299a-f3e36ce46041</guid>
      <itunes:duration>3989</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 26 Mar 2019 21:08:57 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f03034bbbb81903c42221e208febf3c7.jpg"/>
    </item>
    <item>
      <title><![CDATA[The technology podcast 309: equifax, goldwave, and more]]></title>
      <itunes:title><![CDATA[The technology podcast 309: equifax, goldwave, and more]]></itunes:title>
      <description><![CDATA[On this podcast, Equifax is back in the news, and its not so great. Next, Live wire has shows, and we talk about it. Goldwave is talked about with something new I discovered that it can do. You may notice a change in the program. Sports and technology, what are they using? I know of some of it, but yet I may not be correct. Finally, my confussion on assignment 12, and some of my confusion explained. Thanks for your continued support in this podcast. 
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895324</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895324/the-technology-blog/2025_02_13_04_21_34_61fb2a4d-4a25-40a6-a692-9548b8b0345c.mp3" length="73270600" type="audio/mpeg"/>
      <guid isPermaLink="false">a99f6bd0-38ea-7475-da12-096ac6fd9c77</guid>
      <itunes:duration>4574</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Sun, 24 Mar 2019 04:08:21 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_1721a29d55afb37fd1001b5ec2cf6129.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 308: Satelites, Ground Zero closing, and more]]></title>
      <itunes:title><![CDATA[Technology podcast 308: Satelites, Ground Zero closing, and more]]></itunes:title>
      <description><![CDATA[On this podcast, Ground Zero is closing. Why? Hear why in a segment. Satelites, can they be hacked? An article is very interesting, yet its not common. Michael in Indiana has an update on Vorail. Equifax is back in the news, and its not good. Finally, the 2018 trends from Trend Micro and their findings, something caught my attention about them.  I hope you enjoy the program.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895325</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895325/the-technology-blog/2025_02_13_04_21_27_df12c2ae-9cc2-4c4a-94ae-431eead98473.mp3" length="48737801" type="audio/mpeg"/>
      <guid isPermaLink="false">5b232709-051f-77d6-6736-75ff5caf1a97</guid>
      <itunes:duration>3042</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Tue, 12 Mar 2019 21:15:18 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_f95a8e4348264ed25f3a24c506ed318b.jpg"/>
    </item>
    <item>
      <title><![CDATA[Technology podcast 307 for March 7, 2019]]></title>
      <itunes:title><![CDATA[Technology podcast 307 for March 7, 2019]]></itunes:title>
      <description><![CDATA[Hello folks, we've got braille transcription for assignment 10, Philmore productions in the news again, and some news notes. Hope you enjoy the program.
]]></description>
      <link>https://rss.com/podcasts/the-technology-blog/1895326</link>
      <enclosure url="https://content.rss.com/episodes/316363/1895326/the-technology-blog/2025_02_13_04_21_39_edc32670-9ff5-45a5-afee-1e7a0b6130d6.mp3" length="49187785" type="audio/mpeg"/>
      <guid isPermaLink="false">ac014825-47d2-71bc-3de2-63a8d2192216</guid>
      <itunes:duration>3071</itunes:duration>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:explicit>false</itunes:explicit>
      <pubDate>Thu, 07 Mar 2019 18:16:59 GMT</pubDate>
      <itunes:image href="https://media.rss.com/the-technology-blog/cover_36b99f7939d87bc58380824481b7f8ab.jpg"/>
    </item>
  </channel>
</rss>