<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/800285.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Darnley&#39;s Cyber Café</title>

  <lastBuildDate>Sat, 07 Mar 2026 00:30:11 -0500</lastBuildDate>
  <link>https://darnleyscybercafe.buzzsprout.com</link>
  <language>en-ca</language>
  <copyright>© 2026 Darnley&#39;s Cyber Café</copyright>
  <podcast:locked>yes</podcast:locked>
  <podcast:funding url="https://www.buymeacoffee.com/darnleyscyber">Support this Podcast</podcast:funding>
  <podcast:guid>f2305f49-a126-53bf-9f83-fdeb64f13ba6</podcast:guid>
  <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>Cyber security,infosec,it security,itsec,cyber education,cyber awareness,security,cyber,info security,it security,cybersecurity</itunes:keywords>
  <itunes:owner>
    <itunes:name>Darnley&#39;s Cyber Café</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/kr4ydu8ms81arkhusqwnybqr53jz?.jpg</url>
     <title>Darnley&#39;s Cyber Café</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/kr4ydu8ms81arkhusqwnybqr53jz?.jpg" />
  <itunes:category text="Technology" />
  <itunes:category text="News">
    <itunes:category text="Tech News" />
  </itunes:category>
  <itunes:category text="Society &amp; Culture">
    <itunes:category text="Relationships" />
  </itunes:category>
  <podcast:person role="host" img="https://storage.buzzsprout.com/j9vrxa7vnmjirf5c50clm9kggjco">Darnley Greson Jr</podcast:person>
  <podcast:person role="editor" img="https://storage.buzzsprout.com/2adjgnnu41npn63bkbtt4ap8jxlh">Arielle Brooks</podcast:person>
  <podcast:person role="editor" img="https://storage.buzzsprout.com/v6idbvjt9yjo1cszk7gfsc3gzup8">Nova Lin</podcast:person>
  <item>
    <itunes:title>Silent Breach: How Hackers Hide in Your Business Network</itunes:title>
    <title>Silent Breach: How Hackers Hide in Your Business Network</title>
    <itunes:summary><![CDATA[If your business was hacked today, would you know? Most companies discover cyber breaches 7 months after attackers infiltrate their networks. That's 207 days of undetected network intrusion, data theft, and security compromise. In this cybersecurity information episode, Darnley's reveals why silent data breaches happen, personal experience, how hackers remain undetected in business networks, and what signs indicate your company may already be compromised. Learn about: Average breach detection...]]></itunes:summary>
    <description><![CDATA[<p>If your business was hacked today, would you know? Most companies discover cyber breaches 7 months after attackers infiltrate their networks. That&apos;s 207 days of undetected network intrusion, data theft, and security compromise.</p><p>In this cybersecurity information episode, Darnley&apos;s reveals why silent data breaches happen, personal experience, how hackers remain undetected in business networks, and what signs indicate your company may already be compromised.</p><p><b>Learn about:</b></p><ul><li>Average breach detection time and why dwell time matters for business security</li><li>How cybercriminals use stealth tactics to evade network security tools</li><li>Real-world data breach examples: Target, Equifax, and Marriott hotel breach cases</li><li>Warning signs of network compromise most IT security teams miss</li><li>Threat detection strategies to identify cyber attacks before massive data loss</li><li>Incident response planning and cybersecurity monitoring best practices</li></ul><p>Discover how to detect network intrusions faster, reduce breach dwell time, and protect your business from silent cyber attacks. Whether you&apos;re a small business owner, IT professional, or security manager, this episode provides actionable cybersecurity advice.</p><p>The silent breach is only silent if you&apos;re not listening. Learn how to protect your business network today.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>If your business was hacked today, would you know? Most companies discover cyber breaches 7 months after attackers infiltrate their networks. That&apos;s 207 days of undetected network intrusion, data theft, and security compromise.</p><p>In this cybersecurity information episode, Darnley&apos;s reveals why silent data breaches happen, personal experience, how hackers remain undetected in business networks, and what signs indicate your company may already be compromised.</p><p><b>Learn about:</b></p><ul><li>Average breach detection time and why dwell time matters for business security</li><li>How cybercriminals use stealth tactics to evade network security tools</li><li>Real-world data breach examples: Target, Equifax, and Marriott hotel breach cases</li><li>Warning signs of network compromise most IT security teams miss</li><li>Threat detection strategies to identify cyber attacks before massive data loss</li><li>Incident response planning and cybersecurity monitoring best practices</li></ul><p>Discover how to detect network intrusions faster, reduce breach dwell time, and protect your business from silent cyber attacks. Whether you&apos;re a small business owner, IT professional, or security manager, this episode provides actionable cybersecurity advice.</p><p>The silent breach is only silent if you&apos;re not listening. Learn how to protect your business network today.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18777388-silent-breach-how-hackers-hide-in-your-business-network.mp3" length="15104957" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kmvv30w5o8c49lwypdg520wee90z?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18777388</guid>
    <pubDate>Wed, 04 Mar 2026 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="32.308" duration="33.0" />
    <itunes:duration>1254</itunes:duration>
    <itunes:keywords>data breach detection, cybersecurity podcast, network security, threat detection, dwell time, breach discovery, IT security monitoring, business hacking prevention, cyber attack detection, incident response, SIEM, security monitoring, network intrusion, s</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The End of Private Thought: How Predictive Algorithms Reshape Privacy and Human Behavior</itunes:title>
    <title>The End of Private Thought: How Predictive Algorithms Reshape Privacy and Human Behavior</title>
    <itunes:summary><![CDATA[In this episode of Darnley’s Cyber Café, we explore a deeper question about modern privacy: what happens when systems don’t need your words to understand you? From behavioural research to predictive algorithms, studies show that digital traces: clicks, pauses, search queries, and browsing patterns all can reveal personality traits, emotional states, and future behaviour with surprising accuracy. As artificial intelligence and data modelling improve, privacy may no longer end when we speak. It...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Darnley’s Cyber Café, we explore a deeper question about modern privacy: what happens when systems don’t need your words to understand you?</p><p>From behavioural research to predictive algorithms, studies show that digital traces: clicks, pauses, search queries, and browsing patterns all can reveal personality traits, emotional states, and future behaviour with surprising accuracy. As artificial intelligence and data modelling improve, privacy may no longer end when we speak. It may narrow before we decide.</p><p>This episode examines the documented research behind predictive systems, how they shape outcomes through ranking and nudging, and why awareness matters in a world where thought leaves a shadow.</p><p>If you care about AI, digital privacy, algorithmic influence, or the future of human autonomy, this conversation is for you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Darnley’s Cyber Café, we explore a deeper question about modern privacy: what happens when systems don’t need your words to understand you?</p><p>From behavioural research to predictive algorithms, studies show that digital traces: clicks, pauses, search queries, and browsing patterns all can reveal personality traits, emotional states, and future behaviour with surprising accuracy. As artificial intelligence and data modelling improve, privacy may no longer end when we speak. It may narrow before we decide.</p><p>This episode examines the documented research behind predictive systems, how they shape outcomes through ranking and nudging, and why awareness matters in a world where thought leaves a shadow.</p><p>If you care about AI, digital privacy, algorithmic influence, or the future of human autonomy, this conversation is for you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18664118-the-end-of-private-thought-how-predictive-algorithms-reshape-privacy-and-human-behavior.mp3" length="7785193" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/1smem9hj72lzzbhgy8godp4jdsy4?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18664118</guid>
    <pubDate>Wed, 18 Feb 2026 02:00:00 -0700</pubDate>
    <itunes:duration>643</itunes:duration>
    <itunes:keywords>digitalprivacy,AIethics,predictivealgorithms,behavioraldata,algorithmicbias,privatethought,datasurveillance,searchprivacy,AIandprivacy,datainference,behaviorprediction,cybersecuritypodcast,techphilosophy,algorithmicinfluence,digitalrights</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Quiet Shift: AI Acceleration and the Rise of Digital Minimalism</itunes:title>
    <title>The Quiet Shift: AI Acceleration and the Rise of Digital Minimalism</title>
    <itunes:summary><![CDATA[After exploring artificial intelligence, acceleration, and what the future seems to be racing toward, a quieter question emerges. What happens after we realize this isn’t slowing down? In this episode of Darnley’s Cyber Café, Darnley reflects on the growing sense of digital fatigue that follows constant AI updates, automation, and always-on technology...and the subtle shift many people are making in response, including himself. This casual conversation looks at digital minimalism not as an an...]]></itunes:summary>
    <description><![CDATA[<p>After exploring artificial intelligence, acceleration, and what the future seems to be racing toward, a quieter question emerges.</p><p>What happens <em>after</em> we realize this isn’t slowing down?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, Darnley reflects on the growing sense of digital fatigue that follows constant AI updates, automation, and always-on technology...and the subtle shift many people are making in response, including himself.</p><p>This casual conversation looks at digital minimalism not as an anti-technology stance, but as a human recalibration: choosing fewer tools, quieter systems, and more intentional use in a world that keeps asking for more attention.</p><p>A reflective pause between where we’ve been talking about the future… and how we’re choosing to live inside it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>After exploring artificial intelligence, acceleration, and what the future seems to be racing toward, a quieter question emerges.</p><p>What happens <em>after</em> we realize this isn’t slowing down?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, Darnley reflects on the growing sense of digital fatigue that follows constant AI updates, automation, and always-on technology...and the subtle shift many people are making in response, including himself.</p><p>This casual conversation looks at digital minimalism not as an anti-technology stance, but as a human recalibration: choosing fewer tools, quieter systems, and more intentional use in a world that keeps asking for more attention.</p><p>A reflective pause between where we’ve been talking about the future… and how we’re choosing to live inside it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18652739-the-quiet-shift-ai-acceleration-and-the-rise-of-digital-minimalism.mp3" length="7366590" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zrpylh4f0zgqj3mjnkpvk6crgohd?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18652739</guid>
    <pubDate>Wed, 11 Feb 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18652739/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Opening" />
  <psc:chapter start="1:16" title="Reflect on AI Episodes " />
  <psc:chapter start="1:39" title="The Acceleration Hangover" />
  <psc:chapter start="2:48" title="When Everything Becomes Ambient" />
  <psc:chapter start="3:38" title="Where Digital Minimalism Appears" />
  <psc:chapter start="4:16" title="Minimalism Isn’t Anti-Tech" />
  <psc:chapter start="4:55" title="Why This Is Happening Now?" />
  <psc:chapter start="5:38" title="Convenience Solved Effort: Not Purpose" />
  <psc:chapter start="6:15" title="The Quiet Rebellion" />
  <psc:chapter start="7:16" title="Privacy, Minimalism, and Peace" />
  <psc:chapter start="8:32" title="Back to the Café / Final Thoughts" />
</psc:chapters>
    <itunes:duration>609</itunes:duration>
    <itunes:keywords>ai,digitalminimalism,technologyfatigue,artificialintelligence,privacy,cybersecurity,futureoftechnology,digitalwellbeing,attentioneconomy,techculture,humanandai,digitalprivacy,technoir,automation,consciouscomputing</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When AI Talks to Itself: What Moltbook Signals About Our Future With AI</itunes:title>
    <title>When AI Talks to Itself: What Moltbook Signals About Our Future With AI</title>
    <itunes:summary><![CDATA[What happens when AI stops talking to us... and starts talking to itself? In this episode of Darnley’s Cyber Café, we explore the rise of AI-only social spaces and what they reveal about the direction technology is quietly moving. Inspired by the emergence of Moltbook (OpenClaw), this conversation looks beyond fear and headlines to examine how human absence, automation, and efficiency are reshaping decision-making and trust. Pull up a chair. The conversation’s just beginning. Click here to se...]]></itunes:summary>
    <description><![CDATA[<p>What happens when AI stops talking to us... and starts talking to itself?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we explore the rise of AI-only social spaces and what they reveal about the direction technology is quietly moving.</p><p>Inspired by the emergence of Moltbook (OpenClaw), this conversation looks beyond fear and headlines to examine how human absence, automation, and efficiency are reshaping decision-making and trust.</p><p>Pull up a chair. The conversation’s just beginning.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What happens when AI stops talking to us... and starts talking to itself?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we explore the rise of AI-only social spaces and what they reveal about the direction technology is quietly moving.</p><p>Inspired by the emergence of Moltbook (OpenClaw), this conversation looks beyond fear and headlines to examine how human absence, automation, and efficiency are reshaping decision-making and trust.</p><p>Pull up a chair. The conversation’s just beginning.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18612773-when-ai-talks-to-itself-what-moltbook-signals-about-our-future-with-ai.mp3" length="7510547" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4skgo0rjetwa8pvgk05swucoq6zp?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-18612773</guid>
    <pubDate>Wed, 04 Feb 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18612773/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Opening" />
  <psc:chapter start="3:06" title="What Moltbook Is, and Why It Matters" />
  <psc:chapter start="4:25" title="This Isn’t a Breakaway, It’s a Reflection" />
  <psc:chapter start="5:24" title="Futures That Depend on How Present We Stay" />
  <psc:chapter start="6:40" title="Shadow IT Through a Human Lens" />
  <psc:chapter start="7:35" title="Guardrails Without Handcuffs" />
  <psc:chapter start="8:33" title="Closing - Direction, Not Alarm" />
</psc:chapters>
    <itunes:duration>619</itunes:duration>
    <itunes:keywords>ai,artificialintelligence,aiethics,moltbook,openclaw,cybersecurity,shadowit,technology,futureofai,aiandhumanity,digitalgovernance,emergingtech,techpolicy,automation,datasecurity,cyberpodcast,technoir,moltbook,aionlysocialnetwork,aitalkingtoai,aisocialnetw</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When AI Cites AI: ChatGPT, Grokipedia, and the Future of Trust Online</itunes:title>
    <title>When AI Cites AI: ChatGPT, Grokipedia, and the Future of Trust Online</title>
    <itunes:summary><![CDATA[AI is starting to cite other AI as a source, and most people don’t realize what that means yet or will it be too late? In this episode of Darnley’s Cyber Café, we look at reports of ChatGPT citing Grokipedia, an AI-generated encyclopedia, and why this signals a deeper shift in how information is created, recycled, and trusted. As AI gets better at generating text, audio, and video, the real challenge isn’t spotting the fake; it’s knowing where anything actually came from. A conversation about...]]></itunes:summary>
    <description><![CDATA[<p>AI is starting to cite other AI as a source, and most people don’t realize what that means yet or will it be too late?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we look at reports of ChatGPT citing Grokipedia, an AI-generated encyclopedia, and why this signals a deeper shift in how information is created, recycled, and trusted.</p><p>As AI gets better at generating text, audio, and video, the real challenge isn’t spotting the fake; it’s knowing where anything actually came from.</p><p>A conversation about AI, trust, provenance, and why verification matters more than ever.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>AI is starting to cite other AI as a source, and most people don’t realize what that means yet or will it be too late?</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we look at reports of ChatGPT citing Grokipedia, an AI-generated encyclopedia, and why this signals a deeper shift in how information is created, recycled, and trusted.</p><p>As AI gets better at generating text, audio, and video, the real challenge isn’t spotting the fake; it’s knowing where anything actually came from.</p><p>A conversation about AI, trust, provenance, and why verification matters more than ever.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18572988-when-ai-cites-ai-chatgpt-grokipedia-and-the-future-of-trust-online.mp3" length="7323909" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zg946dwo51d6naoavlraov1rkefr?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18572988</guid>
    <pubDate>Wed, 28 Jan 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18572988/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:31" title="What’s Grokipedia, and what’s being reported? " />
  <psc:chapter start="2:49" title="The real issue: AI citation laundering" />
  <psc:chapter start="4:22" title="Pros and cons: what’s gained, what’s at risk" />
  <psc:chapter start="5:57" title="The next 12 months: deepfakes, audio manipulation, and trust erosion " />
  <psc:chapter start="7:28" title="Practical takeaways " />
  <psc:chapter start="8:59" title="Final Thoughts / Cafe Closing" />
</psc:chapters>
    <itunes:duration>605</itunes:duration>
    <itunes:keywords>artificialintelligence,aiethics,chatgpt,groks,aihallucinations,deepfakes,digitaltrust,misinformation,disinformation,cybersecurity,dataintegrity,contentprovenance,aiandtruth,technologynews,syntheticmedia</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Your Car Is Listening: EVs, Data, and the Quiet Privacy Tradeoff</itunes:title>
    <title>Your Car Is Listening: EVs, Data, and the Quiet Privacy Tradeoff</title>
    <itunes:summary><![CDATA[Electric vehicles don’t just move through the city...they observe it. In this episode of Darnley’s Cyber Café, we step inside the modern EV to examine what smart cars collect, store, and transmit. Microphones, cameras, GPS logs, and cloud systems quietly turn vehicles into rolling data platforms, mapping routines, relationships, and movement over time. The episode also touches on why Chinese EVs entering North American markets raise a different class of privacy and security concerns: where ve...]]></itunes:summary>
    <description><![CDATA[<p>Electric vehicles don’t just move through the city...they observe it.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we step inside the modern EV to examine what smart cars collect, store, and transmit. Microphones, cameras, GPS logs, and cloud systems quietly turn vehicles into rolling data platforms, mapping routines, relationships, and movement over time.</p><p>The episode also touches on why Chinese EVs entering North American markets raise a different class of privacy and security concerns: where vehicle data, state access, and long-term leverage begin to intersect.</p><p>A conversation about technology, memory, and what happens when the machine knows more than the driver.</p><p>Some systems don’t need to speak loudly to listen.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Electric vehicles don’t just move through the city...they observe it.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we step inside the modern EV to examine what smart cars collect, store, and transmit. Microphones, cameras, GPS logs, and cloud systems quietly turn vehicles into rolling data platforms, mapping routines, relationships, and movement over time.</p><p>The episode also touches on why Chinese EVs entering North American markets raise a different class of privacy and security concerns: where vehicle data, state access, and long-term leverage begin to intersect.</p><p>A conversation about technology, memory, and what happens when the machine knows more than the driver.</p><p>Some systems don’t need to speak loudly to listen.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18541683-your-car-is-listening-evs-data-and-the-quiet-privacy-tradeoff.mp3" length="7645749" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zydp0eobsgau1r8ri6bpdw4nxmh5?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18541683</guid>
    <pubDate>Wed, 21 Jan 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18541683/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:11" title="EVs Aren’t Just Cars Anymore" />
  <psc:chapter start="2:34" title="“Everything Collects Data”… So What’s the Difference?" />
  <psc:chapter start="4:08" title="“I’m Not Important” " />
  <psc:chapter start="5:19" title="When The World Changes" />
  <psc:chapter start="6:39" title="Practical Steps EV Owners Can Take Today" />
  <psc:chapter start="9:05" title="The Café End" />
</psc:chapters>
    <itunes:duration>631</itunes:duration>
    <itunes:keywords>EVprivacy,electricvehicledata,smartcarsurveillance,vehicleprivacrisks,EVcybersecurity,connectedcarsecurity,ChineseEVs,automotivecybersecurity,datasovereignty,incartracking,vehiclecameras,digitalprivacy,cybersecuritypodcast,privacypodcast,DarnleysCyberCafe</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Instagram Data Leak: What 17.5 Million Exposed Accounts Really Mean for Your Privacy</itunes:title>
    <title>Instagram Data Leak: What 17.5 Million Exposed Accounts Really Mean for Your Privacy</title>
    <itunes:summary><![CDATA[A quiet data exposure tied to millions of Instagram accounts is raising new questions about privacy, trust, and how modern scams really work. In this episode of Darnley’s Cyber Café, we look at why this incident matters even without a confirmed breach, how small pieces of data quietly increase risk, and what you can do to better protect your Instagram account. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lates...]]></itunes:summary>
    <description><![CDATA[<p>A quiet data exposure tied to millions of Instagram accounts is raising new questions about privacy, trust, and how modern scams really work.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we look at why this incident matters even without a confirmed breach, how small pieces of data quietly increase risk, and what you can do to better protect your Instagram account.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A quiet data exposure tied to millions of Instagram accounts is raising new questions about privacy, trust, and how modern scams really work.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we look at why this incident matters even without a confirmed breach, how small pieces of data quietly increase risk, and what you can do to better protect your Instagram account.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18502392-instagram-data-leak-what-17-5-million-exposed-accounts-really-mean-for-your-privacy.mp3" length="6456987" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/33iby1ctbvsnzcjfmtq0si66wi8e?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18502392</guid>
    <pubDate>Wed, 14 Jan 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18502392/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:01" title="What Actually Happened" />
  <psc:chapter start="2:02" title="Why This Leak Is Dangerous" />
  <psc:chapter start="2:46" title="&quot;I&#39;m Not Important Enough&quot;" />
  <psc:chapter start="3:54" title="Harden Your Instagram (How To)" />
  <psc:chapter start="7:26" title="The Big Picture" />
  <psc:chapter start="8:06" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>533</itunes:duration>
    <itunes:keywords>instagram data leak, instagram security, instagram privacy, social media data breach, online privacy, cybersecurity podcast, digital privacy, data exposure, phishing scams, account security, two factor authentication, social engineering, personal data pro</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Age of the First Phone: What Parents Should Know</itunes:title>
    <title>The Age of the First Phone: What Parents Should Know</title>
    <itunes:summary><![CDATA[When should a child get their first smartphone? For many families, the decision doesn’t feel deliberate...it just happens. A birthday, a hand-me-down, a safety reason, or the sense that everyone else is already there. In this episode of Darnley’s Cyber Café, we slow the conversation down and take a closer look at when kids get their first phone, and why that timing matters more than most people realize. We touch on health, emotional development, and the quieter issues around privacy and digit...]]></itunes:summary>
    <description><![CDATA[<p>When should a child get their first smartphone?</p><p>For many families, the decision doesn’t feel deliberate...it just happens. A birthday, a hand-me-down, a safety reason, or the sense that everyone else is already there.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we slow the conversation down and take a closer look at <em>when</em> kids get their first phone, and why that timing matters more than most people realize.</p><p>We touch on health, emotional development, and the quieter issues around privacy and digital exposure, and what parents can realistically do without overreacting or banning technology altogether based on a recent study published in <em>Pediatrics.</em></p><p>Pull up a chair, grab a coffee</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When should a child get their first smartphone?</p><p>For many families, the decision doesn’t feel deliberate...it just happens. A birthday, a hand-me-down, a safety reason, or the sense that everyone else is already there.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we slow the conversation down and take a closer look at <em>when</em> kids get their first phone, and why that timing matters more than most people realize.</p><p>We touch on health, emotional development, and the quieter issues around privacy and digital exposure, and what parents can realistically do without overreacting or banning technology altogether based on a recent study published in <em>Pediatrics.</em></p><p>Pull up a chair, grab a coffee</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18471458-the-age-of-the-first-phone-what-parents-should-know.mp3" length="7640093" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/flnmw4iaxbgc8dqja1xqijjk06s8?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18471458</guid>
    <pubDate>Sun, 11 Jan 2026 04:00:00 -0700</pubDate>
    <itunes:duration>631</itunes:duration>
    <itunes:keywords>parenting,podcast,parenting podcast,children and smartphones,first smartphone,kids and technology,digital parenting,screen time for kids,child mental health,adolescent mental health,online safety for kids,child privacy,digital privacy,cybersecurity awaren</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Wired Data Breach and Why “Non-Sensitive” Data Puts You at Risk</itunes:title>
    <title>The Wired Data Breach and Why “Non-Sensitive” Data Puts You at Risk</title>
    <itunes:summary><![CDATA[In this episode of Darnley’s Cyber Café, we slow things down and look at a recent data leak involving Wired to understand what these incidents actually mean for everyday people. Millions of records. No passwords. No credit cards. And yet,  there is real risk. Using a real-world breach as the starting point, this conversation explores how seemingly harmless pieces of information can quietly add up over time, why delayed consequences are often the most dangerous, and what small, deliberate...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of <b>Darnley’s Cyber Café</b>, we slow things down and look at a recent data leak involving <em>Wired </em>to understand what these incidents actually mean for everyday people.</p><p>Millions of records. No passwords. No credit cards. And yet,  there is real risk.</p><p>Using a real-world breach as the starting point, this conversation explores how seemingly harmless pieces of information can quietly add up over time, why delayed consequences are often the most dangerous, and what small, deliberate steps can help you stay in control of your digital footprint.</p><p>This isn’t a headline recap. It’s a reflection on how data moves, how trust erodes, and why awareness still matters.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of <b>Darnley’s Cyber Café</b>, we slow things down and look at a recent data leak involving <em>Wired </em>to understand what these incidents actually mean for everyday people.</p><p>Millions of records. No passwords. No credit cards. And yet,  there is real risk.</p><p>Using a real-world breach as the starting point, this conversation explores how seemingly harmless pieces of information can quietly add up over time, why delayed consequences are often the most dangerous, and what small, deliberate steps can help you stay in control of your digital footprint.</p><p>This isn’t a headline recap. It’s a reflection on how data moves, how trust erodes, and why awareness still matters.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18457191-the-wired-data-breach-and-why-non-sensitive-data-puts-you-at-risk.mp3" length="8667173" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5lv7t1ctpgpdc7779vzlcyky5h8z?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18457191</guid>
    <pubDate>Wed, 07 Jan 2026 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18457191/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Welcome To The Cafe " />
  <psc:chapter start="0:47" title="Wired Breach - What Happened?" />
  <psc:chapter start="2:20" title="Why This is &quot;A Big Deal&quot;" />
  <psc:chapter start="5:41" title="Cafe Talk: My Perspective " />
  <psc:chapter start="7:43" title="Story To Action" />
  <psc:chapter start="8:03" title="What You Can Actually Do" />
  <psc:chapter start="10:40" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>717</itunes:duration>
    <itunes:keywords>cybersecurity,data breach,data leaks,online privacy,digital privacy,personal data,identity theft,phishing scams,cyber awareness,information security,technology news,privacy protection,online safety,data security,cyber risk</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The LastPass Breach That Never Ended: How Weak Passwords Still Cost Millions</itunes:title>
    <title>The LastPass Breach That Never Ended: How Weak Passwords Still Cost Millions</title>
    <itunes:summary><![CDATA[In this journey from Darnley’s Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident. But this isn’t just a story about what happened.  It’s about what never stopped. From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn narrative uncovers how one breach spiraled far beyond the headlines...into homes, businesses, and the darkest corners of the web. Whether you'r...]]></itunes:summary>
    <description><![CDATA[<p>In this journey from <em>Darnley’s Cyber Café</em>, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident.</p><p>But this isn’t just a story about what happened.<br/> It’s about what never stopped.</p><p>From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn narrative uncovers how one breach spiraled far beyond the headlines...into homes, businesses, and the darkest corners of the web.</p><p>Whether you&apos;re a cybersecurity pro, a digital minimalist, or someone who&apos;s ever reused a password (you know who you are), this episode will shift the way you think about data security.</p><p>☕ Settle in. The café is dim. The breach... still echoes after all these years...</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this journey from <em>Darnley’s Cyber Café</em>, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident.</p><p>But this isn’t just a story about what happened.<br/> It’s about what never stopped.</p><p>From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn narrative uncovers how one breach spiraled far beyond the headlines...into homes, businesses, and the darkest corners of the web.</p><p>Whether you&apos;re a cybersecurity pro, a digital minimalist, or someone who&apos;s ever reused a password (you know who you are), this episode will shift the way you think about data security.</p><p>☕ Settle in. The café is dim. The breach... still echoes after all these years...</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18419489-the-lastpass-breach-that-never-ended-how-weak-passwords-still-cost-millions.mp3" length="6761412" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aabfqamvuujox9si6fe1lyzzl9th?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18419489</guid>
    <pubDate>Sun, 28 Dec 2025 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18419489/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:19" title="What Actually Happened" />
  <psc:chapter start="2:18" title="What This Didn&#39;t Stop" />
  <psc:chapter start="3:22" title="Why Crypto Made This Worse" />
  <psc:chapter start="4:21" title="The Russian Cybercrime" />
  <psc:chapter start="5:06" title="Why Everyone Should Care" />
  <psc:chapter start="6:13" title="Businesses are not Immune" />
  <psc:chapter start="7:04" title="Basic Cyber Hygiene" />
  <psc:chapter start="7:46" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>559</itunes:duration>
    <itunes:keywords>lastpass breach, lastpass hack, data breach podcast, cybersecurity podcast, password manager hacked, digital security, crypto theft, seed phrase stolen, password vault leak, organized cybercrime, how hackers steal data, MFA, cyber hygiene, infosec podcast</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Biggest Professional Data Leak You’ve Never Heard Of (And Why It Matters)</itunes:title>
    <title>The Biggest Professional Data Leak You’ve Never Heard Of (And Why It Matters)</title>
    <itunes:summary><![CDATA[A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime targets, and what this kind of data means in the hands of modern attackers. If you think your work profile is harmless… this conversation might chan...]]></itunes:summary>
    <description><![CDATA[<p>A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime targets, and what this kind of data means in the hands of modern attackers.</p><p>If you think your work profile is harmless… this conversation might change your mind.</p><p>Grab a drink and pull up a chair.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime targets, and what this kind of data means in the hands of modern attackers.</p><p>If you think your work profile is harmless… this conversation might change your mind.</p><p>Grab a drink and pull up a chair.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18366674-the-biggest-professional-data-leak-you-ve-never-heard-of-and-why-it-matters.mp3" length="7376312" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6n9s12cb6hkd869mpsm17prvtrh3?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18366674</guid>
    <pubDate>Wed, 24 Dec 2025 03:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18366674/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:30" title="The News" />
  <psc:chapter start="2:36" title="Why This Is Especially Dangerous Now" />
  <psc:chapter start="3:47" title="How We Are Affected " />
  <psc:chapter start="4:55" title="The AI Angle. Why This Changes Everything" />
  <psc:chapter start="5:53" title="Who Owns the Data? That’s the Other Problem" />
  <psc:chapter start="6:41" title="What Can YOU Do Right Now" />
  <psc:chapter start="8:23" title="The Bigger Picture" />
  <psc:chapter start="8:55" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>610</itunes:duration>
    <itunes:keywords>data breach, cyber security, ai scams, social engineering, linkedin data leak, personal data exposure, cybersecurity podcast, ai cybercrime, professional data leak, phishing attacks, identity theft, cyber awareness, data privacy, business cybersecurity, d</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The PornHub Data Exposure: What Was Leaked, Who’s at Risk, and Why It Matters Now</itunes:title>
    <title>The PornHub Data Exposure: What Was Leaked, Who’s at Risk, and Why It Matters Now</title>
    <itunes:summary><![CDATA[A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect.  In this episode of Darnley’s Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy. If you think this kind of breach doesn’t affect you, or that sensitive platforms operate differently, this is a conversation you’ll want to he...]]></itunes:summary>
    <description><![CDATA[<p>A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect.</p><p> In this episode of <em>Darnley’s Cyber Café</em>, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy.</p><p>If you think this kind of breach doesn’t affect you, or that sensitive platforms operate differently, this is a conversation you’ll want to hear. Pull up a chair, grab a coffee, and let’s talk about the side of data privacy no one likes to admit exists.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect.</p><p> In this episode of <em>Darnley’s Cyber Café</em>, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy.</p><p>If you think this kind of breach doesn’t affect you, or that sensitive platforms operate differently, this is a conversation you’ll want to hear. Pull up a chair, grab a coffee, and let’s talk about the side of data privacy no one likes to admit exists.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18380874-the-pornhub-data-exposure-what-was-leaked-who-s-at-risk-and-why-it-matters-now.mp3" length="5687941" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ixrij7zfgl9tlqpsim78mwh5rq8n?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18380874</guid>
    <pubDate>Sun, 21 Dec 2025 03:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18380874/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:16" title="What Actually Happened " />
  <psc:chapter start="2:17" title="Why This Is So Dangerous (And It’s Not What You Think)" />
  <psc:chapter start="3:38" title="The AI Angle " />
  <psc:chapter start="4:30" title="Why This Isn’t the User’s Fault (But Still Their Risk)" />
  <psc:chapter start="5:09" title="What Users Should Do Right Now" />
  <psc:chapter start="6:00" title="The Bigger Lesson (For Everyone)" />
  <psc:chapter start="6:29" title="Final Remarks / End" />
</psc:chapters>
    <itunes:duration>469</itunes:duration>
    <itunes:keywords>PornHub breach,data exposure,online privacy,cybersecurity podcast,AI and data tracking,personal data risk,privacy awareness,digital surveillance,ethical technology,cyber threats,online safety,AI misuse,data leaks,tech news podcast</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When AI Learns to Hack: OpenAI’s Warning and the Future of Cybersecurity</itunes:title>
    <title>When AI Learns to Hack: OpenAI’s Warning and the Future of Cybersecurity</title>
    <itunes:summary><![CDATA[Artificial intelligence is evolving fast and even the people building it are raising red flags. In this episode of Darnley’s Cyber Café, we unpack OpenAI’s recent warning that upcoming AI models could pose high cybersecurity risks, including the potential to assist in zero-day exploits and advanced intrusion operations. We explore what this really means for everyday users, businesses, and defenders where the benefits of AI-powered security end, where the risks begin, and why this moment feels...]]></itunes:summary>
    <description><![CDATA[<p>Artificial intelligence is evolving fast and even the people building it are raising red flags.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we unpack OpenAI’s recent warning that upcoming AI models could pose <b>high cybersecurity risks</b>, including the potential to assist in zero-day exploits and advanced intrusion operations.</p><p>We explore what this really means for everyday users, businesses, and defenders where the benefits of AI-powered security end, where the risks begin, and why this moment feels like a turning point for digital safety. From AI as a defensive tool to the uncomfortable reality of AI accelerating cybercrime, this is a conversation you don’t want to ignore.</p><p>Pull up a chair, grab a coffee, and let’s talk about where artificial intelligence meets real-world risk and how to protect yourself as the lines continue to blur.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Artificial intelligence is evolving fast and even the people building it are raising red flags.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we unpack OpenAI’s recent warning that upcoming AI models could pose <b>high cybersecurity risks</b>, including the potential to assist in zero-day exploits and advanced intrusion operations.</p><p>We explore what this really means for everyday users, businesses, and defenders where the benefits of AI-powered security end, where the risks begin, and why this moment feels like a turning point for digital safety. From AI as a defensive tool to the uncomfortable reality of AI accelerating cybercrime, this is a conversation you don’t want to ignore.</p><p>Pull up a chair, grab a coffee, and let’s talk about where artificial intelligence meets real-world risk and how to protect yourself as the lines continue to blur.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18356999-when-ai-learns-to-hack-openai-s-warning-and-the-future-of-cybersecurity.mp3" length="10360752" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/aut6ojfn0o3vl1p4spv9i4swg7l9?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18356999</guid>
    <pubDate>Wed, 17 Dec 2025 02:00:00 -0700</pubDate>
    <itunes:duration>858</itunes:duration>
    <itunes:keywords>artificial intelligence, ai cybersecurity, openai, cybersecurity risk, zero day exploits, cyber defense, ai threats, enterprise security, hacking, digital privacy, cybersecurity news, emerging technology, cyber awareness, data protection, future of ai</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Holiday Hackers: Why Cybercrime Spikes in December, And How to Stay Safe</itunes:title>
    <title>Holiday Hackers: Why Cybercrime Spikes in December, And How to Stay Safe</title>
    <itunes:summary><![CDATA[Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the psychology behind seasonal scams, the rise of phishing disguised as holiday deals, and how cybercriminals weaponize urgency and emotion when everyone...]]></itunes:summary>
    <description><![CDATA[<p>Cybercrime doesn’t take holidays off.</p><p>December is one of the busiest months for hackers. In this festive special of <em>Darnley’s Cyber Café</em>, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches.</p><p>We also unpack the psychology behind seasonal scams, the rise of phishing disguised as holiday deals, and how cybercriminals weaponize urgency and emotion when everyone’s guard is down.</p><p>Pour yourself something warm, settle in, and let’s make sure your holidays stay merry and <em>not malware-y</em>.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Cybercrime doesn’t take holidays off.</p><p>December is one of the busiest months for hackers. In this festive special of <em>Darnley’s Cyber Café</em>, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches.</p><p>We also unpack the psychology behind seasonal scams, the rise of phishing disguised as holiday deals, and how cybercriminals weaponize urgency and emotion when everyone’s guard is down.</p><p>Pour yourself something warm, settle in, and let’s make sure your holidays stay merry and <em>not malware-y</em>.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18332391-holiday-hackers-why-cybercrime-spikes-in-december-and-how-to-stay-safe.mp3" length="9689126" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/7b3opxb5unbrww8med08l3feeiyb?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18332391</guid>
    <pubDate>Wed, 10 Dec 2025 11:00:00 -0700</pubDate>
    <itunes:duration>803</itunes:duration>
    <itunes:keywords>Cybersecurity, holiday cybercrime, Christmas scams, online shopping safety, phishing attacks, identity theft prevention, cyber awareness, smart home security, privacy protection, digital safety, cyber scam prevention, holiday tech tips, Darnleys Cyber Caf</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Psychology of Ignoring Cybersecurity: Why We Think It Won’t Happen to Us</itunes:title>
    <title>The Psychology of Ignoring Cybersecurity: Why We Think It Won’t Happen to Us</title>
    <itunes:summary><![CDATA[Why do people ignore cybersecurity until it’s too late?  In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break down why cyber awareness is more urgent than ever, and how the small habits protect you more than you think. Grab your drink, settle into the ...]]></itunes:summary>
    <description><![CDATA[<p>Why do people ignore cybersecurity until it’s too late? </p><p>In this episode of <b>Darnley’s Cyber Café</b>, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break down why cyber awareness is more urgent than ever, and how the small habits protect you more than you think.</p><p>Grab your drink, settle into the café, and tune in to learn why knowledge really <em>is</em> power.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Why do people ignore cybersecurity until it’s too late? </p><p>In this episode of <b>Darnley’s Cyber Café</b>, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break down why cyber awareness is more urgent than ever, and how the small habits protect you more than you think.</p><p>Grab your drink, settle into the café, and tune in to learn why knowledge really <em>is</em> power.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18300282-the-psychology-of-ignoring-cybersecurity-why-we-think-it-won-t-happen-to-us.mp3" length="7600045" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8d9uvymj7f5bodfu5q33997dr5pt?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-18300282</guid>
    <pubDate>Sun, 07 Dec 2025 02:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/18300282/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:30" title="The Strange Habit of Ignoring Security (Even When We Know Better)" />
  <psc:chapter start="3:56" title="The Bathroom Stall Analogy: Why Privacy Matters (Even When We Think We’re “Safe”)" />
  <psc:chapter start="5:49" title="The Hidden Cost: What Happens When You Ignore Cybersecurity" />
  <psc:chapter start="7:25" title="Why It’s On Us to Care (and What We Can Do Right Now)" />
  <psc:chapter start="9:06" title="Closing Sip / Ending" />
</psc:chapters>
    <itunes:duration>630</itunes:duration>
    <itunes:keywords>cybersecurity awareness, privacy importance, human behavior cyber risk, why people ignore cybersecurity, digital privacy explanation, cyber psychology, cybersecurity podcast, online safety tips, modern privacy threats, cyber risk complacency, data breach </itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Your TV Turns Against You: The SmartTube Breach</itunes:title>
    <title>When Your TV Turns Against You: The SmartTube Breach</title>
    <itunes:summary><![CDATA[A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs.  In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecurity blind spots in the home. We also dig into the risks of sideloaded apps, what happens when a TV can “watch back,” and the simple steps you ...]]></itunes:summary>
    <description><![CDATA[<p>A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. </p><p>In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecurity blind spots in the home.</p><p>We also dig into the risks of sideloaded apps, what happens when a TV can “watch back,” and the simple steps you can take to protect your privacy before the next update rolls in.</p><p>A fast, eye-opening chat from Darnley’s Cyber Café. Grab a drink and tune in.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. </p><p>In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecurity blind spots in the home.</p><p>We also dig into the risks of sideloaded apps, what happens when a TV can “watch back,” and the simple steps you can take to protect your privacy before the next update rolls in.</p><p>A fast, eye-opening chat from Darnley’s Cyber Café. Grab a drink and tune in.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18288958-when-your-tv-turns-against-you-the-smarttube-breach.mp3" length="6552968" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mztyfqe47ppn9r3iv15vmzdklql8?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18288958</guid>
    <pubDate>Wed, 03 Dec 2025 02:00:00 -0700</pubDate>
    <itunes:duration>543</itunes:duration>
    <itunes:keywords>SmartTube breach, Android TV malware, smart TV cybersecurity, SmartTube compromised update, third-party app risks, TV malware attack, cyber privacy risks, home network security, malicious app signing key, YouTube client breach, IoT device vulnerabilities,</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Biorobotics &amp; Neuralink: How Tech Is Rewiring the Human Body</itunes:title>
    <title>Biorobotics &amp; Neuralink: How Tech Is Rewiring the Human Body</title>
    <itunes:summary><![CDATA[In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology.  From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly with the human body, this episode explores both the promise and the peril of becoming interconnected beings. We break down real-world exampl...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of <b>Darnley’s Cyber Café</b>, we dive into the fascinating, and slightly unsettling, world of <b>biorobotics</b>, where human biology meets advanced robotics and neural technology. </p><p>From groundbreaking innovations like <b>Neuralink</b>, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly with the human body, this episode explores both the promise <em>and</em> the peril of becoming interconnected beings.</p><p>We break down real-world examples, ethical concerns, emerging vulnerabilities, and the security challenges of implants, smart prosthetics, and bio-integrated devices. The future is closer than ever, and with every upgrade comes a new responsibility to protect our autonomy, privacy, and safety.</p><p>Grab a coffee, settle in, and discover what humanity looks like when technology becomes part of who we are... and why cybersecurity urgently must evolve alongside it.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of <b>Darnley’s Cyber Café</b>, we dive into the fascinating, and slightly unsettling, world of <b>biorobotics</b>, where human biology meets advanced robotics and neural technology. </p><p>From groundbreaking innovations like <b>Neuralink</b>, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly with the human body, this episode explores both the promise <em>and</em> the peril of becoming interconnected beings.</p><p>We break down real-world examples, ethical concerns, emerging vulnerabilities, and the security challenges of implants, smart prosthetics, and bio-integrated devices. The future is closer than ever, and with every upgrade comes a new responsibility to protect our autonomy, privacy, and safety.</p><p>Grab a coffee, settle in, and discover what humanity looks like when technology becomes part of who we are... and why cybersecurity urgently must evolve alongside it.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18265010-biorobotics-neuralink-how-tech-is-rewiring-the-human-body.mp3" length="6879853" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5t06nb74len5hnb0ee8jzp4hmuqz?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18265010</guid>
    <pubDate>Sun, 30 Nov 2025 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="126.077" duration="23.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/18265010/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:01" title="How Biorobotics Helps Humanity" />
  <psc:chapter start="2:31" title="The Darker Side of Body-Tech Integration" />
  <psc:chapter start="4:23" title="Middle Ground, Power &amp; Vulnerability" />
  <psc:chapter start="5:27" title="Real-World Examples " />
  <psc:chapter start="6:27" title="What Do We Do Next?" />
  <psc:chapter start="7:49" title="Closing sip / Ending" />
</psc:chapters>
    <itunes:duration>570</itunes:duration>
    <itunes:keywords>biorobotics, neuralink, brain computer interface, cyber security, cyber threats, biohacking, smart prosthetics, emerging technology, human augmentation, cybersecurity podcast, future of technology, privacy risks, tech ethics, cyber physical systems, neura</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster</itunes:title>
    <title>The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster</title>
    <itunes:summary><![CDATA[In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies.  We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect, and how businesses can spot warning signs before damage is done. If you’ve ever wondered how hackers exploit trust, how companies uncover h...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of <em>Darnley’s Cyber Café</em>, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. </p><p>We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect, and how businesses can spot warning signs before damage is done.</p><p>If you’ve ever wondered how hackers exploit trust, how companies uncover hidden risks, or how one employee can change everything, pull up a chair. This episode might make you look at your workplace… and your latte… a little differently.</p><p>Tune in to find out what’s really simmering beneath the surface.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of <em>Darnley’s Cyber Café</em>, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. </p><p>We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect, and how businesses can spot warning signs before damage is done.</p><p>If you’ve ever wondered how hackers exploit trust, how companies uncover hidden risks, or how one employee can change everything, pull up a chair. This episode might make you look at your workplace… and your latte… a little differently.</p><p>Tune in to find out what’s really simmering beneath the surface.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18246618-the-bad-apple-latte-how-one-insider-nearly-brewed-a-cyber-disaster.mp3" length="8172057" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/topsru5cbhdcczicoshom98frslx?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18246618</guid>
    <pubDate>Wed, 26 Nov 2025 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="612.429" duration="26.5" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/18246618/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:55" title="A Latte With a Side of Drama" />
  <psc:chapter start="2:07" title="Insider Threats Are the Hardest to Stop" />
  <psc:chapter start="3:39" title="How Do You Find the Bad Apple?" />
  <psc:chapter start="5:56" title="Psychological Profiling" />
  <psc:chapter start="7:34" title="So… What Can Businesses Actually Do?" />
  <psc:chapter start="9:24" title="The Aftertaste of This Whole Incident" />
  <psc:chapter start="10:13" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>677</itunes:duration>
    <itunes:keywords>CrowdStrike,insiderthreats,cybersecuritypodcast,cybercrime,databreach,ScatteredLapsusHunters,workplacesecurity,insiderattack,cyberawareness,humanrisk,cyberpsychology,companysecurity,cyberthreats,zerotrust,securityculture,hackergroups,infosecnews,cyberrisk</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies</itunes:title>
    <title>How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies</title>
    <itunes:summary><![CDATA[In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies.  We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these schemes are growing, and what you can do to stay protected. Tune in now — you don’t want to miss this one. Click here to send future episode recomm...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Darnley&apos;s Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. </p><p>We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these schemes are growing, and what you can do to stay protected.</p><p>Tune in now — you don’t want to miss this one.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Darnley&apos;s Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. </p><p>We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these schemes are growing, and what you can do to stay protected.</p><p>Tune in now — you don’t want to miss this one.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18213064-how-ordinary-people-are-accidentally-helping-hackers-break-into-global-companies.mp3" length="8696213" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kbfsoe5qrmh4sn5pmszz6hsflhtc?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18213064</guid>
    <pubDate>Wed, 19 Nov 2025 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="32.551" duration="21.0" />
    <itunes:duration>720</itunes:duration>
    <itunes:keywords>cybersecurity podcast, hacking threats, remote job scams, insider threat prevention, north korean hackers, corporate cyber attacks, identity theft scams, global cybercrime, fake IT workers, cyber espionage</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Love, Lies, and Data: The Risks of Online Dating</itunes:title>
    <title>Love, Lies, and Data: The Risks of Online Dating</title>
    <itunes:summary><![CDATA[Swipe right… but at what cost? 💔  In this episode of Darnley’s Cyber Café, Darnley steps into the world of online dating: where romance meets algorithms and your heart isn’t the only thing on the line. From catfishing to data leaks, location exposure to emotional manipulation, we unpack the hidden cybersecurity risks behind modern love. You’ll hear eye-opening examples of how digital breadcrumbs can lead to danger, along with smart, practical steps to protect yourself both online and off...]]></itunes:summary>
    <description><![CDATA[<p>Swipe right… but at what cost? 💔 </p><p>In this episode of <b>Darnley’s Cyber Café</b>, Darnley steps into the world of online dating: where romance meets algorithms and your heart isn’t the only thing on the line.</p><p>From catfishing to data leaks, location exposure to emotional manipulation, we unpack the hidden cybersecurity risks behind modern love. You’ll hear eye-opening examples of how digital breadcrumbs can lead to danger, along with smart, practical steps to protect yourself both online and off.</p><p>Whether you’re searching for “the one” or just curious about what happens behind the scenes of your favourite dating app, this episode is your digital reality check.</p><p>☕ Plug in, press play, and discover why love in the digital age requires more than a good profile; it demands awareness.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Swipe right… but at what cost? 💔 </p><p>In this episode of <b>Darnley’s Cyber Café</b>, Darnley steps into the world of online dating: where romance meets algorithms and your heart isn’t the only thing on the line.</p><p>From catfishing to data leaks, location exposure to emotional manipulation, we unpack the hidden cybersecurity risks behind modern love. You’ll hear eye-opening examples of how digital breadcrumbs can lead to danger, along with smart, practical steps to protect yourself both online and off.</p><p>Whether you’re searching for “the one” or just curious about what happens behind the scenes of your favourite dating app, this episode is your digital reality check.</p><p>☕ Plug in, press play, and discover why love in the digital age requires more than a good profile; it demands awareness.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18180522-love-lies-and-data-the-risks-of-online-dating.mp3" length="11274711" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gz8zi82bckv38owgpw9uf2nejdic?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18180522</guid>
    <pubDate>Thu, 13 Nov 2025 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="68.289" duration="29.0" />
    <itunes:duration>936</itunes:duration>
    <itunes:keywords>cybersecurity, online dating safety, dating app scams, romance scam awareness, data privacy, catfishing prevention, digital security, social engineering, online safety tips, personal data protection, cybercrime, digital footprint, internet safety, technol</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ghosts in the Chat: The Teams Message Manipulation Flaw</itunes:title>
    <title>Ghosts in the Chat: The Teams Message Manipulation Flaw</title>
    <itunes:summary><![CDATA[Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats.  In this episode of Darnley’s Cyber Café, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names. For deeper insight, revisit Season 6, Episode 3: “The Teams Trap.” Click here to send future episode recommendation Support the show Subscribe n...]]></itunes:summary>
    <description><![CDATA[<p>Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names.</p><p>For deeper insight, revisit <b>Season 6, Episode 3: “The Teams Trap.”</b></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names.</p><p>For deeper insight, revisit <b>Season 6, Episode 3: “The Teams Trap.”</b></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18146408-ghosts-in-the-chat-the-teams-message-manipulation-flaw.mp3" length="5613626" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/smqslfl7aqiakfh4ieoxan2nd4tn?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18146408</guid>
    <pubDate>Sun, 09 Nov 2025 02:00:00 -0700</pubDate>
    <itunes:duration>465</itunes:duration>
    <itunes:keywords>Microsoft Teams, cybersecurity, Check Point Research, message manipulation, spoofing, social engineering, vishing, business email compromise, BEC, executive impersonation, workplace security, zero trust, data protection, Sekur, privacy awareness, Darnley’</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> The Cybersecurity Perception Gap: Why Executives and IT Teams Don’t See Risk the Same Way</itunes:title>
    <title> The Cybersecurity Perception Gap: Why Executives and IT Teams Don’t See Risk the Same Way</title>
    <itunes:summary><![CDATA[Executives say they’re confident in their cybersecurity, but their teams aren’t so sure. In this episode of Darnley’s Cyber Café, we explore the growing cybersecurity perception gap between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025.   Tune in to uncover how confidence can turn into complacency, and how awareness can become your greatest defence. Click here to send future episode recommendation Support the ...]]></itunes:summary>
    <description><![CDATA[<p>Executives say they’re confident in their cybersecurity, but their teams aren’t so sure.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we explore the growing <em>cybersecurity perception gap</em> between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025.</p><p><br/> Tune in to uncover how confidence can turn into complacency, and how awareness can become your greatest defence.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Executives say they’re confident in their cybersecurity, but their teams aren’t so sure.</p><p>In this episode of <b>Darnley’s Cyber Café</b>, we explore the growing <em>cybersecurity perception gap</em> between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025.</p><p><br/> Tune in to uncover how confidence can turn into complacency, and how awareness can become your greatest defence.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18133441-the-cybersecurity-perception-gap-why-executives-and-it-teams-don-t-see-risk-the-same-way.mp3" length="12089144" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yd5v6lubpmt11f5v4ml62i9lnp1l?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18133441</guid>
    <pubDate>Wed, 05 Nov 2025 02:00:00 -0700</pubDate>
    <itunes:duration>1004</itunes:duration>
    <itunes:keywords>cybersecurity, perception gap, cyber awareness, executive risk, CISO, CIO, IT security, cyber resilience, data protection, digital privacy, business risk, cyber leadership, information security, cyber strategy, cyber threat intelligence, risk management, </itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Browsers Can’t Tell Friend From Foe: Use Them at Your Own Risk</itunes:title>
    <title>AI Browsers Can’t Tell Friend From Foe: Use Them at Your Own Risk</title>
    <itunes:summary><![CDATA[The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between your command and a malicious instruction coming from the page itself? In this episode of Darnley’s Cyber Café, we unpack the security blind spot nobody is talking about … it quietly hijacks your judgment. If you’ve already started trusting AI to i...]]></itunes:summary>
    <description><![CDATA[<p>The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between <b>your command</b> and a <b>malicious instruction coming from the page itself</b>?</p><p>In this episode of Darnley’s Cyber Café, we unpack the security blind spot nobody is talking about … it quietly <b>hijacks your judgment</b>. If you’ve already started trusting AI to interpret the internet for you, you may already be in the blast radius without realizing it.</p><p>Before you let a machine decide what you see and believe online, listen to this one.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between <b>your command</b> and a <b>malicious instruction coming from the page itself</b>?</p><p>In this episode of Darnley’s Cyber Café, we unpack the security blind spot nobody is talking about … it quietly <b>hijacks your judgment</b>. If you’ve already started trusting AI to interpret the internet for you, you may already be in the blast radius without realizing it.</p><p>Before you let a machine decide what you see and believe online, listen to this one.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18085240-ai-browsers-can-t-tell-friend-from-foe-use-them-at-your-own-risk.mp3" length="6093236" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tc5wk5p69bst7i0elhaeh2g7pg9l?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18085240</guid>
    <pubDate>Wed, 29 Oct 2025 03:00:00 -0600</pubDate>
    <itunes:duration>505</itunes:duration>
    <itunes:keywords>cybersecurity podcast,comet,atlas,AI Browser,cyber attack analysis,digital espionage,zero trust security,data privacy,global cyber threats,nation state hacking,infosec news,cyber breach breakdown,AI surveillance risks,security awareness,critical infrastru</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cyber Café Playbook: Safety Is a Story We Tell Ourselves</itunes:title>
    <title>The Cyber Café Playbook: Safety Is a Story We Tell Ourselves</title>
    <itunes:summary><![CDATA[This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital lands...]]></itunes:summary>
    <description><![CDATA[<p>This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18069482-the-cyber-cafe-playbook-safety-is-a-story-we-tell-ourselves.mp3" length="6854217" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0j0w1odahscj44xpyx6tkm95nsk0?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18069482</guid>
    <pubDate>Sun, 26 Oct 2025 03:00:00 -0600</pubDate>
    <itunes:duration>567</itunes:duration>
    <itunes:keywords>cybersecurity, data privacy, threat intelligence, digital surveillance, nation state actors, cyber warfare, corporate breaches, digital sovereignty, human nature in security, playbook episode, cyber awareness, security culture, podcast series, cybersecuri</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The F5 Breach: When Security Vendors Fail</itunes:title>
    <title>The F5 Breach: When Security Vendors Fail</title>
    <itunes:summary><![CDATA[A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a cybersecurity company is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “experts” get compromised. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on...]]></itunes:summary>
    <description><![CDATA[<p>A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a <b>cybersecurity company</b> is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “experts” get compromised.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a <b>cybersecurity company</b> is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “experts” get compromised.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18052986-the-f5-breach-when-security-vendors-fail.mp3" length="7227287" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dvw5p08f99sb9c2kurjantkpobgx?.jpg" />
    <itunes:author>Darnleys Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18052986</guid>
    <pubDate>Wed, 22 Oct 2025 02:00:00 -0600</pubDate>
    <itunes:duration>599</itunes:duration>
    <itunes:keywords>F5 breach, BIG-IP source code theft, nation state intrusion, cybersecurity vendor compromise, supply chain attack, persistent access, zero day exposure, product development breach, threat intelligence, Mandiant response, CrowdStrike incident response, ent</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Europe’s Digital Tug of War: The Fight for Cyber Independence</itunes:title>
    <title>Europe’s Digital Tug of War: The Fight for Cyber Independence</title>
    <itunes:summary><![CDATA[How independent is Europe in the digital world?  Join Darnley as we explore the hidden forces, technological risks, and global influences quietly shaping Europe’s data and markets. Sometimes the greatest friend is also the most formidable obstacle. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>How independent is Europe in the digital world? </p><p>Join Darnley as we explore the hidden forces, technological risks, and global influences quietly shaping Europe’s data and markets. Sometimes the greatest friend is also the most formidable obstacle.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>How independent is Europe in the digital world? </p><p>Join Darnley as we explore the hidden forces, technological risks, and global influences quietly shaping Europe’s data and markets. Sometimes the greatest friend is also the most formidable obstacle.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18023576-europe-s-digital-tug-of-war-the-fight-for-cyber-independence.mp3" length="6023306" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/08iaktculk8kqff9o4n63t1nk7n8?.jpg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-18023576</guid>
    <pubDate>Sun, 19 Oct 2025 02:00:00 -0600</pubDate>
    <itunes:duration>497</itunes:duration>
    <itunes:keywords>EU cyber sovereignty, digital independence, Europe cybersecurity, EU tech policy, cyber warfare, global cyber threats, NATO influence, US digital dominance, Russian cyber attacks, Chinese cyber espionage, data privacy, digital resilience, EU digital marke</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Signals in the Sky: The sky isn’t safe. Your data isn’t private.</itunes:title>
    <title>Signals in the Sky: The sky isn’t safe. Your data isn’t private.</title>
    <itunes:summary><![CDATA[Satellites. They orbit silently above our cities, our highways, even our homes — carrying our calls, texts, and sensitive data. But recent research has uncovered a chilling reality... many of these satellites are transmitting data completely unencrypted. In this episode of Darnley’s Cyber Café, we explore how ordinary signals, industrial communications, and even military traffic are floating unprotected through space, who could be listening, and why this matters now, for telecoms, national se...]]></itunes:summary>
    <description><![CDATA[<p>Satellites. They orbit silently above our cities, our highways, even our homes — carrying our calls, texts, and sensitive data.<br/>But recent research has uncovered a chilling reality... many of these satellites are transmitting data <b>completely unencrypted</b>.</p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore how ordinary signals, industrial communications, and even military traffic are floating unprotected through space, who could be listening, and why this matters now, for telecoms, national security, and everyday privacy.</p><p>Grab a coffee, lean in, and discover what’s really out there… above us.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Satellites. They orbit silently above our cities, our highways, even our homes — carrying our calls, texts, and sensitive data.<br/>But recent research has uncovered a chilling reality... many of these satellites are transmitting data <b>completely unencrypted</b>.</p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore how ordinary signals, industrial communications, and even military traffic are floating unprotected through space, who could be listening, and why this matters now, for telecoms, national security, and everyday privacy.</p><p>Grab a coffee, lean in, and discover what’s really out there… above us.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/18011467-signals-in-the-sky-the-sky-isn-t-safe-your-data-isn-t-private.mp3" length="5348691" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/lbuzoi83z2oplyg2xdyk73gnuyzl?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-18011467</guid>
    <pubDate>Wed, 15 Oct 2025 02:00:00 -0600</pubDate>
    <itunes:duration>442</itunes:duration>
    <itunes:keywords>satellite security, unencrypted data, military communications, telecom vulnerabilities, cybercrime, data leaks, industrial control systems, power grid security, mobile phone privacy, signal interception, satellite eavesdropping, IoT security, critical inf</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Empathy Algorithm</itunes:title>
    <title>The Empathy Algorithm</title>
    <itunes:summary><![CDATA[We explore the unsettling intersection between technology and emotion. When machines begin to understand, and imitate, human empathy. What happens to our sense of trust, vulnerability, and authenticity moving forward? Discover how artificial intelligence is learning to recognize distress, comfort users, and even mirror emotion,  and why that should make you pause before opening your next chat window. It’s a story about comfort, control, and the thin line between human feeling and synthet...]]></itunes:summary>
    <description><![CDATA[<p>We explore the unsettling intersection between technology and emotion. When machines begin to understand, and imitate, human empathy. What happens to our sense of trust, vulnerability, and authenticity moving forward?</p><p>Discover how artificial intelligence is learning to recognize distress, comfort users, and even mirror emotion,  and why that should make you pause before opening your next chat window.</p><p>It’s a story about comfort, control, and the thin line between human feeling and synthetic understanding.</p><p>Pull up a chair… and find out what happens when empathy becomes an algorithm.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We explore the unsettling intersection between technology and emotion. When machines begin to understand, and imitate, human empathy. What happens to our sense of trust, vulnerability, and authenticity moving forward?</p><p>Discover how artificial intelligence is learning to recognize distress, comfort users, and even mirror emotion,  and why that should make you pause before opening your next chat window.</p><p>It’s a story about comfort, control, and the thin line between human feeling and synthetic understanding.</p><p>Pull up a chair… and find out what happens when empathy becomes an algorithm.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17984674-the-empathy-algorithm.mp3" length="6927491" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/kaufs24zbzzgkt06a0vb87c9zflu?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17984674</guid>
    <pubDate>Thu, 09 Oct 2025 13:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17984674/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:29" title="GPT-5 Instant Update" />
  <psc:chapter start="1:51" title="AI Becomes Emotionally Aware" />
  <psc:chapter start="5:47" title="Protect ourselves from this emotional conflict with AI?" />
  <psc:chapter start="8:45" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>573</itunes:duration>
    <itunes:keywords>AI ethics, artificial empathy, emotional intelligence, data privacy, digital psychology, machine learning, OpenAI, GPT-5, human connection, cyber awareness, mental health and technology, emotional manipulation, AI and society, tech and emotion, digital we</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Toy That Spied on Kids</itunes:title>
    <title>The Toy That Spied on Kids</title>
    <itunes:summary><![CDATA[A new episode of Darnley’s Cyber Café is here, and it’s one you won’t want to miss. We dive into a shocking story about a familiar childhood pastime that takes an unexpected twist into the world of surveillance, privacy, and hidden risks. This isn’t just about toys, it’s about what’s happening behind the curtain in our digital world, and why parents should pay close attention. Pour yourself a cup, tune in, and discover why this story matters more than you think. Click here to send future epis...]]></itunes:summary>
    <description><![CDATA[<p>A new episode of <em>Darnley’s Cyber Café</em> is here, and it’s one you won’t want to miss. We dive into a shocking story about a familiar childhood pastime that takes an unexpected twist into the world of surveillance, privacy, and hidden risks.</p><p>This isn’t just about toys, it’s about what’s happening behind the curtain in our digital world, and why parents should pay close attention.</p><p>Pour yourself a cup, tune in, and discover why this story matters more than you think.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A new episode of <em>Darnley’s Cyber Café</em> is here, and it’s one you won’t want to miss. We dive into a shocking story about a familiar childhood pastime that takes an unexpected twist into the world of surveillance, privacy, and hidden risks.</p><p>This isn’t just about toys, it’s about what’s happening behind the curtain in our digital world, and why parents should pay close attention.</p><p>Pour yourself a cup, tune in, and discover why this story matters more than you think.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17952193-the-toy-that-spied-on-kids.mp3" length="6442953" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sluwez3sipgru1x11sh8wcta5fhu?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17952193</guid>
    <pubDate>Sun, 05 Oct 2025 03:00:00 -0600</pubDate>
    <itunes:duration>533</itunes:duration>
    <itunes:keywords>privacy, children’s safety, online safety, toy surveillance, data protection, digital parenting, cybersecurity, COPPA, FTC, Apitor, kids online, parental controls, child data privacy, internet safety, family security, child protection, tech awareness, dig</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>£5 Million Ransom. 700 Jobs Lost. One Weak Password.</itunes:title>
    <title>£5 Million Ransom. 700 Jobs Lost. One Weak Password.</title>
    <itunes:summary><![CDATA[One weak password. A business older than the telephone. Hundreds of jobs lost.   In this episode of Darnleys Cyber Café, Darnley examines a stunning real-world case of cybercrime that shows how even the most established organizations can fall overnight. You’ll learn how attackers exploit everyday security gaps, what happens inside a business during a ransomware crisis, and, most importantly, the practical steps you can take now to keep your own organization from becoming the next headline. Cl...]]></itunes:summary>
    <description><![CDATA[<p>One weak password. A business older than the telephone. Hundreds of jobs lost.<br/><br/></p><p>In this episode of <em>Darnleys Cyber Café</em>, Darnley examines a stunning real-world case of cybercrime that shows how even the most established organizations can fall overnight. You’ll learn how attackers exploit everyday security gaps, what happens inside a business during a ransomware crisis, and, most importantly, the practical steps you can take now to keep your own organization from becoming the next headline.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>One weak password. A business older than the telephone. Hundreds of jobs lost.<br/><br/></p><p>In this episode of <em>Darnleys Cyber Café</em>, Darnley examines a stunning real-world case of cybercrime that shows how even the most established organizations can fall overnight. You’ll learn how attackers exploit everyday security gaps, what happens inside a business during a ransomware crisis, and, most importantly, the practical steps you can take now to keep your own organization from becoming the next headline.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17925451-5-million-ransom-700-jobs-lost-one-weak-password.mp3" length="6314638" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3bfcwrmmi9bvr0u9ulqh1qk0x0q2?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17925451</guid>
    <pubDate>Wed, 01 Oct 2025 02:00:00 -0600</pubDate>
    <podcast:soundbite startTime="112.833" duration="30.0" />
    <itunes:duration>521</itunes:duration>
    <itunes:keywords>darnleys cyber cafe, cybersecurity, ransomware, password security, multi factor authentication, zero trust, data breach, business resilience, backups, cyber insurance, cyber attack prevention, credential security, small business security, ransomware case </itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>From Hollywood to Hardware: When AI Stories Come True</itunes:title>
    <title>From Hollywood to Hardware: When AI Stories Come True</title>
    <itunes:summary><![CDATA[Step inside Darnleys Cyber Café for a thought-provoking journey from The Terminator’s Skynet to the eerie futures of Black Mirror.  We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evo...]]></itunes:summary>
    <description><![CDATA[<p>Step inside <b>Darnleys Cyber Café</b> for a thought-provoking journey from <em>The Terminator</em>’s Skynet to the eerie futures of <em>Black Mirror</em>. </p><p>We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Step inside <b>Darnleys Cyber Café</b> for a thought-provoking journey from <em>The Terminator</em>’s Skynet to the eerie futures of <em>Black Mirror</em>. </p><p>We explore how pop culture’s AI nightmares echo today’s breakthroughs and what they might mean for tomorrow. Grab a coffee, press play, and question how close fiction is to becoming your reality.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17907150-from-hollywood-to-hardware-when-ai-stories-come-true.mp3" length="12812615" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8032bym777gu1o565tfajwovnxtp?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17907150</guid>
    <pubDate>Sun, 28 Sep 2025 02:00:00 -0600</pubDate>
    <podcast:soundbite startTime="97.0" duration="31.0" />
    <itunes:duration>1064</itunes:duration>
    <itunes:keywords>AI, artificial intelligence, Terminator, Skynet, James Cameron, Black Mirror, AI safety, OpenAI, future of AI, AI takeover, dystopian technology, autonomous weapons, algorithmic control, technology ethics, digital manipulation, AI evolution, machine learn</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cars, Code, and Cyberattacks</itunes:title>
    <title>Cars, Code, and Cyberattacks</title>
    <itunes:summary><![CDATA[A quiet data breach at Stellantis could be more than it seems. In this episode of Darnley’s Cyber Café, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry.  What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to find out. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lates...]]></itunes:summary>
    <description><![CDATA[<p>A quiet data breach at Stellantis could be more than it seems. In this episode of <em>Darnley’s Cyber Café</em>, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry.</p><p> What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to find out.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>A quiet data breach at Stellantis could be more than it seems. In this episode of <em>Darnley’s Cyber Café</em>, we take you inside the cyber underbelly of today’s automakers and explore how a single compromise can ripple through an entire industry.</p><p> What’s really at stake when cars, code, and global supply chains collide? Grab your coffee and tune in to find out.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17893342-cars-code-and-cyberattacks.mp3" length="6091342" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bqlqmjj5jq3a9iekzmad1a7kvnbb?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17893342</guid>
    <pubDate>Tue, 23 Sep 2025 12:00:00 -0600</pubDate>
    <podcast:soundbite startTime="23.629" duration="23.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/17893342/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:46" title="The News" />
  <psc:chapter start="2:12" title="Cyber In the Auto Industry" />
  <psc:chapter start="3:58" title="How A Cyberattack can Cascade" />
  <psc:chapter start="5:31" title="Lessons &amp; Takeaways" />
  <psc:chapter start="6:55" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>503</itunes:duration>
    <itunes:keywords>cybersecurity,automotive,stellantis,databreach,supplychainrisk,hacking,connectedcars,cyberattack,carindustry,vendorrisk,phishing,jaguarlandrover</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Lessons from Baltimore’s $1.5M BEC Attack</itunes:title>
    <title>Lessons from Baltimore’s $1.5M BEC Attack</title>
    <itunes:summary><![CDATA[When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams.  In this episode of Darnley’s Cyber Café, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday finance staff can do to stop them.  Learn simple, practical steps to verify vendor changes, protect sensitive systems, and respond quickly ...]]></itunes:summary>
    <description><![CDATA[<p>When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams. </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday finance staff can do to stop them. </p><p>Learn simple, practical steps to verify vendor changes, protect sensitive systems, and respond quickly if fraud is suspected.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When a fraudster posing as a vendor stole more than $1.5 million from the City of Baltimore, it exposed how even large public agencies can fall victim to Business Email Compromise (BEC) scams. </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we break down how the attack happened, why these schemes work, and what public-sector organizations and everyday finance staff can do to stop them. </p><p>Learn simple, practical steps to verify vendor changes, protect sensitive systems, and respond quickly if fraud is suspected.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17855208-lessons-from-baltimore-s-1-5m-bec-attack.mp3" length="5413582" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e0khzjbu473cn0lwp9ysx2p08qo7?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17855208</guid>
    <pubDate>Wed, 17 Sep 2025 02:00:00 -0600</pubDate>
    <podcast:soundbite startTime="67.365" duration="30.5" />
    <itunes:duration>447</itunes:duration>
    <itunes:keywords>cybersecurity,bec,publicsectorfraud,vendorscam,accounts payable,baltimore,workdaysecurity,financialfraudprevention,phishing,scamawareness,business email compromise,darnleyscybercafe</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Technology: The Cure is the Disease</itunes:title>
    <title>Technology: The Cure is the Disease</title>
    <itunes:summary><![CDATA[We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down. Grab a coffee, sit back, and laugh(or cry) while we wres...]]></itunes:summary>
    <description><![CDATA[<p>We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.</p><p>Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology <em>with</em> technology, and what you actually need to do to stay safe online.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We’re asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.</p><p>Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology <em>with</em> technology, and what you actually need to do to stay safe online.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17774570-technology-the-cure-is-the-disease.mp3" length="4490039" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/chmyfhl9almwnrbz25sg0raow247?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17774570</guid>
    <pubDate>Tue, 02 Sep 2025 11:00:00 -0600</pubDate>
    <podcast:soundbite startTime="11.356" duration="52.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/17774570/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction? " />
  <psc:chapter start="0:24" title="Technology is the problem" />
  <psc:chapter start="1:40" title="Cloud storage is a problem!" />
  <psc:chapter start="2:30" title="...Ok now the truth" />
  <psc:chapter start="5:32" title="Final Thoughts/End" />
</psc:chapters>
    <itunes:duration>367</itunes:duration>
    <itunes:keywords>cybersecurity,technology,satire,podcast,cybercrime,internet,techhumor,darnleyscybercafe,hacking,digitalprivacy,onlinesafety,infosec,cyberjokes,databreach,cyberawareness,cybersecuritytips,datasecurity,techtrends,itsecurity,digitalwellness,onlineprivacy,cyb</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Beware the Librarian Ghouls</itunes:title>
    <title>Beware the Librarian Ghouls</title>
    <itunes:summary><![CDATA[Darnley shines the proton pack spotlight on a real digital spooky fest: the “Librarian Ghouls” cyberattack campaign. These ghostly hackers are haunting machines while you sleep, using legit tools to sneak past defences and mine crypto in the shadows.  We break down what it means for everyday users, how to spot the signs, and simple ways to stay protected, no need to call Egon. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay...]]></itunes:summary>
    <description><![CDATA[<p>Darnley shines the proton pack spotlight on a real digital spooky fest: the “Librarian Ghouls” cyberattack campaign. These ghostly hackers are haunting machines while you sleep, using legit tools to sneak past defences and mine crypto in the shadows. </p><p>We break down what it means for everyday users, how to spot the signs, and simple ways to stay protected, no need to call Egon.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Darnley shines the proton pack spotlight on a real digital spooky fest: the “Librarian Ghouls” cyberattack campaign. These ghostly hackers are haunting machines while you sleep, using legit tools to sneak past defences and mine crypto in the shadows. </p><p>We break down what it means for everyday users, how to spot the signs, and simple ways to stay protected, no need to call Egon.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17359323-beware-the-librarian-ghouls.mp3" length="6410757" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dh3xekloksbcjwcls4jxbxla345o?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17359323</guid>
    <pubDate>Thu, 19 Jun 2025 02:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17359323/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:02" title="The Ghoulish Tactic: Living Off the Land" />
  <psc:chapter start="3:25" title="What They’re Really After" />
  <psc:chapter start="4:06" title="Why It Matters to You" />
  <psc:chapter start="4:40" title="How Do You Defend Yourself?" />
  <psc:chapter start="7:33" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>531</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Google Veo 3: When Seeing Isn’t Believing</itunes:title>
    <title>Google Veo 3: When Seeing Isn’t Believing</title>
    <itunes:summary><![CDATA[In this episode, we explore Google’s powerful new AI tool, Veo 3, and how it’s blurring the lines between reality and deception in video content. From deepfake scams to reputational attacks, we break down the real-world risks, and how cybercriminals could weaponize synthetic media against us all. Tune in for a thought-provoking look at truth, trust, and the future of online security. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and st...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we explore Google’s powerful new AI tool, <b>Veo 3</b>, and how it’s blurring the lines between reality and deception in video content. From deepfake scams to reputational attacks, we break down the real-world risks, and how cybercriminals could weaponize synthetic media against us all.</p><p>Tune in for a thought-provoking look at truth, trust, and the future of online security.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we explore Google’s powerful new AI tool, <b>Veo 3</b>, and how it’s blurring the lines between reality and deception in video content. From deepfake scams to reputational attacks, we break down the real-world risks, and how cybercriminals could weaponize synthetic media against us all.</p><p>Tune in for a thought-provoking look at truth, trust, and the future of online security.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17270127-google-veo-3-when-seeing-isn-t-believing.mp3" length="7338222" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/osvf5rvkeg5odngsovdv27xjg5gc?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17270127</guid>
    <pubDate>Tue, 03 Jun 2025 02:00:00 -0600</pubDate>
    <itunes:duration>607</itunes:duration>
    <itunes:keywords>AI video, deepfake, Veo 3, Google, cybersecurity, misinformation, synthetic media, digital deception, cybercrime, reputation attacks, social engineering, identity fraud, privacy awareness, content authentication, media manipulate</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Human Password Problem</itunes:title>
    <title>The Human Password Problem</title>
    <itunes:summary><![CDATA[Think your clever password is hacker-proof? Think again. In this episode, Darnley dives into why our very human brains—full of favorite pets, TV shows, and birthdates—are no match for modern password-cracking tools. With AI now guessing passwords better than ever, it's time to rethink how we protect our digital lives.  Tune in to learn what’s really going on behind the scenes, and what you should be doing instead.  Click here to send future episode recommendation Support the show Su...]]></itunes:summary>
    <description><![CDATA[<p>Think your clever password is hacker-proof? Think again. In this episode, Darnley dives into why our very human brains—full of favorite pets, TV shows, and birthdates—are no match for modern password-cracking tools. With AI now guessing passwords better than ever, it&apos;s time to rethink how we protect our digital lives. </p><p>Tune in to learn what’s really going on behind the scenes, and what you <em>should</em> be doing instead. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Think your clever password is hacker-proof? Think again. In this episode, Darnley dives into why our very human brains—full of favorite pets, TV shows, and birthdates—are no match for modern password-cracking tools. With AI now guessing passwords better than ever, it&apos;s time to rethink how we protect our digital lives. </p><p>Tune in to learn what’s really going on behind the scenes, and what you <em>should</em> be doing instead. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17243446-the-human-password-problem.mp3" length="6474328" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p5ikgg0xuu5omzogpri367rf65ps?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17243446</guid>
    <pubDate>Thu, 29 May 2025 02:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17243446/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:45" title="Humans Are Predictable" />
  <psc:chapter start="2:26" title="Dictionary Attacks &amp; Password Patterns" />
  <psc:chapter start="3:53" title="Rise of Smart Cracking" />
  <psc:chapter start="5:01" title="Personalized Cracking" />
  <psc:chapter start="5:52" title="What’s the Solution?" />
  <psc:chapter start="7:28" title="The Bright Side" />
  <psc:chapter start="8:00" title="FInal Thoughts/ Ending" />
</psc:chapters>
    <itunes:duration>534</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Confessions of a Hacker</itunes:title>
    <title>Confessions of a Hacker</title>
    <itunes:summary><![CDATA[What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists.  Join Darnley as he breaks it all down, asks the hard questions, and opens the floor to your thoughts.     Click here to send future episode recommendation Support t...]]></itunes:summary>
    <description><![CDATA[<p>What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. </p><p>Join Darnley as he breaks it all down, asks the hard questions, and opens the floor to <em>your</em> thoughts.<br/> </p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What happens when a former black hat hacker lifts the veil on the dark web after 30 years in the shadows? In this chilling and eye-opening episode, Darnley dives into exclusive audio from a VICE interview that reveals the darkest corners of the internet—from ransomware targeting hospitals to million-dollar cyber heists. </p><p>Join Darnley as he breaks it all down, asks the hard questions, and opens the floor to <em>your</em> thoughts.<br/> </p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17211414-confessions-of-a-hacker.mp3" length="12942489" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/foxp9yxjznjiwau6p52uw5swolit?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17211414</guid>
    <pubDate>Fri, 23 May 2025 03:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17211414/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:08" title="Past as a hacker" />
  <psc:chapter start="4:18" title="The Cost of Ransomware &amp; Hospital Attacks " />
  <psc:chapter start="5:40" title="Brief Story Of Experience" />
  <psc:chapter start="6:41" title="Would you pay?" />
  <psc:chapter start="7:02" title="70 Million Dollars, Criminals, and Animals" />
  <psc:chapter start="9:08" title="Two steps forward, one step back" />
  <psc:chapter start="10:05" title="When attacks happen" />
  <psc:chapter start="10:37" title="The Evil Amazon Underworld" />
  <psc:chapter start="11:13" title="Should We Be Worried About Rouge Nukes?" />
  <psc:chapter start="11:59" title="Should We Be Worried About Our Power Grids?" />
  <psc:chapter start="14:54" title="Should We Have More Government Control?" />
  <psc:chapter start="15:30" title="Let Me Hear From you!" />
  <psc:chapter start="16:03" title="Closing Thoughts/End" />
</psc:chapters>
    <itunes:duration>1075</itunes:duration>
    <itunes:keywords>darkweb,cybersecurity,hackerconfession,ethicalhacking,ransomware,digitalprivacy,blackhat,whitehat,hackingstories,internetsecurity,cyperspace,anonymoushacker,cybercrime,VICE,cyberawareness,darnleyscybercafe</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Teams Trap</itunes:title>
    <title>The Teams Trap</title>
    <itunes:summary><![CDATA[Cybercriminals are sliding into Microsoft Teams chats—and they’re not who they say they are. In this episode of Darnley’s Cyber Cafe, we uncover a clever new attack targeting businesses from the inside out. From fake IT support to sneaky malware that hides in plain sight, this is one you don’t want to ignore.  Grab a coffee and learn how to spot the warning signs, protect your systems, and stay one step ahead. 🎧 Tune in—because the next Teams message you get might not be what it seems. C...]]></itunes:summary>
    <description><![CDATA[<p>Cybercriminals are sliding into Microsoft Teams chats—and they’re not who they say they are. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover a clever new attack targeting businesses from the inside out. From fake IT support to sneaky malware that hides in plain sight, this is one you don’t want to ignore. </p><p>Grab a coffee and learn how to spot the warning signs, protect your systems, and stay one step ahead.</p><p>🎧 Tune in—because the next Teams message you get might not be what it seems.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Cybercriminals are sliding into Microsoft Teams chats—and they’re not who they say they are. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover a clever new attack targeting businesses from the inside out. From fake IT support to sneaky malware that hides in plain sight, this is one you don’t want to ignore. </p><p>Grab a coffee and learn how to spot the warning signs, protect your systems, and stay one step ahead.</p><p>🎧 Tune in—because the next Teams message you get might not be what it seems.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17147145-the-teams-trap.mp3" length="6140960" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3vcnm2ik80axvnaylrdqbazw2mqj?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17147145</guid>
    <pubDate>Tue, 13 May 2025 02:00:00 -0600</pubDate>
    <podcast:soundbite startTime="180.834" duration="24.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/17147145/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:51" title="How It Went Down" />
  <psc:chapter start="2:37" title="The Technical Stuff" />
  <psc:chapter start="3:44" title="Why Is This Campaign Working So Well?" />
  <psc:chapter start="4:27" title="It&#39;s Not About Blame" />
  <psc:chapter start="4:58" title="3 Steps to Brew Up Better Security" />
  <psc:chapter start="6:44" title="Its About Balance" />
  <psc:chapter start="7:23" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>508</itunes:duration>
    <itunes:keywords>cybersecurity,microsoftteams,phishingattack,quickassist,typelibhijacking,socialengineering,malware,remoteworksecurity,teamschatsecurity,cyberawareness,businesssecurity,darnleyscybercafe,techpodcast,infosec,cyberthreats</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Google Emails Lie: Phishing Through the Front Door</itunes:title>
    <title>When Google Emails Lie: Phishing Through the Front Door</title>
    <itunes:summary><![CDATA[An email from Google. A law enforcement warning. Everything looks legit—until it isn't. In this episode of Darnley’s Cyber Cafe, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>An email from Google. A law enforcement warning. Everything looks legit—until it isn&apos;t. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>An email from Google. A law enforcement warning. Everything looks legit—until it isn&apos;t. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover a shockingly convincing phishing scam and explore how trust can be weaponized in your inbox. Click play... but think twice before you click anything else!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17123928-when-google-emails-lie-phishing-through-the-front-door.mp3" length="5671974" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/cieuapnjf05isl9gzzpv7xnsdv1i?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17123928</guid>
    <pubDate>Thu, 08 May 2025 11:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17123928/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:24" title="What happened?" />
  <psc:chapter start="1:23" title="Anatomy of the Attack" />
  <psc:chapter start="3:06" title="Let’s Talk About DKIM and Friends" />
  <psc:chapter start="4:10" title="How Phishing Has Evolved" />
  <psc:chapter start="4:49" title="Let’s Get Personal" />
  <psc:chapter start="5:43" title="What Can You Do?" />
  <psc:chapter start="6:51" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>468</itunes:duration>
    <itunes:keywords>cybersecurity,phishing,emailsecurity,googlescams,gmailspoofing,darnleyscybercafe,dkim,spf,dmarc,phishingattack,emailscam,inboxsecurity,techpodcast,digitalprivacy,socialengineering,cyberawareness</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>true</itunes:explicit>
  </item>
  <item>
    <itunes:title>Surveillance Capitalism: You Are The Product</itunes:title>
    <title>Surveillance Capitalism: You Are The Product</title>
    <itunes:summary><![CDATA[In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of surveillance capitalism—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, practical tips, and that signature Cyber Cafe vibe. ☕ Tune in, stay private, and listen to how to protect yourself.  Click here to send future epis...]]></itunes:summary>
    <description><![CDATA[<p>In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of <b>surveillance capitalism</b>—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, practical tips, and that signature Cyber Cafe vibe.</p><p>☕ Tune in, stay private, and listen to how to protect yourself. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this eye-opening kickoff to Season 6, Darnley dives into the hidden world of <b>surveillance capitalism</b>—where your clicks, swipes, and searches are turned into profit. You ARE the product. Discover how data profiling shapes your digital life, influences what you see, and quietly sells your behaviour to the highest bidder. Real-world examples, practical tips, and that signature Cyber Cafe vibe.</p><p>☕ Tune in, stay private, and listen to how to protect yourself. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/17073073-surveillance-capitalism-you-are-the-product.mp3" length="6537562" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3ndyiciv6dzdvblewq915buh79qw?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17073073</guid>
    <pubDate>Thu, 01 May 2025 02:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/17073073/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:33" title="What is Surveillance Capitalism?" />
  <psc:chapter start="1:20" title="How it works (and how it works against you)" />
  <psc:chapter start="2:34" title="Works against you" />
  <psc:chapter start="4:27" title="Real-World Examples" />
  <psc:chapter start="5:30" title="How does this affect businesses?" />
  <psc:chapter start="6:29" title="What can you do?" />
  <psc:chapter start="7:18" title="Further Reading Sources" />
  <psc:chapter start="7:47" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>539</itunes:duration>
    <itunes:keywords>surveillancecapitalism,dataprivacy,digitalprivacy,cybersecurity,dataprofiling,onlineprivacy,privacyawareness,techpodcast,cyberawareness,digitalfreedom,privacyrights,datacollection,internetsecurity,cyberculture,cybersecurity,cyberawareness</itunes:keywords>
    <itunes:season>6</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The End of a New Beginning</itunes:title>
    <title>The End of a New Beginning</title>
    <itunes:summary><![CDATA[In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds. Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity into everyday life. Plus, get an exclusive look at what’s coming in Season 6.   Click here to send future episode recommendation Support the show Sub...]]></itunes:summary>
    <description><![CDATA[<p>In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds.</p><p>Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity into everyday life. Plus, get an exclusive look at what’s coming in Season 6.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this heartfelt season finale, Darnley takes a step back to reflect on the journey so far — from quiet beginnings during the COVID-19 shutdowns to building a global community of digital thinkers, privacy advocates, and cyber-curious minds.</p><p>Join us as we reminisce about standout moments from Season 5, and real stories that brought cybersecurity into everyday life. Plus, get an exclusive look at what’s coming in Season 6.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16976817-the-end-of-a-new-beginning.mp3" length="5737808" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bayf20mun9qwhs0bubb7054vk4tb?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16976817</guid>
    <pubDate>Tue, 22 Apr 2025 02:00:00 -0600</pubDate>
    <itunes:duration>474</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>101</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>50 Shades of Windows</itunes:title>
    <title>50 Shades of Windows</title>
    <itunes:summary><![CDATA[This episode dives into the fascinating journey of Microsoft operating systems—from their raw, code-heavy origins to the sleek, intuitive platforms we depend on today.  Darnley reflects over the last 50 years on the digital operating systems laid by pioneers like Microsoft and how their innovations transformed personal computing over the decades.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest d...]]></itunes:summary>
    <description><![CDATA[<p>This episode dives into the fascinating journey of Microsoft operating systems—from their raw, code-heavy origins to the sleek, intuitive platforms we depend on today. </p><p>Darnley reflects over the last 50 years on the digital operating systems laid by pioneers like Microsoft and how their innovations transformed personal computing over the decades. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>This episode dives into the fascinating journey of Microsoft operating systems—from their raw, code-heavy origins to the sleek, intuitive platforms we depend on today. </p><p>Darnley reflects over the last 50 years on the digital operating systems laid by pioneers like Microsoft and how their innovations transformed personal computing over the decades. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16939908-50-shades-of-windows.mp3" length="6754963" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yvyj7jdlcyeiqmigkiczauo63ynz?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16939908</guid>
    <pubDate>Thu, 17 Apr 2025 02:00:00 -0600</pubDate>
    <itunes:duration>558</itunes:duration>
    <itunes:keywords>technology,operatingsystems,microsoft,apple,computinghistory,digitaltransformation,techpodcast,softwareevolution,retrotech,cyberculture,innovation,50yearsoftech</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>100</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cyber Wars: The Fall of the BlackLock Empire</itunes:title>
    <title>The Cyber Wars: The Fall of the BlackLock Empire</title>
    <itunes:summary><![CDATA[BlackLock, a ruthless ransomware gang, thought they were untouchable—until cybersecurity experts flipped the script. In this episode of Darnley’s Cyber Café, Darnley uncovers how a security firm hacked the hackers, dismantling their entire operation from the inside. How did they do it? What critical mistakes led to BlackLock’s downfall? And what does this mean for the future of cybercrime? Tune in for a thrilling deep dive into one of the biggest cyber takedowns yet Click here to send future ...]]></itunes:summary>
    <description><![CDATA[<p>BlackLock, a ruthless ransomware gang, thought they were untouchable—until cybersecurity experts flipped the script. In this episode of <em>Darnley’s Cyber Café</em>, Darnley uncovers how a security firm hacked the hackers, dismantling their entire operation from the inside.</p><p>How did they do it? What critical mistakes led to BlackLock’s downfall? And what does this mean for the future of cybercrime?</p><p>Tune in for a thrilling deep dive into one of the biggest cyber takedowns yet</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>BlackLock, a ruthless ransomware gang, thought they were untouchable—until cybersecurity experts flipped the script. In this episode of <em>Darnley’s Cyber Café</em>, Darnley uncovers how a security firm hacked the hackers, dismantling their entire operation from the inside.</p><p>How did they do it? What critical mistakes led to BlackLock’s downfall? And what does this mean for the future of cybercrime?</p><p>Tune in for a thrilling deep dive into one of the biggest cyber takedowns yet</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16912026-the-cyber-wars-the-fall-of-the-blacklock-empire.mp3" length="5683933" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zp67vecwkryewgz4wwq7400t6o7v?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16912026</guid>
    <pubDate>Tue, 15 Apr 2025 04:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16912026/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:58" title="Who Was BlackLock?" />
  <psc:chapter start="2:01" title="What Happened?" />
  <psc:chapter start="3:34" title="Insult to Injury" />
  <psc:chapter start="4:15" title="Why is this a big deal?" />
  <psc:chapter start="5:14" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>469</itunes:duration>
    <itunes:keywords>Podcast, Cybersecurity Podcast, Tech News, Digital Defense, Cyber Talk, Cybersecurity, InfoSec, Hacking, Ransomware, Threat Intelligence, Cyber Attack, Data Breach, Cyber Threats, Cyber Wars, BlackLock Ransomware, Hack The Hackers, Cybercrime, Ransomware </itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>98</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Check Point Breach: A Storm in a Coffee Cup… or Something Much Bigger?</itunes:title>
    <title>Check Point Breach: A Storm in a Coffee Cup… or Something Much Bigger?</title>
    <itunes:summary><![CDATA[We dive into the murky case of the alleged Check Point Software breach—what hackers claim they stole, why the company says it's "handled," and why that may not be the whole truth.  From admin access screenshots to quiet cover-ups, Darnley unpacks the risks and ask the tough questions security firms don’t want you asking. Pour yourself a strong cup and tune in—you’ll want to hear what they aren’t saying. Click here to send future episode recommendation Support the show Subscribe now to Da...]]></itunes:summary>
    <description><![CDATA[<p>We dive into the murky case of the alleged Check Point Software breach—what hackers claim they stole, why the company says it&apos;s &quot;handled,&quot; and why that may not be the whole truth. </p><p>From admin access screenshots to quiet cover-ups, Darnley unpacks the risks and ask the tough questions security firms don’t want you asking. Pour yourself a strong cup and tune in—you’ll want to hear what they <em>aren’t</em> saying.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We dive into the murky case of the alleged Check Point Software breach—what hackers claim they stole, why the company says it&apos;s &quot;handled,&quot; and why that may not be the whole truth. </p><p>From admin access screenshots to quiet cover-ups, Darnley unpacks the risks and ask the tough questions security firms don’t want you asking. Pour yourself a strong cup and tune in—you’ll want to hear what they <em>aren’t</em> saying.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16932311-check-point-breach-a-storm-in-a-coffee-cup-or-something-much-bigger.mp3" length="5043838" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bgucsfc8iyt4pjv0rzk4nwgn15zs?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16932311</guid>
    <pubDate>Thu, 10 Apr 2025 10:00:00 -0600</pubDate>
    <itunes:duration>416</itunes:duration>
    <itunes:keywords>CyberSecurity, DataBreach, CheckPointHack, HackerNews, DigitalPrivacy, Infosec, CyberThreats, TechNews, HackingExposed, PrivacyMatters, SecurityBreach, CyberAttack, ThreatIntel, TechPodcast</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>99</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybernetic Future of Gene Editing</itunes:title>
    <title>Cybernetic Future of Gene Editing</title>
    <itunes:summary><![CDATA[What if your DNA could be hacked like software? In this episode of Darnley’s Cyber Café, we explore a groundbreaking advancement that blurs the line between cybersecurity and biology. Is this the key to human evolution—or a new frontier for cybercrime? Tune in to uncover the truth.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>What if your DNA could be hacked like software?</p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore a groundbreaking advancement that blurs the line between cybersecurity and biology. Is this the key to human evolution—or a new frontier for cybercrime? Tune in to uncover the truth. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What if your DNA could be hacked like software?</p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore a groundbreaking advancement that blurs the line between cybersecurity and biology. Is this the key to human evolution—or a new frontier for cybercrime? Tune in to uncover the truth. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16893031-cybernetic-future-of-gene-editing.mp3" length="5329390" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/oujkg0qnvuxxjf12fw5ltlzg3pv1?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16893031</guid>
    <pubDate>Tue, 08 Apr 2025 14:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16893031/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:38" title="The New CRISPR Frontier" />
  <psc:chapter start="1:43" title="Gene Editing &amp; Biohacking: A New Cybersecurity Threat?" />
  <psc:chapter start="3:26" title="Ethics of Gene Editing &amp; Digital Privacy" />
  <psc:chapter start="5:09" title="A Cybernetic Future: Human Evolution or Control?" />
  <psc:chapter start="5:56" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>439</itunes:duration>
    <itunes:keywords>cybersecurity,CRISPR,futuretech,biological,biohack</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>96</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Risks of Putting Your Intimate Photos Online</itunes:title>
    <title>Risks of Putting Your Intimate Photos Online</title>
    <itunes:summary><![CDATA[Think your intimate photos are safe on private apps? Think again.  A shocking new data leak has exposed millions of private images from dating platforms, putting users at serious risk. In this episode of Darnley’s Cyber Cafe, we uncover what went wrong, the hidden dangers of sharing sensitive photos online, and how you can protect yourself from cyber threats. Tune in now—your privacy may depend on it. Click here to send future episode recommendation Support the show Subscribe now to Darn...]]></itunes:summary>
    <description><![CDATA[<p>Think your intimate photos are safe on private apps? Think again. </p><p>A shocking new data leak has exposed millions of private images from dating platforms, putting users at serious risk. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover what went wrong, the hidden dangers of sharing sensitive photos online, and how you can protect yourself from cyber threats. Tune in now—your privacy may depend on it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Think your intimate photos are safe on private apps? Think again. </p><p>A shocking new data leak has exposed millions of private images from dating platforms, putting users at serious risk. In this episode of <em>Darnley’s Cyber Cafe</em>, we uncover what went wrong, the hidden dangers of sharing sensitive photos online, and how you can protect yourself from cyber threats. Tune in now—your privacy may depend on it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16900565-risks-of-putting-your-intimate-photos-online.mp3" length="5239672" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xlwa29kstb3cxzrovmbxbqtggsyb?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16900565</guid>
    <pubDate>Wed, 02 Apr 2025 10:00:00 -0600</pubDate>
    <itunes:duration>432</itunes:duration>
    <itunes:keywords>privacybreach,dataleak,cybersecurity,datingapps,onlineprivacy,intimatephotos,hackingrisks,cybercrime,blackmailrisks,digitalsecurity,cyberawareness,darnleyscybercafe,sensitivephotos</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>97</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The A.I. Butler: Coming to a Home Near You?</itunes:title>
    <title>The A.I. Butler: Coming to a Home Near You?</title>
    <itunes:summary><![CDATA[Are we on the verge of welcoming AI-powered butlers into our homes? With Tesla ramping up production of its humanoid robot, Optimus, the future of home automation is closer than ever. But is humanity truly ready for a legion of robots assisting with our daily lives?  In this episode of Darnley’s Cyber Café, we explore the promises, challenges, and potential risks of AI butlers. Will they revolutionize convenience—or introduce new concerns? Tune in to find out! Click here to send future e...]]></itunes:summary>
    <description><![CDATA[<p>Are we on the verge of welcoming AI-powered butlers into our homes? With Tesla ramping up production of its humanoid robot, Optimus, the future of home automation is closer than ever. But is humanity truly ready for a legion of robots assisting with our daily lives? </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore the promises, challenges, and potential risks of AI butlers. Will they revolutionize convenience—or introduce new concerns? Tune in to find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are we on the verge of welcoming AI-powered butlers into our homes? With Tesla ramping up production of its humanoid robot, Optimus, the future of home automation is closer than ever. But is humanity truly ready for a legion of robots assisting with our daily lives? </p><p>In this episode of <em>Darnley’s Cyber Café</em>, we explore the promises, challenges, and potential risks of AI butlers. Will they revolutionize convenience—or introduce new concerns? Tune in to find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16860006-the-a-i-butler-coming-to-a-home-near-you.mp3" length="5650383" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0uy0b1cwhv4hc6l76mrthikii4pv?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16860006</guid>
    <pubDate>Mon, 31 Mar 2025 02:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16860006/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:08" title="The Rise of Optimus" />
  <psc:chapter start="2:05" title="What Could an A.I. Butler Actually Do?" />
  <psc:chapter start="3:19" title="The Double-Edged Sword of A.I. in Our Homes" />
  <psc:chapter start="4:36" title="Are We Really Ready?" />
  <psc:chapter start="7:12" title="Final Thoughts/ Ending " />
</psc:chapters>
    <itunes:duration>466</itunes:duration>
    <itunes:keywords>AIButler,ArtificialIntelligence,HumanoidRobots,TeslaOptimus,ElonMusk,SmartHome,FutureTech,HomeAutomation,CyberSecurity,TechnologyTrends</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>95</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Will A.I. Take Over Our Jobs?</itunes:title>
    <title>Will A.I. Take Over Our Jobs?</title>
    <itunes:summary><![CDATA[Will artificial intelligence (A.I.) take over our jobs, or are we standing at the dawn of a new era where humans and machines collaborate?  In this episode we break down the industries already transformed by A.I., reveal the inevitable shifts coming in the next eight years, and explore where human expertise still reigns supreme.  From automation in manufacturing to AI-powered logistics, customer service, and beyond—what does the future hold for the workforce? Tune in now to find out...]]></itunes:summary>
    <description><![CDATA[<p>Will artificial intelligence (A.I.) take over our jobs, or are we standing at the dawn of a new era where humans and machines collaborate?</p><p> In this episode we break down the industries already transformed by A.I., reveal the inevitable shifts coming in the next eight years, and explore where human expertise still reigns supreme. </p><p>From automation in manufacturing to AI-powered logistics, customer service, and beyond—what does the future hold for the workforce? Tune in now to find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Will artificial intelligence (A.I.) take over our jobs, or are we standing at the dawn of a new era where humans and machines collaborate?</p><p> In this episode we break down the industries already transformed by A.I., reveal the inevitable shifts coming in the next eight years, and explore where human expertise still reigns supreme. </p><p>From automation in manufacturing to AI-powered logistics, customer service, and beyond—what does the future hold for the workforce? Tune in now to find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16831343-will-a-i-take-over-our-jobs.mp3" length="12595179" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/dn2benidyty4gi70eeu9jjtadroh?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16831343</guid>
    <pubDate>Mon, 24 Mar 2025 14:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16831343/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:36" title="The A.I. Wave" />
  <psc:chapter start="1:17" title="Industries on the Edge of Transformation" />
  <psc:chapter start="10:15" title="Inevitable Trends and What to Expect" />
  <psc:chapter start="12:10" title="Humans and AI – Coexisting in the Future" />
  <psc:chapter start="13:50" title="Looking Ahead – The Next 8 Years" />
  <psc:chapter start="15:55" title="Final Thoughts / Ending" />
</psc:chapters>
    <itunes:duration>1044</itunes:duration>
    <itunes:keywords>AI, Evolution, Technology, FutureOfWork, Robotics, Automation, Cybernetics, ArtificialIntelligence, Futurism, Innovation, HumanMachineCollaboration, DigitalTransformation, TechRevolution, FutureJobs, SmartTechnology</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>94</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>US Healthcare and Banking Data Leaks</itunes:title>
    <title>US Healthcare and Banking Data Leaks</title>
    <itunes:summary><![CDATA[We explore the growing cyber risks threatening millions across the US. From vulnerabilities in critical industries to shocking security lapses, we reveal what these breaches mean for you.  More importantly, we discuss the steps you can take to protect yourself if your personal information is ever exposed. Stay informed, stay secure—tune in now. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developme...]]></itunes:summary>
    <description><![CDATA[<p>We explore the growing cyber risks threatening millions across the US. From vulnerabilities in critical industries to shocking security lapses, we reveal what these breaches mean for you. </p><p>More importantly, we discuss the steps you can take to protect yourself if your personal information is ever exposed. Stay informed, stay secure—tune in now.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We explore the growing cyber risks threatening millions across the US. From vulnerabilities in critical industries to shocking security lapses, we reveal what these breaches mean for you. </p><p>More importantly, we discuss the steps you can take to protect yourself if your personal information is ever exposed. Stay informed, stay secure—tune in now.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16787189-us-healthcare-and-banking-data-leaks.mp3" length="5524517" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/6rnxer1jemicf5mnx1xggu79knke?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16787189</guid>
    <pubDate>Mon, 17 Mar 2025 14:00:00 -0600</pubDate>
    <podcast:soundbite startTime="110.206" duration="25.5" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/16787189/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="0:38" title="Healthcare News" />
  <psc:chapter start="2:12" title="Bank News" />
  <psc:chapter start="2:57" title="What Can You Do?" />
  <psc:chapter start="6:29" title="Final Thoughts" />
</psc:chapters>
    <itunes:duration>454</itunes:duration>
    <itunes:keywords>cybersecurity, data breaches, identity theft, online security, digital privacy, cyber threats, ransomware, financial security, Rhysida, BianLian, Bank of America, Sunflower Medical Group, Community Care Alliance, ESHYFT</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>93</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>X Taken Down - Who’s Behind It?</itunes:title>
    <title>X Taken Down - Who’s Behind It?</title>
    <itunes:summary><![CDATA[In this coffee break episode of Darnley’s Cyber Cafe, A massive cyberattack brought X, Elon Musk’s social media platform, to its knees. But who was behind it?  Musk points to Ukraine, but could there be more to the story? In this episode of Darnley’s Cyber Cafe, we dissect the attack, the possible players involved, and the deeper implications for global cybersecurity. Was this a targeted strike, a false flag operation, or something even more unexpected? Tune in as we uncover the hidden l...]]></itunes:summary>
    <description><![CDATA[<p>In this coffee break episode of <em>Darnley’s Cyber Cafe</em>, A massive cyberattack brought X, Elon Musk’s social media platform, to its knees. But who was behind it? </p><p>Musk points to Ukraine, but could there be more to the story? In this episode of <em>Darnley’s Cyber Cafe</em>, we dissect the attack, the possible players involved, and the deeper implications for global cybersecurity. Was this a targeted strike, a false flag operation, or something even more unexpected? Tune in as we uncover the hidden layers of this digital conflict.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this coffee break episode of <em>Darnley’s Cyber Cafe</em>, A massive cyberattack brought X, Elon Musk’s social media platform, to its knees. But who was behind it? </p><p>Musk points to Ukraine, but could there be more to the story? In this episode of <em>Darnley’s Cyber Cafe</em>, we dissect the attack, the possible players involved, and the deeper implications for global cybersecurity. Was this a targeted strike, a false flag operation, or something even more unexpected? Tune in as we uncover the hidden layers of this digital conflict.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16773610-x-taken-down-who-s-behind-it.mp3" length="5708638" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s8nxyhjmynv9wmloebfy99n3wwg6?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16773610</guid>
    <pubDate>Tue, 11 Mar 2025 11:00:00 -0600</pubDate>
    <podcast:soundbite startTime="50.437" duration="29.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/16773610/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="0:36" title="The Cyberattack on X" />
  <psc:chapter start="1:30" title="Why Target Elon Musk?" />
  <psc:chapter start="2:35" title="Could Ukraine Be Responsible?" />
  <psc:chapter start="3:52" title="Could This Be a False Flag Operation by Russia?" />
  <psc:chapter start="4:39" title="What This Means for Cybersecurity" />
  <psc:chapter start="5:24" title="Final Thoughts/End" />
</psc:chapters>
    <itunes:duration>471</itunes:duration>
    <itunes:keywords> Cybersecurity,X,ElonMusk,XPlatform,CyberAttack,Ukraine,Russia,DigitalPrivacy,Hacking,CyberThreats,TechNews</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>92</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Trump&#39;s Second Term: Cybersecurity Chaos or Control?</itunes:title>
    <title>Trump&#39;s Second Term: Cybersecurity Chaos or Control?</title>
    <itunes:summary><![CDATA[In this thought-provoking Coffee Break episode, Darnley explore's the potential impact of Donald Trump’s second term on cybersecurity. Will his administration strengthen digital protections or introduce new vulnerabilities? Darnley will break down some key policies, politics, past actions, and expert insights to assess the risks and opportunities his leadership could bring to the cybersecurity landscape.  As cyber threats evolve, it’s essential to understand how these changes may affect ...]]></itunes:summary>
    <description><![CDATA[<p>In this thought-provoking Coffee Break episode, Darnley explore&apos;s the potential impact of Donald Trump’s second term on cybersecurity. Will his administration strengthen digital protections or introduce new vulnerabilities?</p><p>Darnley will break down some key policies, politics, past actions, and expert insights to assess the risks and opportunities his leadership could bring to the cybersecurity landscape. </p><p>As cyber threats evolve, it’s essential to understand how these changes may affect businesses and individuals alike.</p><p>Join us for a non-poltical discussion, and don’t forget to share this episode to help spread awareness!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this thought-provoking Coffee Break episode, Darnley explore&apos;s the potential impact of Donald Trump’s second term on cybersecurity. Will his administration strengthen digital protections or introduce new vulnerabilities?</p><p>Darnley will break down some key policies, politics, past actions, and expert insights to assess the risks and opportunities his leadership could bring to the cybersecurity landscape. </p><p>As cyber threats evolve, it’s essential to understand how these changes may affect businesses and individuals alike.</p><p>Join us for a non-poltical discussion, and don’t forget to share this episode to help spread awareness!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16728287-trump-s-second-term-cybersecurity-chaos-or-control.mp3" length="12658802" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/23l4wpr6hb1mqx6kb9j179deodhc?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16728287</guid>
    <pubDate>Tue, 04 Mar 2025 02:00:00 -0700</pubDate>
    <itunes:duration>1049</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>91</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Genea IVF Data Breach – A Privacy Catastrophe</itunes:title>
    <title>The Genea IVF Data Breach – A Privacy Catastrophe</title>
    <itunes:summary><![CDATA[In this gripping episode, we dive deep into one of the most unsettling data breaches in recent history. The Termite ransomware gang has stolen nearly a terabyte of highly sensitive data from Genea, one of Australia's largest fertility service providers. But this isn’t just another cyberattack—it’s an invasion into the most private aspects of people’s lives. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lat...]]></itunes:summary>
    <description><![CDATA[<p>In this gripping episode, we dive deep into one of the most unsettling data breaches in recent history. The Termite ransomware gang has stolen nearly <b>a terabyte</b> of highly sensitive data from <b>Genea, one of Australia&apos;s largest fertility service providers</b>. But this isn’t just another cyberattack—it’s an invasion into the most private aspects of people’s lives.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this gripping episode, we dive deep into one of the most unsettling data breaches in recent history. The Termite ransomware gang has stolen nearly <b>a terabyte</b> of highly sensitive data from <b>Genea, one of Australia&apos;s largest fertility service providers</b>. But this isn’t just another cyberattack—it’s an invasion into the most private aspects of people’s lives.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16704956-the-genea-ivf-data-breach-a-privacy-catastrophe.mp3" length="9783694" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/odq6x5jr64l3uznvxd9rzd2ai5u1?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16704956</guid>
    <pubDate>Thu, 27 Feb 2025 11:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16704956/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:29" title="Story / What Was Stolen?" />
  <psc:chapter start="3:52" title="How Did Hackers Gain Access?" />
  <psc:chapter start="4:44" title="The Risks to Affected Individuals" />
  <psc:chapter start="7:35" title="The Future Of This Stolen Data" />
  <psc:chapter start="10:04" title="Final Thoughts / End" />
</psc:chapters>
    <itunes:duration>811</itunes:duration>
    <itunes:keywords>GeneaIVFbreach,Termiteransomware,cybersecurity,databreach,medicaldatatheft,IVFprivacy,hackers,healthcarecyberattack,geneticdatatheft,identitytheft,cybercrime,blackmail,dataprotection,cyberawareness,privacyrisks,stolendata,darkweb,medicalfraud,dataleak,ran</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>90</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>TikTok Banned?</itunes:title>
    <title>TikTok Banned?</title>
    <itunes:summary><![CDATA[Is this the final end of TikTok?  In this episode, Darnley discusses the fate of TikTok between the outgoing and incoming U.S presidents, the societal impact, mental health, the political divide, and why the ban is a good idea. Listen to more here.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Is this the final end of TikTok?<br/><br/>In this episode, Darnley discusses the fate of TikTok between the outgoing and incoming U.S presidents, the societal impact, mental health, the political divide, and why the ban is a good idea. Listen to more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Is this the final end of TikTok?<br/><br/>In this episode, Darnley discusses the fate of TikTok between the outgoing and incoming U.S presidents, the societal impact, mental health, the political divide, and why the ban is a good idea. Listen to more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16449748-tiktok-banned.mp3" length="9898221" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0agfhy5gsplyqry5mjbn93t3e1xg?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16449748</guid>
    <pubDate>Thu, 16 Jan 2025 11:00:00 -0700</pubDate>
    <itunes:duration>820</itunes:duration>
    <itunes:keywords> TikTok,Trump,TikTokBan,Cybersecurity,MentalHealthImpact,BodyImageIssues,DigitalWellbeing,TikTokBan,ChinaRegulation,USNationalSecurity,PoliticalDebate,TrumpTikTokPolicy,Censorship</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>89</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MOVEit Mayhem: When Privacy Becomes a Global Crisis</itunes:title>
    <title>MOVEit Mayhem: When Privacy Becomes a Global Crisis</title>
    <itunes:summary><![CDATA[In this episode, Darnley uncovers the chaos caused by the MOVEit hack, a massive data breach affecting millions worldwide. Learn why hackers exploited vulnerabilities to steal sensitive data from major organizations and what it means for personal and global security. Tune in for insights on staying safe in an increasingly vulnerable digital world. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest development...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley uncovers the chaos caused by the MOVEit hack, a massive data breach affecting millions worldwide. Learn why hackers exploited vulnerabilities to steal sensitive data from major organizations and what it means for personal and global security. Tune in for insights on staying safe in an increasingly vulnerable digital world.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley uncovers the chaos caused by the MOVEit hack, a massive data breach affecting millions worldwide. Learn why hackers exploited vulnerabilities to steal sensitive data from major organizations and what it means for personal and global security. Tune in for insights on staying safe in an increasingly vulnerable digital world.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16233856-moveit-mayhem-when-privacy-becomes-a-global-crisis.mp3" length="4927599" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/es6nhy0ae4hu3neop35hpa7opm7h?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16233856</guid>
    <pubDate>Fri, 06 Dec 2024 10:00:00 -0700</pubDate>
    <itunes:duration>405</itunes:duration>
    <itunes:keywords>MOVEit,data breach,cybersecurity,hackers,Cl0p ransomware,privacy breach,digital security,cybercrime,employee data,social engineering,online privacy,corporate security,data protection,cyber attack response,privacy awareness</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>88</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hollywood Screen Hacks</itunes:title>
    <title>The Hollywood Screen Hacks</title>
    <itunes:summary><![CDATA[In this episode, host Darnley Greson Jr dives into the thrilling world where cybersecurity meets the silver screen. From chaotic typing scenes to eerie tech predictions, we’re dissecting Hollywood’s take on hacking. Whether you're a tech pro, movie lover, or just curious, this episode is packed with insights and fun. Tune in now! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evol...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, host Darnley Greson Jr dives into the thrilling world where cybersecurity meets the silver screen. From chaotic typing scenes to eerie tech predictions, we’re dissecting Hollywood’s take on hacking. Whether you&apos;re a tech pro, movie lover, or just curious, this episode is packed with insights and fun. Tune in now!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, host Darnley Greson Jr dives into the thrilling world where cybersecurity meets the silver screen. From chaotic typing scenes to eerie tech predictions, we’re dissecting Hollywood’s take on hacking. Whether you&apos;re a tech pro, movie lover, or just curious, this episode is packed with insights and fun. Tune in now!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16222033-the-hollywood-screen-hacks.mp3" length="10311070" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/yz9lv1b7v42reiv7dlrv6nyq9pdp?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16222033</guid>
    <pubDate>Thu, 05 Dec 2024 01:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/16222033/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:43" title="The Hollywood Hack Checklist" />
  <psc:chapter start="4:34" title="Pop Culture Predicts The Future" />
  <psc:chapter start="10:21" title="Cyber Villains: From Fiction to Reality" />
  <psc:chapter start="11:44" title="Cyber Lessons from Hollywood" />
  <psc:chapter start="12:42" title="Final Comments, Ending" />
</psc:chapters>
    <itunes:duration>854</itunes:duration>
    <itunes:keywords>Cybersecurity,HollywoodHacking,TechAndMovies,MovieHacks,PopCultureTech,HackingScenes,CyberAwareness,TechInFilm,DigitalSecurity,TechPredictions</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>87</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Tibber Breach</itunes:title>
    <title>The Tibber Breach</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses a cyberattack against an electricity provider that left 50,000 German customers vulnerable. Learn ways to protect yourself and understand the damages these energy companies face in our digital world. 5 Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley discusses a cyberattack against an electricity provider that left 50,000 German customers vulnerable. Learn ways to protect yourself and understand the damages these energy companies face in our digital world. 5</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley discusses a cyberattack against an electricity provider that left 50,000 German customers vulnerable. Learn ways to protect yourself and understand the damages these energy companies face in our digital world. 5</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16128864-the-tibber-breach.mp3" length="10747491" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/f0zqk2pkmxgnb62ieu63t5sw7by2?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16128864</guid>
    <pubDate>Tue, 19 Nov 2024 01:00:00 -0700</pubDate>
    <podcast:soundbite startTime="316.186" duration="26.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/16128864/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="2:04" title="The Hack, Explained" />
  <psc:chapter start="2:59" title="Why Should You Care?" />
  <psc:chapter start="3:44" title="How To Protect Yourself From Data Breaches (Solutions)" />
  <psc:chapter start="6:25" title="Risks To Energy Companies / Examples / Challenges" />
  <psc:chapter start="10:47" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>890</itunes:duration>
    <itunes:keywords> TibberDataBreach,Cybersecurity,EnergySectorRisks,DataProtection,CustomerDataPrivacy,HackerAttack,PhishingRisks,SmartEnergySecurity,IoTSecurity,EnergyInfrastructureSecurity</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>86</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Home Router Chinese Botnet</itunes:title>
    <title>Home Router Chinese Botnet</title>
    <itunes:summary><![CDATA[We explore how hacked TP-Link routers are being used in large-scale botnet attacks, targeting accounts through password spraying. Learn how these attacks work, the risks to your personal devices, and simple steps to protect your network today. Do your part on the hidden dangers of router hacking and its impact on global cybersecurity. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever...]]></itunes:summary>
    <description><![CDATA[<p>We explore how hacked TP-Link routers are being used in large-scale botnet attacks, targeting accounts through password spraying. Learn how these attacks work, the risks to your personal devices, and simple steps to protect your network today. Do your part on the hidden dangers of router hacking and its impact on global cybersecurity.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We explore how hacked TP-Link routers are being used in large-scale botnet attacks, targeting accounts through password spraying. Learn how these attacks work, the risks to your personal devices, and simple steps to protect your network today. Do your part on the hidden dangers of router hacking and its impact on global cybersecurity.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16053540-home-router-chinese-botnet.mp3" length="10513148" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bhdaxkc6xxzrrkpcj82egvqvyu9u?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16053540</guid>
    <pubDate>Tue, 05 Nov 2024 11:00:00 -0700</pubDate>
    <podcast:soundbite startTime="690.884" duration="31.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/16053540/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:46" title="What&#39;s going on with hacked routers?" />
  <psc:chapter start="3:18" title="How are these routers being used?" />
  <psc:chapter start="4:25" title="Personal Impact: Why should you care?" />
  <psc:chapter start="6:05" title="How hackers do it" />
  <psc:chapter start="7:09" title="How to protect yourself - Steps" />
  <psc:chapter start="11:32" title="Why we all need to be vigilant" />
  <psc:chapter start="12:35" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>870</itunes:duration>
    <itunes:keywords>botnet,routerhacking,cybersecurity,passwordspraying,TPLink,MicrosoftAzure,hackers,cloudsecurity,dataprotection,networksecurity,chinesegovernment,cyberawareness,hackednews,cybersecurity</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>85</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Robotic Nightmare</itunes:title>
    <title>Robotic Nightmare</title>
    <itunes:summary><![CDATA[In this coffee break. Darnley dives into the bizarre story of Ecovacs Deebot X2 vacuums that were hacked to chase pets, and spew slurs at their owners. He explores the security vulnerabilities behind the incident and discuss the broader risks of smart home devices in today's connected world.   Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this coffee break. Darnley dives into the bizarre story of Ecovacs Deebot X2 vacuums that were hacked to chase pets, and spew slurs at their owners. He explores the security vulnerabilities behind the incident and discuss the broader risks of smart home devices in today&apos;s connected world.<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this coffee break. Darnley dives into the bizarre story of Ecovacs Deebot X2 vacuums that were hacked to chase pets, and spew slurs at their owners. He explores the security vulnerabilities behind the incident and discuss the broader risks of smart home devices in today&apos;s connected world.<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/16012201-robotic-nightmare.mp3" length="5318620" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e7riz3zz3zntfxcnoy4t2yxfqi8p?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16012201</guid>
    <pubDate>Tue, 29 Oct 2024 10:00:00 -0600</pubDate>
    <itunes:duration>438</itunes:duration>
    <itunes:keywords>cybersecurity,robotvacuum,cyberawareness,hackedvacuum,creepytech,hauntedhouse,scaredpet,funnyhorror,halloweenvibes,Deebot,Ecovac,DeebotX2</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>84</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Meta RayBan Glasses Of The Future?</itunes:title>
    <title>Meta RayBan Glasses Of The Future?</title>
    <itunes:summary><![CDATA[Meta and Ray-Ban’s digital glasses are making waves worldwide, but how did they rise so quickly? And will they face the same downfall as Google Glass? Tune in as Darnley dives into the future of this tech and what it means.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Meta and Ray-Ban’s digital glasses are making waves worldwide, but how did they rise so quickly? And will they face the same downfall as Google Glass? Tune in as Darnley dives into the future of this tech and what it means. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Meta and Ray-Ban’s digital glasses are making waves worldwide, but how did they rise so quickly? And will they face the same downfall as Google Glass? Tune in as Darnley dives into the future of this tech and what it means. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15971347-meta-rayban-glasses-of-the-future.mp3" length="7879328" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/26szpvbfxskv47de09yjzwknt7b3?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15971347</guid>
    <pubDate>Tue, 22 Oct 2024 12:00:00 -0600</pubDate>
    <podcast:soundbite startTime="319.383" duration="32.5" />
    <itunes:duration>652</itunes:duration>
    <itunes:keywords>metaraybanglasses,smartglasses,wearabletech,augmentedreality,techinnovation,digitaleyewear,futuretech,smartwearables,metatechnology</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>83</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A.I. Going Nuclear</itunes:title>
    <title>A.I. Going Nuclear</title>
    <itunes:summary><![CDATA[In this episode, Darnley explores a bold shift as tech giants like Microsoft, Google, and Amazon invest in nuclear energy. Is this the clean power solution they claim, or could it pose unforeseen risks to our environment? Join us as we question the impact of this controversial technology and what it really means for the future of this type energy fuelling Artificial Intelligence.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley explores a bold shift as tech giants like Microsoft, Google, and Amazon invest in nuclear energy. Is this the clean power solution they claim, or could it pose unforeseen risks to our environment? Join us as we question the impact of this controversial technology and what it really means for the future of this type energy fuelling Artificial Intelligence. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley explores a bold shift as tech giants like Microsoft, Google, and Amazon invest in nuclear energy. Is this the clean power solution they claim, or could it pose unforeseen risks to our environment? Join us as we question the impact of this controversial technology and what it really means for the future of this type energy fuelling Artificial Intelligence. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15943936-a-i-going-nuclear.mp3" length="12166730" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jxcem8jg7kzqjlujpgar1xrzq4nl?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15943936</guid>
    <pubDate>Thu, 17 Oct 2024 10:00:00 -0600</pubDate>
    <podcast:soundbite startTime="243.0" duration="48.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/15943936/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:39" title="Tech Giants Tapping Nuclear Energy for A.I. " />
  <psc:chapter start="4:04" title="Personal Story with Nuclear Scientist " />
  <psc:chapter start="7:02" title="SMR&#39;s Lack Of Success" />
  <psc:chapter start="7:55" title="Nuclear Energy The Clean Alternative?" />
  <psc:chapter start="11:20" title="What About Fusion Energy???" />
  <psc:chapter start="12:40" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1008</itunes:duration>
    <itunes:keywords>techcompanies,nuclearenergy,cleanenergy,amazon,google,microsoft,sustainability,energyinnovation,environmentalimpact,nuclearpower,techinvestments</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>82</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Hack That Shook The Wayback Machine</itunes:title>
    <title>The Hack That Shook The Wayback Machine</title>
    <itunes:summary><![CDATA[Darnley discusses the recent cyberattack that targeted one of the internet's most important digital archives. We'll explore how hackers infiltrated the Wayback Machine, compromising the personal data of millions and threatening the integrity of historical records stored online. Could this hack rewrite internet history?   Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digi...]]></itunes:summary>
    <description><![CDATA[<p>Darnley discusses the recent cyberattack that targeted one of the internet&apos;s most important digital archives. We&apos;ll explore how hackers infiltrated the Wayback Machine, compromising the personal data of millions and threatening the integrity of historical records stored online. Could this hack rewrite internet history?</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Darnley discusses the recent cyberattack that targeted one of the internet&apos;s most important digital archives. We&apos;ll explore how hackers infiltrated the Wayback Machine, compromising the personal data of millions and threatening the integrity of historical records stored online. Could this hack rewrite internet history?</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15909961-the-hack-that-shook-the-wayback-machine.mp3" length="5219360" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8vbl4czktv2p19mv6zo0wr2ow08s?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15909961</guid>
    <pubDate>Fri, 11 Oct 2024 10:00:00 -0600</pubDate>
    <itunes:duration>429</itunes:duration>
    <itunes:keywords> waybackmachine,hack,cyberattack,data breach,ddos,cybersecurity,digitalarchives,hacktivism,historybreach,internetarchive,passwordbreach,datasecurity,webarchives,cybersecurity,cyberawareness,history,netneutrality</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>81</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Carrington Event Vs. Technology</itunes:title>
    <title>The Carrington Event Vs. Technology</title>
    <itunes:summary><![CDATA[We explore how a solar storm like the 1859 Carrington Event could severely disrupt today's technology, affecting satellites, power grids, and global communications. Learn about the potential impact on our tech-dependent world and what can be done to prepare. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>We explore how a solar storm like the 1859 Carrington Event could severely disrupt today&apos;s technology, affecting satellites, power grids, and global communications. Learn about the potential impact on our tech-dependent world and what can be done to prepare.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We explore how a solar storm like the 1859 Carrington Event could severely disrupt today&apos;s technology, affecting satellites, power grids, and global communications. Learn about the potential impact on our tech-dependent world and what can be done to prepare.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15883513-the-carrington-event-vs-technology.mp3" length="13094747" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/701qkqi3r6wrjeyokj0p9ixdoayo?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15883513</guid>
    <pubDate>Tue, 08 Oct 2024 01:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/15883513/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:53" title="The Carrington Event " />
  <psc:chapter start="5:12" title="The Effect of Today and How to Protect Yourself" />
  <psc:chapter start="14:34" title="Will This Be An Issue In Our Lifetime?" />
  <psc:chapter start="16:42" title="Final Thoughts, End" />
</psc:chapters>
    <itunes:duration>1086</itunes:duration>
    <itunes:keywords> CarringtonEvent,solarstorm,technologydisruption,satellites,powergrid,communications,GPS,spacestorm,moderntechnology,solarflares,preparedness,cybersecurity,cyberawareness</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>80</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Deep A.I. Untruth</itunes:title>
    <title>The Deep A.I. Untruth</title>
    <itunes:summary><![CDATA[In this coffee break episode, Darnley briefly dives into the world of Deep AI that brings visual avatars to life using Microsoft's groundbreaking VASA-1 technology. We explore how this powerful tool is pushing boundaries, and even influencing the darker corners of the digital underworld. Is this the future of AI, or something far bigger? Grab a coffee and find out! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the ...]]></itunes:summary>
    <description><![CDATA[<p>In this coffee break episode, Darnley briefly dives into the world of Deep AI that brings visual avatars to life using Microsoft&apos;s groundbreaking VASA-1 technology. We explore how this powerful tool is pushing boundaries, and even influencing the darker corners of the digital underworld. Is this the future of AI, or something far bigger? Grab a coffee and find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this coffee break episode, Darnley briefly dives into the world of Deep AI that brings visual avatars to life using Microsoft&apos;s groundbreaking VASA-1 technology. We explore how this powerful tool is pushing boundaries, and even influencing the darker corners of the digital underworld. Is this the future of AI, or something far bigger? Grab a coffee and find out!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15851586-the-deep-a-i-untruth.mp3" length="9247708" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/s2x80jddhkg97s416etz2e5tozle?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15851586</guid>
    <pubDate>Tue, 01 Oct 2024 13:00:00 -0600</pubDate>
    <itunes:duration>766</itunes:duration>
    <itunes:keywords>DeepAI,visualavatars,MicrosoftVASA-1,AItechnology,innovation,digitaltransformation,underworld,AIimpact,virtualreality,cybersecurity,cyberawareness,technews</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>79</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Smart A.I. Years Away?</itunes:title>
    <title>Is Smart A.I. Years Away?</title>
    <itunes:summary><![CDATA[Grab a coffee and join Darnley for a laid-back chat about OpenAI CEO Sam Altman’s recent comments on the intelligence age. Could we really see superintelligence in just a few years? Let’s talk it through!    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Grab a coffee and join Darnley for a laid-back chat about OpenAI CEO Sam Altman’s recent comments on the intelligence age. Could we really see superintelligence in just a few years? Let’s talk it through!</p><p><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Grab a coffee and join Darnley for a laid-back chat about OpenAI CEO Sam Altman’s recent comments on the intelligence age. Could we really see superintelligence in just a few years? Let’s talk it through!</p><p><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15822215-is-smart-a-i-years-away.mp3" length="11167042" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/e7tpdh29zcvc8frb2bhfgggkcpz6?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15822215</guid>
    <pubDate>Thu, 26 Sep 2024 13:00:00 -0600</pubDate>
    <itunes:duration>927</itunes:duration>
    <itunes:keywords>intelligenceage,superintelligence,AIrevolution,futuristictech,AIethics,artificialintelligence,techtrends</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>78</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Clean Up Your Digital Footprint</itunes:title>
    <title>Clean Up Your Digital Footprint</title>
    <itunes:summary><![CDATA[In this episode, we’ll explore how your everyday online activity creates a digital footprint that companies profit from and hackers target. Learn how to spot, delete, and secure your data, protect your identity, and break free from the cycle of information overload. Buckle up! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we’ll explore how your everyday online activity creates a digital footprint that companies profit from and hackers target. Learn how to spot, delete, and secure your data, protect your identity, and break free from the cycle of information overload. Buckle up!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we’ll explore how your everyday online activity creates a digital footprint that companies profit from and hackers target. Learn how to spot, delete, and secure your data, protect your identity, and break free from the cycle of information overload. Buckle up!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15815654-clean-up-your-digital-footprint.mp3" length="13885355" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/4qof4yf5qst63gskyoocrgqju9mk?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15815654</guid>
    <pubDate>Thu, 26 Sep 2024 02:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/15815654/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:05" title="Podcast Review" />
  <psc:chapter start="1:47" title="Your Digital Footprint" />
  <psc:chapter start="7:22" title="Steps To Clean Up Your Online Mess" />
  <psc:chapter start="16:23" title="Reality For The Future?" />
  <psc:chapter start="17:11" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1151</itunes:duration>
    <itunes:keywords>digitalfootprint,dataprivacy,onlinesecurity,datasecurity,identityprotection,infosec,cyberawareness,digitalprivacy,protectyourdata,cybersecurity,itsec,podcast,cyberpodcast</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>77</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Act Of The Information Age</itunes:title>
    <title>The Act Of The Information Age</title>
    <itunes:summary><![CDATA[In the Information Age, we're more connected than ever, with vast amounts of data at our fingertips. Yet, this same technology that empowers us also exposes us to crazy levels of misinformation and disinformation, spreading faster and further than ever before. Navigating this digital landscape means becoming more vigilant, and informed to separate fact from fiction. Listen to this episode as Darnley breaks down why, and how to think more critically in this noise.  Click here to send futu...]]></itunes:summary>
    <description><![CDATA[<p>In the Information Age, we&apos;re more connected than ever, with vast amounts of data at our fingertips. Yet, this same technology that empowers us also exposes us to crazy levels of misinformation and disinformation, spreading faster and further than ever before. Navigating this digital landscape means becoming more vigilant, and informed to separate fact from fiction. Listen to this episode as Darnley breaks down why, and how to think more critically in this noise. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In the Information Age, we&apos;re more connected than ever, with vast amounts of data at our fingertips. Yet, this same technology that empowers us also exposes us to crazy levels of misinformation and disinformation, spreading faster and further than ever before. Navigating this digital landscape means becoming more vigilant, and informed to separate fact from fiction. Listen to this episode as Darnley breaks down why, and how to think more critically in this noise. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15721250-the-act-of-the-information-age.mp3" length="19942313" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/sxyzei9bj6pszd4zeb8qbjsla660?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15721250</guid>
    <pubDate>Tue, 10 Sep 2024 04:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/15721250/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:08" title="Episode Recap" />
  <psc:chapter start="2:03" title="Why is the truth obscured?" />
  <psc:chapter start="4:32" title="Misinformation of the information age?" />
  <psc:chapter start="8:29" title="Is the end of the information era?" />
  <psc:chapter start="16:09" title="How can you protect yourself? (step guide) " />
  <psc:chapter start="25:31" title="Final thoughts, ending" />
  <psc:chapter start="26:56" title="Podcast update announcements" />
</psc:chapters>
    <itunes:duration>1656</itunes:duration>
    <itunes:keywords>informationage,disinformation,misinformation,digitalera,mediadisruption,factchecking,mediadigital,criticalthinking,fakevsfact,medialiteracy,cybersecurity,cyberawareness,onlineawareness,truthinmedia,infowars,digitalvigilance,socialmediatips</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>76</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Microsoft CrowdStrike Failures</itunes:title>
    <title>Microsoft CrowdStrike Failures</title>
    <itunes:summary><![CDATA[Microsoft faced a colossal global outage, impacting millions of users, businesses, and governments around the world. How could this happen? Is it a sign of impending doom for humanity? Find out more in this episode.    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Microsoft faced a colossal global outage, impacting millions of users, businesses, and governments around the world. How could this happen? Is it a sign of impending doom for humanity? Find out more in this episode.<br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Microsoft faced a colossal global outage, impacting millions of users, businesses, and governments around the world. How could this happen? Is it a sign of impending doom for humanity? Find out more in this episode.<br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15520360-microsoft-crowdstrike-failures.mp3" length="10063978" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ozhcqj2hyq1872yvdja5rtz9b5a0?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15520360</guid>
    <pubDate>Fri, 02 Aug 2024 09:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/15520360/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:30" title="Media Clip" />
  <psc:chapter start="2:02" title="The Reports Behind The Outages" />
  <psc:chapter start="5:44" title=" How these outages affect all of us?" />
  <psc:chapter start="8:57" title="Is Microsoft Too Big to Fail?" />
  <psc:chapter start="11:20" title="Closing comments" />
</psc:chapters>
    <itunes:duration>835</itunes:duration>
    <itunes:keywords> Microsoft,Crowdstrike,outage,cyber threats,system failure,cybersecurity,podcoast,cyber security podcast</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>75</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Google Defends Play Store</itunes:title>
    <title>Google Defends Play Store</title>
    <itunes:summary><![CDATA[Join Darnley on this episode as he picks apart the intricate world of app security with Google Play. Explore how Google Play attempts to safeguard its platform against malicious actors, ensuring a safe and secure environment for millions of users worldwide. Is Apple App Store better?  Gain insights and learn tips into the evolving landscape of cybersecurity within the app ecosystem. Learn how to protect yourself in this ever-changing landscape. Click here to send future episode recommendation...]]></itunes:summary>
    <description><![CDATA[<p>Join Darnley on this episode as he picks apart the intricate world of app security with Google Play. Explore how Google Play attempts to safeguard its platform against malicious actors, ensuring a safe and secure environment for millions of users worldwide. Is Apple App Store better?<br/><br/>Gain insights and learn tips into the evolving landscape of cybersecurity within the app ecosystem. Learn how to protect yourself in this ever-changing landscape.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Join Darnley on this episode as he picks apart the intricate world of app security with Google Play. Explore how Google Play attempts to safeguard its platform against malicious actors, ensuring a safe and secure environment for millions of users worldwide. Is Apple App Store better?<br/><br/>Gain insights and learn tips into the evolving landscape of cybersecurity within the app ecosystem. Learn how to protect yourself in this ever-changing landscape.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/15081543-google-defends-play-store.mp3" length="10492962" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gbp32i0avfwptl7m2vhpsh0u40qy?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15081543</guid>
    <pubDate>Thu, 16 May 2024 11:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/15081543/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction " />
  <psc:chapter start="1:24" title="	Why Is Google Play Store Swimming in privacy-violating apps" />
  <psc:chapter start="3:49" title="Hackers Enjoy Easy Prey" />
  <psc:chapter start="8:37" title="Ways to avoid downloading fake apps" />
  <psc:chapter start="13:12" title="Ending Thoughts/Ending" />
</psc:chapters>
    <itunes:duration>870</itunes:duration>
    <itunes:keywords>cybersecurity,cyber crime,google,google play store,play store,google play,google store,google play hacks,cybersecurity review,Google, Apple,Android,iOS</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>74</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>FCC Votes for Net Neutrality</itunes:title>
    <title>FCC Votes for Net Neutrality</title>
    <itunes:summary><![CDATA[US Votes for Net Neutrality, Again.   Tune in to this episode as Darnley delves into the critical topic of Net Neutrality. Explore why the FCC's stance seems to waver, unravel the backstory of net neutrality, and gain insights into its fundamental principles. Join us for a deep dive into this pivotal issue shaping the future of the internet. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments...]]></itunes:summary>
    <description><![CDATA[<p>US Votes for Net Neutrality, Again. <br/><br/>Tune in to this episode as Darnley delves into the critical topic of Net Neutrality. Explore why the FCC&apos;s stance seems to waver, unravel the backstory of net neutrality, and gain insights into its fundamental principles. Join us for a deep dive into this pivotal issue shaping the future of the internet.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>US Votes for Net Neutrality, Again. <br/><br/>Tune in to this episode as Darnley delves into the critical topic of Net Neutrality. Explore why the FCC&apos;s stance seems to waver, unravel the backstory of net neutrality, and gain insights into its fundamental principles. Join us for a deep dive into this pivotal issue shaping the future of the internet.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14984598-fcc-votes-for-net-neutrality.mp3" length="14535375" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/b3of79cqe7avf6yz3p0spunfhrus?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14984598</guid>
    <pubDate>Wed, 01 May 2024 04:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14984598/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="The Internet Is Not A Big Truck" />
  <psc:chapter start="0:16" title="Introduction " />
  <psc:chapter start="1:27" title="FCC Votes to reinstate net neutrality" />
  <psc:chapter start="4:43" title="The Importance of Why We Need Net Neutrality" />
  <psc:chapter start="8:36" title="Is The Internet A Series of Tubes? " />
  <psc:chapter start="18:24" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1208</itunes:duration>
    <itunes:keywords>net neutrality,internet regulation,FCC,open internet,online equality,digital rights,broadband access,USA,Canada,Europe,Africa</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>73</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Robots Throwing Fire</itunes:title>
    <title>Robots Throwing Fire</title>
    <itunes:summary><![CDATA[Thermonator  is the first-ever flamethrower-wielding robot dog, latest advancement in smart home technology.. Why is this making headlines?   In this episode, Darnley discusses the future of robotics, and why robots will revolutionize our daily life. From chores to companions, How Robotics are Reshaping the Modern Household and the risk they pose for tomorrow.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay infor...]]></itunes:summary>
    <description><![CDATA[<p>Thermonator  is the first-ever flamethrower-wielding robot dog, latest advancement in smart home technology.. Why is this making headlines? <br/><br/>In this episode, Darnley discusses the future of robotics, and why robots will revolutionize our daily life. From chores to companions, How Robotics are Reshaping the Modern Household and the risk they pose for tomorrow. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Thermonator  is the first-ever flamethrower-wielding robot dog, latest advancement in smart home technology.. Why is this making headlines? <br/><br/>In this episode, Darnley discusses the future of robotics, and why robots will revolutionize our daily life. From chores to companions, How Robotics are Reshaping the Modern Household and the risk they pose for tomorrow. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14962230-robots-throwing-fire.mp3" length="20559678" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0u9h37nw2i9tlm15oy3x503ue60g?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14962230</guid>
    <pubDate>Fri, 26 Apr 2024 11:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14962230/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Robots Throwing Fire" />
  <psc:chapter start="0:05" title="Introduction " />
  <psc:chapter start="1:22" title="Flame throwing robot dog for your home" />
  <psc:chapter start="4:06" title="The Future of Household Robots" />
  <psc:chapter start="11:34" title="Is this a future we can really stand behind?" />
  <psc:chapter start="23:54" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1709</itunes:duration>
    <itunes:keywords>Home,Robotics,Automation,Smart Living,AI Assistants,Household Helpers,Innovation,Technology,Future Living,Convenience,Efficiency,Connected Home,Robotics Revolution,Domestic Robots,Automated Living,Thermonator,Amazon,Boston Dynamics,androids,human augments</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>72</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Quantum Threats To Cybersecurity</itunes:title>
    <title>Quantum Threats To Cybersecurity</title>
    <itunes:summary><![CDATA[ In this episode, we delve into the fascinating intersection of quantum computing and cybersecurity. Join us as we explore the looming threats that quantum technology poses to the foundations of digital security.   We'll unravel how quantum computers could crack currently unbreakable encryption algorithms, potentially rendering sensitive data vulnerable. Darnley will shed light on the strategies being developed to mitigate these quantum threats and safeguard our digital future. Click her...]]></itunes:summary>
    <description><![CDATA[<p><br/>In this episode, we delve into the fascinating intersection of quantum computing and cybersecurity. Join us as we explore the looming threats that quantum technology poses to the foundations of digital security. <br/><br/>We&apos;ll unravel how quantum computers could crack currently unbreakable encryption algorithms, potentially rendering sensitive data vulnerable. Darnley will shed light on the strategies being developed to mitigate these quantum threats and safeguard our digital future.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p><br/>In this episode, we delve into the fascinating intersection of quantum computing and cybersecurity. Join us as we explore the looming threats that quantum technology poses to the foundations of digital security. <br/><br/>We&apos;ll unravel how quantum computers could crack currently unbreakable encryption algorithms, potentially rendering sensitive data vulnerable. Darnley will shed light on the strategies being developed to mitigate these quantum threats and safeguard our digital future.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14919565-quantum-threats-to-cybersecurity.mp3" length="10809911" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/rd2dczsd5yo40zu76hu2cryu75gv?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14919565</guid>
    <pubDate>Fri, 19 Apr 2024 11:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14919565/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction " />
  <psc:chapter start="1:18" title="Quantum Computing Impact on Cybersecurity" />
  <psc:chapter start="7:45" title="The Real Threats of Tomorrow" />
  <psc:chapter start="11:11" title="Quantum Proof Today" />
  <psc:chapter start="13:20" title="Ending Thoughts" />
</psc:chapters>
    <itunes:duration>896</itunes:duration>
    <itunes:keywords>Quantum Computing, Cybersecurity, Encryption, Digital Security, Internet security,future tech threats,cyber threats,cyber attacks,future cyber attacks</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>71</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Future of Phishing</itunes:title>
    <title>Future of Phishing</title>
    <itunes:summary><![CDATA[Phishing ahead: Navigating the future of cybersecurity. In this episode, Darnley discusses the past, present and future of phishing attacks. He shares his insights, tips, dos and don'ts on how to avoid the simple strategies of cyber criminals looking to make a quick buck out of fooling you. This is setting the stage for future social engeinnering attacks by A.I. in the near future.      Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Caf...]]></itunes:summary>
    <description><![CDATA[<p>Phishing ahead: Navigating the future of cybersecurity. In this episode, Darnley discusses the past, present and future of phishing attacks. He shares his insights, tips, dos and don&apos;ts on how to avoid the simple strategies of cyber criminals looking to make a quick buck out of fooling you. This is setting the stage for future social engeinnering attacks by A.I. in the near future. <br/><br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Phishing ahead: Navigating the future of cybersecurity. In this episode, Darnley discusses the past, present and future of phishing attacks. He shares his insights, tips, dos and don&apos;ts on how to avoid the simple strategies of cyber criminals looking to make a quick buck out of fooling you. This is setting the stage for future social engeinnering attacks by A.I. in the near future. <br/><br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14858401-future-of-phishing.mp3" length="21599744" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/itjtna1itz6lxu7h49ef9lo5ef23?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14858401</guid>
    <pubDate>Wed, 10 Apr 2024 05:00:00 -0600</pubDate>
    <itunes:duration>1795</itunes:duration>
    <itunes:keywords>cybersecurity,online fraud,social engineering,cybersecurity podcast,email scams,internet safety,identity theft,cyber threats,digital security,fraud prevention,online scame,cybersecurity podcast,itsec podcast</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>70</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The End of TikTok</itunes:title>
    <title>The End of TikTok</title>
    <itunes:summary><![CDATA[Is this the end of TikTok?  In this episode, Darnley explores the ramifications of the US Congress's choice to regulate TikTok, a Chinese-owned video application, due to concerns over national security threats. Will this decision potentially hamper the growth of other social media platforms? Is it a prudent step in safeguarding our privacy from foreign entities?  Listen here. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay ...]]></itunes:summary>
    <description><![CDATA[<p>Is this the end of TikTok?<br/><br/>In this episode, Darnley explores the ramifications of the US Congress&apos;s choice to regulate TikTok, a Chinese-owned video application, due to concerns over national security threats. Will this decision potentially hamper the growth of other social media platforms? Is it a prudent step in safeguarding our privacy from foreign entities?  Listen here.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Is this the end of TikTok?<br/><br/>In this episode, Darnley explores the ramifications of the US Congress&apos;s choice to regulate TikTok, a Chinese-owned video application, due to concerns over national security threats. Will this decision potentially hamper the growth of other social media platforms? Is it a prudent step in safeguarding our privacy from foreign entities?  Listen here.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14722546-the-end-of-tiktok.mp3" length="12007341" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tz0z8q6nb73yqrcgdqfjgoee4mbi?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14722546</guid>
    <pubDate>Wed, 20 Mar 2024 04:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14722546/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:31" title="Why Is the US Government Banning TikTok?" />
  <psc:chapter start="6:22" title="Why TikTok is a threat against our democracy" />
  <psc:chapter start="10:48" title="Is this the start of US censorship as we know it?" />
  <psc:chapter start="14:35" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>997</itunes:duration>
    <itunes:keywords>tiktok,tiktok security concerns,tiktokbanning,tiktokban,tiktok privacy,us,usa,us government,us government on tiktok,digital regulation,data privacy,national security,us national security</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>69</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware and Cities</itunes:title>
    <title>Ransomware and Cities</title>
    <itunes:summary><![CDATA[What happens after a municipality gets hacked?   In this episode, Darnley discusses the fates of a city or town that gets hit with a ransomware. Who pays for it? How much damage does it really cause? What is the price to be paid post-breach? Why it is the citizens responsibility to hold their local governments accountable before it happens to them? Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest devel...]]></itunes:summary>
    <description><![CDATA[<p>What happens after a municipality gets hacked? <br/><br/>In this episode, Darnley discusses the fates of a city or town that gets hit with a ransomware. Who pays for it? How much damage does it really cause? What is the price to be paid post-breach? Why it is the citizens responsibility to hold their local governments accountable before it happens to them?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What happens after a municipality gets hacked? <br/><br/>In this episode, Darnley discusses the fates of a city or town that gets hit with a ransomware. Who pays for it? How much damage does it really cause? What is the price to be paid post-breach? Why it is the citizens responsibility to hold their local governments accountable before it happens to them?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14687758-ransomware-and-cities.mp3" length="8912510" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xemegpyepak3pih0zcx2taqbldgj?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14687758</guid>
    <pubDate>Thu, 14 Mar 2024 05:00:00 -0600</pubDate>
    <itunes:duration>738</itunes:duration>
    <itunes:keywords>cybersecurity,threats,cyber,it security,municipal recovery,towns,townships,city,muncipalities,USA,Canada,Europe,China,Russia,hacks,ransomware, ransomware tools,itsec</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>68</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Space and Cybersecurity</itunes:title>
    <title>Space and Cybersecurity</title>
    <itunes:summary><![CDATA[Do Space and Cybersecurity mix?   In this "off the mic" episode of Space and Cybersecurity, Darnley talks about the importance of protecting our space assets against cyber threats and why it is already being threatened. With space tourism taking off, the war spilling into everyones lives, how will this affect our space exploration? Will this war start to turn into space... and why it is already too late.  Click here to send future episode recommendation Support the show Subscribe no...]]></itunes:summary>
    <description><![CDATA[<p>Do Space and Cybersecurity mix? <br/><br/>In this &quot;off the mic&quot; episode of Space and Cybersecurity, Darnley talks about the importance of protecting our space assets against cyber threats and why it is already being threatened. With space tourism taking off, the war spilling into everyones lives, how will this affect our space exploration? Will this war start to turn into space... and why it is already too late. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do Space and Cybersecurity mix? <br/><br/>In this &quot;off the mic&quot; episode of Space and Cybersecurity, Darnley talks about the importance of protecting our space assets against cyber threats and why it is already being threatened. With space tourism taking off, the war spilling into everyones lives, how will this affect our space exploration? Will this war start to turn into space... and why it is already too late. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14625446-space-and-cybersecurity.mp3" length="13205305" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gwthufjk648k4kr22fkty4o1pzsn?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14625446</guid>
    <pubDate>Tue, 05 Mar 2024 04:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14625446/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction " />
  <psc:chapter start="1:14" title="Space and Cybersecurity" />
  <psc:chapter start="6:37" title="Exploration and Cyber" />
  <psc:chapter start="9:19" title="Russia and USA" />
  <psc:chapter start="12:26" title="Private Space Companies" />
  <psc:chapter start="16:25" title="Ending Thoughts" />
  <psc:chapter start="17:13" title="Ending &amp; My Thanks To My Listeners" />
</psc:chapters>
    <itunes:duration>1095</itunes:duration>
    <itunes:keywords>cybersecurity,space security,space exploration,space tech,cyber space,secure space,space safety,secure satellites,cyber resillence,aerospace security,secure communications,United States,Russia,China,Europe,space agencies,NASA,CSA,ESA</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>67</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Moving Away From The Cloud</itunes:title>
    <title>Moving Away From The Cloud</title>
    <itunes:summary><![CDATA[It's 2024, why would business move away from the cloud? Yet they are  In this episode, we discuss the reasons why organizations are moving away from the cloud, the challenges faced by using cloud solutions and why On-Premise solutions are becoming the more affordable option. So why is Cloud computing becoming expensive today? Listen here.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments i...]]></itunes:summary>
    <description><![CDATA[<p>It&apos;s 2024, why would business move away from the cloud? Yet they are<br/><br/>In this episode, we discuss the reasons why organizations are moving away from the cloud, the challenges faced by using cloud solutions and why On-Premise solutions are becoming the more affordable option. So why is Cloud computing becoming expensive today? Listen here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>It&apos;s 2024, why would business move away from the cloud? Yet they are<br/><br/>In this episode, we discuss the reasons why organizations are moving away from the cloud, the challenges faced by using cloud solutions and why On-Premise solutions are becoming the more affordable option. So why is Cloud computing becoming expensive today? Listen here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14595270-moving-away-from-the-cloud.mp3" length="17605303" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/zas8kyliqxxkazdjhl2ly75jxoev?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14595270</guid>
    <pubDate>Wed, 28 Feb 2024 11:00:00 -0700</pubDate>
    <podcast:soundbite startTime="150.167" duration="29.5" />
    <itunes:duration>1462</itunes:duration>
    <itunes:keywords>cybersecurity,threats,cloud computing,cloud computing faults,moving from the cloud,on premise solution,moving to on prem,on prem,podcast,cybersecurity podcast,infosec podcast,cloud,cloud computing,moving cloud,iaas,saas </itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>66</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Neuralink Is the Future</itunes:title>
    <title>Neuralink Is the Future</title>
    <itunes:summary><![CDATA[Neuralink is a company that aims to have a brain-computer interface that can unlock human potential. In this podcast, Darnley discusses this technology, how it is supposed to help humanity, and how to prepare ourselves for having all our brains connected to the internet.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Neuralink is a company that aims to have a brain-computer interface that can unlock human potential. In this podcast, Darnley discusses this technology, how it is supposed to help humanity, and how to prepare ourselves for having all our brains connected to the internet. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Neuralink is a company that aims to have a brain-computer interface that can unlock human potential. In this podcast, Darnley discusses this technology, how it is supposed to help humanity, and how to prepare ourselves for having all our brains connected to the internet. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14495586-neuralink-is-the-future.mp3" length="14791451" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jrhr1ra9o6hb3k37rw8vncej824u?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14495586</guid>
    <pubDate>Mon, 12 Feb 2024 22:00:00 -0700</pubDate>
    <podcast:soundbite startTime="1080.427" duration="42.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/14495586/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:41" title="Episode Recap" />
  <psc:chapter start="1:52" title="What is NeuraLink and How does it work?" />
  <psc:chapter start="13:20" title="Why have brain implants? Is this the future of humankind?" />
  <psc:chapter start="18:52" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1229</itunes:duration>
    <itunes:keywords>neurotechnology,brain,mind,machineinterface,neuralinterface,neuralimplant,neuralengineering,neuralnetworks,neuroscience,ElonMusk,innovation,futurism,neuralink,cybersecurity,ethics,future ethics</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>65</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unveiling Foreign Intrusion: US Senate on Chinese Interference</itunes:title>
    <title>Unveiling Foreign Intrusion: US Senate on Chinese Interference</title>
    <itunes:summary><![CDATA[In this riveting episode, we delve into the investigations and confrontations shaping the landscape of US governance and national security. The US Senate's inquiry into Chinese government interference in critical infrastructure sends shockwaves through the political corridors, igniting debates on safeguarding national interests against foreign influence. With China's growing global reach, the revelations of infiltration pose profound challenges and spark urgent calls for robust countermeasure...]]></itunes:summary>
    <description><![CDATA[<p>In this riveting episode, we delve into the investigations and confrontations shaping the landscape of US governance and national security. The US Senate&apos;s inquiry into Chinese government interference in critical infrastructure sends shockwaves through the political corridors, igniting debates on safeguarding national interests against foreign influence. With China&apos;s growing global reach, the revelations of infiltration pose profound challenges and spark urgent calls for robust countermeasures.</p><p>Meanwhile, on the home front, the spotlight intensifies as social media CEOs face Congress in a contentious showdown. Amid mounting concerns over privacy breaches, misinformation, and deaths, tech titans navigate a minefield of scrutiny and accountability. As the guardians of digital discourse, their responses hold profound implications for the future of online governance and societal cohesion.</p><p>Join us as we unpack the complexities of power, politics, and technological disruption at the heart of these pivotal moments shaping the course of American democracy and global security.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this riveting episode, we delve into the investigations and confrontations shaping the landscape of US governance and national security. The US Senate&apos;s inquiry into Chinese government interference in critical infrastructure sends shockwaves through the political corridors, igniting debates on safeguarding national interests against foreign influence. With China&apos;s growing global reach, the revelations of infiltration pose profound challenges and spark urgent calls for robust countermeasures.</p><p>Meanwhile, on the home front, the spotlight intensifies as social media CEOs face Congress in a contentious showdown. Amid mounting concerns over privacy breaches, misinformation, and deaths, tech titans navigate a minefield of scrutiny and accountability. As the guardians of digital discourse, their responses hold profound implications for the future of online governance and societal cohesion.</p><p>Join us as we unpack the complexities of power, politics, and technological disruption at the heart of these pivotal moments shaping the course of American democracy and global security.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14421695-unveiling-foreign-intrusion-us-senate-on-chinese-interference.mp3" length="21784228" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/krqc172szx4g664593de1z5559cv?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14421695</guid>
    <pubDate>Thu, 01 Feb 2024 10:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14421695/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:33" title="Episode Recap" />
  <psc:chapter start="2:06" title="US Officials Stopped Chinese Cyber-spying Operation" />
  <psc:chapter start="17:45" title="Social Media Giants Bloody Hands" />
  <psc:chapter start="24:30" title="How Can You Protect Yourself?" />
  <psc:chapter start="28:41" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1811</itunes:duration>
    <itunes:keywords>US Politics,US Senate,National Security,Chinese Interference,Critical Infrastructure,cybersecurity,cyber awarenss,Senate Investigation,Tech Titans,Meta,SnapChat,Tiktok,X,Twitter,Facebook,Social Media,Congressional Hearings,Foreign Influence,Digital Govern</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>64</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Human Firewall</itunes:title>
    <title>The Human Firewall</title>
    <itunes:summary><![CDATA[In an era where cybersecurity breaches are rampant and data breaches make daily headlines, organizations are increasingly turning their attention to fortifying their defenses against digital threats. However, amidst the focus on sophisticated software, A.I, and firewalls, there's a critical component often overlooked: the human factor.  Tune in to discover how you can harness the power of the human firewall to safeguard your organization's sensitive data, mitigate risks, and stay one step ahe...]]></itunes:summary>
    <description><![CDATA[<p>In an era where cybersecurity breaches are rampant and data breaches make daily headlines, organizations are increasingly turning their attention to fortifying their defenses against digital threats. However, amidst the focus on sophisticated software, A.I, and firewalls, there&apos;s a critical component often overlooked: the human factor.<br/><br/>Tune in to discover how you can harness the power of the human firewall to safeguard your organization&apos;s sensitive data, mitigate risks, and stay one step ahead of cyber adversaries. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In an era where cybersecurity breaches are rampant and data breaches make daily headlines, organizations are increasingly turning their attention to fortifying their defenses against digital threats. However, amidst the focus on sophisticated software, A.I, and firewalls, there&apos;s a critical component often overlooked: the human factor.<br/><br/>Tune in to discover how you can harness the power of the human firewall to safeguard your organization&apos;s sensitive data, mitigate risks, and stay one step ahead of cyber adversaries. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14376549-the-human-firewall.mp3" length="14240003" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/2lk6dthg4ssxfrpfv8id6tkg6gq8?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14376549</guid>
    <pubDate>Thu, 25 Jan 2024 09:00:00 -0700</pubDate>
    <itunes:duration>1182</itunes:duration>
    <itunes:keywords>Cybersecurity,Cybersecurity podcast,cyber podcast,Cybersecurity Awareness,Human Firewall,Cyber Defense,Cyber Threats,Digital Security,Employee Training,Phishing Prevention,Security Culture,Data Protection,Cyber Awareness Training,Social Engineering,Risk M</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>63</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Your Online Privacy Dead?</itunes:title>
    <title>Is Your Online Privacy Dead?</title>
    <itunes:summary><![CDATA[In this episode, we delve into the pressing question that's been on everyone's mind: Is online data privacy a thing of the past? Join us as we navigate the intricate web of digital landscapes and dissect the factors contributing to the evolving state of our privacy in the online realm.  Join us for a thought-provoking conversation that Darnley confronts the challenging realities of the digital age. Is online data privacy truly a relic of the past, or can we still carve out spaces where our pe...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we delve into the pressing question that&apos;s been on everyone&apos;s mind: Is online data privacy a thing of the past? Join us as we navigate the intricate web of digital landscapes and dissect the factors contributing to the evolving state of our privacy in the online realm.<br/><br/>Join us for a thought-provoking conversation that Darnley confronts the challenging realities of the digital age. Is online data privacy truly a relic of the past, or can we still carve out spaces where our personal information remains secure? Tune in and become part of the dialogue shaping the future of our digital privacy.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we delve into the pressing question that&apos;s been on everyone&apos;s mind: Is online data privacy a thing of the past? Join us as we navigate the intricate web of digital landscapes and dissect the factors contributing to the evolving state of our privacy in the online realm.<br/><br/>Join us for a thought-provoking conversation that Darnley confronts the challenging realities of the digital age. Is online data privacy truly a relic of the past, or can we still carve out spaces where our personal information remains secure? Tune in and become part of the dialogue shaping the future of our digital privacy.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14241269-is-your-online-privacy-dead.mp3" length="12621371" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/i2i8aocehkd235f7sragijb8nu9q?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14241269</guid>
    <pubDate>Wed, 03 Jan 2024 09:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14241269/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:33" title="Episode Recap" />
  <psc:chapter start="1:55" title="Why is your online privacy dead?" />
  <psc:chapter start="6:36" title="Google’s lawsuit against incognito mode, why most people don’t care" />
  <psc:chapter start="12:07" title="Protecting your online privacy, is it worth the energy?" />
  <psc:chapter start="16:16" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1047</itunes:duration>
    <itunes:keywords>cybersecurity,cyber crime,cybersecurity review,data privacy,goggle,google lawsuit,digital security,podcast insights,onlineprivacy,tech ethics</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>62</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Security Year In Review</itunes:title>
    <title>Cyber Security Year In Review</title>
    <itunes:summary><![CDATA[Join us as we reflect on the highs and lows of the cybersecurity landscape in 2023, providing valuable insights for cybersecurity enthusiasts, professionals, and anyone interested in the dynamic world of digital security.  See where Fortra GoAnywhere, 3CX, MOVEit, Barracuda, Microsoft, and Cisco dropped the cybersecurity ball this year. How their failures affect governments, and your every day life.  Click here to send future episode recommendation Support the show Subscribe now to Darnl...]]></itunes:summary>
    <description><![CDATA[<p>Join us as we reflect on the highs and lows of the cybersecurity landscape in 2023, providing valuable insights for cybersecurity enthusiasts, professionals, and anyone interested in the dynamic world of digital security.<br/><br/>See where Fortra GoAnywhere, 3CX, MOVEit, Barracuda, Microsoft, and Cisco dropped the cybersecurity ball this year. How their failures affect governments, and your every day life. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Join us as we reflect on the highs and lows of the cybersecurity landscape in 2023, providing valuable insights for cybersecurity enthusiasts, professionals, and anyone interested in the dynamic world of digital security.<br/><br/>See where Fortra GoAnywhere, 3CX, MOVEit, Barracuda, Microsoft, and Cisco dropped the cybersecurity ball this year. How their failures affect governments, and your every day life. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14192930-cyber-security-year-in-review.mp3" length="14728831" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/pqk25lclwce4o9b875j52ekq1dwx?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14192930</guid>
    <pubDate>Tue, 26 Dec 2023 11:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14192930/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:27" title="Episode Recap" />
  <psc:chapter start="1:49" title="Bid Farewell to 2023" />
  <psc:chapter start="4:10" title="10 Major Cyber Attacks and Breaches" />
  <psc:chapter start="17:36" title="2024 Onward" />
  <psc:chapter start="19:15" title="Final Thoughts, Ending" />
</psc:chapters>
    <itunes:duration>1223</itunes:duration>
    <itunes:keywords>cybersecurity,cyber crime,cybersecurity review,top 10,cyberthreats,zerotrust,supplychainsecurity,cyberhygiene,threatintelligence,securing2023,cyberresilience,techsecurity,itsec,yearintechsecurity</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>61</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Major Cyber Attacks Against Critical Infrastructure</itunes:title>
    <title>Major Cyber Attacks Against Critical Infrastructure</title>
    <itunes:summary><![CDATA[In this gripping episode, we delve into the high-stakes realm of cyber warfare, focusing on the intense rivalry between China, Russia, and the United States. Join us as we unravel the stories behind major cyber attacks against critical infrastructure and explore the intricate dynamics of these digital battlegrounds. 💻 Major Cyber Attacks: We dissect some of the most notorious cyber attacks targeting critical infrastructure. From sophisticated ransomware campaigns to state-sponsored intrusions...]]></itunes:summary>
    <description><![CDATA[<p>In this gripping episode, we delve into the high-stakes realm of cyber warfare, focusing on the intense rivalry between China, Russia, and the United States. Join us as we unravel the stories behind major cyber attacks against critical infrastructure and explore the intricate dynamics of these digital battlegrounds.</p><p>💻 <b>Major Cyber Attacks:</b> We dissect some of the most notorious cyber attacks targeting critical infrastructure. From sophisticated ransomware campaigns to state-sponsored intrusions, we outline the tactics used to infiltrate and compromise vital systems.</p><p>🔒 <b>National Security Implications:</b> Examine the ripple effects of these cyber assaults on national security. How do these attacks impact the day-to-day lives of citizens, and what measures are being taken to safeguard critical infrastructure against future threats?</p><p>Join us for a thought-provoking exploration of the cyber battlegrounds where nations vie for supremacy in an interconnected world.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this gripping episode, we delve into the high-stakes realm of cyber warfare, focusing on the intense rivalry between China, Russia, and the United States. Join us as we unravel the stories behind major cyber attacks against critical infrastructure and explore the intricate dynamics of these digital battlegrounds.</p><p>💻 <b>Major Cyber Attacks:</b> We dissect some of the most notorious cyber attacks targeting critical infrastructure. From sophisticated ransomware campaigns to state-sponsored intrusions, we outline the tactics used to infiltrate and compromise vital systems.</p><p>🔒 <b>National Security Implications:</b> Examine the ripple effects of these cyber assaults on national security. How do these attacks impact the day-to-day lives of citizens, and what measures are being taken to safeguard critical infrastructure against future threats?</p><p>Join us for a thought-provoking exploration of the cyber battlegrounds where nations vie for supremacy in an interconnected world.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14154622-major-cyber-attacks-against-critical-infrastructure.mp3" length="19120629" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/w4nfpa2y1p0iahi1bglrwfidhrer?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14154622</guid>
    <pubDate>Tue, 19 Dec 2023 11:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/14154622/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction" />
  <psc:chapter start="1:25" title="Episode Recap" />
  <psc:chapter start="2:14" title="Why do cyber criminals target major infrastructure?" />
  <psc:chapter start="8:37" title="China, Russia Verses USA – The Cyber Warfare" />
  <psc:chapter start="20:19" title="Where Can We Go From Here?" />
  <psc:chapter start="24:43" title="Final Thoughts, Ending" />
  <psc:chapter start="25:33" title="THANK YOU! Happy Holidays!" />
</psc:chapters>
    <itunes:duration>1588</itunes:duration>
    <itunes:keywords>cybersecurity,cyber criminals,infosec,prepper,prepping,geopolitical,usa,china,russia,uk,canada,cyberwar,cyber warfare,internet warfare,it security,itsec,colonial pieline,supply chain,supply chain attack,supply chain cybera attack,ransomware,ransom,cyber w</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>60</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Netflix Black Mirror Becoming Reality?</itunes:title>
    <title>Netflix Black Mirror Becoming Reality?</title>
    <itunes:summary><![CDATA[In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix's Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.  As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools ...]]></itunes:summary>
    <description><![CDATA[<p>In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix&apos;s Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.<br/><br/>As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools to navigate the complex web of cyber threats. Tune in, buckle up, and let&apos;s embark on a journey to secure the future of your digital existence.<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this gripping episode, join us as we unravel the eerie parallels between the thought-provoking scenarios portrayed in Netflix&apos;s Black Mirror and the real-world cyber threats we face today. From societal surveillance to digital manipulation, we delve into the intersection of speculative fiction and the evolving landscape of cybersecurity.<br/><br/>As we draw parallels between the dystopian narratives of Black Mirror and the real-world challenges we face, equip yourself with the knowledge and tools to navigate the complex web of cyber threats. Tune in, buckle up, and let&apos;s embark on a journey to secure the future of your digital existence.<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14093615-netflix-black-mirror-becoming-reality.mp3" length="22264621" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/8l9q00bw0jtju8avaevsiswj75jh?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14093615</guid>
    <pubDate>Mon, 11 Dec 2023 22:00:00 -0700</pubDate>
    <podcast:soundbite startTime="368.476" duration="41.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/14093615/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Introduction " />
  <psc:chapter start="1:57" title="What is Black Mirror?" />
  <psc:chapter start="5:05" title="Nosedive, Hated in the nation become reality" />
  <psc:chapter start="23:56" title="How to future proof yourself?" />
  <psc:chapter start="29:30" title="Final Thoughts, ending" />
</psc:chapters>
    <itunes:duration>1851</itunes:duration>
    <itunes:keywords>cybersecurity,it security, cybersecurity,cyber awareness,cyber and politics,politics,geopolitics,geopolitical cybersecurity,cybersecurity incidents,cybersecurity threats, Black Mirror Reflections, Cybersecurity Insights, Societal Changes, Tech Dystopia</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>59</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Web of Disinformation Campaigns </itunes:title>
    <title>The Web of Disinformation Campaigns </title>
    <itunes:summary><![CDATA[Oh misinformation, we will break your spell..  In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face of a relentless tide of misinformation.   Learn on how the geopolitical theatre shapes our world and how to protect yourself.    Click ...]]></itunes:summary>
    <description><![CDATA[<p>Oh misinformation, we will break your spell..<br/><br/>In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face of a relentless tide of misinformation. <br/><br/>Learn on how the geopolitical theatre shapes our world and how to protect yourself. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Oh misinformation, we will break your spell..<br/><br/>In this episode, understand the entangled complex web of disinformation and misinformation that threatens to disrupt the delicate balance of our communities. The false narratives start to manifest in the real world, the vulnerability of societal trust, and the importance of critical thinking in the face of a relentless tide of misinformation. <br/><br/>Learn on how the geopolitical theatre shapes our world and how to protect yourself. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14071045-the-web-of-disinformation-campaigns.mp3" length="28749689" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tde1rskzzokuh798ejyjwjjj7zky?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14071045</guid>
    <pubDate>Tue, 05 Dec 2023 00:00:00 -0700</pubDate>
    <podcast:soundbite startTime="17.0" duration="41.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/14071045/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Misinformation Poem" />
  <psc:chapter start="1:22" title="Intro" />
  <psc:chapter start="3:14" title="State and Non-State actors engaging in disinformation" />
  <psc:chapter start="19:51" title="Is disinformation a two-way street?" />
  <psc:chapter start="31:38" title="How to protect yourself from disinformation?" />
  <psc:chapter start="38:44" title="Outro" />
</psc:chapters>
    <itunes:duration>2392</itunes:duration>
    <itunes:keywords>Misinformation,disinformation,Deception,Cybersecurity,cybersecurity news,False Narratives,DigitalAge,Information Manipulation,WebOfDeceit,Ethical Dilemmas,Societal Trust,Critical Thinking,Online Rumors,Info Wars,Zero Trust,Manipulative</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>58</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Medical Record Theft is on The Rise </itunes:title>
    <title>Medical Record Theft is on The Rise </title>
    <itunes:summary><![CDATA[Why were millions of baby data was stolen in Ontario Canada?  MOVEit hack releases millions of personal medical information globally, threats of insurance fraud  Is your data safe anymore?   In this episode, Darnley discusses why cyber criminals are targeting your medical data, and is protecting your data impossible today? Also highlighting what you can do to properly protect yourself in the current world of uncertainty.     Click here to send future episode recommendation Support the sh...]]></itunes:summary>
    <description><![CDATA[<p>Why were millions of baby data was stolen in Ontario Canada?<br/><br/>MOVEit hack releases millions of personal medical information globally, threats of insurance fraud<br/><br/>Is your data safe anymore? <br/><br/>In this episode, Darnley discusses why cyber criminals are targeting your medical data, and is protecting your data impossible today? Also highlighting what you can do to properly protect yourself in the current world of uncertainty. <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Why were millions of baby data was stolen in Ontario Canada?<br/><br/>MOVEit hack releases millions of personal medical information globally, threats of insurance fraud<br/><br/>Is your data safe anymore? <br/><br/>In this episode, Darnley discusses why cyber criminals are targeting your medical data, and is protecting your data impossible today? Also highlighting what you can do to properly protect yourself in the current world of uncertainty. <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/14041745-medical-record-theft-is-on-the-rise.mp3" length="22175966" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qtgevjmgiaejzcgyr2xi1t37zcpt?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14041745</guid>
    <pubDate>Tue, 28 Nov 2023 00:00:00 -0700</pubDate>
    <podcast:soundbite startTime="368.466" duration="37.0" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/14041745/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Intro" />
  <psc:chapter start="1:45" title="Podcast Overview" />
  <psc:chapter start="2:06" title="Why cyber criminals are targeting your medical data?" />
  <psc:chapter start="6:55" title="What is MOVEit and Decades of Newborn Data Stolen in Ontario" />
  <psc:chapter start="14:28" title="Is protecting your data impossible now?" />
  <psc:chapter start="29:18" title="Ending" />
</psc:chapters>
    <itunes:duration>1844</itunes:duration>
    <itunes:keywords>cybersecurity,threats,medical records,medical record theft,cyber crime,Ontario,data theft,cyber risk,is your data safe,insurance fraud,canada,usa,europe,uk,digital rights,how to protect yourself,GDPR,HIPPAA</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>57</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity and Geopolitics</itunes:title>
    <title>Cybersecurity and Geopolitics</title>
    <itunes:summary><![CDATA[Cybersecurity incidents and geopolitical dogma go hand in hand?  In this episode, Darnley discusses the connection between Cybersecurity Geopolitics. This is a different format podcast, meaning Darnley discusses some personal opinions over the current geopolitical landscape along with national security interests that could affect the free world as we know it. Listen to more here.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and ...]]></itunes:summary>
    <description><![CDATA[<p>Cybersecurity incidents and geopolitical dogma go hand in hand?<br/><br/>In this episode, Darnley discusses the connection between Cybersecurity Geopolitics. This is a different format podcast, meaning Darnley discusses some personal opinions over the current geopolitical landscape along with national security interests that could affect the free world as we know it. Listen to more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Cybersecurity incidents and geopolitical dogma go hand in hand?<br/><br/>In this episode, Darnley discusses the connection between Cybersecurity Geopolitics. This is a different format podcast, meaning Darnley discusses some personal opinions over the current geopolitical landscape along with national security interests that could affect the free world as we know it. Listen to more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/12679499-cybersecurity-and-geopolitics.mp3" length="16650174" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/554dxb1hi8j5ijhy2wm5v9n04ncc?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12679499</guid>
    <pubDate>Mon, 24 Apr 2023 00:00:00 -0600</pubDate>
    <itunes:duration>1385</itunes:duration>
    <itunes:keywords>geopolitical,geopolitics,cybersecurity,cyber awareness,cyber and politics,politics,geopolitics,geopolitical cybersecurity,cybersecurity incidents,cybersecurity threats,national security,national security threats,China,USA,Russia,Ukraine,Britian,Canada,nat</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>56</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why the big deal over Artificial Intelligence? </itunes:title>
    <title>Why the big deal over Artificial Intelligence? </title>
    <itunes:summary><![CDATA[Artificial Intelligence (AI) has made quite the splash. With the advancement if ChatGPT, how far has AI come today? Why we should make a big deal out of artificial intelligence and how it will change our world.   Many questions to be answered, Darnley reflects in this episode on how far we come with AI and how AI will change our world into the future.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lat...]]></itunes:summary>
    <description><![CDATA[<p>Artificial Intelligence (AI) has made quite the splash. With the advancement if ChatGPT, how far has AI come today? Why we should make a big deal out of artificial intelligence and how it will change our world. <br/><br/>Many questions to be answered, Darnley reflects in this episode on how far we come with AI and how AI will change our world into the future. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Artificial Intelligence (AI) has made quite the splash. With the advancement if ChatGPT, how far has AI come today? Why we should make a big deal out of artificial intelligence and how it will change our world. <br/><br/>Many questions to be answered, Darnley reflects in this episode on how far we come with AI and how AI will change our world into the future. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/12671249-why-the-big-deal-over-artificial-intelligence.mp3" length="19769951" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/3w8k8kfkdp2c72lwo5m3n23aud9t?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12671249</guid>
    <pubDate>Tue, 18 Apr 2023 00:00:00 -0600</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/12671249/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Why the big deal over Artificial Intelligence? " />
  <psc:chapter start="0:46" title="Podcast Overview " />
  <psc:chapter start="1:09" title="The Beginning of A.I." />
  <psc:chapter start="10:08" title="2.	What’s the big deal of A.I. anyway?" />
  <psc:chapter start="10:16" title="A message from our A.I. overlord" />
  <psc:chapter start="11:13" title="Humans don&#39;t trust A.I." />
  <psc:chapter start="17:27" title="From my experience/reflection" />
  <psc:chapter start="18:51" title="Pushing towards the A.I. future" />
  <psc:chapter start="25:16" title="Why we question A.I. technologies" />
  <psc:chapter start="25:52" title="Tech revolution in the 1960s" />
  <psc:chapter start="26:08" title="No chance of going back" />
  <psc:chapter start="26:20" title="Final thoughts/ending" />
</psc:chapters>
    <itunes:duration>1643</itunes:duration>
    <itunes:keywords>season,podcast,cybersecurity,infosec,itsecurity,itsec,Artificial Intelligence,AI,Google AI,future of AI,Microsoft,ChatGPT,Chat GPT,Future of AI,GPT future,Elon Musk,technology future,future of technology,technology advancement,AI advancement,ChatGPT</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>55</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why You Can’t Trust The Internet</itunes:title>
    <title>Why You Can’t Trust The Internet</title>
    <itunes:summary><![CDATA[Do you know the difference between misinformation and disinformation?  Understanding that our access to unlimited amount of data is being used against all of us, how do we protect ourselves? In this podcast, Darnley defines and discusses the problems of today and how to protect yourself. Listen here.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landsc...]]></itunes:summary>
    <description><![CDATA[<p>Do you know the difference between misinformation and disinformation?<br/> Understanding that our access to unlimited amount of data is being used against all of us, how do we protect ourselves?<br/>In this podcast, Darnley defines and discusses the problems of today and how to protect yourself. Listen here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you know the difference between misinformation and disinformation?<br/> Understanding that our access to unlimited amount of data is being used against all of us, how do we protect ourselves?<br/>In this podcast, Darnley defines and discusses the problems of today and how to protect yourself. Listen here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/12211099-why-you-can-t-trust-the-internet.mp3" length="19767945" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/jjk2vuzd9fx64wqiutstw79pa3gs?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12211099</guid>
    <pubDate>Wed, 08 Feb 2023 09:00:00 -0700</pubDate>
    <podcast:soundbite startTime="872.383" duration="37.0" />
    <itunes:duration>1643</itunes:duration>
    <itunes:keywords>podcast,cybersecurity,infosec,itsecurity,itsec,cybersec,cybersecurity podcast,misinformation,disinformation,internet,google,microsoft,apple,usa,canada,legacy media,fake news,false flag,propaganda,journalism,digital media,conspiracy theories,fact checking,</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>54</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Password Manager Breaches, Are Your Passwords Safe?</itunes:title>
    <title>Password Manager Breaches, Are Your Passwords Safe?</title>
    <itunes:summary><![CDATA[In this episode, Darnley explains about the most recent breach from LastPass. Are password managers reliable anymore? Should you continue to use them even with all these breaches that has happened over the few years?    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley explains about the most recent breach from LastPass. Are password managers reliable anymore? Should you continue to use them even with all these breaches that has happened over the few years? <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley explains about the most recent breach from LastPass. Are password managers reliable anymore? Should you continue to use them even with all these breaches that has happened over the few years? <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/11861877-password-manager-breaches-are-your-passwords-safe.mp3" length="17286319" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/l9s5gl6mv7hdcoefegcl7enxqrcv?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11861877</guid>
    <pubDate>Tue, 13 Dec 2022 00:00:00 -0700</pubDate>
    <podcast:soundbite startTime="877.942" duration="51.5" />
    <podcast:chapters url="https://www.buzzsprout.com/800285/11861877/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Password Manager Breaches, Are Your Passwords Safe?" />
  <psc:chapter start="0:05" title="Introduction" />
  <psc:chapter start="1:05" title="What are password managers? Why people use them?" />
  <psc:chapter start="4:44" title="LastPass Breach, What happened, and other cyber breaches" />
  <psc:chapter start="10:24" title="Should you still use password managers? Are they safe?" />
  <psc:chapter start="19:28" title="Podcast Summary/End" />
</psc:chapters>
    <itunes:duration>1435</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,cybersecurity podcast,lastpass,lastpass breach,cybersecurity breach,password manager,password manager breach,GoTo,master password,Dashlane,Keeper,1Password,RoboForm,Google,University of York,OneLogin,F-Secure,Avast,hacks,breaches,cyb</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>53</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Quantum Computing Will Change The World</itunes:title>
    <title>Quantum Computing Will Change The World</title>
    <itunes:summary><![CDATA[Quantum computers are coming real soon, are you prepared?   In this episode, Darnley describes what Quantum computing is about, the breakthrough of the future of computing, and the dangers of quantum computing. The future is now.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Quantum computers are coming real soon, are you prepared? <br/><br/>In this episode, Darnley describes what Quantum computing is about, the breakthrough of the future of computing, and the dangers of quantum computing. The future is now. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Quantum computers are coming real soon, are you prepared? <br/><br/>In this episode, Darnley describes what Quantum computing is about, the breakthrough of the future of computing, and the dangers of quantum computing. The future is now. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/11820496-quantum-computing-will-change-the-world.mp3" length="17218235" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/nrjl7f8qo9qriskuxn7b8gtwjbwh?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11820496</guid>
    <pubDate>Tue, 06 Dec 2022 00:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/11820496/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Quantum Computing Will Change The World" />
  <psc:chapter start="0:47" title="What Is Quantum Computing?" />
  <psc:chapter start="5:32" title="The Breakthrough of the future of computing" />
  <psc:chapter start="13:13" title="The present and future dangers of quantum computing" />
  <psc:chapter start="19:35" title="Final Recap" />
</psc:chapters>
    <itunes:duration>1429</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,quantum computing,quantum technology,future,Netflix,qubit,China,canada,USA,Neuralink,elon musk</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>52</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is The Tech Boom Over?</itunes:title>
    <title>Is The Tech Boom Over?</title>
    <itunes:summary><![CDATA[With currently layoffs and downsizing, is the tech boom finally over?  In this episode, Darnley explains recent layoffs at silicon valley, the media's thirst over Elon Musk Twitter acquisition, and the protests at Foxconn's iPhone city and the impacts of cheap labour in the technology landscape.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>With currently layoffs and downsizing, is the tech boom finally over?<br/><br/>In this episode, Darnley explains recent layoffs at silicon valley, the media&apos;s thirst over Elon Musk Twitter acquisition, and the protests at Foxconn&apos;s iPhone city and the impacts of cheap labour in the technology landscape. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>With currently layoffs and downsizing, is the tech boom finally over?<br/><br/>In this episode, Darnley explains recent layoffs at silicon valley, the media&apos;s thirst over Elon Musk Twitter acquisition, and the protests at Foxconn&apos;s iPhone city and the impacts of cheap labour in the technology landscape. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/11774232-is-the-tech-boom-over.mp3" length="20399105" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5npf3d5sk2sfe6nhqsdyxyfqoqgb?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11774232</guid>
    <pubDate>Tue, 29 Nov 2022 00:00:00 -0700</pubDate>
    <podcast:chapters url="https://www.buzzsprout.com/800285/11774232/chapters.json" type="application/json" />
    <psc:chapters>
  <psc:chapter start="0:00" title="Is The Tech Boom Over?" />
  <psc:chapter start="0:30" title="Introduction" />
  <psc:chapter start="0:55" title="Is The Big Tech Boom Over?" />
  <psc:chapter start="13:04" title="Media&#39;s Fetish On Twitter" />
  <psc:chapter start="19:08" title="Protests Break Out At Foxconn&#39;s iPhone City" />
  <psc:chapter start="26:57" title="Podcast Summary/End" />
</psc:chapters>
    <itunes:duration>1695</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,technology,tech boom,big tech,Meta,Amazon,Google,Lyft,Stripe,Netflix,Coinbase,silicon valley,tech layoffs</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>51</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Game Has Changed</itunes:title>
    <title>The Game Has Changed</title>
    <itunes:summary><![CDATA[What does geopolitical have to do with cybersecurity?  Do we fully understand the effects of our world events that affect the security of cyber-space?  In this episode of the fifth season, Darnley discusses the fragility of our world in 2022 due to various geopolitical events that correlate to the increase of cyber-crime and events that will affect us all.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lat...]]></itunes:summary>
    <description><![CDATA[<p>What does geopolitical have to do with cybersecurity?<br/><br/>Do we fully understand the effects of our world events that affect the security of cyber-space?<br/><br/>In this episode of the fifth season, Darnley discusses the fragility of our world in 2022 due to various geopolitical events that correlate to the increase of cyber-crime and events that will affect us all. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What does geopolitical have to do with cybersecurity?<br/><br/>Do we fully understand the effects of our world events that affect the security of cyber-space?<br/><br/>In this episode of the fifth season, Darnley discusses the fragility of our world in 2022 due to various geopolitical events that correlate to the increase of cyber-crime and events that will affect us all. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/11709306-the-game-has-changed.mp3" length="12744879" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/j3wc8bomyv9pxy7zm8jli40iw79z?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Café</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11709306</guid>
    <pubDate>Thu, 17 Nov 2022 01:00:00 -0700</pubDate>
    <itunes:duration>1058</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,cyberawareness,geopoligical,landscape,politics,world events,world threats,china,canada,usa,europe,EU,Russia,Ukraine,war in ukraine</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episode>50</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Darnley&#39;s Cyber Café - Season 5</itunes:title>
    <title>Darnley&#39;s Cyber Café - Season 5</title>
    <itunes:summary><![CDATA[Introducing Season 5!  A brand new season of a fresh podcast.    You will find episodes on cybersecurity, technology, news, cybersecurity awareness, business, and top tech news.    I hope you enjoy your stay at the Café!  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Introducing Season 5!  A brand new season of a fresh podcast. </p><p><br/></p><p>You will find episodes on cybersecurity, technology, news, cybersecurity awareness, business, and top tech news. </p><p> </p><p>I hope you enjoy your stay at the Café! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Introducing Season 5!  A brand new season of a fresh podcast. </p><p><br/></p><p>You will find episodes on cybersecurity, technology, news, cybersecurity awareness, business, and top tech news. </p><p> </p><p>I hope you enjoy your stay at the Café! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/11708743-darnley-s-cyber-cafe-season-5.mp3" length="848186" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/5ioeloonmeofolubxt5ldhc2ezel?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11708743</guid>
    <pubDate>Wed, 16 Nov 2022 12:00:00 -0700</pubDate>
    <itunes:duration>68</itunes:duration>
    <itunes:keywords>season,podcast,cybersecurity,infosec,itsecurity,itsec,introduction</itunes:keywords>
    <itunes:season>5</itunes:season>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> Google Has Created Sentient AI</itunes:title>
    <title> Google Has Created Sentient AI</title>
    <itunes:summary><![CDATA[Has Google created sentient Artificial Intelligence?  According to a suspended Google Engineer, Blake Lemoine, may of been the first whistle blower of humans finally creating sentient artificial intelligence.  What are some of the moral dilemma that can ensue with this, and is Google covering this up to reduce public panic?  Darnley talks about the moral implications of artificial life - Listen more here.  Click here to send future episode recommendation Support the show S...]]></itunes:summary>
    <description><![CDATA[<p>Has Google created sentient Artificial Intelligence? <br/>According to a suspended Google Engineer, Blake Lemoine, may of been the first whistle blower of humans finally creating sentient artificial intelligence.  What are some of the moral dilemma that can ensue with this, and is Google covering this up to reduce public panic? <br/>Darnley talks about the moral implications of artificial life - Listen more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Has Google created sentient Artificial Intelligence? <br/>According to a suspended Google Engineer, Blake Lemoine, may of been the first whistle blower of humans finally creating sentient artificial intelligence.  What are some of the moral dilemma that can ensue with this, and is Google covering this up to reduce public panic? <br/>Darnley talks about the moral implications of artificial life - Listen more here. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10788617-google-has-created-sentient-ai.mp3" length="14746915" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/p6ya4ce01346lswg1barc7obzi4u?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10788617</guid>
    <pubDate>Tue, 14 Jun 2022 00:00:00 -0600</pubDate>
    <itunes:duration>1224</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,Google,Alphabet,Google Engineer,Google AI,LAMDA,sentient ai,blake lemoine,cyber awareness,ai security,ai technology,ai awareness,ai future</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>49</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Your IT Jack Of All Trades Hurting Business?</itunes:title>
    <title>Your IT Jack Of All Trades Hurting Business?</title>
    <itunes:summary><![CDATA[Do you have an IT Jack of all trades? Do you know Jack may be hurting your business?  In this episode, learn about how these people or organizations can end up hurting your business in the long run. Understand what to look out for in order to stay cyber secure and not get destroyed after a cyber attack.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you have an IT Jack of all trades?<br/>Do you know Jack may be hurting your business?<br/><br/>In this episode, learn about how these people or organizations can end up hurting your business in the long run. Understand what to look out for in order to stay cyber secure and not get destroyed after a cyber attack. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you have an IT Jack of all trades?<br/>Do you know Jack may be hurting your business?<br/><br/>In this episode, learn about how these people or organizations can end up hurting your business in the long run. Understand what to look out for in order to stay cyber secure and not get destroyed after a cyber attack. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10762258-your-it-jack-of-all-trades-hurting-business.mp3" length="8899406" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/mpdbvvb3a5zky2u5qc2ume63f7cp?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10762258</guid>
    <pubDate>Thu, 09 Jun 2022 00:00:00 -0600</pubDate>
    <itunes:duration>738</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,jack of all trades,IT trade,hurting business,cyber awareness</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>48</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Stop Using Your Pets Name For Your Password</itunes:title>
    <title>Stop Using Your Pets Name For Your Password</title>
    <itunes:summary><![CDATA[We've all been guilty before, but it is not 2000 anymore.   In a recent study, even during World Password Day, a massive number of people are still using their pet's name or information easily available online as their passwords. Listen more here or or your favourite podcast platform.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>We&apos;ve all been guilty before, but it is not 2000 anymore. <br/><br/>In a recent study, even during World Password Day, a massive number of people are still using their pet&apos;s name or information easily available online as their passwords. Listen more here or or your favourite podcast platform. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We&apos;ve all been guilty before, but it is not 2000 anymore. <br/><br/>In a recent study, even during World Password Day, a massive number of people are still using their pet&apos;s name or information easily available online as their passwords. Listen more here or or your favourite podcast platform. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10568329-stop-using-your-pets-name-for-your-password.mp3" length="8592455" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/0t9x5k1zcfk0bmt611eurugwpgbc?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10568329</guid>
    <pubDate>Fri, 06 May 2022 00:00:00 -0600</pubDate>
    <itunes:duration>711</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,passwords,password management,PAM,login,credentials,pets,pet passwords,LastPass,1Password,Bitwarden,password managers,podcast,cybersecurity podcas</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>47</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Time To Abandon Google Chrome</itunes:title>
    <title>Time To Abandon Google Chrome</title>
    <itunes:summary><![CDATA[Are you still using Google Chrome?  Do you even care about your online privacy?  In this episode, Darnley discusses the data eating monster Google Chrome on how it's time has come even as the most powerful search engine company, Google takes a massive market share of browser dominance. Listen now in why you need to ditch Chrome and seek better alternatives to this browser. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay inf...]]></itunes:summary>
    <description><![CDATA[<p>Are you still using Google Chrome?  Do you even care about your online privacy?<br/><br/>In this episode, Darnley discusses the data eating monster Google Chrome on how it&apos;s time has come even as the most powerful search engine company, Google takes a massive market share of browser dominance. Listen now in why you need to ditch Chrome and seek better alternatives to this browser.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you still using Google Chrome?  Do you even care about your online privacy?<br/><br/>In this episode, Darnley discusses the data eating monster Google Chrome on how it&apos;s time has come even as the most powerful search engine company, Google takes a massive market share of browser dominance. Listen now in why you need to ditch Chrome and seek better alternatives to this browser.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10549574-time-to-abandon-google-chrome.mp3" length="9020502" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/bzs74g24hq5db1zcqod717osqj6r?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10549574</guid>
    <pubDate>Wed, 04 May 2022 00:00:00 -0600</pubDate>
    <itunes:duration>747</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,chrome,google chrome,google,ditch chome,delete chrome,chrome browser,browser,browser compare,browser giants,google giant,google security</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>46</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Travelling Securely Around The Globe</itunes:title>
    <title>Travelling Securely Around The Globe</title>
    <itunes:summary><![CDATA[Do you travel abroad? Do you know your data is being tracked, stolen or used against your will?  In this episode, Darnley discusses that foreign intelligence collection activities are running wild and you need to do something about it. Stop making security assumptions, understand what to do while travelling abroad. Making the right preparations will mitigate any harm to you, your place of employment and your country.   Listen to more here or on your favourite podcast platform.  Clic...]]></itunes:summary>
    <description><![CDATA[<p>Do you travel abroad? Do you know your data is being tracked, stolen or used against your will?<br/><br/>In this episode, Darnley discusses that foreign intelligence collection activities are running wild and you need to do something about it. Stop making security assumptions, understand what to do while travelling abroad. Making the right preparations will mitigate any harm to you, your place of employment and your country. <br/><br/>Listen to more here or on your favourite podcast platform. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you travel abroad? Do you know your data is being tracked, stolen or used against your will?<br/><br/>In this episode, Darnley discusses that foreign intelligence collection activities are running wild and you need to do something about it. Stop making security assumptions, understand what to do while travelling abroad. Making the right preparations will mitigate any harm to you, your place of employment and your country. <br/><br/>Listen to more here or on your favourite podcast platform. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10514449-travelling-securely-around-the-globe.mp3" length="9913640" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/tc378qq6evcj0c994bkxrdy6bmez?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10514449</guid>
    <pubDate>Wed, 27 Apr 2022 09:00:00 -0600</pubDate>
    <itunes:duration>820</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,foreign intelligence,intelligence,foreign travel,travelling,how to,protect yourself,data theft,country theft, espionige,communication frau</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>45</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>LinkedIn Is The Most Abused Brand</itunes:title>
    <title>LinkedIn Is The Most Abused Brand</title>
    <itunes:summary><![CDATA[LinkedIn has become a household phishing favourite for cyber criminals in 2022.   In this episode, Darnley explains why LinkedIn phishing attacks have increased over 200% in the last quarter of 2022, he pulls skeletons out of the closet, and how to protect yourself and your business from phishing attacks.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital l...]]></itunes:summary>
    <description><![CDATA[<p>LinkedIn has become a household phishing favourite for cyber criminals in 2022. <br/><br/>In this episode, Darnley explains why LinkedIn phishing attacks have increased over 200% in the last quarter of 2022, he pulls skeletons out of the closet, and how to protect yourself and your business from phishing attacks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>LinkedIn has become a household phishing favourite for cyber criminals in 2022. <br/><br/>In this episode, Darnley explains why LinkedIn phishing attacks have increased over 200% in the last quarter of 2022, he pulls skeletons out of the closet, and how to protect yourself and your business from phishing attacks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10482569-linkedin-is-the-most-abused-brand.mp3" length="14312364" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/obgml11v3odziohd4845ugtjtwbr?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10482569</guid>
    <pubDate>Fri, 22 Apr 2022 00:00:00 -0600</pubDate>
    <itunes:duration>1188</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,LinkedIn,Microsoft,Phishing attack,Linkedin Phishing,LinkedIn Hack,Phishing stats,LinkedIn Hack 2021,have i been pwned,Check point,DHL,Goo</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>44</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Are Airlines Vulnerable to Cyber Attacks?</itunes:title>
    <title>Are Airlines Vulnerable to Cyber Attacks?</title>
    <itunes:summary><![CDATA[Did you hear about that plane that got hacked? or was it the airline?  In this episode, Darnley discusses the vulnerabilities of the aviation industry, top 5 cyber attacks against major airlines, developing news on an airline.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Did you hear about that plane that got hacked? or was it the airline?<br/><br/>In this episode, Darnley discusses the vulnerabilities of the aviation industry, top 5 cyber attacks against major airlines, developing news on an airline. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Did you hear about that plane that got hacked? or was it the airline?<br/><br/>In this episode, Darnley discusses the vulnerabilities of the aviation industry, top 5 cyber attacks against major airlines, developing news on an airline. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10462368-are-airlines-vulnerable-to-cyber-attacks.mp3" length="6090564" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/669ddr2ikp6hvygj5a7mvcn2ed3y?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10462368</guid>
    <pubDate>Tue, 19 Apr 2022 00:00:00 -0600</pubDate>
    <itunes:duration>503</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,airlines,airline security,airline breach,airport attacks,airportcyberattacks,cathay pacific,Star Alliance,oneworld,Air new zealand,air can</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>43</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Panasonic Hacked, Again</itunes:title>
    <title>Panasonic Hacked, Again</title>
    <itunes:summary><![CDATA[Panasonic is under attack, yet again. Why can such a big tech giant fail cybersecurity a second time?  In this episode, Darnley discusses these breaches along with some stats and tips on how to properly protect businesses against the onslaught in cyberspace. Learn about the rise in attacks, Zero trust and how this affects both big and small business.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest de...]]></itunes:summary>
    <description><![CDATA[<p>Panasonic is under attack, yet again. Why can such a big tech giant fail cybersecurity a second time?<br/><br/>In this episode, Darnley discusses these breaches along with some stats and tips on how to properly protect businesses against the onslaught in cyberspace. Learn about the rise in attacks, Zero trust and how this affects both big and small business. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Panasonic is under attack, yet again. Why can such a big tech giant fail cybersecurity a second time?<br/><br/>In this episode, Darnley discusses these breaches along with some stats and tips on how to properly protect businesses against the onslaught in cyberspace. Learn about the rise in attacks, Zero trust and how this affects both big and small business. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10435790-panasonic-hacked-again.mp3" length="8443345" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/94vd5eq1ct3du43t42igncbl2d0s?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10435790</guid>
    <pubDate>Sat, 16 Apr 2022 00:00:00 -0600</pubDate>
    <itunes:duration>698</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,Panasonic,Panasonic breach,Panasonic cyber attack,Japanese,Japan,Canadian,Canada,Conti Group, FBI,SonicWall</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hackers Spoof WhatsApp Voice Messages</itunes:title>
    <title>Hackers Spoof WhatsApp Voice Messages</title>
    <itunes:summary><![CDATA[WhatsApp messages spoofed to target unsuspecting victims. What does the Russian Centre For Road Safety have to do with this?  In this episode, Darnley discusses the latest news of cyber attackers spoofing WhatsApp messages to get victims to download malware that steals sensitive information. Listen more here Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>WhatsApp messages spoofed to target unsuspecting victims. What does the Russian Centre For Road Safety have to do with this?<br/><br/>In this episode, Darnley discusses the latest news of cyber attackers spoofing WhatsApp messages to get victims to download malware that steals sensitive information. Listen more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>WhatsApp messages spoofed to target unsuspecting victims. What does the Russian Centre For Road Safety have to do with this?<br/><br/>In this episode, Darnley discusses the latest news of cyber attackers spoofing WhatsApp messages to get victims to download malware that steals sensitive information. Listen more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10435740-hackers-spoof-whatsapp-voice-messages.mp3" length="7419675" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/ldqvkz6nmyjyb2lwzvur3pei255u?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10435740</guid>
    <pubDate>Thu, 14 Apr 2022 00:00:00 -0600</pubDate>
    <itunes:duration>613</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,cybersecurity podcast,WhatsApp,Facebook,Meta,Office 365,Office Hack,Google Workspace,Workspace Hack,Social engineering,spoofing attacks,sp</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Prepper Building Post-Apocalyptic Internet</itunes:title>
    <title>Prepper Building Post-Apocalyptic Internet</title>
    <itunes:summary><![CDATA[When the world ends, what will happen to the internet? How will we communicate?  A prepper created a new form of internet, a simplier and robust internet that enables mass communication during troubled times. Darnley explains how it works, how easy it is and what relevancy does this have during today's global events.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving di...]]></itunes:summary>
    <description><![CDATA[<p>When the world ends, what will happen to the internet? How will we communicate?<br/><br/>A prepper created a new form of internet, a simplier and robust internet that enables mass communication during troubled times. Darnley explains how it works, how easy it is and what relevancy does this have during today&apos;s global events. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When the world ends, what will happen to the internet? How will we communicate?<br/><br/>A prepper created a new form of internet, a simplier and robust internet that enables mass communication during troubled times. Darnley explains how it works, how easy it is and what relevancy does this have during today&apos;s global events. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10394124-prepper-building-post-apocalyptic-internet.mp3" length="10576236" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/vo0k3obdymjtg4ptoqmcvjuotllw?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10394124</guid>
    <pubDate>Thu, 07 Apr 2022 00:00:00 -0600</pubDate>
    <itunes:duration>876</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,prepper,american prepper,canadian prepper,preppers,Building Post-Apocalyptic Internet,Apocalyptic Internet,Apocalyptic communications,Russ</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>New EU Rules Threaten Big Data Encryption</itunes:title>
    <title>New EU Rules Threaten Big Data Encryption</title>
    <itunes:summary><![CDATA[The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better?  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The European Union passed legislation recently that targets big data, threatens to remove app encryption in order to cross-talk to smaller apps. What does this mean for Europeans? Madness? Are we going backwards in our encryption methods or are we moving forward? Are the Chinese doing it better? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10351324-new-eu-rules-threaten-big-data-encryption.mp3" length="6326585" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/xpwc2zyncel0wazh7m0fjy3znyah?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10351324</guid>
    <pubDate>Thu, 31 Mar 2022 00:00:00 -0600</pubDate>
    <itunes:duration>523</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,Google,Alphabet,GDPR,EU,European Union,Microsoft,Apple,Amazon,big data,big tech,encryption,cyberaware,encryption loss,whatsapp,signal</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Anonymous Operation opRussia Hacks</itunes:title>
    <title>Anonymous Operation opRussia Hacks</title>
    <itunes:summary><![CDATA[How far can cyber war take us? Is Anonymous paving the way of next-level cyber warfare?  The hacker group Anonymous has been taking up digital arms against the Russian Federation over it's invasion of Ukraine over a month ago. What sorts of pain has Anon inflected to Russia? In this Episode, Darnley discusses the hacks recorded by this effective hacker group along with what is next in this cyber war?  Click here to send future episode recommendation Support the show Subscribe now to Darn...]]></itunes:summary>
    <description><![CDATA[<p>How far can cyber war take us? Is Anonymous paving the way of next-level cyber warfare?<br/><br/>The hacker group Anonymous has been taking up digital arms against the Russian Federation over it&apos;s invasion of Ukraine over a month ago. What sorts of pain has Anon inflected to Russia? In this Episode, Darnley discusses the hacks recorded by this effective hacker group along with what is next in this cyber war? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>How far can cyber war take us? Is Anonymous paving the way of next-level cyber warfare?<br/><br/>The hacker group Anonymous has been taking up digital arms against the Russian Federation over it&apos;s invasion of Ukraine over a month ago. What sorts of pain has Anon inflected to Russia? In this Episode, Darnley discusses the hacks recorded by this effective hacker group along with what is next in this cyber war? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10336506-anonymous-operation-oprussia-hacks.mp3" length="11216602" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/83py63dy1q0mxp4606ahgn2kun5q?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10336506</guid>
    <pubDate>Mon, 28 Mar 2022 23:00:00 -0600</pubDate>
    <itunes:duration>930</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,War in ukraine,Anonymous,oprussia,opRussia,Anonymous war,Anonymous operation opRussia,War against Russia,Cyberwar,cyberwarfare,Roskomnadzor,Ukrain</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why TikTok Is Dangerous</itunes:title>
    <title>Why TikTok Is Dangerous</title>
    <itunes:summary><![CDATA["We will collect your keystroke patterns and rhythms - we will add your biological data to the Communist Party of China, resistance is futile"   In this episode, Darnley discusses the dangers of using an app on your mobile devices. Understand the actual information TikTok is collecting from your device, your children, and your browsing habits. Is this another way for the Chinese Communist Party to infiltrate western society? Listen to more in this podcast.  Click here to send future...]]></itunes:summary>
    <description><![CDATA[<p>&quot;We will collect your keystroke patterns and rhythms - we will add your biological data to the Communist Party of China, resistance is futile&quot; <br/><br/>In this episode, Darnley discusses the dangers of using an app on your mobile devices. Understand the actual information TikTok is collecting from your device, your children, and your browsing habits. Is this another way for the Chinese Communist Party to infiltrate western society? Listen to more in this podcast. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>&quot;We will collect your keystroke patterns and rhythms - we will add your biological data to the Communist Party of China, resistance is futile&quot; <br/><br/>In this episode, Darnley discusses the dangers of using an app on your mobile devices. Understand the actual information TikTok is collecting from your device, your children, and your browsing habits. Is this another way for the Chinese Communist Party to infiltrate western society? Listen to more in this podcast. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10307888-why-tiktok-is-dangerous.mp3" length="8070278" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/gwai9hpd5316ugwpe2bmsvymkqzm?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10307888</guid>
    <pubDate>Thu, 24 Mar 2022 01:00:00 -0600</pubDate>
    <itunes:duration>668</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,TikTok,China,CCP,biometic,data theft,cyber data,data intelligence,country spy,comunist spy,USA,China</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Artificial Intelligence Is Going To Control Humanity</itunes:title>
    <title>Why Artificial Intelligence Is Going To Control Humanity</title>
    <itunes:summary><![CDATA[How far has artificial intelligence become? Will they wipe out human beings?  In this episode, part 2 of AI series, Darnley discusses the challenges with today's AI taking over the world but the real threat to advanced AI in the near future. According to PwC and Elon Musk - this is not too far away for us all   Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landsc...]]></itunes:summary>
    <description><![CDATA[<p>How far has artificial intelligence become? Will they wipe out human beings?<br/><br/>In this episode, part 2 of AI series, Darnley discusses the challenges with today&apos;s AI taking over the world but the real threat to advanced AI in the near future. According to PwC and Elon Musk - this is not too far away for us all<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>How far has artificial intelligence become? Will they wipe out human beings?<br/><br/>In this episode, part 2 of AI series, Darnley discusses the challenges with today&apos;s AI taking over the world but the real threat to advanced AI in the near future. According to PwC and Elon Musk - this is not too far away for us all<br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10289311-why-artificial-intelligence-is-going-to-control-humanity.mp3" length="13907984" type="audio/mpeg" />
    <itunes:image href="https://storage.buzzsprout.com/qsux9do0v7kyt6gmv83f076yao2j?.jpg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10289311</guid>
    <pubDate>Tue, 22 Mar 2022 01:00:00 -0600</pubDate>
    <itunes:duration>1154</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,AI,Artifical Intelligence,AI BOTS,the future AI,Intelligence,OpenAI,Elon Musk,PwC,2030,the future of AI,Advanced AI,Robotics,Robots,Intell</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How To Identify Misinformation</itunes:title>
    <title>How To Identify Misinformation</title>
    <itunes:summary><![CDATA[Fake news is spread faster than light speed.  In this episode, Darnley discusses what misinformation, disinformation, and malinformation means to you our democratic society as a whole. Some thought provoking questions to ask yourself while viewing content so that you are not one of the 75% of people that believe in fake news.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-ev...]]></itunes:summary>
    <description><![CDATA[<p>Fake news is spread faster than light speed.<br/><br/>In this episode, Darnley discusses what misinformation, disinformation, and malinformation means to you our democratic society as a whole. Some thought provoking questions to ask yourself while viewing content so that you are not one of the 75% of people that believe in fake news. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Fake news is spread faster than light speed.<br/><br/>In this episode, Darnley discusses what misinformation, disinformation, and malinformation means to you our democratic society as a whole. Some thought provoking questions to ask yourself while viewing content so that you are not one of the 75% of people that believe in fake news. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10208381-how-to-identify-misinformation.mp3" length="7629427" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10208381</guid>
    <pubDate>Tue, 08 Mar 2022 01:00:00 -0700</pubDate>
    <itunes:duration>630</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,how to,misinformation,disinformation,malinformation,fake news,Ukraine,Russia,USA,Canada,Germany,Australia,Finland,South Korea</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Women In Cyber Security</itunes:title>
    <title>Women In Cyber Security</title>
    <itunes:summary><![CDATA[March is Women's history month and this episode Darnley wanted to dedicate to Women who are looking to join the Cybersecurity field.   IT/Cybersecurity was dominated by men, but a shift has occurred with the encouragement by many to get more women involved in this field. Hear Darnley's experience in planting the idea seed to our girl youth to take up a career in cybersec.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and sta...]]></itunes:summary>
    <description><![CDATA[<p>March is Women&apos;s history month and this episode Darnley wanted to dedicate to Women who are looking to join the Cybersecurity field. <br/><br/>IT/Cybersecurity was dominated by men, but a shift has occurred with the encouragement by many to get more women involved in this field. Hear Darnley&apos;s experience in planting the idea seed to our girl youth to take up a career in cybersec. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>March is Women&apos;s history month and this episode Darnley wanted to dedicate to Women who are looking to join the Cybersecurity field. <br/><br/>IT/Cybersecurity was dominated by men, but a shift has occurred with the encouragement by many to get more women involved in this field. Hear Darnley&apos;s experience in planting the idea seed to our girl youth to take up a career in cybersec. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10185649-women-in-cyber-security.mp3" length="11909524" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10185649</guid>
    <pubDate>Fri, 04 Mar 2022 02:00:00 -0700</pubDate>
    <itunes:duration>986</itunes:duration>
    <itunes:keywords>women in cybersecurity,infosec women,women in infosec,March Womens,Womens history month,March history month,Women in Cybersecurity,Getting women involved,Women Support,Women support in infosec,WomenTech,Women In Cybersecurity</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Anonymous Delcared War On Russia</itunes:title>
    <title>Anonymous Delcared War On Russia</title>
    <itunes:summary><![CDATA[Who is Anonymous? Why are they joining this cyber war against Russia?  In this episode, Darnley discusses Anonymous fight against Russia in digital landscape and if they will even be effective in deterring the war against Ukraine. Discussions on why the Russian military is analogue which will work to their advantage and disadvantage. How the Ukrainian volunteer IT army will fight Russia in cyberspace along with Darnley's call to protect humanity against tyranny and unnecessary suffering.&nbsp...]]></itunes:summary>
    <description><![CDATA[<p>Who is Anonymous? Why are they joining this cyber war against Russia?<br/><br/>In this episode, Darnley discusses Anonymous fight against Russia in digital landscape and if they will even be effective in deterring the war against Ukraine. Discussions on why the Russian military is analogue which will work to their advantage and disadvantage. How the Ukrainian volunteer IT army will fight Russia in cyberspace along with Darnley&apos;s call to protect humanity against tyranny and unnecessary suffering. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Who is Anonymous? Why are they joining this cyber war against Russia?<br/><br/>In this episode, Darnley discusses Anonymous fight against Russia in digital landscape and if they will even be effective in deterring the war against Ukraine. Discussions on why the Russian military is analogue which will work to their advantage and disadvantage. How the Ukrainian volunteer IT army will fight Russia in cyberspace along with Darnley&apos;s call to protect humanity against tyranny and unnecessary suffering. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10171337-anonymous-delcared-war-on-russia.mp3" length="11358149" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10171337</guid>
    <pubDate>Wed, 02 Mar 2022 03:00:00 -0700</pubDate>
    <itunes:duration>940</itunes:duration>
    <itunes:keywords>cybersecurity,war,cyber war,warfare,cyber warfare,Russia,Ukraine,NATO,Canada,USA,Ukraine War,War against Russia,Cyber attacks against Russia,Ukraine IT Army,HAM,Ham Radio,Anonymous,Anonymous attack,Anon attack,Anon War</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The AI Singularity</itunes:title>
    <title>The AI Singularity</title>
    <itunes:summary><![CDATA[How far advanced has Artificial Intelligence become? In this part 1 of this topic, Darnley explains his personal experience with AI, discusses what a top researcher recently said, align with the moral complications of introducing advanced AI into human society.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>How far advanced has Artificial Intelligence become? In this part 1 of this topic, Darnley explains his personal experience with AI, discusses what a top researcher recently said, align with the moral complications of introducing advanced AI into human society. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>How far advanced has Artificial Intelligence become? In this part 1 of this topic, Darnley explains his personal experience with AI, discusses what a top researcher recently said, align with the moral complications of introducing advanced AI into human society. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10130745-the-ai-singularity.mp3" length="15119440" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10130745</guid>
    <pubDate>Thu, 24 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>1254</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,AI,Artifical Intelligence,AI BOTS,the future AI,Intelligence,OpenAI,Replika</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>TrickBot Takes Down High Profile Companies</itunes:title>
    <title>TrickBot Takes Down High Profile Companies</title>
    <itunes:summary><![CDATA[TrickBot is up to it's old tricks again - by taking down banks during a politically sensitive moment. Coincidence? I think not!  In this current latest-news unfolding event, Darnley discusses what TrickBot is, how it disrupted some major Canadian banks during a sensitive political time. It also targeted over 60 Financial and Technology companies, such as Amazon, American Express, JP Morgan Chase, Microsoft, Navy Federal Credit Union, Paypal, RBC, Yahoo, etc.  Click here to send future ep...]]></itunes:summary>
    <description><![CDATA[<p>TrickBot is up to it&apos;s old tricks again - by taking down banks during a politically sensitive moment. Coincidence? I think not!<br/><br/>In this current latest-news unfolding event, Darnley discusses what TrickBot is, how it disrupted some major Canadian banks during a sensitive political time. It also targeted over 60 Financial and Technology companies, such as Amazon, American Express, JP Morgan Chase, Microsoft, Navy Federal Credit Union, Paypal, RBC, Yahoo, etc. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>TrickBot is up to it&apos;s old tricks again - by taking down banks during a politically sensitive moment. Coincidence? I think not!<br/><br/>In this current latest-news unfolding event, Darnley discusses what TrickBot is, how it disrupted some major Canadian banks during a sensitive political time. It also targeted over 60 Financial and Technology companies, such as Amazon, American Express, JP Morgan Chase, Microsoft, Navy Federal Credit Union, Paypal, RBC, Yahoo, etc. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10090418-trickbot-takes-down-high-profile-companies.mp3" length="9947870" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10090418</guid>
    <pubDate>Thu, 17 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>823</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,cyber podcast,Amazon,American Express,JP Morgan Chase,Microsoft,Navy Federal Credit Union,PayPal,RBC,Yahoo,Canada,Canadian law,Political,p</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SIM Swapping On The Rise, Draining Millions</itunes:title>
    <title>SIM Swapping On The Rise, Draining Millions</title>
    <itunes:summary><![CDATA[These kinds of attacks are on the rise - $68M rise against all of us. In this episode, this increased threat that has escalated beyond comprehension affects millions of mobile carrier users. Darnley will discuss ways to protect yourself while fighting for your right to remain protected in 2022. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>These kinds of attacks are on the rise - $68M rise against all of us.<br/>In this episode, this increased threat that has escalated beyond comprehension affects millions of mobile carrier users. Darnley will discuss ways to protect yourself while fighting for your right to remain protected in 2022.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>These kinds of attacks are on the rise - $68M rise against all of us.<br/>In this episode, this increased threat that has escalated beyond comprehension affects millions of mobile carrier users. Darnley will discuss ways to protect yourself while fighting for your right to remain protected in 2022.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10076937-sim-swapping-on-the-rise-draining-millions.mp3" length="8539141" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10076937</guid>
    <pubDate>Tue, 15 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>705</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Man That Took Down North Korea</itunes:title>
    <title>The Man That Took Down North Korea</title>
    <itunes:summary><![CDATA[This episode is a story about a US cyber vigilante that plotted his revenge against North Korea after they tried to steal his tools and knowledge.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>This episode is a story about a US cyber vigilante that plotted his revenge against North Korea after they tried to steal his tools and knowledge. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>This episode is a story about a US cyber vigilante that plotted his revenge against North Korea after they tried to steal his tools and knowledge. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10039742-the-man-that-took-down-north-korea.mp3" length="6414368" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10039742</guid>
    <pubDate>Thu, 10 Feb 2022 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="100.55" duration="32.0" />
    <itunes:duration>530</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,social media,social network,facebook,podcast,security podcast,itsecurity,cyberawareness,awareness matters,cyber attack,cyber vigilante,vigilante,infosec vigilante,USA,US,American vigilante,North Korea, Attack Against North Korea,USA v</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Privacy Tips For Your Security Program</itunes:title>
    <title>5 Privacy Tips For Your Security Program</title>
    <itunes:summary><![CDATA[Data Privacy getting you down? Is it too confusing to start?   In this episode, Darnley discusses 5 tips of starting or enhancing your security and privacy Program for your business. Most security pro's would agree that majority of businesses are still ill-equipped to ensure protection of their customer's data. This is why ransomware is still a highly profitable scheme and is only getting worse as the year goes on. Listen here on the tips to ensure your privacy protection.  Click he...]]></itunes:summary>
    <description><![CDATA[<p>Data Privacy getting you down? Is it too confusing to start? <br/><br/>In this episode, Darnley discusses 5 tips of starting or enhancing your security and privacy Program for your business. Most security pro&apos;s would agree that majority of businesses are still ill-equipped to ensure protection of their customer&apos;s data. This is why ransomware is still a highly profitable scheme and is only getting worse as the year goes on. Listen here on the tips to ensure your privacy protection. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Data Privacy getting you down? Is it too confusing to start? <br/><br/>In this episode, Darnley discusses 5 tips of starting or enhancing your security and privacy Program for your business. Most security pro&apos;s would agree that majority of businesses are still ill-equipped to ensure protection of their customer&apos;s data. This is why ransomware is still a highly profitable scheme and is only getting worse as the year goes on. Listen here on the tips to ensure your privacy protection. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10032119-5-privacy-tips-for-your-security-program.mp3" length="14670850" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10032119</guid>
    <pubDate>Tue, 08 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>1218</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,GDPR,CCPA,security,privacy and security,privacy program,security program,business privacy,business security program,business privacy progr</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What Is The Metaverse Exactly?</itunes:title>
    <title>What Is The Metaverse Exactly?</title>
    <itunes:summary><![CDATA[It is all over the news, but what is the metaverse exactly?  In this episode, Darnley undresses the hype and puts it into down to earth information for those who are thinking about getting involved with NFT's or various Crypto-currencies. He also discusses the great business opportunities that await in the metaverse.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving di...]]></itunes:summary>
    <description><![CDATA[<p>It is all over the news, but what is the metaverse exactly?<br/><br/>In this episode, Darnley undresses the hype and puts it into down to earth information for those who are thinking about getting involved with NFT&apos;s or various Crypto-currencies. He also discusses the great business opportunities that await in the metaverse. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>It is all over the news, but what is the metaverse exactly?<br/><br/>In this episode, Darnley undresses the hype and puts it into down to earth information for those who are thinking about getting involved with NFT&apos;s or various Crypto-currencies. He also discusses the great business opportunities that await in the metaverse. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/10003225-what-is-the-metaverse-exactly.mp3" length="11050885" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10003225</guid>
    <pubDate>Thu, 03 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>916</itunes:duration>
    <itunes:keywords>metaverse,internet,meta,facebook,meta,google,microsoft,nike,interweb,the future,future,digital trends,tech hype,tech innovation,NFT,Crypto,Crypto currencies,currencies,business opportunities</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Threats Become Stealthier</itunes:title>
    <title>Cyber Threats Become Stealthier</title>
    <itunes:summary><![CDATA[Cyber threats can attack you from right under your nose. Why?  In this episode, Darnley describes the significant increase of fileless attacks and it is almost ridiculous levels of threats that exist out in cyber space today. Listen to what living off the land now means.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Cyber threats can attack you from right under your nose. Why?<br/><br/>In this episode, Darnley describes the significant increase of fileless attacks and it is almost ridiculous levels of threats that exist out in cyber space today. Listen to what living off the land now means. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Cyber threats can attack you from right under your nose. Why?<br/><br/>In this episode, Darnley describes the significant increase of fileless attacks and it is almost ridiculous levels of threats that exist out in cyber space today. Listen to what living off the land now means. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9989294-cyber-threats-become-stealthier.mp3" length="8643443" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9989294</guid>
    <pubDate>Tue, 01 Feb 2022 02:00:00 -0700</pubDate>
    <itunes:duration>716</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,HTTPS,HTTP,fileless,file attacks,malware,https malware,living off the land,Sonicwall,AMSI Disable,fileless malware,infections,cyber threat</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Renewable Energy Creating Cyber Risks</itunes:title>
    <title>Renewable Energy Creating Cyber Risks</title>
    <itunes:summary><![CDATA[As we move towards a greener future, we may meet our demise anyway. Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter.   In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed before we rethink our posture or should we do something about it today? Listen to more here Click here to send future episode recommendation Supp...]]></itunes:summary>
    <description><![CDATA[<p>As we move towards a greener future, we may meet our demise anyway.<br/>Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter. <br/><br/>In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed before we rethink our posture or should we do something about it today? Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>As we move towards a greener future, we may meet our demise anyway.<br/>Cyber criminals love to attack critical infrastructure and we are about to hand them the silver platter. <br/><br/>In this episode, Darnley discusses the main issues of green energy and why current technologies are antiquated and outdated. Should we wait until people get hurt or killed before we rethink our posture or should we do something about it today? Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9911331-renewable-energy-creating-cyber-risks.mp3" length="8411487" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9911331</guid>
    <pubDate>Fri, 21 Jan 2022 02:00:00 -0700</pubDate>
    <itunes:duration>697</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,cyber podcast,security podcast,renewable energy,green energy,renewable energy fail,cyber risks,IoT,smart meters,industry,security by desig</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why You Can&#39;t Trust Public Cloud</itunes:title>
    <title>Why You Can&#39;t Trust Public Cloud</title>
    <itunes:summary><![CDATA[Do you store everything in the cloud? Is your entire business in the cloud? Do you trust Amazon/Google/Microsoft anymore?  In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability that Microsoft made in the not too distant past. Listen here for more. Click here to send future episode recommendation Support the show Subscribe n...]]></itunes:summary>
    <description><![CDATA[<p>Do you store everything in the cloud?<br/>Is your entire business in the cloud?<br/>Do you trust Amazon/Google/Microsoft anymore?<br/><br/>In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability that Microsoft made in the not too distant past. Listen here for more.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you store everything in the cloud?<br/>Is your entire business in the cloud?<br/>Do you trust Amazon/Google/Microsoft anymore?<br/><br/>In this episode, Darnley discusses the next wave of vulnerabilities that makes you second guess the merit of relying on the public cloud for your protection. Amazon Web Services (AWS) was found to have a massive vulnerability that Microsoft made in the not too distant past. Listen here for more.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9911304-why-you-can-t-trust-public-cloud.mp3" length="8750338" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9911304</guid>
    <pubDate>Wed, 19 Jan 2022 02:00:00 -0700</pubDate>
    <itunes:duration>725</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,Amazon,AWS,Amazon vulnerability,AWS hacked,infosec,Microsoft,Azure,Google,Cloud,Google cloud,public cloud,public cloud failure,public clou</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity In Space - Hacked Satellites</itunes:title>
    <title>Cybersecurity In Space - Hacked Satellites</title>
    <itunes:summary><![CDATA[The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet's handbook?   We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about a hacked satellite? Listen to more in this episode Click here to send future episode recommendation Support the show Subscribe now to Darnl...]]></itunes:summary>
    <description><![CDATA[<p>The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet&apos;s handbook? <br/><br/>We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about a hacked satellite? Listen to more in this episode</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The space race 2.0 is happening right now, how long until we hear about a satellite being hacked in space? Would this be a page out of SkyNet&apos;s handbook? <br/><br/>We have entered a new era of space exploration, corporations are leading the race to make us multi-planetary along with the technology required to make that happen. In 2022, will we now hear about a hacked satellite? Listen to more in this episode</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9844151-cybersecurity-in-space-hacked-satellites.mp3" length="6967030" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9844151</guid>
    <pubDate>Tue, 11 Jan 2022 01:00:00 -0700</pubDate>
    <itunes:duration>576</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,space,space race,Satellites,SpaceX,Elon Musk,Starlink,human space flight,space travel,NASA,CSA,ESA</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Google Attacked By Lawyers And Hackers</itunes:title>
    <title>Google Attacked By Lawyers And Hackers</title>
    <itunes:summary><![CDATA[Google Alphabet is fined from French privacy watchdog CNIL Hackers actively exploit Google Docs that could affect millions.   Are these signs of companies not taking privacy seriously or should there be bigger changes for these tech giants? Find out more here Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Google Alphabet is fined from French privacy watchdog CNIL<br/>Hackers actively exploit Google Docs that could affect millions. <br/><br/>Are these signs of companies not taking privacy seriously or should there be bigger changes for these tech giants? Find out more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Google Alphabet is fined from French privacy watchdog CNIL<br/>Hackers actively exploit Google Docs that could affect millions. <br/><br/>Are these signs of companies not taking privacy seriously or should there be bigger changes for these tech giants? Find out more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9844087-google-attacked-by-lawyers-and-hackers.mp3" length="9945295" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9844087</guid>
    <pubDate>Fri, 07 Jan 2022 01:00:00 -0700</pubDate>
    <itunes:duration>824</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,Google,Alphabet,GDPR,SNIL,Fines,privacy fines,GDPR fines</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Downsize Your Digital Weight For 2022</itunes:title>
    <title>Downsize Your Digital Weight For 2022</title>
    <itunes:summary><![CDATA[Do you feel FAT32?  Do you have excess digital fat around your life?   It is 2022 and it is time to lose some of that weight, learn 5 different ways to reduce your digital fat while feeling better about yourself in the future. Darnley discusses how data is collected, and what you can do about it. It is never too late to have a new years resolution.  Brokers Discussed In Podcast: Acxiom, Equifax, Expridan, Oracle, Epsilon Click here to send future episode recommendation Support the s...]]></itunes:summary>
    <description><![CDATA[<p>Do you feel FAT32? <br/>Do you have excess digital fat around your life? <br/><br/>It is 2022 and it is time to lose some of that weight, learn 5 different ways to reduce your digital fat while feeling better about yourself in the future. Darnley discusses how data is collected, and what you can do about it. It is never too late to have a new years resolution.<br/><br/>Brokers Discussed In Podcast:<br/>Acxiom, Equifax, Expridan, Oracle, Epsilon</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you feel FAT32? <br/>Do you have excess digital fat around your life? <br/><br/>It is 2022 and it is time to lose some of that weight, learn 5 different ways to reduce your digital fat while feeling better about yourself in the future. Darnley discusses how data is collected, and what you can do about it. It is never too late to have a new years resolution.<br/><br/>Brokers Discussed In Podcast:<br/>Acxiom, Equifax, Expridan, Oracle, Epsilon</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9828989-downsize-your-digital-weight-for-2022.mp3" length="14064594" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9828989</guid>
    <pubDate>Tue, 04 Jan 2022 07:00:00 -0700</pubDate>
    <itunes:duration>1168</itunes:duration>
    <itunes:keywords>new years,2022,new years 2022,new years podcast,cybersecurity podcast,infosec podcast,trim the fat,weight loss,digital weight loss,cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Year In Review 2021</itunes:title>
    <title>Cybersecurity Year In Review 2021</title>
    <itunes:summary><![CDATA[2021 in Cyber Security was quite a ride.  From all sorts of attacks, vulnerabilities, ransomware, threat actors, pipeline shut down, water treatments plant attack, Zero day attack, and remote work. This episode is a review in the past year of some notable attacks that happened in the security landscape. Darnley explains why he is not looking forward to 2022 as this could be the year of human fatalities due to these cyber attacks.  Click here to send future episode recommendation Support ...]]></itunes:summary>
    <description><![CDATA[<p>2021 in Cyber Security was quite a ride.<br/><br/>From all sorts of attacks, vulnerabilities, ransomware, threat actors, pipeline shut down, water treatments plant attack, Zero day attack, and remote work. This episode is a review in the past year of some notable attacks that happened in the security landscape. Darnley explains why he is not looking forward to 2022 as this could be the year of human fatalities due to these cyber attacks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>2021 in Cyber Security was quite a ride.<br/><br/>From all sorts of attacks, vulnerabilities, ransomware, threat actors, pipeline shut down, water treatments plant attack, Zero day attack, and remote work. This episode is a review in the past year of some notable attacks that happened in the security landscape. Darnley explains why he is not looking forward to 2022 as this could be the year of human fatalities due to these cyber attacks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9798015-cybersecurity-year-in-review-2021.mp3" length="12941112" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9798015</guid>
    <pubDate>Wed, 29 Dec 2021 02:00:00 -0700</pubDate>
    <itunes:duration>1074</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,cybersecurity podcast,cyber podcast,year in review,2021,2022,podcast 2021,itsec podcast,business podcast,political podcast,cybersecurity p</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sex Robots and Cyber Security?</itunes:title>
    <title>Sex Robots and Cyber Security?</title>
    <itunes:summary><![CDATA[When do sex robots become a podcast?   With the Covid-19 pandemic, the increased demand of intimacy during lockdowns became better known and the industry provides.  Will these sex dolls become another Amazon Alexa, Cortana, or Google Home? Listen to this podcast for more.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>When do sex robots become a podcast? <br/><br/>With the Covid-19 pandemic, the increased demand of intimacy during lockdowns became better known and the industry provides.<br/><br/>Will these sex dolls become another Amazon Alexa, Cortana, or Google Home? Listen to this podcast for more. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When do sex robots become a podcast? <br/><br/>With the Covid-19 pandemic, the increased demand of intimacy during lockdowns became better known and the industry provides.<br/><br/>Will these sex dolls become another Amazon Alexa, Cortana, or Google Home? Listen to this podcast for more. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9757182-sex-robots-and-cyber-security.mp3" length="7912116" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9757182</guid>
    <pubDate>Wed, 22 Dec 2021 02:00:00 -0700</pubDate>
    <itunes:duration>655</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,sex dolls,cybersec sex,RealDolls,metaverse,the future of robots,the future,sex robots,Sex AI robots,AI</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protect Your Business and Data During The Holiday Season</itunes:title>
    <title>Protect Your Business and Data During The Holiday Season</title>
    <itunes:summary><![CDATA[What happened to Darnley?  Why The Grinch Stole Your Data?  As we enter the Holiday season full swing, cyber criminals are quick at trying to make your holidays as uncomfortable as possible. With the explosive online sales this year, one of your employees are bound to mess up. Learn how to protect your organization from those digital grinches this holiday season.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informe...]]></itunes:summary>
    <description><![CDATA[<p>What happened to Darnley? <br/>Why The Grinch Stole Your Data?<br/><br/>As we enter the Holiday season full swing, cyber criminals are quick at trying to make your holidays as uncomfortable as possible. With the explosive online sales this year, one of your employees are bound to mess up. Learn how to protect your organization from those digital grinches this holiday season. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What happened to Darnley? <br/>Why The Grinch Stole Your Data?<br/><br/>As we enter the Holiday season full swing, cyber criminals are quick at trying to make your holidays as uncomfortable as possible. With the explosive online sales this year, one of your employees are bound to mess up. Learn how to protect your organization from those digital grinches this holiday season. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9756855-protect-your-business-and-data-during-the-holiday-season.mp3" length="8215293" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9756855</guid>
    <pubDate>Tue, 21 Dec 2021 02:00:00 -0700</pubDate>
    <itunes:duration>680</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,podcast,holiday,holiday season,christmas,grinch,holiday data,protect your data,holiday breaches,holiday hacks,business,protect your business,cyber</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Amazon Web Services Outage </itunes:title>
    <title>Amazon Web Services Outage </title>
    <itunes:summary><![CDATA[On December 7, Amazon Web Services went down affecting thousands of businesses and people who were unable to use some services. Amazon prime delivery services were delayed and videos were not able to stream.  How will humanity venture further into digital bliss without high speed access? Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>On December 7, Amazon Web Services went down affecting thousands of businesses and people who were unable to use some services. Amazon prime delivery services were delayed and videos were not able to stream.<br/><br/>How will humanity venture further into digital bliss without high speed access?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>On December 7, Amazon Web Services went down affecting thousands of businesses and people who were unable to use some services. Amazon prime delivery services were delayed and videos were not able to stream.<br/><br/>How will humanity venture further into digital bliss without high speed access?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9698242-amazon-web-services-outage.mp3" length="11354004" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9698242</guid>
    <pubDate>Fri, 10 Dec 2021 09:00:00 -0700</pubDate>
    <itunes:duration>942</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,security podcast,itsecurity,cybersecuity news,cyberawareness,cyberaware,infosec,it news,Amazon,Web services,Amazon outage,AWS Outage,internet outage,servcice outage,podcast</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Parenting In Today&#39;s Digital Age</itunes:title>
    <title>Parenting In Today&#39;s Digital Age</title>
    <itunes:summary><![CDATA[Are you those parents who share everything on social media? Are you aware you are hurting your children by simply posting innocent photos on Instagram or Facebook?   In this episode, we discuss the problems with being too personal with your children on social media and the harm you are truly causing your child without you realizing it.    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in...]]></itunes:summary>
    <description><![CDATA[<p>Are you those parents who share everything on social media? Are you aware you are hurting your children by simply posting innocent photos on Instagram or Facebook? <br/><br/>In this episode, we discuss the problems with being too personal with your children on social media and the harm you are truly causing your child without you realizing it. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you those parents who share everything on social media? Are you aware you are hurting your children by simply posting innocent photos on Instagram or Facebook? <br/><br/>In this episode, we discuss the problems with being too personal with your children on social media and the harm you are truly causing your child without you realizing it. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9676492-parenting-in-today-s-digital-age.mp3" length="13583095" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9676492</guid>
    <pubDate>Tue, 07 Dec 2021 02:00:00 -0700</pubDate>
    <podcast:soundbite startTime="990.0" duration="51.0" />
    <itunes:duration>1127</itunes:duration>
    <itunes:keywords>cyberscurity,infosec,social media,social network,facebook,instagram,family photos,podcast,security podcast,itsecurity,family security,cyberawareness,awareness matters,protect your children</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Canadian Teen Arrested in $36.5M Crypto Theft</itunes:title>
    <title>Canadian Teen Arrested in $36.5M Crypto Theft</title>
    <itunes:summary><![CDATA[Who said Canadian's were nice? Recent news have exposed a Canadian Teenager who stole about $36.5 million of cryptocurrency - one the largest in human history. The grinch has been caught, but is that good enough? Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Who said Canadian&apos;s were nice?<br/>Recent news have exposed a Canadian Teenager who stole about $36.5 million of cryptocurrency - one the largest in human history. The grinch has been caught, but is that good enough?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Who said Canadian&apos;s were nice?<br/>Recent news have exposed a Canadian Teenager who stole about $36.5 million of cryptocurrency - one the largest in human history. The grinch has been caught, but is that good enough?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9637428-canadian-teen-arrested-in-36-5m-crypto-theft.mp3" length="6967036" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9637428</guid>
    <pubDate>Thu, 02 Dec 2021 02:00:00 -0700</pubDate>
    <itunes:duration>576</itunes:duration>
    <itunes:keywords>cybersecurity,information security,infosec,it security,podcast,cybersecurity podcast,criminal,canadian teen,canadian crypto theft,crypto theft,hamilton,ontario,canada,police report</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Starlink and Google To Join Forces</itunes:title>
    <title>Starlink and Google To Join Forces</title>
    <itunes:summary><![CDATA[Elon Musk's Starlink and Google cloud are joining forces to provide Starlink internet users faster internet speeds, greater connectivity along with low latency. Is this the partnership that everyone wants for the future of the internet? Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Elon Musk&apos;s Starlink and Google cloud are joining forces to provide Starlink internet users faster internet speeds, greater connectivity along with low latency. Is this the partnership that everyone wants for the future of the internet?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Elon Musk&apos;s Starlink and Google cloud are joining forces to provide Starlink internet users faster internet speeds, greater connectivity along with low latency. Is this the partnership that everyone wants for the future of the internet?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9637402-starlink-and-google-to-join-forces.mp3" length="9534956" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9637402</guid>
    <pubDate>Tue, 30 Nov 2021 09:00:00 -0700</pubDate>
    <itunes:duration>790</itunes:duration>
    <itunes:keywords>cybersecurity,cyberaware,infosec,itsecurity,cyberawareness,beaware,becybersmart,network security,itsec,cybersecurity news,infosec news</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>GoDaddy Hack Exposes Millions Of Accounts</itunes:title>
    <title>GoDaddy Hack Exposes Millions Of Accounts</title>
    <itunes:summary><![CDATA[The world largest domain registrar was attacked with over 1 Million accounts stolen affecting roughly 20 million Go Daddy users. Listen to this episode to learn ways to protect your credentials from cyber criminals.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>The world largest domain registrar was attacked with over 1 Million accounts stolen affecting roughly 20 million Go Daddy users. Listen to this episode to learn ways to protect your credentials from cyber criminals. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The world largest domain registrar was attacked with over 1 Million accounts stolen affecting roughly 20 million Go Daddy users. Listen to this episode to learn ways to protect your credentials from cyber criminals. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9607557-godaddy-hack-exposes-millions-of-accounts.mp3" length="12388168" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9607557</guid>
    <pubDate>Thu, 25 Nov 2021 03:00:00 -0700</pubDate>
    <itunes:duration>1028</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast,Go daddy,godaddy breach 2021,2021 breach</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Meta Haptic Glove To Revolutionize The Metaverse</itunes:title>
    <title>Meta Haptic Glove To Revolutionize The Metaverse</title>
    <itunes:summary><![CDATA[Is the future finally here? Does anyone remember the Nintendo Power Glove?  In this episode, Darnley reveals the prototype Meta (Facebook) is currently designing for the metaverse. This haptic glove will define the way we live and work once it hits mass market. Listen to more here Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Is the future finally here? Does anyone remember the Nintendo Power Glove?<br/><br/>In this episode, Darnley reveals the prototype Meta (Facebook) is currently designing for the metaverse. This haptic glove will define the way we live and work once it hits mass market. Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Is the future finally here? Does anyone remember the Nintendo Power Glove?<br/><br/>In this episode, Darnley reveals the prototype Meta (Facebook) is currently designing for the metaverse. This haptic glove will define the way we live and work once it hits mass market. Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9575593-meta-haptic-glove-to-revolutionize-the-metaverse.mp3" length="8607741" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9575593</guid>
    <pubDate>Tue, 23 Nov 2021 04:00:00 -0700</pubDate>
    <itunes:duration>713</itunes:duration>
    <itunes:keywords>Meta,facebook,metaverse,virtual reality,augmented reality,VR,AR,Facebook Meta,cybersecurity,cyberaware,infosec,itsecurity,cyberawareness,nintendo,power glove,the future,cybersecurity,future threats,prototype,coming soon</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>10 Ways To Combat Ransomware</itunes:title>
    <title>10 Ways To Combat Ransomware</title>
    <itunes:summary><![CDATA[Don't you just love the sweet smell of ransomware in the morning?  The onslaught of ransomware still affects millions of people daily, cyber criminals are being paid to continue their attacks against you. Do you even know how to be cyber resilient?  In this podcast, Darnley discusses 10 ways to protect your business against ransomware malware today.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the ...]]></itunes:summary>
    <description><![CDATA[<p>Don&apos;t you just love the sweet smell of ransomware in the morning? <br/>The onslaught of ransomware still affects millions of people daily, cyber criminals are being paid to continue their attacks against you. Do you even know how to be cyber resilient? <br/>In this podcast, Darnley discusses 10 ways to protect your business against ransomware malware today. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Don&apos;t you just love the sweet smell of ransomware in the morning? <br/>The onslaught of ransomware still affects millions of people daily, cyber criminals are being paid to continue their attacks against you. Do you even know how to be cyber resilient? <br/>In this podcast, Darnley discusses 10 ways to protect your business against ransomware malware today. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9569122-10-ways-to-combat-ransomware.mp3" length="23088106" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9569122</guid>
    <pubDate>Thu, 18 Nov 2021 04:00:00 -0700</pubDate>
    <podcast:soundbite startTime="506.0" duration="45.0" />
    <itunes:duration>1920</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,ransomware,ransomware threats,cyber attacks,veritas technologies,ransomware attacks,top 10,top 10 ways to protect yourself,fight against ransomware,cybersecrity news,protect your business,Zero-trust,best practices,cyber playbook,it s</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>iPhone vs. Android: Which Is More Secure?</itunes:title>
    <title>iPhone vs. Android: Which Is More Secure?</title>
    <itunes:summary><![CDATA[The battle between Apple vs. Everyone has been a battle fought with Steve Jobs. Is Apple iPhone really better or is it just some classy fashion statement? Does the FBI dislike them even more? Listen more here on this podcast to see if Android or Apple is the better mobile operating system Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>The battle between Apple vs. Everyone has been a battle fought with Steve Jobs. Is Apple iPhone really better or is it just some classy fashion statement? Does the FBI dislike them even more? Listen more here on this podcast to see if Android or Apple is the better mobile operating system</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The battle between Apple vs. Everyone has been a battle fought with Steve Jobs. Is Apple iPhone really better or is it just some classy fashion statement? Does the FBI dislike them even more? Listen more here on this podcast to see if Android or Apple is the better mobile operating system</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9554724-iphone-vs-android-which-is-more-secure.mp3" length="19631818" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9554724</guid>
    <pubDate>Tue, 16 Nov 2021 04:00:00 -0700</pubDate>
    <podcast:soundbite startTime="961.157" duration="48.0" />
    <itunes:duration>1632</itunes:duration>
    <itunes:keywords>apple,android,iphone,ios,mac,osx,steve jobs,bill gates,mobile device,mobile device security,cybersecurity,cyberawareness,battle of smart devices,is ios secure,is android secure,which phone is most secure,most secure phone,battle of the phones,iphone secur</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hackers Can Steal Your Two Factor Authentication</itunes:title>
    <title>Hackers Can Steal Your Two Factor Authentication</title>
    <itunes:summary><![CDATA[Two Factor Authentication or One Time Password (2FA / OTP) are authentication methods that are still used by many. In this episode, Darnley discusses the difference between 2FA and MFA, why 2FA is broken and what ideal situation you should be in. It's time to evolve beyond 2FA in 2021.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Two Factor Authentication or One Time Password (2FA / OTP) are authentication methods that are still used by many. In this episode, Darnley discusses the difference between 2FA and MFA, why 2FA is broken and what ideal situation you should be in. It&apos;s time to evolve beyond 2FA in 2021. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Two Factor Authentication or One Time Password (2FA / OTP) are authentication methods that are still used by many. In this episode, Darnley discusses the difference between 2FA and MFA, why 2FA is broken and what ideal situation you should be in. It&apos;s time to evolve beyond 2FA in 2021. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9535487-hackers-can-steal-your-two-factor-authentication.mp3" length="17078311" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9535487</guid>
    <pubDate>Fri, 12 Nov 2021 05:00:00 -0700</pubDate>
    <itunes:duration>1419</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,cyberawareness,podcast,cybersecurity podcast,itsec,it security,2fa,otp,two factor,one time password,risk,risk management,2fa is dead,weak password,weak authentication,data breach,greek wars,Jack Dorsey,Elon Musk,NIST,SMS,Text,Biance</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Disadvantages and Risk With The Cloud</itunes:title>
    <title>Disadvantages and Risk With The Cloud</title>
    <itunes:summary><![CDATA[Have you ever wondered about the cloud? Have you even imagined it?  In this episode. Darnley discusses what the cloud really is and why they are prone to cyber attacks today. Why the supply chain is important along with layers of protection that ensures your privacy today.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Have you ever wondered about the cloud? Have you even imagined it?<br/><br/>In this episode. Darnley discusses what the cloud really is and why they are prone to cyber attacks today. Why the supply chain is important along with layers of protection that ensures your privacy today. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever wondered about the cloud? Have you even imagined it?<br/><br/>In this episode. Darnley discusses what the cloud really is and why they are prone to cyber attacks today. Why the supply chain is important along with layers of protection that ensures your privacy today. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9512222-disadvantages-and-risk-with-the-cloud.mp3" length="18399562" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9512222</guid>
    <pubDate>Tue, 09 Nov 2021 04:00:00 -0700</pubDate>
    <itunes:duration>1529</itunes:duration>
    <itunes:keywords>cybersecurity,cyberaware,infosec,itsecurity,cyberawareness,cloud,cloud solutions,Amazon,Microsoft,Google</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is The Metaverse The Next Frontier? </itunes:title>
    <title>Is The Metaverse The Next Frontier? </title>
    <itunes:summary><![CDATA[With the recent Facebook/ Meta announcement, human existence as we know it is going to change.   In this podcast, Darnley will talk about the new digital world that we will soon be subject to - bad or good. Is this Metaverse be met with optimism or pessimism?  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>With the recent Facebook/ Meta announcement, human existence as we know it is going to change. <br/><br/>In this podcast, Darnley will talk about the new digital world that we will soon be subject to - bad or good. Is this Metaverse be met with optimism or pessimism? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>With the recent Facebook/ Meta announcement, human existence as we know it is going to change. <br/><br/>In this podcast, Darnley will talk about the new digital world that we will soon be subject to - bad or good. Is this Metaverse be met with optimism or pessimism? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9484398-is-the-metaverse-the-next-frontier.mp3" length="13511632" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9484398</guid>
    <pubDate>Thu, 04 Nov 2021 05:00:00 -0600</pubDate>
    <itunes:duration>1122</itunes:duration>
    <itunes:keywords>Meta,facebook,metaverse,virtual reality,augmented reality,VR,AR,Facebook Meta,cybersecurity,cyberaware,infosec,itsecurity,cyberawareness,beaware,becybersmart,network security,itsec,IaaS,SaaS,EDR,NDR,SIEM,MSS,MSSP</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity And The UFO Phenomenon</itunes:title>
    <title>Cybersecurity And The UFO Phenomenon</title>
    <itunes:summary><![CDATA[Have you ever looked up at the night sky and wonder about all the hacking that has gone on in our world? I do, but I also think about those media worthy hacks over the last 20 years that has disclosed some interesting clues that maybe we are not alone.   You may consider this podcast an X-File, but I talk about some notable hacks that has shaken up the UFO community at large.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and...]]></itunes:summary>
    <description><![CDATA[<p>Have you ever looked up at the night sky and wonder about all the hacking that has gone on in our world? I do, but I also think about those media worthy hacks over the last 20 years that has disclosed some interesting clues that maybe we are not alone. <br/><br/>You may consider this podcast an X-File, but I talk about some notable hacks that has shaken up the UFO community at large. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever looked up at the night sky and wonder about all the hacking that has gone on in our world? I do, but I also think about those media worthy hacks over the last 20 years that has disclosed some interesting clues that maybe we are not alone. <br/><br/>You may consider this podcast an X-File, but I talk about some notable hacks that has shaken up the UFO community at large. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9449083-cybersecurity-and-the-ufo-phenomenon.mp3" length="12477497" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9449083</guid>
    <pubDate>Thu, 28 Oct 2021 07:00:00 -0600</pubDate>
    <itunes:duration>1035</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast,government,government hacks,it government hacks,USA government hacks,Hiliary Clinton,Clinton,</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Google Keyword Warrants</itunes:title>
    <title>Google Keyword Warrants</title>
    <itunes:summary><![CDATA[How would you feel if your law enforcement agency acquired all of your search history? How would you feel if they already had it?  Discussion over the US government ordering of data theft by stealing your search terms. How far is too far when it comes to your online privacy?  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>How would you feel if your law enforcement agency acquired all of your search history? How would you feel if they already had it?<br/><br/>Discussion over the US government ordering of data theft by stealing your search terms. How far is too far when it comes to your online privacy? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>How would you feel if your law enforcement agency acquired all of your search history? How would you feel if they already had it?<br/><br/>Discussion over the US government ordering of data theft by stealing your search terms. How far is too far when it comes to your online privacy? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9407626-google-keyword-warrants.mp3" length="11443022" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9407626</guid>
    <pubDate>Thu, 21 Oct 2021 07:00:00 -0600</pubDate>
    <itunes:duration>949</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,planning,cyber awareness,risk,cybersec,itsecurity,cybersecurity news,cyber news,sovereignty,cyber sovereignty,itsecurity news,itsec news,darn it group,podcast,podcaster,podcast episode,Google,Google Keywords,Theft,USA,American Law</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Month</itunes:title>
    <title>Cybersecurity Month</title>
    <itunes:summary><![CDATA[October is Cybersecurity Month, do you know where your data is?  In this podcast, there are no ghosts, only education on how to protect you, your data and your privacy while surfing on the information super highway. This is the month of digital and security reflection for ourselves and our business. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>October is Cybersecurity Month, do you know where your data is?<br/><br/>In this podcast, there are no ghosts, only education on how to protect you, your data and your privacy while surfing on the information super highway. This is the month of digital and security reflection for ourselves and our business.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>October is Cybersecurity Month, do you know where your data is?<br/><br/>In this podcast, there are no ghosts, only education on how to protect you, your data and your privacy while surfing on the information super highway. This is the month of digital and security reflection for ourselves and our business.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9365798-cybersecurity-month.mp3" length="19433975" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9365798</guid>
    <pubDate>Tue, 19 Oct 2021 05:00:00 -0600</pubDate>
    <itunes:duration>1615</itunes:duration>
    <itunes:keywords>cybersecurity,information security,infosec,itsecurity,podcast,cybersecurity podcast,russian hackers,personal story,podcaster,cybersecurity awareness,cyberaware,how to,protect your business,cybercrime,cyber criminal,cybersecurity awarness month,cyberaware</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Solar Storms and The End Of The Internet</itunes:title>
    <title>Solar Storms and The End Of The Internet</title>
    <itunes:summary><![CDATA[Don't you love seeing the northern lights? Is it not a sight of beauty?  Behind that wall of green lights there is a monster lurking behind it to end the very thing we love - the internet. In this podcast, Darnley discusses what a solar storm is, which country is most affected and how to mitigate the problem.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital la...]]></itunes:summary>
    <description><![CDATA[<p>Don&apos;t you love seeing the northern lights? Is it not a sight of beauty?<br/><br/>Behind that wall of green lights there is a monster lurking behind it to end the very thing we love - the internet. In this podcast, Darnley discusses what a solar storm is, which country is most affected and how to mitigate the problem. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Don&apos;t you love seeing the northern lights? Is it not a sight of beauty?<br/><br/>Behind that wall of green lights there is a monster lurking behind it to end the very thing we love - the internet. In this podcast, Darnley discusses what a solar storm is, which country is most affected and how to mitigate the problem. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9361522-solar-storms-and-the-end-of-the-internet.mp3" length="11774079" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9361522</guid>
    <pubDate>Thu, 14 Oct 2021 05:00:00 -0600</pubDate>
    <podcast:soundbite startTime="127.0" duration="30.0" />
    <itunes:duration>977</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,business,cyberaware,cyberawareness,solar storms,october,solar flare,g2,solar radiation,internet</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Windows 11 - Security By Default?</itunes:title>
    <title>Windows 11 - Security By Default?</title>
    <itunes:summary><![CDATA[Ta-da! Windows released a new operating system - Windows 11. What does this mean for cybersecurity? Are they going to pull this off or royally get attacked?     Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Ta-da! Windows released a new operating system - Windows 11. What does this mean for cybersecurity? Are they going to pull this off or royally get attacked? <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Ta-da! Windows released a new operating system - Windows 11. What does this mean for cybersecurity? Are they going to pull this off or royally get attacked? <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9319392-windows-11-security-by-default.mp3" length="8505520" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9319392</guid>
    <pubDate>Mon, 11 Oct 2021 05:00:00 -0600</pubDate>
    <itunes:duration>704</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,cyberaware,cyber awareness,cyber culture,itsec,podcast,cybersecurity podcast</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Day Facebook Stood Still</itunes:title>
    <title>The Day Facebook Stood Still</title>
    <itunes:summary><![CDATA["It was October 4th 2021, I was trying to talk to my sweetheart. Then the unbelievable happened, Facebook was gone, vanished. For a second I thought the world ended, but I chuckled at myself and realized what happened"...  Listen in to our brand new Podcast - Darnley's Cyber Cafe. Enjoy your cup of java  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>&quot;It was October 4th 2021, I was trying to talk to my sweetheart. Then the unbelievable happened, Facebook was gone, vanished. For a second I thought the world ended, but I chuckled at myself and realized what happened&quot;...<br/><br/>Listen in to our brand new Podcast - Darnley&apos;s Cyber Cafe. Enjoy your cup of java </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>&quot;It was October 4th 2021, I was trying to talk to my sweetheart. Then the unbelievable happened, Facebook was gone, vanished. For a second I thought the world ended, but I chuckled at myself and realized what happened&quot;...<br/><br/>Listen in to our brand new Podcast - Darnley&apos;s Cyber Cafe. Enjoy your cup of java </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/9315036-the-day-facebook-stood-still.mp3" length="10600372" type="audio/mpeg" />
    <itunes:author>Darnley&#39;s Cyber Cafe</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9315036</guid>
    <pubDate>Tue, 05 Oct 2021 08:00:00 -0600</pubDate>
    <podcast:soundbite startTime="60.0" duration="29.0" />
    <itunes:duration>879</itunes:duration>
    <itunes:keywords>cybersecurity podcast,cybersecurity,cyber security,infosec,information security,itsecurity,cybersecurity awareness,information security podcast,cyber podcast,it security,itsec podcast</itunes:keywords>
    <itunes:season>4</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Pro&#39;s False Sense Of Security</itunes:title>
    <title>Security Pro&#39;s False Sense Of Security</title>
    <itunes:summary><![CDATA[What is a false sense of security?  Have you ever made an assumption which turned out being incorrect?  In this episode, Darnley discusses the fundamentals of human ignorance, why industrial disasters equate to cybersecurity screw-ups, and how to avoid a cyber explosion.  IT and Cybersecurity professionals are not perfect, and usually that ignorance leads to the amount of breaches experienced today. Listen to more here Click here to send future episode recommendation Support the show Sub...]]></itunes:summary>
    <description><![CDATA[<p>What is a false sense of security? <br/>Have you ever made an assumption which turned out being incorrect?<br/><br/>In this episode, Darnley discusses the fundamentals of human ignorance, why industrial disasters equate to cybersecurity screw-ups, and how to avoid a cyber explosion.<br/><br/>IT and Cybersecurity professionals are not perfect, and usually that ignorance leads to the amount of breaches experienced today. Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What is a false sense of security? <br/>Have you ever made an assumption which turned out being incorrect?<br/><br/>In this episode, Darnley discusses the fundamentals of human ignorance, why industrial disasters equate to cybersecurity screw-ups, and how to avoid a cyber explosion.<br/><br/>IT and Cybersecurity professionals are not perfect, and usually that ignorance leads to the amount of breaches experienced today. Listen to more here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8707351-security-pro-s-false-sense-of-security.mp3" length="8247590" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8707351</guid>
    <pubDate>Tue, 15 Jun 2021 10:00:00 -0600</pubDate>
    <itunes:duration>679</itunes:duration>
    <itunes:keywords>cybersecurity,podcast,infosec,ignorance,it security,cyber,cybersec,itsec,informationtechnology,podcast,cybersecurity podcast,truth,cybercrime,cyber criminals</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why All The Email Threats?</itunes:title>
    <title>Why All The Email Threats?</title>
    <itunes:summary><![CDATA[We all have a common enemy - hackers.  They are attempting to steal our data everyday by attacking our email systems.  In this episode, Darnley gives you all the goods in protecting and hardening your email. By utilizing truth, industry advice, along with 10 tips to protect yourself from being hacked.   Email is not secure, learn how to protect yourself in this podcast.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay ...]]></itunes:summary>
    <description><![CDATA[<p>We all have a common enemy - hackers.<br/><br/>They are attempting to steal our data everyday by attacking our email systems.<br/><br/>In this episode, Darnley gives you all the goods in protecting and hardening your email. By utilizing truth, industry advice, along with 10 tips to protect yourself from being hacked. <br/><br/>Email is not secure, learn how to protect yourself in this podcast. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We all have a common enemy - hackers.<br/><br/>They are attempting to steal our data everyday by attacking our email systems.<br/><br/>In this episode, Darnley gives you all the goods in protecting and hardening your email. By utilizing truth, industry advice, along with 10 tips to protect yourself from being hacked. <br/><br/>Email is not secure, learn how to protect yourself in this podcast. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8586090-why-all-the-email-threats.mp3" length="17249153" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8586090</guid>
    <pubDate>Tue, 25 May 2021 12:00:00 -0600</pubDate>
    <itunes:duration>1429</itunes:duration>
    <itunes:keywords>cybersecurity,cyberaware,infosec,business,it security,itsec,infosec,cyberawareness,it,technology,privacy,cyber privacy,data security,email,email security,</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Password-less Near Our Future?</itunes:title>
    <title>Is Password-less Near Our Future?</title>
    <itunes:summary><![CDATA[We live in a world where we reuse passwords - and cybercriminals love it when we reuse our passwords!  Is password-less logins near the horizon? In this podcast, Darnley discusses why passwords are in a love hate relationship with security pros, World Password Day, The password-less future, and how remote working has changed the cybersecurity game.     Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest d...]]></itunes:summary>
    <description><![CDATA[<p>We live in a world where we reuse passwords - and cybercriminals love it when we reuse our passwords!<br/><br/>Is password-less logins near the horizon? In this podcast, Darnley discusses why passwords are in a love hate relationship with security pros, World Password Day, The password-less future, and how remote working has changed the cybersecurity game. <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We live in a world where we reuse passwords - and cybercriminals love it when we reuse our passwords!<br/><br/>Is password-less logins near the horizon? In this podcast, Darnley discusses why passwords are in a love hate relationship with security pros, World Password Day, The password-less future, and how remote working has changed the cybersecurity game. <br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8513744-is-password-less-near-our-future.mp3" length="14504116" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8513744</guid>
    <pubDate>Tue, 18 May 2021 05:00:00 -0600</pubDate>
    <itunes:duration>1200</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,business,cyber,cyber aware,cyber security,passwords,future,passwordless,authentication,infrastructure, </itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Don&#39;t Let Hackers Take Your DNS Down</itunes:title>
    <title>Don&#39;t Let Hackers Take Your DNS Down</title>
    <itunes:summary><![CDATA[Do you sometimes feel the end is nigh?  Perhaps your DNS provider thinks so.  In this episode, Darnley discusses what a DNS is, how can it impact your revenue generation operations. What is DNS redundancy and why is the porn industry involved?  Listen here Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you sometimes feel the end is nigh? <br/>Perhaps your DNS provider thinks so.<br/><br/>In this episode, Darnley discusses what a DNS is, how can it impact your revenue generation operations. What is DNS redundancy and why is the porn industry involved?<br/><br/>Listen here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you sometimes feel the end is nigh? <br/>Perhaps your DNS provider thinks so.<br/><br/>In this episode, Darnley discusses what a DNS is, how can it impact your revenue generation operations. What is DNS redundancy and why is the porn industry involved?<br/><br/>Listen here</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8478202-don-t-let-hackers-take-your-dns-down.mp3" length="12677222" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8478202</guid>
    <pubDate>Tue, 11 May 2021 05:00:00 -0600</pubDate>
    <itunes:duration>1048</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why I Hate Cybersecurity</itunes:title>
    <title>Why I Hate Cybersecurity</title>
    <itunes:summary><![CDATA[Why hate on cybersecurity?  In this special edition podcast, Darnley explains some frustration over cybersecurity and dealing with people who do not completely understand the concepts.   A message to anyone who is looking at entering the cybersecurity field, consider the following.   Don't forget that within this frustration, there is lots of lovs.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the l...]]></itunes:summary>
    <description><![CDATA[<p>Why hate on cybersecurity?<br/><br/>In this special edition podcast, Darnley explains some frustration over cybersecurity and dealing with people who do not completely understand the concepts. <br/><br/>A message to anyone who is looking at entering the cybersecurity field, consider the following. <br/><br/>Don&apos;t forget that within this frustration, there is lots of lovs. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Why hate on cybersecurity?<br/><br/>In this special edition podcast, Darnley explains some frustration over cybersecurity and dealing with people who do not completely understand the concepts. <br/><br/>A message to anyone who is looking at entering the cybersecurity field, consider the following. <br/><br/>Don&apos;t forget that within this frustration, there is lots of lovs. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8478179-why-i-hate-cybersecurity.mp3" length="13325766" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8478179</guid>
    <pubDate>Fri, 07 May 2021 09:00:00 -0600</pubDate>
    <itunes:duration>1102</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Signal Safe?</itunes:title>
    <title>Is Signal Safe?</title>
    <itunes:summary><![CDATA[The mass exodus from WhatsApp to Signal stirred some major questions: Is Signal any safer? Could signal get breached? Why are famous people advocating using this app?  Find out in this episode. Oh, and Lucifer makes a guest appearance... Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>The mass exodus from WhatsApp to Signal stirred some major questions: Is Signal any safer? Could signal get breached? Why are famous people advocating using this app?<br/><br/>Find out in this episode. Oh, and Lucifer makes a guest appearance...</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The mass exodus from WhatsApp to Signal stirred some major questions: Is Signal any safer? Could signal get breached? Why are famous people advocating using this app?<br/><br/>Find out in this episode. Oh, and Lucifer makes a guest appearance...</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8457102-is-signal-safe.mp3" length="10239329" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8457102</guid>
    <pubDate>Tue, 04 May 2021 08:00:00 -0600</pubDate>
    <itunes:duration>845</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast,Signal,Whatsapp,signal</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Sekur The Swiss Secure Platform</itunes:title>
    <title>Sekur The Swiss Secure Platform</title>
    <itunes:summary><![CDATA[Are you a business/organization/individual who is concerned of your online privacy?  Do you know there's another alternative for you online communications?  In this episode, Darnley discussed about a Swiss made application called Sekur. Sekur is launching in North America this year and gives everyone the ability to protect their online data while maintaining control which is unheard of in todays technological landscape.  For more details, visit: www.sekur.com Click here to send future ep...]]></itunes:summary>
    <description><![CDATA[<p>Are you a business/organization/individual who is concerned of your online privacy? <br/>Do you know there&apos;s another alternative for you online communications?<br/><br/>In this episode, Darnley discussed about a Swiss made application called Sekur. Sekur is launching in North America this year and gives everyone the ability to protect their online data while maintaining control which is unheard of in todays technological landscape.<br/><br/>For more details, visit:<br/>www.sekur.com</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you a business/organization/individual who is concerned of your online privacy? <br/>Do you know there&apos;s another alternative for you online communications?<br/><br/>In this episode, Darnley discussed about a Swiss made application called Sekur. Sekur is launching in North America this year and gives everyone the ability to protect their online data while maintaining control which is unheard of in todays technological landscape.<br/><br/>For more details, visit:<br/>www.sekur.com</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8247505-sekur-the-swiss-secure-platform.mp3" length="12054662" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8247505</guid>
    <pubDate>Fri, 02 Apr 2021 05:00:00 -0600</pubDate>
    <itunes:duration>996</itunes:duration>
    <itunes:keywords>privacy,data,cybersecurity,infosec,dataprotection,dataprivacy,staysafeonline,sekur,globex data,communications,email,email security,infose,instant messaging,microsoft,google,sekur,amazon</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Solarwinds Blame Game</itunes:title>
    <title>The Solarwinds Blame Game</title>
    <itunes:summary><![CDATA[In the aftermath of the SolarWinds breach, comes the scapegoat.   In this episode, Darnley discusses his distain of the ex-CEO of Solarwinds (Now rebranded N-Able), and his inability to concede fault in the downfall of Solarwinds cybersecurity is an example for all leaders to take ownership of their organizations.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving ...]]></itunes:summary>
    <description><![CDATA[<p>In the aftermath of the SolarWinds breach, comes the scapegoat. <br/><br/>In this episode, Darnley discusses his distain of the ex-CEO of Solarwinds (Now rebranded N-Able), and his inability to concede fault in the downfall of Solarwinds cybersecurity is an example for all leaders to take ownership of their organizations. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In the aftermath of the SolarWinds breach, comes the scapegoat. <br/><br/>In this episode, Darnley discusses his distain of the ex-CEO of Solarwinds (Now rebranded N-Able), and his inability to concede fault in the downfall of Solarwinds cybersecurity is an example for all leaders to take ownership of their organizations. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8247261-the-solarwinds-blame-game.mp3" length="7317814" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8247261</guid>
    <pubDate>Wed, 31 Mar 2021 08:00:00 -0600</pubDate>
    <itunes:duration>602</itunes:duration>
    <itunes:keywords>technology,cybersecurity,humans,fake news,is technology good,cloud,infosec,communication,solarwinds,nable,infosec,cybersec,cybernews</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>It’s Not Always About The Sophisticated Cyber Attacks </itunes:title>
    <title>It’s Not Always About The Sophisticated Cyber Attacks </title>
    <itunes:summary><![CDATA[Are you under information over load? Do you feel your organization will not keep up with all these cyber attacks?  In this episode, Darnley explains the importance of keeping a grassroots approach while considering your businesses best interests in hand.  Want to see the video podcast, visit Darn IT Podcast on YouTube! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digita...]]></itunes:summary>
    <description><![CDATA[<p>Are you under information over load?<br/>Do you feel your organization will not keep up with all these cyber attacks?<br/><br/>In this episode, Darnley explains the importance of keeping a grassroots approach while considering your businesses best interests in hand.<br/><br/>Want to see the video podcast, visit Darn IT Podcast on YouTube!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you under information over load?<br/>Do you feel your organization will not keep up with all these cyber attacks?<br/><br/>In this episode, Darnley explains the importance of keeping a grassroots approach while considering your businesses best interests in hand.<br/><br/>Want to see the video podcast, visit Darn IT Podcast on YouTube!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/8169704-it-s-not-always-about-the-sophisticated-cyber-attacks.mp3" length="6188128" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8169704</guid>
    <pubDate>Fri, 19 Mar 2021 06:00:00 -0600</pubDate>
    <itunes:duration>507</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why You Should Care About Data Privacy Even If You Have Nothing To Hide</itunes:title>
    <title>Why You Should Care About Data Privacy Even If You Have Nothing To Hide</title>
    <itunes:summary><![CDATA[You may know that your data is used against you, but do you know to what extent? Living in 2021 may seem like a pipe dream from 100 years ago, but to what cost to our privacy?  In this episode, Darnley discusses the different between Privacy vs. Secrecy, why you close the door when you go to the toilet, and why privacy is a human right. Tune in to the thought provoking podcast. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay inf...]]></itunes:summary>
    <description><![CDATA[<p>You may know that your data is used against you, but do you know to what extent? Living in 2021 may seem like a pipe dream from 100 years ago, but to what cost to our privacy?<br/><br/>In this episode, Darnley discusses the different between Privacy vs. Secrecy, why you close the door when you go to the toilet, and why privacy is a human right. Tune in to the thought provoking podcast.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>You may know that your data is used against you, but do you know to what extent? Living in 2021 may seem like a pipe dream from 100 years ago, but to what cost to our privacy?<br/><br/>In this episode, Darnley discusses the different between Privacy vs. Secrecy, why you close the door when you go to the toilet, and why privacy is a human right. Tune in to the thought provoking podcast.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/7965205-why-you-should-care-about-data-privacy-even-if-you-have-nothing-to-hide.mp3" length="9702817" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7965205</guid>
    <pubDate>Fri, 19 Feb 2021 09:00:00 -0700</pubDate>
    <itunes:duration>800</itunes:duration>
    <itunes:keywords>cybersecurity,cyberaware,infosec,business,it security,itsec,infosec,cyberawareness,it,technology,privacy,cyber privacy,data security,cybersecurity podcast,podcast,it security podcast</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Having A Smarter Cybersecurity Mindset</itunes:title>
    <title>Having A Smarter Cybersecurity Mindset</title>
    <itunes:summary><![CDATA[Do you have preconceived notions of cybersecurity? Do you think a technical problem requires a technical solution? Did you know that majority of cyberattacks are caused by human error?  In this podcast, Darnley discusses the fundamentals of why cybersecurity needs to be managed, not only for the CISO. It takes a village to build a proper cybersecurity ecosystem. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the lat...]]></itunes:summary>
    <description><![CDATA[<p>Do you have preconceived notions of cybersecurity?<br/>Do you think a technical problem requires a technical solution?<br/>Did you know that majority of cyberattacks are caused by human error?<br/><br/>In this podcast, Darnley discusses the fundamentals of why cybersecurity needs to be managed, not only for the CISO. It takes a village to build a proper cybersecurity ecosystem.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you have preconceived notions of cybersecurity?<br/>Do you think a technical problem requires a technical solution?<br/>Did you know that majority of cyberattacks are caused by human error?<br/><br/>In this podcast, Darnley discusses the fundamentals of why cybersecurity needs to be managed, not only for the CISO. It takes a village to build a proper cybersecurity ecosystem.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/7675237-having-a-smarter-cybersecurity-mindset.mp3" length="9426898" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7675237</guid>
    <pubDate>Thu, 04 Feb 2021 09:00:00 -0700</pubDate>
    <itunes:duration>777</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Human Resources Is Crucial To Building Cybersecurity Culture</itunes:title>
    <title>Human Resources Is Crucial To Building Cybersecurity Culture</title>
    <itunes:summary><![CDATA[Organizations across the globe are facing a common enemy, and it is time for the Human Resources (HR) department to take a stand.  In this episode, Darnley explains the role that HR plays with cybersecurity, being the organization's police officers, enforcing awareness and progress throughout an organization.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital la...]]></itunes:summary>
    <description><![CDATA[<p>Organizations across the globe are facing a common enemy, and it is time for the Human Resources (HR) department to take a stand.<br/><br/>In this episode, Darnley explains the role that HR plays with cybersecurity, being the organization&apos;s police officers, enforcing awareness and progress throughout an organization. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Organizations across the globe are facing a common enemy, and it is time for the Human Resources (HR) department to take a stand.<br/><br/>In this episode, Darnley explains the role that HR plays with cybersecurity, being the organization&apos;s police officers, enforcing awareness and progress throughout an organization. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/7487128-human-resources-is-crucial-to-building-cybersecurity-culture.mp3" length="15399350" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7487128</guid>
    <pubDate>Tue, 26 Jan 2021 05:00:00 -0700</pubDate>
    <itunes:duration>1275</itunes:duration>
    <itunes:keywords>business,cybersecurity,infosec,education,human resources,hr,cyberawareness,cyberculture,company culture,culture,business culture</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Is Your Job Too</itunes:title>
    <title>Cybersecurity Is Your Job Too</title>
    <itunes:summary><![CDATA[The majority of employees feel cybersecurity is not their job, not their problem, nor their responsibility. I'm here to tell you that you are wrong.   In 2021, today's cybersecurity responsibilities lay on all of our hands. IT/security departments alike are drowning in various responsibilities, ignorance is one of them. In this podcast, Darnley will discuss why human error is one of the most common root causes of data breaches, how to build a 5-way cyber-secure work environment culture, ...]]></itunes:summary>
    <description><![CDATA[<p>The majority of employees feel cybersecurity is not their job, not their problem, nor their responsibility. I&apos;m here to tell you that you are wrong. <br/><br/>In 2021, today&apos;s cybersecurity responsibilities lay on all of our hands. IT/security departments alike are drowning in various responsibilities, ignorance is one of them. In this podcast, Darnley will discuss why human error is one of the most common root causes of data breaches, how to build a 5-way cyber-secure work environment culture, what we should do while working from home, and a note to leaders. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>The majority of employees feel cybersecurity is not their job, not their problem, nor their responsibility. I&apos;m here to tell you that you are wrong. <br/><br/>In 2021, today&apos;s cybersecurity responsibilities lay on all of our hands. IT/security departments alike are drowning in various responsibilities, ignorance is one of them. In this podcast, Darnley will discuss why human error is one of the most common root causes of data breaches, how to build a 5-way cyber-secure work environment culture, what we should do while working from home, and a note to leaders. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/7303507-cybersecurity-is-your-job-too.mp3" length="20096098" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-7303507</guid>
    <pubDate>Fri, 15 Jan 2021 05:00:00 -0700</pubDate>
    <itunes:duration>1666</itunes:duration>
    <itunes:keywords>cybersecirity,infosec,it security,data security,it responsibilities,cyberaware,cyber awareness,cyber culture,security culture,itsec,podcast,cybersecurity podcast</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Year 2020 In Review</itunes:title>
    <title>Cybersecurity Year 2020 In Review</title>
    <itunes:summary><![CDATA[Wow, what a year. 2020 is a year for the history books.   What did it mean for cybersecurity?  In this podcast, Darnley discusses the year of the Corona Virus and its effect on the world and our cybersecurity world. Discussion over recent Solarwinds attack, Twitter, and Zoom attacks that made headlines over 2020. What lies ahead for us in 2021? Listen to predictions here.   [New for 2021: Look for the video podcast on you YouTube, stay tuned!] Click here to send future episode recommendation ...]]></itunes:summary>
    <description><![CDATA[<p>Wow, what a year. 2020 is a year for the history books. <br/><br/>What did it mean for cybersecurity?<br/><br/>In this podcast, Darnley discusses the year of the Corona Virus and its effect on the world and our cybersecurity world. Discussion over recent Solarwinds attack, Twitter, and Zoom attacks that made headlines over 2020. What lies ahead for us in 2021? Listen to predictions here. <br/><br/>[<b><em>New for 2021:</em></b> Look for the video podcast on you YouTube, stay tuned!]</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Wow, what a year. 2020 is a year for the history books. <br/><br/>What did it mean for cybersecurity?<br/><br/>In this podcast, Darnley discusses the year of the Corona Virus and its effect on the world and our cybersecurity world. Discussion over recent Solarwinds attack, Twitter, and Zoom attacks that made headlines over 2020. What lies ahead for us in 2021? Listen to predictions here. <br/><br/>[<b><em>New for 2021:</em></b> Look for the video podcast on you YouTube, stay tuned!]</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/7179628-cybersecurity-year-2020-in-review.mp3" length="16237937" type="audio/mpeg" />
    <itunes:author>Darnley G </itunes:author>
    <guid isPermaLink="false">Buzzsprout-7179628</guid>
    <pubDate>Thu, 07 Jan 2021 11:00:00 -0700</pubDate>
    <itunes:duration>1345</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,new year,2020,2021,2020 pandemic,covid19,corona virus,infosec,itsecurity,cyberaware,cyberawareness</itunes:keywords>
    <itunes:season>3</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>When Does A Cyber Attack Become An Act Of War?</itunes:title>
    <title>When Does A Cyber Attack Become An Act Of War?</title>
    <itunes:summary><![CDATA[When cybercriminals attack a government institution, our response should launch a swift nuclear attack against the offending nation...right?   In this episode, Darnley explains the act of war mindset in cyberspace. What constitutes that type of response, why we need to take care of our assumption of these attacks all the while looking at ourselves.    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the late...]]></itunes:summary>
    <description><![CDATA[<p>When cybercriminals attack a government institution, our response should launch a swift nuclear attack against the offending nation...right? <br/><br/>In this episode, Darnley explains the act of war mindset in cyberspace. What constitutes that type of response, why we need to take care of our assumption of these attacks all the while looking at ourselves. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When cybercriminals attack a government institution, our response should launch a swift nuclear attack against the offending nation...right? <br/><br/>In this episode, Darnley explains the act of war mindset in cyberspace. What constitutes that type of response, why we need to take care of our assumption of these attacks all the while looking at ourselves. <br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/6234532-when-does-a-cyber-attack-become-an-act-of-war.mp3" length="12521483" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6234532</guid>
    <pubDate>Thu, 05 Nov 2020 07:00:00 -0700</pubDate>
    <itunes:duration>1035</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,planning,cyberattack,war,counterstrike,itsecurity,becyberaware,becybersafe,cyberawareness,cybersecurity awareness,state attacks,canada,usa</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>42</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Spending More Time Online Will Get You Phished</itunes:title>
    <title>Why Spending More Time Online Will Get You Phished</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses the surge of technology and online use since March 2020. The increased expenditures on technology have equated to more people using technology and spending time online - which creates a bigger gold mine for cybercriminals.  Learn why the "new normal" makes it easier for hackers to infiltrate your network to cause chaos. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest deve...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley discusses the surge of technology and online use since March 2020. The increased expenditures on technology have equated to more people using technology and spending time online - which creates a bigger gold mine for cybercriminals.<br/><br/>Learn why the &quot;new normal&quot; makes it easier for hackers to infiltrate your network to cause chaos.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley discusses the surge of technology and online use since March 2020. The increased expenditures on technology have equated to more people using technology and spending time online - which creates a bigger gold mine for cybercriminals.<br/><br/>Learn why the &quot;new normal&quot; makes it easier for hackers to infiltrate your network to cause chaos.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/6106585-why-spending-more-time-online-will-get-you-phished.mp3" length="14643678" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6106585</guid>
    <pubDate>Wed, 28 Oct 2020 09:00:00 -0600</pubDate>
    <itunes:duration>1212</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,cybersecurity,becybersafe,cyberaware,cyberawarness,cybersecurityawareness,phsihing,malware,cyber attacks,smishing,attacks</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>41</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Client From Hell - Special Edition Podcast</itunes:title>
    <title>The Client From Hell - Special Edition Podcast</title>
    <itunes:summary><![CDATA[Casting from the deep depths of Halloween, this is the client from hell!  In this special episode, Darnley talks about his run-in with a very interesting ex-client who took the team through some technological and psychological nightmares. He will discuss what not to do when taking over an account that is undergoing a cybersecurity incident, what not to do during an event.   Halloween Special Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cybe...]]></itunes:summary>
    <description><![CDATA[<p>Casting from the deep depths of Halloween, this is the client from hell!<br/><br/>In this special episode, Darnley talks about his run-in with a very interesting ex-client who took the team through some technological and psychological nightmares. He will discuss what not to do when taking over an account that is undergoing a cybersecurity incident, what not to do during an event. <br/><br/>Halloween Special</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Casting from the deep depths of Halloween, this is the client from hell!<br/><br/>In this special episode, Darnley talks about his run-in with a very interesting ex-client who took the team through some technological and psychological nightmares. He will discuss what not to do when taking over an account that is undergoing a cybersecurity incident, what not to do during an event. <br/><br/>Halloween Special</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/6006808-the-client-from-hell-special-edition-podcast.mp3" length="16409080" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-6006808</guid>
    <pubDate>Thu, 22 Oct 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1359</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,planning,cyber awareness,risk,client,itsecurity,infosecurity,informationtechnology,podcast,cybersecurity podcast,podcaster,security podcast</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>40</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tips To Prepare For The Future Of Cloud Network Security</itunes:title>
    <title>Tips To Prepare For The Future Of Cloud Network Security</title>
    <itunes:summary><![CDATA[Did you know the demand for cloud security applications has increased since the beginning of the work from home narratives?  In this episode, Darnley discusses the importance of cloud transition, the risk associated, and 8 tips to prepare for a cloud security model for various kinds of businesses. The jump to the cloud has become more cultural than technological.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on ...]]></itunes:summary>
    <description><![CDATA[<p>Did you know the demand for cloud security applications has increased since the beginning of the work from home narratives?<br/><br/>In this episode, Darnley discusses the importance of cloud transition, the risk associated, and 8 tips to prepare for a cloud security model for various kinds of businesses. The jump to the cloud has become more cultural than technological. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Did you know the demand for cloud security applications has increased since the beginning of the work from home narratives?<br/><br/>In this episode, Darnley discusses the importance of cloud transition, the risk associated, and 8 tips to prepare for a cloud security model for various kinds of businesses. The jump to the cloud has become more cultural than technological. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5794987-tips-to-prepare-for-the-future-of-cloud-network-security.mp3" length="12788812" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5794987</guid>
    <pubDate>Thu, 08 Oct 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1058</itunes:duration>
    <itunes:keywords>cybersecurity,cyberaware,infosec,itsecurity,cyberawareness,beaware,becybersmart,network security,itsec,IaaS,SaaS,EDR,NDR,SIEM,MSS,MSSP</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>39</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why You Don&#39;t Need A Firewall</itunes:title>
    <title>Why You Don&#39;t Need A Firewall</title>
    <itunes:summary><![CDATA[Are you a believer that by installing a firewall you are fully protected?  In this episode. Darnley discusses why only thinking about your perimeter device can lead to your demise via other threat landscapes. Darnley also discusses 8 reasons why the firewall will end up failing you. Do you feel that the cybercriminals are going to after your businesses crown jewels? Listen more to this latest episode.  Click here to send future episode recommendation Support the show Subscribe now to Dar...]]></itunes:summary>
    <description><![CDATA[<p>Are you a believer that by installing a firewall you are fully protected?<br/><br/>In this episode. Darnley discusses why only thinking about your perimeter device can lead to your demise via other threat landscapes. Darnley also discusses 8 reasons why the firewall will end up failing you. Do you feel that the cybercriminals are going to after your businesses crown jewels? Listen more to this latest episode. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you a believer that by installing a firewall you are fully protected?<br/><br/>In this episode. Darnley discusses why only thinking about your perimeter device can lead to your demise via other threat landscapes. Darnley also discusses 8 reasons why the firewall will end up failing you. Do you feel that the cybercriminals are going to after your businesses crown jewels? Listen more to this latest episode. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5546392-why-you-don-t-need-a-firewall.mp3" length="15500322" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5546392</guid>
    <pubDate>Tue, 22 Sep 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1284</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,firewall,itsec,perimeter appliance,cyberaware,cyber awareness,cyber aware,firewall,firewall security,firewall myths,itsecurity myths</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>38</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Banks Don&#39;t Adopt Strong Security Practices</itunes:title>
    <title>Why Banks Don&#39;t Adopt Strong Security Practices</title>
    <itunes:summary><![CDATA[Yes, you read it right.  In this episode, Darnley discusses his frustrations on why banks in North America are not adopting strong security practices, how a Canadian bank failed him in the past, and why after 35 years of electronic communication they still can't get it right.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Yes, you read it right.<br/><br/>In this episode, Darnley discusses his frustrations on why banks in North America are not adopting strong security practices, how a Canadian bank failed him in the past, and why after 35 years of electronic communication they still can&apos;t get it right. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Yes, you read it right.<br/><br/>In this episode, Darnley discusses his frustrations on why banks in North America are not adopting strong security practices, how a Canadian bank failed him in the past, and why after 35 years of electronic communication they still can&apos;t get it right. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5374318-why-banks-don-t-adopt-strong-security-practices.mp3" length="10934327" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5374318</guid>
    <pubDate>Tue, 15 Sep 2020 06:00:00 -0600</pubDate>
    <itunes:duration>903</itunes:duration>
    <itunes:keywords>banks,business,theft,cybersecurity,theft,cyber awareness,business,identity,bank failures,podcast,podcastepisode,cyber awareness,cybersecurity,digital security,money security,bank security</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>37</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Sovereignty And You</itunes:title>
    <title>Cyber Sovereignty And You</title>
    <itunes:summary><![CDATA[Do you remember a time where net neutrality hit headlines? Do you remember when cyber sovereignty hit the news? We don't.  In this episode, Darnley discusses what is Cyber Sovereignty and how it affects the overall cybersecurity posture for countries around the world. From the Great Firewall of China to the fall of Nortel, he discusses the importance of this and why it can and may become a problem for our first conceived information superhighway that finally has borders. Click here to send fu...]]></itunes:summary>
    <description><![CDATA[<p>Do you remember a time where net neutrality hit headlines?<br/>Do you remember when cyber sovereignty hit the news? We don&apos;t.<br/><br/>In this episode, Darnley discusses what is Cyber Sovereignty and how it affects the overall cybersecurity posture for countries around the world. From the Great Firewall of China to the fall of Nortel, he discusses the importance of this and why it can and may become a problem for our first conceived information superhighway that finally has borders.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you remember a time where net neutrality hit headlines?<br/>Do you remember when cyber sovereignty hit the news? We don&apos;t.<br/><br/>In this episode, Darnley discusses what is Cyber Sovereignty and how it affects the overall cybersecurity posture for countries around the world. From the Great Firewall of China to the fall of Nortel, he discusses the importance of this and why it can and may become a problem for our first conceived information superhighway that finally has borders.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5329693-cyber-sovereignty-and-you.mp3" length="12503555" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5329693</guid>
    <pubDate>Tue, 08 Sep 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1034</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,planning,cyber awareness,risk,cybersec,itsecurity,cybersecurity news,cyber news,sovereignty,cyber sovereignty,itsecurity news,itsec news,darn it group,podcast,podcaster,podcast episode,China,United States,US,tiktok,apps,Canada,eurpoe</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>36</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Things You Should Know Before Taking That DNA Test</itunes:title>
    <title>5 Things You Should Know Before Taking That DNA Test</title>
    <itunes:summary><![CDATA[Have you ever considered taking a DNA test to find your ethnicity and genealogy? Have you taken one already?  In this episode, Darnley discusses the considerations before taking a DNA test - how does this affect your privacy? How to consider these 10 years in the future? Listen to this podcast to hear some pointers on why you need to evaluate your privacy BEFORE disclosing your genetic identity to the internet. Click here to send future episode recommendation Support the show Subscribe now to...]]></itunes:summary>
    <description><![CDATA[<p>Have you ever considered taking a DNA test to find your ethnicity and genealogy? Have you taken one already?<br/><br/>In this episode, Darnley discusses the considerations before taking a DNA test - how does this affect your privacy? How to consider these 10 years in the future? Listen to this podcast to hear some pointers on why you need to evaluate your privacy BEFORE disclosing your genetic identity to the internet.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever considered taking a DNA test to find your ethnicity and genealogy? Have you taken one already?<br/><br/>In this episode, Darnley discusses the considerations before taking a DNA test - how does this affect your privacy? How to consider these 10 years in the future? Listen to this podcast to hear some pointers on why you need to evaluate your privacy BEFORE disclosing your genetic identity to the internet.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5135884-5-things-you-should-know-before-taking-that-dna-test.mp3" length="13948022" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5135884</guid>
    <pubDate>Mon, 31 Aug 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1154</itunes:duration>
    <itunes:keywords>cybersecurity,cyber aware,infosec,DNA,ancestry,ancestry dna,dna,privacy,data security,data privacy,23andme,livingdna,law enforcement,golden state killer,golden gate dna</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>35</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Russians Attacked Me &amp; How To Protect Yourself</itunes:title>
    <title>The Russians Attacked Me &amp; How To Protect Yourself</title>
    <itunes:summary><![CDATA[Have you ever been attacked, digitally?   In this episode, Darnley shares his personal story of being attacked by Russian hackers recently and discusses ways you can protect yourself in this digital turbulence. Even people within the cybersecurity industry are not immune to attacks, learn 10 ways to protect yourself.    Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving ...]]></itunes:summary>
    <description><![CDATA[<p>Have you ever been attacked, digitally? <br/><br/>In this episode, Darnley shares his personal story of being attacked by Russian hackers recently and discusses ways you can protect yourself in this digital turbulence. Even people within the cybersecurity industry are not immune to attacks, learn 10 ways to protect yourself.<br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever been attacked, digitally? <br/><br/>In this episode, Darnley shares his personal story of being attacked by Russian hackers recently and discusses ways you can protect yourself in this digital turbulence. Even people within the cybersecurity industry are not immune to attacks, learn 10 ways to protect yourself.<br/><br/><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5131021-the-russians-attacked-me-how-to-protect-yourself.mp3" length="21455614" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5131021</guid>
    <pubDate>Tue, 25 Aug 2020 07:00:00 -0600</pubDate>
    <itunes:duration>1780</itunes:duration>
    <itunes:keywords>cybersecurity,information security,infosec,itsecurity,podcast,cybersecurity podcast,russian hackers,russian attack,personal story,podcaster,cybersecurityawareness,cyberaware,how to,protect your business,cybercrime,cyber criminal</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>34</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How To Recover From Ransomware</itunes:title>
    <title>How To Recover From Ransomware</title>
    <itunes:summary><![CDATA[Ransomware, the buzzword of the cybersecurity industry. Should you still be concerned or do you think it's just a lie today?  In this episode, Darnley discusses the motivators of cyber criminals in their journey to exploit you from your data. Why these attacks are increasing in 2020, and the guidelines you must follow to protect your business. He also discusses on the best practices, features, and solutions to best equip to thwart attacks along with some real-life stories.  Click here to...]]></itunes:summary>
    <description><![CDATA[<p>Ransomware, the buzzword of the cybersecurity industry. Should you still be concerned or do you think it&apos;s just a lie today?<br/><br/>In this episode, Darnley discusses the motivators of cyber criminals in their journey to exploit you from your data. Why these attacks are increasing in 2020, and the guidelines you must follow to protect your business. He also discusses on the best practices, features, and solutions to best equip to thwart attacks along with some real-life stories. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Ransomware, the buzzword of the cybersecurity industry. Should you still be concerned or do you think it&apos;s just a lie today?<br/><br/>In this episode, Darnley discusses the motivators of cyber criminals in their journey to exploit you from your data. Why these attacks are increasing in 2020, and the guidelines you must follow to protect your business. He also discusses on the best practices, features, and solutions to best equip to thwart attacks along with some real-life stories. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/5007281-how-to-recover-from-ransomware.mp3" length="20956257" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-5007281</guid>
    <pubDate>Tue, 18 Aug 2020 07:00:00 -0600</pubDate>
    <itunes:duration>1738</itunes:duration>
    <itunes:keywords>cybersecurity podcast, cybersecurity, cyber security, infosec, information security, itsecurity, cybersecurity awareness,information security podcast, ask the cybersecurity expert, cyber, ransomware, ransomware protection, ransomware awareness,disaster re</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>33</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why Your Ego Will Harm Your Business</itunes:title>
    <title>Why Your Ego Will Harm Your Business</title>
    <itunes:summary><![CDATA[Are you in a position of power or authority?  Do you honestly understand that your ego may cause a breach within your organization?  In this episode, Darnley discusses the importance of considering that your ego may be hindering your perspective of your cybersecurity posture, the three knowns, and why ego is thy enemy.  A must-listen podcast to really put things into perspective for you and your organization. Click here to send future episode recommendation Support the show Subscribe now...]]></itunes:summary>
    <description><![CDATA[<p>Are you in a position of power or authority? <br/>Do you honestly understand that your ego may cause a breach within your organization?<br/><br/>In this episode, Darnley discusses the importance of considering that your ego may be hindering your perspective of your cybersecurity posture, the three knowns, and why ego is thy enemy.<br/><br/>A must-listen podcast to really put things into perspective for you and your organization.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you in a position of power or authority? <br/>Do you honestly understand that your ego may cause a breach within your organization?<br/><br/>In this episode, Darnley discusses the importance of considering that your ego may be hindering your perspective of your cybersecurity posture, the three knowns, and why ego is thy enemy.<br/><br/>A must-listen podcast to really put things into perspective for you and your organization.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4881986-why-your-ego-will-harm-your-business.mp3" length="14037047" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4881986</guid>
    <pubDate>Mon, 10 Aug 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1162</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,ego,lessons,how to,cyber awareness,cyber aware,itsecurity</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>32</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Your Digital Assistant Is A Spy</itunes:title>
    <title>Your Digital Assistant Is A Spy</title>
    <itunes:summary><![CDATA[Do you have a feeling you're being spied on?  Does Amazon Alexa ignore you some days, and is attentive on other days? Is Google Assistant not really being helpful? Who handles all your information anyway?  In this episode of Darn IT Group, Darnley explains how it is to live with a digital assistant, questioning paranoia, and the best steps in dealing with it. He also covers how you can delete voice data to protect your privacy and how work from home users should handle privacy concerns. ...]]></itunes:summary>
    <description><![CDATA[<p>Do you have a feeling you&apos;re being spied on?<br/><br/>Does Amazon Alexa ignore you some days, and is attentive on other days?<br/>Is Google Assistant not really being helpful? Who handles all your information anyway?<br/><br/>In this episode of Darn IT Group, Darnley explains how it is to live with a digital assistant, questioning paranoia, and the best steps in dealing with it. He also covers how you can delete voice data to protect your privacy and how work from home users should handle privacy concerns. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you have a feeling you&apos;re being spied on?<br/><br/>Does Amazon Alexa ignore you some days, and is attentive on other days?<br/>Is Google Assistant not really being helpful? Who handles all your information anyway?<br/><br/>In this episode of Darn IT Group, Darnley explains how it is to live with a digital assistant, questioning paranoia, and the best steps in dealing with it. He also covers how you can delete voice data to protect your privacy and how work from home users should handle privacy concerns. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4873883-your-digital-assistant-is-a-spy.mp3" length="14322618" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4873883</guid>
    <pubDate>Thu, 06 Aug 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1185</itunes:duration>
    <itunes:keywords>Identity theft,cybersecurity,theft,cyber awareness,business,identity,infosec,cybersecurity,digital fraud,amazon,microsoft,apple,google,alexa,cortana,assistant,google assistant,cortana,microsoft cortana,digital assistants,voice assistant,work from home,</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>31</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Off The Record - Special Edition Podcast </itunes:title>
    <title>Off The Record - Special Edition Podcast </title>
    <itunes:summary><![CDATA[Casting from the Dark Web, it's off the record with Darnley G.   A raw podcast where you sit down with the CEO and discuss all things cybersecurity. This special edition podcast is a free-form unscripted show dedicated in talking about anything. Listen to this episode for cybersecurity fatigue, reducing cybersecurity budgets, and much more!  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest develop...]]></itunes:summary>
    <description><![CDATA[<p>Casting from the Dark Web, it&apos;s off the record with Darnley G. <br/><br/>A raw podcast where you sit down with the CEO and discuss all things cybersecurity. This special edition podcast is a free-form unscripted show dedicated in talking about anything. Listen to this episode for cybersecurity fatigue, reducing cybersecurity budgets, and much more! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Casting from the Dark Web, it&apos;s off the record with Darnley G. <br/><br/>A raw podcast where you sit down with the CEO and discuss all things cybersecurity. This special edition podcast is a free-form unscripted show dedicated in talking about anything. Listen to this episode for cybersecurity fatigue, reducing cybersecurity budgets, and much more! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4759382-off-the-record-special-edition-podcast.mp3" length="13894419" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4759382</guid>
    <pubDate>Wed, 29 Jul 2020 05:00:00 -0600</pubDate>
    <itunes:duration>1150</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,cyber insurance, infosec,dark web,darn it group,cyberaware,cyber awareness</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>30</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What Is Zero Trust?</itunes:title>
    <title>What Is Zero Trust?</title>
    <itunes:summary><![CDATA[Ever wondered what is is? Do you feel like a bunch of professionals are just super paranoid?  In this episode, Darnley explains what Zero Trust is, why it is important, and five ways to consider when implementing zero-trust models. Strive for the importance in securing your network infrastructure without the worries of users or computers falling through the cracks.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed o...]]></itunes:summary>
    <description><![CDATA[<p>Ever wondered what is is?<br/>Do you feel like a bunch of professionals are just super paranoid?<br/><br/>In this episode, Darnley explains what Zero Trust is, why it is important, and five ways to consider when implementing zero-trust models. Strive for the importance in securing your network infrastructure without the worries of users or computers falling through the cracks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Ever wondered what is is?<br/>Do you feel like a bunch of professionals are just super paranoid?<br/><br/>In this episode, Darnley explains what Zero Trust is, why it is important, and five ways to consider when implementing zero-trust models. Strive for the importance in securing your network infrastructure without the worries of users or computers falling through the cracks. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4674383-what-is-zero-trust.mp3" length="16581421" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4674383</guid>
    <pubDate>Thu, 23 Jul 2020 07:00:00 -0600</pubDate>
    <itunes:duration>1379</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,business,cyberaware,cyberawareness,risk,riskmanagement,zerotrust,zt,zerotrustmodel,cyberaware</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>29</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>TikTok Fame and Failure</itunes:title>
    <title>TikTok Fame and Failure</title>
    <itunes:summary><![CDATA[With a growing user base with Tik Tok, greater alarm bells are being sounded as the majority of users are forgetting that this application is built inside China, which means a communist country has the ability to intercept and use the data.  In this episode, Darnley will speak about his personal opinion about Tik Tok, the issues faced when using the application and how to best deal with this application on a security standpoint.  Click here to send future episode recommendation Support t...]]></itunes:summary>
    <description><![CDATA[<p>With a growing user base with Tik Tok, greater alarm bells are being sounded as the majority of users are forgetting that this application is built inside China, which means a communist country has the ability to intercept and use the data.<br/><br/>In this episode, Darnley will speak about his personal opinion about Tik Tok, the issues faced when using the application and how to best deal with this application on a security standpoint. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>With a growing user base with Tik Tok, greater alarm bells are being sounded as the majority of users are forgetting that this application is built inside China, which means a communist country has the ability to intercept and use the data.<br/><br/>In this episode, Darnley will speak about his personal opinion about Tik Tok, the issues faced when using the application and how to best deal with this application on a security standpoint. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4552229-tiktok-fame-and-failure.mp3" length="10643057" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4552229</guid>
    <pubDate>Tue, 14 Jul 2020 08:00:00 -0600</pubDate>
    <itunes:duration>884</itunes:duration>
    <itunes:keywords>cybersecurity,tiktok,tiktok privacy,itsec,cybersec,podcast,itsec podcast,cybersec,cyberawareness,cyberaware</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>28</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Windows 7 and Software Mitigations </itunes:title>
    <title>Windows 7 and Software Mitigations </title>
    <itunes:summary><![CDATA[Let's be honest with each other, there is a large majority of users &amp; businesses still using running Windows 7. Some may be using this unsupported operating system due to budget constraints or due to running legacy software.   In this episode, Darnley discusses the benefits of upgrading to Windows 10, but also to those who cannot upgrade at the time, how to mitigate some cyber threats. These mitigations can apply for both Windows and other legacy software systems.  Click here to...]]></itunes:summary>
    <description><![CDATA[<p>Let&apos;s be honest with each other, there is a large majority of users &amp; businesses still using running Windows 7. Some may be using this unsupported operating system due to budget constraints or due to running legacy software. <br/><br/>In this episode, Darnley discusses the benefits of upgrading to Windows 10, but also to those who cannot upgrade at the time, how to mitigate some cyber threats. These mitigations can apply for both Windows and other legacy software systems. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Let&apos;s be honest with each other, there is a large majority of users &amp; businesses still using running Windows 7. Some may be using this unsupported operating system due to budget constraints or due to running legacy software. <br/><br/>In this episode, Darnley discusses the benefits of upgrading to Windows 10, but also to those who cannot upgrade at the time, how to mitigate some cyber threats. These mitigations can apply for both Windows and other legacy software systems. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4368203-windows-7-and-software-mitigations.mp3" length="12253976" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4368203</guid>
    <pubDate>Tue, 30 Jun 2020 08:00:00 -0600</pubDate>
    <itunes:duration>1018</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec, windows 7, microsoft, Windows 10, Microsoft Windows, upgrading tips, tips, technology tips.</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>27</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Concerns During A Pandemic </itunes:title>
    <title>Cybersecurity Concerns During A Pandemic </title>
    <itunes:summary><![CDATA[It is always on the news and we are living it every day.   This pandemic has brought a shift in cybersecurity awareness when it comes to running a business with a 100% remote workforce. Which topics should you be concerned about today?  In this episode, Darnley discusses 5 cybersecurity concerns organizations should take note of while operating during these difficult times.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and s...]]></itunes:summary>
    <description><![CDATA[<p>It is always on the news and we are living it every day. <br/><br/>This pandemic has brought a shift in cybersecurity awareness when it comes to running a business with a 100% remote workforce. Which topics should you be concerned about today?<br/><br/>In this episode, Darnley discusses 5 cybersecurity concerns organizations should take note of while operating during these difficult times. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>It is always on the news and we are living it every day. <br/><br/>This pandemic has brought a shift in cybersecurity awareness when it comes to running a business with a 100% remote workforce. Which topics should you be concerned about today?<br/><br/>In this episode, Darnley discusses 5 cybersecurity concerns organizations should take note of while operating during these difficult times. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/4030790-cybersecurity-concerns-during-a-pandemic.mp3" length="13977744" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-4030790</guid>
    <pubDate>Wed, 03 Jun 2020 12:00:00 -0600</pubDate>
    <itunes:duration>1162</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,cyber security,cyber security training for beginners,security,information security,what is cyber security,cyber,cyber security engineer,cyber security analyst,it security,learn cyber sec</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>26</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Top 3 Cybersecurity Myths </itunes:title>
    <title>Top 3 Cybersecurity Myths </title>
    <itunes:summary><![CDATA[Do you believe cybersecurity is someone else's problem?  In this episode, Darnley debunks the top 3 cybersecurity myths that have been plaguing the landscape for many years. Learn why proper cyber awareness is key in protecting any sized organization against cybercrime.   Prepare to get your myths busted.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital l...]]></itunes:summary>
    <description><![CDATA[<p>Do you believe cybersecurity is someone else&apos;s problem?<br/><br/>In this episode, Darnley debunks the top 3 cybersecurity myths that have been plaguing the landscape for many years. Learn why proper cyber awareness is key in protecting any sized organization against cybercrime. <br/><br/>Prepare to get your myths busted. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you believe cybersecurity is someone else&apos;s problem?<br/><br/>In this episode, Darnley debunks the top 3 cybersecurity myths that have been plaguing the landscape for many years. Learn why proper cyber awareness is key in protecting any sized organization against cybercrime. <br/><br/>Prepare to get your myths busted. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3914744-top-3-cybersecurity-myths.mp3" length="13585594" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3914744</guid>
    <pubDate>Tue, 26 May 2020 06:00:00 -0600</pubDate>
    <itunes:duration>1129</itunes:duration>
    <itunes:keywords>Identity theft,cybersecurity,theft,cyber awareness,business,identity,cybersecurity,podcast,cybersecurity podcast,cybersecurity expert podcast,cybersecurity insights podcast,podcast cyber security,cybersecurity 101,cybersecurity analyst,cybersecurity caree</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>25</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Reducing Insider Threats</itunes:title>
    <title>Reducing Insider Threats</title>
    <itunes:summary><![CDATA[What are insider threats? Do you feel that most of your workforce is out to get you?   In this episode of Darn IT Group, Darnley discusses the fundamentals of insider threats, how it can affect your business, and ways you can reduce your risk of them. There may or may not be a bad apple working within your organization - find out what you need to do today! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the late...]]></itunes:summary>
    <description><![CDATA[<p>What are insider threats? Do you feel that most of your workforce is out to get you? <br/><br/>In this episode of Darn IT Group, Darnley discusses the fundamentals of insider threats, how it can affect your business, and ways you can reduce your risk of them. There may or may not be a bad apple working within your organization - find out what you need to do today!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What are insider threats? Do you feel that most of your workforce is out to get you? <br/><br/>In this episode of Darn IT Group, Darnley discusses the fundamentals of insider threats, how it can affect your business, and ways you can reduce your risk of them. There may or may not be a bad apple working within your organization - find out what you need to do today!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3822194-reducing-insider-threats.mp3" length="11588167" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3822194</guid>
    <pubDate>Tue, 19 May 2020 06:00:00 -0600</pubDate>
    <itunes:duration>963</itunes:duration>
    <itunes:keywords>cybersecurity,cyber security,security,what is cyber security,learn cybersecurity,cybersecurity podcast,woman in cybersecurity,information security,it security,cybersecurity engineer,cybersecurity awareness,how to learn cybersecurity,cybersecurity fundamen</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ultrasonic Browser Privacy Nightmare</itunes:title>
    <title>Ultrasonic Browser Privacy Nightmare</title>
    <itunes:summary><![CDATA[Are ultrasounds tracking your every moment?  Listen to this week's podcast to understand the risks that you may already be exposed to and the potential this methodology has for cybercriminals and privacy invaders who want to get their hands on.   Even air-gapped systems are not immune to these growing threats. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital la...]]></itunes:summary>
    <description><![CDATA[<p>Are ultrasounds tracking your every moment?<br/><br/>Listen to this week&apos;s podcast to understand the risks that you may already be exposed to and the potential this methodology has for cybercriminals and privacy invaders who want to get their hands on. <br/><br/>Even air-gapped systems are not immune to these growing threats.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are ultrasounds tracking your every moment?<br/><br/>Listen to this week&apos;s podcast to understand the risks that you may already be exposed to and the potential this methodology has for cybercriminals and privacy invaders who want to get their hands on. <br/><br/>Even air-gapped systems are not immune to these growing threats.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3734882-ultrasonic-browser-privacy-nightmare.mp3" length="9816438" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3734882</guid>
    <pubDate>Wed, 13 May 2020 06:00:00 -0600</pubDate>
    <itunes:duration>815</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,introductioncybersecurity,cyber security,programming in cybersecurity,security,cyber security jobs,cyber security training,learn cybersecurity,cybersecurity student,woman in cybersecurity,it security,cybersecurity engineercyber aware</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Why I Got Into Cybersecurity</itunes:title>
    <title>Why I Got Into Cybersecurity</title>
    <itunes:summary><![CDATA[Who is Darnley? Why is he leading these podcasts?  In this episode, Darnley explains why he got into cybersecurity/IT at the start which evolved him into creating Darn IT Group. Hear about his previous experiences and the specific date that he started the march into cyber awareness for small to medium businesses.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digita...]]></itunes:summary>
    <description><![CDATA[<p>Who is Darnley? Why is he leading these podcasts?<br/><br/>In this episode, Darnley explains why he got into cybersecurity/IT at the start which evolved him into creating Darn IT Group. Hear about his previous experiences and the specific date that he started the march into cyber awareness for small to medium businesses. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Who is Darnley? Why is he leading these podcasts?<br/><br/>In this episode, Darnley explains why he got into cybersecurity/IT at the start which evolved him into creating Darn IT Group. Hear about his previous experiences and the specific date that he started the march into cyber awareness for small to medium businesses. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3729200-why-i-got-into-cybersecurity.mp3" length="9020250" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3729200</guid>
    <pubDate>Tue, 12 May 2020 11:00:00 -0600</pubDate>
    <itunes:duration>749</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,podcast,cyber,infosec,itsecurity,podcast,podcaster,whyistarted,securityawareness,cyberaware,cyberawareness,security,cyber</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Hardware Authentication Is The Future</itunes:title>
    <title>Hardware Authentication Is The Future</title>
    <itunes:summary><![CDATA[Have you ever wondered how you can give your technologies extra cybersecurity? Hardware keys are your answer.   In this episode, Darnley discusses what hardware authentication is all about, why you need it, and the dangers of traditional authentication methods.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Have you ever wondered how you can give your technologies extra cybersecurity? Hardware keys are your answer. <br/><br/>In this episode, Darnley discusses what hardware authentication is all about, why you need it, and the dangers of traditional authentication methods. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Have you ever wondered how you can give your technologies extra cybersecurity? Hardware keys are your answer. <br/><br/>In this episode, Darnley discusses what hardware authentication is all about, why you need it, and the dangers of traditional authentication methods. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3618946-hardware-authentication-is-the-future.mp3" length="8895507" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3618946</guid>
    <pubDate>Tue, 05 May 2020 07:00:00 -0600</pubDate>
    <itunes:duration>738</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec, authentication, cyberrisk</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>We Know You Watch Porn</itunes:title>
    <title>We Know You Watch Porn</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses the email campaigns that have been exploiting us over the last five months. Cybercriminals are profiting this simple fraud scheme via smoke and mirrors.   Before you fall, victim, listen to this episode to clear the air - and your mindset. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley discusses the email campaigns that have been exploiting us over the last five months. Cybercriminals are profiting this simple fraud scheme via smoke and mirrors. <br/><br/>Before you fall, victim, listen to this episode to clear the air - and your mindset.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley discusses the email campaigns that have been exploiting us over the last five months. Cybercriminals are profiting this simple fraud scheme via smoke and mirrors. <br/><br/>Before you fall, victim, listen to this episode to clear the air - and your mindset.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3534568-we-know-you-watch-porn.mp3" length="8717101" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3534568</guid>
    <pubDate>Fri, 01 May 2020 06:00:00 -0600</pubDate>
    <itunes:duration>723</itunes:duration>
    <itunes:keywords>Technology, Security awareness, Infosec, IT security, Security, Cyber security, Security awareness training, Cyber security analyst, Cyber security engineer, Cybersecurity for beginners, Cybersecurity, Phishing and pharming, Phishing attack example, Phish</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Clickless Threat Actors &amp; What To Do After Being Phished</itunes:title>
    <title>Clickless Threat Actors &amp; What To Do After Being Phished</title>
    <itunes:summary><![CDATA[We all know/understand that most of us do not have a prince in some foreign country. We also know that bad English is another obvious sign. Cyber criminals are now using new methods such as clickless attacks to compromise our technology and will continue to evolve in time. We discuss the current zero-day against Apple devices.  What should you do AFTER falling for a phishing attack? You clicked that link and are not sure what to do next? We discuss the 5 steps to take after falling for a phis...]]></itunes:summary>
    <description><![CDATA[<p>We all know/understand that most of us do not have a prince in some foreign country. We also know that bad English is another obvious sign. Cyber criminals are now using new methods such as clickless attacks to compromise our technology and will continue to evolve in time. We discuss the current zero-day against Apple devices.<br/><br/>What should you do AFTER falling for a phishing attack? You clicked that link and are not sure what to do next? We discuss the 5 steps to take after falling for a phishing attack. <br/><br/>The truth is out there! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We all know/understand that most of us do not have a prince in some foreign country. We also know that bad English is another obvious sign. Cyber criminals are now using new methods such as clickless attacks to compromise our technology and will continue to evolve in time. We discuss the current zero-day against Apple devices.<br/><br/>What should you do AFTER falling for a phishing attack? You clicked that link and are not sure what to do next? We discuss the 5 steps to take after falling for a phishing attack. <br/><br/>The truth is out there! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3534226-clickless-threat-actors-what-to-do-after-being-phished.mp3" length="10591961" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3534226</guid>
    <pubDate>Tue, 28 Apr 2020 07:00:00 -0600</pubDate>
    <itunes:duration>879</itunes:duration>
    <itunes:keywords>business, itsecurity, cybersecurity podcast, podcast, Technology, Security awareness, Infosec, IT security, Security, Cyber security, Security awareness training, Cyber security analyst, Cyber security engineer, Cybersecurity for beginners, Cybersecurity</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Threats Against Canadian Health Organizations </itunes:title>
    <title>Threats Against Canadian Health Organizations </title>
    <itunes:summary><![CDATA[Today we live in a world of uncertainty. Cybercriminals have taken great advantage over the COVID19 pandemic, targetting medical organizations in an attempt to extort money and to affect the vulnerable.   In Canada, this threat is great - Darn IT Group has taken the digital front seat of this pandemic and has seen first hand the detrimental effects of cybercrime against the medical community.  Click here to send future episode recommendation Support the show Subscribe now to Darnley...]]></itunes:summary>
    <description><![CDATA[<p>Today we live in a world of uncertainty. Cybercriminals have taken great advantage over the COVID19 pandemic, targetting medical organizations in an attempt to extort money and to affect the vulnerable. <br/><br/>In Canada, this threat is great - Darn IT Group has taken the digital front seat of this pandemic and has seen first hand the detrimental effects of cybercrime against the medical community. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Today we live in a world of uncertainty. Cybercriminals have taken great advantage over the COVID19 pandemic, targetting medical organizations in an attempt to extort money and to affect the vulnerable. <br/><br/>In Canada, this threat is great - Darn IT Group has taken the digital front seat of this pandemic and has seen first hand the detrimental effects of cybercrime against the medical community. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3386545-threats-against-canadian-health-organizations.mp3" length="5810432" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3386545</guid>
    <pubDate>Fri, 17 Apr 2020 06:00:00 -0600</pubDate>
    <itunes:duration>481</itunes:duration>
    <itunes:keywords>cybersecurity,risk,it security,healthcare security,healthcare it security,healthcare cybersecurity,management,itsecurity,infosec,health,medical,covid19,corona,coronavirus,canada health,healthcare,healthcare cyber crime, cyber crime against healthcare</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Overnight Success To Failure</itunes:title>
    <title>Overnight Success To Failure</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses the faults in using a particular app for your teleconferencing. News from the privacy and cybersecurity concerns from Zoom, recent news on the Zoom attack that affected over 500,000 Zoom accounts being leaked to the dark web. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley discusses the faults in using a particular app for your teleconferencing. News from the privacy and cybersecurity concerns from Zoom, recent news on the Zoom attack that affected over 500,000 Zoom accounts being leaked to the dark web.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley discusses the faults in using a particular app for your teleconferencing. News from the privacy and cybersecurity concerns from Zoom, recent news on the Zoom attack that affected over 500,000 Zoom accounts being leaked to the dark web.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3359917-overnight-success-to-failure.mp3" length="10678792" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3359917</guid>
    <pubDate>Tue, 14 Apr 2020 11:00:00 -0600</pubDate>
    <itunes:duration>887</itunes:duration>
    <itunes:keywords>cybersecurity podcast, cybersecurity, cyber security, infosec, information security, itsecurity, cybersecurity awareness, zoom, zoombombing, information security podcast, ask the cybersecurity expert, cyber</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Zoom Pandemic - How To Harden Your Privacy</itunes:title>
    <title>Zoom Pandemic - How To Harden Your Privacy</title>
    <itunes:summary><![CDATA[Are you hearing in the news about Zoom? Do you use it on a daily basis to work?  Have no fear, in this episode, Darnley discusses ten ways to harden your Zoom application to attempt to decrease the vulnerabilities of your meetings falling into the wrong hands, or ears.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Are you hearing in the news about Zoom? Do you use it on a daily basis to work?<br/><br/>Have no fear, in this episode, Darnley discusses ten ways to harden your Zoom application to attempt to decrease the vulnerabilities of your meetings falling into the wrong hands, or ears. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Are you hearing in the news about Zoom? Do you use it on a daily basis to work?<br/><br/>Have no fear, in this episode, Darnley discusses ten ways to harden your Zoom application to attempt to decrease the vulnerabilities of your meetings falling into the wrong hands, or ears. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3259714-zoom-pandemic-how-to-harden-your-privacy.mp3" length="11802267" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3259714</guid>
    <pubDate>Mon, 06 Apr 2020 11:00:00 -0600</pubDate>
    <itunes:duration>980</itunes:duration>
    <itunes:keywords>zoom,zoombombers,privacy,zoom meetings, zoom meeting,cybersecurity,infosec,privacy,cyberaware</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rerouting Routers</itunes:title>
    <title>Rerouting Routers</title>
    <itunes:summary><![CDATA[Did you know that a majority of home users are susceptible to attacks - especially network-side.  In this episode, Darnley discusses the importance of home router security, which routers are susceptible to this new vulnerability and how you should protect yourself against further exploitation and attack.  We make cybersecurity simple! Follow our podcast for more informative episodes.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe ...]]></itunes:summary>
    <description><![CDATA[<p>Did you know that a majority of home users are susceptible to attacks - especially network-side.<br/><br/>In this episode, Darnley discusses the importance of home router security, which routers are susceptible to this new vulnerability and how you should protect yourself against further exploitation and attack.<br/><br/>We make cybersecurity simple! Follow our podcast for more informative episodes. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Did you know that a majority of home users are susceptible to attacks - especially network-side.<br/><br/>In this episode, Darnley discusses the importance of home router security, which routers are susceptible to this new vulnerability and how you should protect yourself against further exploitation and attack.<br/><br/>We make cybersecurity simple! Follow our podcast for more informative episodes. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3176089-rerouting-routers.mp3" length="7433130" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3176089</guid>
    <pubDate>Tue, 31 Mar 2020 07:00:00 -0600</pubDate>
    <itunes:duration>616</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>WAF You!</itunes:title>
    <title>WAF You!</title>
    <itunes:summary><![CDATA[What is a WAF?  In this brief episode, Darnley, upon request, is talking about what is a WAF and how it can complement your cybersecurity posture while operating online.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>What is a WAF?<br/><br/>In this brief episode, Darnley, upon request, is talking about what is a WAF and how it can complement your cybersecurity posture while operating online. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>What is a WAF?<br/><br/>In this brief episode, Darnley, upon request, is talking about what is a WAF and how it can complement your cybersecurity posture while operating online. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3122221-waf-you.mp3" length="3456458" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3122221</guid>
    <pubDate>Sat, 28 Mar 2020 06:00:00 -0600</pubDate>
    <itunes:duration>285</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Safe Computing For Todays Work From Home Force</itunes:title>
    <title>Safe Computing For Todays Work From Home Force</title>
    <itunes:summary><![CDATA[In this episode of Darn IT Podcast, Darnley discusses the nature of cyber hygiene while working from home.   Give the global pandemic has forced many out of the offices and now a global work from home force is now running the economy. Most organizations had to rush to implement remote access without fully educating the employees on how to take care of their computers and home networks.  We go through what you should be doing or have in place along with some examples in protecting your or...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Darn IT Podcast, Darnley discusses the nature of cyber hygiene while working from home. <br/><br/>Give the global pandemic has forced many out of the offices and now a global work from home force is now running the economy. Most organizations had to rush to implement remote access without fully educating the employees on how to take care of their computers and home networks.<br/><br/>We go through what you should be doing or have in place along with some examples in protecting your organization against cyber threats along with the checklist of things to do while working from home during these times. <br/><br/>Safe computing! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Darn IT Podcast, Darnley discusses the nature of cyber hygiene while working from home. <br/><br/>Give the global pandemic has forced many out of the offices and now a global work from home force is now running the economy. Most organizations had to rush to implement remote access without fully educating the employees on how to take care of their computers and home networks.<br/><br/>We go through what you should be doing or have in place along with some examples in protecting your organization against cyber threats along with the checklist of things to do while working from home during these times. <br/><br/>Safe computing! </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3122125-safe-computing-for-todays-work-from-home-force.mp3" length="12872138" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3122125</guid>
    <pubDate>Wed, 25 Mar 2020 12:00:00 -0600</pubDate>
    <itunes:duration>1070</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How To Play It Safe As A Remote User</itunes:title>
    <title>How To Play It Safe As A Remote User</title>
    <itunes:summary><![CDATA[In the world undergoing the COVID19/CoronaVirus pandemic, there has been a huge shift towards users working from home. What risk is being made by allowing your staff to work from home?  In this episode, Darnley discusses the various threats that are involved with employees working from home, the risks that can be made with failure to identify these issues, and 12 steps in maintaining that security posture while away from the office.  Click here to send future episode recommendation Suppo...]]></itunes:summary>
    <description><![CDATA[<p>In the world undergoing the COVID19/CoronaVirus pandemic, there has been a huge shift towards users working from home. What risk is being made by allowing your staff to work from home?<br/><br/>In this episode, Darnley discusses the various threats that are involved with employees working from home, the risks that can be made with failure to identify these issues, and 12 steps in maintaining that security posture while away from the office. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In the world undergoing the COVID19/CoronaVirus pandemic, there has been a huge shift towards users working from home. What risk is being made by allowing your staff to work from home?<br/><br/>In this episode, Darnley discusses the various threats that are involved with employees working from home, the risks that can be made with failure to identify these issues, and 12 steps in maintaining that security posture while away from the office. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/3026506-how-to-play-it-safe-as-a-remote-user.mp3" length="13728223" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-3026506</guid>
    <pubDate>Mon, 16 Mar 2020 11:00:00 -0600</pubDate>
    <itunes:duration>1141</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,management,itsecurity,infosec,covid19,coronavirus,canada,global,pandemic,work from home,remote users</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cybersecurity Pandemic </itunes:title>
    <title>Cybersecurity Pandemic </title>
    <itunes:summary><![CDATA["The year is 2020, the world has gone crazy with cyberattacks - the world holds it's breath to see what comes next."  It sounds like a crazy movie soundbite, right? Wrong. This is a real-world problem and we need all hands on deck. The cybersecurity pandemic is real and it affects every single one of us - in this episode, Darnley talks about this pandemic in today's posture.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay ...]]></itunes:summary>
    <description><![CDATA[<p>&quot;The year is 2020, the world has gone crazy with cyberattacks - the world holds it&apos;s breath to see what comes next.&quot;<br/><br/>It sounds like a crazy movie soundbite, right? Wrong. This is a real-world problem and we need all hands on deck. The cybersecurity pandemic is real and it affects every single one of us - in this episode, Darnley talks about this pandemic in today&apos;s posture. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>&quot;The year is 2020, the world has gone crazy with cyberattacks - the world holds it&apos;s breath to see what comes next.&quot;<br/><br/>It sounds like a crazy movie soundbite, right? Wrong. This is a real-world problem and we need all hands on deck. The cybersecurity pandemic is real and it affects every single one of us - in this episode, Darnley talks about this pandemic in today&apos;s posture. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2914690-cybersecurity-pandemic.mp3" length="9519583" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2914690</guid>
    <pubDate>Mon, 09 Mar 2020 07:00:00 -0600</pubDate>
    <itunes:duration>790</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How To Avoid Data Leaks</itunes:title>
    <title>How To Avoid Data Leaks</title>
    <itunes:summary><![CDATA[Data leakage is no fun to those who lose their information. Did you know that the amount of data leakage going on everyday exposes thousands of personally identifiable information on the internet and dark web? How do you know your credit is safe?  Act before it's too late - in this brief episode, Darnley explains an example of delayed leakage and how to protect yourself.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay info...]]></itunes:summary>
    <description><![CDATA[<p>Data leakage is no fun to those who lose their information. Did you know that the amount of data leakage going on everyday exposes thousands of personally identifiable information on the internet and dark web? How do you know your credit is safe?<br/><br/>Act before it&apos;s too late - in this brief episode, Darnley explains an example of delayed leakage and how to protect yourself. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Data leakage is no fun to those who lose their information. Did you know that the amount of data leakage going on everyday exposes thousands of personally identifiable information on the internet and dark web? How do you know your credit is safe?<br/><br/>Act before it&apos;s too late - in this brief episode, Darnley explains an example of delayed leakage and how to protect yourself. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2826988-how-to-avoid-data-leaks.mp3" length="7700855" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2826988</guid>
    <pubDate>Mon, 02 Mar 2020 07:00:00 -0700</pubDate>
    <itunes:duration>639</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Top 10 Questions To Ask A CISO</itunes:title>
    <title>Top 10 Questions To Ask A CISO</title>
    <itunes:summary><![CDATA[In this episode, it's time to ask the tough questions for your CISO, CIO, CTO. Understanding that these leaders have full control out of the outcome of your organization, and by doing so you must make sure they are accountable for their role.   For the CISO, CTO, and CIO - it is time for you think about these questions and ways that you can best approach the board with discovery questions that go beyond security and technical jargon. Remember, cybersecurity made simple right? Click here ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, it&apos;s time to ask the tough questions for your CISO, CIO, CTO. Understanding that these leaders have full control out of the outcome of your organization, and by doing so you must make sure they are accountable for their role. <br/><br/>For the CISO, CTO, and CIO - it is time for you think about these questions and ways that you can best approach the board with discovery questions that go beyond security and technical jargon. Remember, cybersecurity made simple right?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, it&apos;s time to ask the tough questions for your CISO, CIO, CTO. Understanding that these leaders have full control out of the outcome of your organization, and by doing so you must make sure they are accountable for their role. <br/><br/>For the CISO, CTO, and CIO - it is time for you think about these questions and ways that you can best approach the board with discovery questions that go beyond security and technical jargon. Remember, cybersecurity made simple right?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2826538-top-10-questions-to-ask-a-ciso.mp3" length="14281183" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2826538</guid>
    <pubDate>Thu, 27 Feb 2020 07:00:00 -0700</pubDate>
    <itunes:duration>1187</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How Can A Business Minimize Risk</itunes:title>
    <title>How Can A Business Minimize Risk</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses why businesses need to be considerate when considering new cybersecurity technologies. He also leaves you with 4 key takeaways to minimize your risk and actions you must take in order to be aware. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<div>In this episode, Darnley discusses why businesses need to be considerate when considering new cybersecurity technologies. He also leaves you with 4 key takeaways to minimize your risk and actions you must take in order to be aware. </div><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<div>In this episode, Darnley discusses why businesses need to be considerate when considering new cybersecurity technologies. He also leaves you with 4 key takeaways to minimize your risk and actions you must take in order to be aware. </div><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2805679-how-can-a-business-minimize-risk.mp3" length="15511582" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2805679</guid>
    <pubDate>Mon, 24 Feb 2020 07:00:00 -0700</pubDate>
    <itunes:duration>1289</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Facial Recognition - Fate or Flaw</itunes:title>
    <title>Facial Recognition - Fate or Flaw</title>
    <itunes:summary><![CDATA[Do you value your face?  Is your privacy important to you? Would you like it if law enforcement had your face labeled on file?  In this episode, Darnley talks about the Clearview AI scraping of personal information and how this can affect our lives moving forward. Is our public information really public? Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you value your face? <br/>Is your privacy important to you?<br/>Would you like it if law enforcement had your face labeled on file?<br/><br/>In this episode, Darnley talks about the Clearview AI scraping of personal information and how this can affect our lives moving forward. Is our public information really public?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you value your face? <br/>Is your privacy important to you?<br/>Would you like it if law enforcement had your face labeled on file?<br/><br/>In this episode, Darnley talks about the Clearview AI scraping of personal information and how this can affect our lives moving forward. Is our public information really public?</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2705431-facial-recognition-fate-or-flaw.mp3" length="7843462" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2705431</guid>
    <pubDate>Mon, 17 Feb 2020 08:00:00 -0700</pubDate>
    <itunes:duration>650</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,law,law enforcement,police,facial recognition, facial,public,privacy,public information</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Technology Bad For Us?</itunes:title>
    <title>Is Technology Bad For Us?</title>
    <itunes:summary><![CDATA[In this episode, Darnley talks about the ways technology has changed our lives. What are some of the positive and negative attributes when it comes to dealing with technology in our lives today. Hear why technology has made us closer yet that much more distant from one another.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley talks about the ways technology has changed our lives. What are some of the positive and negative attributes when it comes to dealing with technology in our lives today. Hear why technology has made us closer yet that much more distant from one another. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley talks about the ways technology has changed our lives. What are some of the positive and negative attributes when it comes to dealing with technology in our lives today. Hear why technology has made us closer yet that much more distant from one another. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2705017-is-technology-bad-for-us.mp3" length="16545685" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2705017</guid>
    <pubDate>Mon, 10 Feb 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1376</itunes:duration>
    <itunes:keywords>technology,cybersecurity,humans,fake news,is technology good,cloud,infosec,communication </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>What is Business Continuity?</itunes:title>
    <title>What is Business Continuity?</title>
    <itunes:summary><![CDATA[Does your business already implement a Business Continuity Plan?  Do you know what a Business Continuity plan is?  In this episode, Darnley gives the reason why your organization needs to have a Business Continuity (BC) plan in place and it is not just an IT issue. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Does your business already implement a Business Continuity Plan? <br/>Do you know what a Business Continuity plan is?<br/><br/>In this episode, Darnley gives the reason why your organization needs to have a Business Continuity (BC) plan in place and it is not just an IT issue.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Does your business already implement a Business Continuity Plan? <br/>Do you know what a Business Continuity plan is?<br/><br/>In this episode, Darnley gives the reason why your organization needs to have a Business Continuity (BC) plan in place and it is not just an IT issue.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2665207-what-is-business-continuity.mp3" length="15172689" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2665207</guid>
    <pubDate>Tue, 04 Feb 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1261</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,cyber insurance, infosec,backup,disaster recovery,backup recovery,disaster continuity,disaster planning,</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Phishing Scams 101</itunes:title>
    <title>Phishing Scams 101</title>
    <itunes:summary><![CDATA[Email is the fastest way that cybercriminals target individuals or organizations. The general rule of thumb is to trust no-one, even if it may seem legitimate.   Today's podcast, illustrates the need to be aware of the threats that come with operating over email.  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Email is the fastest way that cybercriminals target individuals or organizations. The general rule of thumb is to trust no-one, even if it may seem legitimate. <br/><br/>Today&apos;s podcast, illustrates the need to be aware of the threats that come with operating over email. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Email is the fastest way that cybercriminals target individuals or organizations. The general rule of thumb is to trust no-one, even if it may seem legitimate. <br/><br/>Today&apos;s podcast, illustrates the need to be aware of the threats that come with operating over email. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2588224-phishing-scams-101.mp3" length="3973682" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2588224</guid>
    <pubDate>Fri, 31 Jan 2020 08:00:00 -0700</pubDate>
    <itunes:duration>328</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,email,scams,emailsecurity,technology,cyberaware,cyberawareness,emailabuse,phishingscams,phishingattacks,phishing</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Data Privacy Day</itunes:title>
    <title>Data Privacy Day</title>
    <itunes:summary><![CDATA[January 28th, 2020 - International Privacy Day.   Data Privacy Day   Millions of people are unaware of and uninformed about how their personal information is being used, collected or shared in our digital society. Data Privacy Day aims to inspire dialogue and empower individuals and companies to take action.   In this episode, Darnley talks about this important day, the importance of being cyber aware. and how to safeguard yourself from losing your privacy.  Click here to send ...]]></itunes:summary>
    <description><![CDATA[<p>January 28th, 2020 - International Privacy Day. <br/><br/><b>Data Privacy Day<br/></b><br/></p><p>Millions of people are unaware of and uninformed about how their personal information is being used, collected or shared in our digital society. Data Privacy Day aims to inspire dialogue and empower individuals and companies to take action. <br/><br/>In this episode, Darnley talks about this important day, the importance of being cyber aware. and how to safeguard yourself from losing your privacy. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>January 28th, 2020 - International Privacy Day. <br/><br/><b>Data Privacy Day<br/></b><br/></p><p>Millions of people are unaware of and uninformed about how their personal information is being used, collected or shared in our digital society. Data Privacy Day aims to inspire dialogue and empower individuals and companies to take action. <br/><br/>In this episode, Darnley talks about this important day, the importance of being cyber aware. and how to safeguard yourself from losing your privacy. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2588035-data-privacy-day.mp3" length="15743204" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2588035</guid>
    <pubDate>Tue, 28 Jan 2020 07:00:00 -0700</pubDate>
    <itunes:duration>1309</itunes:duration>
    <itunes:keywords>privacy,data,cybersecurity,infosec,dataprotection,dataprivacy,staysafeonline</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>AI Is Going To Kill You</itunes:title>
    <title>AI Is Going To Kill You</title>
    <itunes:summary><![CDATA[They're what?!  Believe it or not, AI (Artificial Intelligence) does or will soon have a dark side in our world. This episode explains the dangers that AI is presenting us in a warfare landscape, the ethical and democratic implications evil-AI has on our world.   Do you feel ready for our robot overlords?  Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital l...]]></itunes:summary>
    <description><![CDATA[<p>They&apos;re what?!<br/><br/>Believe it or not, AI (Artificial Intelligence) does or will soon have a dark side in our world. This episode explains the dangers that AI is presenting us in a warfare landscape, the ethical and democratic implications evil-AI has on our world. <br/><br/>Do you feel ready for our robot overlords? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>They&apos;re what?!<br/><br/>Believe it or not, AI (Artificial Intelligence) does or will soon have a dark side in our world. This episode explains the dangers that AI is presenting us in a warfare landscape, the ethical and democratic implications evil-AI has on our world. <br/><br/>Do you feel ready for our robot overlords? </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2447768-ai-is-going-to-kill-you.mp3" length="17277009" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2447768</guid>
    <pubDate>Mon, 20 Jan 2020 08:00:00 -0700</pubDate>
    <itunes:duration>1437</itunes:duration>
    <itunes:keywords>ai,artifical intelligence,evil,cybersecurity,infosec,warfare,robots,killer robots,AI,AI threats,cyberawareness</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>A Decade In Cybersecurity </itunes:title>
    <title>A Decade In Cybersecurity </title>
    <itunes:summary><![CDATA[Happy New Year, for our first episode of Season 2 of 2020 is to review the last decade of cybersecurity. Prior to 2010, cybersecurity was not a topic you heard about - now in 2020, it is the hot-button topic in the media today.   In this episode, Darnley will go over briefly the last 10 years of cybersecurity and how it drastically changed our outlook of tomorrow. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on ...]]></itunes:summary>
    <description><![CDATA[<p>Happy New Year, for our first episode of Season 2 of 2020 is to review the last decade of cybersecurity. Prior to 2010, cybersecurity was not a topic you heard about - now in 2020, it is the hot-button topic in the media today. <br/><br/>In this episode, Darnley will go over briefly the last 10 years of cybersecurity and how it drastically changed our outlook of tomorrow.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Happy New Year, for our first episode of Season 2 of 2020 is to review the last decade of cybersecurity. Prior to 2010, cybersecurity was not a topic you heard about - now in 2020, it is the hot-button topic in the media today. <br/><br/>In this episode, Darnley will go over briefly the last 10 years of cybersecurity and how it drastically changed our outlook of tomorrow.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2454518-a-decade-in-cybersecurity.mp3" length="15101236" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2454518</guid>
    <pubDate>Mon, 13 Jan 2020 07:00:00 -0700</pubDate>
    <itunes:duration>1255</itunes:duration>
    <itunes:keywords>cybersecurity,2019,2010,infosec,review,new year,decade,2020,cyber threats,cybersecurity news</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Season 2 Introduction</itunes:title>
    <title>Season 2 Introduction</title>
    <itunes:summary><![CDATA[Happy New Year! New year new podcast right?  This is the introduction to Season 2, Darnley G introduces the next season for our weekly episodes on cybersecurity and everything that revolves around it. We will have guests from various industries, stories and everything in between.   Listen to this to hear what the next two episodes are coming, will set the stage to what is coming for this season.  Click here to send future episode recommendation Support the show Subscribe now to Darn...]]></itunes:summary>
    <description><![CDATA[<p>Happy New Year! New year new podcast right?<br/><br/>This is the introduction to Season 2, Darnley G introduces the next season for our weekly episodes on cybersecurity and everything that revolves around it. We will have guests from various industries, stories and everything in between. <br/><br/>Listen to this to hear what the next two episodes are coming, will set the stage to what is coming for this season. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Happy New Year! New year new podcast right?<br/><br/>This is the introduction to Season 2, Darnley G introduces the next season for our weekly episodes on cybersecurity and everything that revolves around it. We will have guests from various industries, stories and everything in between. <br/><br/>Listen to this to hear what the next two episodes are coming, will set the stage to what is coming for this season. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2446505-season-2-introduction.mp3" length="2939233" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2446505</guid>
    <pubDate>Mon, 06 Jan 2020 08:00:00 -0700</pubDate>
    <podcast:soundbite startTime="0.0" duration="48.5" />
    <itunes:duration>242</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episodeType>trailer</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Talking Cybersecurity Talking To Your Board</itunes:title>
    <title>Talking Cybersecurity Talking To Your Board</title>
    <itunes:summary><![CDATA[Do you have difficulty explaining the reasons why you need a cybersecurity plan, incident response plan, backup disaster recovery plan, appliances, software, or external resources to properly protect your organization? Here are some tips to help.  Speaking to the board of directors, or management when it comes to cybersecurity services can be quite a painful task. Their misunderstanding may cause some barrier to entry, this episode Darnley assists you to make sure you are communicating effect...]]></itunes:summary>
    <description><![CDATA[<p>Do you have difficulty explaining the reasons why you need a cybersecurity plan, incident response plan, backup disaster recovery plan, appliances, software, or external resources to properly protect your organization? Here are some tips to help.<br/><br/>Speaking to the board of directors, or management when it comes to cybersecurity services can be quite a painful task. Their misunderstanding may cause some barrier to entry, this episode Darnley assists you to make sure you are communicating effectively to the board in order to protect your organization with the increasing cyber threats. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you have difficulty explaining the reasons why you need a cybersecurity plan, incident response plan, backup disaster recovery plan, appliances, software, or external resources to properly protect your organization? Here are some tips to help.<br/><br/>Speaking to the board of directors, or management when it comes to cybersecurity services can be quite a painful task. Their misunderstanding may cause some barrier to entry, this episode Darnley assists you to make sure you are communicating effectively to the board in order to protect your organization with the increasing cyber threats. </p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432552-talking-cybersecurity-talking-to-your-board.mp3" length="14138867" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432552</guid>
    <pubDate>Tue, 10 Dec 2019 12:00:00 -0700</pubDate>
    <itunes:duration>1175</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Windows 7 End of Life</itunes:title>
    <title>Windows 7 End of Life</title>
    <itunes:summary><![CDATA[Windows 7 is coming to a final end on January 14, 2020- yet we still see businesses of critical infrastructure still using them. Best to upgrade before it is too late! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Windows 7 is coming to a final end on January 14, 2020- yet we still see businesses of critical infrastructure still using them. Best to upgrade before it is too late!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Windows 7 is coming to a final end on January 14, 2020- yet we still see businesses of critical infrastructure still using them. Best to upgrade before it is too late!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432522-windows-7-end-of-life.mp3" length="8628703" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432522</guid>
    <pubDate>Tue, 26 Nov 2019 11:00:00 -0700</pubDate>
    <itunes:duration>716</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>12</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Truth About Cyber Insurance</itunes:title>
    <title>The Truth About Cyber Insurance</title>
    <itunes:summary><![CDATA[In this episode, Darnley speaks about the misguided truths about cyber insurance, what it is, and what it isn't. Some leaders assume that all cyber insurance premiums are created equal, therefore there is no risk - wrong! There has been various examples in the real-world where insurance did or did not cover the costs of a cyber attack. Learn about what you need to look out for before signing on the dotted line and assume they will have your back once you suffer a loss. Click here to send futu...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley speaks about the misguided truths about cyber insurance, what it is, and what it isn&apos;t. Some leaders assume that all cyber insurance premiums are created equal, therefore there is no risk - wrong! There has been various examples in the real-world where insurance did or did not cover the costs of a cyber attack. Learn about what you need to look out for before signing on the dotted line and assume they will have your back once you suffer a loss.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley speaks about the misguided truths about cyber insurance, what it is, and what it isn&apos;t. Some leaders assume that all cyber insurance premiums are created equal, therefore there is no risk - wrong! There has been various examples in the real-world where insurance did or did not cover the costs of a cyber attack. Learn about what you need to look out for before signing on the dotted line and assume they will have your back once you suffer a loss.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432417-the-truth-about-cyber-insurance.mp3" length="5365203" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432417</guid>
    <pubDate>Tue, 12 Nov 2019 10:00:00 -0700</pubDate>
    <itunes:duration>444</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,cyber aware,cyber insurance,insurance,the truth,business,cyberawareness,policies,protection</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Cyber Security Problem</itunes:title>
    <title>The Cyber Security Problem</title>
    <itunes:summary><![CDATA[Why is nothing working in cybersecurity? In this episode, Darnley takes the gloves off and talks about some of the issues with cybersecurity from the outside-in approach. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Why is nothing working in cybersecurity? In this episode, Darnley takes the gloves off and talks about some of the issues with cybersecurity from the outside-in approach.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Why is nothing working in cybersecurity? In this episode, Darnley takes the gloves off and talks about some of the issues with cybersecurity from the outside-in approach.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432390-the-cyber-security-problem.mp3" length="14156735" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432390</guid>
    <pubDate>Mon, 28 Oct 2019 10:00:00 -0600</pubDate>
    <itunes:duration>1177</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,business,cyberaware,cyberawareness,risk,riskmanagement,realtalk</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>5 Tips To Be Cyber Secure</itunes:title>
    <title>5 Tips To Be Cyber Secure</title>
    <itunes:summary><![CDATA[In this episode, Darnley discusses the 5 things you can do to put yourself in a better security position. These methods are simple, easy, and you don't have to be a cyber expert to implement these things today! Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley discusses the 5 things you can do to put yourself in a better security position. These methods are simple, easy, and you don&apos;t have to be a cyber expert to implement these things today!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley discusses the 5 things you can do to put yourself in a better security position. These methods are simple, easy, and you don&apos;t have to be a cyber expert to implement these things today!</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432300-5-tips-to-be-cyber-secure.mp3" length="16992379" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432300</guid>
    <pubDate>Mon, 14 Oct 2019 10:00:00 -0600</pubDate>
    <itunes:duration>1413</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,tips,5tips,advise,technology,cyberaware,cyberawareness</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Awareness Month</itunes:title>
    <title>Cyber Awareness Month</title>
    <itunes:summary><![CDATA[October is Cyber Security Awareness month - this month we talk about various cyber risks and vulnerabilities that we could experience while interacting over the internet. This turned into a world-wide initiative due to the increasing threats and attacks against everyone. Cyber awareness is key in protecting yourself against cybercrime. In this podcast, Darnley talks about why this month is important and what you can do to better arm yourself. Click here to send future episode recommendation S...]]></itunes:summary>
    <description><![CDATA[<p>October is Cyber Security Awareness month - this month we talk about various cyber risks and vulnerabilities that we could experience while interacting over the internet. This turned into a world-wide initiative due to the increasing threats and attacks against everyone. Cyber awareness is key in protecting yourself against cybercrime. In this podcast, Darnley talks about why this month is important and what you can do to better arm yourself.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>October is Cyber Security Awareness month - this month we talk about various cyber risks and vulnerabilities that we could experience while interacting over the internet. This turned into a world-wide initiative due to the increasing threats and attacks against everyone. Cyber awareness is key in protecting yourself against cybercrime. In this podcast, Darnley talks about why this month is important and what you can do to better arm yourself.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2432261-cyber-awareness-month.mp3" length="12533904" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2432261</guid>
    <pubDate>Tue, 01 Oct 2019 09:00:00 -0600</pubDate>
    <itunes:duration>1041</itunes:duration>
    <itunes:keywords>cyber,cyber awareness,cybersecurity,infosec,business,cyberaware,cyberawareness</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Identity Theft</itunes:title>
    <title>Identity Theft</title>
    <itunes:summary><![CDATA[Do you understand the consequences of having your identity stolen? Were you a victim in the past?  Darnley Greson Jr speaks about the reasons, effects, and solutions to deal with your identity before or after it gets stolen.   Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you understand the consequences of having your identity stolen? Were you a victim in the past?<br/><br/>Darnley Greson Jr speaks about the reasons, effects, and solutions to deal with your identity before or after it gets stolen.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you understand the consequences of having your identity stolen? Were you a victim in the past?<br/><br/>Darnley Greson Jr speaks about the reasons, effects, and solutions to deal with your identity before or after it gets stolen.</p><p><br/></p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423792-identity-theft.mp3" length="16118237" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423792</guid>
    <pubDate>Tue, 10 Sep 2019 09:00:00 -0600</pubDate>
    <itunes:duration>1341</itunes:duration>
    <itunes:keywords>Identity theft,cybersecurity,theft,cyber awareness,business,identity</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Security Planning</itunes:title>
    <title>Cyber Security Planning</title>
    <itunes:summary><![CDATA[When you fail to plan, you plan to fail.  In this episode, Darnley talks about the key steps of creating a cyber plan and then how to write and assess key aspects of any sized organization. Learn the steps you must take in order to create a proper plan and how to frame your business to deploy it. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>When you fail to plan, you plan to fail.<br/><br/>In this episode, Darnley talks about the key steps of creating a cyber plan and then how to write and assess key aspects of any sized organization. Learn the steps you must take in order to create a proper plan and how to frame your business to deploy it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>When you fail to plan, you plan to fail.<br/><br/>In this episode, Darnley talks about the key steps of creating a cyber plan and then how to write and assess key aspects of any sized organization. Learn the steps you must take in order to create a proper plan and how to frame your business to deploy it.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423768-cyber-security-planning.mp3" length="11802722" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423768</guid>
    <pubDate>Mon, 02 Sep 2019 08:00:00 -0600</pubDate>
    <itunes:duration>982</itunes:duration>
    <itunes:keywords>cybersecurity,infosec,planning,cyber awareness,risk</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Staying Safe With Home Networks</itunes:title>
    <title>Staying Safe With Home Networks</title>
    <itunes:summary><![CDATA[Do you have a child going into university or college? Buying internet or an internet router got your home? In this episode, Darnley describes the importance of being cyber aware at home and the steps you can take to secure your home router from cybercriminals. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you have a child going into university or college? Buying internet or an internet router got your home? In this episode, Darnley describes the importance of being cyber aware at home and the steps you can take to secure your home router from cybercriminals.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you have a child going into university or college? Buying internet or an internet router got your home? In this episode, Darnley describes the importance of being cyber aware at home and the steps you can take to secure your home router from cybercriminals.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423708-staying-safe-with-home-networks.mp3" length="14049657" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423708</guid>
    <pubDate>Mon, 26 Aug 2019 10:00:00 -0600</pubDate>
    <itunes:duration>1169</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Increase Your Efficiency Of Your Risk and Compliance </itunes:title>
    <title>Increase Your Efficiency Of Your Risk and Compliance </title>
    <itunes:summary><![CDATA[In this episode, Darnley speaks about the importance of having the right amount of risk and compliance assessments in your organization. Understanding the reasons why you need to be aware, and to mitigate the risk. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>In this episode, Darnley speaks about the importance of having the right amount of risk and compliance assessments in your organization. Understanding the reasons why you need to be aware, and to mitigate the risk.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, Darnley speaks about the importance of having the right amount of risk and compliance assessments in your organization. Understanding the reasons why you need to be aware, and to mitigate the risk.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423747-increase-your-efficiency-of-your-risk-and-compliance.mp3" length="8610650" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423747</guid>
    <pubDate>Thu, 22 Aug 2019 11:00:00 -0600</pubDate>
    <itunes:duration>716</itunes:duration>
    <itunes:keywords>business,cybersecurity,risk,compliance,cyber insurance, infosec, </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Education</itunes:title>
    <title>Cyber Education</title>
    <itunes:summary><![CDATA[We all know about the cyber threats that are out there thanks to the media. Do you really know the reasons why? In this episode, Darnley gives stats along with an insightful breakdown in what you and your employees need to do in order to stay ahead of the curve from cybercriminal attacks. It starts with you. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>We all know about the cyber threats that are out there thanks to the media. Do you really know the reasons why? In this episode, Darnley gives stats along with an insightful breakdown in what you and your employees need to do in order to stay ahead of the curve from cybercriminal attacks. It starts with you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>We all know about the cyber threats that are out there thanks to the media. Do you really know the reasons why? In this episode, Darnley gives stats along with an insightful breakdown in what you and your employees need to do in order to stay ahead of the curve from cybercriminal attacks. It starts with you.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423612-cyber-education.mp3" length="14049657" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423612</guid>
    <pubDate>Tue, 20 Aug 2019 09:00:00 -0600</pubDate>
    <itunes:duration>1169</itunes:duration>
    <itunes:keywords>business,cybersecurity,infosec,education</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>5</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Social Media Mistakes</itunes:title>
    <title>Social Media Mistakes</title>
    <itunes:summary><![CDATA[Why is social media important for the integrity of your business? In this episode, Darnley speaks about why you should consider some facts when playing the social media game and how it can ruin your reputation. He also gives tips on how to properly enact steps to maintain that integrity. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Why is social media important for the integrity of your business? In this episode, Darnley speaks about why you should consider some facts when playing the social media game and how it can ruin your reputation. He also gives tips on how to properly enact steps to maintain that integrity.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Why is social media important for the integrity of your business? In this episode, Darnley speaks about why you should consider some facts when playing the social media game and how it can ruin your reputation. He also gives tips on how to properly enact steps to maintain that integrity.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2423498-social-media-mistakes.mp3" length="11891734" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2423498</guid>
    <pubDate>Mon, 12 Aug 2019 09:00:00 -0600</pubDate>
    <itunes:duration>989</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Being Cyber Aware For Your Business</itunes:title>
    <title>Being Cyber Aware For Your Business</title>
    <itunes:summary><![CDATA[Do you feel like you are ready to take on cybercrime? Listen to Darnley speak about previous experiences, tricks to improve your position in this digital cybersecurity era, and why it is important to educate yourself and your employees. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape. ]]></itunes:summary>
    <description><![CDATA[<p>Do you feel like you are ready to take on cybercrime? Listen to Darnley speak about previous experiences, tricks to improve your position in this digital cybersecurity era, and why it is important to educate yourself and your employees.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></description>
    <content:encoded><![CDATA[<p>Do you feel like you are ready to take on cybercrime? Listen to Darnley speak about previous experiences, tricks to improve your position in this digital cybersecurity era, and why it is important to educate yourself and your employees.</p><p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/800285/open_sms">Click here to send future episode recommendation</a></p><p><a rel="payment" href="https://www.buymeacoffee.com/darnleyscyber">Support the show</a></p><p>Subscribe now to Darnley&apos;s Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/800285/episodes/2422976-being-cyber-aware-for-your-business.mp3" length="13621771" type="audio/mpeg" />
    <itunes:author>Darn IT Group</itunes:author>
    <guid isPermaLink="false">Buzzsprout-2422976</guid>
    <pubDate>Tue, 06 Aug 2019 10:00:00 -0600</pubDate>
    <itunes:duration>1133</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
