<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/COPILOT2233030486" rel="self" type="application/rss+xml"/>
    <title>Cyber Minds</title>
    <link>https://feeds.acast.com/public/shows/643ee3a0e1bffc00108d0df0</link>
    <language>en</language>
    <copyright>Copyright Narrative.fm</copyright>
    <description>Covering the stories behind the technologists, hackers, and coders that shaped our technological world we live in today. Hosted on Acast. See acast.com/privacy for more information.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/e4dd7d76-0f7c-11ee-93a4-134843c74083/image/show-cover.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>Cyber Minds</title>
      <link>https://feeds.acast.com/public/shows/643ee3a0e1bffc00108d0df0</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Covering the stories behind the technologists, hackers, and coders that shaped our technological world we live in today.</itunes:subtitle>
    <itunes:author>Narrative.fm</itunes:author>
    <itunes:summary>Covering the stories behind the technologists, hackers, and coders that shaped our technological world we live in today. Hosted on Acast. See acast.com/privacy for more information.</itunes:summary>
    <content:encoded>
      <![CDATA[Covering the stories behind the technologists, hackers, and coders that shaped our technological world we live in today.<br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>Narrative.fm</itunes:name>
      <itunes:email>info+643ee3a0e1bffc00108d0df0@mg.pippa.io</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/e4dd7d76-0f7c-11ee-93a4-134843c74083/image/show-cover.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="Technology">
    </itunes:category>
    <itunes:category text="History">
    </itunes:category>
    <itunes:category text="Society &amp; Culture">
    </itunes:category>
    <item>
      <title>Checkout Compromised: The Target Data Breach</title>
      <description>In the middle of the 2013 holiday shopping season, millions of customers unknowingly became victims of one of the largest retail cyberattacks in history. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Mar 2026 14:11:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the middle of the 2013 holiday shopping season, millions of customers unknowingly became victims of one of the largest retail cyberattacks in history. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>
In the middle of the 2013 holiday shopping season, millions of customers unknowingly became victims of one of the largest retail cyberattacks in history. 

</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>874</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da19e9d6-170a-11f1-8345-f7b6319db176]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT2058289862.mp3?updated=1772547538" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaching: The Rainbow Six Siege Takeover</title>
      <description>In December 2025, one of the world’s most popular tactical shooters was quietly breached. What began as reports of locked accounts, unauthorized access, and in-game manipulation quickly revealed deeper vulnerabilities in authentication systems, backend security, and exploit response.






Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Jan 2026 13:17:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In December 2025, one of the world’s most popular tactical shooters was quietly breached. What began as reports of locked accounts, unauthorized access, and in-game manipulation quickly revealed deeper vulnerabilities in authentication systems, backend security, and exploit response.






Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In December 2025, one of the world’s most popular tactical shooters was quietly breached. What began as reports of locked accounts, unauthorized access, and in-game manipulation quickly revealed deeper vulnerabilities in authentication systems, backend security, and exploit response.



</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[889648d6-fc4b-11f0-85bc-8ff2e67fd801]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8906658857.mp3?updated=1769606861" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking the Dash: DoorDash Data Breach</title>
      <description>DoorDash suffers a significant data breach that exposes personal information belonging to customers and delivery drivers. The breach raises concerns about the security of large gig-economy platforms and shows how a single weakness in a connected service can lead to widespread consequences.





Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Dec 2025 16:19:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DoorDash suffers a significant data breach that exposes personal information belonging to customers and delivery drivers. The breach raises concerns about the security of large gig-economy platforms and shows how a single weakness in a connected service can lead to widespread consequences.





Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DoorDash suffers a significant data breach that exposes personal information belonging to customers and delivery drivers. The breach raises concerns about the security of large gig-economy platforms and shows how a single weakness in a connected service can lead to widespread consequences.


</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>970</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de1d8524-d51a-11f0-9f66-c35ec21c0a8a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7340088127.mp3?updated=1765297697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Million-Dollar Malware Deal</title>
      <description>In the summer of 2020, a Tesla employee at the Nevada Gigafactory was quietly approached with a stunning offer: one million dollars to install malware inside the company’s network.




Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Nov 2025 17:22:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the summer of 2020, a Tesla employee at the Nevada Gigafactory was quietly approached with a stunning offer: one million dollars to install malware inside the company’s network.




Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the summer of 2020, a Tesla employee at the Nevada Gigafactory was quietly approached with a stunning offer: one million dollars to install malware inside the company’s network.

</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[18100d5a-bbfe-11f0-b05a-1fa8554f26a2]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT5868628465.mp3?updated=1762536551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Fight Against Extradition: The Lauri Love Case</title>
      <description>In this episode of Cyber Minds, we unravel the story of Lauri Love, the British activist and hacker accused of breaching U.S. government networks, including NASA, the FBI, and the U.S. Army. Facing possible extradition to the United States, Love became a symbol of the debate over cybercrime, mental health, and human rights.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Sep 2025 13:25:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we unravel the story of Lauri Love, the British activist and hacker accused of breaching U.S. government networks, including NASA, the FBI, and the U.S. Army. Facing possible extradition to the United States, Love became a symbol of the debate over cybercrime, mental health, and human rights.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>
In this episode of <em>Cyber Minds</em>, we unravel the story of Lauri Love, the British activist and hacker accused of breaching U.S. government networks, including NASA, the FBI, and the U.S. Army. Facing possible extradition to the United States, Love became a symbol of the debate over cybercrime, mental health, and human rights.

</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>764</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f14ae610-9e00-11f0-a669-7f83d7628de0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1574031689.mp3?updated=1759239298" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Password Problem: Inside the LinkedIn 2012 Breach</title>
      <description>In 2012, LinkedIn—one of the world’s largest professional networking sites—suffered a massive data breach that exposed more than 6.5 million hashed passwords. What seemed at first like a contained incident would later be revealed as one of the largest security compromises of its time, with over 117 million accounts ultimately affected. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Sep 2025 12:54:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In 2012, LinkedIn—one of the world’s largest professional networking sites—suffered a massive data breach that exposed more than 6.5 million hashed passwords. What seemed at first like a contained incident would later be revealed as one of the largest security compromises of its time, with over 117 million accounts ultimately affected. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>
In 2012, LinkedIn—one of the world’s largest professional networking sites—suffered a massive data breach that exposed more than 6.5 million hashed passwords. What seemed at first like a contained incident would later be revealed as one of the largest security compromises of its time, with over 117 million accounts ultimately affected. 

</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e471ad40-87fb-11f0-ad5a-cbb3fe4e8d33]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7840697792.mp3?updated=1756818660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Whistleblower: Edward Snowden and the NSA Leak</title>
      <description>In this landmark episode of Cyber Minds, we examine one of the most controversial figures in modern cyber history: Edward Snowden. In 2013, the former NSA contractor stunned the world by leaking classified documents that exposed sweeping global surveillance programs operated by the U.S. government.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Jul 2025 13:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this landmark episode of Cyber Minds, we examine one of the most controversial figures in modern cyber history: Edward Snowden. In 2013, the former NSA contractor stunned the world by leaking classified documents that exposed sweeping global surveillance programs operated by the U.S. government.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>
In this landmark episode of <em>Cyber Minds</em>, we examine one of the most controversial figures in modern cyber history: Edward Snowden. In 2013, the former NSA contractor stunned the world by leaking classified documents that exposed sweeping global surveillance programs operated by the U.S. government.

</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea6dd35a-6707-11f0-8dd5-67dd1628b7e1]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1133359017.mp3?updated=1753968817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking Democracy: Inside DEF CON’s First Voting Village</title>
      <description>In this episode of Cyber Minds, we unpack the origins of the Voting Village at DEF CON 25, which took place in July 2017 in Las Vegas. The event was conceived and organized by Jeff Moss (also known as “Dark Tangent,” the founder of DEF CON) and cybersecurity expert Jake Braun. 





Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jun 2025 16:53:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we unpack the origins of the Voting Village at DEF CON 25, which took place in July 2017 in Las Vegas. The event was conceived and organized by Jeff Moss (also known as “Dark Tangent,” the founder of DEF CON) and cybersecurity expert Jake Braun. 





Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Cyber Minds</em>, we unpack the origins of the Voting Village at DEF CON 25, which took place in July 2017 in Las Vegas. The event was conceived and organized by Jeff Moss (also known as “Dark Tangent,” the founder of DEF CON) and cybersecurity expert Jake Braun. 




</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>651</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dbf4154-52ae-11f0-84df-ab4fbdddc22b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1888100006.mp3?updated=1750957242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Welcome to the Hacker Carnival: Inside DEF CON 1</title>
      <description>In this debut episode covering the legendary DEF CON hacker convention, Cyber Minds takes you back to 1993—when a Las Vegas hotel lobby became ground zero for one of the most influential gatherings in cybersecurity history. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 May 2025 17:07:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this debut episode covering the legendary DEF CON hacker convention, Cyber Minds takes you back to 1993—when a Las Vegas hotel lobby became ground zero for one of the most influential gatherings in cybersecurity history. 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this debut episode covering the legendary DEF CON hacker convention, <em>Cyber Minds</em> takes you back to 1993—when a Las Vegas hotel lobby became ground zero for one of the most influential gatherings in cybersecurity history. 

</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>693</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[128ab78a-3cac-11f0-accd-2323cd422ef5]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1077434162.mp3?updated=1748537780" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Numbers Stolen, Trust Broken: The SSN Breach of 2024</title>
      <description>In April 2024, a quiet breach shook the core of American identity infrastructure. Millions of Social Security numbers—along with names, addresses, and dates of birth—were exposed in a sophisticated cyberattack targeting a third-party government contractor. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 May 2025 13:18:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In April 2024, a quiet breach shook the core of American identity infrastructure. Millions of Social Security numbers—along with names, addresses, and dates of birth—were exposed in a sophisticated cyberattack targeting a third-party government contractor. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In April 2024, a quiet breach shook the core of American identity infrastructure. Millions of Social Security numbers—along with names, addresses, and dates of birth—were exposed in a sophisticated cyberattack targeting a third-party government contractor. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caa9beda-268e-11f0-9838-43552c04022f]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8675496083.mp3?updated=1746106662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The iPhone Revolution: Innovation in Your Pocket</title>
      <description>From its groundbreaking debut in 2007 to the cutting-edge technology of today, the iPhone has redefined how we communicate, work, and live. In this episode of Cyber Minds, we explore the evolution of Apple’s iconic device, the innovations that set it apart, and the lasting impact it has had.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Apr 2025 14:20:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From its groundbreaking debut in 2007 to the cutting-edge technology of today, the iPhone has redefined how we communicate, work, and live. In this episode of Cyber Minds, we explore the evolution of Apple’s iconic device, the innovations that set it apart, and the lasting impact it has had.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From its groundbreaking debut in 2007 to the cutting-edge technology of today, the iPhone has redefined how we communicate, work, and live. In this episode of Cyber Minds, we explore the evolution of Apple’s iconic device, the innovations that set it apart, and the lasting impact it has had.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8737dca0-0f04-11f0-b7de-533b9d4e12f7]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7997097608.mp3?updated=1743517846" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>High Stakes Hack: Scattered Spider’s Las Vegas Infiltration</title>
      <description>In the summer of 2023, the glitzy world of Las Vegas was shaken by a cyber attack orchestrated by the hacker group Scattered Spider. Targeting major casino operators, this sophisticated breach disrupted operations, exposed vulnerabilities, and left an industry on edge. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Mar 2025 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the summer of 2023, the glitzy world of Las Vegas was shaken by a cyber attack orchestrated by the hacker group Scattered Spider. Targeting major casino operators, this sophisticated breach disrupted operations, exposed vulnerabilities, and left an industry on edge. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the summer of 2023, the glitzy world of Las Vegas was shaken by a cyber attack orchestrated by the hacker group Scattered Spider. Targeting major casino operators, this sophisticated breach disrupted operations, exposed vulnerabilities, and left an industry on edge. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>740</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9904ec5c-d818-11ef-8688-fb8bfa41e1e7]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT6610615866.mp3?updated=1737479050" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the Mind of Paige Thompson: The Capitol One Breach</title>
      <description>In this episode of Cyber Minds, we uncover the intriguing story of Paige Thompson, the former Amazon engineer behind the infamous 2019 Capitol One data breach. Discover how Thompson exploited vulnerabilities to access the personal data of over 100 million individuals, the unconventional methods she used, and the cryptic online behavior that led to her capture. We’ll explore the complexities of her case, the ethical debates surrounding her actions, and the ripple effects it had on the world of cybersecurity. Was she a hacker, a whistleblower, or something in between? Tune in to find out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Feb 2025 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we uncover the intriguing story of Paige Thompson, the former Amazon engineer behind the infamous 2019 Capitol One data breach. Discover how Thompson exploited vulnerabilities to access the personal data of over 100 million individuals, the unconventional methods she used, and the cryptic online behavior that led to her capture. We’ll explore the complexities of her case, the ethical debates surrounding her actions, and the ripple effects it had on the world of cybersecurity. Was she a hacker, a whistleblower, or something in between? Tune in to find out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Cyber Minds</em>, we uncover the intriguing story of Paige Thompson, the former Amazon engineer behind the infamous 2019 Capitol One data breach. Discover how Thompson exploited vulnerabilities to access the personal data of over 100 million individuals, the unconventional methods she used, and the cryptic online behavior that led to her capture. We’ll explore the complexities of her case, the ethical debates surrounding her actions, and the ripple effects it had on the world of cybersecurity. Was she a hacker, a whistleblower, or something in between? Tune in to find out.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c01fec2a-cde0-11ef-992f-d371d160dc61]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8917789839.mp3?updated=1736355439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Accidental Hero: Marcus Hutchins and the WannaCry Worm</title>
      <description>In this episode of Cyber Minds, we dive into the incredible story of Marcus Hutchins, the young British cybersecurity researcher who halted the global WannaCry ransomware attack in 2017. From his unexpected rise to fame to his controversial past, we’ll explore how Hutchins’ quick thinking saved countless systems worldwide—and the challenges he faced when his own history came to light. This is a tale of redemption, resilience, and the blurred lines of ethical hacking in the fight against cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jan 2025 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we dive into the incredible story of Marcus Hutchins, the young British cybersecurity researcher who halted the global WannaCry ransomware attack in 2017. From his unexpected rise to fame to his controversial past, we’ll explore how Hutchins’ quick thinking saved countless systems worldwide—and the challenges he faced when his own history came to light. This is a tale of redemption, resilience, and the blurred lines of ethical hacking in the fight against cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Cyber Minds</em>, we dive into the incredible story of Marcus Hutchins, the young British cybersecurity researcher who halted the global WannaCry ransomware attack in 2017. From his unexpected rise to fame to his controversial past, we’ll explore how Hutchins’ quick thinking saved countless systems worldwide—and the challenges he faced when his own history came to light. This is a tale of redemption, resilience, and the blurred lines of ethical hacking in the fight against cybercrime.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>590</itunes:duration>
      <guid isPermaLink="false"><![CDATA[72fcfc4e-cde0-11ef-a8b6-db0821a8815b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8189994683.mp3?updated=1736355410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Ride-Sharing Data Disaster</title>
      <description>In 2016, Uber faced one of the most infamous data breaches in tech history, exposing the personal information of 57 million riders and drivers. But what made this breach even more shocking was how it was handled—or mishandled—by those at the top. In this episode, we unravel the events leading up to the breach, the questionable decision to cover it up, and the fallout that reshaped Uber’s leadership and security practices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Dec 2024 16:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In 2016, Uber faced one of the most infamous data breaches in tech history, exposing the personal information of 57 million riders and drivers. But what made this breach even more shocking was how it was handled—or mishandled—by those at the top. In this episode, we unravel the events leading up to the breach, the questionable decision to cover it up, and the fallout that reshaped Uber’s leadership and security practices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In 2016, Uber faced one of the most infamous data breaches in tech history, exposing the personal information of 57 million riders and drivers. But what made this breach even more shocking was how it was handled—or mishandled—by those at the top. In this episode, we unravel the events leading up to the breach, the questionable decision to cover it up, and the fallout that reshaped Uber’s leadership and security practices.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <guid isPermaLink="false"><![CDATA[7a962962-b102-11ef-9bed-abf09532a34b]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT2901725172.mp3?updated=1733181273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Homeless Hacker: Adrian Lamo’s Cyber Odyssey</title>
      <description>In this episode of Cyber Minds, we delve into the complex and controversial life of Adrian Lamo, known as "The Homeless Hacker." Lamo's story is one of contradictions—celebrated for his hacking skills but criticized for his choices. From his high-profile intrusions into major corporate systems like Microsoft and The New York Times to his pivotal role in turning in whistleblower Chelsea Manning, Lamo's actions raise critical questions about the ethics of hacking and cyber justice.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Nov 2024 13:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we delve into the complex and controversial life of Adrian Lamo, known as "The Homeless Hacker." Lamo's story is one of contradictions—celebrated for his hacking skills but criticized for his choices. From his high-profile intrusions into major corporate systems like Microsoft and The New York Times to his pivotal role in turning in whistleblower Chelsea Manning, Lamo's actions raise critical questions about the ethics of hacking and cyber justice.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <strong>Cyber Minds</strong>, we delve into the complex and controversial life of Adrian Lamo, known as "The Homeless Hacker." Lamo's story is one of contradictions—celebrated for his hacking skills but criticized for his choices. From his high-profile intrusions into major corporate systems like Microsoft and The New York Times to his pivotal role in turning in whistleblower Chelsea Manning, Lamo's actions raise critical questions about the ethics of hacking and cyber justice.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>657</itunes:duration>
      <guid isPermaLink="false"><![CDATA[a12e4998-a2a1-11ef-a604-2f6669178b2a]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1442636612.mp3?updated=1731600458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Youngest Hacker: Kristoffer Wilhelm von Hassel </title>
      <description>In this episode of Cyber Minds, we delve into the incredible story of Kristoffer Wilhelm von Hassel, the five-year-old who made global headlines for uncovering a security flaw in Microsoft’s Xbox Live system. How did a child crack the code of one of the world’s biggest tech companies? We explore how his discovery reshaped cybersecurity discussions and the surprising reaction from Microsoft.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Oct 2024 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of Cyber Minds, we delve into the incredible story of Kristoffer Wilhelm von Hassel, the five-year-old who made global headlines for uncovering a security flaw in Microsoft’s Xbox Live system. How did a child crack the code of one of the world’s biggest tech companies? We explore how his discovery reshaped cybersecurity discussions and the surprising reaction from Microsoft.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of <em>Cyber Minds</em>, we delve into the incredible story of Kristoffer Wilhelm von Hassel, the five-year-old who made global headlines for uncovering a security flaw in Microsoft’s Xbox Live system. How did a child crack the code of one of the world’s biggest tech companies? We explore how his discovery reshaped cybersecurity discussions and the surprising reaction from Microsoft.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>717</itunes:duration>
      <guid isPermaLink="false"><![CDATA[3d3d7fe8-8a38-11ef-bb71-ef309bbdbf19]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7891338805.mp3?updated=1728916452" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NASA 1999: The Hack That Shook Space</title>
      <description>In 1999, NASA experienced a breach that sent shockwaves through the cybersecurity world. A 15-year-old hacker known as “c0mrade” infiltrated NASA's computer systems, gaining access to critical files and forcing the space agency to shut down its network for 21 days. This episode of "Cyber Minds" dives into the audacious hack that exposed vulnerabilities in one of the world’s most secure institutions. We’ll explore how the breach occurred, the hacker’s motivations, and the impact on NASA’s operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Sep 2024 15:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In 1999, NASA experienced a breach that sent shockwaves through the cybersecurity world. A 15-year-old hacker known as “c0mrade” infiltrated NASA's computer systems, gaining access to critical files and forcing the space agency to shut down its network for 21 days. This episode of "Cyber Minds" dives into the audacious hack that exposed vulnerabilities in one of the world’s most secure institutions. We’ll explore how the breach occurred, the hacker’s motivations, and the impact on NASA’s operations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In 1999, NASA experienced a breach that sent shockwaves through the cybersecurity world. A 15-year-old hacker known as “c0mrade” infiltrated NASA's computer systems, gaining access to critical files and forcing the space agency to shut down its network for 21 days. This episode of "Cyber Minds" dives into the audacious hack that exposed vulnerabilities in one of the world’s most secure institutions. We’ll explore how the breach occurred, the hacker’s motivations, and the impact on NASA’s operations.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>502</itunes:duration>
      <guid isPermaLink="false"><![CDATA[f6fe7fb6-6c76-11ef-bc0e-dbddc6b1464e]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1565363295.mp3?updated=1725644669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Y2K Bug</title>
      <description>If you are a Millennial, Gen X’er, Baby Boomer, or from any generations prior, you most certainly remember the Y2K fears that dominated the culture. With computers having only operated within the span of the 1900s, we were told that the change in date when January 1st of 2000 would hit, would wreak havoc on computing systems worldwide. This was a result of how dates were stored in computing systems, which we will tackle more in-depth on this show. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Aug 2023 14:11:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If you are a Millennial, Gen X’er, Baby Boomer, or from any generations prior, you most certainly remember the Y2K fears that dominated the culture. With computers having only operated within the span of the 1900s, we were told that the change in date when January 1st of 2000 would hit, would wreak havoc on computing systems worldwide. This was a result of how dates were stored in computing systems, which we will tackle more in-depth on this show. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If you are a Millennial, Gen X’er, Baby Boomer, or from any generations prior, you most certainly remember the Y2K fears that dominated the culture. With computers having only operated within the span of the 1900s, we were told that the change in date when January 1st of 2000 would hit, would wreak havoc on computing systems worldwide. This was a result of how dates were stored in computing systems, which we will tackle more in-depth on this show. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>690</itunes:duration>
      <guid isPermaLink="false"><![CDATA[b7da472a-3207-11ee-b839-8bb0a61b0ad5]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8462896858.mp3?updated=1691072305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stumbling Upon Spy Technology</title>
      <link>https://shows.acast.com/643ee3a0e1bffc00108d0df0/episodes/643ee5d2f659a800106931f0</link>
      <description>How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Apr 2023 18:47:46 -0000</pubDate>
      <itunes:title>Stumbling Upon Spy Technology</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e6e355dc-0f7c-11ee-b091-1304967a4db9/image/show-cover.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device.&lt;br /&gt;&lt;hr&gt;&lt;p style='color:grey; font-size:0.75em;'&gt; Hosted on Acast. See &lt;a style='color:grey;' target='_blank' rel='noopener noreferrer' href='https://acast.com/privacy'&gt;acast.com/privacy&lt;/a&gt; for more information.&lt;/p&gt;</itunes:subtitle>
      <itunes:summary>How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[How a man accused of million-dollar fraud uncovered a never before seen, secret surveillance device.<br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>843</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[643ee5d2f659a800106931f0]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT9838526407.mp3?updated=1687274263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blue Box</title>
      <link>https://www.spreaker.com/user/13895175/blue-box-w-fx</link>
      <description>Steve Wozniak and Steve Jobs are best known as the founders of Apple Computer Company. Apple was founded on April 1, 1976, but the two had been friends for five years. Just months after meeting, the two were intrigued and fascinated by an article on the illegal 'blue box,' a device that allowed you to make free phone calls, plus other illicit uses. After many weeks of immersing themselves in finding out how to build such a device, they succeeded. Thus began a shady business endeavor between them, ultimately laying the groundwork for the world's second-largest company. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Aug 2022 05:00:02 -0000</pubDate>
      <itunes:title>Blue Box</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle>Steve Wozniak and Steve Jobs are best known as the founders of Apple Computer Company. Apple was founded on April 1, 1976, but the two had been friends for five years. Just months after meeting, the two were intrigued and fascinated by an article on...</itunes:subtitle>
      <itunes:summary>Steve Wozniak and Steve Jobs are best known as the founders of Apple Computer Company. Apple was founded on April 1, 1976, but the two had been friends for five years. Just months after meeting, the two were intrigued and fascinated by an article on the illegal 'blue box,' a device that allowed you to make free phone calls, plus other illicit uses. After many weeks of immersing themselves in finding out how to build such a device, they succeeded. Thus began a shady business endeavor between them, ultimately laying the groundwork for the world's second-largest company. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[Steve Wozniak and Steve Jobs are best known as the founders of Apple Computer Company. Apple was founded on April 1, 1976, but the two had been friends for five years. Just months after meeting, the two were intrigued and fascinated by an article on the illegal 'blue box,' a device that allowed you to make free phone calls, plus other illicit uses. After many weeks of immersing themselves in finding out how to build such a device, they succeeded. Thus began a shady business endeavor between them, ultimately laying the groundwork for the world's second-largest company.<br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[https://api.spreaker.com/episode/50536369]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT1489105579.mp3?updated=1687274264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The John McAfee Story Part 2</title>
      <link>https://www.spreaker.com/user/13895175/mcafee-part-2-produced</link>
      <description>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jul 2022 14:20:20 -0000</pubDate>
      <itunes:title>The John McAfee Story Part 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very...</itunes:subtitle>
      <itunes:summary>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers.<br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1266</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[https://api.spreaker.com/episode/50535933]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7828789553.mp3?updated=1687274264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The John McAfee Story: Part 1</title>
      <link>https://www.spreaker.com/user/13895175/mcafee-part-1-produced</link>
      <description>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Feb 2022 01:17:45 -0000</pubDate>
      <itunes:title>The John McAfee Story: Part 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very...</itunes:subtitle>
      <itunes:summary>John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers. Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[John McAfee was born on September 18th of 1945 in Cinderford, England to an American father and a British mother. Don, the father of John, was attached to an American Army unit stationed in the area. John McAfee primarily grew up in Virginia, but very much considered himself both a Brit and an American. Quite eerily, Don McAfee, who struggled with alcoholism resulting in violent outbursts at his son, committed suicide in 1961 when John was only 15. It made an impact on John, described in articles about the incident as “haunting,” but rather than sulk, he threw himself into his fascination with mathematics and early computers.<br><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[https://api.spreaker.com/episode/48811774]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT7197514860.mp3?updated=1687274264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Albert Gonzales: A Bright Young Boy to Money Fraudster</title>
      <link>https://www.spreaker.com/user/13895175/albert-gonzales</link>
      <description>Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jan 2021 00:11:40 -0000</pubDate>
      <itunes:title>Albert Gonzales: A Bright Young Boy to Money Fraudster</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle>Albert Gonzalez, infamous criminal hacker known by aliases like CumbaJohnny. His backstory however shows how a switch can be flipped in the mind of a bright young boy to become enthralled with schemes to obtain massive quantities of money illegally.</itunes:subtitle>
      <itunes:summary>Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p></p><p><br></p><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1057</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[https://api.spreaker.com/episode/43173358]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT9809424844.mp3?updated=1687274264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trailer</title>
      <link>https://www.spreaker.com/user/13895175/trailer-produced-1</link>
      <description>Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Jan 2021 05:48:57 -0000</pubDate>
      <itunes:title>Trailer</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>Narrative.fm</itunes:author>
      <itunes:subtitle>Introducing Cyber Minds: Covering the stories behind the technologists, hackers, and coders that shaped our technology filled world we live in today.</itunes:subtitle>
      <itunes:summary>Hosted on Acast. See acast.com/privacy for more information.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p></p><p><br></p><p> Hosted on Acast. See <a href="https://acast.com/privacy">acast.com/privacy</a> for more information.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>105</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[https://api.spreaker.com/episode/43088170]]></guid>
      <enclosure url="https://traffic.megaphone.fm/COPILOT8263305071.mp3?updated=1687274264" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
