<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/7zOHZH9E" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Hackable?</title>
    <description>We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.

Winner of Best Branded Podcast - 10th Annual Shorty Awards.</description>
    <language>en</language>
    <pubDate>Tue, 3 Dec 2019 00:05:08 +0000</pubDate>
    <lastBuildDate>Tue, 4 Jun 2024 23:06:25 +0000</lastBuildDate>
    <image>
      <link>https://hackablepodcast.com</link>
      <title>Hackable?</title>
      <url>https://image.simplecastcdn.com/images/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/c7755129-ffa9-4727-b9f0-8539e5ed2ba0/3000x3000/1499446311artwork.jpg?aid=rss_feed</url>
    </image>
    <link>https://hackablepodcast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>We see lots of movies and TV shows where hackers can infiltrate our lives with just a few keystrokes. But is it real? We’re here to find out. Malicious cat photos, sketchy Wi-Fi networks, rogue rentals, all-knowing webcams - those are just a few topics tackled in Hackable?, where we let our hackers shed light on just how secure we really are.

Winner of Best Branded Podcast - 10th Annual Shorty Awards.</itunes:summary>
    <itunes:author>McAfee</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/c7755129-ffa9-4727-b9f0-8539e5ed2ba0/3000x3000/1499446311artwork.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.hackablepodcast.com/hackable</itunes:new-feed-url>
    <itunes:keywords>McAfee, Technology, web, cyber, cybersecurity, cyber criminals, Wi-Fi, hackers, hacking, whitehat, digital, phishing, malware, ransomware</itunes:keywords>
    <itunes:owner>
      <itunes:name>McAfee</itunes:name>
      <itunes:email>info@pacific-content.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:category text="TV &amp; Film"/>
    <item>
      <guid isPermaLink="false">0b46f3e5-b56d-43ae-a903-49293d53f34c</guid>
      <title>Gone Phishin’</title>
      <description><![CDATA[<p>Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. <br /> </p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 3 Dec 2019 00:05:08 +0000</pubDate>
      <author>info@pacific-content.com (mcafee)</author>
      <link>https://hackablepodcast.com/episodes/gone-phishin</link>
      <content:encoded><![CDATA[<p>Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. <br /> </p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="35830801" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/be683711-6aa3-47c4-a874-034010254001/hackable-ep-36-gone-phishin-v6_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Gone Phishin’</itunes:title>
      <itunes:author>mcafee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/1e36a1e7-6211-46ab-8316-0abbf4334e65/3000x3000/ep36-3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:04</itunes:duration>
      <itunes:summary>Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. 
</itunes:summary>
      <itunes:subtitle>Phishing scams that disguise malware or malicious intent in messages are extremely common. Just how do hackers keep reeling in victims? On this episode, we learn exactly how phishing works from the hacker’s perspective, and cast a phishing line of our own. 
</itunes:subtitle>
      <itunes:keywords>malware, phishing, cyber security, scam, geoff siskind, hackable, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">92cc78da-c0ff-400e-8677-2a96edc96ccd</guid>
      <title>Porch Piracy</title>
      <description><![CDATA[<p>The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy. <br /> </p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 19 Nov 2019 00:05:03 +0000</pubDate>
      <author>info@pacific-content.com (Mcafee)</author>
      <link>https://hackablepodcast.com/episodes/porch-piracy</link>
      <content:encoded><![CDATA[<p>The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy. <br /> </p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="28806091" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1bf7e01e-0d7c-4d9b-8520-1a7df96e706f/hackable-ep-35-smart-lock-box-v3_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Porch Piracy</itunes:title>
      <itunes:author>Mcafee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/94a1a0f4-4638-4073-8f0b-fbb69f8bdc53/3000x3000/ep35-3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:45</itunes:duration>
      <itunes:summary>The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy.
</itunes:summary>
      <itunes:subtitle>The more people shop online, the more thieves swipe packages. Are smart padlocks a secure solution? Or can they be cracked open by hackers? On this episode, Geoff joins the McAfee Advanced Threat Research team for some technical porch piracy.
</itunes:subtitle>
      <itunes:keywords>hackers, iot, hackable?, cyber security, geoff siskind, podcast, smart padlock</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">8fa8f551-1494-4140-8181-21327c384523</guid>
      <title>False Charges</title>
      <description><![CDATA[<p>It's always stressful when your phone's battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 5 Nov 2019 00:05:03 +0000</pubDate>
      <author>info@pacific-content.com (Mcafee)</author>
      <link>https://hackablepodcast.com/episodes/false-charges</link>
      <content:encoded><![CDATA[<p>It's always stressful when your phone's battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="29505411" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/27d1affc-fda5-4ef7-878a-1f052c261329/hackable-ep-34-phone-cable-v3_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>False Charges</itunes:title>
      <itunes:author>Mcafee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/6c022e0a-487c-4e70-b214-3c5c098740dd/3000x3000/ep34-3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:29</itunes:duration>
      <itunes:summary>It&apos;s always stressful when your phone&apos;s battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable. </itunes:summary>
      <itunes:subtitle>It&apos;s always stressful when your phone&apos;s battery is low, but are some charging stations and USB cables dangerous to plug into? On this episode of “Hackable?” Geoff finds out just how much damage a hacker can do if you charge your phone with a secretly sinister cable. </itunes:subtitle>
      <itunes:keywords>charging cable, hackable?, cyber security, geoff siskind, podcast, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">6bfaf7d9-16de-4e92-820b-59c21ab4360b</guid>
      <title>Who&apos;s Watching</title>
      <description><![CDATA[<p>Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 22 Oct 2019 00:05:01 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/whos-watching</link>
      <content:encoded><![CDATA[<p>Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="29303766" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/ac4c72d5-bfef-4aef-9031-476183e4402e/hackable-ep-33-tv-hack-2-v2_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Who&apos;s Watching</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/24b46da5-1dab-4488-b023-c8c8d1227242/3000x3000/ep33-3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:17</itunes:duration>
      <itunes:summary>Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.   </itunes:summary>
      <itunes:subtitle>Streaming devices make dumb TVs smart and smart TVs, well, smarter. But does that mean that a hacker can hijack your binge-watching? We invite white-hat Craig Young back on the show to learn whether there’s anything particularly vulnerable about these popular smart boxes and sticks.   </itunes:subtitle>
      <itunes:keywords>mcafee, tv, hackable?, cyber security, geoff siskind, hack, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">50ce5155-625b-4a80-9ba0-798291e8acd4</guid>
      <title>Keyless Ignition</title>
      <description><![CDATA[<p>Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 8 Oct 2019 00:05:03 +0000</pubDate>
      <author>info@pacific-content.com (Mcafee)</author>
      <link>https://hackablepodcast.com/episodes/keyless-ignition</link>
      <content:encoded><![CDATA[<p>Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="24265215" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/41b157d0-36f4-46c7-8fdf-91bac643f628/hackable-ep-32-car-hack-2-v3-1_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Keyless Ignition</itunes:title>
      <itunes:author>Mcafee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/55bbe8bc-eca6-4df8-b354-3adeb03a60fb/3000x3000/ep32-3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:06</itunes:duration>
      <itunes:summary>Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key. </itunes:summary>
      <itunes:subtitle>Cars are more computerized than ever. But, does this make them easier to steal? Can smart key fobs help hackers drive away with your ride? White-hat Tim Martin comes back on the show and we learn whether he can start Geoff’s rental car without a key. </itunes:subtitle>
      <itunes:keywords>car, computer, hackable?, cyber security, geoff siskind, podcast, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">3658bfb4-edc0-4d5d-ac98-cd42363fbd8a</guid>
      <title>MouseJacked</title>
      <description><![CDATA[<p>Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 24 Sep 2019 00:05:03 +0000</pubDate>
      <author>info@pacific-content.com (mcafee)</author>
      <link>https://hackablepodcast.com/episodes/mousejacked</link>
      <content:encoded><![CDATA[<p>Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.</p><p>For more info <a href="http://www.hackablepodcast.com">www.hackablepodcast.com</a></p><p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="24407944" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1675712d-5e15-4d0c-9993-955762a07c2f/hackable_ep_31_wireless_mouse_v2_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>MouseJacked</itunes:title>
      <itunes:author>mcafee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/9a659378-8ae6-4406-95e3-697fcfaa5459/3000x3000/ep31_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:16</itunes:duration>
      <itunes:summary>Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.  </itunes:summary>
      <itunes:subtitle>Wireless mice have become the preferred peripheral to scroll and click, but can cutting the cord allow a hacker to hijack your computer? In this episode, Geoff invites a white-hat over to learn whether his mouse leaves him vulnerable.  </itunes:subtitle>
      <itunes:keywords>wireless mouse, computer, hackable?, cyber security, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>5</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">fbfe05e6-72cc-4553-92b3-4da6f055d02d</guid>
      <title>The Mr. Robot Spectacular</title>
      <description><![CDATA[<p>While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 30 Jul 2019 00:05:06 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/the-mr-robot-spectacular</link>
      <content:encoded><![CDATA[<p>While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="33314736" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/a736a7fc-1840-4cd8-81b5-3809f9a347ba/hackable_ep_30_mr_robot_v4_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>The Mr. Robot Spectacular</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/02ee6b7c-87c6-4416-b1b5-a49061417d8e/3000x3000/ep30_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:25</itunes:duration>
      <itunes:summary>While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.  </itunes:summary>
      <itunes:subtitle>While Hollywood often gets hacking wrong, “Mr. Robot” is acclaimed for its commitment to authenticity and technical accuracy. And it’s ridiculously entertaining. In this episode, Pedro invites three hackers to Geoff’s office for attacks inspired by TV’s best cybercrime show.  </itunes:subtitle>
      <itunes:keywords>hackable?, cyber security, geoff siskind, mr. robot, podcast, hackable, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">8ec9efad-f483-4c54-9bb9-f06c12a2d2c0</guid>
      <title>Dead Drops</title>
      <description><![CDATA[<p>You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 16 Jul 2019 00:05:05 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/dead-drops</link>
      <content:encoded><![CDATA[<p>You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="35751711" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/8d6dce00-942a-49bf-b2c0-f4572f52c50f/hackable_ep_29_usb_v4_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Dead Drops</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/33396a01-57d9-4487-a439-875eae8b2530/3000x3000/ep29_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:03</itunes:duration>
      <itunes:summary>You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!</itunes:summary>
      <itunes:subtitle>You spot a dropped USB drive laying on the ground or in your office. Did someone lose their files or is it a trap set by a hacker? On this episode, Geoff learns how dangerous dropped USB drives are and whether Pedro would take the bait!</itunes:subtitle>
      <itunes:keywords>hackable?, cyber security, geoff siskind, usb, podcast, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">fac05c74-e581-4a0a-beb8-0553b72680f6</guid>
      <title>Up Your Game</title>
      <description><![CDATA[<p>Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 2 Jul 2019 00:05:01 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/up-your-game</link>
      <content:encoded><![CDATA[<p>Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="30189463" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/c7d33889-da75-49a0-9258-195348ae6c5a/hackable_ep_28_video_games_v3_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Up Your Game</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/7f0434c0-5dc8-4293-b866-3137fc2fa122/3000x3000/ep28_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:11</itunes:duration>
      <itunes:summary>Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.</itunes:summary>
      <itunes:subtitle>Skins and other downloadable modifications are a popular way to level up video games. Can these “mods” expose players to hidden malware? On this episode, Geoff learns what a devious hacker could conceal within a mod made for Minecraft — a game played monthly by more than 90 million people.</itunes:subtitle>
      <itunes:keywords>mcafee, cyber security, skins, geoff siskind, podcast, hackable, video games, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">68efd896-33a8-404b-b6ce-e25daa488d66</guid>
      <title>Face the Fax</title>
      <description><![CDATA[<p>All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 18 Jun 2019 07:05:17 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/face-the-fax</link>
      <content:encoded><![CDATA[<p>All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="26185104" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1f24e42f-d64a-4b54-8632-fe03429d2f67/Hackable_Ep_27_Fax_Hack_v2_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Face the Fax</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/9bdb470f-0e8f-4f05-926e-1ea357c0675e/3000x3000/Ep27_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:05</itunes:duration>
      <itunes:summary>All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.  </itunes:summary>
      <itunes:subtitle>All-in-one printers with fax machines may seem like relics from a bygone era, but could this seldom-used technology put you at risk? On this episode, Geoff learns whether the printer sitting in his office creates an open gateway for hackers to compromise his entire network.  </itunes:subtitle>
      <itunes:keywords>fax, cyber security, fax machine, geoff siskind, hackable, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">9766b019-853f-4118-af7c-160eb7b42a8f</guid>
      <title>Malicious Brews</title>
      <description><![CDATA[<p>Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 4 Jun 2019 07:05:18 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/malicious-brews</link>
      <content:encoded><![CDATA[<p>Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="36789538" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/7f4f3173-4504-4a59-9334-383bed7806ab/Hackable_Ep_23_Coffee_vs_Tea_v6_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Malicious Brews</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/93434982-821d-4022-b833-f918a6fff347/3000x3000/Ep26_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:55</itunes:duration>
      <itunes:summary>Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.  </itunes:summary>
      <itunes:subtitle>Coffee vs. tea is an age-old debate. On this episode, we settle it once and for all when two teams of white-hat hackers compete — one hacks a smart coffee maker, the other a kettle. Listen and learn which exposes more of Geoff’s personal information.  </itunes:subtitle>
      <itunes:keywords>tea, cyber security, geoff siskind, coffee, hackable, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">9b7cd775-e38d-4671-b1e7-4216d6918a7b</guid>
      <title>Phreaks and Geeks</title>
      <description><![CDATA[<p>From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 21 May 2019 07:00:01 +0000</pubDate>
      <author>info@pacific-content.com (McAfee, geoff siskind, hackable)</author>
      <link>https://hackablepodcast.com/episodes/the-weakest-link</link>
      <content:encoded><![CDATA[<p>From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data.</p>
<p>For more info www.hackablepodcast.com</p>
<p>Leave a rating or review in <a href="https://podcasts.apple.com/ca/podcast/hackable/id1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="29687291" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/c921fa0f-bdde-44cc-adee-50109ef6a452/Hackable_Ep_25_Phone_App_Hack_v5_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Phreaks and Geeks</itunes:title>
      <itunes:author>McAfee, geoff siskind, hackable</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/7dfa8d26-0674-443c-944c-bfd6457bf0cf/c88e6ed8-e28d-4ed2-9659-3be359913d89/3000x3000/Ep25_3000x3000.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:37</itunes:duration>
      <itunes:summary>From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data. </itunes:summary>
      <itunes:subtitle>From photos and messages to emails and credit cards, smartphones are filled with sensitive personal information. Just how secure are they? In this episode, Geoff invites a white-hat to try and remotely access his phone’s data. </itunes:subtitle>
      <itunes:keywords>cyber security, phone data, geoff siskind, podcast, hackable, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>4</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e4ddde72-101c-4e11-8816-1268242697a0</guid>
      <title>The Weakest Link</title>
      <description><![CDATA[<p>Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual &quot;front door&quot; wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 5 Feb 2019 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/the-weakest-link</link>
      <content:encoded><![CDATA[<p>Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual &quot;front door&quot; wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="30482216" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/3c90422b-72bb-4ede-b9a0-ae243d0a610c/efe8985e_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>The Weakest Link</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/3c90422b-72bb-4ede-b9a0-ae243d0a610c/3000x3000/1549305879artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:22</itunes:duration>
      <itunes:summary>Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual &quot;front door&quot; wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.  </itunes:summary>
      <itunes:subtitle>Smart plugs allow you to smarten up any old appliance in your home. But do they leave your virtual &quot;front door&quot; wide open for hackers? In this episode, Geoff learns what a hacker can do once they execute code on an internet-connected outlet.  </itunes:subtitle>
      <itunes:keywords>mcafee, hackers, smart plugs, cyber security, ai, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">c0ed5c30-f994-4455-8847-dffd3fa95864</guid>
      <title>Remote Control</title>
      <description><![CDATA[<p>Smart TVs make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 22 Jan 2019 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/remote-control</link>
      <content:encoded><![CDATA[<p>Smart TVs make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="32439892" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1d873a66-a253-4293-8aa2-92b506157b5c/1c880609_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Remote Control</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1d873a66-a253-4293-8aa2-92b506157b5c/3000x3000/1547833874artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:21</itunes:duration>
      <itunes:summary>Smart TVs make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game. </itunes:summary>
      <itunes:subtitle>Smart TVs make binge-worthy TV shows and movies just a click away. But do these internet-connected devices also expose users to hackers? In this episode, our host Geoff Siskind and two white-hats see if they can hack our producer’s smart TV in the middle of a big game. </itunes:subtitle>
      <itunes:keywords>mcafee, iot, smart tv, cyber security, geoff siskind, computer, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">ac004ab6-d567-4e64-a54d-ee96d32d28b5</guid>
      <title>RAT Attack</title>
      <description><![CDATA[<p>While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 8 Jan 2019 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/rat-attack</link>
      <content:encoded><![CDATA[<p>While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="27653343" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/d13e6ec8-62a3-4398-ac5d-71c48f2516c8/3bd45f65_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>RAT Attack</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/d13e6ec8-62a3-4398-ac5d-71c48f2516c8/3000x3000/1546877921artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:21</itunes:duration>
      <itunes:summary>While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT. </itunes:summary>
      <itunes:subtitle>While Geoff is usually the victim of our white-hat hackers, this episode he gets to see things from their perspective. Find out just how much control a hacker has over a machine infested by a RAT. </itunes:subtitle>
      <itunes:keywords>mcafee, hackable, passwords, cyber security, podcast, computer, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">0e812fff-daa2-4fdf-bafd-a2fee488ae09</guid>
      <title>Flying Blind</title>
      <description><![CDATA[<p>There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Mon, 17 Dec 2018 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/flying-blind</link>
      <content:encoded><![CDATA[<p>There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="28251487" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/bb2d301a-fc9d-4bc3-9131-ae8cc907d8b4/f05f6c96_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Flying Blind</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/bb2d301a-fc9d-4bc3-9131-ae8cc907d8b4/3000x3000/1544807670artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:03</itunes:duration>
      <itunes:summary>There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control? </itunes:summary>
      <itunes:subtitle>There are now more than 1 million drones registered in the US. They are fun to fly, and poised to take on important commercial and public functions. But are they secure? Do pilots risk losing all control? </itunes:subtitle>
      <itunes:keywords>mcafee, cyber security, drone, ai, geoff siskind, computer, terrorism, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">08312d22-0575-4ef8-8aee-384a3cd3941d</guid>
      <title>Digital Breadcrumbs</title>
      <description><![CDATA[<p>From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 4 Dec 2018 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/digital-breadcrumbs</link>
      <content:encoded><![CDATA[<p>From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="25386342" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/83c6ff34-831c-4291-abfd-6b39918f11c0/9332057b_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Digital Breadcrumbs</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/83c6ff34-831c-4291-abfd-6b39918f11c0/3000x3000/1543606013artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:04</itunes:duration>
      <itunes:summary>From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended? </itunes:summary>
      <itunes:subtitle>From family holidays to hikes, concerts, and meals — almost every experience is now snapped and posted to social media. Do photo sharers risk revealing even more than they intended? </itunes:subtitle>
      <itunes:keywords>mcafee, hackable, passwords, cyber security, podcast, computer, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">73da4d32-6181-4155-b65f-20df425aab9c</guid>
      <title>Prying Eyes</title>
      <description><![CDATA[<p>Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for grabs?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 20 Nov 2018 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/prying-eyes</link>
      <content:encoded><![CDATA[<p>Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for grabs?</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="27441640" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/f3cc8fc3-3cac-436e-bedb-87c81ee02694/4d9775fe_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Prying Eyes</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/f3cc8fc3-3cac-436e-bedb-87c81ee02694/3000x3000/1542388002artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:13</itunes:duration>
      <itunes:summary>Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for grabs? </itunes:summary>
      <itunes:subtitle>Every 53 seconds, a laptop is stolen from a car or office, an airport or a café. Even if you secure your laptop with a strong password, will that strong password keep prying eyes off your personal data? Or will it leave your intimate information up for grabs? </itunes:subtitle>
      <itunes:keywords>mcafee, hackable, passwords, cyber security, podcast, computer, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">2cb4e6b0-a88c-455e-8710-518c2bba821f</guid>
      <title>Virtually Vulnerable</title>
      <description><![CDATA[<p>Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, <a href="https://twitter.com/Geoffsiskind">Geoff</a> heads to the <a href="https://www.newhaven.edu/">University of New Haven</a> virtual reality research lab to learn if hackers can manipulate virtual experiences and create real danger.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 6 Nov 2018 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/virtually-vulnerable</link>
      <content:encoded><![CDATA[<p>Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, <a href="https://twitter.com/Geoffsiskind">Geoff</a> heads to the <a href="https://www.newhaven.edu/">University of New Haven</a> virtual reality research lab to learn if hackers can manipulate virtual experiences and create real danger.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="28008952" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/f6607183-b796-4d60-96c2-3a41cfb17985/4614bee6_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Virtually Vulnerable</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/f6607183-b796-4d60-96c2-3a41cfb17985/3000x3000/1541440965artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:49</itunes:duration>
      <itunes:summary>Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, Geoff heads to the University of New Haven virtual reality research lab to learn if hackers can manipulate virtual experiences and create real danger.   </itunes:summary>
      <itunes:subtitle>Once a sci-fi novelty, virtual reality has emerged as a tech phenomenon. But do security vulnerabilities in popular headsets put users at risk? In this episode, Geoff heads to the University of New Haven virtual reality research lab to learn if hackers can manipulate virtual experiences and create real danger.   </itunes:subtitle>
      <itunes:keywords>mcafee, hackable, cyber security, podcast, computer, hacking, virtual reality, vr, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d52d37e0-9733-48d4-b998-58a5f9f50ccd</guid>
      <title>New to Hackable?</title>
      <description><![CDATA[<p>In a world where we obsess over staying connected, how can we be sure we’re not leaving ourselves vulnerable? Hackable? gives us a front row seat to explore where we’re susceptible in our daily routines, without even realizing it.</p>
<p>From Wi-Fi to webcams and cars to computers, these episodes expose the places hackers may hit, and explain how they get our information. With the FBI putting out a most wanted list solely dedicated to cybercriminals, it’s no argument what a huge issue cybercrime has become. Malware and ransomware threats are on the rise*, and we need to take them seriously to learn what we can do to keep ourselves safe.</p>
<p>Our host, [Geoff Siskind] <a href="https://twitter.com/Geoffsiskind">1</a>, digs into the minds of cyber criminals with cybersecurity expert, Bruce Snell, giving us an in-depth view of the vulnerabilities we face so we can stay observant, and out of the hacker’s path.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Thu, 1 Nov 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/</link>
      <content:encoded><![CDATA[<p>In a world where we obsess over staying connected, how can we be sure we’re not leaving ourselves vulnerable? Hackable? gives us a front row seat to explore where we’re susceptible in our daily routines, without even realizing it.</p>
<p>From Wi-Fi to webcams and cars to computers, these episodes expose the places hackers may hit, and explain how they get our information. With the FBI putting out a most wanted list solely dedicated to cybercriminals, it’s no argument what a huge issue cybercrime has become. Malware and ransomware threats are on the rise*, and we need to take them seriously to learn what we can do to keep ourselves safe.</p>
<p>Our host, [Geoff Siskind] <a href="https://twitter.com/Geoffsiskind">1</a>, digs into the minds of cyber criminals with cybersecurity expert, Bruce Snell, giving us an in-depth view of the vulnerabilities we face so we can stay observant, and out of the hacker’s path.</p>
<p>For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="2687790" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/9016af60-2eb3-479c-86c5-e0c80e6daf24/8dc53a09_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>New to Hackable?</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/9016af60-2eb3-479c-86c5-e0c80e6daf24/3000x3000/1541720153artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:27</itunes:duration>
      <itunes:summary>In a world where we obsess over staying connected, how can we be sure we’re not leaving ourselves vulnerable? Hackable? gives us a front row seat to explore where we’re susceptible in our daily routines, without even realizing it.

From Wi-Fi to webcams and cars to computers, these episodes expose the places hackers may hit, and explain how they get our information. With the FBI putting out a most wanted list solely dedicated to cybercriminals, it’s no argument what a huge issue cybercrime has become. Malware and ransomware threats are on the rise*, and we need to take them seriously to learn what we can do to keep ourselves safe.

Our host, Geoff Siskind, digs into the minds of cyber criminals with cybersecurity expert, Bruce Snell, giving us an in-depth view of the vulnerabilities we face so we can stay observant, and out of the hacker’s path.

</itunes:summary>
      <itunes:subtitle>In a world where we obsess over staying connected, how can we be sure we’re not leaving ourselves vulnerable? Hackable? gives us a front row seat to explore where we’re susceptible in our daily routines, without even realizing it.

From Wi-Fi to webcams and cars to computers, these episodes expose the places hackers may hit, and explain how they get our information. With the FBI putting out a most wanted list solely dedicated to cybercriminals, it’s no argument what a huge issue cybercrime has become. Malware and ransomware threats are on the rise*, and we need to take them seriously to learn what we can do to keep ourselves safe.

Our host, Geoff Siskind, digs into the minds of cyber criminals with cybersecurity expert, Bruce Snell, giving us an in-depth view of the vulnerabilities we face so we can stay observant, and out of the hacker’s path.

</itunes:subtitle>
      <itunes:keywords>mcafee, hackable, cyber security, podcast, geoff siskind, computer, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>3</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">fc965dba-56c9-4a85-846b-b6665c206042</guid>
      <title>Internet of Toddlers</title>
      <description><![CDATA[<p>The industry of smart baby devices, also known as the &quot;Internet of Toddlers” includes everything from bluetooth pacifiers, internet-enabled monitors, and Wi-Fi onesies. IoT might be best thing to happen to the nursery...but are the potential vulnerabilities worth it? <a href="https://twitter.com/Geoffsiskind">Geoff</a> and <a href="https://twitter.com/brucesnell">Bruce</a> find out just how easily hackers turn these devices into child’s play. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 29 May 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/internet-of-toddlers</link>
      <content:encoded><![CDATA[<p>The industry of smart baby devices, also known as the &quot;Internet of Toddlers” includes everything from bluetooth pacifiers, internet-enabled monitors, and Wi-Fi onesies. IoT might be best thing to happen to the nursery...but are the potential vulnerabilities worth it? <a href="https://twitter.com/Geoffsiskind">Geoff</a> and <a href="https://twitter.com/brucesnell">Bruce</a> find out just how easily hackers turn these devices into child’s play. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="33186655" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/ccdfd77d-a4b8-42af-883b-f95ee5b60288/ec9a8fc2_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Internet of Toddlers</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/ccdfd77d-a4b8-42af-883b-f95ee5b60288/3000x3000/1527282106artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:17</itunes:duration>
      <itunes:summary>The industry of smart baby devices, also known as the &quot;Internet of Toddlers” includes everything from bluetooth pacifiers, internet-enabled monitors, and Wi-Fi onesies. IoT might be best thing to happen to the nursery...but are the potential vulnerabilities worth it? Geoff and Bruce find out just how easily hackers turn these devices into child’s play.</itunes:summary>
      <itunes:subtitle>The industry of smart baby devices, also known as the &quot;Internet of Toddlers” includes everything from bluetooth pacifiers, internet-enabled monitors, and Wi-Fi onesies. IoT might be best thing to happen to the nursery...but are the potential vulnerabilities worth it? Geoff and Bruce find out just how easily hackers turn these devices into child’s play.</itunes:subtitle>
      <itunes:keywords>mcafee, iot, hackable?, bruce snell, baby monitor, geoff siskind, hacking, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">bea9dfae-ce23-4925-8a46-58dd007dffdc</guid>
      <title>Protecting The Grid</title>
      <description><![CDATA[<p>Our power grids, gas pipelines, and traffic control systems are all accessible online. But does that mean they can be hacked? In this episode of Hackable? <a href="https://twitter.com/geoffsiskind?lang=en">Geoff</a> teams up with the Head of Advanced Threat Research at McAfee to answer the question, “why is SCADA the most critical threat that we’ve probably never heard of?” For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></description>
      <pubDate>Tue, 15 May 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/protecting-the-grid</link>
      <content:encoded><![CDATA[<p>Our power grids, gas pipelines, and traffic control systems are all accessible online. But does that mean they can be hacked? In this episode of Hackable? <a href="https://twitter.com/geoffsiskind?lang=en">Geoff</a> teams up with the Head of Advanced Threat Research at McAfee to answer the question, “why is SCADA the most critical threat that we’ve probably never heard of?” For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
<p>Leave a rating or review in <a href="http://getpodcast.reviews/id/1257232208">Apple Podcasts</a> so we know what you think.</p>
]]></content:encoded>
      <enclosure length="30088100" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/b7d9d3d5-28c9-495f-8406-94e4bb749f81/a8510daf_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Protecting The Grid</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/b7d9d3d5-28c9-495f-8406-94e4bb749f81/3000x3000/1526329212artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:01</itunes:duration>
      <itunes:summary>Our power grids, gas pipelines, and traffic control systems are all accessible online. But does that mean they can be hacked? In this episode of Hackable? Geoff teams up with the Head of Advanced Threat Research at McAfee to answer the question, “why is SCADA the most critical threat that we’ve probably never heard of?”</itunes:summary>
      <itunes:subtitle>Our power grids, gas pipelines, and traffic control systems are all accessible online. But does that mean they can be hacked? In this episode of Hackable? Geoff teams up with the Head of Advanced Threat Research at McAfee to answer the question, “why is SCADA the most critical threat that we’ve probably never heard of?”</itunes:subtitle>
      <itunes:keywords>mcafee, scada, hackable?, bruce snell, cash wash, podcast, geoff siskind, hacking, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e430d068-bcaf-496d-845b-87a2579eaa06</guid>
      <title>Cyber Wash</title>
      <description><![CDATA[<p>Automatic car washes save time and water, but are these internet-enabled devices hackable? In this episode, Geoff teams ups with a Security Researcher to find out how quickly a trip to the car wash can become a potentially dangerous situation. And all it takes is one dirty car, seven dollars and a ride through the drive-thru. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 1 May 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/cyber-wash</link>
      <content:encoded><![CDATA[<p>Automatic car washes save time and water, but are these internet-enabled devices hackable? In this episode, Geoff teams ups with a Security Researcher to find out how quickly a trip to the car wash can become a potentially dangerous situation. And all it takes is one dirty car, seven dollars and a ride through the drive-thru. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="27559312" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/19a79066-d3e8-43cf-bb51-2b70e792b4c5/1792f80d_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Cyber Wash</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/19a79066-d3e8-43cf-bb51-2b70e792b4c5/3000x3000/1525108888artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:25</itunes:duration>
      <itunes:summary>Automatic car washes save time and water, but are these internet-enabled devices hackable? In this episode, Geoff teams ups with a Security Researcher to find out how quickly a trip to the car wash can become a potentially dangerous situation. And all it takes is one dirty car, seven dollars and a ride through the drive-thru.</itunes:summary>
      <itunes:subtitle>Automatic car washes save time and water, but are these internet-enabled devices hackable? In this episode, Geoff teams ups with a Security Researcher to find out how quickly a trip to the car wash can become a potentially dangerous situation. And all it takes is one dirty car, seven dollars and a ride through the drive-thru.</itunes:subtitle>
      <itunes:keywords>mcafee, hackable?, cash wash, podcast, geoff siskind, hacking, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">27263225-a5e6-4836-bef3-6d875aa04f61</guid>
      <title>Pet-nology</title>
      <description><![CDATA[<p>A smart camera + dog treat dispenser allows you to monitor behavior, video chat with your pooch and toss them a treat while you’re away. But what if you’re not the only one watching? In this episode of Hackable? Geoff and Bruce examine the real possibility that your doggy treat dispenser can be hacked. And you’ll be surprised by what they find. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 17 Apr 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/pet-nology</link>
      <content:encoded><![CDATA[<p>A smart camera + dog treat dispenser allows you to monitor behavior, video chat with your pooch and toss them a treat while you’re away. But what if you’re not the only one watching? In this episode of Hackable? Geoff and Bruce examine the real possibility that your doggy treat dispenser can be hacked. And you’ll be surprised by what they find. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="29084574" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/2e2d8751-33c4-4330-82b5-1b51c89d4745/130fed24_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Pet-nology</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/2e2d8751-33c4-4330-82b5-1b51c89d4745/3000x3000/1523905747artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:53</itunes:duration>
      <itunes:summary>A smart camera + dog treat dispenser allows you to monitor behavior, video chat with your pooch and toss them a treat while you’re away. But what if you’re not the only one watching? In this episode of Hackable? Geoff and Bruce examine the real possibility that your doggy treat dispenser can be hacked. And you’ll be surprised by what they find. </itunes:summary>
      <itunes:subtitle>A smart camera + dog treat dispenser allows you to monitor behavior, video chat with your pooch and toss them a treat while you’re away. But what if you’re not the only one watching? In this episode of Hackable? Geoff and Bruce examine the real possibility that your doggy treat dispenser can be hacked. And you’ll be surprised by what they find. </itunes:subtitle>
      <itunes:keywords>mcafee, smart camera, hackable?, dog treat dispenser, cyber security, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">05007234-e014-40a2-a3d5-83ddea8f63f6</guid>
      <title>And We&apos;re In</title>
      <description><![CDATA[<p>&quot;From social media to banking, we use passwords to protect all of our sensitive information. But how easy would it be for a hacker to gain access to our accounts? In this episode of Hackable?, Geoff puts his personal passwords to the test against an expert hacker. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 3 Apr 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/and-were-in</link>
      <content:encoded><![CDATA[<p>&quot;From social media to banking, we use passwords to protect all of our sensitive information. But how easy would it be for a hacker to gain access to our accounts? In this episode of Hackable?, Geoff puts his personal passwords to the test against an expert hacker. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="31230194" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/6517c75d-eade-4084-a208-4531920ec04b/80aaec80_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>And We&apos;re In</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/6517c75d-eade-4084-a208-4531920ec04b/3000x3000/1522429635artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:12</itunes:duration>
      <itunes:summary>&quot;From social media to banking, we use passwords to protect all of our sensitive information. But how easy would it be for a hacker to gain access to our accounts? In this episode of Hackable?, Geoff puts his personal passwords to the test against an expert hacker. 
&quot;</itunes:summary>
      <itunes:subtitle>&quot;From social media to banking, we use passwords to protect all of our sensitive information. But how easy would it be for a hacker to gain access to our accounts? In this episode of Hackable?, Geoff puts his personal passwords to the test against an expert hacker. 
&quot;</itunes:subtitle>
      <itunes:keywords>mcafee, accounts, hackable?, password, geoff siskind, hacking, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">5c8ffebe-dbf4-45c4-a413-cb9c5bd723c2</guid>
      <title>Access Granted</title>
      <description><![CDATA[<p>RFID is in everything from your keycard to library books, and probably even your dog. But with the popularity of this technology, is the information inside as secure as it should be? In this episode, Geoff and the crew look into RFID spoofing and what a hacker might be able to access without you ever knowing. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 20 Mar 2018 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/access-granted</link>
      <content:encoded><![CDATA[<p>RFID is in everything from your keycard to library books, and probably even your dog. But with the popularity of this technology, is the information inside as secure as it should be? In this episode, Geoff and the crew look into RFID spoofing and what a hacker might be able to access without you ever knowing. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="24236617" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/8f03edff-1b5c-407f-8aae-6d59f2312406/6c22f511_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Access Granted</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/8f03edff-1b5c-407f-8aae-6d59f2312406/3000x3000/1521216360artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:57</itunes:duration>
      <itunes:summary>RFID is in everything from your keycard to library books, and probably even your dog. But with the popularity of this technology, is the information inside as secure as it should be? In this episode, Geoff and the crew look into RFID spoofing and what a hacker might be able to access without you ever knowing. </itunes:summary>
      <itunes:subtitle>RFID is in everything from your keycard to library books, and probably even your dog. But with the popularity of this technology, is the information inside as secure as it should be? In this episode, Geoff and the crew look into RFID spoofing and what a hacker might be able to access without you ever knowing. </itunes:subtitle>
      <itunes:keywords>mcafee, rfid, hackable?, cyber security, geoff siskind, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">e8ca345a-1aed-45bd-ba80-5404bb27a902</guid>
      <title>Keyless Entry</title>
      <description><![CDATA[<p>Unlocking your doors with the touch of a button is the greatest thing to happen to cars since, well, the invention of cars. Although is the signal you send through the air secure? Or are you giving a hacker a chance to capture your code with every click? In the Season Two premiere of Hackable? the crew is on the case. or more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Mon, 5 Mar 2018 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/keyless-entry</link>
      <content:encoded><![CDATA[<p>Unlocking your doors with the touch of a button is the greatest thing to happen to cars since, well, the invention of cars. Although is the signal you send through the air secure? Or are you giving a hacker a chance to capture your code with every click? In the Season Two premiere of Hackable? the crew is on the case. or more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="24740045" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/66dfeb66-3e67-424d-9760-756e14007235/88f6f76e_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Keyless Entry</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/66dfeb66-3e67-424d-9760-756e14007235/3000x3000/1519863143artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:20</itunes:duration>
      <itunes:summary>Unlocking your doors with the touch of a button is the greatest thing to happen to cars since, well, the invention of cars. Although is the signal you send through the air secure? Or are you giving a hacker a chance to capture your code with every click? In the Season Two premiere of Hackable? the crew is on the case.</itunes:summary>
      <itunes:subtitle>Unlocking your doors with the touch of a button is the greatest thing to happen to cars since, well, the invention of cars. Although is the signal you send through the air secure? Or are you giving a hacker a chance to capture your code with every click? In the Season Two premiere of Hackable? the crew is on the case.</itunes:subtitle>
      <itunes:keywords>mcafee, car hacking, hackable?, cyber security, geoff siskind, hacking, security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>2</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">6c78ef78-b01b-497a-a2f9-9e08a71a7f39</guid>
      <title>All Dolled Up</title>
      <description><![CDATA[<p>Tech toys are always the hottest gifts during the holidays. But what if something as innocent looking as an Internet-connected stuffed animal could be used as a listening device? And how easy would it be for someone to do? In this episode of Hackable? we’re looking at two different toys to see if their security is up to snuff. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 5 Dec 2017 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/all-dolled-up</link>
      <content:encoded><![CDATA[<p>Tech toys are always the hottest gifts during the holidays. But what if something as innocent looking as an Internet-connected stuffed animal could be used as a listening device? And how easy would it be for someone to do? In this episode of Hackable? we’re looking at two different toys to see if their security is up to snuff. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="30391572" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/e5f80016-e07e-4c7e-a052-c5a7022752c9/c5fa2d75_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>All Dolled Up</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/e5f80016-e07e-4c7e-a052-c5a7022752c9/3000x3000/1519863117artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:21</itunes:duration>
      <itunes:summary>Tech toys are always the hottest gifts during the holidays. But what if something as innocent looking as an Internet-connected stuffed animal could be used as a listening device? And how easy would it be for someone to do? In this episode of Hackable? we’re looking at two different toys to see if their security is up to snuff. </itunes:summary>
      <itunes:subtitle>Tech toys are always the hottest gifts during the holidays. But what if something as innocent looking as an Internet-connected stuffed animal could be used as a listening device? And how easy would it be for someone to do? In this episode of Hackable? we’re looking at two different toys to see if their security is up to snuff. </itunes:subtitle>
      <itunes:keywords>mcafee, iot, hackable?, toys, cyber security, geoff siskind, holidays, hacking, christmas</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">1597ebdf-ab5f-47fd-a189-6fe00d637834</guid>
      <title>High Frequency</title>
      <description><![CDATA[<p>Smart speakers, just shout out a command and these digital assistants take action. But would it be possible for a hacker to communicate with your device without you knowing? And if so, what could they do? This episode looks at all the different ways a smart speaker can be attacked, from the low tech to the Hi-Fi. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 21 Nov 2017 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/high-frequency</link>
      <content:encoded><![CDATA[<p>Smart speakers, just shout out a command and these digital assistants take action. But would it be possible for a hacker to communicate with your device without you knowing? And if so, what could they do? This episode looks at all the different ways a smart speaker can be attacked, from the low tech to the Hi-Fi. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="28408740" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1f170ab3-ea83-4240-aed9-563bea310c7d/2377fae1_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>High Frequency</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/1f170ab3-ea83-4240-aed9-563bea310c7d/3000x3000/1519863050artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:21</itunes:duration>
      <itunes:summary>Smart speakers, just shout out a command and these digital assistants take action. But would it be possible for a hacker to communicate with your device without you knowing? And if so, what could they do? This episode looks at all the different ways a smart speaker can be attacked, from the low tech to the Hi-Fi. </itunes:summary>
      <itunes:subtitle>Smart speakers, just shout out a command and these digital assistants take action. But would it be possible for a hacker to communicate with your device without you knowing? And if so, what could they do? This episode looks at all the different ways a smart speaker can be attacked, from the low tech to the Hi-Fi. </itunes:subtitle>
      <itunes:keywords>mcafee, digital assistant, smart speaker, cyber security, hackable? geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">dc92808a-7d94-4de8-b127-09dfa882f6f4</guid>
      <title>Cloak &amp; Dagger</title>
      <description><![CDATA[<p>We all love the fact that we’re able use our cellphones to access the internet from practically anywhere. But a lot of times we don’t take the security on these devices seriously, despite them being filled with personal information. In this episode, Geoff and team find out just how easy it is for a hacker to attack our mobile devices. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 7 Nov 2017 05:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/cloak-and-dagger</link>
      <content:encoded><![CDATA[<p>We all love the fact that we’re able use our cellphones to access the internet from practically anywhere. But a lot of times we don’t take the security on these devices seriously, despite them being filled with personal information. In this episode, Geoff and team find out just how easy it is for a hacker to attack our mobile devices. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="27494427" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/5f767470-09ac-491d-9362-63f1c046e862/7e7e3d23_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Cloak &amp; Dagger</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/5f767470-09ac-491d-9362-63f1c046e862/3000x3000/1519863006artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:27</itunes:duration>
      <itunes:summary>We all love the fact that we’re able use our cellphones to access the internet from practically anywhere. But a lot of times we don’t take the security on these devices seriously, despite them being filled with personal information. In this episode, Geoff and team find out just how easy it is for a hacker to attack our mobile devices.</itunes:summary>
      <itunes:subtitle>We all love the fact that we’re able use our cellphones to access the internet from practically anywhere. But a lot of times we don’t take the security on these devices seriously, despite them being filled with personal information. In this episode, Geoff and team find out just how easy it is for a hacker to attack our mobile devices.</itunes:subtitle>
      <itunes:keywords>mcafee, cyber security, hackable? geoff siskind, cellphones, mobile phone, hacking, cell</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">ed799b26-6b71-41c9-a0c8-6eaf06d579cb</guid>
      <title>Searching for Avril</title>
      <description><![CDATA[<p>Pre-released tracks, sneak-peek videos, never-before-seen pictures – hackers are using our love for celebrities as a way of stealing personal data. But not in the way you might think. In this episode, Geoff and team examine the dangers you could find while searching for your favorite celeb’s unreleased music. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 24 Oct 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/searching-for-avril</link>
      <content:encoded><![CDATA[<p>Pre-released tracks, sneak-peek videos, never-before-seen pictures – hackers are using our love for celebrities as a way of stealing personal data. But not in the way you might think. In this episode, Geoff and team examine the dangers you could find while searching for your favorite celeb’s unreleased music. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="26041962" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/ce47abe6-99d6-4fae-8d1f-5632383ce66f/af1574d3_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Searching for Avril</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/ce47abe6-99d6-4fae-8d1f-5632383ce66f/3000x3000/1519862978artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:51</itunes:duration>
      <itunes:summary>Pre-released tracks, sneak-peek videos, never-before-seen pictures – hackers are using our love for celebrities as a way of stealing personal data. But not in the way you might think. In this episode, Geoff and team examine the dangers you could find while searching for your favorite celeb’s unreleased music.</itunes:summary>
      <itunes:subtitle>Pre-released tracks, sneak-peek videos, never-before-seen pictures – hackers are using our love for celebrities as a way of stealing personal data. But not in the way you might think. In this episode, Geoff and team examine the dangers you could find while searching for your favorite celeb’s unreleased music.</itunes:subtitle>
      <itunes:keywords>avril lavigne, hackable?, cyber security, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">78da2929-a410-40cf-97f0-ddd974eab135</guid>
      <title>Cowbells &amp; Doorbells</title>
      <description><![CDATA[<p>With so many connected devices popping up, we have to wonder: Is the security strong enough to hold off an cyber attack? In this episode of Hackable?, Geoff invites a hacker into his home to help install, and of course hack, his new smart doorbell. We'll see if the device holds strong when there's a hacker at the door. <em>Ding dong</em>. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 10 Oct 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/cowbells-doorbells</link>
      <content:encoded><![CDATA[<p>With so many connected devices popping up, we have to wonder: Is the security strong enough to hold off an cyber attack? In this episode of Hackable?, Geoff invites a hacker into his home to help install, and of course hack, his new smart doorbell. We'll see if the device holds strong when there's a hacker at the door. <em>Ding dong</em>. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="28515604" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/2e9a9882-e435-4919-8845-2d7a1169b057/ec7eca47_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Cowbells &amp; Doorbells</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/2e9a9882-e435-4919-8845-2d7a1169b057/3000x3000/1519862953artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:26</itunes:duration>
      <itunes:summary>With so many connected devices popping up, we have to wonder: Is the security strong enough to hold off an cyber attack? In this episode of Hackable?, Geoff invites a hacker into his home to help install, and of course hack, his new smart doorbell. We&apos;ll see if the device holds strong when there&apos;s a hacker at the door. *Ding dong* </itunes:summary>
      <itunes:subtitle>With so many connected devices popping up, we have to wonder: Is the security strong enough to hold off an cyber attack? In this episode of Hackable?, Geoff invites a hacker into his home to help install, and of course hack, his new smart doorbell. We&apos;ll see if the device holds strong when there&apos;s a hacker at the door. *Ding dong* </itunes:subtitle>
      <itunes:keywords>mcafee, doorbells, cyber security, hackable? geoff siskind, hacking, cows</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">2068bdc4-9784-4123-ad8f-c95c8d6b9bea</guid>
      <title>Camera Creepers</title>
      <description><![CDATA[<p>Just the thought of someone accessing your webcam without your knowledge is unsettling. But is putting a sticker over your webcam paranoia, or precaution? In this episode of Hackable?, our trusted hacker shows us just how simple it really is to gain access to your computer's camera. We're uncovering the truth about covering your webcam. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 26 Sep 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/camera-creepers</link>
      <content:encoded><![CDATA[<p>Just the thought of someone accessing your webcam without your knowledge is unsettling. But is putting a sticker over your webcam paranoia, or precaution? In this episode of Hackable?, our trusted hacker shows us just how simple it really is to gain access to your computer's camera. We're uncovering the truth about covering your webcam. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="24211430" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/4d68e019-efee-4a00-964f-48bd4bb044c6/d3ad0579_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Camera Creepers</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/4d68e019-efee-4a00-964f-48bd4bb044c6/3000x3000/1519862927artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:57</itunes:duration>
      <itunes:summary>Just the thought of someone accessing your webcam without your knowledge is unsettling. But is putting a sticker over your webcam paranoia, or precaution? In this episode of Hackable?, our trusted hacker shows us just how simple it really is to gain access to your computer&apos;s camera. We&apos;re uncovering the truth about covering your webcam.</itunes:summary>
      <itunes:subtitle>Just the thought of someone accessing your webcam without your knowledge is unsettling. But is putting a sticker over your webcam paranoia, or precaution? In this episode of Hackable?, our trusted hacker shows us just how simple it really is to gain access to your computer&apos;s camera. We&apos;re uncovering the truth about covering your webcam.</itunes:subtitle>
      <itunes:keywords>mcafee, camera, hackable?, cyber security, web cam hack, hacking, internet</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">1e32d19b-d04d-4b5b-8e2e-3ed7dbf93bb2</guid>
      <title>Cars are Computers</title>
      <description><![CDATA[<p>Carjacking just went digital. You might be holding the steering wheel, but are you in control? Hackers today could easily take over an automobile – and we can prove it. In this episode, we hand over our rental car to a hacker to find see what's possible when it comes to car hacking. We also speak with the man behind the voice of KITT from Knight Rider, <a href="https://twitter.com/MrBillDaniels">William Daniels</a>, to get his input on the world of self-driving cars! Listen now to see how hackers can take over a car, and how to stay in control of yours. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 12 Sep 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/cars-are-computers</link>
      <content:encoded><![CDATA[<p>Carjacking just went digital. You might be holding the steering wheel, but are you in control? Hackers today could easily take over an automobile – and we can prove it. In this episode, we hand over our rental car to a hacker to find see what's possible when it comes to car hacking. We also speak with the man behind the voice of KITT from Knight Rider, <a href="https://twitter.com/MrBillDaniels">William Daniels</a>, to get his input on the world of self-driving cars! Listen now to see how hackers can take over a car, and how to stay in control of yours. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="25895344" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/7c955de9-ae50-4a93-9261-47e1595f3d27/af915b68_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Cars are Computers</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/7c955de9-ae50-4a93-9261-47e1595f3d27/3000x3000/1519862903artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:38</itunes:duration>
      <itunes:summary>Carjacking just went digital. You might be holding the steering wheel, but are you in control? Hackers today could easily take over an automobile – and we can prove it. In this episode, we hand over our rental car to a hacker to find see what&apos;s possible when it comes to car hacking. We also speak with the man behind the voice of KITT from Knight Rider, William Daniels, to get his input on the world of self-driving cars! Listen now to see how hackers can take over a car, and how to stay in control of yours.</itunes:summary>
      <itunes:subtitle>Carjacking just went digital. You might be holding the steering wheel, but are you in control? Hackers today could easily take over an automobile – and we can prove it. In this episode, we hand over our rental car to a hacker to find see what&apos;s possible when it comes to car hacking. We also speak with the man behind the voice of KITT from Knight Rider, William Daniels, to get his input on the world of self-driving cars! Listen now to see how hackers can take over a car, and how to stay in control of yours.</itunes:subtitle>
      <itunes:keywords>mcafee, william daniels, car hacking, bruce snell, cyber security, knight rider, geoff siskind, computer</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">6a9b1668-ffbe-46e7-bc06-2fc2b9760270</guid>
      <title>Locked Out</title>
      <description><![CDATA[<p>Ransomware is a billion-dollar business. But what happens when your data is under lockdown, all your icons are missing, years of photos are gone, and your computer left as a digital wasteland with nothing on it? Well, nothing but a digital ransom note saying that if you want your data back, you’re going to have to pay. In this episode, our host <a href="https://twitter.com/Geoffsiskind">Geoff Siskind</a> lets a hacker take his personal laptop hostage. Listen as Geoff uncovers the truth about Ransomware when he's Locked Out.</p>
]]></description>
      <pubDate>Tue, 29 Aug 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/locked-out</link>
      <content:encoded><![CDATA[<p>Ransomware is a billion-dollar business. But what happens when your data is under lockdown, all your icons are missing, years of photos are gone, and your computer left as a digital wasteland with nothing on it? Well, nothing but a digital ransom note saying that if you want your data back, you’re going to have to pay. In this episode, our host <a href="https://twitter.com/Geoffsiskind">Geoff Siskind</a> lets a hacker take his personal laptop hostage. Listen as Geoff uncovers the truth about Ransomware when he's Locked Out.</p>
]]></content:encoded>
      <enclosure length="24616451" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/14cada7d-6637-4da5-a07f-a22686bc461d/9fb5e749_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>Locked Out</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/14cada7d-6637-4da5-a07f-a22686bc461d/3000x3000/1519862877artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:22</itunes:duration>
      <itunes:summary>Ransomware is a billion-dollar business. But what happens when your data is under lockdown, all your icons are missing, years of photos are gone, and your computer left as a digital wasteland with nothing on it? Well, nothing but a digital ransom note saying that if you want your data back, you’re going to have to pay. In this episode, our host Geoff Siskind lets a hacker take his personal laptop hostage. Listen as Geoff uncovers the truth about Ransomware when he&apos;s Locked Out.</itunes:summary>
      <itunes:subtitle>Ransomware is a billion-dollar business. But what happens when your data is under lockdown, all your icons are missing, years of photos are gone, and your computer left as a digital wasteland with nothing on it? Well, nothing but a digital ransom note saying that if you want your data back, you’re going to have to pay. In this episode, our host Geoff Siskind lets a hacker take his personal laptop hostage. Listen as Geoff uncovers the truth about Ransomware when he&apos;s Locked Out.</itunes:subtitle>
      <itunes:keywords>mcafee, cyber security, geoff siskind, computer, ransomwear</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">5d80aa3c-914d-4483-9ed4-80ad9d2c7a56</guid>
      <title>PWND</title>
      <description><![CDATA[<p>How much can people find out about you from a simple Google search? It’s probably way more than you think, even if you’re being cautious. Our host <a href="https://twitter.com/Geoffsiskind">Geoff Siskind</a> learned that the hard way. We gave our friendly hackers 5 days to hack into his life and uncover as much information as possible...and potentially crack into his computer and Wi-Fi network. Listen to find out what our hackers were able to accomplish. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></description>
      <pubDate>Tue, 15 Aug 2017 04:01:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/pwned</link>
      <content:encoded><![CDATA[<p>How much can people find out about you from a simple Google search? It’s probably way more than you think, even if you’re being cautious. Our host <a href="https://twitter.com/Geoffsiskind">Geoff Siskind</a> learned that the hard way. We gave our friendly hackers 5 days to hack into his life and uncover as much information as possible...and potentially crack into his computer and Wi-Fi network. Listen to find out what our hackers were able to accomplish. For more info <a href="https://hackablepodcast.com/#/">hackablepodcast.com</a></p>
]]></content:encoded>
      <enclosure length="28526787" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/717db2cd-1bfd-4d26-aba7-a53591d1a010/a777ab5a_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>PWND</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/717db2cd-1bfd-4d26-aba7-a53591d1a010/3000x3000/1519862849artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:22</itunes:duration>
      <itunes:summary>How much can people find out about you from a simple Google search? It’s probably way more than you think, even if you’re being cautious. Our host Geoff Siskind learned that the hard way. We gave our friendly hackers 5 days to hack into his life and uncover as much information as possible...and potentially crack into his computer and Wi-Fi network. Listen to find out what our hackers were able to accomplish.</itunes:summary>
      <itunes:subtitle>How much can people find out about you from a simple Google search? It’s probably way more than you think, even if you’re being cautious. Our host Geoff Siskind learned that the hard way. We gave our friendly hackers 5 days to hack into his life and uncover as much information as possible...and potentially crack into his computer and Wi-Fi network. Listen to find out what our hackers were able to accomplish.</itunes:subtitle>
      <itunes:keywords>mcafee, pwnd, cyber security, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">ca863155-77ba-4711-ae04-75a255263654</guid>
      <title>The Evil Twin</title>
      <description><![CDATA[<p>Think all public Wi-Fi networks are safe? Think again. In our first episode, we hack the Wi-Fi at a local café by creating an “Evil Twin” to prove just how easy it is to give away all of your information without ever knowing it. Find out what our cyber security expert, <a href="https://twitter.com/brucesnell">Bruce Snell</a>, was able to uncover as unsuspecting guests connect to an unsecure Wi-Fi network at a coffee shop in Texas.</p>
]]></description>
      <pubDate>Tue, 1 Aug 2017 17:37:00 +0000</pubDate>
      <author>info@pacific-content.com (McAfee)</author>
      <link>https://hackablepodcast.com/episodes/the-evil-twin</link>
      <content:encoded><![CDATA[<p>Think all public Wi-Fi networks are safe? Think again. In our first episode, we hack the Wi-Fi at a local café by creating an “Evil Twin” to prove just how easy it is to give away all of your information without ever knowing it. Find out what our cyber security expert, <a href="https://twitter.com/brucesnell">Bruce Snell</a>, was able to uncover as unsuspecting guests connect to an unsecure Wi-Fi network at a coffee shop in Texas.</p>
]]></content:encoded>
      <enclosure length="24256059" type="audio/mpeg" url="https://chtbl.com/track/D97G4/dts.podtrac.com/redirect.mp3/cdn.simplecast.com/audio/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/35b82c73-bc0b-4cb8-9057-391525dfd352/3e26156d_tc.mp3?aid=rss_feed&amp;feed=7zOHZH9E"/>
      <itunes:title>The Evil Twin</itunes:title>
      <itunes:author>McAfee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/c00f1d/c00f1d71-f03c-40e0-8101-ecdc9d01c2a6/35b82c73-bc0b-4cb8-9057-391525dfd352/3000x3000/1519862789artwork.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:04</itunes:duration>
      <itunes:summary>Think all public Wi-Fi networks are safe? Think again. In our first episode, we hack the Wi-Fi at a local café by creating an “Evil Twin” to prove just how easy it is to give away all of your information without ever knowing it. Find out what our cyber security expert, Bruce Snell, was able to uncover as unsuspecting guests connect to an unsecure Wi-Fi network at a coffee shop in Texas.</itunes:summary>
      <itunes:subtitle>Think all public Wi-Fi networks are safe? Think again. In our first episode, we hack the Wi-Fi at a local café by creating an “Evil Twin” to prove just how easy it is to give away all of your information without ever knowing it. Find out what our cyber security expert, Bruce Snell, was able to uncover as unsuspecting guests connect to an unsecure Wi-Fi network at a coffee shop in Texas.</itunes:subtitle>
      <itunes:keywords>mcafee, hackable, cyber security, wi-fi, geoff siskind, hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
  </channel>
</rss>