{"id":64399,"date":"2015-11-23T13:59:08","date_gmt":"2015-11-23T21:59:08","guid":{"rendered":"http:\/\/www.csifiles.com\/content\/?p=64399"},"modified":"2024-06-25T13:43:10","modified_gmt":"2024-06-25T20:43:10","slug":"csicyber-ratings-links-promo-are-available-3","status":"publish","type":"post","link":"https:\/\/www.csifiles.com\/content\/2015\/11\/csicyber-ratings-links-promo-are-available-3\/","title":{"rendered":"&#8216;CSI:Cyber&#8217; Ratings, Links &#038; Promo Are Available"},"content":{"rendered":"<p><I>CSI: Cyber<\/i> aired the eighth episode of season two last night. <a href=\"http:\/\/www.csifiles.com\/content\/2015\/11\/python-official-details-plus-whats-on-this-week\/\" target=\"_blank\" rel=\"noopener\">&#8220;Python&#8221;<\/a> <a href=\"http:\/\/tvbythenumbers.zap2it.com\/2015\/11\/23\/tv-ratings-sunday-nov-22-2015\/\" target=\"_blank\" rel=\"noopener\">pulled in<\/a> 6.23 million viewers and a 0.9 rating\/3 share in the key 18-49 demographic prized by advertisers (please note these numbers are subject to change, due to a seven-minute <a href=\"http:\/\/www.csifiles.com\/content\/2015\/11\/csicyber-delayed-7-minutes-for-some-etct-viewers\/\" target=\"_blank\" rel=\"noopener\">delay<\/a> in some ET\/CT areas). If you missed the episode, or would like to watch it again, you can find it on <a href=\"http:\/\/www.cbs.com\/shows\/csi-cyber\/video\/8FCA3CF2-9385-714A-91D1-23FCD222BB73\/csi-cyber-python\/\" target=\"_blank\" rel=\"noopener\">CBS.com<\/a> or <a href=\"http:\/\/tvgo.xfinity.com\/watch\/CSI%3A-Cyber\/4775856784199613112\/572344899852\/CSI%3A-Cyber---Python\/videos\" target=\"_blank\" rel=\"noopener\">XFinity TV<\/a>. (<a href=\"http:\/\/www.ctv.ca\/CSICyber\/video.aspx\" target=\"_blank\" rel=\"noopener\">CTV<\/a> will air the episode on Tuesday, and it will be available at the link on Wednesday.)<\/p>\n<p>\nNext, check out an LQ promo for this Sunday&#8217;s new episode:<\/p>\n<p>\n<center><iframe width=\"420\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/6Bb1YDmjFC4?rel=0\" frameborder=\"0\" allowfullscreen><\/iframe><\/center><\/p>\n<p>\nHere&#8217;s &#8220;The Takeaway&#8221; with producer and real-life cyberpsychologist <b>Mary Aiken<\/b>:<\/p>\n<p>\n<center><iframe width=\"420\" height=\"236\" src=\"https:\/\/www.youtube.com\/embed\/72zs1AaERT0?rel=0\" frameborder=\"0\" allowfullscreen><\/iframe><\/center><\/p>\n<p>\nFinally, check out these tweets and photos:<\/p>\n<p>\n<center><\/p>\n<blockquote class=\"twitter-tweet\" data-cards=\"hidden\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Hacker <a href=\"https:\/\/twitter.com\/kevinmitnick\">@kevinmitnick<\/a> explains how fiber optic cables can be tapped to steal your data &#8212; <a href=\"https:\/\/twitter.com\/securityaffairs\">@securityaffairs<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/csicyber?src=hash\">#csicyber<\/a> <a href=\"https:\/\/t.co\/SXFFHZbjMX\">https:\/\/t.co\/SXFFHZbjMX<\/a><\/p>\n<p>&mdash; CSI Cyber Writers (@CSICyberWriters) <a href=\"https:\/\/twitter.com\/CSICyberWriters\/status\/668628113538945024\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-cards=\"hidden\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Want more about the biggest deep web \u201cfullz\u201d gang? Check out this article by <a href=\"https:\/\/twitter.com\/josephfcox\">@josephfcox<\/a> &#8212; <a href=\"https:\/\/twitter.com\/motherboard\">@motherboard<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/csicyber?src=hash\">#csicyber<\/a> <a href=\"https:\/\/t.co\/8p1OkZfG8S\">https:\/\/t.co\/8p1OkZfG8S<\/a><\/p>\n<p>&mdash; CSI Cyber Writers (@CSICyberWriters) <a href=\"https:\/\/twitter.com\/CSICyberWriters\/status\/668629575203581954\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-cards=\"hidden\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Hacker <a href=\"https:\/\/twitter.com\/_Kustodian_\">@_Kustodian_<\/a> explains how criminals use shelf-babies as burner identities &#8211; <a href=\"https:\/\/twitter.com\/SecurityIsSexy\">@SecurityIsSexy<\/a> <a href=\"https:\/\/twitter.com\/Computerworld\">@Computerworld<\/a> <a href=\"https:\/\/t.co\/GGJHzv7KWX\">https:\/\/t.co\/GGJHzv7KWX<\/a><\/p>\n<p>&mdash; CSI Cyber Writers (@CSICyberWriters) <a href=\"https:\/\/twitter.com\/CSICyberWriters\/status\/668633244074553348\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-cards=\"hidden\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Hackers <a href=\"https:\/\/twitter.com\/runasand\">@runasand<\/a> and <a href=\"https:\/\/twitter.com\/hashtag\/MichaelAuger?src=hash\">#MichaelAuger<\/a> talk remote controlled sniper rifles. <a href=\"https:\/\/twitter.com\/hashtag\/csicyber?src=hash\">#csicyber<\/a> <a href=\"https:\/\/twitter.com\/a_greenberg\">@a_greenberg<\/a> <a href=\"https:\/\/twitter.com\/WIRED\">@WIRED<\/a> <a href=\"https:\/\/t.co\/Y8vZ72JKjZ\">https:\/\/t.co\/Y8vZ72JKjZ<\/a><\/p>\n<p>&mdash; CSI Cyber Writers (@CSICyberWriters) <a href=\"https:\/\/twitter.com\/CSICyberWriters\/status\/668635718067945477\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">I could listen to <a href=\"https:\/\/twitter.com\/D_Morgado\">@D_Morgado<\/a> speak French all day <a href=\"https:\/\/twitter.com\/hashtag\/CSICyber?src=hash\">#CSICyber<\/a><\/p>\n<p>&mdash; Kate (@LilAngelK8) <a href=\"https:\/\/twitter.com\/LilAngelK8\/status\/668676678286049280\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Love the &quot;shelf baby&quot; concept &#8211; it&#39;s a new way hackers are creating false identities to commit crimes <a href=\"https:\/\/twitter.com\/hashtag\/CSICyber?src=hash\">#CSICyber<\/a><\/p>\n<p>&mdash; Kate (@LilAngelK8) <a href=\"https:\/\/twitter.com\/LilAngelK8\/status\/668677108214861825\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">We found Python&#39;s Achilles heel. His mother. Once a mama&#39;s boy, always a mama&#39;s boy <a href=\"https:\/\/twitter.com\/hashtag\/CSICyber?src=hash\">#CSICyber<\/a><\/p>\n<p>&mdash; Kate (@LilAngelK8) <a href=\"https:\/\/twitter.com\/LilAngelK8\/status\/668682394522652672\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Thank you so much for all the comments &amp; wonderful support on my last night&#39;s debut on <a href=\"https:\/\/twitter.com\/CSICyber\">@csicyber<\/a> <a href=\"https:\/\/t.co\/SPj0s6dAly\">pic.twitter.com\/SPj0s6dAly<\/a><\/p>\n<p>&mdash; Diogo Morgado (@D_Morgado) <a href=\"https:\/\/twitter.com\/D_Morgado\/status\/668826566097440770\">November 23, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSI: Cyber aired the eighth episode of season two last night. &#8220;Python&#8221; pulled in 6.23&#8230;<\/p>\n","protected":false},"author":6,"featured_media":64400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3470],"tags":[3467,2990,2962,3542,2954],"class_list":["post-64399","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-csi-cyber","tag-aiken","tag-guest-stars","tag-ratings","tag-sargeant","tag-video"],"featured_image_urls":{"full":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",900,350,false],"thumbnail":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python-150x150.jpg",150,150,true],"medium":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",300,117,false],"medium_large":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",640,249,false],"large":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",640,249,false],"1536x1536":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",900,350,false],"2048x2048":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",900,350,false],"newsphere-slider-full":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",900,350,false],"newsphere-featured":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",900,350,false],"newsphere-medium":["https:\/\/www.csifiles.com\/content\/wp-content\/uploads\/2015\/11\/python.jpg",720,280,false]},"author_info":{"display_name":"Rachel","author_link":"https:\/\/www.csifiles.com\/content\/author\/rachel\/"},"category_info":"<a href=\"https:\/\/www.csifiles.com\/content\/categories\/csi-cyber\/\" rel=\"category tag\">CSI: Cyber<\/a>","tag_info":"CSI: Cyber","comment_count":"0","_links":{"self":[{"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/posts\/64399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/comments?post=64399"}],"version-history":[{"count":3,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/posts\/64399\/revisions"}],"predecessor-version":[{"id":66928,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/posts\/64399\/revisions\/66928"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/media\/64400"}],"wp:attachment":[{"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/media?parent=64399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/categories?post=64399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.csifiles.com\/content\/wp-json\/wp\/v2\/tags?post=64399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}