British newspaper The Daily Mail has published an article on its website, designed to petrify millions of customers of Barclays Bank.

The headline breathlessly reads:
“Has Barclays given millions of customers ‘anti-virus software’ that’s actually SPYING on them for the Russian government?”
Make a note. Whenever you see the Daily Mail publish a headline which asks a question, the correct answer is invariably “no”. If they had any reason to believe it was “yes”, then they wouldn’t have posed it as a question.
The truth is that newspapers post these “Is the Loch Ness Monster on Tinder?”-style headlines because they know they’ll get more clicks than if they use a headline which reflects the actual conclusion of the article.
As we’ll see when we dig into this article, the story just doesn’t stand up.
Security chiefs are concerned that free anti-virus software handed out by Barclays is spying on customers for the Russian government.
GCHQ officials have been concerned about the Kaspersky Lab, which is led by a former Soviet military intelligence expert and supplied the bank with the software, amid fears it may have been influenced by Vladimir Putin’s Federal Security Service.
There are now fears that any Barclays customers who are in high-security jobs are at risk of having their personal files hacked.
From the above preamble to the article you imagine that you’ll find some juicy background on how worried GCHQ is about Kaspersky, or some anonymous sources within Barclays confiding their concerns to the Daily Mail.
But instead you get this…
However, both Barclays and GCHQ have confirmed that neither organisation has been in contact with the other about any potential breaches.
A spokesman for the relevant arm of GCHQ, the NCSC, told the Financial Times: “The NCSC has never advised Barclays against the use of Kaspersky products. Any suggestion to the contrary is categorically untrue. The NCSC is not a regulator and does not mandate or ban any products. Our certification schemes do not currently cover anti-virus or anti-malware services.”
A Barclays spokesman corroborated this, adding: “We have never received any advice or guidance from GCHQ or the National Cyber Security Centre in relation to Kaspersky.”
And that’s it, aside from a standard statement from Kaspersky denying any wrongdoing.
The Daily Mail‘s frankly pointless article, and utterly misleading headline, come amid real problems for Kaspersky in the United States – where it is finding itself controversially attacked by competitors and struggling to keep contracts after private briefings from the FBI.
You can hear more about the pickle Kaspersky has found itself in, in this edition of the Smashing Security podcast.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Download a demo from netsparker.com/smashing. On with the show.
Hello, hello, and welcome to another episode of Smashing Security, episode 47, for the 12th of October 2017.
My name is Graham Cluley, and I'm joined as always by my good chum and co-host Carole Theriault. Hello, Carole! Hello! How are you doing?
All right, and we'll find out because—well, no, because let's introduce the other chap, the guest on the podcast today.
Returning to the show is broadcaster extraordinaire David McClelland. Hello, David. How are you?
You know, there's an old saying in information security that you play the Smashing Security podcast twice in your career, once on the way up and once on the way down.
It's good to be back, everyone. Good to be back.
And you know, LinkedIn's a very different sort of social network.
But anyway, I got a lot of personal happy birthday things through LinkedIn, and somebody, David Wright— hello, David Wright, if you're listening— he did say, "Oh, brilliant.
Now there's another way to crack some of your accounts." High five, David.
To which my retort was, well, frankly, most of the companies are giving away our data anyway, leaving their back doors open, so there's no blooming point in keeping it secure.
Oh, oh, Carole, I think— yes.
What was really exciting for me was one of the other speakers was none other than Garry Kasparov.
World champion for many years, and he's currently an ambassador for a vast antivirus company. So he was out there giving a talk about artificial intelligence or something like that.
So I saw that I was speaking— obviously, I knew I was speaking at this conference, right? But I also saw that Garry was speaking at it.
And so I cheekily tweeted him, right, saying, I see Garry Kasparov is also speaking at IP Expo. Who thinks I'll have the bottle to ask him to come on the show?
And I've got this in my little satchel. And so I say to him, Garry, Garry, remember the tweet from last night? I've got you some vodka.
And he looks at me and says, oh, I don't drink actually.
I'm sure many of our listeners, most of our listeners are in America. And I guess you guys out there are going into your local sort of Office Depot. Do they say Depot? Depot?
Due to the recent news over Kaspersky Total Security software, we are providing free in-store software removal.
We have a 1-year license, and we'll do a virus scan of your PC to make sure there's nothing nasty on it. Ow! Ouch! Right?
And this has been going around for I don't know, maybe a year or two now, these accusations. And there's been a lot of heat in America in particular.
And the most recent claim has come from the Wall Street Journal, which has claimed that usage of Kaspersky software actually helped state-sponsored hackers steal NSA files from an NSA contractor's PC.
What? Right. So they're saying that there was a contractor. Took files home with him. Oh, a bit naughty.
And surprise, surprise, Kaspersky— and it could have been any other antivirus, presumably— has detected it, has sent it up into the cloud for detailed analysis.
And the claim which has come out from America is that this then fell into Russian Kremlin hands.
You shouldn't use this in government organizations. You shouldn't be using this now on your home computers as well.
There's no evidence presented as such, but there is this steady drumbeat coming out of America that Kaspersky is trouble.
And of course, it's very hard to defend yourself if there's no definitive reports.
So if you look at this from the other way around, which I think is always worth doing, look at it from the American intelligence services' point of view.
From their point of view, there's a lot less risk banning one Russian antivirus company if there's the smallest chance that their software has been compromised.
Or they're working in league with Russian intelligence.
Their view is, why are you running that piece of software on all these mission-critical computers with the potential to take files and upload them to their cloud for analysis?
But mind you, are they feeling the same about Chinese hardware and Chinese tech, right? Even Chinese antivirus companies?
This story, like you say, it's already escalating.
But when we see Eugene Kaspersky, and he's a larger than life character, when we see him in Congress directly batting away or trying to bat away these questions, I think that's going to be as close as this kind of cybersecurity comes to mainstream media.
And I personally can't wait to watch it. I'll be getting the popcorn out.
We know Eugene, you know, and we know the people that work there. There's a lot of smart people. And, you know, to kind of suddenly see this feels really odd.
You know, sure, it could be true, but it could also be not true. And it's really hard to—
It's a good media answer because it sounds like they're being entirely open.
But the way antivirus software actually works, it's very easy to include a new definition with new instructions.
So even if you've seen the source code, it's still possible to send new commands to the software to act in different ways and maybe to identify a file of a particular type and upload it.
So I can see both points of view here, but I have to say, I feel very sorry for Kaspersky because they're really being screwed over now in the American marketplace.
And what I actually find quite distasteful is how some of the other security companies are responding to this.
McAfee has been running little landing pages on its website which say FBI advises removal of Kaspersky for suspected ties to Russian spies, and trust us because we are, we're the true American antivirus company.
And it's not good for the industry, this kind of thing.
I would love to see more solidarity, because it would be, of course, commercial suicide for Kaspersky, which is a very successful Russian company.
If they were ever involved in something like this, it would be utterly disastrous for them. But it feels to me like the disaster is beginning to happen to them.
But it feels like now we're all beginning to turn on each other, and the security companies are beginning to sort of take potshots at each other to try and carve up this market.
And that's not a good thing. Kaspersky himself says he's caught up in the middle of a geopolitical fight between Russia and the United States.
Anyway, I'm sure there'll be more to come on this. And like you, David, I'm interested to see if Eugene does get his moment in the spotlight and gets to testify in America.
This is the news that Disqus, the popular online commenting platform as used by lots of news websites and blogs and communities and so on.
You know, we've got OK Magazine, Bloomberg, CNN have all used it in the past. Anyway, it has suffered a data breach. I know, another day, another data breach. Yeah, yeah, yeah.
This one happened in 2012, which by my reckoning— I don't know what you think— but 2012 was a bit of a purple patch for hackers.
There seemed to be a lot of data breaches reported now that happened back in 2012.
And it looks as though it's a snapshot of the user database, whether it was a backup snapshot, I don't know.
But look, the thing is, I mean, in one sense, I don't know if this is actually news anymore because, you know, this is happening every single day, and it probably is news for the 17.5 million Disqus users.
Yeah, I mean, 17.5 million, about a third of those, 6.5 million or so, had their weekly passwords made it out as well. But that's absolutely small fry in comparison to Yahoo.
Let's face it, which last week revealed that each and every one of its 3 billion user accounts was left completely wide open, which I work out as assuming everyone's got one account, that's about 40% of the world's population or pretty much everybody on the internet.
That's still huge just because we have this ginormous mountain now that's called Yahoo.
So week after week, particularly here on Smashing Security, you've covered how firms should not handle a data disaster. I mean, obviously we've had Deloitte recently.
AA, the AA earlier this summer. Goodness me, what a mess. What a mess that was.
But with Disqus, within 45 minutes of receiving notification of the breach, which was late on a Thursday afternoon, within 45 minutes they said they were analyzing the data to confirm its veracity because not all breach notifications are genuine as we know.
And then by the following day, they've started to contact users, reset affected passwords, and still within 24 hours of the initial notification they'd gone public to disclose the instance.
Now, anyone would think that Disqus had done their homework. They had a runbook and a well-rehearsed disaster plan. I know that's crazy thinking.
So my question to you is, have we just witnessed a model of mishap management in action? Have they done it properly? Disqus.
They were incredibly quick and they've also been extremely transparent. They've explained what information has been taken, how much information.
They've described the hashing algorithm, which isn't ideal, but it appears that shortly after this incident, I think in the same year, they upgraded their security and improved their encryption to make it even stronger in future.
And the other thing which impressed me is that if you go to Disqus's website, there you will see it right on the top of the page, says there's been a security incident, find out more here.
I saw a report in The Register where they — I don't know if you saw this as well, David and Carole, but there was a report where they were sort of saying, oh, here we go again.
Late on Friday, a company reporting a breach. And I thought, you know what?
It probably didn't attract as much attention as other hacks where they've tried to hide it and it dribbles out over days and days and days. Did they apologize publicly?
Isn't that great? That's how you build trust. That's how you build a good community and get people trusting you more in future. I mean, obviously no one would want a breach to happen.
And when they were notified that this chunk of data that looks suspicious has become available to them, they literally flicked the switch on that plan.
And it meant that they weren't running around like headless chickens wondering what to do and phoning up PRs and disaster agencies at whatever time.
They knew exactly what they needed to do and they executed on it. More data breaches like that, please. Data breaches are gonna happen, we know that.
So more of them like this, please.
We don't know what kind of breach we may have. But at the same time, what they've done is pretty basic, right?
They've apologised, they're informing the public, they're telling them what to do right away, and they're doing it publicly and loudly on the front page.
And I think everyone can follow that.
I don't watch Game of Thrones, but I can tell you basically what's going to happen in the next episode.
You know, there'll be certain things, you know, sort of moody talking like this by Sean Bean. That's dated how long ago I last watched it.
But, you know, it's— but more or less you can put together a scenario. So I think every company could consider what are our crown jewels?
What are the information that we need to protect? What would we do if we lost control of it? And then you do another disaster scenario. What happens when our website gets defaced?
Have you ever heard it? Have you ever heard it?
AI is no longer an imaginary Asimov sci-fi prediction, right? It's everywhere right here, right now. We're immersed in the first tier of AI, right?
So they call it artificial narrow intelligence or ANI. And this is where a machine exceeds human intelligence or efficiency for a specific task or a set of tasks, right?
Like so like hoovering or providing search results or buying and selling shares or driving cars or even playing chess, Graham. Even playing chess.
So the next tier called AGI, or artificial general intelligence. And this is where the machine proves itself to be as smart as a human, right?
It can perform any mental task that a human can. Now this is way harder than just being good at hoovering or kicking ass at chess, right?
The AGI machine has to be good at everything like abstract thinking or complex problem solving or understanding Shakespearean sonnets. Right?
The AGI will need to adapt in order to compete with humans, and that means it will need to self-learn, and we'll need to do that all without human intervention.
Okay, so it sounds all huge and big and far away, but just wait. There's one more tier here, probably the most disconcerting for most.
This is called artificial superintelligence, or ASI, and this is defined by AI dude Nick Bostrom as an intellect that is so much smarter than the best human brain. Right?
That in practically every field, so including scientific creativity, general wisdom, or social skills. Does this sound all sci-fi to you guys right now?
I can't imagine one of these things writing beautiful poetry or making the world's best sausage roll or something like that, which are probably the most important things in my life.
And today we have loads and loads of computational power, but it takes a lot of space, right? It takes a lot of power and takes a lot of cash.
And it doesn't compare at all right now to the human brain. It doesn't even compare to a mouse's brain.
But whether or not you agree with Moore's Law, computer chips are getting smaller and cheaper and more powerful all the time. It's at a pretty impressive clip as well.
So here's the big question. So unless you bake in security now, let's not even talk about human value systems and all that kind of stuff.
How do we plan to control a machine that is effectively omniscient? It's going to have more power than we do, be smarter than us. And how are we planning to coexist with that?
I mean, think of how we coexist with things like ants. We don't have a problem with them, but if they get in our way, we have no problem getting the Roundup and getting rid of them.
So there's two sides to this. On one side, you've got popular technologists and thinkers like Elon Musk and Nick Bostrom, who I mentioned earlier.
There's Sam Harris, Stephen Hawking, and they're all these guys who've voiced a version of, hey guys, take heed when it comes to ASIs, right?
And particularly when it comes to AI weaponry.
In fact, one of the main drivers behind Elon Musk's wish to colonize Mars is, you know, to have a bolt hole if artificial intelligence goes rogue and turns on humanity.
Like more 2001: Space Odyssey or Ex Machina or Star Wars than reality. So I don't know where it all sits.
You know, you've got people like Google and Microsoft and the rest of them all working on super AI or super intelligent AI, they're all trying to race to be the first out.
And are they taking the whole problem of how do we coexist?
Because I thought normally what happens is that things are being programmed for very specific sort of purposes and it's like, oh, you—
Right now we're doing machines that do one or a few tasks really, really well and they can learn and improve at that specific task or set of tasks.
And I've been reading about— and then just last week, Google announced that it established a kind of unit dedicated to answering questions about the effect technology might have on the way we live.
And of course, they're not the first at this. In 2015, Elon Musk started a nonprofit called OpenAI with the public mission to build safe AGI. So I don't know.
I'm just thinking, we need regulations, right? We need regulations here. Otherwise, we're fucked.
It all sounds— I hate sounding a curmudgeon on this podcast, but I don't know, it does sort of worry me a little bit, I think, that maybe we're allowing computers and technology to do too much and we become sort of redundant.
We could have that.
And then a couple of things you said, Carole, just made me think of an interview I did last year with a guy called Kevin Kelly, who was the co-founder of Wired magazine.
And he wrote a book called The Inevitable, which he published last year. Well worth a read or a listen to. It's available as an audiobook as well.
And he talks a lot about AI, but you mentioned Google there. He talks about a conversation he had with Larry Page back in 2002. So really, really early days of Google.
And he was saying, you know, so, you know, what's this? You know, he was quite skeptical about Google's business model.
He says, you know, so what's this free web search model all about? Tell us about that. And Larry, even back in 2002, said, oh, well, actually, we're making an AI.
Yeah, he knew exactly what he was doing back then. And Kevin Kelly makes a prediction that by 2026, Google's main product won't be search, but it will be AI.
And when you think about it, you know, we are contributing enormously to the brains of these computers when we search for something whichever search engine it is, you know, if we're searching for pencils, if we're searching for chess grandmasters, or whatever it is, it comes back with a number of answers, and then we're the ones that refine that and select the right one.
And we're doing that millions and millions of times every second.
So if these computers, if these artificial intelligences, whether they're general, whether they're narrow, whatever they are, we are the ones that are feeding them with brainpower in order to, you know, maybe one day not only rub shoulders with us, but barge us out of the way.
And the way I see it, at best, we're going to be reduced to cuddly, curious pets, the way we treat our own little animals, or at worst, we're going to be seen as pests that need controlling, right?
Or removal.
Now, whether that's a defense mechanism and that's the only way that they can rationalize it in their heads, I don't know.
But it is a bit scary when you let yourself think that far in the future. And I really don't know what's around the corner in that respect.
NetSparker is a web application security scanner that can automatically find security flaws in your website and fix them before hackers can exploit them.
Try it now by downloading a demo from www.netsparker.com/smashing. On with the show.
It could be a funny story, a book, a video that we've seen, a TV show, a movie, a record, an app, a website, a podcast, whatever. It doesn't have to be security related.
I've been quite enjoying that.
So you can have it playing constantly in the background while you're working. So that's what I was listening to.
Basically, as you remember last week, we went on the scrounge and we told everyone, go and spread the word about Smashing Security.
Oh, he has been spreading the love for Smashing Security at Royal Holloway, telling all of his fellow postgrad information security students that we are a must-listen.
So far, 6 colleagues have come back and told him they're loving the show.
And then he tries to scrounge some swag off us because of course you can go to smashingsecurity.com/store and buy t-shirts and things.
Now, I don't really want to give any swag to David because I think we can do better than that.
So if anyone else wants to say that they've done a lot better at spreading the word, maybe—
All right, if we're going to monetize this—
Does that help?"
Now, he's a New Zealand-based musician, composer, entrepreneur, and scientist, I guess.
Now, if you haven't heard of his name, you may have heard of some of his music, particularly if you saw that Timescapes film on the internet a few years ago with those jaw-dropping, incredible slow motions and time lapses.
He was the one who made the music, and I think that was first ever film that was sold in 4K.
And you may have come across Nigel with his last album, which had a lead track called Cymatics. Just 14 million views on YouTube with that.
And as with all of his work, it's about science versus music. And in that one, it's about vibration, sound waves, a Tesla oscillator machine thrown in.
I mean, seriously, everybody who's doing physics at school or university should watch this.
But I'm building up to his latest video, which is called Automatica, and it's the video for the title track of his latest album where he's got a room full of industrial robots playing the instruments.
It is a visual delight. Musically, it's strong, and I urge you for both of those to watch the making-of films as well.
Seriously, I was watching this with my 7-year-old daughter earlier this evening, and she was gobsmacked.
So he's got these robots, which are similar sort of robots that you'd see on a car construction line, and they're playing the drums or they're doing— it's called scratching with the records, go wicka wicka wicka wicka wicka.
And then what do you know, in the last minute or so, the machines go rogue and they start tearing down the joint.
So Comrade Detective parodies communist propaganda with U.S. action buddy dramas. Think 1980s, think American swagger as they combat the great enemy of the state, capitalism.
Now the whole gimmick of the show is that in concept it pretends to be a lost fictional Romanian propaganda TV show, but in fact it was written in the West.
The scripts were sent to Romania for filming with local actors. And then the whole thing was sent back to the States to be dubbed into English. It is very, very cool.
It is super wonderful. The lines in it are brilliant. There's lines like, of course a police officer will never be contrary, is always right. So it's brilliant.
Rotten Tomatoes gives it 86%. I give it 90% as an homage to Good God, With God. I watched it, I loved it. Check it out.
If anyone wants to follow you online, David, where's the best place to do that?
And also we're on Facebook as Carole was saying, and maybe even Carole will show up there at some point.
Smashingsecurity.com/facebook will take you to our Smashing Security group up there. And we've got swag, as I mentioned, at smashingsecurity.com/store.
And that just about wraps it up. Thank you very much, David, for joining us. Thank you, Carole, as well, of course. And thank you for listening.
If you know somebody who might like the podcast, do go and tell them about it or visit our website and you can point them to all of our past episodes there as well.
Of course, if you do read the Daily Mail article you will enjoy this wonderful typo.

This isn’t, of course, the first time that The Daily Mail has proven itself to be bonkers in a computer security-related story.
Now, if you’ll excuse me I’ll go back to reading about barefaced beauty Pippa Middleton going makeup-free as she enjoys a day out with a friend and Angelina Jolie oozing glamour in a black blazer and cocktail dress in Los Angeles.
It feels to me that the kind of content the Daily Mail website does best.
Can't help thinking that it would be a little stupid for Russian intelligence to use a Russian cyber security firm to spy on others. More likely use a foreign cyber security to do the spying. Also from a competition angle I suspect some cyber security companies are taking advantage of this situation.
Internet "baking" is what the media is doing when posting some of this clickbait… heh.
Betteridge's law of headlines
https://en.wikipedia.org/wiki/Betteridge%27s_law_of_headlines