Smashing Security podcast #072: Why are firms so cr*p with our private data?

Industry veterans, chatting about computer security and online privacy.

Smashing Security #072: Why are firms so cr*p with our private data?

Grindr, MyFitnessPal, and Panera Bread. They’ve all had data breach scares of varying degrees this week. Some handled the security breaches well, some didn’t. We took a look at how well different firms are respecting your data privacy.

All this and more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, who weren’t joined by a special guest for this recording.

0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Unknown
If you're thinking you can scam me, if you're thinking you can make money, you know, it's just like— and this guy said, look, I never mentioned money. I never did.

I'm just trying to tell you about the problem here. Smashing Security, Episode 72: Why Are Phirms So Crap With Our Private Data? With Carole Theriault and Graham Cluley. Hello.

Hello, and welcome to Smashing Security episode 72. My name is Graham Cluley.
CAROLE THERIAULT
I'm Carole Theriault.
GRAHAM CLULEY
And Carole, this is our second time recording this podcast, isn't it?
CAROLE THERIAULT
I know. I don't know how we're going to make it sound as fresh.
GRAHAM CLULEY
So we should explain. We did record a version of this podcast with a special guest.
CAROLE THERIAULT
We did.
GRAHAM CLULEY
And I'm sorry for them that they're not included on this rerecording, but it was just technicality stuff. Yeah. For various reasons. We're not able to use that.

And so we've had to rerecord at the last minute and it's going to be wonderful, isn't it?
CAROLE THERIAULT
Yes, very. It's going to be amazing. We're going to make up for—
GRAHAM CLULEY
We're going to be well behaved, aren't we, Carole? We're not going to be nasty to each other or bicker or anything that, are we?
CAROLE THERIAULT
You shouldn't do any of that. Definitely not.
GRAHAM CLULEY
Because that's not the kind of thing we do on the Smashing Security podcast, is it?
CAROLE THERIAULT
We're all—
GRAHAM CLULEY
No, no, no, no. All good quality. Okay. Well, we'll be right back with the regular show straight off the break.
CAROLE THERIAULT
Thanks to MetaCompliance for supporting this episode of Smashing Security.
GRAHAM CLULEY
People are the key to minimizing your cybersecurity risk posture, and MetaCompliance makes this easier by providing a single platform for phishing, cybersecurity training, policy, privacy, and incident management.

Listeners can get a 10% discount off the high-quality cybersecurity e-learning catalog by quoting the code SMASHING. Just visit www.metacompliance.com. That's www.metacompliance.com.

So, Carole, if you were an animal, what kind of animal would you be?
CAROLE THERIAULT
Probably— that's a hard question. I think I'd probably be a leopard. Snow leopard. Yeah.
GRAHAM CLULEY
Like leopard skin?
CAROLE THERIAULT
No, snow leopards. They're big, they're fast, powerful.
GRAHAM CLULEY
Oh, okay. Yeah.
CAROLE THERIAULT
Okay. You don't mess with them.
GRAHAM CLULEY
I think I would probably be a gazelle. I think— sorry?
CAROLE THERIAULT
Sporting your Doctor Who sweatband?
GRAHAM CLULEY
Doctor Who?
CAROLE THERIAULT
Doctor Who sweatband?
GRAHAM CLULEY
No, maybe I'm not a gazelle leaping from rock to rock. Maybe I'm—
CAROLE THERIAULT
Gorilla? A gorilla? Pot belly pig? A snake? A rat?
GRAHAM CLULEY
Right, okay, so maybe you'd be something a beaver, or you would be— No, no, no. What are those things? They look raccoons. A skunk. Maybe you'd be a skunk.
CAROLE THERIAULT
I've been sprayed by a skunk. That's happened.
GRAHAM CLULEY
Anyway, look, we have to bring this back to computer security. And the reason why I'm talking about things bears is that I've been reading about the gay hookup app Grindr. Right.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
And on Grindr, which as people probably know, is very popular. It's got over 3.5 million daily active users around the world. Yeah.
CAROLE THERIAULT
And I think we can guess that everyone who listens to the show know what Grindr is.
GRAHAM CLULEY
Pretty popular app. They may not all have used it.
CAROLE THERIAULT
No, no, fine, fine, fine.
GRAHAM CLULEY
It's basically Tinder for gay people, I think. I haven't used Tinder either, but it's basically a dating or hooking up app.

Tells you where someone is who might be of interest to you in their location, and you can look at their details and say, "Oh look, they're a cuddly bear type or a daddy."
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
They're of this gender or this ethnicity and this kind of age range, what they're looking for relationship-wise.
CAROLE THERIAULT
And one of the things which you can look at— This isn't a data breach story, is it?
GRAHAM CLULEY
It is.
CAROLE THERIAULT
Oh, sorry.
GRAHAM CLULEY
One of the things you can look at is their HIV status.

So if they're offering that information, which is a valid thing to offer, because for instance, if people are HIV positive, they may only want relationships with other HIV positive people.
CAROLE THERIAULT
So basically you're saying people put in a lot of personal information in these apps in order to find good matches. And of course that data was really, really well secured, right?
GRAHAM CLULEY
Well, it's not as though hackers have got hold of it yet.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
So that's good news, right?
CAROLE THERIAULT
Yep.
GRAHAM CLULEY
But what has happened is a Norwegian nonprofit called Sintef and a researcher called Antoine Pezier has discovered that Grindr was sharing this information with two other companies, including not only the other personal information, their GPS position, their gender, their age, but also this HIV status and when they were last tested.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
And that information was being shared via unencrypted HTTP.
CAROLE THERIAULT
So the information wasn't— first, the information was transferred in a way that wasn't safe.
GRAHAM CLULEY
It appears that it was being transferred via HTTP unencrypted.
CAROLE THERIAULT
And were they allowed to send this information? Who were they sending this to? Well, it was ads. It was advertisers.
GRAHAM CLULEY
Well, no, it wasn't advertisers. It was being shared with two other companies who help you optimize your mobile apps, companies called Apptimize and Localytics.

So they're doing kind of analytics on how the apps are being used.
CAROLE THERIAULT
So like, put different words on buttons to see if people click more. That kind of thing.
GRAHAM CLULEY
Well, I imagine they're just testing the performance, seeing which bits people— which bits of the app.
CAROLE THERIAULT
Are you dying?
GRAHAM CLULEY
Yes.
CAROLE THERIAULT
Please don't die. Okay.
GRAHAM CLULEY
Which bits of the app users might be using. I guess they might be doing a little bit of A/B testing as well as to what's popular.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
What's not. So it's not unusual for apps to measure that kind of thing, but is it really necessary?
CAROLE THERIAULT
Right, right, right.
GRAHAM CLULEY
To pass on really sensitive information, such as your precise location.
CAROLE THERIAULT
What's wrong with lorem ipsum text?
GRAHAM CLULEY
Right. Or your HIV status along with everything else. You know, it's kind of crazy, isn't it?

And so the concern naturally is that maybe Grindr is looking after this information properly in its app, but can you be confident that these third parties are being just as careful?
CAROLE THERIAULT
Yeah. Again, a supply chain issue.
GRAHAM CLULEY
So Scott Chen, the CTO of Grindr, has told BuzzFeed, who were the ones who really sort of made these details public, they told BuzzFeed that it was standard practice for mobile apps to work with companies like these and that the data was being shared under strict contractual terms that provide for the highest level of confidentiality, data security, and user privacy.

And I think they're absolutely right about that. If you put a contract in place, there's no way at all that security can be breached. Privacy is a premium. No problems at all.

Well done, Grindr, having a contract. Fantastic.
CAROLE THERIAULT
You know what though?
GRAHAM CLULEY
That reassures everybody.
CAROLE THERIAULT
The thing is, what other choices do they have? You have to cover your ass with some contract. Okay, vouchers of words. But you do, right?

You have to say this, and you have to say it in a way that basically says, I'm liable for this, but I'm definitely not liable for this information.

So you use very specific words to try and give you a little leeway. And you're exactly right. There's no silver bullet to security.
GRAHAM CLULEY
So, but there you are a but. But why? Why did the developers feel the need to send everything?
CAROLE THERIAULT
No, no, I agree. I agree.
GRAHAM CLULEY
That's the crazy thing.
CAROLE THERIAULT
They didn't even think.
GRAHAM CLULEY
That's the incompetence, is they just lazily said, "Oh, just send it all." Whereas it should be, we'll only send the information they absolutely need to have, or we'll anonymize the data en route.
CAROLE THERIAULT
Did anyone say sorry? Did you see anyone say, "Yeah, sorry about that, guys. Sorry we did this."
GRAHAM CLULEY
Actually, I found Grindr rather defensive in their response.

It's, "Oh, you're only making a fuss about this because of Facebook and Cambridge Analytica." And they went to a competitor of BuzzFeed to say, well, we've decided to change our policy.

We're no longer going to share this particular sensitive information, including HIV status, with third parties. It seemed a little bit mean-spirited to me.

I think sometimes better to put your hands up and say, okay, hands up, baby, hands up. We had a data breach, baby. We— well, they haven't had a data breach yet, right?

That's the good news, and that's the important thing to underline.

But anytime you share data about your users unnecessarily and insecurely, there's the potential for a breach to happen.

So you should only share the data you absolutely have to share.
CAROLE THERIAULT
Absolutely agree. And what's interesting, Graham, is my stories also have to do with a data breach. Oh, really?

So what I suggest we do is we— so these guys haven't had a data breach, but my will talk about how two companies handled a data breach and figure out which one you think did the better job.
GRAHAM CLULEY
Carole, can I say, after 72 episodes of Smashing Security, you're getting very, very slick at the segues.
CAROLE THERIAULT
Oh, well, you know, I was born slick, baby.
GRAHAM CLULEY
Slick leopard. Okay, let's see what you got then.
CAROLE THERIAULT
Well, unlike you, Graham, I was loosening my belt this weekend, preparing for family food mountains, chalky egg hunts, and everything else.
GRAHAM CLULEY
Lovely.
CAROLE THERIAULT
And then of course many people feel guilty after they stuff their faces over a long weekend, don't they? And many people turn to apps to get back into shape. Apps MyFitnessPal.
GRAHAM CLULEY
Oh yeah.
CAROLE THERIAULT
However, you've used MyFitnessPal before.
GRAHAM CLULEY
I have used MyFitnessPal, yes. I've never been able to keep it up to date with what I actually eat, but I have used it sort of measure how much I've maybe moved or typed.

Whatever the exercises.
CAROLE THERIAULT
Yeah.
CAROLE THERIAULT
I just remembered it was a calorie counter. Oh yeah, and there was a bit where you'd log what exercise you did, wasn't there? Like, oh yeah, 30 minutes on the bike. Whatever. Yeah.

Anyway, this past weekend, MyFitnessPal got into some hot water for a data breach involving 150 million of their subscriber base.
GRAHAM CLULEY
150 million?
CAROLE THERIAULT
I know, it's huge. It's huge. It's like 3 times the size of Canada in terms of number of population.
GRAHAM CLULEY
So what kind of data leaked out?
CAROLE THERIAULT
Well, we're going to get to that. There's all kinds of things because what I want to do is compare how these two do. So let me just set up the other app.

This is contender on the right, contender on the left. Right after Easter, another data breach happened. This was announced on Brian Krebs' blog. And this time it was Panera Bread.

Now, I don't know Panera Bread, but people tell me it's as ubiquitous as Starbucks in the States.

And it's a popular online food outlet and also has a cafe chain with 2,000 cafes across the States.
GRAHAM CLULEY
Online food sounds terribly convenient. I like the idea of that rather than having to actually— I'll just download food.
CAROLE THERIAULT
You know, we have a lot of that in the UK.

People in the States, I don't think, have that kind of food ordered and delivery to the house on a weekly basis for the weekly shop, but we get to enjoy that thing.

Anyway, they are said to have exposed millions of customer personal details. And I know, another weekend, another hack. You just talked about one.

There was also the Saks hack that happened over the weekend. But let's just compare how they work. So let's start with MyFitnessPal.

So 150 million users affected, email passwords and username potentially compromised. Ouch. So email passwords, username.

You can't change your email, but you can certainly go and change your password, right?
GRAHAM CLULEY
And of course you need to make sure that you change, if you're using the same password on MyFitnessPal somewhere else, you need to change those passwords too.

Passwords should be unique. Go and listen to our Passwords podcast, folks.
CAROLE THERIAULT
Good plug. Agree. So the fitness app owner said last week that the accounts were compromised in February and the breach was only discovered a month later on the 25th of March.

Now Under Armour, that's the parent company of MyFitnessPal. These are the steps that I've seen that they took.

They first emailed all potentially affected customers within 4 days of discovering the breach.

So on the 29th of March, the email explained how they used bcrypt hashing functions to protect passwords, and it also linked to an FAQ.

The FAQ was comprehensive and gloriously free of marketing spin and high-res pics. It answered those important questions.

You know what I mean though, when you're worried about something, you don't want them to sell to you. You really just want to have the information. And they did this really well.

What information was affected? Who was being notified? What was the company doing to enhance protection.

And they've also updated their social channels like Twitter, where they pinned a link to the FAQ at the very top of the channel.
GRAHAM CLULEY
Well, that's good, because quite often they don't do that, do they? They try and hide it from their social channels.
CAROLE THERIAULT
Exactly. And they have two social channels. They have a kind of support channel that doesn't have a very big number of followers.

And then they have their more public MyFitnessPal channel, which has almost 200,000 followers. And it was pinned on both of them.

I didn't really see a strong apology from MyFitnessPal or Under Armour anywhere.

And I really think those are important because even though you were a victim, you were responsible for keeping our stuff safe, right?

So if you lent me, for example, if you lent me what would I want of yours? Not much. Let's say you lent me a Doctor Who doll.
GRAHAM CLULEY
I don't have dollies of Doctor Who.
CAROLE THERIAULT
Okay, well, let's—
GRAHAM CLULEY
I'm not a weirdo, you know.
CAROLE THERIAULT
Let's say you lent me Orinoco.
GRAHAM CLULEY
Oh, listen.
CAROLE THERIAULT
Yeah, okay.
GRAHAM CLULEY
And Orinoco is my childhood womble.
CAROLE THERIAULT
Right, so you lend me this womble thing and I lose it, okay? And it's gone. And then I just say, yeah, God, sorry about that. We'll do better next time. But I said sorry.
GRAHAM CLULEY
You actually did say sorry.
CAROLE THERIAULT
Just said sorry, trying not to say sorry.
GRAHAM CLULEY
I have to say, it didn't feel terribly heartfelt because this is Orinoco we're talking about. I would be deeply, deep— I'd just be upset.
CAROLE THERIAULT
What do you think about MyFitnessPal users? They feel deeply, deeply upset, I'm sure too.
GRAHAM CLULEY
Well, they should do because potentially... Now, the only thing I— so actually most of what you said there sounds quite good in the way in which they've handled that.

The only potential issue I have is when they actually went public with this, which was on the 29th of March, which was of course just before the big holiday weekend.
CAROLE THERIAULT
You know what? Maybe that was a thought, but it certainly didn't work in their favor because coverage was everywhere. This was a big story over the weekend.
GRAHAM CLULEY
Because we do sometimes see companies bury the news, don't they?
CAROLE THERIAULT
Yeah, well, they didn't succeed.
GRAHAM CLULEY
One company just before Christmas announced some mega breach and you just thought, no one's going to hear about this.
CAROLE THERIAULT
Well, thanks to us, everyone's hearing about this one.
GRAHAM CLULEY
Exactly.
CAROLE THERIAULT
The other thing that MyFitnessPal could have done was advertised or basically said, if you want to delete your account with us, here is how to do it.

So I didn't see any of that information. I just think it's a good thing. You know, we screwed up and if you want to leave, we understand. I think that's a fair thing to say.
GRAHAM CLULEY
Clear off if you want to.
CAROLE THERIAULT
Yeah, okay. So this is the MyFitnessPal information. Now let's compare MyFitnessPal to the Panera Bread problem.

So Panera Bread, a well-meaning security researcher named Dylan Houlihan told the online food store Panera that they were exposing data belonging to millions of its customers.

Now this explanation was given 8 months ago, way back in 2017.

Panera's director of information security, Mike Gustavsson, initially dismissed Houlihan's report as a scam, which is really an odd thing.
GRAHAM CLULEY
And in fact, if you look at Dylan Houlihan's blog post about this, he's included a screenshot of the initial email he received back from Panera.

And it sounds like a company which does not want to be told that they've got a security issue.

It's like, if you are thinking you can scam me, if you are thinking you can make money, you know, it's just... And this guy said, "Look, I never mentioned money. I never did.

I'm just trying to tell you about a problem here." So they approached it really, really badly initially, at least.
CAROLE THERIAULT
Okay, but you know what? A week later, still in 2017, Houlihan's findings were validated and Panera said they were working on a fix. Now, problem solved, you say? Not quite.

Now, this is an interesting aside.

Apparently, Brian Krebs' source says that the Panera Bread Info Security Director was the Senior Director of Security Operations at Equifax until 2013.
GRAHAM CLULEY
Oh, you know, I've seen a lot of people on Twitter talking about this and saying, well, what a surprise, you know, he used to work at Equifax. I think this is a bit mean.

I think people are all picking on this guy. Okay, so his initial email response wasn't that great.

But the fact that he had a career before he joined Panera Bread, the fact that he chose Equifax, which was Equifax, you know, before the details of the big Equifax breach occurred as well.

I don't think it's really nasty, I think, that people have just said, oh, look, he used to work at Equifax, therefore he must be a completely shitty person.
CAROLE THERIAULT
God, sensitive. Can I just tell you what else happened?
GRAHAM CLULEY
I've never worked at Equifax, by the way. Let me just stress that right now.
CAROLE THERIAULT
I agree. Now listen, problem solved, you say? Well, not quite.

Brian Krebs says that the index data from Panera's website indicates that more than 7 million customers' accounts could be affected.

The information included email addresses, physical addresses, and birthdays. And all this was available in plain text from the Panera website.

Worse still, the records could be indexed and crawled by automated tools with very little effort, said Krebs.

Did I also mention that the information included Panera loyalty card numbers? Nice for a scammer if they want to get their hands on a prepaid card.
GRAHAM CLULEY
Oh, so if I wanted to sort of stock up on sausage rolls and things like that.
CAROLE THERIAULT
Of course you would. Of course you would. Of course it would be a sausage roll.
GRAHAM CLULEY
I could exploit this kind of information.
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
Credit card numbers, for goodness' sake. Sausage rolls are where it's at, aren't they?
CAROLE THERIAULT
Yeah. You have to understand, this stuff was left in plain text for 8 months, just sitting there waiting to be scooped up.

Researcher Houlihan, who initially reported the problem, was understandably pissed that the problem wasn't resolved in the 8 months. He ended up informing Krebs.

Krebs' team looked into it and decided to get in touch with Panera. Presto, Panera's website suddenly goes dark for a few hours.

The site reappears with the exposed data now apparently hidden. 2 hours later.
GRAHAM CLULEY
Okay. So, I mean, it took them 8 months to fix the problem. But once Brian Krebs got on the phone to them, because frankly, you know, everyone has a bat phone, don't they?

And if it rings and you think, oh, Brian Krebs is calling, then you know you've got a problem.

Then you know you've got to deal with the problem because everyone will find out about it within hours.
CAROLE THERIAULT
Do you have your popcorn, Graham?
GRAHAM CLULEY
So to the—
CAROLE THERIAULT
Do you have your popcorn?
GRAHAM CLULEY
I have popcorn. Yeah.
CAROLE THERIAULT
Okay, good. Because this gets really exciting now.
GRAHAM CLULEY
Okay.
CAROLE THERIAULT
Okay. Turns out they didn't do a very good job of fixing it, and this is how it all exploded.

So after they made this fix and Krebs published his article, a Panera statement shows up on Fox News.
GRAHAM CLULEY
Lovely.
CAROLE THERIAULT
And it kind of promotes their quick reactions and seems to downplay the severity of the breach to 10,000 accounts, not 7 million. Hmm, I don't know who I trust in this, but—
GRAHAM CLULEY
So the security researchers got their details wrong, and Panera Bread saying, "It's not that big a deal." And then we've taken care of it in a couple hours, all done, done and dusted.
CAROLE THERIAULT
However, Twitter starts going nuts with people explaining exactly what Panera did to hide the exposed data so quickly. Turns out it's one of the toughest things I've ever heard.

So they basically just added all the data behind the login. So if you had a login to the Panera website, you could then get access to all these millions of details.

Oh, sorry, 10,000. 10,000 customer details, according to Panera.
GRAHAM CLULEY
How many details is it really?
CAROLE THERIAULT
Well, right now people are thinking it's 37 million. So it turns out that their commercial division may have been affected as well.

So evidence is suggesting that it could be as high as 37 million customer records that are affected. And Panera being very quiet about this. I didn't see anything on their website.

Their Twitter seems to have just things stupid polls, "How are your taste buds celebrating this spring? Hibiscus iced tea or green smoothies?"
GRAHAM CLULEY
Oh, but in fairness to them, if I had an issue with my website which allowed hackers to extract information about all of my customers simply by incrementing a customer number, I think I'd think, oh, should I fix that or should I go and have a kale smoothie instead?

You know?
CAROLE THERIAULT
So it's really no competition really, is it? MyFitnessPal did a way better job compared to Panera in this instance.
GRAHAM CLULEY
And this is the thing. Any company can suffer a breach. Any company can have a vulnerability or a weakness. It's just natural to happen, right? Problems will happen.

There's no company which can guarantee.
CAROLE THERIAULT
Yes. I would agree that problems certainly happen. Yeah, things don't always go smooth.
GRAHAM CLULEY
Yeah. What matters is how well you respond. Absolutely, and MyFitnessPal, from the sound of things, responded fairly promptly and responded responsibly.
CAROLE THERIAULT
Yep.
GRAHAM CLULEY
In the emails that they sent as well, I believe that they said, "Look, we're not going to send you links for you to click on." So you're avoiding phishing.

Really smart in a short amount of time. They put that all together. Panera Bread had 8 months, did nothing. When they did something, it wasn't good enough.

And the problem actually was much, much worse than they even imagined.
CAROLE THERIAULT
And hey, do a bad job and it really takes its toll. Just ask the Zuckster, right? His share price is—
GRAHAM CLULEY
The Zuckster?
CAROLE THERIAULT
The Zuckster.
GRAHAM CLULEY
Does he deserve to be called the Zuckster?
CAROLE THERIAULT
Well, what, you think it sounds cool? I think it sounds a bit shitty. We'll censor that.
GRAHAM CLULEY
And thanks once again to MetaCompliance for supporting this episode of Smashing Security. People are the key to minimizing your cybersecurity risk posture.

You can save 10% as a Smashing Security listener off the high-quality cybersecurity e-learning catalog by going to metacompliance.com/smashingsecurity.

And quoting the code Smashing. That's metacompliance.com, and don't forget the code Smashing Security.

And welcome back to our favourite part of the show, the part of the show that we to call Pick of the Week.
CAROLE THERIAULT
Pick of the Week.
GRAHAM CLULEY
Now, Pick of the Week is the part of the show where everyone chooses something they.

Could be a funny story, a book they've read, a TV show, a movie, a record, an app, a website, a podcast, whatever they. Doesn't have to be security related necessarily.
CAROLE THERIAULT
It shouldn't be.
GRAHAM CLULEY
And my pick of the week.
CAROLE THERIAULT
Definitely not data breach related this week, please.
GRAHAM CLULEY
No, definitely not. Been a lot of data breaches.
CAROLE THERIAULT
Too much. Yeah.
GRAHAM CLULEY
Too much data breaches. Well, I'm going to talk to you not about data breaches, but instead about Vikings.
CAROLE THERIAULT
Okay.
GRAHAM CLULEY
Yeah. So my pick of the week isn't actually Vikings because I think they've been around for a while and many people know about them.
CAROLE THERIAULT
Nothing new there.
GRAHAM CLULEY
Nothing topical.
CAROLE THERIAULT
Topical.
GRAHAM CLULEY
All this security news podcast. Let me tell you about Vikings. So as you know, Vikings were fantastic seafarers, weren't they?

They raced off to Iceland and Greenland and discovered America.
CAROLE THERIAULT
You know, heroes discovered everything. Yep.
GRAHAM CLULEY
They discovered everything. Amazing Vikings. Apparently their helmets didn't have horns. Did you know that?
CAROLE THERIAULT
No, I wouldn't have even been sure that they wore helmets.
GRAHAM CLULEY
So apparently this whole thing about their helmets having horns is Hollywood invention. I think it's just Hollywood made it up.
CAROLE THERIAULT
Of course they did.
GRAHAM CLULEY
All right. Well, there is an article, if you don't know much about Vikings, in Science magazine. Which is very interesting.

And they are saying that Vikings may have navigated the seas and specifically safely reached Greenland from Norway using legendary crystals.
CAROLE THERIAULT
Excuse me?
GRAHAM CLULEY
Yes. Researchers—
CAROLE THERIAULT
Are these naturally magnetic?
GRAHAM CLULEY
Here's the issue, right, Carole? They didn't have compasses. They didn't have GPS as Vikings on their boats or anything like that.

And I don't know if you've experienced this, but sometimes in the Northern Hemisphere, there's not a lot of sunshine.
CAROLE THERIAULT
Or there's way too much.
GRAHAM CLULEY
And so even at nighttime when you're thinking, oh, you know, it'd be nice to have a moon or something, you know, there's nothing, right? There's nothing.

So there are legends that the Vikings had these things called sunstones, special crystals which acted as navigation aids and helped them even when the sun was obscured by clouds to identify the sun's location.

Well, I'm very glad that you asked this, because researchers believe that there are particular types of crystal which— I think it's a bit technical, Carole.
CAROLE THERIAULT
Is it magnetic?
GRAHAM CLULEY
No, no, no.

I think they refract light or they polarize light in a particular way, and you turn two crystals at the same time, you can identify a difference in the light which helps you identify where the sun may be even on a cloudy day.

So that's the theory.
CAROLE THERIAULT
Now, the kind of triangulation I don't know. Okay, so your pick of the week. Sorry, I've got some exciting questions about it.
GRAHAM CLULEY
I don't know if it's triangulation.

I think they're doing it from the same place, but I think maybe they can identify where in the sky possibly the sun may be through these crystals.
CAROLE THERIAULT
Anyway, so tell me, Graham, what's so riveting about this for you?
GRAHAM CLULEY
Well, I think I identify myself very much as a stone, as an explorer, as a warrior.

And anyway, listen, the scientists, the researchers believe that they've done some simulations of Viking trips such as the ones undertaken in the Saga of King Olaf, where they were navigating under less than sunny skies, and they've determined that it would have been possible using these stones to reach Greenland around about 92% or up to 100% of the time, even in bad weathers, as long as they use crystals at least every 3 hours.

If they took longer, so they only checked every 6 hours or so, the success rate would drop to about 32 to 59%.
CAROLE THERIAULT
Oh, that's impressive!
GRAHAM CLULEY
It is. See, now you're impressed, aren't you? So I find it quite interesting. So I love when modern scientists are trying to work out what, you know, our predecessors and our—
CAROLE THERIAULT
Yes, it's a great use of tax money.
GRAHAM CLULEY
Well, I don't know if it's tax money. Exactly, it's just for the greater good. It's the Royal Society of Open Science, you know.
CAROLE THERIAULT
Yeah, no, that's very cool.
GRAHAM CLULEY
They were able to create settlements on Greenland and Iceland.

It is all speculation because I don't think these crystals have actually been found in the Viking ships, but there are tales and legends of these things, and so maybe it does make sense.

And of course, those who missed Greenland, where did they hit, Carole?
CAROLE THERIAULT
I guess they go all the way to Canada.
GRAHAM CLULEY
North America. Exactly. Something you should be grateful for.
CAROLE THERIAULT
All right. Thanks, buddy.
GRAHAM CLULEY
Because I'm sure you're descended from a Viking. And that is why it is my pick of the week.
CAROLE THERIAULT
Okay. Okay. Interesting. I'm not convinced you're totally into it, but—
GRAHAM CLULEY
Ooh.
CAROLE THERIAULT
I'll ask you a quiz on it later. Okay. My pick of the week.

Now, well, yes, I have an issue this week because I have this really great pick of the week that I cannot share because it is so great that I actually bought you one.

And I want to give it to you before so that you can talk about it on the show with me and say, oh my God, it's amazing.
GRAHAM CLULEY
Hang on. Have you bought yourself one as well?
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
I was about to say, if it's really amazing, you would have bought yourself one. Yes, I did. Okay.
CAROLE THERIAULT
I bought us— and aren't I nice that I bought us both one? Not cheap, Graham. Not cheap.
GRAHAM CLULEY
Oh, crikey.
CAROLE THERIAULT
Yeah.
GRAHAM CLULEY
Very exciting.
CAROLE THERIAULT
You're worth every penny though. Instead, I'm going to talk about April Fools because I love April Fools. And there were a few interesting April Fools fails this year.

I don't know if you saw the French town called Beauvais. Now, Beauvais has an unemployment issue that is higher than the rest of the country.

And the mayor went out saying, hey, IKEA is coming into town and it's going to provide thousands of jobs for everyone. April Fools!
GRAHAM CLULEY
Oh, really?
CAROLE THERIAULT
Yes.
GRAHAM CLULEY
Oh, that's jolly, isn't it?
CAROLE THERIAULT
I know, I know. It's in The Telegraph. I'll put a link in the show notes.
GRAHAM CLULEY
It's a bit if you were a Viking or something and you put a buoy in the sea saying, Greenland this way, and you pointed to the Caribbean. You know, it's that. Yeah, that would be it.

I saw an April Fools, which kind of annoyed me. I saw one from Elon Musk.
CAROLE THERIAULT
Yes, he's the other one I want to talk about.
GRAHAM CLULEY
Oh, right. Yeah, go for it.
CAROLE THERIAULT
Yeah, well, because I saw him tweet.
GRAHAM CLULEY
Saying that Tesla had gone bankrupt or something.
CAROLE THERIAULT
I was thinking of Scott Helmee, who had waiting for his car, you know, put money down. He must have thought that was hilarious.
GRAHAM CLULEY
And Elon Musk posted these photos of himself sort of, you know, sort of, I don't know, splayed across a Tesla, sort of with a begging piece of cardboard or something.
CAROLE THERIAULT
Well, he is $10 billion in debt.
GRAHAM CLULEY
And I just thought, you know what, I'm just not sure that's funny.
CAROLE THERIAULT
Yeah, really agree. Now, so this was the one I wanted to focus on. It was on the Beeb, or the BBC for you guys in foreign places. They got taken this year live on air.

This is BBC breakfast morning host Roger Johnson and Bibita Sharma. Now, I'm not a breakfast news person. I tend to do it— I'm a Radio 4 listener, really.

So I don't do the TV thing.
GRAHAM CLULEY
Snob.
CAROLE THERIAULT
Yeah, well, yeah, you go. But there they are chatting. You know, they're chatting. It's like a sofa setup where they're chatting about the day.

And they're talking about the news that a tech firm in Gibraltar was capitalizing on the Brexit discourse on social media with a pair of emoji.

The article says the firm created the Brexit Bulldog and the Starry Blue emoji for users to have a colorful way to share their political leanings on social media.

In fact, I've got a clip. Okay, this is a great story here in the Observer about how you can choose your emoji post-Brexit.

Of course, the British Bulldog there on one side and the EU flag with starry eyes. What did you make of this one?
GRAHAM CLULEY
It's a blueberry, isn't it? I have to say—
CAROLE THERIAULT
It looks like it, doesn't it?
GRAHAM CLULEY
I love this story. The minute I saw this, I thought, we've got to do this if we can.

Essentially, it's an Italian firm that's based out of Gibraltar that is developing emojis to allow you to state your Brexit identity, to say that you're a Remainer or that you're a Leaver.

The one thing I really loved as well is at the end of the story, government sources indicated that if the Gibraltar-based company presses ahead with the launch, ministers might look at imposing a post-Brexit tariff on emojis.

Oh my goodness.
CAROLE THERIAULT
At this point, they are hook, line, and sinker falling for it, but tweets start coming in explaining that actually it was an April Fool's joke. See how they react.
GRAHAM CLULEY
If we could rewind 5 or 6 minutes, we might have a different view on this. How's it— how are your foreign languages?
CAROLE THERIAULT
Good. Brilliant. Amazing.
GRAHAM CLULEY
Really?
CAROLE THERIAULT
No.
GRAHAM CLULEY
Okay, but a schoolboy French for me. I presume Mike, who did the papers, doesn't speak any Italian either. A couple of people have pointed this out.

It is, of course, today the 1st of April.

This story in the Observer about the emojis that we were discussing, as someone said very enthusiastically here, is written by— if you come across here, the journalist who wrote it is called Scherzo Primavera, which is Joke of Spring.
CAROLE THERIAULT
Oh, why did we not get that earlier? Why indeed?
GRAHAM CLULEY
Scherzo Primavera. It sounds like a plate of pasta. That's what they were duped by.
CAROLE THERIAULT
Yes, it sounds like a plate of pasta. You're so learned. You're so learned. Learned. Anyway, very funny, very cute. They handled it well. Excellent.
GRAHAM CLULEY
Well, I guess I do like when people's balloons are popped by falling for an April Fool. You know, people—
CAROLE THERIAULT
Oh, you've fallen for quite a few, Mr. Cluley.
GRAHAM CLULEY
Oh, you— it used to— can I tell the dear listener, it used to be hell working with Carole Theriault because every April 1st. I would be so fooled by her.

The most devious, evil, evil April Fools. And sometimes she'd have her colleagues involved.
CAROLE THERIAULT
We went far and wide.
GRAHAM CLULEY
You certainly did.
CAROLE THERIAULT
Yeah. Well, you were worth it back then when you were young.
GRAHAM CLULEY
On that bombshell, I thank you for listening. If you enjoyed the show, you can follow us on Twitter @Smashing Security. No G. Without a G.

We have an online store where you can buy stickers and mugs and t-shirts and things like that. SmashingSecurity.com/store. Next week, it'll be a regular show.

We should have a special guest back with us. Hopefully we won't have any of these techie problems that we had this time. And thanks for tuning in.

If you like the show, rate it on Apple Podcasts. It really does help new listeners discover us.
CAROLE THERIAULT
Yes. And it makes Graham not complain as much. It just makes my life much easier.
GRAHAM CLULEY
Go to smashingsecurity.com to listen to past episodes and for details on how to get in touch. I've got a little how to get in touch with us. Until next time, cheerio.
CAROLE THERIAULT
Bye-bye. Bye. Great. Yes, didn't go bad. No, no, it doesn't sound like it's a second pass though. It's pretty stumbly.
GRAHAM CLULEY
That's natural.
CAROLE THERIAULT
It's natural. Exactly. Yeah.

Hosts:

Graham Cluley:

Carole Theriault:

Show notes:

Sponsor: MetaCompliance

People are the key to minimizing your Cyber Security risk posture. MetaCompliance makes this easier by providing a single platform for Phishing, Cybersecurity training, Policy, Privacy and Incident management. Listeners can get a 10% discount off the high-quality CyberSecurity eLearning catalog by quoting the code SMASHING. Visit www.metacompliance.com now.

Follow the show:

Follow the show on Bluesky at @smashingsecurity.com, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!


Graham Cluley is an award-winning keynote speaker who has given presentations around the world about cybersecurity, hackers, and online privacy. A veteran of the computer security industry since the early 1990s, he wrote the first ever version of Dr Solomon's Anti-Virus Toolkit for Windows, makes regular media appearances, and hosts the popular "Smashing Security" podcast. Follow him on TikTok, LinkedIn, Bluesky and Mastodon, or drop him an email.

What do you think? Leave a comment

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.