
Join me and fellow computer security industry veterans Vanja Svajcer and Carole Theriault on the “Smashing Security” podcast, as we have another casual chat about the world of online privacy and computer security.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Hello everybody and welcome to Episode 6, Smashing Security, 2nd of February 2017, and I'm joined as always by my good chums Vanja Švajcer and Carole Theriault.
And you may have noticed a difference already. That's right. We have got a new theme tune on the podcast. Now, I don't want to point any fingers, but somebody, yeah, that's right.
Somebody wanted us to change the theme tune. I thought the existing theme tune was pretty good, actually.
I thought it was doing reasonably well, but it seems some people weren't as much of a fan of it.
They're crumbling. No wonder they're going down the charts. No wonder people aren't leaving reviews for them any longer on iTunes. By the way, you can leave reviews for us on iTunes.
I don't know if I've mentioned that. It might be a nice thing to do. Anyway, what are we going to talk about today? Oh, we've got 3 topics we're going to talk about today.
And topic number 1—
Okay, well, I'm going to talk to you about something which happened over the weekend, a big story which broke about a luxury hotel in Austria, a 4-star hotel called the Romantic Sea Hotel Jägerwirt.
Apologies for my bad Austrian accent, which apparently is in a beautiful setting up in the Alps, and they got hit by ransomware. Well, big flipping deal.
You know, lots of organizations getting hit by ransomware all the time, but, the headlines in this particular case said that the ransomware had affected the hotel system so badly that 180 guests were locked in their hotel rooms.
And lots of hotels don't even have windows that open anymore.
They don't let you open the windows so that you have to trudge along all the way downstairs and out the building.
Anyway, the point is, all these headlines were saying that people have been locked into their hotel rooms. Well, that is absolute nonsense.
If you've got hundreds of people in a hotel, you've all seen the Towering Inferno, right? It's an absolute disaster when one of these things sets fire.
You need an easy way of getting out.
And if you have to, if it's 3 o'clock in the morning when the fire alarm goes off, you don't want to have to be scrabbling around looking for your little key card in order to get out of your room.
And that's why when you're in a hotel room, you'll see there's actually a proper normal analogue, sort of physical handle there, right? And you can just open it.
So it may be a little bit trickier getting in, but it's always really, really easy to get out. So that's one reason why I instantly thought— That sounds—
But I've been in hotels where it's a kind of, you know, the kind of key you put in and you have to keep track of the key and you don't hand it into the desk. You can lose your key.
So I don't know. Oh, I suppose it'd be easy to get out in that case, wouldn't it?
I can't open it all the way. Is that what's— Is that what you're struggling with?
Wouldn't you have expected all of those hotel guests— okay, they're stuck in their hotel rooms. I've done a search on the hotel's website. They did have Wi-Fi.
Wouldn't all these people have gone on Instagram and Twitter and indeed TripAdvisor and left very negative reviews.
Said, "I'd love to say something nice about this hotel, but unfortunately I've been locked in my room." Wouldn't people be doing that?
Wouldn't people be live streaming on YouTube saying, "Oh, I'm stuck in my hotel room." But there was none of that going on at all.
It looks like there was a ransomware incident at this particular hotel, as there are organizations all over the world, of course, people are always getting hit by ransomware.
But what it did was it hit the key card system, which meant that the hotel reception desk weren't able to create new key cards for people.
You know, so as people were coming in and that obviously would be a bit of a pain. And the system was down for a day or so while they were recovering and bringing it back.
It looks like they did eventually pay the ransom, but nobody got locked in their hotel rooms.
And in fact, if you look at the actual quotes from the hotel staff, they say that everybody was actually out on the ski slopes at the time anyway. So it was no big deal.
But you're right, Carole, people love stories like this. People love to share this kind of— because what a fantastic anecdote if it had been true.
People locked in their hotel rooms because of a malware attack. Not a targeted attack, but just one which happened to hit this hotel.
And you can bet your bottom dollar that there will be security firms out there and salespeople who will carry on trotting out this story as though it were true way into the future.
And it will be there in presentations and it will become an accepted truth, even though it never really happened.
You hear so many different stories in sales presentations and a lot of them are probably not true anyway.
It's sometimes you hear this quote from security company presentations saying that cybercrime makes more money than the drugs trade is the claim, which you'll often see trotted out.
It's really?
Albeit a cigarette packet which they can't actually use inside their hotel room because of the ransomware. There you go. All right. Well, okay. We've busted that myth at least.
So well done to us for that. Let's go on. Topic 2.
It's about the question whether we should use third-party antivirus software, whether we should use no antivirus software at all, or whether we should rely on Microsoft built-in Windows Defender antivirus software.
So a former developer of Firefox Mozilla, Robert O'Callaghan, has wrote in his blog, and that was picked up by some news outlets, and the discussion kind of ensued from there on.
So his claim is that AV software should not be used apart from the Microsoft perhaps because it introduces new attack surface and slows the system down.
So it kind of brings more harm than good into your system. So that's a kind of a difficult question and difficult statement to test, right?
I can just say that thinking of the history, the AV integrated with browsers just because browsers were not that great in the past and their users have required them to basically block bad content, and the only way to do it is to hack inside the Windows operating system and inside the browsers.
And now the developers of browsers are saying, you know, no, the way to do it is to rely on your secure browsers, and the browsers cannot be secured because there are so many pieces of AV software there that introduces additional insecurities into the browsers.
So it's kind of a weird thing.
I think now the state is that the browsers are a little bit better, or I mean better than they, much better than they used to be.
And AV probably stay pretty much the same, except also AV, when we say AV today, many people think that AV is pretty simple scanning of content, but now there are so many different additional kind of technologies that are included that actually, it's not just about AV.
A lot of the security guys just think about AV of something that can block only the content they've seen before, so the known threats.
But now it evolved so much that it can actually block a large amount of new and unknown threats as well.
There is a group of people in the security community who really have a low regard for antivirus.
And what they often will say, I mean, amongst other things, is that antivirus— if you run an antivirus program on your computer or on your email server or somewhere on your systems, you're increasing your attack surface because there may be vulnerabilities in that antivirus software which hackers could potentially exploit in order to infect you.
And yes, that's possible. And indeed, vulnerabilities have been found in many of the major antivirus products from time to time which can be exploited.
But if you're talking about exposure, the attack surface, there is no bigger exposure than the typical computer user going on the internet through a browser with no antivirus measure in place.
If you don't have any security running on your computer, you're just opening yourself up for trouble.
And I'm very skeptical of this suggestion by this blogger that only Microsoft are doing it right.
Well, maybe he had a good experience with Microsoft in terms of integrating with his browser, but if everybody used the same antivirus software, that would be disastrous.
So everybody knew how to work around the way that Microsoft for DOS protected the system.
So now you would have the similar kind of situation where you have Windows Defender everywhere and malware writers had to only simply go around that, except, you know, apart from the other kind of tools that are there to protect your systems.
So apart from, you know, instead of blacklisting software, the right way to do it, as they say, is only to allow the good software to run and allow nothing else, which to me just seems to be the different side of the same coin, right?
It's you can never know all the malicious software. You can't always say, well, you can never know all the good software that can run. So to me, it's kind of, it's really tricky.
What about all the scripts? What about all the kind of documents that can also contain some code. So it's kind of a very difficult thing. I think it's about the same.
It's doomed to fail one way or another.
I can imagine some corporate environments in very specialist cases or particular departments where that may work, where you may be able to say, these are the only programs which you can run.
These are the ones which you're authorized to run. Anything else, we're not going to allow it to run.
But in a home user market, for instance, my Auntie Hilda or somebody like that, you can't do that with her. You can't take that kind of approach.
She just needs something really simple, which isn't gonna require any maintenance by her, doesn't require any setting up or any configuration.
That's what 99% of people require is just to run a program, which hopefully will find most of the malware attacks which are thrown against them.
Nobody's saying antivirus is perfect. It isn't perfect, okay? There's no such thing as a perfect antivirus. But some antivirus is better than nothing.
And using a different antivirus, as you said, Carole, avoiding that sort of monoculture has to be a good thing to do as well, because otherwise it's going to be so easy for the attackers to take advantage.
Rather than testing their malware against 25 different antivirus products from McAfee, Symantec, F-Secure, ESET, Bitdefender, they have to just beat Microsoft.
You know, that's really putting us in a dangerous place, I think.
And there was an interesting thread on Twitter as well of that, you know, Vesselin Bontchev, one of the kind of most well-known and the oldest kind of researchers in the AV world, kind of tried to defend the AV side saying that AV after all brings more good than harm.
And then he was kind of critical of the Google security researcher, Tavis Ormandy.
And he said that Tavis basically knows as much about as a shop window-breaking hooligan knows about the art of shop window arrangement, which was a pretty entertaining quote.
And maybe his point is much better suited for people that have a much more intimate understanding of security and can secure themselves using different security products other than AV.
He's a genius when it comes to these things.
But he imagines that everyone is just as skilled as him at disassembling every single program which comes onto their computer and be able to analyze and work out whether it's malicious or not.
So maybe Tavis Ormandy from Google doesn't need to run an antivirus, but he's not like other people. And actually, neither is Vesselin Bontchev.
They're probably closer than they imagine to each other in their personalities.
Topic number 3. That must be you, Carole.
I certainly do. And why do I do it? Ads are often annoying.
They've become more annoying over time in terms of their placements and what you need to do to get rid of them to actually get to the content you're trying to get to.
I don't like being tracked by ads, you know, and followed around the internet to different sites I go. And of course, ads can serve up malware, which we all know very well.
Now, the news this week is a company called PageFair.
Now, these guys are people that say— this is how they put it on their site— PageFair ads serve advertising in a manner that ad blockers are unable to circumvent and solves the speed, privacy, and UX issues that cause ad blocking in the first place.
So they certainly— they put out a report to say ad blocking is getting more popular amongst users, especially in emerging markets.
And, you know, they're trying to put the fear of God, I think, into people who create content. So some of their stats include 11% of the internet population now use ad blockers.
That's, I don't know, 1 in 10. That seems probably about right to me, although the internet population is obviously very large indeed. But what do you guys think?
Does that sound about right in terms of experience?
Using a computer which isn't running ad blocker because the internet looks so much different. It's like, oh my goodness, how do you put up with this? All of these ads everywhere.
But I agree that there's a huge amount of risk. I'm kind of using, well, not using Windows, let's say. So hopefully I'm a little bit more protected against some of the stuff.
So I go to some sites and I can't, I cannot even use to get to the content because I don't even think the ads have been designed for that medium very well on lots of sites.
As soon as you start scrolling, the advert appears and you have to click on it. And they probably think, oh, such a great click-through rate.
And 62% on mobile devices. And they're also saying that it's grown 30% year on year.
Now what I don't get in all this is surely this is just telling us people are not liking or trusting or wanting the way ads work today.
Yeah, it seems pretty clear to me if people are actually going out of their way to— it's almost like, you know, it's anti-dandruff shampoo, right?
You have to go out, you have to go buy it. So you have to go get these ad blockers and to turn them on and configure them.
And you're doing that 'cause you have a pain that you want to get rid of.
I never, well, I certainly never clicked on any of the adverts except by chance.
So this is where an attacker uploads a malicious advert, you know, and they can be drive-by downloads as well.
What they do is actually just have a webpage serve up the malicious ad in order to redirect you to a malicious site.
There's been lots and lots of malvertising over the years, and all the big guys, you know, Daily Mail, MSN, Yahoo, BBC, New York Times, Newsweek, AOL, NFL, I could go on.
All these people were hit recently.
They're an ad company which tries to block ad blockers, right?
They're the people who put up that irritating message saying, before you read our content, we'd really like you to whitelist our site. That's what they're doing, aren't they?
I couldn't find the secret sauce page anywhere. So if anyone does know, I would love to hear.
If it doesn't display it or it doesn't pull from the website, then it says, oh, you might be running an ad blocker.
So that's why I'm being a bit sitting on the fence until I know more.
Anyway, what is funny though is that in late 2015, PageFair, the firm we're talking about, has put out this report who works with some 3,000 publishers at the time, was hacked and left 501 publishers' sites vulnerable to malware attacks via malvertising.
So, you know.
The irony.
There's some companies who've done it quite well.
I think Google has done it really well because their ads aren't that obtrusive, intrusive, you know, just text links rather than those, do you remember, really irritating sort of graphical banner ads used to get everywhere?
And that sort of has begun to disappear a little in favor of the Google model. But I think all of this advertising doesn't really make an awful lot of money.
Which is somehow they never managed to, it's only a potential so far.
So there's lots of ways that can be very irritating. My advice on this is I recommend ad blockers. And that's not because I don't think content providers should be paid.
Of course they should. But I think we need a new way to make that happen. And there's a number of different ways you can do it.
You can have page sponsorship, which I think you do, Graham, on your website.
I have seen it in a few places. I have paid for content on a number of websites that, you know, where I think the content is valuable enough for it.
I don't think we've got the answer yet.
Before we do, we've got a little bit of feedback on past episodes. We've got Bob has written in. He says, great podcast. I prefer audio over video so I can rest my eyes.
The audio is many, many times— sorry about that— audio is many, many times superior compared to the first couple of videos and is extremely easy to listen to.
Well, thank you very much.
We've been trying to improve our audio and yeah, we've stopped for now doing the video version because we were having some problems with it, but maybe it'll come back in the future.
She writes that she has a problem with audio podcasts, says I'm partially deaf and use lip reading to complement my limited hearing. So obviously there is a value in video as well.
Obviously, Paula, if you hear this, obviously there's loads of great content on the blog as well and on security news sites where you can find out more about what's going on if the audio podcast isn't working great for you.
And we'll always include good show notes so you can read more about the issues that we've been talking about too.
So Graham, you know, tone that down. Tone that down. Don't scare cats. I'm a cat fan, so, you know, how dare you? How dare you?
And if you've got something nice to say about us or leave a review or give us so many star rating, even if we have upset your cat, please do.
It really makes a big difference and helps spread the word out there as to us.
Thanks for tuning in. If you like the show, tell your friends. Follow us on Twitter. We're @Smashin— without a G— @SmashinSecurity on Twitter.
And what's left to me is to say thank you to Vanja Švajcer for joining us once again. And until next time. Bye-bye!
Blurb:
Were hotel guests really trapped in their rooms by ransomware? Does anti-virus increase your attack surface so much that it’s not worth running at all? And 11% of people on the internet are running ad blockers, says company which blocks ad blockers.
Oh, and we have a new theme tune…
Show notes:
- Hotel guests locked in their rooms by ransomware? It doesn’t make sense
- Disable Your Antivirus Software (Except Microsoft’s)
- It might be time to stop using antivirus, and just regularly update your software instead
- No, disabling your anti-virus software does not make security sense
- Vesselin Bontchev tweets about Google’s Tavis Ormandy
- More than 10% of the Internet Population Is Now Using an Ad-Blocker, Finds Report
- A new report says ad blocking is worsening
- 500 publishers were hacked through anti-ad block tool PageFair
Hope you enjoy the show, and tell us what you think! You can follow the Smashing Security team on Bluesky.
Oh, and if you’re wondering what happened to the Smashing Security video… click here.


Enjoying the podcasts very much, in saying that I enjoyed the videos too despite the technical issues which weren't that bad in my opinion. Like the new theme although I think it could be improved by adding a saxophone in the mix to the smooth Jazz. Great topics as always and discussed in an easy to follow manner accessible to all who listen. Graham I think you drew the short straw being likened to Mutley and Vanja definitely won that one with the Count. Not wanting to leave Carole out I reckon if you took her voice up an octave or 2 she could be assigned to Roz from Monsters Inc maybe!!! (the one with the raspy voice and is revealed as a double agent) – don't hate me :-)
I've not listened to this episode yet although I will do when I get a moment.
If you want a longer more Americanised podcast Steve Gibson hosts 'Security Now'. Most of the recordings are just under 2 hours long and there are transcripts of the show online. I don't agree with everything the man says (his personal views) but his security commentary is normally very good.
https://www.grc.com/securitynow.htm
Thanks Bob. Lots of great security podcasts out there of course.
I'd recommend the SANS Internet Storm Center's daily podcast, Risky Business, and Sophos Chet Chat (although that last one doesn't come out as much as I'd like).
Two out of three of the participants of Smashing Security enjoyed your comparison of Carole to Roz from Monsters Inc (after we searched for a clip on YouTube).
We leave it as an exercise for readers to determine who may not have appreciated the comparison quite so much. :)