
Apps that belch out sensitive military information, what could the world learn from South Korea’s digital response to the Coronavirus pandemic, and who has been deepfaking Bill Clinton, Jay-Z, and Donald Trump… and why?
All this and much much more is discussed in the latest edition of the “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by Brian Klaas of the “Power Corrupts” podcast.
Plus we have a bonus feature interview with Rachael Stockton from Logmein, the folks behind LastPass, all about their report into the psychology of passwords.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
And we've mixed it up this week by bringing someone onto the show who's never been onto the show before, but he's no stranger to podcasts because it is the man behind the Power Corrupts podcast, Brian Klaas.
It's one episode a week where we focus on, you know, everything from conspiracy theories to election rigging, disinformation, propaganda, pandemics, biological warfare, all sorts of stuff.
And it's a scripted narrative-driven podcast.
So it's polished and brings together a lot of interesting experts and a lot of people who have actually lived these things, which is fun.
And the big news today, I'll say I was very, very flattered. We were nominated as a finalist for the smartest podcast of the year by the British Podcast Awards.
So I was thinking there's a lot of work that goes into each of your episodes. So had you thought about doing that beforehand?
'Cause it does fit into your wheelhouse quite comfortably. Or was this something that you reacted to because the world was melting?
So the interview that I did with the person who does epidemiological modeling of pandemics, I did that when it was starting to become clear that this was coming to Europe and perhaps the United States.
But the other stuff, there's a really interesting bit I did about this village in the UK where they effectively voluntarily locked down during the bubonic plague in 1665 and all died, mostly died.
To save their sort of compatriots. I went up there before any of this was known. So, yeah, it was sort of fortuitous.
Maybe that helps to promote your podcast.
Now on today's bumper episode, Graham tells us about an app that puts military folks at risk.
Brian reviews how South Korea handled a recent outbreak and whether we could do the same. And I'm going to look for the line between video satire and deepfakes.
Plus we have a special interview with Rachael Stockton from LogMeIn. So stay tuned after the show to find out how you can better protect yourself online for free.
All this and much more coming up on this episode of Smashing Security.
It's a mobile phone application that allows you as a drinker to check in online as you drink beer.
And so it's a free app for iOS and Android. Lets you discover and share beer, follow other drinkers.
Oh, they're drinking at home at the moment. Beer, beer, beer, beer, beer.
And catastrophe, you finish your beer. What you can do with the Untappd app is you can scan the barcode on your beer.
And as we know, people who are really into their beer are really into their beer. Well, investigative website Bellingcat, I don't know if you're familiar with them.
They've done some extraordinary work in the past using open source intelligence. They've looked into the criminal underworld. Do you remember the Russian poisonings in Salisbury?
Where those chaps came over and they claimed to be big lovers of the cathedral and knew how many metres high it was. They visited twice.
They've investigated the use of weapons in Syrian civil war. Well, now, they've turned their attention to beer drinking. They're on pandemic as well, right?
They're on lockdown, the guys at Bellingcat, and they're thinking, what can we do to amuse ourselves? So they've looked at the Untappd app.
And what they found was that it could be used to track military personnel, locate secret military installations, and even offer a glimpse at sensitive military documents.
Fancy that.
Is it the fact that if a military personnel used this app, this information could be garnered, or is the app specifically designed to try and snuffle up military info?
But according to the team at Bellingcat, all you need to do to find individuals working at military organizations or intelligence centers and track their general whereabouts is do a bit of digging deep into Untappd public data and cross-reference it with other social media.
And through this method, they were able to find, for instance, people who had checked in at Camp Peary, which is a place in Virginia, I think, where they're doing covert CIA training.
And from there, they were able to track Untappd users as they visited bases and presumably bars in the United States and across the Middle East.
They found, they logged over 700 check-ins at 500 unique locations.
There were even people who were checking in near the Guantanamo Bay detention center and other people who are also going to the Pentagon.
So this history of people moving around has all been revealed by the Untappd app.
Because sometimes the snafus which happened were quite bad because people don't just like to drink and rate their beer.
They also like to take drunken photographs of their beer bottles. And sometimes, and this may surprise you—
Right. Military documents, even an F-16 fighter jet and its location, all revealed on Untappd.
Because I guess they're sort of blearily taking the photograph or whatever and making a goof.
So on the one side, the military personnel or the users of the app need to think about what they're taking pictures of, right?
So don't take a picture of your beer bottle on top of your passport open, right?
So what did Untappd say when Bellingcat got in touch with them? Did they say, "Ooh, jeez, we're gonna fix that right now"?
And users have to consciously select the location which they check into. And so their opinion is that they've already set this all up to be as private as required.
It's down to the ruddy users.
And maybe what needs to happen is some major general to speak to the people in the military and say, stop posting that kind of information onto social media apps.
And you just need to have, you know, a critical mass arguing for opt-out of privacy settings rather than opt-in.
They basically have privacy turned off by default, don't they?
As long as I don't change anything, I'm running it as I should. But exactly to your point, they don't make it so it's the safest it can be for you.
It's so it can use as many features as possible.
And we do need to have a sort of, I don't know, some sort of mental shift when we use these apps and when we log into these websites as to what they're planning to do with our data and to double-check the settings.
Of course, sometimes the settings change without us even realizing.
And the reason is, having had two Portal calls with the in-laws to keep in touch with them during the pandemic, their dog ate the remote control or their Facebook Portal.
I think we spoke about it before and how that was logging how people were running around runways and military bases and submarines and things like that.
So the guidance from the Pentagon is that you shouldn't be using these kind of apps.
But I suspect apps like Untappd are sneaking through because your initial thought wouldn't be, this is something which is tracking my location.
But truth is, there's lots of apps out there which are asking you to check in and share information. So maybe they need to have a rethink on that.
But why is it that it takes their investigation to uncover these loopholes that could genuinely pose security risks for an entire country?
Why isn't the government spending money to, you know, as you say, you've got to have your personal device, but you can say here are the apps that you either can't use, or if you do, you have to change these settings.
And then I think it's a reasonable balance.
And then they go down that route.
So in Ukraine, you end up seeing the pockets of the Russian soldiers based on the Untappd app. You know what I mean?
Because there's a specific type that the Ukrainians don't drink and the Russians do.
And there's this story that I think is just, it was this gut check moment for me, is basically you have them reopen because, you know, the country did pretty well with dealing with coronavirus and a whole bunch of young people flock to these nightclubs where social distancing is a pipe dream.
And a couple hundred of them got COVID-19 there, which, you know, completely predictable, unavoidable. Maybe they should have kept the nightclubs closed.
But what's astonishing is the next part of the story, which is that using a series of different digital tracking mechanisms, including purchases made at the nightclubs, asking for voluntary phone data from carriers, and also some CCTV, they were able to find tens of thousands of potential contacts from these couple hundred cases.
And with the span of, I think, less than a week, tested— the last number I saw was 46,000 people in those potential clusters.
And the reason why it was such a striking thing for me was to say, you know, could any North American or European country currently do this?
And I think the answer is quite clearly no. And I don't think it's just a technical thing. I think there is obviously technical barriers.
I think there's testing capacity barriers, etc.
But I think there's also just sort of competence in government, trust in government, questions about aversion to privacy invasion, and cultural elements that all come together that mean that this really effective public health intervention is probably not going to be something we see anytime soon in European countries or the United States or Canada.
And it raises the point of sort of, well, okay, but there's trade-offs here, right? Because South Korea has, as I say, around 250 deaths.
The US is about to, at the point we're recording this, is about to be at 100,000.
And at some point you start to think, okay, what, what freedoms are we willing to give up relative to the possibility of highly invasive tracking around an outbreak and a pandemic?
And it's gonna put all these issues much more center stage, I suspect.
And what was interesting about it is they were quite impacted by the MERS outbreak.
And they changed their privacy laws at that time, which has been very useful for them during this scenario because they are using a centralized network basically to track everybody.
But one of the big things they're doing is they can basically look at banks, right? They're getting it from loads of different sources. So they're really tracking individuals.
So it's a really interesting privacy versus disease point of view, which puts me in a really difficult situation, right? You don't want people to die.
So the people that are aware of the risks of overbearing states, there's no question it's in many adults' life experiences.
And yet there's this sort of, I don't know if it's cultural or because of the MERS outbreak or whatever, but there's this acceptance that this is a rational and reasonable response.
And you think about the variation even within the United States, within individual states, right?
Because some states are much more willing to adopt this sort of policy and others are so against it.
And, you know, of course, showing up to protests with anti-tank rocket launchers and things like that to show their disdain for it.
So you're going to have quite a big, I think, variation internationally in terms of how this pans out if this becomes the new normal.
I mean, if the vaccine arrives in September, October, it's a different story. But if this is the next 15, 18 months, there's going to be massive variation on this question, I think.
Don't look at the numbers. And the only problems that they've experienced have been because they've been doing too much testing.
If they didn't do so much testing, there wouldn't be as many cases. Oh. Maybe, maybe, yeah. Do we know how popular the Untappd app is in South Korea?
I wonder whether that may have, maybe it has an additional function, which is helping people. But it is astonishing, isn't it?
How some countries seem to have really succeeded in this and others are floundering.
Because you look at the sort of state interventions that have taken public health seriously early on, and with the exception of— I guess you could also add, of course, Australia and New Zealand, though those countries are, you know, they're isolated in different ways, they face probably lower risk to begin with.
Okay, but you have those sort of four, right? You have Australia, New Zealand, Taiwan, and South Korea.
And finally, you can say, look, it's not authoritarianism, it's competent open government that's effective and state capacity and trust in government.
I think trust is hugely important so you can accept some of these things.
But otherwise, without those 4 cases, you'd have China going around the globe and saying, look, the US, the UK, France, Italy, Spain, they all had mass death.
And those are the countries that you're supposed to aspire to. And so I think it's really important to make clear it's not democracy.
It's just whether the individual leaders of those countries took it seriously early on. And I think that's really why I wanted to bring up this story.
So if you make massive mistakes in this critical first month, first few weeks even.
Yeah, he got a good fish slap in the face there, didn't he?
And I think since that moment, and since the lockdown, there's been some mess-ups on messaging, some very unclear advice, et cetera.
But you compare it to Trump and you're sort of like, well, you know, they're really trying in the UK. Like, this is a genuine effort. They're not pretending it's fake.
They're not hypothesizing about various drugs that don't work and possibly kill you or putting disinfectant in your body or a powerful light.
These things are— so to me, it's one of these things where it's the perpetual lowering of the bar. But I sort of look at the UK and say, well, it could be much, much worse.
So I'm going to play something for you, and I want you to tell me who does this sound like? Who is this voice? Okay. Give me a moment.
You other brothers can deny that when a girl walks in with an itty-bitty waist and a round thing in your face, You get— Sounds like Bill Clinton. Bill Clinton. Okay, good.
Now I've put it in the show notes if you guys want to have a click on through to the channel. So you guys can see the playlist and stuff and you can see what's going on.
Now for you listeners at home, this is basically a site that purports and proudly states that it synthesizes voices and pairs them with a non-expectant text.
So you have Bob Dylan Billie Eilish covering Britney Spears. You have Frank Sinatra crooning Dancing Queen. You have various presidents reciting rap lyrics. You even have George W.
Bush take on 50 Cent's In Da Club.
Now you can see on the page, you can see that at the end of each title of any video, it says in brackets, voice synthesis. Yes. Right.
And so, and then underneath in the description, it says the voice in this video is entirely computer generated using a text-to-speech model trained on the speech patterns of Jay-Z or whoever he's mimicking in that particular video.
Apparently, the YouTuber behind the Jay-Z deepfake says they were created by Tacotron 2. This is the text-to-speech program from Google.
It's almost you're at a presentation or something. So there's a slideshow and then you hear the voice of the purported person behind it.
But I understood it as these GANs were used to create new content using machine learning and AI. Again, I'm a political scientist, so I'm wading outside of my comfort zone.
So according to Ars Technica, right, this was April 26th, a new video— this is how it all came to light— a new video was posted on this channel, right, saying that YouTube had taken down the Jay-Z related videos.
There were two of them that he created.
One was Shakespeare's "To Be or Not to Be," which we were listening to earlier, and then there's Billy Joel's "We Didn't Start the Fire." And apparently the request came from Jay-Z's company, Rock Nation.
Now, the way in which voice synthesis told their followers was rather novel.
They put together a video featuring the simulated voices of Barack Obama, Donald Trump, Ronald Reagan, JFK, and FDR to explain this.
He would to emphasize that all of the videos on this channel—
Because this guy is kind of saying, I'm thinking he's going, look, I have been super clear on my channel that I'm doing this for fun and I'm taking a synth voice, not the real person.
If they're shared on social media, I suspect you might see the title, maybe.
But having speech synthesis in brackets at the end, you might only see the start of the title on your mobile phone. I'm a little disappointed they didn't get Mr.
Rogers to join in on the rebuttal as well. That would have been a bit classier.
And I think what Photoshop did for photos was that people started to understand that it could be doctored easily. And I don't think that most people have made that leap.
Most people who are not dialed into this world of disinformation have made the leap to understand how easy it is becoming to do the same with video and audio.
And I had this debate, I hate to do the plug of the podcast, but I had this episode called The Godfather of Fake News, where there's a guy who just deliberately writes fake news.
That was a brilliant episode. And he just, he does it for clicks, right? And he makes money off of it.
And he has in every single post, a disclaimer that says this is satire, but it still goes viral.
And you know, a lot of the people who are consuming it don't know what the S means on the story. They don't understand it. They don't click on the actual story.
So the headline seems plausible and the story is absurd. And I think with this, it's the same type of thing, right?
You could just have it go around the world and change people's minds and have them either vote on it or make decisions based on something that's totally wrong.
And I think the scariest thing is the idea of the world leaders because they can miscalculate in terrible, terrible ways.
You've got Bernie Sanders, you've got past presidents, you've got Ayn Rand.
And I'm going to just stream it live. And I'm so glad because I was worried that you think it was unfair that I used your voice. And I'll add in some, "Oh, Piers, I love you.
You're so great. You're fantastic." That's okay, right?
And they reappeared because Google said, actually, the takedown requests were incomplete.
And so the YouTube spokesperson told Ars Technica that the videos have been temporarily reinstated pending more information from whoever filed the claims.
So now the ball seems to be in Jay-Z's court. And this is really interesting for me. So this is why I come back to the 50,000 subscribers.
So for Jay-Z to go after someone with 50,000 subscribers is an elephant going after a flea. So he will build this person's channel by going after him.
Carole, is it possible that the person who's made the complaint isn't actually Jay-Z, but is a deepfaked Jay-Z who's making the complaint?
And now Google has thought, oh, maybe this wasn't a real complaint and therefore we're temporary. And now this channel's got all these interest.
This is only— the only reason we say that is because the YouTuber himself or herself said that.
Can't you look into this?
And so he has to get rid of this one problem. Told you he was a professional.
So the whole issue is this is kind of cool because satire, no one's ever gone after Weird Al Yankovic and succeeded just because he did satires of all their songs.
And as far as I know, he didn't pay for the rights to do that. Everyone knew what was going on.
But the gray line between the satire, the pastiche, and the, "Hey, that's my face," or, "That's my voice," and I don't want to be fluffing Piers Morgan verbally.
Can you even copyright your voice?
Any advice?
Because any file which you put on Dropbox or Google Drive or OneDrive or those other sort of cloud services, it could be accessed by that company or indeed law enforcement or any hacker who broke into your account.
So what I would recommend is use a piece of software like Boxcryptor. It's what I run on my computer.
And any file before it gets uploaded to those cloud services gets encrypted with my own keys, which I control.
They're offering a fantastic 40% discount to listeners of the Smashing Security podcast.
If you want a Boxcryptor personal license for private use or a Boxcryptor business account perfect for the self-employed, go to smashingsecurity.com/boxcryptor.
And basically, as we do more working and purchasing and socializing online, hackers are chomping at the bit to take a little piece of us away.
The best thing you can do is get a password manager to help you make unique and difficult-to-crack passwords for every single account you have online.
Check out LastPass's report for loads more tidbits at smashingsecurity.com/lastpass.
Immersive Labs gives security professionals practical and gamified content to keep pace with the latest threats.
Sign up to get instant access to more than 24 hours of free labs and a new lab to try out each week.
Latest being their red and blue team labs on the SaltStack vulnerabilities, which were in the news last week. Go check it out at immersivelabs.com/smashingsecurity.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
It's not really strictly speaking security related necessarily, but kind of anyway, see what you think.
My pick of the week is a blog post by a chap called Ranjan Roy, and I will link to it in the show notes so you can check it out some more.
But he's talking about a friend of his and his friend owns a few pizza restaurants.
And for 10 years, his friend resisted offering delivery of his pizzas because he was, I'm a classy joint, right? I'm not offering deliveries.
Come in, have the in-restaurant experience. It'd be better than Domino's. Takeaway, do you do that? I don't know. I don't have that information.
Saying, I got the wrong pizza, the pizza was cold. And this restaurant was, well, we don't, what? We don't do deliveries. What are you talking about? What are you complaining?
And it turned out when he looked up his own shop on Google, there was a delivery option listed in the Google listing and it had been put there by an organization called DoorDash.
And DoorDash, I think, they're Deliveroo or Uber Eats. They're an online delivery service, right? Who work with different restaurants.
Now, the guy who owned these pizza restaurants had never arranged for DoorDash to deliver his pizzas.
DoorDash had taken it upon themselves to do that, and they'd rather provocatively listed themselves.
They didn't have the proper bags for the pizzas, so they'd arrive cold, and you know, it wasn't always brilliant service, but it was the genuine restaurant employees who were wasting time dealing with all the bad reviews and the customer complaints, right?
So they were a bit miffed about this.
But then when they were looking at the listing on DoorDash as to how you could order pizzas for delivery from their own restaurant, they noticed something odd, which was they sold pizzas for $24, but you could have the same pizza delivered by DoorDash for just $16.
So, DoorDash had taken the price for a plain cheese pizza, scraped it off the website, and somehow they had applied it to a specialty pizza with loads and loads of toppings.
So, like you said, someone could pay DoorDash $16. DoorDash would go into the restaurant, pay $24 for the pizza, and deliver it. So what does the owner of the restaurant do?
He orders 10 of his own pizzas via DoorDash. Brilliant. He was charged $160. The DoorDash driver then shows up, pays him $240. Brilliant. And takes away the pizzas.
So he's making— Well, it's keeping his costs down. Now, the story goes on from there, and it's well worth a read. I'm bookmarking it right now. I would recommend it.
So, yeah, so there's actually some hope, I think, for restaurants during the pandemic who maybe don't offer delivery.
Maybe there's some intermediary who'll do it and actually make you money in the process. You just order your own pizzas to be delivered to the kitchen around the back.
And so what I've been doing is watching a lot of old stuff. And so what I've gotten into recently is one of the weirdest shows that I like. It's called Iron Chef Japan.
When it was originally broadcast in Japan, of course, it was not called Iron Chef Japan, but it's one of the weirdest cooking shows you'll ever see. It's incredibly over the top.
And then he takes this bite out of a bell pepper, and that's the intro.
And the way that the setup is, is you have these 3 Iron Chefs, Iron Chef Chinese, Iron Chef French, Iron Chef Italian, sometimes Iron Chef Japanese.
And there is a theme ingredient that a challenger will battle them on within Kitchen Stadium, which is custom built for this show.
So the point is that they— these Iron Chefs come out of the floor with dry ice and lots of—
And there's a series of tomatoes. And then they have an hour to make between 3 and 6 dishes using that theme ingredient as the main thing. And they're rushing around and stuff.
And then they have various B-list celebrities from the Japanese 1990s to judge them, an opera singer who will say, oh, this is really great.
And then the next person is actually a food critic and they're, this is garbage. And of course, it's just the most incredibly weird Japanese show and I love it.
And it gets your mind off of the pandemic nothing else.
The guy she's in love with, he is a bastard. It's just like, what a git. Unbelievable. Anyway, fascinating. Anyway, excellent. Well done, Brian. Carole, what's your pick of the week?
The podcast from the New York Times." And he said, "You have to listen, you have to listen, you have to listen." So as I was doing some gardening last few days, I've been listening to Rabbit Hole.
I've listened to three or four so far and I'm totally hooked.
So the first part was a three-parter on this guy called Caleb, and he had offered the journalist Kevin Roose his entire YouTube history for four years.
And Kevin Roose then went and also looked at the algorithms that YouTube were using and when the algorithms changed and tried to match the patterns to see if there were switches in how he viewed the world or what he was viewing.
It's totally fascinating.
Oh, you like this? Let me give you more of it," and really underline the point so you think everyone's thinking that way.
And it's true, if you think about it, you probably look up chess stuff all the time, and then probably in your feed, it's always offering you new, probably the same chess videos you've seen millions and millions of times.
You're looking for new games potentially, and you're finding, "Why am I always being referred back to these same ones all the time?" Anyway, you can listen to the podcast and find out.
It's really good. I even reached out to Kevin Roose to see if he wanted to come on the podcast, so let's see. It's that good. In the meantime, go listen to it. Go listen to it.
It's called Rabbit Hole from the New York Times. There is a link on our webpage and show notes.
Because whenever I've realized that something is storing a history of me, I just work out how to turn it off and delete it as quickly as possible.
But I also felt that what they did call attention to showed a kind of route. You could see how that route would happen.
So, you know, there's artistic license and there's curation happening there.
But at the same time, there is an interesting approach to looking at how the internet might be shaping our brains.
I'm sure lots of our listeners would love to follow you online or find out more about your podcast. What's the best way for folks to do that?
And you can follow us on Twitter at @smashingsecurity, no G, Twitter won't allow us to have a G, and you can also make sure that you never miss another episode of Smashing Security by subscribing in your favorite podcast app.
Also, a huge thank you to this week's Smashing Security sponsors: Boxcryptor, Immersive Labs, and LastPass. Their support helps us give you this show for free.
Oh, and stay tuned after the show for our special interview with Rachael Stockton.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
Now, things at work must have changed particularly a lot for a company like you because it wasn't down tools time for LogMeIn, was it? You guys must have been really busy.
So we've really been trying to make sure that our customers are having what they need so that they can continue their business as much as possible.
This is our market and this is what our market requires of us. And suddenly that flips on its head. So what changes have you seen from your customers?
How do we make sure you are more productive at home as a worker, but also as an individual?
And on the LastPass side, we spent a lot of time on businesses, but we also spent a lot of time making sure consumers are safe.
And one of the things, you know, that being at home and having all of our stores shut down, I think has really driven is, I know myself, I've set up so many more online accounts, just trying to find different places to get food delivery.
You know, where can I get the best meat and all of this different stuff? And all of those accounts, more passwords, and all my friends are doing the same thing.
And there's so much more online shopping. So we're really taking our real lives that were outside and with people and then moving it much more virtual.
I've been using a password manager for so long, I can't think of the last time I created a password where I had to kind of go, okay, what random 5 words can I put together that I'll actually remember?
So obviously there's still people out there that do that. And you guys pulled together a pretty interesting report.
I had a read of it last night and this morning, and there's some really good stuff in there. I loved how you narrowed down the riskiest behaviors.
Maybe we could start there and go through some of that.
And I think one of our takeaways is this concept of dissonance, which I think we're all very familiar now, right?
Which is, I know I need to be doing one thing, but I'm really doing another, and you get that friction in between.
And what we found from this report is, you know, I'll tell you, people out there, they're really smart.
They know that using the same kind of password or variation or reusing the password is really risky, but more than two-thirds of people still do it. Okay, that's so interesting.
So, so people now know, this generation knows they have to use different passwords, but they don't know how to, or it's too much work, do you think?
I want the key to my I want to know it myself. And by asking people to create really complex passwords, that takes away that sense of control.
Because what we also found is people are afraid of forgetting their login information, and they want to be in control of these passwords.
But the problem is that control is making people have risky behavior.
And a product manager that I used to work with gave just, I think, the best example of where passwords need to go from sort of a human perspective.
We need to think of passwords like we think of phone numbers. I know my phone number. That's pretty much it. And I'm okay with that because I have my phone.
And so we need to think about passwords too. We don't need to know our passwords because we have tools like LastPass and other password managers that can remember that for us.
"LastPass, it's this." Or would you have no idea?
So you want to be in control and, you know, we are all, you know, slightly self-centered.
And I think that we believe that in the end, you know, nobody really cares that much about me.
Nobody's going to go after Rachael Stockton and my bank account and my retail accounts because, you know, whatever.
Therefore, people are just making a storm in a teacup." But you know what?
It's about the hundreds of thousands of records that are being stolen, and it's about the algorithms and the power that hackers have in their own systems to use and plow through that information to then take those passwords and not only get into the accounts that they stole from, but then use those passwords and try various variations to get into the plethora of other accounts that you have, including your work accounts.
So it goes beyond just you. They're not after you, but guess what? They're gonna find you anyway, and you're still worth money to them.
They're either using the same password or using small variations of it. This is basically, what's it called, like a red flag to a bull, I guess, for those hackers out there.
So this was a worldwide report. So did you guys look at different countries?
But one thing that we saw in Germany is that only really about 30% of them are using this variation of 1 to 2 passwords versus globally 66%.
So there does seem to be a little bit more action-oriented there and maybe a little bit less dissonance.
So they're the lowest that you guys were able to spot?
A couple of the other things that we saw even beyond passwords regionally was multifactor authentication.
For example, in Singapore, which is a region we don't talk that much about, we actually saw a big increase in multifactor authentication use, both from a work perspective, which the end user really can't control, that's up to the business, but from a consumer perspective too, with more than 70% of people responding that they are using multifactor authentication to protect their consumer accounts, which is great.
That's really interesting.
There's some upcoming legislation in Brazil, so an entirely other region, where they actually understand a little bit better that their accounts are valuable to a hacker.
So I think that there's still a lot of education going on regionally, and a lot of it is driven both by, I think, businesses.
And what I mean by that is I'm gonna say the websites that you shop at, trying to one, educate people a little bit more about having tougher passwords, putting those requirements in, but also making multifactor authentication more available and having more integration.
There's been a lot of companies in the press that have either been breached or they've claimed they've had great security and they haven't had great security.
And people are just kind of like, who do I trust? And that's got to be challenging, right? So how do you go about building trust?
What can you tell companies to do to help build trust, to help improve their businesses right now?
Two, ensure that the consumer, that we understand what you're doing to protect our information. And then if something happens, let us know.
It becomes even more frustrating when it's 5 months down the line.
You know, when we read those articles that these breaches have happened and now we're being notified, we understand, I think now, that breaches really are part of everyday news.
But it's really, I think, how people are handling them and how companies are handling them that helps either one develop that trust or rebuild that trust once one happens.
It's about putting them in something to ensure you can create the strongest one possible that you will not forget. It's unique.
And if and when it gets breached, you only have to worry about that one account. You don't have to worry about the other 10 that are using that LastPass.
And then, you know, you can easily go in, change that password, and then you're protected again.
If your password gets breached and you're using the same password across your hundreds or even maybe thousands of accounts, you have to go through every single one and change those manually if you don't have unique passwords for each one.
Yes.
So we talked a little bit about it regionally. Overall, which is some good news, is there is an increase we found in this survey of both the awareness of multifactor authentication.
Something you have, something you are, something that you know, right? That combination.
And that use with more than 54% of people globally are using it for some set of personal accounts that are allowing it.
So I think that's really important because then even if that really secure password does get breached, you're still protected with multifactor authentication.
So that account is still protected.
So I love having something you know, something you are, something you have. I think using two of those at every opportunity is great.
So there are a lot more reasons why we may be contacted by odd people within our organization.
And so I think that's also why it's important to think about password management as well, because you need to be getting to a site. You can get to that through the password manager.
If you're clicking on a site and being asked to fill in your password and it's not automatically being filled by your password manager, you know, look at that site.
Is that the right one?
I think there are ways we can also use these tools to help prevent some of the increase in attacks that we're seeing as well beyond just protecting the password.
So there's no excuse for people not to use a password manager. This is the time, isn't it?
The best about the free product, to be honest, is I spend so much time on my mobile phone, and I have the iPhone, and I know exactly how much time I spend on it.
I hate getting that report.
But I think it's also important to recognize that these same things, you know, you want to be able to have this access on your mobile device your phone, your tablet, as well as your computer.
And so being able to access all your passwords no matter where you are, I think is really important too. And I want people to understand that that's out there now.
You don't have to worry about getting into your accounts if you're on your phone and you don't know your password. It's one solution for all your platforms.
She's an actress comedian who's based in Toronto, but she's trapped in an apartment like millions of other people out there. And her life's obviously changed dramatically, right?
She's not, you know, she's on stage. But one thing that hasn't changed is she's never given a hoot about security.
And so the game plan next week is to see if Graham and I can convince her to at least do something to improve her security now.
So I'm going to try and get her to go down the password manager route, and I'll let you know how I get on.
So consumers, check it out. We'll put all the links in the show notes. Rachael, always brilliant to have you on the show.
Being chased by ghosts.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Brian Klaas – @brianklaas
Show notes:
- Military And Intelligence Personnel Can Be Tracked With The Untappd Beer App — Bellingcat.
- What South Korea's Nightclub Outbreak Can Teach Other Countries — Time.
- When audio deepfakes put words in Jay-Z’s mouth, did he have a legal case? — Ars Technica.
- Jay-Z’s Deepfake Hamlet Recital — To Sue, Or Not To Sue — Forbes.
- Vocal Synthesis — YouTube channel.
- Doordash and Pizza Arbitrage — Ranjan Roy.
- Iron Chef Japan episodes — YouTube.
- Rabbit Hole podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass’s “Psychology of Passwords” report surveyed over 3,000 people around the world to highlight the current state of online security behaviors – and the results are alarming.
Download it now at smashingsecurity.com/passwordreport to learn more.
Immersive Labs gives security professionals practical and gamified content to keep pace with the latest threats.
Listeners can signup at immersivelabs.com/smashing to get instant access to more than 24 hours of free labs AND a new lab to try out each week.
Boxcryptor encrypts your sensitive files and folders in Dropbox, Google Drive, OneDrive and many other cloud storages. It combines the benefits of the most user friendly cloud storage services with the highest security standards worldwide. Encrypt your data right on your device before syncing it to the cloud providers of your choice.
Listeners can get a 40% discount on the Boxcryptor Personal License (private use) and Boxcryptor Business (perfect for self-employed) by visiting smashingsecurity.com/boxcryptor now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


