
Coffee machines catching ransomware, Blacklight shines a torch on website tracking, and a woman is freaked out that a complete stranger can turn off her home’s security system.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire’s Dave Bittner.
And don’t miss our featured interview with Greg Jensen from Oracle, who talks all about five free reports he has put together for listeners about cloud security.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Shout out goes to Evan, John Wilson, Tim DeRook, William Carlson, Andrew Davison, Colby Allred, Chris Pestle, Kazie S, Werner Oving, and Uli Muli. Thank you, all of you.
Your donations help make this show happen. If you'd like to join this amazing community of Patreon supporters, you need only go to smashingsecurity.com/patreon.
Now let's get this show on the road. I'm trying to find one with lots of tracking to see how we can see it.
Now, coming up on today's show, Graham talks about yet another one of his pet peeves, coffee.
Dave has an easy peasy tip to reveal how websites spy on us, and I'll look into just how smart home smart security actually is.
Also, I had a cozy chat with cloud security expert Greg Jensen from Oracle, who shares his expertise and a few freebies.
So buckle up and listen up as we have all this and much more coming up on this episode of Smashing Security.
But one of them—
And frankly, I love drinking coffee.
That wonderful, wonderful feeling in the morning when you get to make it, the experience of making a beautiful coffee, that going— well, not now, but in the olden days, going out and meeting people for coffee and having a little gossy goss session.
And so I will take a sip and then I'm reminded of just about how horrible it really does taste and put it off for a few more years. I'm good.
Ever since, people have thought, wouldn't it be a great idea to connect coffee machines to the internet? And why not?
And of course there've been diversions, there've been connected fridges and vacuum cleaners and toothbrushes and internet sex toys and things like that.
And we know that all of them have performed perfectly without any problems, right?
There've never been any trouble with any IoT devices connected to the internet, especially these things which you wouldn't normally associate with being connected to the internet.
Well, one coffee maker manufacturer, which goes by the name of Smarter. That is the name of the company.
Worked out how it could be remotely accessed, and he showed how easy it was to send commands to make a cup of coffee, or use the filter instead of the beans in the grinder, and you know, keep coffee warmer for longer.
And the Smarter Company, they did respond because they produced a new version of their coffee machine, which fixed some of the bugs which he was able to exploit.
But the problem was this. When you buy a coffee machine, particularly one which you might have spent a decent amount of money on, how often does it get updated?
How often do you refresh it? And they weren't pushing out updates for the old one, so there weren't updates.
Typical fridge only gets replaced every 17 years apparently, but IoT appliances might need to be updated more often than that, right? Especially if they're not receiving patches.
Now, this week, a researcher with Avast, name of Martin Hron, that's Ron with a silent H, or maybe you do pronounce the H, Martin Hron, he decided to perform what he called a thought experiment with one of these older coffee machines.
He was curious as to whether he could reverse engineer it himself and then exploit it.
And as a consequence, he was able to trick the coffee machine into installing a bogus unauthorized update.
So you have a 3-year-old that throws a ball at the mother or something, because he's just throwing something, and the thing comes around and goes— and shoots it out of existence.
He thought, well, maybe what I could do is I could use the processor on the coffee maker to grind away earning cryptocurrency. He said, would that be possible?
And he reckons that's feasible, but because the speed of the chip's only 8 MHz, it's quite slow.
And so he effectively wrote a ransomware proof of concept, and it doesn't encrypt your drinks. Instead, what it does is it locks up your coffee machine.
So your machine is now beeping, it won't make coffee, it does occasionally spurt out hot water, and it displays on the screen, on the little panel, displays a little devil-like icon and a short message telling you to go to a link to unlock the coffee machine.
But of course, you're not going to pay more than $250 because you could just chuck it in the bin and replace it with another one.
Or you could just stop drinking coffee, which might be a good thing. But then if everyone stopped drinking coffee because of this, industry could crumble.
Society would be devastated. It would be end of times.
You have to be on the same Wi-Fi. So you'd have to go to an office which you knew was using this make of coffee machine. Or a home which was, with your little phone to infect it.
Or you could, in theory, infect the router, and then it would remotely infect the coffee. I'm not sure if anyone would actually bother doing this, to be honest.
But if they did, I wonder if they'd suffer similar problems.
Now, normally with these kind of things, you think, well, just turn off the Wi-Fi, disconnect it, don't allow it to connect, don't give it your Wi-Fi password.
I will start broadcasting my own Wi-Fi hotspot. Default username.
I know certainly, Carole, you probably spent a lot of time out in the clubs and the discos dancing. What's he saying?
So there are light bulbs that are blacklights, there are fluorescent lights that are blacklights, and it is a thing — if you go through a carnival funhouse, it's the light that makes things glow.
It makes your t-shirt glow.
Earwax, right? That's exactly what I was thinking. So they fluoresce under black light, which means they glow under black light. So good word. Thank you very much.
So, and this became all the rage probably about a decade ago.
There were lots of TV shows that basically— and local news shows were taking their black light flashlights to local no-tell motels.
You know, how did the stain get on the ceiling fan?
And you hope that the cleaning crew is vigilant. And at the very least, you have a fresh set of sheets on the bed.
They have developed a tool that they call Blacklight, and it is a real-time website privacy inspector.
And so what you do is you put the website address in their little menu item there, and you hit the Scan Site button, and it will give you a report of how your site ranks in terms of the number of scanners and things that may compromise your privacy.
Now, Graham, I know you were looking through the show notes and you loaded your own Graham Cluley site on here. How did you do?
And I also put some other pages into this, and I was quite surprised.
Some sites, including some which you would consider to be security-related, are doing an awful lot of spying and sometimes creepy spying on their users.
So, for example, if you're using the free version of Disqus. It's an easy way to add commenting on your site.
If you're using the free version of that, well, the reason that it's free is because they insert ads, and those ads have trackers.
And so there are all sorts of things where just by making use of a free tool, you may end up with a dozen or so trackers on your website that you didn't mean to install.
They went and scanned hundreds of sites and they found For example, I think there was a site that provided women's healthcare services, pregnancy services, and things where privacy is a real concern, that were doing tracking that the organizations weren't necessarily aware of.
They found a bank that was doing keylogging of username and passwords, and sending the username and password in the clear to a third-party organization.
They say, I like to think of Blacklight as a meat thermometer that you can stick into any website and get an instant reading on its level of creepiness.
I'm trying to find one with lots of tracking to see how we can see it.
It's looking, it's searching. Wow.
And if the total number of connected devices doesn't shock you, consider the amount of data these devices are expected to generate.
So Cisco has estimated that nearly 850 zettabytes will be generated by all the people, machines, and things by 2021, 3 months from now.
Now, a zettabyte is equal to about a trillion gigabytes, and 1 trillion seconds is equal to about 31,000 years, just to give you an idea of how much data we're talking here.
A lot of data.
According to Statista, the number of smart homes in the market worldwide is expected to be almost 500 million in 2025.
And I suspect actually with the onslaught of COVID we're gonna smash through that prediction with ease.
And one of the areas that I wanna talk about today in the smart home technology segment is the security element, the home security.
This huge market expected to reach $8 billion in a few years, and it's growing at a clip.
Literally, I think every 2 or 3 podcasts I listen to has some ad about how I have to live in a digital fortress to feel safe and secure in my house. Have you guys heard these?
So my first question here, the question I was hoping to answer is, is a smart home safer than a more traditionally secured home? So traditionally we're talking things like what?
We're talking high fences, a dog perhaps.
For example, I remember years ago when I was first out of college and we were all living in apartments and so on and so forth.
I had a friend who was just super nervous that someone was going to come and steal his stuff to the point where we were out at dinner one time and he said, "Listen, I've really got to get back.
When I left the apartment, there was someone out in the parking lot who I didn't recognize and I'm afraid—" I just gotta get back to check on my stuff. It's absurd.
But my point is that I think by being able to monitor all of these things in real time, you kind of get hooked on that.
Oh, let's look out to see what the camera's doing in the backyard. Okay, all clear. Someone walks by in front of your house and you get a ping on your phone. Who was that?
Who was that? You can go look it up and see who it was. And so you get hooked on that.
And so, the first day, my son goes in, and he feeds the cats, he gives them the food, and he, you know, he pets them a little bit.
And he gets a call a little bit later from the woman, and she says, listen, according to my alarm system, you only spent 2 minutes in the house. That's not long enough.
Yeah, we were talking about playing with my cat as well. Yeah. So my son is Dad, what?
But again, it's that anxiety — the fact that she could monitor what was going on, I think that's what they're feeding into and they're making money off of it.
I even saw one of these sites in my research that offers watering plants, except it detects when it rains, so it doesn't do it then, so that a burglar — what, was burglars going to check your lawn and go, "Oh, looks a bit dry, but he's not home?" So weird.
We've heard tons of instances where it's failed the user, smart security, haven't we? There's loads of fails.
There's baby monitors being hacked and scaring the shit out of customers or Home Assistant inadvertently recording and storing those recordings.
And it's just in my experience, every single one has a different configuration option list and a design, a different UI, making it super difficult for the average user.
And many people on these things identify themselves through their own email account, their primary email account. And as we know, if they get compromised—
Apparently last year in 2019, there was 2 billion records were exposed in this massive smart home breach that affected the customers of a Chinese company called Orvibo.
And they didn't get much, don't worry.
It was email address, passwords, account reset codes, precision geolocation, IP address, username, user ID, family name, family ID, smart device, device that accessed account, and scheduling information.
So CBC, a Canadian broadcast company, published this article on Monday where this homeowner said she got a message from a stranger saying he had complete control over her home.
And quote, as she stood alone in her front hall, she watched in disbelief as the man unarmed the system, unlocked doors and windows, and told her he could track her when she left the house, all with a few clicks of the security company's app.
Any idea what might have happened?
So she signed up to be on their discount thing and she used the same email address and password as her home system.
And the man behind the counter had a shine for her so he went into the system and looked it up and that's how he had access to her home. That's my guess, Carole.
He swore up and down that he made numerous calls to cancel the service weeks before she moved in, but somehow he still had access.
Now, question number two: why would this happen, do you think?
Why would — if he's called Superior lots of times and said, "Come on, cancel this, cancel this," why would they be dragging their feet?
I think if you read your terms and conditions," Sorry, that ugly word rears its ugly head once again.
But you will have seen in the fine print that you actually have to give us 60 days notice or 30 days notice or 45 days notice before we can cancel.
So I'm afraid, sir, you're going to have to keep paying us until— but we've logged your request.
So it turns out that loads of people are trying to actually do the right thing, cancel their accounts in time, but the long cancellation period in the policy basically makes it impossible.
Guess what? They don't cancel the account or his access, and the fallout is the same. He has complete control over a house that is now occupied fully by its new owner.
The guy, after he told the owner and explained his whole situation, he contacted the provider and he was told, he said, "Again, I really want to have my access revoked." They said, "I'm sorry, you're going to have to wait still a few more days before we can cut you off." He told them, quote, "So you're going to give me access to somebody else's house?
I literally could go on the app, I could watch them leave the house, I could walk up to the front door, unlock it, disarm the system, walk and steal everything in the place because an alarm company gave me access." And in 30 seconds, he was deactivated.
Could he not have shown some self-restraint if he was the only per— I mean, he was the person who had this access, and he knew he had this access, and he knew that access was wrong.
And then he's oh look, I've been given I shouldn't have access. I shouldn't have access. And then he accesses it and then he shows that he can do it. Just don't use it.
Just grow up, man. Why on earth are you doing this? Fiddling with someone else's back door?
Because the problem is, you see, that if you're a bad guy who has access because you were the previous tenant, you're not going to tell the company, "Oh, by the way, can you cancel this?" are you?
So that doesn't actually work. He's going to retain the access. So I don't understand.
He's just given a scenario where he's a good guy who cares about this, who wants to cancel it, and they won't cancel it.
I'm saying if you were a bad guy, you wouldn't request to cancel it.
And he was able to, on his app, still get the GPS location of the car that was no longer his. He was able to unlock the car. He was able to remotely start the car.
You're not going to take that with you as you leave.
Did you then have all the locks changed, or did you trust that the old owner was giving you all the keys?
So if you had a clean burglar that just came in and said, look, I'm really sorry, I stole your computer because I'm starving, and thank you very much, goodbye.
Oh, sorry, I imagined.
Now everyone knows about LastPass's password manager for end users, but it's also a great solution for businesses.
In fact, tens of thousands of companies rely upon LastPass to protect themselves.
LastPass Enterprise simplifies password management for companies of all sizes and helps you secure your workforce. So, whatever the size of your business, go and check it out.
Go and visit lastpass.com/smashing to find out more. And thanks to LastPass for supporting the show.
Well, you're not alone, but thankfully the cloud security experts at Oracle are here to help.
You see, they've made available to Smashing Security listeners 5 reports that deep dive into different security issues all pertaining to the cloud.
You can access these for free at smashingsecurity.com/oracle. That's smashingsecurity.com/oracle. And thanks to Oracle for sponsoring the show. And welcome back.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Better not be. Now, my pick of the week this week, well, I am going to draw my— actually, Dave, you love a bit of music. I do, yes.
So what I'm going to do is I'm going to sing the opening line from a song and see if you can carry it on.
And specifically, it is a YouTube channel called You Can't Unhear This. Now, you might be curious as to what You Can't Unhear This is all about. It is about the quirks in some songs.
And specifically, the channel owner seems to have focused on Beatles songs, although he may branch out in the future as well, because there are little curios locked away in some of these songs.
Things which, once you have heard them, you never miss them again.
So it may be an incorrect note, or it may be, for instance, if you're listening to Strawberry Fields, which famously is two tracks sort of edited together at one particular point.
It goes from a track and then it goes to one which is being played at a different speed, and it's beautifully done.
Or if you've heard the song Hey Jude, you know Hey Jude, which apparently Paul McCartney has now sung over, I think, 66,000 times during his career.
So someone's worked out how many Hey Judes he's— how many na na na na's he said. There is a point in Hey Jude when he's singing where you hear "fucking hell" in the background.
And once you've heard it, you can't mistake it. But that's a song which is played all the time and people, it sort of drifted past them.
And there are also questions like, for instance, at the end of All You Need Is Love, there is a bit as it's going out where someone sings, "She loves you, yeah, yeah, yeah" at the end of All You Need Is Love.
And there's been long debate— is it John or is it Paul singing? And this guy goes into forensic detail, including video footage, to work out exactly what happened.
And it's— it is genuinely quite fascinating, the true story of who said that and how it— are you going to tell us as well? No, you're going to have to watch the link.
And you will wake up in a cold sweat when you're 74 years old thinking, "If only." No gaslighting or anything, everybody.
"If only he had told me that." And that is why this is mine and not Carole's Pick of the Week. You Can't Unhear This on YouTube. Dave, what's your Pick of the Week?
It so rarely happens that you get actually really good design, design being part of conveying information. And I think this is a really good example of that.
This is a story they published. It's called New Climate Maps Show a Transformed United States.
And I apologize for this being US-centric, but it also has to do with Canada, so there you go.
So what this is, is a story about how climate change is going to affect where people live and, perhaps more importantly, where food is grown throughout North America.
And as you scroll through, it shows you a live map that's changing as the information scrolls by, and it shows you where people live and where food is grown, and as the climate continues to warm, which seems to be the track that we're on, how that will affect things.
And the bottom line is that things are going to move north.
People are going to have to move out of the American South because it's going to be too hot for people to live there comfortably, hot and dry.
Now, selfishly, I was looking at this in my own, my home state of Maryland where I live.
Where I live seems to be in the green zone, but you have to consider that all those people living south of us who are gonna have to go somewhere, they're gonna be heading north.
And so what I've been wondering is, is now the time to buy up cheap farmland in West Virginia, which can be had for practically nothing at all?
As these people move north, they're gonna have to have places to go.
So should you be buying up cheap land in places like that and maybe in Canada because over the next few decades—
So highly recommended over on ProPublica. We'll have a link in the show notes, right? Absolutely. And that is my pick of the week.
Hank the Cowdog is the self-declared head of ranch security. There, I've done it again.
He finds himself smack dab in the middle of a host of tangled mysteries and capers that span the universe of the Texas Panhandle cattle ranch Hank calls home.
It's the longest sentence in the world. So basically, he's the head of ranch security, and he gets up to all kinds of mischief and mysteries.
This multi-winning collection of books has become a brand new podcast, which came at the beginning of this month.
It's fun, it's crazy, it's wonderful, and it's for kids primarily. So this is a podcast that you will enjoy if you like Matthew McConaughey, unlike these two dozos.
And you should take a listen and try it out. So you can find it, it's called Hank the Cowdog. You can find it wherever you get your podcasts.
Your titles in technology are so long. They are. Tell me your title. Tell me, you'll be better at it than I am.
Have you been there a long time?
And so it's a very fun organization to really find some amazing projects to attach yourself to. And grow within.
Over the last 8 years, we've seen the cloud really kick in, and it's been an amazing time just for me personally, just being able to see this big movement of cloud within our customers, within my own team, and be able to see this big wave move.
And I know that LinkedIn put out some numbers about that, but effectively. Yeah.
What we're seeing is what people are actually, you know, because of this pandemic are actually moving locations. Yeah.
What's really, I think, enabled a lot of this is key drivers of work from home has really allowed a lot of this.
Employers that allow their employees to have that flexibility to work anywhere they want, anytime they want, then that's just, I think, a great benefit.
I've been able to have the whole 25-some years I've been in this industry, I've been able to work anywhere I've wanted, and that's been a great benefit for me.
And that's a great quality of life, which is amazing. And really, for a lot of companies and employees, that's really what's held them back has been technology.
But now employers now have the ability to use modern technologies to take everyday employees that have, whether you're in payroll, whether you're in more ordinary blue-collar positions or whatever, you're in HR positions, whatever it might be, and be able to do these positions from home and what underpins that are these digital transformation type technologies that are underpinned by cloud.
That's what, that's a really exciting type of capability today.
This is kind of Greg's position on things, but we really see this data in our new cloud threat report, the Oracle and KPMG Cloud Threat Report.
We see this data really backed up in this report that we put out each year.
But the data really shows that as businesses are moving to the cloud, those that have kind of a cloud-leaning position with this digital transformation, they've really had a leg up now with the challenges that we're seeing here in 2020.
And those that have had a bit more of a conservative approach to cloud, we really see that they're now going to have a challenge as they're now getting through 2020 and getting into 2021.
With this climate of, hey, can we support the work-from-home body? Can we support the demands of the modern buyer?
Whether you're a mom-and-pop that have a new business model requirement of selling in a way that they've never had to sell before, or you're a new restaurant chain that, hey, we've always required people to sit in a chair to consume our food, and now I have to somehow get you to buy food online and I have to deliver it to you.
Wait, that's a new way of selling my goods and services.
And rents are going down because people are leaving. Yeah. And I think you're right. I think because of cloud, right?
Because of cloud technology and because of course the impetus that the pandemic brought on, people are like, I don't have to live with a million people around me all the time.
I actually can maybe go somewhere else and actually keep my job. How does that impact cloud technology for you as a provider of it?
How does it change the advice that you give people? What are the concerns you have?
Sitting behind firewall environments, you know, if you think old school firewall environments and access control technologies and monitoring technologies that are worth a tremendous amount of money.
And now they're sitting at home behind a broadband connection with a $39 router.
I'm laughing, but it's a nervous laugh because I'm sitting at home and I'm turning around, I'm looking at my $39 router.
So it's something that now we really look to our cloud providers and we think, hey, you got us? You got us covered?
That's now the question we have to ask our cloud providers, that, hey, in this day and age, you know, a lot of businesses are— we're doing away with VPN and we're looking at secure cloud enablement as the solution.
And we have to ask those questions, you know, you got us, right? And then the data that's now being exchanged, you got us, right? And that's a legitimate question.
You know, we talk about cloud service providers, but it's really a partnership that we're having to work with now.
We have to develop as a business, we have to develop partnerships with these cloud providers and really ensure that whether you're a consumer or a business, when you work with these cloud providers, you have to work together and make sure that each are doing their part to ensure that the data is being managed correctly.
I think that's the trap that a lot of people fall in, to be honest.
They may have been using the cloud till now, but now they're 100% reliant upon it for their business operations.
So what would be the 3 things you would ask them to really take seriously to help them make sure that they're managing their stuff correctly?
I think that's a sign that businesses felt pretty good at one point in cloud, but they don't feel confident in their own ability in cloud. And there's a difference there.
You can trust cloud, but you don't trust yourself. So that's, I think, a sign of the rash of breaches in 2019 VPN. So, I think this is not a time to let your foot off the gas.
It's a time to actually analyze, are you putting your foot on the right pedal right now? And to start looking at your processes.
Start walking through them right now because more than ever, you have more at risk because of your distributed workforce.
So, and not just workforce, your partnerships and your supply chains, everything is now distributed. So, not only that, look at your culture. Culture of security first.
We can put all the budget in the world at the problem. We could go buy all the greatest security solutions on the planet, buy from the greatest vendors in the world.
But if you don't have a culture of security first, it's all in vain. It doesn't matter. And then really start working on a security-first culture. When it comes to your staffing.
Because right now we still are working with a staffing shortage in IT or in the area of security. It's hard to find qualified staff in security.
We need to work on rigorous training programs and work on how we retain the staff that we have today. And that includes an understanding of shared responsibility.
Just maybe just give us the list of 5 reports that are going to be made available by you.
And so that report is available as well. We also have a report that we've released on cloud risk and business fraud.
And then coming up here soon, we have our annual CISA report that we'll be releasing.
And so collectively, these five reports, they are all pulled from basically interviewing 750 global respondents.
So these are key cyber decision makers that we hit in these global markets. Basically understand what are the challenges and risks? What are they dealing with?
What's failed and what's worked? And we really pull this together into a variety of different report types that really hit conversation points.
And so some reports really work for certain types of personas within the business.
I would say it's probably a toss-up between the shared responsibility and the CISA report, because everything starts with understanding the role of shared responsibility, and that's where everyone seems to fall flat.
And I can't tell you how many times I present to people and I get that weird look of, "Yeah, that is a problem. We don't know our role of shared responsibility." Great question.
We don't know. Can you talk to us off to the side here? How do we get educated on this?
Something like SaaS, you have the least responsibility in SaaS, and that's the area where customers have the most confusion. So it gets worse every year.
So this is our third year right now of doing our report series, and the data is getting worse each year.
One person is steering the wheel, the other person's on the gas and the brake.
And if you don't trust each other and know who's responsible for what, it can get pretty awful pretty quickly.
And really, in a rideshare, you still have to look at a license plate and verify the car you're getting into and be safe when you get in and out of it and don't do things that you should and shouldn't do in the backseat of that car.
You still have responsibility.
Now you are going to make these available without a gate to our Smashing Security listeners, is that right?
And the great thing that I would say on these, Oracle's written on the front cover, KPMG is our partner, they're written on the cover but these are not used to promote Oracle and KPMG services.
We're trying to extend our knowledge and our leading practices in areas such as data security, but this is not used as a platform to promote our services.
It's just to promote good leading practices and good health.
And I wish other technology and security firms would do that because it's a time of unease for a lot of people and a lot of organizations out there.
Any support they can have on the right way and the right approach from trusted providers is amazing. So thank you on behalf of everybody.
Now, our listeners, you will have access to all these reports by visiting smashingsecurity.com/oracle. You can choose which report is your favorite.
So, take a look at the 5 reports and let us know so we can share that information with Greg. Greg, thank you so much for coming on the show.
This was the Senior Director of Cloud Security at Oracle. And thank you for sharing your insights. It's been fascinating.
And I think, you know, keep doing what you guys are doing. And of course, in regards to the reports, extend any feedback to me if you guys find it interesting.
I'm available online on Twitter and LinkedIn.
It's just, you know, we're just trying to do a bit of a poll and yeah, you see, I wasn't even trying to be funny there and you laughed. I got to be the winner.
Dave, I'm sure lots of our listeners would like to follow you online. What's the best way for folks to do that?
And don't forget, if you want to be sure never to miss another episode, subscribe in your favorite podcast apps such as Spotify, Pocket Casts, or Apple Podcasts.
Also, high five to this week's Smashing Security Sponsors: LastPass and Oracle. Their support helps us give you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
And we have friends, and if you shine it on their walls, it is crawling with these tiny little baby scorpions.
Not ones that would hurt you, you know, they just live out in the rocks. But wow. Very amazing.
So Carole, I pasted in your, pasted in the YouTube link to Matthew McConaughey's Lincoln MKZ commercials compilation.
He'll be from Maryland chomping on a cookie.
Hosts:
Graham Cluley:
Carole Theriault:
Guests:
Dave Bittner:
Greg Jensen – @gregjensen10
Show notes:
- Trojan Room coffee pot — Wikipedia.
- Trojan Room Coffee Machine — Department of Computer Science and Technology, Cambridge University.
- Reversing the Smarter Coffee IoT Machine Protocol to Make Coffee Using the Terminal — Evil Socket.
- The Fresh Smell of ransomed coffee — Martin Hron, Avast Threat Labs.
- When coffee makers are demanding a ransom, you know IoT is screwed — Ars Technica.
- What a hacked coffee machine looks like — YouTube.
- Blacklight — The Markup.
- What They Know … Now — The Markup.
- Smart Home Security Market Share, Size & Forecast to 2024 — Market data forecast.
- Smart home penetration rates — Statista.
- New homeowner 'freaked out' when stranger took control of her security system — CBC News.
- Confirmed: 2 Billion Records Exposed In Massive Smart Home Device Breach — Forbes.
- John Miles – Music — YouTube.
- You Can't Unhear This — YouTube.
- The Mystery Singer in All You Need Is Love — YouTube.
- New Climate Maps Show a Transformed United States — ProPublica.
- Hank the Cowdog — Apple Podcasts.
- Matthew Mcconaughey Lincoln MKZ Commercials compilation — YouTube.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Check out the free cloud security reports that Oracle is making available for listeners of “Smashing Security” and learn how organizations can make security an essential part of the culture of their business.
Read the free reports at smashingsecurity.com/oraclereport now.
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.
