
Voting machines are under the microscope, scammers are posing as rap stars, and American politician AOC isn’t the only one who’s been getting into the Among Us game.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by James Thomson.
Plus don’t miss the first part of our featured interview with LastPass’s Dalia Hamzeh.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
It's amazing.
This week, special mention goes to Jonathan Bowen, Jamie Schwendinger, Will Costin, John Nicholas, Richard Anand, Marvin 71, Stuart Settliff, Amber, Simon Yacan, and the hilarious I come from a land down under where beer does flow and men shunder.
So thank you all for your support. It means the world. If you want to join these hilarious Patreon supporters, everything you need to know is on smashingsecurity.com/patreon.
And know that we welcome you with open arms, socially distanced GoGoGadget arms. Okay, let's get this show on the road.
My name's Graham Cluley.
Now, coming up on today's show, Graham regales us with a story of scammers pretending to be rappers.
James talks election voting machines, and I ask what politicians are doing on gaming platforms. Also, we have a fab interview with LastPass's Dalia Hamze. She's new to the show.
She's a security engagement manager, and she talks frankly about how she got into security and gives us a few fresh ideas on how we can communicate it to others.
All this and much more coming up on this episode of Smashing Security.
But have you ever heard of people pretending to be a rap band? People who might pretend to be a rock group or some sort of artiste, but in fact they're not really the real thing.
Come on, it's very juvenile to laugh at somebody's name.
And having rented this Rolls-Royce Phantom limousine for a not inconsiderable amount of money— in fact, they actually spent nearly $60,000 renting this Rolls-Royce Phantom limousine.
One of them pretended to work for Roc Nation. James, you're down with the kids. Are you familiar with Roc Nation? The music company run by Jay-Z?
I meant— I meant— The good old days of Method Man and Ghostface Killah and Inspectah Deck. Remember that? James, remember Master Killah?
I said to her, I'm going to be talking about the Wu-Tang Clan later. And she said, that's not how you say the name.
But she did say that she had some of their CDs and she's regularly bopping around, jumping up and down like Zebedee, reeling off. And she told me some names of their famous songs.
She said, there's a really good one, she said, called Da Mystery of Chessboxin'. Anyway.
And charged with conspiring to commit wire fraud and aggravated identity theft, presumably the aggravated identity theft of pretending to be the Wu-Tang Clan.
And so this is my little bit of education for everyone listening. Maybe everyone knows this. When a crime is aggravated, it just means it's a bit worse.
So it's more serious than it would otherwise be. So that's why if you ever hear Americans talk about aggravated something—
And I imagine because of the amount of money involved, because they did obviously defraud quite a lot of money out of this limousine company because they didn't pay them real money.
They just rolled in pretending to work for Jay-Z.
And then they went off and with the, you know, rapping in their car, and then they got the invoice and didn't pay it.
So they had men and women with them as well.
So they would go, for instance, to the Georgian Terrace Hotel in Atlanta, and they booked like, you know, 10 rooms for all of these people.
So they had some women, they had some men, some of them were homeless people who they'd hired to pretend to be bodyguards for them.
And they were raking up huge bills in goods and services in cities— Atlanta, Nashville, across the southern states.
And another hotel they went to, the Hyatt Regency in Atlanta, they walked away without paying its $39,000 tab. And they also hired some recording studios.
What can happen is if you've got a stolen credit card, from what I've heard, what you can do is you can book in and quite often they'll say, oh, can we take an imprint of your credit card for $50 in case you use the minibar?
But if you sneak out in the middle of the night, or if you're such a celebrity that they kind of, you kind of go, oh, put it on the account, you know, send it, send through the invoice to my company and we'll sort it out there.
He thought, hang on a minute, maybe he knew his rappers. I don't know.
And so he questioned them a bit, and they tried to convince him that they were really members of the Wu-Tang Clan.
So what happened was they got out a ghetto blaster, put a track on, and these guys lip-synced to the music, pretending to be singing.
Actually, that isn't what happened. But I think that's how I would have got it. That's what I'd have gotten.
Instead, what the receptionist did was he rang up Jay-Z's company, Roc Music.
Rang them up and said, hey Jay, these guys claim they work for you, claim they're the Wu-Tang Clan.
And so they were caught. So the whole point of this story is about what happens when your credit card details get stolen.
You might think they've been stolen by some lowlife to score a deal down some dark alleyway.
But in fact, they might end up in the hands of someone who's planning to perpetrate a Wu-Tang scam. And so—
And I think that's a little bit unfair, because those guys, if they're really homeless— 20 years, you know, I don't know what it's like in a federal prison.
I imagine it's not very pleasant. But even so, something to think about. So that is—
It would be the credit card company that would have to pay out on that.
Stop claiming this is a victimless crime because it's not, is it?
I just think from a view of someone whose credit card might be stolen, you'd be worried more about being liable in these instances, right?
And I guess that's what I'd be wondering, since I'm sure you've done that research, so what do our listeners need to take away from this?
You have to keep your eyes open for people who might claim to be someone that they are not. And you may encounter them in real life, you may encounter them in your inbox.
And don't be so dazzled by the fact that you believe you have a celebrity, for instance, booking a room with you that you won't question them. So don't be afraid to question.
Don't be afraid to double-check.
Don't be afraid like this receptionist at the Fairfield Inn in Augusta wasn't afraid to ring up Roc Music and confirm that they really were who they claimed to be.
I mean, how else can you explain voting machines?
Now, you might be aware that when Americans go to vote for the most part, they do not put a cross in a box in the method with which we are familiar, but they go and either prod a computer screen or in some cases pull a lever.
You might recall that back in 2000, there was a disputed presidential election which came down to a few hundred votes in Florida.
There was a whole kind of lexicon that developed out of this crisis, which was partly to do with— well, there was a whole series of issues, but one of it was bad ballot paper design and also these devices that people used to punch holes in cards.
In the wake of that fiasco, they decided to upgrade their voting systems.
And they gave the states who are responsible for holding elections in the United States, the individual states, a huge dollop of cash, billions of dollars to upgrade their voting systems, and they all went out and bought the most astonishing collection of digital— well, I don't know, this is a family show, I don't want to offend people.
Now, this means that there are now several states in the US where if the aging computers that they bought 20 years ago fall over, or the Russians manage to hack them, there is no paper record of how people voted.
That's to say, you go into the booth, you press on a screen.
You are asked for your name. You're then notably not asked for any identification whatsoever because we're British and thus trustworthy.
And they give you a little stubby pencil and you go into a cubicle and you just mark a name, don't you, and say, this is the one I'd quite like, thank you very much.
You just require too many people and too many physical resources.
And yet these machines are a gift to people who either want to screw up your electoral system or else to cast doubt on the electoral system.
And as you might be aware, there has been a lot of casting of doubt lately.
And so there's actually a rather good New York Times video in which they've explored the security of the electoral system in the US.
And it comes to a sort of positive conclusion, moderately, that this US election could be the most secure yet.
But in the course of it, they interview some of the people responsible for the system, including the wonderfully named Dana de Beauvoir, who is the— yeah, she's no Barnes Burpo, but still, you've got to respect a name like that.
And she's the county clerk of Travis County, Texas. Which is one of these places you've never heard of but has a million people living in it.
And she said that with all of this federal money they got 20 years ago, they asked their voters what they wanted and the voters told them that the most important thing was to have a paper trail.
It was well, you know, duh. And before that they'd been using these machines which left no record.
But instead of just deciding to use paper ballots, they went on a 15-year search for voting machines that print out the result of you having pressed a screen.
Now, I can't quite work out, although I don't claim to have any inside knowledge of the American electoral system, why you can't just cut the computer out of this equation.
Why does there have to be a digital middleman in this process? Now, I know that in America when they go to vote, they go to vote on about 300 different things at the same time.
There's the presidency, there's in some places the Senate, there's always a congressional election, there's local council, there's governors, there's dog catchers, you name it.
Judges even. I mean, they elect judges, don't ask me how that works.
But the problem is that there's this mishmash of systems, almost all of which rely at some level on a machine either to vote with or to count the votes or to do various other things during the process.
And a lot of these are horribly underprotected and the New York Times reporter David Sanger who focuses mostly on intelligence issues says the real danger here is not a major hack, although that can't be ruled out, that somebody might try to get into the system and change all of the totals, because there's normally ways to check if someone's just screwed with a few numbers in the system.
The problem is more of what's called a perception hack, which is where you just go in, you cause a few little screw-ups here and there, and then you get your Twitter bot armies to go in hard and say, that's it, the whole thing is corrupted, you can't trust the result.
So all I can say is thank goodness no one is trying to undermine confidence in the result. Oh, oh wait.
But the problem with those, of course, is that they're running on ancient hardware and software, which, you know, under severe pressure might well give way.
And then with these machines that don't keep a paper record, that's it. You've lost all the votes. There's no other record anywhere.
I mean, of course, we've seen in the last few weeks, there have been, I think now, 60 million people have voted early in the US.
And that's partly because they, for no very good reason, but mainly because of the propaganda of one side, a certain Donald J.
Trump, not that the mail-in ballots aren't correct, but that they won't be validated in the same way. So they've actually been queuing up.
You might've seen these amazing videos of people queuing for hours on end just to vote early so that they know that their ballot has gone into the box and can't be later ruled invalid.
Or because it takes so long to fill in the 80,000 different things they have to fill in for all the different—
So we might, for instance, have to drive up to Chester if we wanted to vote here in Oxford.
And it's worse in some states than others, but like Graham says, in Britain, if you want to vote, you just toddle off down to the local primary school or the church hall, and in every village or town there is somewhere to vote.
And I guess it's because of these machines, whereas here in the UK you may have to wait until 6 o'clock the next morning.
Or will it all be plain smooth sailing?
I mean, there have been shenanigans for the last 4 years, so the idea that there won't be next week is implausible. The question is whether there's just a tidal wave.
With the pandemic, most of us are staying home way more than normal. And so how does a politician get their messages across?
We've been seeing a few different people representing various parties take to the digital motorways to do this.
And one of the interesting places politicians have been showing up is the gaming world.
So two weeks ago on Animal Crossing, Nintendo Switch game we've talked about before on the show, Biden launched its own island called Biden HQ, featuring a Biden avatar in aviators who only says, "No malarkey." And interestingly, the island had a shop and a voting area with text codes for players to sign up to vote and buy in-game merchandise that would benefit the campaign.
And this, when it was launched, was streamed to hundreds of thousands live on Amazon-owned Twitch.
And then again, last Tuesday, we saw two US Congress members, Alexandria Ocasio-Cortez and Ilhan Omar, take to Twitch's very popular game called Among Us.
Do you guys ever heard of it?
Now anyway, AOC, as we'll call her, Alexandria Ocasio-Cortez, AOC, 4 minutes into her Twitch game, she admits she's no gamer, right?
So it's not she's a diehard gamer and this is her space. This is in her wheelhouse. And she didn't just kind of do a kind of fly-by-the-seat-of-her-pants kind of public affair.
You know, when a politician shows up, does a quick shimmy, yells a few things, shakes a few babies, kisses— Oh, I did that wrong.
She was totally engaged and she was totally engaging to watch.
You play with other people and you can play in the same, if we were hanging out together, we could play together, you and I, or we could get remote players and Graham could join us and other people.
And you have a spaceship, you're preparing it for departure, you know, with your crew.
And this was making— this made it the third most popular stream on the site. So not bad for a first try.
The Republican convention was streamed on the platform a couple of months ago. And Donald Trump has his own account.
That'd be great, wouldn't it?
They kind of do it to show off latest video campaigns or new segments that are favorable or that sort of thing.
So it started two days later on Thursday evening, players in public matches found their game chats.
So you have this kind of chat where you can chat with the other players, started broadcasting new messages demanding that users subscribe to a YouTube channel called Eris Loei.
So basically this Eris Loris, with the help of a dozen or so volunteers, claims to have hit as many as 1.5 million games affecting around 5 million players.
And I mean, look, if I was looking around today, the Among Us subreddit is filled with threads dedicated to this situation, right?
You go to Twitter and you see hundreds of messages too. So things like, okay, what the hell just happened? I'm in Among Us lobby.
Next thing I know, the entire lobby is black and the chat is spammed, subscribe to Eris Loris on YouTube. Do you have any clue?
And they're asking the developers of the game Among Us, which is InnerSloth, who I think are quite a small company. Don't take all my lines away from me.
Oh, I'm sorry, you've researched this already.
The creator of the game, InnerSloth, tweeted people asking them to stop playing the game until the problem was resolved.
And they ended up pushing out an emergency server update to try and mitigate the problem.
But there are still some people complaining on Twitter about it today, which is 4 days later. So maybe there's latency in the rollout.
But one of the big problems is no matter how amazingly dedicated the Among Us dev team, InnerSloth, is they're only a 3-person band.
And as you were saying, it was released 2 years ago. And by when did they have millions in play? It was this summer that it went crazy with the pandemic.
So millions and millions of people started playing after some streamers were like, hey, this is cool. And yet they haven't built their team.
So how can a handful of developers manage such an environment? Like, it doesn't scale if shit hits the fan, and I don't know if that's very responsible.
You probably ruined just the game.
There's lots of complaints online about, hey, people have workarounds or people are cheating. And there's this 3-person band trying to handle it all.
Now, meanwhile, gaming publication Kotaku reached out to this Eris Loris, who claimed responsibility for the spamming spree.
And like many hackers, he says he does not regret pissing off a boatload of players, 'cause that was his goal.
The anger and hatred is the part that makes it funny.
If you care about a game and are willing to go and spam dislike some random dude on the internet because you can't play it for 3 minutes, it's stupid." So he's claiming, I just ruined your game for a bit.
What's your big deal? But users are not happy. People have even been giving online thumbs up to people trying to dox this Eris Loris.
So this is where people try and reveal his identity and personal information online so people can make his life hell. Please don't do this, folks.
Even if he totally ruined your game, please don't do this. And someone's even already put something up on Urban Dictionary about Eris Loris.
Quote, "A fat nobody who hacks innocent people Among Us games for clout. Oh, my game is botted by Eris Loris." So there you go.
But they can sell in Animal Crossing, they can sell these kind of virtual clothing or campaign stuff, and that money can go to the campaign.
So it's kind of a weird workaround of how you can fund the campaign.
They empower organizations revealing unknown threats before they impact a business, helping teams respond to alerts 10 times faster.
Recorded Future does this by automatically collecting and analyzing intelligence from technical, open web, and dark web sources.
Well, you too can access the up-to-the-minute security intelligence that allows Recorded Future clients to make fast, confident security decisions by installing their free browser extension, Recorded Future Express.
Go and grab it now at smashingsecurity.com/recordedfuture. That's smashingsecurity.com/recordedfuture.
The idea behind this free ebook is it gives you a guided tour of how the MITRE ATT&CK framework can totally simplify and strengthen your cybersecurity skill strategy.
It literally is a go-to framework. Learn more at immersive labs.com/smashing. And thanks to Immersive Labs for sponsoring the show.
In fact, tens of thousands of companies rely upon LastPass to protect themselves.
LastPass Enterprise simplifies password management for companies of all sizes and helps you secure your workforce. So whatever the size of your business, go and check it out.
Go and visit lastpass.com/smashing to find out more. And thanks to LastPass for supporting the show.
And welcome back, and you join us for our favorite part of the show, the part of the show that we like to call Pick of the Week.
Could be a funny story, book that they've read, TV show, movie, record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Oh, and this—
Well, the whole purpose of this website and this podcast is, I don't know if you've noticed, there's quite a lot of political news and quite a lot of crazy shit is happening all the time.
Sometimes from the UK, quite a lot of the time from America. Now—
And so they give you a quick, maybe 5-minute summary of what has happened.
And the beauty of this, of course, is that you don't have to watch some cable news for hours and hours where they're endlessly re-interviewing experts and commentators to pontificate about something that's happened.
And then you have journalists who are interviewing other journalists going on, going on, going on forever and ever and ever. You just think this is ridiculous.
There's too much of this.
And so I'm hoping things are going to come to an end and I'll be able to move on. But maybe what part of my weaning process is the WTF Just Happened Today podcast.
And that is why it is my pick of the week.
But how many followers do you think you need on average on Instagram to make a living from brand sponsorship, from companies giving you money or products to on your feed?
How many Instagrammers do you think have 50,000 followers at least?
Because the answer, according to Sarah Fryer, who is the author of a book called No Filter, about Instagram, and which is the definitive account of Instagram currently, was published a couple of months ago.
The answer is 200 million.
But it hasn't been challenged anywhere.
Now, of course, one would guess that yeah, a lot of that is bots, but even on the face of it, that would suggest that if each of these people who have 50,000 followers were tweeting, or whatever you call it when you send an Instagram message, once a week, 200 million of them are going out to eat.
All of their 50,000 followers once a week. You're up in the trillions. You're up in the trillions in terms of the number of these Instagram tweets flying around.
And so they've been selling their services for, you know, $30 per week to artificially inflate your number of followers and the likes which you get.
And of course, all these people who are desperate to be an Instagram influencer, they want to have big numbers to say to advertisers, oh, look how popular I am.
And I wonder whether all of these people are doing it and it's basically inflation which is going on. Everyone wants to be up above the rest.
I think they should stop looking at how many people happen upon something as opposed to how many people...
It would be nice, for example, even in podcast land, if we could say, oh, how many people have dropped in and listened to one show and then gone on, versus those that decided, oh yeah, I'm going to stick with these guys.
Which will click on these links and will might appear to people to be the genuine people interested in a service or product.
I'm sure I can think of something.
Yes, I don't really have anything to post, you see, because I don't want to post pictures of myself because I don't want to put people off their lunch.
And I can't remember their names now. Yeah, wouldn't that be fantastic? I think it'd be marvellous.
This is an oldie but a goodie radio program from Radio 4 that you and all three of us know very well: From Our Own Correspondent, F-O-O-C.
And it's basically a show that happens every week where correspondents or journalists or writers from every corner of the world report on stories behind the headlines.
That's how they pitch it. And the stories often have a very strong human element, don't they? So they go everywhere.
Like, so they'll go to South Africa, I think was this week, or they'll be in Thailand or Bhutan or Japan or Armenia.
Romania, and you just get this kind of snapshot of daily life of what's going on in that particular location. I mean, you guys listen to this, or do you?
It is the correspondent basically as though they were writing a letter or writing an essay.
A writer was there and was able to write about that whole experience or someone who swam with sharks or someone who experienced zero gravity.
So these are all kind of interesting elements and you have a kind first-person account of what that was like. Is that fair?
It's also available as a podcast. And I recommend it because this is a very calming news program because it's not focused so much on the crazy.
It's more focused on the human element. And I don't know, just it's a breath of fresh air in these crazy times. So check it out from our own correspondent from the BBC.
Well, actually, you're going to be listening to part 1 because it was such a good chat. We talked for way more than half an hour, so we've cut it into 2.
So part 1 this week, part 2 next week. Enjoy. Hey, Dalia. This is Dalia, everybody. She's a senior security engagement manager with LogMeIn, or what people also know as LastPass.
And obviously, the rest of us, she wasn't born in the cybersecurity world, right? So when did you first get into cybersecurity, Dalia?
So I graduate college and I'm, I'm going to be my own boss.
And I start selling—I used to go around to different stores and get designer clothes and things at discount prices, and I would sell them on eBay.
And I had this store, it was called Dalia's Delights. Don't tell anybody, even though I think everyone's gonna hear that now. And I loved eBay, right? I was an eBay enthusiast.
And so I randomly get this job offer one day for—I think I was getting paid $11 an hour with some consulting firm that was, hey, do you want to process paperwork and eBay is your account?
I was absolutely I do. And so my hope was maybe eBay will hire me. Well, it actually happened, and I was managing their budget and doing some administrative work for them.
Moved out to California. It was for their information security team.
And so I remember I moved to California, I'm day one on the job, and people are talking about SIMs and servers and DLP and firewalls.
I think it's hilarious when people in our industry think that there's no jargon. It is really revolting, isn't it? You don't understand a word when you first walk into this.
I mean, the number of acronyms that I heard on day one, I actually cried on my way home because I was what did I get myself into? I mean, I genuinely have no idea where I am.
This was a huge mistake, right? But there is a lot of jargon and things. So now, fast forward about 6 months. And I'm starting to kind of get a little bit of the hang, right?
I mean, I feel I'm 10 years in the engagement space and I still don't fully grasp it, but so I'm 6 months in, I'm getting the hang of it.
And I realize that we're doing, now this is to our engineer and developer community, right?
So security is trying to say, hey, we need to patch and guys, we need to take these vulnerabilities seriously and all this different stuff, right? Secure coding.
And so I was like, hey, can I take this over and offer some ideas? And that's when I realized I took it over and I started saying, you know what's sexy?
Let's talk about other people's breaches and then relate it back to here.
One of my favorite ones that I got approval to do, I don't know how, was the Ashley Madison breach and going through the kill chain of what we think may have happened.
Smashing Security happened, we had 400 people show up for that. And so then I realized, wait, this could be something - I'm really interested in this.
How do we translate security for the everyday? I mean, well, for every day now, that's really my focus. But how do you make other people interested in it?
Because if you were kind of working in that area and you suddenly said, look, let me take this over, you suddenly have to kind of learn all that info?
Did you come into this world kind of understanding things like, you know, unique passwords or safe passwords or long passwords or good passwords and all these kind of things?
I think if you're a security awareness officer, if you do the engagement side of the house, you don't have to be the expert at everything, but you need to find the experts and you need to make good friends with them, right?
And then help their agenda. They have things they want to communicate. And so I try to make sure that, you know, it's a two-way relationship.
I'm not constantly asking them to present for me and that's it, right? Hey, what do you guys have to get out?
Is there a behavior change you're looking for from either, you know, anybody in the company or external? And so, it's definitely a very symbiotic relationship, I should say.
If I look back now at what I did, I think my job was to take the very, very smart technical information that was being given to us by our researchers and somehow figure out a way to communicate it to the general public in a way that would make them understand what the threat was, what was important, and what they could do about it.
Is that a fair way of saying what you're doing now?
And so we know that depending on the generation maybe you're born in, some people prefer to read, you know, millennials and - God, I don't even know the ones after that.
I think I just hit -
You're definitely not. You just happen to fall. It's when you fall into the birthday a year before, so you graduate a year earlier.
But people digest depending on the industry you're in. Do you like to read? Do you like your information in short snippet videos?
Some people like to get in, you know, they're visual learners. Some people are hands-on learners.
Personally, for me, if I can't see it, feel it, and do it myself, it's hard for me to understand it, right? So you really have to accommodate.
It's a great podcast.
You're just trying to grease the wheels to make sure they get the message as clearly as possible.
And I mean, I think too, whatever channel, communication channel that as security professionals we try to use, I think there's one thing that they should all have in common, right?
When it comes to the messaging, we love to kind of put the fear, security professionals, sometimes we put the fear in, if you do this, things are going to crash and burn.
And I think sometimes taking a different approach, and I don't say security professionals as an all-inclusive, but I think sometimes it's taking the approach of here's one or two quick simple things that you can do, little bite-sized pieces of digestible information, right?
And not the whole gamut.
So focus on one thing, is it passwords, you know, is it whatever it may be, and just one or two easy things that our end user can do at home or at work or whatever it may be.
You know, I built a big story, but the idea was your car breaks down, you go to a mechanic, and the mechanic kind of looks at your car and goes, and then just rabbets off for, you know, 30 minutes about everything that could be wrong with your car.
And literally, if that happens to me, I just go blank. My brain just turns to mush. I'm not interested in. It's almost I want to find a new mechanic.
And so I totally get the mechanic you want is someone to go, what's the problem? This is what you need to do about it. And bite-sized. I'm totally with you on that.
Easy to understand. Everybody's been there. I love that.
So the message actually that I probably would have shared pre-COVID is going to be a little different today.
So, you know, given that most of us are now working from home, home security, right?
Securing your home network, which actually then really is securing your corporate confidential information as well. There's a blurred line there now.
And so I would say that if you're where do I start? I don't know what security is, and I don't know how to— I don't know about any of this.
My first suggestion would be let's take a look at your home, your home technology, your home Wi-Fi, your router, even your personal computers. Are all of these things up to date?
So for our listeners, those little those annoying pop-ups that say, "Would you to update this now?" Just do it. I know it's really important. They're really important.
You know, listeners, remember when you were little and your mom would say, "No, you really need to wear a coat 'cause it's really cold outside." And you're "I don't wanna wear a coat." And you're "I know you don't wanna wear a coat, darling.
You really need to wear a coat 'cause it's really cold outside." It's that kind of message. Just do it. Trust us, please.
And every time they push out a software update, a lot of times it's filling, it's saying, "Hey, we realize that somebody can actually break in.
They can compromise your personal information." And so those updates aren't to be annoying. They're really there to keep you secure.
And sometimes they typically come with new fancy shiny features. So I would say update, update, update.
Now on your Wi-Fi routers, there's websites that you can Google how to update that, your modems and things like that.
You won't— that's not going to give you a pop-up, so you have to be a little proactive there. But I'd say get your home, your home network secure. That'd be my first one.
And they all have their own configuration options on it, which makes our jobs really difficult to try and give super clear advice.
But the trick is to go see what configuration options they offer you and try and set it to be as secure as possible without totally impacting your usability.
So, you're trying to be as safe as you can, same way as you are in a car. You put a seatbelt on, you use your brake, right?
So, it's the same kind of thing with configuration options. So, don't assume that the default options are the safest options.
So a lot of times, go to whatever local, here in the US it's Best Buy. And you go and you get a brand new Wi-Fi router modem, and you set it up.
A lot of times they have these default credentials, which is your login and your password. Let's say it's admin for the password and admin for your login.
These, if you don't change that, these passwords are actually posted on the manuals online.
Like if let's say you lose your paper manual, you buy this thing and then you want to go online.
So everybody knows that this is the password, so anybody can in theory break into your network.
So, changing default credentials— James, you said the word default and I was like, that's the word I was looking for. We're on the same wavelength. Yes, I love it.
So change the default credentials. That is so important.
So, so important because really your password is your first step, your first line of defense into anything, really, any account that you have.
This is where we get those blurred lines. So as— oh, my dog's like, I don't want us to talk about that. They have, you know, some beef with the doggy next door.
They to talk to each other sometimes back and forth. They're like, "Yo, you stuck indoors?"
So you might be an Android user, you might be an Apple user, you have gaming systems. I mean, there's a million things.
I mean, our refrigerators talk to us now and tell us if we're out of milk, right? I don't have one of those super fancy ones, but I mean, there's a ton of IoT devices.
And as a security organization, there's two things. We can't infringe on our employees' personal privacy, right?
So, all we can do, and you don't want to push and say, "You guys have to do these requirements.
It's your home, what you decide to do with your things." But a lot of times, if let's say your fridge or your Alexa or your phone is connected to your Wi-Fi, which is connected to your work machine, your corporate laptop, that's where the conflict of interest, that's where things start to get a little sticky.
So here's what I would say is that offer the resources for people, put it somewhere public.
As simple as it sounds, find those websites that give everybody instructions on how to update. Pick 20 of the most common IoT devices you think you'd find in someone's house.
I know Samsung does a lot of smart devices. You know, of course, Amazon and Google and all of those things.
But I would say make it easy for the end user and kind of do that legwork for them.
Because if you say, hey, just we gave you a site with all of the resources you need to find your device and figure out how to update it, I think that would be helpful. Totally.
So there you go, people. That is part one from Dalia Hamze.
She is a security awareness professional at LogMeIn, and you will hear from her again next week with part two on what are the best tips to help you secure your home environment.
James, I'm sure lots of our listeners would love to find out more about what you're up to. Do you have any social media presence whatsoever?
And don't forget, if you want to help the show, tell your friends about it.
Tell them that you enjoy Smashing Security and recommend that they subscribe in Apple Podcasts, Spotify, or Pocket Casts.
Thank you, peeps, for listening each week, supporting our work, sharing it with your buds, and of course, high five to this week's Smashing Security sponsors: Recorded Future, Immersive Labs, and of course, LastPass.
Their support helps us big time in giving you this show for free.
Check out smashingsecurity.com for past episodes, sponsorship details, and information on how to get in touch with us.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
James Thomson.
Show notes:
- Rapper scammers admit faking association with musical group in conspiracy to cheat hotels, bank, limo service — US Department of Justice.
- This U.S. Election Could Be the Most Secure Yet. Here’s Why — The New York Times on YouTube.
- Report: Ransomware disables Georgia county election database — AP.
- Pity the nation: Americans’ choice of president on November 3 will affect Slovaks too. — Slovak Spectator article by James Thomson.
- AOC’s Among Us livestream hints at Twitch’s political power — MIT Technology Review.
- AOC makes explosive Twitch debut with over 435,000 Among Us viewers — Ars Technica.
- A massive spam attack is ruining public 'Among Us' games — Engadget.
- AOC Among Us FULL STREAM — YouTube.
- Among Us Has A Cheating Problem — Kotaku.
- Trump News Today | What The Fuck Just Happened Today?
- WTF Just Happened Today — Apple Podcasts.
- No Filter — Book by Sarah Frier.
- Fake Instagram follower services slapped with lawsuit — HOTforSecurity.
- From Our Own Correspondent — BBC Radio 4.
- From Our Own Correspondent Podcast.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
LastPass Enterprise makes password security effortless for your organization.
LastPass Enterprise simplifies password management for companies of every size, with the right tools to secure your business with centralized control of employee passwords and apps.
But, LastPass isn’t just for enterprises, it’s an equally great solution for business teams, families and single users.
Go to lastpass.com/smashing to see why LastPass is the trusted enterprise password manager of over 33 thousand businesses.
Immersive Labs delivers hands-on, challenge-based training and exercises to make your team ready to fight real-world threats.
Check out their free ebook all about the MITRE ATT&CK framework, and how you can use it as part of your cyber skills strategy and improve your security posture by identifying weaknesses. Visit immersivelabs.com/smashing now.
Recorded Future empowers your organization, revealing unknown threats before they impact your business, and helping your teams respond to alerts 10 times faster. How does it do this? By automatically collecting and analyzing intelligence from technical, open web, and dark web sources.
For up-to-the-minute security intelligence that can help you make fast and confident security decisions, install the free browser extension Recorded Future Express.
Get it now at smashingsecurity.com/recordedfuture
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.


