
Criminals are caught in a encrypted chat trap, should you trust Apple’s repair team with your sexy snaps, and do you think the FBI should be able to tell who has been reading the USA Today website?
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by The Cyberwire’s Dave Bittner.
And don’t miss our featured interview with Dr Simon Wiseman, the CTO of Deep Secure.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
My name's Graham Cluley.
But also, cicadas are big, dumb bugs, and they just fly around into everything. They're harmless.
They don't bite or sting or anything, but they just sort of buzz around and crash into you, and when you're driving, you get them on your windshield, and it's a nuisance, but it only happens every 17 years, so there's that.
It's their support that helps us give you this show for free. Now coming up on today's show, Graham, what do you got?
Simon Wiseman from Deep Pharmakure, he's their CTO, explains how their tech works so that they can guarantee zero malware.
All this and much more coming up on this episode of Smashing Security.
Everyone's double-crossing everybody else. There you are one minute whispering commands into the ear of your consigliere. No records are being kept of what you've ordered to happen.
Nothing to lead back to you. But that was back in the simple days, right, of Marlon Brando in The Godfather movie. But now we've got tech up to our eyeballs.
So you've got to be very careful with how you communicate. And many people these days are using smartphones to communicate. And I've been watching—
I know a chap who wears these weird sort of IoT sunglasses, and they've got this big bulbous bit at the side, which I don't know if it's Bluetooth or what it is, but he's— yeah, it's kind of crazy.
Now, I've been watching Line of Duty on TV, so I know—
People are sending emails, people are instant messaging, people are taking photographs, people are calling each other. Can we get the call log?
Can we track where they were at a particular time? Can we find out who called them? A treasure trove of information for the cops.
Well, there are apps out there which aim to fix all of that if you are a criminal.
So what they do is they say, look, we will help your communications remain secure if you're nabbed by the police. And one of those is called—
It's a secure messaging app, runs on a stripped-down smartphone. Not any old smartphone. This is a smartphone which can't make phone calls, can't send emails.
It looks like a terrible phone. You think this is a blip all in phone.
All I've got on this phone is some sort of calculator app, but it's designed purely for criminals to have end-to-end secure encrypted communications with each other.
And the idea is you can trust it because ANOM runs out of Switzerland, right? And we know—
And we don't have landlines anymore. So rather than, we would use this app to communicate because we would be clear that, you know, no one can listen in on, right? That's right.
Because Switzerland likes secrets, doesn't it? Switzerland never wants to upset anyone. They'll look after your secrets like it were Nazi gold. You know, they will happily—
And what criminals are doing is they realise that their criminal mates need these phones as well.
Or if you are the godfather, Dave, you buy 100 of these phones and then you sell them to your cohorts, maybe making a little bit of a profit yourself.
And when you get one of these phones—
So the way you access the actual chat app is you open the calculator on your phone, you enter a particular number, and that then secretly craftily opens the chatting app, right?
So you have the option as well, if you enter the wrong code, to wipe the phone. So if the cops get you, you'd think, well, I want to be sure everything's wiped off this.
You don't risk putting anything else on it because you might put some piece of spyware on it, which could then snoop on you. You wouldn't want that. Right.
So it's a bit like EncroChat, which we talked about a few weeks ago with Paul Roberts. It's making money.
The organisation is obviously acting a little bit dodgily and it's assisting criminal gangs.
It's less, "Hey, D-dog, it's time Mickey Blue Eyes swam with the fishes." That's good code, Graham.
Because word reaches us from down under that the Australian Federal Police have arrested hundreds of people, seized tons of drugs and weapons, confiscated millions of dollars worth of assets, all from criminals who were using this An0m encrypted chat service.
So to find out how they did this, we need to travel back in time 3 years.
Chit-chatting about this because they had just successfully shut down another encrypted messaging service beloved by criminals called Phantom Secure.
And when Phantom Secure was shut down and dismantled, the cops thought, hang on a minute, we've shut down that, that just means the bad guys are going to go somewhere else, doesn't it?
Yeah, because nature abhors a vacuum.
And then they went, ahahaha, or in Australia, they went, oh ho, oh ho. Oh no, that's different. Anyway, so they went, crikey, mate, you know what we best do?
So they created this whole criminal infrastructure, secure chatting system called ANOM.
They then got police informers to seed the app with other criminals and said, oh yeah, I'm using this app, you know, I've upgraded, I don't use WhatsApp anymore, I use this instead.
And some of the criminal bosses even sold the phones, the subscriptions, not realizing that ultimately the money was filling the coffers of the very police who were going to use the app against them, because the police were able to watch in real time messages being sent between hundreds of criminals for years.
They've intercepted about 20 death threats, and they reckon, you know, other innocent people may have had their lives saved because of all these.
And so all these arrests have happened in Australia as we speak.
I've seen people say that the bad guys were starting to catch on to this in the past couple months.
There was a blog post where someone— I guess the bad guys have their own security researchers, and someone figured out that traffic on this app wasn't just going between folks, it was going somewhere else.
They were starting to get suspicious. Too late, so it seems.
They're starting to put in fake information or whatever.
You know, is there more to be gained from saying, okay, we've got information about all these hundreds of people, we think we can go and arrest them and do some damage, or hang on a little bit longer?
So maybe that is one of the things which influenced them.
I mean, the ones in general use, like Signal, which is open source, so presumably folks are able to inspect the code of an app like Signal to make sure there's nothing like this going on, but how sure can you be?
In theory, you're more confident when you hear something's open source, but of course, if everyone is feeling that same confidence and nobody actually goes and looks at the source code to see if there are vulnerabilities or if there's some backdoor in it or whatever, and I'm sure in the case of Signal, someone probably has, but oftentimes people just assume, don't they, that, well, it must be all right, comes from Switzerland.
So these are people that are probably shifting boxes of stuff or whatever, who knows, but not whiz kids. So if someone—
They come across something— I mean, this thing had a Twitter account. They come across it, maybe they get hold of the app, and they're just— people are just interested.
Here's an example.
You put out your own app, so why should we weaken encryption when you can get— when you were so successful getting all these bad guys all around the globe by other means?
Wouldn't it work even better if WhatsApp and Facebook Messenger and Signal and everything else were to do it as well?
If it makes them uncertain, I'm sure for those years when they found that, for instance, shipments of drugs were being intercepted, they were probably in— there's probably infighting and suspicions as to who might have said something.
You know, only you knew this information.
So the FBI were going after someone who they alleged was involved in this horrible crime of imagery of child sexual abuse.
So a team of law enforcement officers were attempting to execute this warrant.
Evidently, the person that they were after had some sort of doorbell camera, saw them coming, and fired through the door at all these law enforcement people who were knocking on the door to serve him the warrant.
Two officers.
It's a tragic situation all around, starting with the child sexual abuse material, obviously the FBI officers killed in the line of duty, but where it gets interesting is the FBI served Gannett, who publishes USA Today, served them with a subpoena, and they wanted information about basically everyone who accessed a news article during a 35-minute window starting just after 8:00 PM on the day of the shootings.
Now, the demand, which was signed by a senior FBI agent, it didn't ask the names of the people who read the story, but they were looking for IP addresses, mobile phone information that could lead to the identities of the folks who read the information.
So now—
Perhaps if we know who was interested in what went down here, who had an immediate interest in it, that might lead us to more of the people who were after it.
Now, one of the interesting things I learned when reading this article is that this is a particular case where the FBI does not have to go in front of a judge to get a subpoena like this.
This FBI agent only had to get the sign-off from one of his superiors at the FBI in order to proceed with this subpoena.
And the reason behind this is that they say in cases like this, particularly with horrific things like child sexual abuse, they have made the case that they need to be able to act quickly because people are in jeopardy.
Now, in this case, many hours went between the shooting and the publication of the news article, so it doesn't seem as though there was any real time constraint here on gathering this information.
So the folks at Gannett, USA Today, they pushed back, they refused the subpoena, they said it was a clear violation of the First Amendment.
As opposed to saying, we want to search every house in the neighborhood, right?
Because we think the bad guy might have driven through this neighborhood, so we want to search every house in the neighborhood. We just want to throw this web out there.
And you can't do that.
And the FBI has requested information from technology companies regarding who might have been in the location around about that time in order to narrow down the potential list of suspects, which has caused some controversy in the past.
And, you know, are you entitled to the privacy of knowing— of other people knowing what books you've signed out from a library?
You might even decide to turn it on and off again, but to no avail, right? So you have options in this case, don't you? So what would you do?
You might, like, say you've run out of ideas. You can't fix it. Your friends can't fix it. So you need to get it repaired somewhere.
Now, where would you go typically in that scenario when one of your Apple products do not perform appropriately?
But with my phone, I tend to go to the Apple Store too. I once had insurance.
It was covered under some insurance that we had, some bank insurance or something, and I dropped my phone anyway got soaked.
Like, I was outside working and it got too hot, and then I was trying to open the door and it just fell right off the top of my book, slid right into this. Yeah.
Anyway, so I sent it off and they sent me back a phone, but it was like a— it was— anyway, it wasn't very good. So I've always thought, go Apple, go Apple, go Apple.
So this story is all about someone who did exactly this. It starts on January 14th, 2016. Right. And our main character is an unnamed 21-year-old student.
And it becomes pretty crystal clear why she's unnamed. So this student, we're going to give her a name. Should we give her a name? Wilhelmina. Let's call her Wilhelmina. Okay.
Wilhelmina. She, her phone was all buggy. So she sent her phone off to repair.
So you know how there's two ways you can do it, you can go to the Apple Store, or you can send it off, right? And you put it in the mail and they go and take care of it.
And the phone was then given to a repair facility run by Apple. So Apple don't do all the work necessarily themselves. They have contractors that do some of the work.
So in this case, it was a contractor called Pegatron in Sacramento, California.
Now, as app tech repair folk, this must happen all the time.
And the IT team, he gives it to the IT team and he sort of says to them, or he goes to the head of IT and says, look, I need you to be discreet with this, right? Right, right.
Something funny's happened on it. I don't want you letting every member of IT looking at this laptop. Could you just handle this yourself?
So, okay, so Wilhelmina sent off her phone for repair, you know, via the appropriate Apple channels. And it wasn't like she was standing over them.
She wasn't at the Genius Bar or anything. She sent it via the mail.
But according to legal findings seen by The Telegraph, these two unnamed technicians that found the sensitive content— when I say sensitive, I mean pictures of her in various stages of undress and a sex video.
And not only found it— so say, say you were this kind of person, Graham.
I'll keep this for later if it's sexy, sexy.
And for the young members of our audience, this was a thing that used to happen.
You took photos on this thing called film, and then the next day it would be developed and you get your pictures back.
Anyway, he worked at the Fotomat, and he said— he told me that in the little booth there, they had a binder that they called the Who's Your Daddy binder.
And that was where whenever someone would come in with photos from, say, a bachelor party or something like that, they would run off extra copies of the spicy photos, and they would go in the folder for the employees to enjoy.
So there's a long history of this.
All right, okay, so what these guys do, instead of just putting it into their who's your daddy photo album, post it up on her own Facebook account.
Do you think they meant to post it to their mates from their Facebook account and they accidentally logged into hers from her phone?
And these two guys just, they hang out together, and they're the two goofballs, and they're always looking for things to do to fight the boredom and keep themselves interested, and as they say, one thing led to another, and Beavis said to Butt-Head, "Hey, wouldn't it be funny?
Look, I can access her Facebook. I've got an idea. Watch this." And they had a good laugh before they realized what they had actually done.
It's at Apple." She probably was fielding a bunch of calls from her Auntie Jean and ex-boyfriends and all the— Anyway, so she lawyers up. She lawyers up and takes on Apple.
And lawyers for Wilhelmina threatened to sue Apple, citing invasion of privacy and severe emotional distress, right?
And apparently, reportedly, demanded $5 million in damages during the negotiations.
But the thing is, she's not allowed to speak about this. She had to sign an NDA to get the wonga.
I really don't like the whole, you know, "STFU if you want this cash." I don't really like that.
Is that you can either take them to court and have it decided by a judge, which will then all be public, or you can settle on the steps of the courthouse, and they say, "Look, we'll give you more than you wanted if you agree to do this." It's just a business relationship.
And it'd be illegal. Yeah.
And their insurance company said, "No, we're not going to compensate you for the amount." So it refused to pay.
And in that, Apple said, "You have to call us the customer." But during a bunch of legal fights going back and forth, it eventually became clear that the customer was Apple.
So it leaked.
Apple confirmed the incident statement to The Guardian Monday, and the woman, of course, has not responded to any of it. So she can't. She can't say anything.
She can't say that's bullshit. She can't say that's true. She can't say anything. Apple spokesperson, of course, says, "We take privacy and security." What do you think?
What are the next words?
And maybe, maybe Pegatron should have had, I mean, even if you have rules in place, if people are doing that kind of diagnostic work to fix a phone, is there any way to prevent them from—
If you happen to dump it in a big pile of water, you're not gonna be able to do any of this stuff.
You should be doing this anyway, right, to the cloud, but have a backup of your device, your iOS device, and then erase your iOS device before you send it off.
And then all you do when you get it back is you can reload up all your information from your backup.
Because, and in fact, even if you go into the store, they'll often ask you to disable your password, right. So yeah, you want to think again, and they take the phone to the back.
And the reason they do that is they don't have to come back and forth every two minutes to, you know, can you reactivate? Can you have your fingerprint, right.
So, you know, erasing your device before you bring it to an Apple Store if possible sounds to me like a really smart idea.
And the other thing you do is remove the SIM card from the device. Also, if you're mailing it in, remove the case, screen protectors, and keep your cables and chargers.
Apparently people sometimes send them in, never see them again.
If I had a backup, you know, the phone's broken, okay, it's not worth sending off to someone else and risk that falling into the wrong hands.
If I could afford it, right, I would just buy a new phone and restore from backup.
So if you want to have this sort of thing on your device, perhaps you want to have it under a second layer of protection so that if the repair folks need access to the phone, that's fine, but they won't have access to this secure folder where you keep this sort of thing.
It's a fraud that works by getting the victim to misplace their confidence in the con artist. In the world of security, we call confidence tricks social engineering.
And as our sponsors KnowBe4 can tell you, human error is how most organizations get compromised. Where there's human contact, there can be con games.
It's important to build the kind of security culture in which your employees are enabled to make smart security decisions.
And to do that, they need new school security awareness training. KnowBe4, the provider of the world's largest security awareness and simulated phishing platform.
See how your security culture stacks up against KnowBe4's free phishing test. Get it now at knowbe4.com/freetest. That's K-N-O-W-B-E and the number 4 dot com slash free test.
Think of KnowBe4 for your security training.
Using 1Password can close the gaps in your company's security, combat shadow IT, and help your employees stay both productive and secure wherever they are.
1Password makes the secure thing to do the easiest thing to do. Quickly deploy 1Password to a single team, multiple teams, or your entire enterprise.
Provision employees using trusted systems, respond rapidly to domain breach reports, and offer every business user a free 1Password Families account for work-from-home security.
Find out more and try 1Password for free for 14 days at 1password.com. And thanks to 1Password for supporting the show.
It is a neat way of handling brand new threats coming into organizations via web, email, or file sharing, and it can run along your existing antivirus.
Threat Removal gives you the good stuff by delivering files that are 100% threat-free, fully functional, and fully revisable.
Adding Threat Removal to your defense can help you reduce administrative costs as it doesn't require signature updates or security ransomware patches and reduces the time your security team spends on false positives and remediation.
Visit deep-secure.com/smashingsecurity. That's deepsecure with a hyphen dot com smashing security for more information and to set up your free trial today.
And deep thanks to Deep Secure for sponsoring the show.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish. Doesn't have to be security-related necessarily.
Sometimes I read them, sometimes he reads them. They are called the Three Investigators books.
Jupiter lives on a scrapyard with his uncle and aunt, and they have a base hidden behind a pile of rubbish. And what happens is these 3 teenagers, they get mysteries to solve.
So they're running a little detective agency and they investigate anything, sometimes with the help of their English chauffeur who drives them around in a Rolls-Royce.
Now, sometimes the Three Investigators is known as Alfred Hitchcock and the Three Investigators because through some sort of shady marketing arrangement, Alfred Hitchcock would sometimes frame the books or frame the story.
So he'd have a chapter at the beginning just introducing the characters. And then at the end of the story, they would go and explain the mystery to him and tie up the loose ends.
But he didn't write the books. A lot of people thought Alfred Hitchcock wrote books. He didn't write the books.
The early ones were written by a chap called Robert Arthur, and then they were written by others as well.
They are great stories, like The Mystery of the Green Ghost, The Whispering Mummy, The Stuttering Parrot.
I still love them to this day, and I found a fan website at 3investigatorsbooks.com where we can find out more.
In fact, Carole, I don't know if you remember, when we used to work for a certain computer security company—
And so I've loved them a long old time, and they're great. And that is my pick of the week.
And this is when— Remember when The Sims were spinning off all sorts of different types of games. You had SimLife, you had, I don't know what, SimZoo. There were all sorts of—
So you could have, part of it was a hotel and part of it had, you could put a movie theater in and you had to build in parking garages and all sorts of things.
'Cause that's how you scored points in the game, and if people got angry that they couldn't get to where they were going, that was bad for your score in the game.
So that, I think, kicked off my fascination with games that involve moving people around efficiently and those sorts of things.
And it is similar to SimTower in that you are building little roads to connect people's homes to little shopping malls and parking garages.
And as the game goes on, more and more homes spawn into this world, and more garages and malls spawn into this world.
So it gets faster and you have to connect more cars and you get traffic jams and you get bridges and you can build little freeways and things.
It's a game that's very simple from the outset, but as you play it, you start to figure out ways to get higher and higher scores and deliver more people to their destinations.
It can get a little fast and furious towards the end because there are so many cars and you're trying to manage them. So it's a lot of fun.
I would say that at the end of a busy day, if I'm looking to unwind, I will often fire up Mini Motorways and sort of disengage my brain and spend 20 minutes or so building a little community and trying to get cars to their destinations.
And that is why Mini Motorways is my pick of the week.
Some of them are as short as six minutes and others are as long as almost 20.
And the idea is that you have different animators, different storytellers delivering standalone sci-fi stories.
And I'm guessing what they were told is make it about love, death, and robots. That was it, right? Season two has just recently come out, which is why it's hit the news again.
Unfortunately, it's a lot shorter, less contributors. But it's really quite great. I found it fantastic.
Now, the press, when I went looking about this to cover it for today, a lot of them were saying, "Oh, God, it's mediocre." Some of them are stupid, and there's a lot of negativity.
I don't agree with it. Obviously, I like some of the stories better than others. I like some of the animation better than others. Some were a bit gruesome, indulgently so.
There's sex bots in some. So, it's not for kids or anything. And it's a bit gratuitous, but it doesn't matter. The animation is just mind-blowing.
But there's these two people and they open up their fridge and there's a tiny world inside their freezer and they can see— and it's basically just civilization occurring from the beginning.
In the show notes, I have put a Vulture write-up about each episode. You can take a read and watch those that you fancy, 'cause there's no tie between them.
Anyway, I say check it out. I loved it. Love, Death & Robots on Netflix. That's my pick of the week.
In our world, that's really? Well, maybe you need to listen to see how he's done it. It's pretty clever. So today I am pleased to be joined by Deep Secure CTO, Dr. Simon Wiseman.
Welcome to Smashing Security. Thank you for speaking with us.
So Simon's obviously a smart person's name, probably because of that brain game Simon Says when we were kids. But you also have Wiseman as a surname. It's genius.
So that is what we were gonna dig into today. But let's first maybe set the stage. What can you tell us about you and Deep Secure?
We create software products, we provide services to defend organizations of all sizes, you know, across all sectors, really defending them against malware.
And our core technology is Threat Removal. And that just exists to stop malware. And it really does work. We once put it to the test.
We put over 30 million examples of known malware in front of it, and that batch included malware of every kind.
It was executables, macros in Office documents, PDFs, image files, the lot, right? And every one of those files was either made safe or blocked.
And we've even had highly skeptical customers do similar tests, including some government agencies who didn't just try publicly known malware.
And, you know, Threat Removal just won out every time.
Everyone else is looking for the bad things so that they can be blocked. That's just not a winning strategy because those bad guys are actually really good at...
They're really good at hiding their malware and inventing new ways of getting past you. And in the end, they will always win.
All the stuff that can make malware exist?
So we give you what you want, right? But without the malware.
And the best idea that was had was to convert complex sort of data files into something simpler that just couldn't carry malware.
But the big problem with it is that the users didn't get the information they really needed because everything had to be simplified.
So a document might get turned into a series of images of the pages, which is okay if you want to read the document, but it's no longer editable.
So not half as useful as it needs to be. And even then, it doesn't necessarily stop all the malware because an attacker might do something new.
Find a way of fitting malware into that simple data that you allow in. And even simple images can contain malware.
So the idea was good, but really not close enough to be generally useful. But that's what we wanted to do at Deep Secure.
We wanted to find a way of delivering the users all the information that they need without leaving the attackers with a way in. And then eventually the lightbulb moment came.
Really, it was pretty simple in the end. We just throw away all the data and make completely new data to carry the same information as the original had.
In other words, kind of you give the users all the information, but you make a new box to put it in.
They can't sneak the malware past our check because we're not checking for bad things. And that's why we can end up with that 100% effectiveness claim.
DeepSecure, we've managed to engineer that theory into something that's workable in practice. I mean, you've got to have something that's effective and scalable and easy to deploy.
Otherwise, no one can adopt it. And it's got to be fast and unobtrusive. So it doesn't get in the way of the user's day job. And all that's pretty tricky stuff.
But that's what we've got with threat removal. It stops the malware but doesn't stop you working. Now to do that, the first thing we have to do is to get into the data flows.
Because we need to get every file 100% malware-free before it gets delivered. So we need to be inside the delivery mechanisms.
And so we've built the interfaces needed to add this into your email, web, file-sharing gateways. And we've provided interfaces so you can integrate it into your internet portal.
And once we're in these places, then we can get to work on the data, which is where the proper threat removal process kicks in.
That data is like a pile of bytes encoding the text and graphics you see in a document or the numbers and formulas that you work with in a spreadsheet.
But the data is where the malware hides, right? The data doesn't go in the information, it goes in the data.
So if we deliver you the information but not the data, you get what you want, but you don't get any malware.
Fun bit is that even if the data is clean, we still don't give it to you because we're not trying to figure out whether the data is infected or not.
We always throw it away, and because we know that if we try to decide, the bad guys would just find a way of beating us.
So we need to get to the data before it gets to you, and then so we can clean it up.
They're just going to be beating you. And that's why at Smashing Security, we decided we really needed to stop the malware, not just slow it down.
And, you know, we want to give the user what they want. That's the information. And we don't give them any malware.
And even if it's zero-day malware, you know, which is so hard to detect, all because we throw the data away, whether there's any recognizable malware in it or not.
That's why we defeat zero-day malware as well.
And you could send the experts in to try and find the mold and get rid of the mold, or you could just take all the furniture out and put them in a brand new house and say, here, look, no mold here at all, you're safe.
What do I do?
They get the information they were sent and they get it immediately. So they don't see anything odd.
The files that arrive, you know, they look and feel just the same as the originals, except of course, any malware might be missing.
But all the details there, you know, if you download a PDF, it looks pixel perfect. It's searchable like the original. It's no different.
If you get emailed a Word document, you know, you get all the text and formatting and graphics and stuff that's in it, everything that was in the original, but it's just different data.
But you can't tell that. They look and feel the same.
There's no slowdown and there's no delay while you have half a dozen antivirus scanning engines check the data over. It just arrives.
And if you sent an email, it just turns up immediately. There's no waiting 10 minutes while it sits in a sandbox being analyzed.
And there's no prospect of it getting parked in a quarantine queue just because it smacks of some known malware.
And then you have to wait ages for the administrators to work out that it's okay for you to have it. You know, your email just turns up and it's clean.
And that's what's revolutionary, really.
And this kind of takes that whole problem of their users opening something that they shouldn't or having the wrong settings or because if all the files come through this way, they're all clean.
And then it just takes that whole worry away from them.
And what they don't get now is an endless series of alerts where some malware's got past those outer defenses and now they've got to go and track it down.
Or they don't have to spend time looking at that quarantine queue, checking out the important files that have been wrongly blocked.
And that frees them up so they can focus on security issues other than malware, which are the ones that really need their skills and analytics, like identity theft and insider attacks.
But threat removal is sort of meant for enterprises, and that's because it sits in the infrastructure, right?
So it doesn't help the people at home unless, of course, it gets built into the services they use.
You know, because it's fast and efficient, it's good for any organization that's fed up with their anti-malware defenses letting stuff in.
Commercial organizations now are routinely targeted by cybercriminals, right?
And these criminals are now tooled up with the kind of malware that hostile nation states use to attack defense systems. The really bad stuff is hitting ordinary organizations now.
Poisoned Word documents and booby-trapped spreadsheets, images with hidden extras that you'd rather not have, the full works.
And as they go through digital transformation, things are just going to get worse as they expose an ever larger attack surface, get more and more connected, and become more reliant on the systems that they use working properly all the time.
And that, I think, is generating a real need for this guaranteed malware-free business information across all sorts of organizations.
So it's the kind of enterprise who really doesn't want to fall victim to malware but has to connect to other people that they don't trust.
But there's also parts of the critical infrastructure where malware could lead to really disastrous loss of service. So, you know, think about banking, for example.
If the banking system was taken down, we're in a mess.
But increasingly, we're winning over customers more in the sort of private sector who just understand that blocking 95% of known malware just doesn't cut it anymore.
And I'm saying 95% here because that actually is the typical success rate of antivirus detection.
Threat removal is giving them a real alternative, you know, something that's just simply better, faster, cheaper. The other thing you mentioned there was the cloud.
Now, the cloud, the move to the cloud is really helping drive adoption of this because it lets customers add it in easily into their existing defenses.
We've already got a service that lets developers build threat removal into their web applications and portals in the cloud.
And we've just started delivering protection for web cloud gateways.
So that's all pretty neat, but even better, actually, just around the corner, coming up soon, we've got a really neat solution for a cloud solution for email coming as well, which will be really knocking people's socks off, I think.
So that's deepsecure with a hyphen dot com smashing security. And there you can learn loads of information about what threat removal is and even download a free trial of the tool.
And that leaves me to say thank you, Dr. Simon Wiseman, CTO of Deep Secure. Really appreciate you coming on the show.
Dave, I'm sure lots of our listeners would love to follow you online. What's the best way for folks to do that?
And don't forget to ensure you never miss another episode, follow Smashing Security in your favorite podcast app, such as Spotify, Google Podcasts, and Pocket Casts.
Now for episode show notes, sponsorship information, guest lists, and the entire back catalog of more than 230 episodes, check out smashingsecurity.com.
I've listened to them all now." Well done. "Just gutted I've got to wait a whole week between episodes now.
Off to sign up to Patreon as I can't believe this is free." Geez, you really wanted to make sure I'd read this out. Well, kudos, I did.
We've also got one from 425Slam who says, "Discovered this great show during last year while working from home and commenced to binge. Fun and informative.
I especially love Pick of the Week. Those picks led me down so many great rabbit holes. Thanks so much." You are welcome, 425Slam. There were a few snafus with my audio this week.
The regulars of you will know that. And it took a lot of work to edit to make it sound good. And so these reviews mean particularly a lot this week, especially when we're struggling.
So huge thank you. Thank you to you all, and keep them coming. See you next week.
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Dave Bittner:
Show notes:
- AFP-led Operation Ironside smashes organised crime — Australian Federal Police.
- AN0M: Hundreds arrested in massive global crime sting using messaging app — BBC News.
- Fake encrypted app cooked up over beers by Aussie cops and the FBI leads to global sting — Daily Mail.
- FBI Effort to Expose 'USA Today' Readers Was Likely Unlawful, Experts Say — Gizmodo.
- Sunrise, Florida, shooting: 2 FBI agents killed in shootout identified — USA Today.
- Apple paid woman millions after technicians used her iPhone to post explicit videos — The Guardian.
- Get your iPhone, iPad, or iPod touch ready for service — Apple Support.
- The Three Investigators.
- Mini Motorways.
- Mini Motorways gameplay video — YouTube.
- Mini Metro — A strategy simulation game about designing a subway map for a growing city.
- Love Death & Robots review – prestige TV with added sexbots — The Guardian.
- Netflix’s Love, Death & Robots Volume 2 Ranked Best to Worst — Vulture.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
- Support us on Patreon!
Around 80% of business data breaches result from weak or reused passwords. Using 1Password can close the gaps in your company’s security, combat shadow IT, and help your employees stay both productive and secure, wherever they are.
1Password makes the secure thing to do the easiest thing to do.
Instant control, effortless management. Quickly deploy 1Password to a single team, multiple teams, or your entire enterprise. Provision employees using trusted systems, respond quickly to domain breach reports, and offer every business user a free 1Password Families account for work-from-home security.
Find out more and try 1Password free for 14 days at 1Password.com 1password.com
Deep Secure Threat Removal takes incoming poisoned Word documents, boobytrapped PowerPoint slides and the like, and creates brand new files with just the good stuff (and none of the bad). It is a great way of handling brand new threats coming into organisations via the web, email or file sharing and can run alongside your existing anti-virus.
Threat Removal gives you the good stuff by delivering files that are 100% threat-free, fully functional and fully revisable.
Visit deep-secure.com/smashingsecurity for more information, and set up your free trial today.
Did you know that 91% of successful data breaches started with a spear phishing attack?
Find out what percentage of your employees are at risk with KnowBe4’s free phishing security test.
Plus, see how you stack up against your peers with the new phishing industry benchmarks.
Find out more at www.knowbe4.com/freetest
Follow the show:
Follow the show on Bluesky at @smashingsecurity.com, on the Smashing Security subreddit, or visit our website for more episodes.
Remember: Subscribe on Apple Podcasts, Spotify, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!
Warning: This podcast may contain nuts, adult themes, and rude language.

