
Someone’s election-fiddling is uncovered with an Apple AirTag, a cyber scandal rocks Germany, and a swindler steals a fortune due to trains being delayed.
All this and much more is discussed in the latest edition of the award-winning “Smashing Security” podcast by cybersecurity veterans Graham Cluley and Carole Theriault, joined this week by runZero’s Chris Kirsch.
Plus don’t miss our featured interview with Akamai’s Patrick Sullivan talking about how retailers can better thwart bots this holiday season.
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
And there's this bigwig who somehow set up the Cybersecurity Council of Germany, not to be confused with the Cybersecurity Council of Germany.
Hello, hello, and welcome to Smashing Security, Episode 294. I'm Graham Cluley.
There is another company called Rumble that we thought would never cross our paths because they're in a very different space and they decided to go public on the NASDAQ.
So we decided to rename and we're now RunZero.
You can find that up on our blog.
It's their support that helps give you the show for free. Now, coming up on today's show, Graham, what do you got?
He is CTO of Security Strategy at Akamai. So all this and all that and much more coming up on today's episode of Smashing Security.
What do you mean, yes?
A few years ago, I was living somewhere else and I'd take the dog out for a walk and, you know, there we go. La di da, you know, it's wonderful.
And I'd go past the village notice board and there was something tacked onto the village notice board which I didn't like. I thought, I don't like that.
It said, would you like to come along to a friendly get-together where we'll have tea and coffee and cakes and we'll talk about philosophy and economics?
And I didn't really like what I read. And I was reading this pamphlet on the noticeboard and I thought, that's from this group.
I thought, they're just claiming to be handing out orange juice and talking about philosophy, but I know it's something else.
So I thought, right, I'm going to take down that poster because I don't want anyone going along to that meeting. So I would take it off the noticeboard, right?
And then I'd go by again a few days later with my dog and the person had put up a new poster and stuck it on. Maybe they used staples this time.
And I think, right, I'm taking that down, right? So I'd rip it off, I'd shove it down the front of my trousers, and off I'd go on my dog walk. And I'd do this every few days.
I'd see another one. So there was this battle going on.
But I was reminded of what I'd done when I read this story on Forbes this week about signs that some people had put up in their front gardens.
People have their yard sign up in their front garden. We don't do it as much over here in the UK. I mean, we do a bit.
They wake up in the morning, it's gone. It's vanished.
And some of the people who noticed that their signs had disappeared were contacting the cops to file a report saying, "Hey, you know, wait, this thing has disappeared from my front lawn." And obviously the cops leap into action.
Yeah.
Let me put them on ice and I'll come and deal with this." We won't worry about the Philadelphia Strangler.
And that's where all the signs are.
And this information went to 75-year-old Arlene Talley, who's a member of the Chester County Democratic Committee. She was interested as to what happened to the signs.
She went to where the police said. She found the dumpster, and she found 118 stolen political signs. All of them supporting Democratic candidates.
We should definitely want to clear up a sign if it was proposing that sort of— oh goodness me!
Anyway, so all these signs which were obviously, you know, sort of slightly left of— well, left of right. Now, how did the cops know they were there?
Well, it's because one victim had had the foresight to attach a $30 Apple AirTag to their sign, perhaps realizing—
So guess it works all around.
Seriously, Chris, if you were in charge of the cops, they could have gotten their nails done at the nail salon at the same time.
But then you have to go get them yourself.
They think— The police theory is it's mostly kids, as some homes also had their mailboxes damaged.
So we're all familiar with this idea of AirTags being used to help find lost items like bikes, lost luggage, and of course being used to track and stalk people, or that story which Chris gave us before, an extraordinary story from Germany about finding out where top secret apartments may actually be based.
But, you know, these AirTags can be used in all kinds of ways. So my son, it turns out, I didn't know this, my son has got an AirTag.
He's got it on his phone or his school bag or something. And so they built into AirTags this means by which you can be warned if a tag is following you.
So if someone's planted one in your car, for instance.
So I'm finding this really annoying because I'm obviously carting my son around all the time with his school bag, getting him to school or, you know, to his tutor or something.
And all the time I'm getting these messages popping up on my phone saying, "Ooh, there appears to be an AirTag which is tracking you.
It's been traveling around with you." It's like, well, yeah, I know it's been, this is my, and I've got no way of saying, "Well, don't bug me about that one.
Stop bleeping at me all the time."
She has said she's blaming it all on MAGA, Make America Gruesome Again. She says, we will not let the radical MAGA right intimidate us.
Double the amount of signs taken will go back up. Now that seems to me like we could end up with an exponential rise of signs on people's front lawns if this keeps on happening.
And I don't know what's gonna happen with the dumpsters either, but it's just gonna keep on and on.
And gotten a little bit of controversy going on in town.
So I can't even find people who pick up signs all over the city and put it in a dumpster. Oh, this was in the US, right?
And there've been some weird things happening in Germany, for example, the German railway system was halted for 3 hours earlier this month due to a failure of the digital train radio system.
They chalked that up as sabotage and, you know, maybe that's Big Brother Boris meddling with things, right? Just to set the scene for—
They make all sorts of things like VPNs, endpoint security. I think they have a managed detection and response service. So kind of finding anomalies on your network.
And they're the typical kind of small or medium-sized German company selling German software to German enterprises and, you know, sometimes around the world.
And so this German TV station looked at them. They had a lead somewhere and they saw that the Protelion software was also sold by a company in Russia called Infotex.
And so they're like, hold on, this is a little weird. Shouldn't that be under sanctions? And, you know, is that still allowed?
And so they wanted to phone them, but they thought, no, no, we'll just go by their offices and, you know, ask them in person, you know, and tell them, hey, the Russians have pirated your software.
They're selling that in Russia and trying to figure out what's going on.
So when they arrived at the offices in Berlin to warn them that their software was being sold in Russia, the Protelion doorbell says, please ring the bell for Infotex.
So that's a bit weird.
It's kind of like, what is it with people who are trying to hide their tracks that they are in the same building and kind of like referencing each other's bells?
You know, tradecraft's really gone downhill. So also what was weird is that if you look up the CEO of Protelian, he is formerly the head of Infotex Germany.
So they actually just rebranded Infotex Germany as Protelian.
Infotex is the original equipment manufacturer of the Protelian software. It gets more interesting.
Infotex also supplies the software to the FSB, and the Russian intelligence services also helped develop the encryption algorithms for that software.
Doesn't that make you feel warm and fuzzy?
So we'll do a little pub quiz, Carole and Graham. You know, you're used to pub quizzes, right?
Like in the UK, you're asked who won the Eurovision Song Contest 1974 or something like that?
So no room for confusion at all there, right?
So Chris, when you had this sort of name dilemma yourself with your company where your name was also being used by this company, you just changed your name.
Whereas this organization appears to almost be exploiting the fact that they have—
So same with this group here. Some of the very large German enterprises were in there. And it's very hard, as you said, to distinguish the two cybersecurity councils of Germany.
Now, Arne, he's the son of a German, former German minister, also coincidentally the person who was the first commander who integrated the East German army into the West German army, the Bundeswehr.
So, you know, somebody who has a lot of political clout and former ties to Russia, maybe, I don't know.
And so his son Arne is now the current chief of the BSI, which is the German intelligence agency for cybersecurity.
So it's a respectable agency. He himself, not so respected in the industry.
He's got no background in information security to the point that he got dubbed as the cyber clown by German media.
And by the way, his successor also was interviewed on TV that, oh, you have to stay in touch with all of the relevant players in cybersecurity, and that includes the Russian and Chinese intelligence services.
They're members of the Cybersecurity Council in Germany as well. Yeah.
And there's this bigwig who's a clown who somehow set up the Cybersecurity Council of Germany, not to be confused with the Cybersecurity Council of Germany.
So the FBI is also investigating Infotex and not just, it's not just an issue in Germany.
So this is actually, should be relevant to a lot of your listeners, but more importantly, look at your vendors and figure out if they are of good provenance.
Maybe drive to their offices, look at the doorbell.
Yeah, it was a lot for their security, doesn't it? Yeah, OPSEC is pretty bad.
And by the way, the head of the BSI is now probably getting fired, per a message of the German interior minister. So that's gonna put an end to that.
So no more clownery in German cyber.
But let's not forget about employees, some of which can get up to no good in plain sight and no one's the wiser. Meet Shahid Anwar. He is a 36-year-old from Rugby, England.
And yes, that is apparently where the game of rugby was first conceived.
Then I moved to the UK, and I think the British rail system divides snow into 4 categories, and they can't operate in 3 of them.
But apparently due to your crazy flooding and strikes and issues that you've had, your numbers are now in the same boat as ours this year.
But basically it means that you can apply for refunds if a train is canceled due to strikes or it's late or whatever.
And according to money-saving experts, people are not actually applying for these refunds to the tune of £100 million.
And maybe this is where he decides to do something about it. So this all kicks off in 2016. He starts submitting false refund claims.
Some of his tactics include creating photoshopped tickets. He created over 100 PayPal accounts and multiple email aliases to manage this racket.
He managed to pull off more than 1,500 refunds by taking advantages of design weaknesses in the pay and delay scheme. Some were as small as £9.10.
The biggest one I could see was £746. That's what he was able to claim. In all, he did this for 3 years and amassed £116,000 in this time.
And apparently when arrested, he said he was so relieved to be finally arrested because he felt he'd gotten addicted to this.
So, two things which blew my mind, which I haven't mentioned.
I'm just gonna submit a refund request for it with a fake Photoshop ticket.
So let's say like 33K a year. So 2.5K a month or about 600 a week, okay? Those are your numbers. So 600 a week.
So one of his claims when he got arrested is what they were saying, well, what did you spend the money on?
The judge was unhappy that he had been arrested in 2019 but only charged 2022, which, you know, that's a long stress period for not knowing if you're going to be charged or not.
So best takeaway here is if you are in the UK and you find yourself on a delayed and canceled train, even if it's due to strikes, which we've had a lot of recently, go check up on how you can reclaim a refund.
These details are in the episode webpage on Smashing Security.
In cramped— I mean, they wouldn't actually transport cattle in as inhumane conditions as they do people. People on trains in this country. So, but yeah, it's a good idea.
Good tip, Crow.
Every second, the internet gets more chaotic, more cyber threats. Securing entire ecosystems, clouds, apps, APIs, and users, that grows more complex.
Causing friction that slows innovation and hampers agility. With Akamai, cybersecurity can become an engine for innovation and growth.
Whether you want to achieve unmatched security with Akamai's suite of app and API protection, or embrace a zero-trust architecture, Akamai can help.
With insights from the world's most distributed compute platform, Akamai delivers unique security research on the latest attacks and trends on everything from ransomware as a service, gangs like Conti, DDoS attacks, phishing attacks, to help you protect your business.
Where else can you take advantage of insights from 7 trillion DNS queries per day? Learn more about Akamai and their security research. Visit their website, akamai.com/smashing.
That's A-K-A-M-A-I.com/smashing.
And it is chock full of goodies.
Features, which include password-protected encrypted export, which allows you to export your vault in an encrypted format using the password of your choice.
Plus, there's the mobile username generator. It's finally here. They also have DuckDuckGo email aliases available.
And here's a little insider scoop for you: they're working with DuckDuckGo to get macOS browser integration in the forthcoming DuckDuckGo macOS browser.
Want to try these features out? I don't blame you. Visit bitwarden.com/smashing. That's bitwarden.com/smashing. And thank you to Bitwarden for sponsoring the show.
Auditors want to know that you have a system in place to monitor and maintain compliance across your fleet, which means showing that your staff are using things like disk encryption, screen locks, password managers.
If you're not quite sure how you'd go about proving all that, then you need Kolide.
Kolide's an endpoint security tool for Mac, Windows, and Linux devices that gives you the visibility you need to meet your third-party and internal compliance goals.
Best of all, Kolide doesn't resort to spying on workers or locking down devices.
Instead, it works with end users to resolve issues and relies on their cooperation and informed consent.
You can meet your security goals and pass your audit without compromising on privacy. Visit kolide.com/smashing to find out how.
If you follow that link, they'll also give you a goodie bag just for activating a free trial. That's K-O-L-I-D-E dot com/smashing. And welcome back.
Can you join us at our favorite part of the show? The part of the show that we like to call Pick of the Week.
Could be a funny story, a book that they've read, a TV show, a movie, a record, a podcast, a website, or an app. Whatever they wish.
It doesn't have to be security related necessarily.
The ranger's not going to like it, but if they steal a little ham— I used to watch TV a lot. I used to watch Yogi Bear and Boo Boo. I know all about bears at Jellystone Park.
And so I know the antics which they get up to. And apparently the rangers at Katmai National Park and Reserve, they have been holding for some years now Fat Bear Week.
Where they try and work out what the most popular bear is. And they've been running this online as well. You can vote if you want.
A few Sundays ago, there was a semifinal round between a roly-poly bear, which they've nicknamed Holly, codename 435. So they've all got numbers.
And there's also an airplane-sized bear called 747. And you had to decide which was your favourite fat bear. Now you're wondering, why am I mentioning this?
Well, the reason it came to my attention is there has been some election fraud going on.
So apparently they were avalanched with emails, lots and lots of emails coming from several IP addresses, which were all voting for Bear 435, who did win, to her credit, in 2019, the Fat Bear Week Championship.
Yeah. But they said, no, no, no, a lot of these were actually fake votes. So someone has been trying to rig the Fat Bear competition. And I think that is a warning for all of us.
So if you're sitting there in the soup looking delicious, like little dumplings for a bear, you could try and poke it off with this stick. It's ridiculous.
Why on earth was someone trying to rig the vote? What is going on?
So some of you might know that I have an interest in OSINT, open source intelligence, which is basically, you know, using public sources to figure out stuff about companies, people, etc.
And on Twitter, I saw somebody, you know, posting a list of, hey, here are some cool new OSINT sources, and PimEyes was one of them. And it's a reverse image search engine.
So you can where you can put in a picture instead of typing out a term you do on regular Google.
You put in a picture and then it shows you other places where that picture is from or similar pictures and so on.
And PimEyes has a particular flavor of reverse image search, which includes face recognition.
So you can put in somebody's picture and it'll find other pictures of the same person just through face recognition.
And I actually tested that and I tried to, you know, get onto the Clearview platform and I couldn't get in. So that was actually, you know, reasonable protection.
It's still, you know, concerning from a privacy perspective and so on, but at least it wasn't available to your average Joe.
Now, PimEyes, on the other hand, is available to the average Joe at a bargain basement price. So I wanted to try out the platform. It's $30 a month for the lowest tier.
There's also a free search, which means you only see other pictures, but you can't click through to the sources, and they're only the face with everything else pixelated out.
So I gave it a test drive, and it works surprisingly well. You can add 1, 2, or 3 pictures or more to improve the quality of the search.
And then you get across the internet all publicly available pictures of that person.
And it has found a number of other pictures of Carole. And I thought, well, maybe they've worked out that that is Carole Theriault in the picture, maybe they've done that.
And so they then searched for Carole Theriault. But they've also found pictures of someone who looks very much like Carole Theriault. I have to say—
Carole, there you are. That looks like you. I've just Googled. I don't know if you can see that, but there you are.
So that shows me that they really do face recognition and don't just pivot over the name that they might find somewhere.
But it does also, and you've just proven this, Graham, it does also have quite a lot of false positives.
So the further down you get in the search, the probability of this being the same person goes down.
And when you get towards the end, a lot of adult sites and a lot of et cetera, right? There's so many things that can go wrong with that technology.
So for example, you might, as an employment screen, put somebody's LinkedIn picture in here, and you might find some false positives, right?
Where you think, oh, this person had some other parts of their career that's not on LinkedIn. Or you might find some revenge porn out on different sites.
That's become unfortunately very common now. And so, you know, just from a professional profile to going to false positives and real leaked nudes is very, very fast now.
But also, if you think about a stalker just out in the public, if they snap a picture of somebody, that means that they can now probably find their Facebook pretty quickly and identify who that person is.
And, you know, that could increase stalking. On the flip side, you could also take a picture of a stalker and identify who they are.
You could also think of Charlottesville, January 6th, you know. Yeah. All of these events where people were trying to figure out who somebody is online.
We just scraped the web. We're just providing this service. Nothing to do with us, gov.
I'm now searching for a photo of myself and I'm finding an alarming number of photos of me. Thankfully I—
So if you don't like scary movies, maybe you like scary books. 1971 Exorcist, the book. I watched it when I was quite young, and I had nightmares for weeks afterwards.
The little girl that's fully under the control of evil forces haunted me. It was awful, but it stayed with me. It's considered, I think, one of the scariest.
Now, my pick of the week is not The Exorcist, but Mark Kermode's 1998 documentary on the movie, which has been re-released on iPlayer in full, and it's called The Fear of God: 25 Years of The Exorcist.
The amount of information that Kermode was able to get out of all the interviews is gobsmacking.
And he manages to interview almost everyone who is either directing, writing, or acting in the film, including an actual priest who is based in New York.
Now, I know you guys haven't seen the film, but there's a lot of words I've read and heard about how this movie was cursed, right?
Which is great kind of PR for the film itself to think that. But after you watch this documentary, you sure as heck believe it.
Okay, a few things I will cover without ruining the documentary is that, of course, because this was filmed way back in— when was it? '73?
And you have the person explain how we decided to do the stunts.
And he had to just create and rig up these insane contraptions to throw people around or, you know, to yank them or bounce them or topple them over.
And it's so disgusting how little care was given to the young, especially the young girl who's playing the main girl.
And the director was bonkers, wasn't he?
There was a lot of deaths on set during the production, way, way, way too many to consider anything close that could normally happen in any kind of situation.
Friedkin and the writer are both really intense and passionate people and they come across as people that would stop at nothing to get what they wanted.
And that's the problem, is that everyone else paid the price and he goes down in the hall of fame because now it's an acclaimed film. Anyway, the documentary is just astounding.
I love, love, love, love, loved it.
So I would recommend that you try and watch The Exorcist first before you watch the documentary to get a better sense of everything if you can, but it is scary.
But the documentary again is The Fear of God: 25 Years of The Exorcist, currently available on BBC iPlayer and maybe even available for sale in other places.
But that is my spooky pick of Cool.
He is CTO of security strategy at tech giant Akamai. Now, Patrick has nearly 30 years of tech experience under his belt and is also a bot expert.
And he's going to help us understand how retailers, as they gear up for the holiday season, can better thwart the bot problem. Patrick, first, welcome to Smashing Security.
Delighted you're here.
And I know that Akamai has done a lot of research on this last year. But first, I thought maybe you could just define what a bot is. I mean, are they inherently bad?
Just for us to all visualize it?
So the, you know, a bot is just a bit of automation that's performing a task on behalf of the bot operator and the bots themselves, obviously, they're not benevolent or malevolent by nature.
They really kind of take on the motivation of the operator, right? So it's really the humans that kind of define the motivation.
And to your point, we see, you know, very benevolent, you know, bots that help us crawl the web to search out.
And when we, you know, commit a search, it helps us find a relevant web page, right?
And then between those two extremes, there's a whole kaleidoscope of, you know, shades of gray that are maybe not 100% good or 100% bad.
It's a matter of perspective, some somewhere in between.
So it's, the good news is, you know, that's a staggering total, but that's still, you know, a minority request.
Most interactions are still driven by human beings, you know, on their phones all day or, you know, on their laptop.
But it's— that is a massive volume for website operators to deal with.
Maybe you can share some of the research findings that Akamai were able to sniff out in their research and just help us understand what retailers are facing in this space.
So, you know, a lot of areas when you're sort of deep into the domain, you know, there are people that live near the Arctic Circle that have dozens of names for snow to describe sort of the different consistencies.
It's very similar with bots. We've got all kinds of different names for various types of bots, but maybe in retail, there's probably 3 big categories we could talk about.
You know, one would be scrapers that are coming through and pulling down all the information from the site.
Second, there's a category of bots that are really heavily focused on fraud. So there we see account takeover as an area of focus.
And then maybe the one that's most visible to sort of the casual web user is what we would call inventory grabbing bots.
And you're confronted with these bots when you try to purchase anything online where the inventory is limited, right?
So if you're trying to buy concert tickets or, you know, a fancy pair of shoes or a handbag, or these days even much more mundane things.
You know, in the physical world, when demand exceeds supply, you get a queue.
In the online world, when that phenomenon of demand exceeds supply, you get bots and sort of an arms race to see who can consume that inventory most quickly.
Or I would be more motivated to pay more 'cause there's no supply anymore?
But if you think about sort of the arbitrage opportunity for sneakers, that's probably the most visible. There are really, really limited inventory, extremely popular sneakers.
And if you're able to buy them from the retailer, you can instantly sell those on an exchange at a massive markup.
So this annoys the retailers, of course, but it also annoys the consumer because they've got to shell out a lot more cash to get their, you know, their kids that special Christmas present that they're looking for this year.
I mean, obviously either way they're making a sale at the full price, whether it's a bot or a consumer.
But within the retailers, there are some of the brightest people in security focused on thwarting these bots and helping to ensure a human being has the best shot possible of buying that, one of their legitimate loyal consumers.
That's who they want to be able to purchase these things. They really don't want to see this secondary market where their loyal customers have a bad experience.
That's the worst thing possible for a retailer.
We're still in October and maybe we need to go down the route of what people can do to try and fix this.
So should we start with retailers in terms of them and what, how they can help manage this?
I mean, we kind of touched on the profit motive. So there are very, very clever people building these bots.
I mean, first and foremost, you need to be able to detect, is this a human being or is this a bot on the other end?
And there's a lot of technology that we've developed over the years here, everything from looking at passive data to active detections of, you know, is the physics of the way the keyboard is being used and the mouse, the way that the phone is being oriented, does that appear to be human as we model that, or does that appear to be automation, right?
Obviously, you want your Google bot that's searching the site to get right through to help your search rankings.
And then the gray bots, we see things like airlines where every bot that comes in costs them a little bit of money because they have to go have a paid query to a reservation system.
So maybe there you serve them some information that's slightly stale so you don't incur the cost, but the bot gets what they want as well.
You think about sort of that detection categorization and then have a menu of responses available to you.
So a lot of what they're doing is they're testing credentials to see if they can take over somebody's account.
So if you detect that it's a bot, even if they put in the correct incorrect credentials for one of your users, you don't want to tell them that we're blocking you.
You would just say these credentials don't work.
And frustrate them further, right?
If they're operating these botnets at the scale of millions of requests and you're causing their compute cost to go up a bit, that may be the most damaging thing you can do to them because it gets to the economics of what they're trying to pull off.
Are they seeing cost savings? Are they seeing streamlining? Because it's such a big deal, they're seeing huge advantages.
You wanna make sure that your legitimate loyal customers have the best possible experience online. That's vital for a retailer.
But certainly there are IT cost savings, you know, if you're having to fight the bots, you know, a human defender versus a manual bot, that's really expensive because it takes a lot of humans.
But, you know, for a busy period, if you're having a limited inventory launch, or if it's the peak sales period around Cyber Monday, Christmas, which is coming, the last thing you want is a crush of humans and bots to bring your site down, right?
I mean, obviously, if you can pull these bots out of that demand cycle, and it's not consuming resource within your data center or your cloud compute, that ensures uptime and good experience for your legitimate users.
And then often you'll get maybe more of a clumsy bot operator that comes in and they're extremely noisy and they're impacting the availability of the site.
So we go in there and, you know, targeting the very noisy bot.
But then once you have the precision tools to look, you'll see under the covers, hey, there were several other operators that have been visiting your site and conducting bot activity below the noise floor for some period of time, right?
And those are typically more sophisticated, more of a cause for concern than the really noisy bots that are out there.
So that happens all the time where it will be sort of below the radar.
So, you know, a lot of people are gonna be spending hundreds, if not thousands, in the new holiday if they've got the spare cash to buy gifts for their loved ones.
How do they avoid getting into a tangle where they lose out on something that they really need or wanna get?
And we call that credential stuffing where basically you have an engine that's these bots that somebody either rents or buys or they build themselves.
And then the fuel for that engine is credentials from breach sites.
So everybody listening today has seen some site that they visited and establish a login get breached over the last eight, nine years.
Well, what happens is those credentials on those sites are resold, right? So there are researchers say there's about 25 billion credentials up for sale that you can go purchase.
And then that becomes the fuel for these bots where they just test those credentials to see if people have reused their credentials from one site to the next.
So the probably the primary thing that we can do as consumers is to use a unique password for every site, right?
That will really limit your exposure to somebody breaching one site that you visit and then attempting that same credential pair across every other site on the internet, billions of times a day.
And then to help facilitate that, a password manager could be helpful. There are a number of things you can do there. Avail yourself of MFA if that's an option on the site.
All of those things make it more difficult. But if there's one takeaway, it would be, I know password hygiene is annoying.
But unique passwords are probably the number one thing that we could do to thwart the mass-scale automated credential stuffing that we see out there.
I mean, I would say it may be frustrating as a consumer when you're impacted by these bots when you're trying to purchase an inventory, but I can assure you there are people working very hard at retailers to try to give humans their very best shot at purchasing these things.
It's not a cynical effort on the part of the retailers. They're working very hard to give humans their very best shot relative to these bots that are out there.
And you can do this for free by visiting akamai.com/smashing. That's Akamai, A-K-A-M-A-I, .com/smashing.
And Patrick Sullivan, CTO of Security Strategy at Akamai, thank you so much for sharing your insights with us.
What's the best way for folks to do that?
We have a free version for companies under 256 assets, so check that out. Thank you.
And we also have a Smashing Security subreddit, and don't forget to ensure you never miss another episode.
Follow Smashing Security in your favorite podcast app, such as Apple Podcasts, Spotify, and Google Podcasts.
For episode show notes, sponsorship info, guest lists, and the entire back catalog of more than 293 episodes, check out smashingsecurity.com.
And then you made a comment that there was something really naked and nudie. Can you just confirm it was not me?
Hosts:
Graham Cluley:
Carole Theriault:
Guest:
Chris Kirsch – @chris_kirsch
Episode links:
- The rundown on becoming runZero: What I learned rebranding a company – Chris Kirsch on the runZero blog.
- Tweet by Melissa Shusterman – Twitter.
- Apple AirTag Used To Find Over 100 Stolen Democratic Campaign Signs, Police Say – Forbes.
- Wie eine russische Firma ungestört Deutschland hackt – ZDF Magazin Royale on YouTube.
- German cybersecurity chief investigated over Russia ties – AP News.
- German cybersecurity chief sacked following reports of Russia ties – The Guardian.
- Fraudster swindled Virgin Trains out of £116,000 in ‘sophisticated’ scam – MSN.
- Virgin Trains worker, 37, swindled rail firm out of £116,000 in ‘delay and repay’ compensation scam by photoshopping tickets to exploit flaw in system – Daily Mail.
- Train delays:How to claim if it’s late or cancelled – Money Saving Expert.
- How many trains arrive on time – Gov.uk.
- Employee swindled Virgin Trains out of £116,000 in delay and repay compensation scam – Birmingham Mail.
- Fat Bear Week 2022.
- ‘Fat Bear Week’ Hit By Voter-Fraud Attempt – Rolling Stone.
- PimEyes – Face search engine.
- The Fear of God: 25 Years of the Exorcist – BBC iPlayer.
- Smashing Security merchandise (t-shirts, mugs, stickers and stuff)
Sponsored by:
- Kolide – the SaaS app that sends employees important, timely, and relevant security recommendations concerning their Mac, Windows, and Linux devices, right inside Slack.
- Bitwarden – Password security you can trust. Bitwarden is an open source password manager trusted by millions of individuals, teams, and organizations worldwide for secure password storage and sharing.
- Akamai – Make the most of Cybersecurity Awareness Month by connecting with Akamai’s experts on how you can achieve unmatched security. Where else can you take advantage of insights from 7 trillion DNS queries per day?
Support the show:
You can help the podcast by telling your friends and colleagues about “Smashing Security”, and leaving us a review on Apple Podcasts or Podchaser.
Become a Patreon supporter for ad-free episodes and our early-release feed!
Follow us:
Follow the show on Bluesky at @smashingsecurity.com, or on the Smashing Security subreddit, or visit our website for more episodes.
Thanks:
Theme tune: “Vinyl Memories” by Mikael Manvelyan.
Assorted sound effects: AudioBlocks.


