Listen early, and ad-free!

045: Deloitte fail, CCleaner, and dotards on Twitter

September 27, 2017
0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Graham Cluley

Hello, Carole Theriault.

Carole Theriault

Hey, Graham. Welcome back to the UK.

Graham Cluley

That's right. I'm back, aren't I?

Phil Wood

Yes. Yeah.

Carole Theriault

Isn't it nicer here?

Graham Cluley

And it's a bit wetter, to be honest.

Carole Theriault

I know. I know.

Graham Cluley

It was in New York, but maybe we should explain to everyone. So we recorded the podcast that people are about to hear on Tuesday because I was over in New York and it's now Wednesday evening.

Carole Theriault

Actually, we recorded it on Tuesday because it gives us a bit more time to edit. Shh, shh, shh, keep this a secret. There's no editing.

Graham Cluley

There's never an edit. But now it's Wednesday evening.

Carole Theriault

And there's more stuff to say about Deloitte. Yes, yes, yes. Okay, tell them, tell them, tell them.

Graham Cluley

So we are going to talk about the Deloitte hack, but since we recorded, there have been a cavalcade of other disasters which have come out. It looks like a whole bunch of Deloitte's corporate VPN passwords, usernames, operational details—you can read all about this on The Register—were posted on a public-facing GitHub repository, which isn't good news. And one of their employees was also, it appears, posting VPN passwords and login credentials to his public Google+ page.

Carole Theriault

No way.

Graham Cluley

And there have been a whole host of other discoveries as well.

Carole Theriault

You know what I love about this? We do talk about Deloitte saying there's just a few cases, right? And we were like, a few for Deloitte?

Graham Cluley

Yeah. Well, it looks like there is quite a security problem at Deloitte and some people— Well, that screws us all, let's be honest. Well, it does. Yes. Because obviously we do business with companies, all of us, and those companies may well be sharing information with Deloitte. The joke that's going around on Twitter, although it's not really funny, is that maybe Deloitte needs an auditor. They need someone to audit their security themselves, but people can hear what the situation was as of Tuesday in the following podcast. And we hope that you all enjoy it. And it's good to be back in the UK. Yay!

Carole Theriault

A big thank you to our sponsors, Recorded Future. Recorded Future arms threat analysts, security operators, and incident responders to rapidly connect the dots and reveal unknown threats. Their patented technology automatically collects and analyzes threat intelligence from technical, open, and dark web sources. Why? To provide invaluable context for faster human analysis and real-time integration with your existing security systems. Sign up to their Cyber Daily newsletter and get the latest insights from Recorded Future at recordedfuture.com/intel.

Unknown

Smashing Security, Episode 45: Deloitte fail, CCleaner, and dotards on Twitter with Carole Theriault and Graham Cluley. Hello, hello, and welcome to another episode, Episode 45 of Smashing Security. My name is Graham Cluley, and I'm joined as always by my good chum and co-host, Carole Theriault.

Carole Theriault

Hello, Graham. How are you? I'm good. I'm good. I'm just back from Croatia. I was visiting our ex-host Vanja over in Croatia.

Graham Cluley

Yeah. And I'm in New York at the moment, which is why I might sound a little bit strange.

Carole Theriault

I mean, what do you think, the air is different?

Graham Cluley

No, no, no. I mean, in this odd hotel room where one of the walls is a cheese grater. I tweeted a picture of it earlier on. I spent so long trying to turn the lights on. I can't tell you. It was so— it's so high-tech and trendy, this hotel. But I've had a good time here. I've been speaking at the FraudForce conference hosted by IOvation. That's been good fun. And then I'm going to catch the plane straight after this podcast back. But it's not just you and me, Carole. We are joined by our special guest.

Carole Theriault

We are. Say hello to Phil Wood from Cisco. Hello, Graham. How are you?

Graham Cluley

Phil, for those who don't know you, what on earth are you doing here? Why should we care about you?

Phil Wood

I don't know if you should care that much, but so yeah, so my name is Phil Wood. I am a security engineer at Cisco and I know stuff about security, or so I'm told. So I'm here to talk to you about malware and other such nasties that you can find.

Graham Cluley

But more than that, we have— Carole and I have actually worked alongside Phil, so he's got the dirt on us.

Phil Wood

I do. So much dirt.

Carole Theriault

Phil actually, in the old, old, old days, was actually— we shared a flat. We were flatmates. Oh yes, you did.

Phil Wood

I forgot. Yeah, it's a long time ago.

Carole Theriault

The golden years, as I would call them. It was great. But enough about that.

Graham Cluley

Guys, you know the score, okay? Each week we're going to look back on what's been happening over the last 7 days from the world of computer security, things which have tickled our nostrils and that we want to share our opinion about. And I'm going to go first because bad news, chaps. I'm afraid Deloitte, one of the so-called Big Four accountancy firms and one of the largest private businesses in the United States, has been hacked. Yeah. Confidential emails, plans of its corporate clients, all kinds of guff have been exposed and put at risk by the hackers. And the breach was revealed by The Guardian, who say that it went unnoticed for months.

Carole Theriault

Yeah, yeah, I read that.

Graham Cluley

We don't know exactly how long it's going on. Brian Krebs, the Krebsmeister himself, has been looking into this and good old Krebster, security blogger extraordinaire, has been suggesting that the breach may date back well into 2016. He notes that there was a company-wide mandatory password reset back then. An anonymous source has told him that Deloitte has brushed the scale of the attack under the carpet. Several gigabytes of data, according to his source, have been exfiltrated to a UK server. But what happened was this: It looks like Deloitte, who of course work in a number of industries, right? They do auditing and tax consultancy and cybersecurity. Yes. Yes. They give cybersecurity advice to multinational banks and pharmaceuticals, government agencies, and all the rest of that. It looks like that one of their administrator accounts got broken into. A hacker managed to gain access to, well, unrestricted access to just about everything. And that cloud-based account didn't have any two-factor authentication or two-step verification in place. So maybe it was just a simple phish and before you know it, out came tumbling passwords, usernames, IP addresses, sensitive documents, you name it, which have all been entrusted to Deloitte by their clients. So it's not just Deloitte's information. Yeah. This is information held by their blue-chip clients as well.

Carole Theriault

It's like a big castle full of gold coins having one key to unlock everything. Well, yeah.

Graham Cluley

You know, you want multiple checks, don't you, for these sort of things? So it is rather insane that sort of protection wasn't in place and that this information wasn't properly defended. And now, according to the Guardian, there's been an internal inquiry inside the company which they've codenamed Windham. Now, which made me instantly think of Triffids, actually. You remember John Wyndham's book, Day of the Triffids? That isn't a dolphin, that's a Triffid attacking. It's my Triffid impression. But no less apocalyptic, is it really, if something like this begins to breach out could be very damaging to the company, although it is downplaying the scale of the breach. Yeah. Some reports are saying 5 million emails exposed maybe, but Deloitte are saying, oh, very few.

Carole Theriault

That's what I saw. Very few clients, which is kind of— Very few. Yeah, it's interesting language because few for Deloitte is a heck of a lot for the rest of us.

Graham Cluley

Well, yeah, we don't know what that means as a percentage or as a raw number. Their investigation, they say, has demonstrated that no disruption has occurred to client businesses or to Deloitte's ability to continue to serve clients or to consumers. So it's saying it's taking security terribly, terribly seriously. But let's face it, you know, if something like this happens, the damage which could be done is quite considerable because you sort of have this chain reaction. It's not just damage to Deloitte, but all of those FTSE and big companies out there, which could be subsequently breached as a result. And it wouldn't necessarily be possible to tell that those other subsequent hacks might be connected to this one.

Carole Theriault

I know. I think it's so— just because the Equifax just happened, it feels a bit small potatoes to me. Isn't that awful?

Graham Cluley

You're suffering from fatigue because of Equifax.

Carole Theriault

Yeah, I am.

Graham Cluley

I think that's a real thing, you know. I think data breach fatigue definitely happens. I think people get so bombarded by this kind of thing that you just think, oh, another day, another big data breach. But you know, maybe we should be feeling a little bit, you know, cross about these sort of things because why, why on earth wasn't there some two-factor or multifactor authentication in place on those admin accounts? Those god-style attacks. Why didn't they have a whitelist of IP ranges which could access the account and anyone trying to access from anywhere else? Why wasn't that being blocked? Why are there no defenses in place to spot anomalous behavior as millions of emails are being accessed as well? I think companies can't afford to be complacent about this kind of thing.

Carole Theriault

Well, especially if you're giving people security advice. You know, so has there been a big apology? Has there been a big apology so far?

Graham Cluley

Not really a big apology. They say that they've contacted some of the firms who may have had their information exposed. But you know, it feels like they're trying to say small potatoes. But as I mentioned, go and read Brian Krebs because he appears to have a source who is sharing more information and suggesting that this was on a much bigger scale than Deloitte is currently saying. Now, whether that's true or not, who knows? But history has shown that sometimes companies start off by saying something isn't that big a deal and then later have to admit actually it was worse than we imagined. I mean, the threat here isn't just of data loss, but also phishing, business email compromise. So be careful.

Carole Theriault

I think that's a big, that's a great point you're making.

Graham Cluley

So bad news for Deloitte, bad news for their security team as well, who are obviously, you know, their services are being offered to other companies as well. And bad news for those many, many big companies who have Deloitte as a supplier, who they've trusted their information. I think this is a message I'm hearing time and time again, is that businesses and individuals are entrusting their private information with others who aren't doing a good enough job of defending it, and something's got to be done.

Phil Wood

Here's another way to look at it, right? So yes, according to the Guardian article, no two-factor authentication on a highly privileged account. I mean, I have two-factor authentication on all sorts of things that really don't matter. So that does seem quite a slip-up, but here's the thing I would think about on this. Let's say they did have a lot more defense in place. Are they going to have all their defenses in place? Is there going to be no holes? No, not really. It's really not about keeping a breach out, it's how you respond to one. And I think that's really perhaps where Deloitte will prove their worth, or not, you know, their ability to deal with this situation. Because you've got to assume that you can always be breached. You hope that it won't happen and you do a lot to try and prevent it, but that's got to be part of the assumption. So how they deal with this breach, that's, I think, going to be— that's the pudding they're proving, if that's not extending the metaphor too far.

Graham Cluley

OK, so I accept that. I think you're right that we shouldn't focus too much on how, although there's obviously a lesson there for other companies who may not have the simplest defenses in place. And response is so important when you deal with these sort of incidents. We saw the complete shambles, the omni-shambles that was occurring at Equifax, for instance, and has continued ever since then. But I also think, oh yeah, okay, so yes, a company will always get breached if someone's determined enough. But what you want to do, as most companies, is you want to be that little bit better protected than the other guys, because most of the hacks which take place aren't focused on your particular company. It'll be a hacker who'll think, oh, this is too difficult. They've got these defenses in place, therefore I'm gonna find a weaker target instead. And there they failed.

Carole Theriault

Yeah, and presumably you've gotta benchmark the security or you've limited access to the information depending on how valuable that information is. And I think their customers would say, this information is pretty effing valuable to us. And what were you doing, Deloitte?

Graham Cluley

Yeah, well, they're giving cybersecurity advice. Well, why?

Phil Wood

And you know, that's kind of the irony. You successfully defend against all the opportunists, but I think, you know, it is about what they do in response to this and how are they protecting the data? How are they ensuring that even if people do get hold of it, it's of no use to them? So encryption and that kind of thing, which wouldn't necessarily protect you against an administrator, but it seems it was mostly email. I think perhaps people think about email as being, well, it's just email, but attachments. I think that would be— that's a big part of this, I think, is really how they respond to the breach. And I think that's where companies are failing because, you know, at the end of the day, if you get breached and nothing bad happens because you've responded quickly or you responded effectively, then okay, then fair enough, you got breached, but, you know, no harm, no foul.

Carole Theriault

Well, I guess we're going to wait and see, but this will all come out, right?

Phil Wood

I mean, I think they've been promising a statement for a while now, but I don't know if one has been particularly forthcoming yet. I would imagine there's probably still quite a lot of headless chickens going on. I don't know.

Graham Cluley

Oh, I would think so. Although it looks they've been investigating this for some months. Months. So you would think that they had a better coordinated response by now, but we will have to see. So I think Deloitte, watch out because maybe you're going to go down the to-loit. Get it? Good one, baby. Good one. Liked it. Boom. Still got it. Yeah. Kaboom. Drop the mic. Okay. Phil, what have you got for us this week?

Phil Wood

So I've got CCleaner. Oh yes. So another, another, you know, incidence of malware, obviously it's my interest in life.

Graham Cluley

Well, let's not get into your personal interests just yet, Phil, because I think Carole and I are only too— well, I think we have some ideas.

Phil Wood

Yeah, but as I say, you've got the dirt, I've got the dirt, we've all got dirt. Let's leave it there.

Graham Cluley

So CCleaner isn't malware, is it? It's meant to be an anti-malware tool in a way.

Phil Wood

What's kind of really ironic about it is it is in part kind of a system hygiene tool. So it's supposed to help you out, but unwittingly, users of CCleaner have been royally infecting themselves through its use. It was actually discovered by my colleagues at Cisco, as well as actually, it has to be said, Morphisec. Essentially, good guys found it. And that's good.

Graham Cluley

So CCleaner is this tool which many people use to clean up their machines or maybe sort out cookies and registry entries and things like that on their Windows computer, which—

Carole Theriault

So it's a kind of semi-geeky tool, right?

Graham Cluley

Yes, but a lot of people use it. Now, what's unusual in this particular case is that someone malicious got into the supply chain, as it were, and managed to digitally sign an update to CCleaner which had malware in it, right? And then of course that rolled out around the world.

Phil Wood

So it was actually the installer of CCleaner. And one of the nice things about that from the attacker's point of view, all that stuff is signed. So any kind of security products that you're using that kind of evaluate signatures or certificates, that's going to pass that test because it all looks legit. It's all signed by a trusted source. And that's really going to help your malware spread.

Graham Cluley

And what was this malicious component doing?

Phil Wood

So what it was doing was that was essentially taking confidential information from your computer and sending it off to a list of various different websites. Now, all of those websites, as we speak today, those are under the control of Talos, which is Cisco's threat intelligence organization. Kind of the back end of it has been taken down now. But I mean, we have seen some evolution in the malware in that it seems to be also targeting high-profile companies, Cisco being one of them, as well as some others.

Graham Cluley

So someone malicious was using this to target your company amongst others.

Phil Wood

We do come under quite heavy attack, as you would imagine. You know, we're quite a big IT company, obviously, so that's not something that's particularly unusual. I think, you know, it's interesting that we're actually seeing this referenced in the source code of malware, but yeah, that is pretty common.

Carole Theriault

But it was really widely spread.

Phil Wood

It was really widely spread because it's a very well-used tool, right? But I think, you know, this is another example of people will always infect computers.

Graham Cluley

Now, what the CCleaner case reminded me of was the NotPetya campaign, the ransomware which broke out in Ukraine, which was shipped via a poisoned update. Again, digitally signed, I think it was, of an accountancy program. Yeah, Medoc. Which was, you know, yeah, that's it, Medoc. And it does feel like this is a growing problem, the supply chain attacks. So software which you've already approved, which you're allowing to update inside your environment, which may be antivirus software as well, is saying, oh, this piece of software, this is digitally signed by XYZ company, therefore it's less suspicious. Actually can be a method by which the attackers can crawl onto your network.

Carole Theriault

Yeah, and your automated security will just not catch it because it's already been told, yeah, that's cool, we like these dudes.

Phil Wood

Yeah, I think, you know, the days of individual files representing the malware, you know, Love Letter, Cornucopia, all those things, you know, those are long since finished. You know, attacks are campaigns. You know, we're seeing strings of compromised servers being used to proxy command and control traffic. And obviously you've got to compromise a lot of organizations to actually, before you even start your real attack. You know, it's big business, isn't it? And obviously now people are able to make a lot of money out of it. They're able to invest a lot of money back in the technology and that's, you know, that's a big part of the problem. Because Donald Trump is really the most fantastic advert for Twitter, or at least he gets their name out there, right? The brand awareness of Twitter must have increased.

Graham Cluley

Thanks for cheering us up. Yes, I was about to say it's been a really cheery show so far. It's been fantastic. We've chosen our stories really well, I think.

Carole Theriault

Yeah, this whole idea of him using his personal account for presidential, you know, tweets is interesting. Where does the man separate from the responsibilities of the President of the United States?

Graham Cluley

Fantastic. Lovely. Carole, I imagine you've got something similarly uplifting to entertain us with for your section. In their statement, they've said we treat everybody the same, right? Yeah.

Carole Theriault

It's so uplifting. It's so uplifting. So I knew that you guys were doing two cyber stories, so I thought I'd go a little off-piste a bit.

Graham Cluley

And there are rules which mention that you're not meant to be violent or abusive and things that. However, there is this extra private consideration of newsworthiness, which basically means if you have 10 million followers on Twitter, then you can just do what the heck you.

Carole Theriault

Well, interestingly, they say among the considerations, so they haven't actually listed all the considerations they take into account. So I imagine that can just grow over time as is appropriate to their requirements. And I want to talk about Twitter finding itself in a spot of bother this week. So the problem reared up in response to yet another inflammatory tweet from Donald Trump, once again aimed at North Korea. Sorry, Donald who? I don't know, I just feel they should do better. So on the 22nd of September, the person you've never heard of, Graham, tweeted 'Kim Jong-un of North Korea, who is obviously a madman who doesn't mind starving or killing his people, will be tested like never before!' And then, and just two days ago, Donald Trump said, 'I just heard Foreign Minister of North Korea speak at the UN. If he echoes the thoughts of the little rocket man'— that's a reference to Kim Jong-un— 'they won't be around for much longer.'

Graham Cluley

What do you think? They should ban him from Twitter?

Carole Theriault

Yeah, I kind of do. Just for me to kind of go, yay, well done, Twitter.

Graham Cluley

He'll just go on Snapchat. Can you imagine the selfies? It would be appalling.

Phil Wood

So how is this cheering us up now? A couple of malware stories.

Carole Theriault

Oh, I'm just getting to the good bit. I'm just getting to the good bit. Just getting to the good bit.

Phil Wood

I bet that's one of the considerations, right? There's plenty of platforms like this. What occurred to me about how he tweets presidential business from his own account, I wonder if he's not too good at swapping between accounts. He's just not really— his thumbs aren't really— so we're going to get a bit feeble for him.

Graham Cluley

The foreign minister says America's declared war.

Phil Wood

He's old, he's a dotard. What is this word, dotard? So it's something that— the Korean— I think it was actually Kim Jong-un himself addressed Donald Trump directly at a kind of what passes for a press conference in North Korea and actually called him a dotard, which I think is an old fool, basically.

Carole Theriault

Yes. Quote, since the United States declared war on our country, we will have every right to make countermeasures, including the right to shoot down United States strategic bombers even when they are not yet inside the airspace border of our own country. So, right. Yeah, it comes from the word dotage, right? Okay, same. So this is all scary stuff. And it's all done with this weird air of WWE SmackDown, right? It's— Phil, you were a big WWF fan in the old— that's what it used to be called, right? WWF?

Graham Cluley

I was once called a motard by a virus writer, and I don't know what that was.

Phil Wood

It used to be called WWF, yeah.

Carole Theriault

Oh, I thought you were going to say me. But it does have this kind of SmackDown feel, oh yeah, well, boom, you know, right before they get into the ring. Oh yeah, you've—

Graham Cluley

If they both had WWE names, wrestling names, what would they be?

Carole Theriault

Well, they do. They both named each other. One is named now the Little Rocket Man. The other one, isn't it Dotard?

Graham Cluley

I think you've

Phil Wood

Or was it Dotard versus the Little Rocket Man. I'd pay for the pay-per-view on that one. I think it'd be Frankie Goes to Hollywood video.

Graham Cluley

certainly adopted that

Phil Wood

Is that too old a reference? That's going back some.

Carole Theriault

It's just so scary. It's kind of— it's almost absurd. Anyway, so despite, you know, threats of imminent war aside, okay, there is another problem. This is the problem I kind of want to talk about today. So these tweets from Donald Trump are arguably breaking the rules of conduct for Twitter. And when I say arguably, I'm saying, yeah, they definitely break the rules of conduct for Twitter. So I had to go, I went and had a little look. And in the abusive behavior section of the Twitter rules, there is sections on violent threats, direct or indirect harassment, and hateful conduct are all listed as big no-nos. So a bunch of folks who most likely find Trump's use of his personal account for presidential communications/threats inappropriate started reporting the tweet as a breach of the Twitter rules.

Graham Cluley

on a regular basis. Yes, let's find out who's sponsoring the show this week.

Carole Theriault

Reporting Donald Trump's tweets. Reporting Donald Trump's tweets that we've read out earlier in my segment, right? Saying basically these need to be removed because they're inciting violence. And yes. So many people complained that Twitter actually issued a 6-part tweet to explain why Donald's message was not going to be going anywhere anytime soon. So let me read this to you. So it starts, some of you have been asking why we haven't taken down the tweet mentioned here. Link in show notes. We hold all accounts to the same rules and consider a number of factors when assessing whether tweets violate our rules. Among the considerations is newsworthiness and whether a tweet is of public interest. This has long been internal policy. Okay, this is the bit I love. This has long been internal policy and will soon update our public-facing rules to reflect it. We need to do better on this and will. Twitter is committed to transparency and keeping blah, blah, blah, blah. So this is a really aggravating and loopy response to my mind, because this is how I read it. And I'd love to know your opinions. Okay. This episode of Smashing Security is brought to you in part by Recorded Future. Recorded Future is the real-time threat intelligence company whose patented machine learning technology continuously analyzes technical, open, and dark web sources to give organizations unmatched insight into emerging threats. Sign up for free daily threat intelligence updates at recordedfuture.com/intel. So I'm seeing this as, hey, Twitter users, you're all the same. So your account is as important to us as Trump's account. Hmm. Okay. But if you get a lot of traffic, it probably means that you're newsworthy. And then I guess we can treat you a Twitter VIP. And you can break whatever rules and we're going to look the other way, no questions asked. That's what I'm reading. In the old

Graham Cluley

And welcome back, and it's the part of the show which our regular listeners know is our favorite part of the show.

Carole Theriault

days. Isn't it

Graham Cluley

It's Pick of the Week.

Carole Theriault

time for our sponsors? Phil?

Phil Wood

Phil? Sorry, was I supposed to say something?

Graham Cluley

Do you listen to the show, Phil? Let's be honest.

Phil Wood

I've listened to one. What?

Carole Theriault

Okay.

Phil Wood

I'm a busy man.

Graham Cluley

What do you mean you're a busy man? You can listen to it.

Phil Wood

I have a busy career and lots of children.

Graham Cluley

Okay, Phil, look, the rule of this section of the show is that you have to

Phil Wood

Right now? Oh my goodness, well,

Graham Cluley

say Pick of the Week.

Phil Wood

I just didn't know if you were going to run it in. Pick of the Week.

Carole Theriault

From the top. Hey, so in Pick of the Week, we choose something which has tickled our fancy, a funny story, a book that we've read, a TV show, a movie, a record, an app, a website, a podcast, whatever. Doesn't have to be security related— shouldn't be. But, well, you know, doesn't have to be. Is this how you're becoming mindful? Pick of the Week. You're going to be doing a little bit of adult coloring books?

Graham Cluley

I actually love this. I, as you know, I love chess, but I also quite like to spend a little bit of quiet time away from the craziness doing a little bit of coloring in. And I can recommend the Wilder Gorn coloring posters, and they have names like this, they have names like The Pog's Defense, Potter's Road, Tower Mine. One for you too, the Gong Wizards.

Phil Wood

There you go. There you go. Can't go wrong with wizards.

Carole Theriault

Yeah. Well, I'm running out to get it. All right.

Graham Cluley

Well, no, check it out. Don't be so bloody rude. It's great. Anyway, I think it's great. Run by some old hippie, probably in the West Country of the UK. And yeah, it's really cool and fun. And so I like doing them. And that is my pick of the week. I think the I think we should declare an interest here, shouldn't we, Carole?

Carole Theriault

Cool.

Graham Cluley

You in particular, because you did get Sophos, when we worked at

Carole Theriault

Now, Phil, do you have a pick of the week?

Graham Cluley

first episode's just come out.

Phil Wood

I have a pick of the week which is especially for you, Graham. I think you will like this one.

Graham Cluley

Sophos, to produce a version of Sophos antivirus translated into Klingon. And I remember I made a little video which may still be on YouTube unless copyright infringement have caught up with it, which was a demo of the product. It was great.

Phil Wood

You're probably aware that there is very, very soon going to be a new instance of Star Trek hitting the screens.

Graham Cluley

With YMCA being sung in Klingon in the background over it. That's right. Oh, for goodness' sake, I'm not a Star Trek fan. But as I remember, the way to swear in Klingon is to say, I don't know, you say something like, something like that. But what it means is your mother has a smooth forehead.

Phil Wood

But wait, it's going to get good.

Graham Cluley

This is Star Trek Discovery. I've heard about this, isn't it?

Phil Wood

Star Trek Discovery coming to Netflix? I think it is on Netflix right now. Yourself a fan, so obviously you've got to save some up for the—

Carole Theriault

Funny. Right, yep, that's true, that's true.

Phil Wood

I don't know, I've been guilty of that. And you can't get this in the States unfortunately, so any US listeners won't be able to take VPN. Star Trek Discovery on Netflix comes complete with Klingon subtitles. No. Throughout. I love Klingon subtitles. it depends how

Graham Cluley

Oh, that's so cool.

Phil Wood

it all goes.

Carole Theriault

Can you speak any Klingon, Phil?

Phil Wood

I can't speak Klingon because I am not a dedicated enough geek for that sort of thing.

Carole Theriault

Okay. Didn't you have a book that had the entire map of the Star Trek Enterprise?

Phil Wood

I did. I had the Enterprise D blueprints. In book form. I've still got it somewhere, unless of course my wife has thrown it away.

Graham Cluley

All right, never

Phil Wood

There's a fairly good chance that she has, and you know, fair enough, frankly, because she's enough to put up with as it is. Okay. Although I'm going to go home and see if I can find it.

Carole Theriault

I did. I found a

Graham Cluley

heard of it. So the—

Carole Theriault

translator and he translated the entire file, all the strings. That's right. And that's why we got t-shirts made with that statement on it.

Phil Wood

How dare you?

Graham Cluley

And you love this?

Carole Theriault

I love it. Love it. All right. In fact, it was— you know who told me about it was we had him on the show before, Michael Hucks, guy from PC Pit Stop.

Graham Cluley

Okay. So you haven't seen this show yet, but you love Star Trek, do you?

Carole Theriault

Oh, okay. He's the one who said you might this and it's great.

Phil Wood

I've not seen it yet. No. Okay. But I'm looking forward to it. New Star Trek. That's kind of cool. When did the final one finish?

Graham Cluley

Phil, Phil, maybe before you watch all these new episodes of Star Trek, you could listen to some back episodes of Smashing Security, because if you got time for that rubbish—

Phil Wood

I'm looking forward to it. I'm looking forward.

Carole Theriault

I suspect I know he's

Phil Wood

I don't like

Carole Theriault

gonna listen to at least one more.

Phil Wood

Twitter because it

Graham Cluley

Carole, what's your pick of the week? Chaka!

Phil Wood

has reduced public

Carole Theriault

Poor people who love Klingon out there. I'm sorry. So this isn't new, but it is great. So if— of course it's great if you like smart, wacky cartoons for adults. I don't mean porn, Graham. What I'm talking about is Rik and Morty.

Phil Wood

debate to the declaration, basically.

Carole Theriault

For those of you who know it, yay you, because it's great. And those of you don't, you should check out Rik and Morty. Rik and Morty. Yeah.

Phil Wood

It's, you know,

Carole Theriault

Well, too bad for you. I'm gonna try and sell it to you, and if you don't go see it, then all I can say is idiot. So the general formula of the Rik and Morty show is this. So on one side you have extremely selfish alcoholic genius asshole of a grandfather who's dragging around his nervy, morally centered grandson across space and getting caught into loads of intergalactic adventures. Okay, so that's kind of one. Sounds brilliant so far.

Phil Wood

you can't— there's

Graham Cluley

Yes, it's pretty cool.

Phil Wood

no nuance in

Carole Theriault

It's kind of almost based off, there's so many show references from Back to the Future and all those. There's loads of them. Now it's also set against the backdrop of this really painful everyday family dark domestic drama that's going on, where there's some drinking and there's divorce talk and there's fighting and there's in-laws and there's kids running away from home and school dances and girls and all this stuff.

Phil Wood

140 characters, and

Carole Theriault

And I don't know, the characters are just good. The story's dark, it's smart. And season 3 so far, wow.

Phil Wood

I think a

Carole Theriault

Anyway, so you can see it on streaming service. I think Hulu and Netflix have it. And if you're already totally caught up with Rik and Morty, as I have, you may want to go back to the beginning, which I have, or I will put a few more really good animations inside the notes you guys can check out. Okay.

Phil Wood

lot of people

Graham Cluley

Well, his last recommendation was for that Red Pill movie and that was terribly good, wasn't it? That was awful. Good. Yeah, awful good. Well, thank you very much, Carole, for that pick of the week. Maybe we'll go check that out. So, that just about rounds up the show, doesn't it? It does. Yeah. If you want to find out more about us, go on to Twitter. We're at Smashing Security without a G, and we've got a Facebook group which you can get to smashingsecurity.com/facebook. And maybe you want to support the show by buying a t-shirt before that imminent global thermonuclear war begins at smashingsecurity.com/store. All that remains is we need to thank Phil Wood for joining us today. Thank you very much, Phil. My pleasure.

Phil Wood

get very cross Thank you for having me. when they aren't Is there anywhere people can follow you online? Do you do any of that? able to, you I mean, I'm on Twitter. I don't think I've ever used it. know, hear a full explanation.

Graham Cluley

I'm not a fan, especially. So surprise Phil by finding him on Twitter and following him.

Phil Wood

And I find Yeah, well, you know, you can go to Phil N Wood at Twitter. it of little

Graham Cluley

How does that work? Oh my goodness gracious!

Phil Wood

use. So, yeah. Unbelievable, isn't it? Do you know You know, I could discuss why I don't Twitter, but perhaps we're out of time.

Graham Cluley

No, tell us, we'll shove it

Phil Wood

what the real reason is?

Graham Cluley

on the end.

Phil Wood

But if you want to go to talosintelligence.com, then you'll find a lot of I don't get nice useful information about malware.

Graham Cluley

Well, thank you everybody for tuning in. If you know someone else who might like the Smashing Security podcast, please tell them about us and go to smashingsecurity.com for past episodes to get in touch.

Phil Wood

it. I'm too

Graham Cluley

Until next time, cheerio, bye-bye.

Carole Theriault

Thanks for listening. Phil?

Phil Wood

old. I looked

Graham Cluley

Phil? Are you dead? Phil? Phil? Phil?

Phil Wood

at it and, as I say, it just bewildered Bye-bye. me and I

Graham Cluley

Cute. Cute.

Phil Wood

thought, you know what? Dotard.

EPISODE DESCRIPTION:

Deloitte suffers an embarrassing hack, CCleaner spreads malware, and Twitter explains why it isn't planning to ban Donald Trump from Twitter anytime soon.

All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by special guest Phil Wood of Cisco.

Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Special Guest: Phil Wood.

Sponsored By:

Support Smashing Security

Links:

Privacy & Opt-Out: https://redcircle.com/privacy