Listen early, and ad-free!

064: So just a "teeny tiny" security issue then?

February 7, 2018
0:00
0:00 0:00
0:00
Show full transcript
TranscriptThis transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Troy Hunt

You can't say that to the man with half a billion passwords.

Carole Theriault

Sorry, dude.

Unknown

You know, it's like he's got this great big butterfly collection and telling him butterflies suck. Smashing Security, Episode 64: So Just a Teeny Tiny Security Issue Then, with Carole Theriault and Graham Cluley. Hello, hello, and welcome to another episode of Smashing Security, Episode 64.

Graham Cluley

My name is Graham Cluley.

Carole Theriault

I'm Carole Theriault.

Troy Hunt

And we're joined today by the doyenne of data breach disclosure and general internet superhero from down under, it's Troy Hunt. Hello, Troy.

Graham Cluley

Well, that was really good until the last bit. Well done.

Carole Theriault

I don't know if you've heard the last few episodes, but he's been doing a lot of really, really bad Australian accents. I can't even believe you're on the show after hearing those.

Graham Cluley

Yeah, well, anyway.

Troy Hunt

Are there any particular Australian phrases which you think would improve our accents? Anything we could try out? Because we want to increase our audience down there.

Graham Cluley

No, I think you should just go back to sending bad people from your end of the world over to our end of the world. You know, that worked out very well. Thank you very much for that. Have you seen where you sent the worst people?

Troy Hunt

What was wrong with you people? I know, it was insane, wasn't it? We gathered together all our bogans, our dags, our dropkicks. We sent them to us and we sent them to Australia of all places. We should have gone to Australia and left them in— Yeah, when I say we, I am Canadian. So you're sort of—

Carole Theriault

You're on your own on this one.

Troy Hunt

We'll be right back after this break. Thanks to MetaCompliance for supporting this episode of Smashing Security. People are the key to minimizing your cybersecurity risk posture, and MetaCompliance makes this easier by providing a single platform for phishing, cybersecurity training, policy, privacy, and incident management. Listeners can get a 10% discount off the high-quality cybersecurity e-learning catalog by quoting the code SMASHING. Just visit www.metacompliance.com. That's www.metacompliance.com.

Carole Theriault

Rapid7 is sponsoring Smashing Security. Rapid7's Insight IDR has been named a Visionary in Gartner's latest SIEM Magic Quadrant. It is an intruder analytics solution that gives you the confidence to detect and investigate security incidents faster. You can download a 30-day trial by visiting rapid7.com/insightidr.

Troy Hunt

And welcome back. And as always, what we've been doing is looking back over some of the security stories, things which piqued our interest in the world of computer security and online privacy and computers going wrong. And there are various ones which we thought we would bring to your attention. Let's start by talking about phishing. You know, the traditional way that phishing works is that the bad guys trick you into clicking on a link to take you to a website which may appear to be your online bank. The fact is, it looks like a legitimate login page, doesn't it, for your bank, your social media account, but really it's on a different domain. If you could check out the actual domain it really is on, you'd realize, oh, it's not on Lloyds Bank, you know, it's on sort of IIoids Bank instead. Or, you know, they might have used a trick like that, or they may have used some HTML shenanigans in the email to make you think you were clicking on one thing, but you end up on another. Yeah. And so that's fundamentally, I think, how phishing works, right? But what if the phishers were able to actually create a subdomain of your real site? So if you ran a company called example.com, www.example.com, what if they were able to create a subdomain which was login.example.com or accountlogin.example.com or something like that, which that would seem pretty convincing, wouldn't it, if it really was part of example.com. And it would imply and infer that the bad guys had managed to breach your organization in order to create that subdomain.

Carole Theriault

Okay.

Troy Hunt

On Monday, I was approached by a pal, a fellow podcaster, who participates in the Intego Mac Security Podcast and also a number of other podcasts, Kirk McElhone. And he's a longstanding Apple Mac journalist. So he knows his onions. And he also runs a blog called Kirkville.com, and Kirk had received this weird email from Google's Webmaster Console telling him that Google had found hacked content on his site. And I mean, Troy, I mean, I think people like you and me who run our own blogs, that would be a nightmare scenario, wouldn't it?

Graham Cluley

Yeah, it's not a good look, but you know, I was just thinking when I was reading this, it's very similar to phishers exploiting the I guess, the neutral or positive reputation of an existing website to host content there. You know, the number of WordPress blogs out there that have got a phishing page somewhere on the site, and it is leveraging the fact that, you know, here you have a domain that's existed for a while, it doesn't have a negative reputation, and they leverage that. And I guess it's the same thing here, grabbing a subdomain. And I think that's what, you know, Google often will pick out. It will find a blog or something where the bad guys have managed to inject spam selling Viagra or something onto your pages, maybe exploiting a vulnerability in WordPress or something that in order to get their messages out there.

Carole Theriault

What?

Troy Hunt

So, yeah. So in other words, an unauthorized party was able to create subdomains for someone else's website.

Carole Theriault

Now, okay, so Namecheap had shitty security.

Troy Hunt

Well, we don't know where the— they haven't actually shared very much information as to how on earth this was possible to happen.

Carole Theriault

Okay.

Troy Hunt

But it sounds like his account wasn't actually compromised, but it was possible to create subdomains for other people's accounts. Now, in Kirk's case, it probably isn't that catastrophic, right, because it's just a blog. But imagine if he had been some online site which people logged into. This could have been used for phishing instead, and that could have caused all manner of problems and highly convincing login pages could have been created. So Kirk wrote about this on his site saying this has happened, and he wanted really to warn other people, you know, if you get a message from Google Webmaster Console, if you've been warned you've got hacked information on your domain, then this is something to watch out for. So I tweeted out a link to Kirk's story, right? Namecheap, not very happy. They tweeted a reply to me saying, look, look, we definitely don't want word to spread about this, and we want to keep these— You are kidding.

Carole Theriault

No.

Troy Hunt

And we want to keep—

Graham Cluley

This always works out just fine. They tweeted back when—

Troy Hunt

Shh, shh, hey, hey, hey, keep it quiet. And they said, "We want to keep this under the radar." On Twitter? Yes.

Carole Theriault

This is a DM, this is a direct message.

Troy Hunt

No, no, it wasn't a direct message. This was just from their support team.

Graham Cluley

Hang on.

Carole Theriault

You're going to go look for it?

Graham Cluley

Let me tweet it to my follower army.

Carole Theriault

Yeah.

Troy Hunt

It's, I mean, their point of view was, look, if someone has managed to do this to one of our customers, we don't want it happening to other people's. But the thing was Kirk wasn't saying how it was done. Kirk doesn't know how it was done. I still don't know how the bad guys did it. All he was saying was, this has happened to me. Watch out, chaps. It might've happened to you. Be aware of it. Don't panic if you get one of those hacked messages from Google, which you need to sort out because it appears to be a Namecheap problem. So obviously that was really silly of them to do, but I think that's the story we come across so often, isn't it? Anyone can have a vulnerability. Anyone can have a screw-up and there can be bugs and daft things like this can happen or bad guys can exploit them, but it's how you handle them, how you respond to them.

Carole Theriault

Yeah, it's really bad if you handle it by, now they look awful. They look awful by trying to hide. Who can trust them?

Troy Hunt

Well, we are still waiting for them to send an email to their customers explaining what's going on. They say that they're doing a proper audit of the situation. We're recording this on Tuesday evening and they haven't contacted the customers yet. Maybe by the time this podcast comes out, they will have done. What they have said is on Twitter, they've said that the problem only affected, and I'm quoting, a teeny tiny group of users.

Carole Theriault

Well, Namecheap, I'm Oh, scientific.

Troy Hunt

Exactly.

Graham Cluley

And they weren't very impressed.

Carole Theriault

You're probably not familiar with that term, Graham, but it is very scientific.

Troy Hunt

It's teeny tiny. Yes.

Carole Theriault

sure they've got millions. Very, very scientific. Yes.

Troy Hunt

So I don't know if that means 1, Well, with a name like that, yeah, why not? 5, 100, 3%. I don't know how many

Graham Cluley

Right.

Troy Hunt

Now, I chatted to Kirk about this to see what he felt about how this had been handled. I chatted to him earlier today and we can have a little listen to him now. users they have in total.

Graham Cluley

And my initial interest in publishing this, and when I asked you by email what you thought about it, you agreed, is essentially so if someone else is in the same position as I am and they Google this to know what's going on to find an answer. And as a journalist, I run a blog that I've been running for 20 years. This is the kind of material we write about when we encounter a problem like this and we figure it out.

Troy Hunt

There's always the assumption that, well, if I couldn't find something, that means someone will.

Graham Cluley

It'll take me 20 minutes to write it up and I'm helping other people. And of course, Namecheap didn't really like that.

Troy Hunt

I hope we're going to see a proper communication from them to their customers who might be affected and maybe we'll get to the bottom of just how many users were affected by this.

Graham Cluley

Yeah. As of now, I haven't received anything. I would assume that I would assume they'll be sending an email to all users that are affected, which should include me, even though I'm the one who brought it to their attention. But as of now, we are 30 hours later and I haven't heard anything other than their replies on Twitter.

Troy Hunt

What's your feeling about how Namecheap has handled this?

Graham Cluley

I have been thinking of moving my hosting for a while now because I've had performance problems with them in the past. I'm going to accelerate this move as soon as I can. Of course, as you know, moving a website takes a lot of time. It's not something you just do at the drop of a hat, but this is really, you know, the last straw with them.

Troy Hunt

So our advice for other companies in this situation, I don't think there's much helpful advice we can give to users running their own sites other than to keep an eye open for these kind of alerts. If Kirk didn't have Google Search Console set up for his site, he probably would never have known that this was going on.

Carole Theriault

True, true.

Troy Hunt

But, you know, companies have a lot to learn, I think, about how they respond to incidents and, you know, be transparent. But teeny tiny doesn't really work, does it?

Graham Cluley

I think they've actually deleted the tweet because I'm going back through your thread because I was curious now and I've found you replying to them. It's not me with the issue. I'm not a customer of yours. I was linking to McElhaney's blog.

Carole Theriault

When they realized it wasn't a DM.

Graham Cluley

And the parent tweet is gone. That's— that's— oh man.

Troy Hunt

Don't worry, I've got a screenshot. I'm sure you do too. Links in the show notes. So Troy, what have you got for us this week?

Graham Cluley

So this week I have been writing about minimum password lengths. And for a little bit of context, I put out last year this massive set of passwords called Pwned Passwords as part of Have I Been Pwned. And they're about 320 million passwords. They're all SHA-1 hashed because some of them do have a bit of PII and stuff in them. And the sort of the premise of it was you could take these and then when someone registers, logs in, changes password, you could hash that, compare it to the set, and say, hey, if your password is in this 320 million set, it has appeared somewhere in a data breach, probably not a good password, you want to do something else with it.

Troy Hunt

Okay, so you can check your password against the 320 million that you've collected effectively. Troy, I have to say, that's a pretty teeny tiny number of passwords.

Graham Cluley

Wow, it's interesting you say that.

Troy Hunt

Let's be scientific for a moment. Interesting.

Graham Cluley

Yeah, that's roughly 320 million. But, you know, the premise is, I guess, not so much to check your own password, but more if you are running a web application and you want to try and encourage your users to use good passwords, the theory is that you should be looking at previous breach corpuses to see if someone's using a password that's appeared publicly before. So I'm doing a V2, which incidentally is now over half a billion. I've just finally wrapped up the complete set. And as part of that exercise, I wanted to sort of look at, could I possibly try and reduce the size of this a little bit by trimming out the stuff that was beneath some sort of certain threshold? Because websites just shouldn't be allowing that length. And I thought, oh, look, I'll go through and do this little exercise. I'll just see what sort of minimum length the world's largest websites have.

Troy Hunt

Okay. Yeah.

Graham Cluley

Cool.

Carole Theriault

I like it.

Graham Cluley

Yeah, so I'll put the question to you. What is the correct minimum length? What do you guys reckon?

Troy Hunt

I don't know.

Carole Theriault

I know what I would say. I would say minimum, I would say 20 characters, but I suspect it would be more like 12.

Graham Cluley

You don't like customers, do you?

Troy Hunt

Yeah, I'm not running retail.

Carole Theriault

It's true.

Troy Hunt

I would think for a website, I mean, I think when I generate a password with my password manager, I mean, obviously try and go for as long as possible, but certainly I begin to get a bit twitchy if it's less than 12. I'd probably want it to be longer than that though.

Carole Theriault

But you wouldn't be surprised if you saw a site that had 8 of them, 8 characters?

Troy Hunt

No, but I'd begin to feel a little bit uncomfortable, probably.

Graham Cluley

So, you know, we need to be clear that there's a nuance here, and the nuance is that there's a difference between when you go to a website and you create a password for yourself and you decide what length it should be, versus when you are the creator of the website and you say, well, what is the minimum threshold we're going allow. And to the earlier point about locking users, the challenge here is that the shorter we make it, the easier we make it. The shorter we make it, people will also fall down to that lowest available level of security, and that will pose other risks. So I often ask this question when I run workshops. I sort of go, okay, well, look, you know, what's the right number? And most people sort of guess it around the, you know, 8-12 kind of mark. And the interesting thing I found, I looked at 15 of the world's largest websites, is that by far the most common number is 6.

Troy Hunt

Wow.

Carole Theriault

Yeah.

Troy Hunt

Which is less characters than the word password. You would expect them—

Carole Theriault

Very good, Graham. Very good.

Troy Hunt

Thank you. Or indeed, let me in, you know.

Graham Cluley

So it was kind of curious actually, because we ended up finding that 9 of the 15 sites I looked at allowed 6. So Facebook, Reddit, Amazon, Twitter, Instagram, LinkedIn, Pornhub, eBay, and Imgur all allow 6. And then there are only 4 of them which had the next highest limit, which was 8. And we had Google, Yahoo, Microsoft, and Twitch all allowing 8. Now that was sort of the usual spread. That the couple of outliers here is that Netflix only requires 4. And I can kind of get that in so far. Yeah, well, all right. So, well, this is an interesting sort of tangential discussion. So what I was going to say is I can kind of get it because you're often entering this on a TV remote. So from a usability perspective, there's that. The tangent there around— I think that the path we're about to go down there is it's only your TV, you know, and it's only movies and things.

Carole Theriault

But your credit card.

Graham Cluley

Ah, see, there's the change.

Carole Theriault

Yeah, that's the thing. Yeah.

Graham Cluley

And I actually just linked to someone, linked someone to this in a tweet. I linked back to that story from years ago about Matt Honan's epic hacking, the one where someone basically got the last 4 digits of his credit card from one service, then used that as identity verification into others. So, you know, my Netflix password, I'm pretty sure, I definitely know it's not 4 characters. It's not the usual sort of 30 or 40 I'd use with a password manager either.

Troy Hunt

I've made mine very simple, actually. My Netflix password is just the last 4 characters of my credit card. I thought that would be the simplest thing of all to use.

Graham Cluley

We laugh, but I've seen a lot of passwords and, you know, the times—

Carole Theriault

Actually, do you— could you tell us, out of all your 320 million passwords you've collected— half a billion, sorry— how many are under 6 characters, do you reckon?

Graham Cluley

8.7%.

Carole Theriault

Oh.

Graham Cluley

That's not as much as I thought.

Carole Theriault

Yeah, that's quite small.

Graham Cluley

Well, you know, the reason I know this is because this is where I was originally going. I was thinking, can I chop out anything under 6 characters? Because that will then bring the size of this whole thing down and it will be a little more manageable. But when I found that and it was such a small number, I was like, there's really not much point chopping that out. Now you've got to remember also that these passwords come from real data breaches, so that the number under 6% is not so much a representation of "Oh, thank God people don't choose really, really bad passwords." It's going to be more to do with the fact that there are a lot of sites that have a minimum length of 6. So what I'm going to do when I publish these is I'm going to write this up and I'll do a little bit of analysis on the distribution of passwords by length as well. And it will just be interesting to see if there's a very heavy distribution towards 6 and 8 character long passwords because that's the minimum that so many sites require.

Carole Theriault

Yep, I like it.

Troy Hunt

When I read your blog post about this, one of the interesting things I found was that everyone is choosing an even number of characters as their minimum in their passwords. There's no one saying it has to be 5.

Graham Cluley

I know. So this is a funny thing. And I even had a couple of people reply going, "The number I choose is 9." And I'm like, "Okay, why?" "Because it feels right." It's like, oh, that's— this is the whole thing, right? This is not a scientific decision. And a lot of the point of the blog post as well is to sort of make the observation that passwords these days are becoming a lot more than just, do I have two strings, right? So do I have a username and a password? And are the ones in the system the same ones that are provided by the user who comes to log in? So they're evolving beyond that. And we're really getting to a point now where there are many other mitigating controls with authentication. You know, that could be everything from resilience to brute force attacks to confidence levels in user agents and IP addresses to all sorts of other things. Hopefully monitoring my own password set and making sure the password's not in there. So it's getting much, much more sophisticated and we're moving away from these really simple, basic mathematical criteria, you know, X number of characters long, uppercase, lowercase, you know, all this kind of rubbish. So fortunately, that is now starting to go away and we're getting a bit smarter about them.

Carole Theriault

They still suck though.

Troy Hunt

You can't say that to the man with half a billion passwords.

Carole Theriault

Sorry, dude.

Troy Hunt

You know, it's like he's got this great big butterfly collection and telling him butterflies suck.

Carole Theriault

No, it's not the same. I love that you're doing what you do. I hate the fact that we have to use passwords to get access to anything, but I don't have a better solution.

Graham Cluley

So no, well, then that's the thing, right? So they still suck and nothing is about to change. And every single time someone pops up and says, "Oh, we've got a thing which is going to fix the problem with passwords and we will never need them again." I've, in fact, I wrote something just yesterday on a column I write about precisely this. Every time someone pops up and says they've got a thing, it never happens. And it never happens because passwords are something that's so simple that everybody understands them. And that's why they live.

Troy Hunt

We're going to be living them for some time to come, aren't we?

Carole Theriault

Living the dream.

Troy Hunt

Passwords. Carole, what have you got for us this week?

Carole Theriault

So I'm breaking the rules because I'm allowed.

Troy Hunt

Surprise.

Carole Theriault

And it's not security related at all, but it's important technology stuff and I think we should all be thinking about it. So that's what I'm talking about.

Troy Hunt

It's kind of like a pick of the week, which you have somehow promoted to the main section of the show.

Carole Theriault

My pick of the week is not security related either.

Troy Hunt

Oh, well, I'm glad you joined us on Smashing Security this week.

Carole Theriault

Graham, let me start with a question to both of you. So if I gave you both 4 hours of uninterrupted, unfettered personal time, what would you do with it? Don't be rude because we've had a complaint about—

Troy Hunt

We did have a complaint, yes.

Graham Cluley

But it wasn't on the show I was on, was it?

Carole Theriault

No. So don't say boobies or anything like that. So 4 hours.

Graham Cluley

I know what I'm not doing now.

Troy Hunt

4 hours.

Carole Theriault

You play chess, Graham.

Troy Hunt

I'd probably play chess or watch a chess video or I'd do some sort of Doctor Who marathon. I'll find some classic Doctor Who episodes from 1978 to watch.

Graham Cluley

I'd actually do something interesting. I think I'd go to the beach, I'd go out on the water, you know.

Carole Theriault

Okay, I'm hanging with Troy. I'm hanging with Troy. So the thing is, is after sleep and work and basic life maintenance, by which I mean eating, bathing, you know, making sure your kids are awake and going to where they need to go, you apparently have as an adult about 4 to 6 hours of personal time. And this is where, you know, you do your hobbies, you have a hot date, you have family time and all that cool stuff. So apparently this 4 or 6 hours that we have, we are spending about 90% of it on our screens.

Troy Hunt

Oh, that's tragic, isn't it?

Carole Theriault

It is kind of tragic considering that, well, certainly me and most of the people around me spend maybe 100% of their working life in front of a screen.

Troy Hunt

Yeah.

Carole Theriault

I'm not surprised by this, but it does make me feel a bit icky because I know I spend way too much time in front of screens. But I somehow excuse it because I think most other people are doing the same thing, so it must be okay.

Troy Hunt

And also at the moment, Carole, you are crippled in bed with your spinal injury.

Carole Theriault

I know, yes.

Troy Hunt

You know, as your husband put your monitor pretty much in front of you, there's not much else you can do, is there?

Carole Theriault

I know, it's tragic. I'm getting better. I'm getting there slowly, slowly. Now, why has this happened? So there's been a dramatic increase. So in 2015, only 2 years, 3 years ago, it was about 75%. So it's gone up quite a lot in the last few years. And one of the reasons is to do with FOMO, or the fear of missing out. But some people are saying that algorithms that are designed and implemented by the big internet giants are actually fueling addictive behaviors in us that very much counter our well-being. So for example, social psychologist Adam Alter maintains that we are literally addicted to modern technology products. And there was this excellent piece published in The Guardian this weekend about how YouTube's algorithm distorts truth. And it talks about how YouTube cherry-picks controversial or sensationalist up next for your autoplay to keep you glued to the screen.

Troy Hunt

Crumbs.

Carole Theriault

So there's this group of Silicon Valley insiders. Now interestingly, these are all ex-Facebookers, ex-Googlers, who basically now have seen the error of their ways, and they have called— their organization is called the Center for Humane Technology, or humane-tech.com. The group is dedicated to raising awareness about the negative effects of social media and technology on society. And it's spearheaded by Tristan Harris. Now, he spent years working at Google as a design ethicist, but has started campaigning against the dangers of these big websites like Facebook and Google. Anyway, so the group this week have announced a partnership with nonprofit media watchdog Common Sense Media to basically talk about tech addiction. And this isn't small potatoes. They got $7 million from Common Sense Media. And they got $50 million in free media and airtime from Comcast and DirecTV. So I'm suspecting a lot of our American friends are going to see these ads.

Troy Hunt

So, oh, hang on a moment. So there are media outlets like Comcast and DirecTV who are funding a campaign to prevent people from looking at screens.

Carole Theriault

Mind you, well, maybe their TV, they're missing the viewers.

Troy Hunt

Well, I see. Exactly. That's what I'm thinking. Because the big competition to TV stations these days is Facebook, YouTube, your smartphone, etc., etc., isn't it? I do think there really is a case that people are getting addicted to these things.

Carole Theriault

Question really is, right, it's about design ethics. Are the big kids on the block doing what we want them to do, or have we all become slaves to their offerings for reasons we can't even understand? Humane Tech say Facebook, Twitter, Instagram, and Google are all caught in a zero-sum race for our finite attention. And they need that to make money. Things like Snapchat. I don't use Snapchat, but Snapchat has this feature called Snapstreaks. And basically it shows users how many days in a row they've sent a Snapchat picture to their friends. Right? So if you miss a day, if you miss it in 24 hours, you lose your streak.

Troy Hunt

Oh, I see.

Carole Theriault

So if you're in between, right? And your parents force you to go on vacation and you have no airtime, apparently very stressful because you lose your number that you've been working on for so long.

Troy Hunt

There must be people on Fiverr or something like that who you could hire to carry on posting onto your Snapchat.

Carole Theriault

I saw an article where kids are actually sharing their Snapchat passwords with 5 or 6 of their friends so they can keep it going while they're away, which, you know, I do have a security angle.

Troy Hunt

These people are going to keep Troy Hunt busy for a long, long time, aren't they, if they're doing this with their passwords.

Graham Cluley

I was actually literally busy just checking my Twitter. So what was all this about? That's outrageous. So this is— you're being a perfect example, Graham. So, you know, I find the best fix to all of this is physical exercise because that's sort of the one time where it's actually really hard to look at your phone. And if you can do something that tunes you out for a couple of hours, so yeah, I'll play tennis or I'll get on the water or do something like that. And I sort of have a couple of hours where you can't look at it. And of course you come back afterwards, right? And there's a flood of whatever's happened while you've been gone. But yeah, I think that more than anything, that is the way to tune out. And that's good for you in all sorts of other ways too.

Carole Theriault

Absolutely. 'Cause ultimately it's all about money, right? How much time you spend on the site, snarfling up the content and watching ads, lines the internet giants' pockets. So it's basically about taking back control and making sure you use it properly. And it's also for your kids, right? I mean, Graham, you've got a kid and you've mentioned before that he's online a lot.

Troy Hunt

Oh yeah, he's, he really loves YouTube and things like that. Absolutely. And actually, I remember an old video that Troy put out on his YouTube channel where he was introducing his son, I think, to a site called code.org, which is basically teaches kids how to program and write little games and things. And it's fantastic. And so what I've tried to do is I've taken my child's interest in technology and things like that and said, look, if you're going to be stuck in front of a screen because it's a rainy day and you want that, let's at least—

Carole Theriault

Or you're addicted.

Troy Hunt

Well, or whatever, but let's at least get you programming. And he got such a thrill out of doing that.

Carole Theriault

Is he still doing it?

Troy Hunt

We haven't done it for a little while. Well, he's back at school at the moment, so he's just exhausted in the evenings, but half term's coming up and I'm sure we'll be doing it again.

Carole Theriault

Oh, cool. So how do we take back control? Just a few little things. And I know these aren't popular, but everyone who says they do them say it's great and it's worthwhile. I'm trying them. So this is turning off notifications. So anything that interrupts your thoughts or current activity. So in other words, go visit your WhatsApp feed and your Twitter feed when you're ready to do so rather than getting the feed, getting the notifications. Create specific no-screen time for the family, be it Tuesday night or whatever. But really, you were saying, go out and get some exercise. But you see, I go out for walks a lot and I, well, when I could walk, but I do it with headphones, right? I'm always listening to podcasts. So I kind of think I may have to unplug completely for a bit of the time. Set alarms. People say no screens rule in the bedroom. I've heard people have that rule. And turn off autoplay. I think that's a big one. Turning off autoplay can pull you out because you'll notice a lot of these apps, they hide the clock as well because I use my phone obviously as my watch, right? And they'll hide the clock. So sometimes I'll be on a feed, something reading, I read and I think, I wonder what time it is. And because it's not top of the phone, I'll actually go, I'll look later and carry on snarfling up the feed.

Troy Hunt

By autoplay, Carole, do you mean things like Netflix?

Carole Theriault

Yes. Or YouTube. So YouTube, you have a little toggle, right? Kind of, you know, you play a movie and then it'll you know, whatever, a little video, and then it'll just decide for you. And who's deciding that? So that's the other problem. They're deciding that based on the feeds, the things you've already watched. But what if you're watching something for research that I may not necessarily be interested in personally? I don't need them in my feed.

Troy Hunt

I think you make some excellent points here. I think—

Carole Theriault

Thank you very much, Graham Cluley.

Troy Hunt

I know. Oh gosh, I hope you're not going to capture that audio and use it against me. But I think that there is a real addiction problem with this technology, and we are teaching our kids to be addicted as well. And I think in many ways smartphones are the new cigarettes and people do get very twitchy if they haven't checked their feeds for a while or they haven't checked out Facebook on who's posting what. And we do need to try and be much more disciplined and grown up about this. And I think, I mean, I'm putting my hands up as well. Yeah, I say check out humane-tech.com. They've got some good information on their site. All right. Thanks very much.

Carole Theriault

This episode of Smashing Security is sponsored in part by Rapid7. Trusted by over 6,700 organizations globally, Rapid7 security solutions harness the critical information essential to protect an organization's best interest. Rapid7's InsightIDR has been named a Visionary in Gartner's latest SIEM Magic Quadrant. InsightIDR unifies SIEM, UBA, and EDR and is an intruder analytics solution that gives you the confidence to detect and investigate security incidents faster. You can download a 30-day trial by visiting rapid7.com/insightidr. That's rapid7.com/insightidr.

Troy Hunt

And thanks once again to MetaCompliance for supporting this episode of Smashing Security. People are the key to minimizing your cybersecurity risk posture. You can save 10% as a Smashing Security listener off the high-quality cybersecurity e-learning catalog by going to metacompliance.com and quoting the code SMASHING. That's metacompliance.com. And don't forget the code Smashing Security. On with the show. And welcome back. You join us at our favorite part of the show, which we like to call Pick of the Week.

Carole Theriault

Pick of the Week. Pick of the Week.

Troy Hunt

Thanks, Grom.

Graham Cluley

Oh, geez. So Pick of the Week is that part of the show where everyone chooses something they like. It could be a funny story, a book they've read, a TV show, a movie, a record, an app, a website, a podcast, whatever you like. Doesn't have to be security related necessarily.

Carole Theriault

Graham, it's so weird that that is your pick of the week because only last night I was listening to the latest Sam Harris podcast, which was called AI Racing Towards the Brink. And it was a conversation with Eliezer Yudkowsky, who's a decision theorist, computer scientist, who is all about AI. And he was talking about AlphaGo and exactly this topic. So it's worth listening if you're into it, go listen to that podcast. It's quite interesting. And he's an interesting guy.

Troy Hunt

It was interesting. I mean, I personally would have preferred a little bit more depth in the documentary, I think, because I kept on thinking, You know, there are some scary things about this which aren't touched upon at all. It's more the, "Oh, isn't this a tremendous achievement?" And clearly it is a tremendous achievement from a programming point of view. Wow. You know, that they've managed to do this, but I think there's deeper stories to tell here.

Carole Theriault

Good. I'm glad you're finally getting a bit afraid about AI. I've only been barking about it for a year.

Troy Hunt

What, you think I haven't been afraid?

Carole Theriault

No, you're "Oh, sounds future stuff, Carole." Carole, go back to 1990. He's a son-in-law.

Troy Hunt

'91, I was terrified of Furbies.

Graham Cluley

That's a different issue.

Troy Hunt

Troy, what's your pick of the week?

Graham Cluley

Because I was too busy tweeting and I didn't really think about it in advance—

Carole Theriault

So cool.

Graham Cluley

I realized that it's a special privilege to be able to sit here and have connectivity that actually works across my entire house. And I wanted to talk about what I redid with my network a little while ago. I ripped out all the old crap, which was this sort of consumer-grade, the kind of box you get from your ISP kind of router deal, ripped it all out. And I went and bought a bunch of Ubiquiti stuff and put that in through the whole house. And my house glows at night now. Put it this way, I've got so many wireless access points and now what happens is I can go into this one central administration interface. I can see all the different devices around the house. I can see all the clients that attach to them, where they move around. I can remotely administer them. So I set up my parents and I set up my brother and I remote update stuff via the cloud, which is actually really cool because it actually updates. And one of the things I know— I'm getting really choked up. Everyone I got really excited about these stupid things that, you know, in retrospect, they're stupid things. You know, I got excited about the fact that here I have firmware and software which actually updates.

Troy Hunt

Networks, you know.

Carole Theriault

Yes, well, I think that's a very good one.

Troy Hunt

I'm just amazed you have 7 access points.

Carole Theriault

This is a little bit bigger in Australia than they are in England.

Troy Hunt

That's what I was about to say. This is a huge difference between the UK and Australia, isn't it? They've got all that room.

Graham Cluley

But this is a nice thing, and you know, I can see them all here, so I can read through it and I can see I've got the front room, the garage, the living room, the lounge, the master bedroom, the study, the barbecue and the jet ski, and everything is on here. Yeah, yeah, no, Google it. Seriously, there's a blog post about it.

Troy Hunt

It's a real thing.

Carole Theriault

See, you're addicted, Troy. You're addicted.

Troy Hunt

Troy's actually recording this right now from the jet ski. That's something you have to remember. The quality is amazing.

Graham Cluley

Yeah, very good noise removal techniques on this microphone. But yeah, look, I mean, I have to do things like webinars. I do training remotely now as well. Having said this, none of this solves the problem that my outbound internet connection maxes out at less than 2 megabits a second up. So that still is a problem that even Ubiquiti can't fix.

Troy Hunt

Is that the problem of Australia basically being on the end of a yogurt pot and a piece of string?

Graham Cluley

Yeah, it's a little bit like that.

Troy Hunt

I remember in our days at Sophos, Carl, when we used to make videos and the upload speed from Sophos HQ was so bad I used to drive home to upload them from my home.

Carole Theriault

Yep. We would send you home.

Troy Hunt

Yeah. Horrendous. And who knows how much they were spending on their internet connectivity, but it was appalling, wasn't it?

Graham Cluley

Well, I'm finding I have to go outside and sit in the sun and enjoy the weather whilst this happens, which is terrible.

Carole Theriault

Oh, stop showing off. It's winter here.

Troy Hunt

It's always winter here.

Carole Theriault

Me and my fricking jet ski bombing around with my Wi-Fi connection.

Troy Hunt

Carole, cheer us up. We don't want to hear about his happiness any longer. Tell us what your pick of the week is.

Carole Theriault

My pick of the week. So we know Valentine's Day is fast approaching. And I had a big swanky foodie day at a Michelin-starred restaurant day planned out with my hubby. And because of— I had to scrap it all because of my little back snafu. So what to do, right?

Troy Hunt

You could have given your table to me, by the way. So I could have gone to your Michelin-starred restaurant.

Carole Theriault

Yeah, it's not cheap stuff here, Graham.

Troy Hunt

No, I'm just saying.

Carole Theriault

Yeah, well, anyway, look here, do this instead. Get your apron on, kids, because we're going to make a crepe cake because it's easy and it really is impressive, right? Literally, you just make a ton of crepes, stack them up, and between them put layers of delicious stuff. That's it, really. And it's good. Everyone loves it. Kids love it. Everyone loves it. I have a crepe recipe inside the show notes. It's a good one. And here's some favorite fillings. I'm doing this. I'm doing this. You ready?

Troy Hunt

So we've had Carole's Agony Corner and now we're having Carole's Recipe Corner.

Carole Theriault

It's Valentine's Day. I'm stuck at home feeling sorry for myself. I'm hoping my other half's going to make me a crepe cake. This is how I'm getting the message to him.

Troy Hunt

I hope he listens to the show.

Carole Theriault

Well, we're going to find out, aren't we?

Troy Hunt

Oh yeah, good test.

Carole Theriault

So no one tell him directly, please. So yeah, there you go. So check it out.

Troy Hunt

Well, thank you for that.

Carole Theriault

Great pick of the week.

Troy Hunt

Crepe pick of the week. Absolute crepe from Carole there.

Carole Theriault

Mine's the most delicious of the bunch.

Troy Hunt

Well done. And thank you to Troy as well for joining us. If you haven't already checked out Troy's blog at TroyHunt.com or his fantastic Have I Been Pwned project, which you should definitely sign up for so you get notification if you're included in some of these ghastly data breaches, then please do so. And Troy, where's the best place for people to follow you. I guess it's on Twitter, isn't it? That seems to be where you are. You're there right now, aren't you? @TroyHunt. And if you're going on Twitter, you can also check us out. We're at Smashing Security without a G. Twitter didn't let us have a G. And maybe if you like the show, you might want to rate us on Apple Podcasts. It helps new listeners discover the show, which keeps us happy and it entertains Carole Theriault as well. If you leave a review, because at the moment she's stuck in her bed, unable to move. And the only thrill she gets is refreshing iTunes.

Carole Theriault

Graham, you do, you're very good because you do send them every time there's a new one, you send it to me and I really love reading them. So, more, long may it continue.

Troy Hunt

Well, let's hope your back fixes itself soon. Until next time, cheerio, bye-bye.

Carole Theriault

Later.

Graham Cluley

Thanks guys, bye-bye.

EPISODE DESCRIPTION:

A Namecheap vulnerability allows strangers to make subdomains for your website, Troy Hunt examines password length, and ex-Google and Facebook employees are fighting to protect kids from social media addiction.

All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, who are joined this week by special guest HaveIBeenPwned's Troy Hunt.

Follow the show on Twitter at @SmashinSecurity, or visit our website for more episodes.

Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening!

Warning: This podcast may contain nuts, adult themes, and rude language.

Special Guest: Troy Hunt.

Sponsored By:

Support Smashing Security

Links:

Privacy & Opt-Out: https://redcircle.com/privacy