{"id":15908,"date":"2019-05-31T12:04:51","date_gmt":"2019-05-31T11:04:51","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-94\/15908\/"},"modified":"2019-11-22T09:59:14","modified_gmt":"2019-11-22T09:59:14","slug":"transatlantic-cable-podcast-94","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-94\/15908\/","title":{"rendered":"Transatlantic Cable podcast, episode 94"},"content":{"rendered":"<p>Welcome to the 94th edition of the Kaspersky Lab <em>Transatlantic Cable<\/em> podcast. In this edition, we jump around a bit between cybercrime, privacy, and a little bit of <em>Terminator 2<\/em> action.<\/p>\n<p>To kick things off, we head down to Charm City. As you may have heard, Baltimore is dealing with a pretty serious ransomware attack that is crippling the city \u2014 not to mention the inevitable finger-pointing. From there, we head to the IoT and privacy front. With its new patent, Amazon wants to listen to everything you say. The company says it\u2019s an effort to improve the experience for users.<\/p>\n<p>We then move along to an events company data breach that affected more than 200,000 users. Afterward, we look at seven recent law-enforcement-agency wins in the fight against cybercrime. To close things out, we look at a new innovation from Chinese inventors that may make you think of <em>Terminator 2<\/em>.<\/p>\n<p>If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For the full text of the stories, please visit the links below:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/world-us-canada-48371476\" rel=\"noopener noreferrer nofollow\">Baltimore government held hostage by ransomware<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/arstechnica.com\/information-technology\/2019\/05\/eternally-blue-baltimore-city-leaders-blame-nsa-for-ransomware-attack\/\" rel=\"noopener noreferrer nofollow\">Eternally Blue: Baltimore City leaders blame NSA for ransomware attack<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/gizmodo.com\/amazon-patent-reveals-its-vision-for-an-alexa-device-th-1835004420\" rel=\"noopener noreferrer nofollow\">Amazon patent reveals its vision for an Alexa device that records every word you speak<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/threatpost.com\/200k-personal-records-exposed-by-events-planning-firm\/145133\/\" rel=\"noopener noreferrer nofollow\">200,000 personal records exposed by events planning firm<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.darkreading.com\/attacks-breaches\/7-recent-wins-against-cybercrime\/d\/d-id\/1334791\" rel=\"noopener noreferrer nofollow\">7 recent wins against cybercrime<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/twitter.com\/CNET\/status\/1132730624224055296\" rel=\"noopener noreferrer nofollow\">Scientists created a liquid metal that stretches<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/9978602\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/006d5c\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.uk\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p><strong>Jeff:<\/strong> All right, so to kick things off, Dave, this week we\u2019re going to come to one city that I\u2019m very fond of: Baltimore, Maryland. But unlike it being, you know, crab cakes, football, or living by the water, unfortunately, this one\u2019s going to talk about how the city has been held ransom by ransomware.<\/p>\n<p><strong>Dave:<\/strong> Yeah, this one, It\u2019s been going on for a while. It\u2019s not like it happened two days ago or anything like that. It first hit Maryland city servers were first hit on the seventh of May with the ransomware Robbinhood. \u201cRobin Hood, Robin Hood.\u201d Sorry, that\u2019s a really old song.<\/p>\n<p><strong>Jeff:<\/strong> That\u2019s a very British thing of you. You want to rob the rich to give to the poor.<\/p>\n<p><strong>Dave:<\/strong> Yeah, the demand is 100,000 pounds \u2014 sorry, $100,000, \u00a379,000 worth of bitcoins. The usual. You know, \u201cWe\u2019ve hacked your servers, give us some bitcoins.\u201d You know, hats off to the city for refusing to pay. But it\u2019s got them into a lot of problems. There\u2019s a lot of stories come off the back of this. And kind of picking it apart is quite interesting, isn\u2019t it?<\/p>\n<p><strong>Jeff:<\/strong> Yeah. I think for this podcast, we don\u2019t really need to go into the whole back and forth between the infosec \u2026 measuring contest, if you will, of things of people trying to say what\u2019s right, what\u2019s wrong, you know, whose story\u2019s right, which agencies responsible for this, who should be held accountable. I think the focus point of this right now is really the awareness level of this because Baltimore is a big city in the US. And one of the things that really stands out, this is the second ransomware attack in the past two years to the city. But what this one highlights, is just what\u2019s next for things going out. And I think the story here is talking more about how Baltimore had outdated infrastructure when it comes to IT. You know, unpatched areas, and certain things just were ripe for something like this to happen. And now they\u2019re talking to you know, they\u2019re trying to get the government to list it as a disaster for relief funds.<\/p>\n<p><strong>Dave:<\/strong> There\u2019s a lot to unpack here. I think, first off, you know, we were looking at, and I\u2019m reading this sounds exactly the same as a lot of UK councils in the fact that, you know, they\u2019re underfunded. And there\u2019s a lot of legacy IT infrastructure in place, which is never updated. You know, they\u2019re running stuff, which could be 15\u201320 years old, and it\u2019s not been updated or patched in that period of time. And that\u2019s not to say that this is just Baltimore\u2019s problem. This is this is kind of endemic everywhere. We see it all over the place. But, you know, I don\u2019t think it\u2019s something that can be solved quite quickly. But I do think that there are a lot of problems with governments and councils across the country. Across the world, I suppose. And I think it does go to show that even though, you know, ransomware, people often dismiss it as being something that happened in 2017, and doesn\u2019t happen anymore. It does still affect a lot of big systems out there that people don\u2019t really pay attention to.<\/p>\n<p><strong>Jeff:<\/strong> I think that\u2019s the big issue with things. And I think when you start to look at this, there\u2019s a lot of computers still vulnerable to the alleged bug that this was launched with \u2014 which, you know, a lot of the stories now are talking about it being exploited, whether it\u2019s EternalBlue or something different. It\u2019s something where you\u2019re starting to look at this and saying, okay, there\u2019s been a patch for this. But now looking even in the article, you know, we\u2019re talking about a million computers that are still online with this vulnerability. And that\u2019s this is not to mention the number that aren\u2019t technically connected to the Internet.<\/p>\n<p><strong>Dave:<\/strong> Yeah, airgapped systems and things like that, which may not show upon on the search engines. But yeah, you know, these things.<\/p>\n<p><strong>Jeff:<\/strong> And I think one of the things that really stands out to here, because I think this is going to become something that we see more of like you said, Dave, and one of the things that the story talks about is you know, that the city\u2019s budget was $65 million for citywide information technology operations, which is 2.5% of the budget. But that\u2019s less than half of the average for US-based cities. So I think when you start looking at this, this is one of those things where money becomes an issue; you\u2019re going to start seeing this with older outdated systems, whether it\u2019s in a city, whether it\u2019s in a government or something like that, and it\u2019s really not going to be pretty, because you start to see this and you start to have people\u2019s lives being impacted by it.<\/p>\n<p><strong>Dave:<\/strong> Yeah, yeah. I think the story goes on to say that sales of homes were delayed because of something to do with insurance documents being delayed due to the ransomware, and a bunch of other things like people paying water bills, property taxes, and parking tickets, and stuff like that. All were down, so people couldn\u2019t get to the services to pay them. Thankfully, the government, the council said that they will not be charged extra for that.<\/p>\n<p><strong>Jeff:<\/strong> I think the problem here is that we\u2019re starting to see something where Internet becomes a necessity of life. It\u2019s not just, you know, water and electricity and sewage, that\u2019s seen as a necessity of life and in the US and the UK, but now you\u2019re starting to look at something where you need access to the Internet, because everything\u2019s paid online. Yeah. And now, when something like this happens, you know, people are up a certain creek without a paddle.<\/p>\n<p><strong>Dave:<\/strong> Yeah, definitely. Yeah, you\u2019re right. Everything\u2019s online these days. And even if you ring up a call center, they need to be online to check details and things like that.<\/p>\n<p><strong>Jeff:<\/strong> Everything\u2019s tied together, so this, this is like one of those impacts that, you know, could become a bigger issue. And I know this is something that\u2019s being investigated by the Secret Service and the FBI now, in the States. But I think, in general, another thing that\u2019s interesting about this is you\u2019re starting to see politics at work too, here. So outside of the infosec politicking about who\u2019s right, who\u2019s wrong in the story, what are the factual errors? What are the alleged errors, and it comes to sources named and unnamed and you know, that\u2019s called? It\u2019s called: just figure it out, its journalism, you could read here what you want and figure that part out. But there\u2019s a lot of common threads, and if you really want to get into it, just kind of look on Twitter, and you\u2019ll see the things based on the story. I think what\u2019s interesting here is you start to see people passing the buck, and you\u2019ve got people within the government of Baltimore that are pointing fingers at the NSA and saying, you guys should have kept this tool and exploit, you know, been able to protect these and not lose them in the Shadow brokers thing, which I think is a big thing you\u2019re seeing a lot of the wonks talking about now. But outside of the Internet people with pitchforks, when you start having government people targeting other parts of the government, you know, a state versus federal in the US, it becomes a messy area where now you start to have people pointing fingers and something that\u2019s not as cut and dry as something of, \u201cHey, you just stole this loaf of bread from the store? I\u2019m going to take you to jail for a little bit.\u201d<\/p>\n<p><strong>Dave:<\/strong> Yeah. If only if only issues like this were that simple, we probably wouldn\u2019t have a job, right? You know, the \u2026<\/p>\n<p><strong>Jeff:<\/strong> David, David, David, stop that. I like working.<\/p>\n<p><strong>Dave:<\/strong> Yeah, you know what I\u2019m saying, though. If the world was just that simple and easy, and like you say cut and dry, things would be a lot easier and simple, but certainly they\u2019re not. A lot of these issues are usually a lot more complicated than they are. But anyway, I digress.<\/p>\n<p><strong>Jeff:<\/strong> But I think with that, I think with that when you close in a very good spot, though, I think when we look at this story, we went through an area where everything is cut and dry, black and white. You know, I think we went into an area where we do live in a global society now. And everything crosses borders, even though we live in our own fiefdoms or countries, if you look at it, and the Internet and everything tied to the Internet lives in different shades of grey, and now we\u2019re not talking that book that I know you read whatever you\u2019re on a plane to try and make people uncomfortable, but in all honesty, I really think this is what it comes to because now when you start seeing people point fingers, the Shadow Brokers issue with everything was a lot bigger than just a simple somebody stealing from somebody else, because of the wide-ranging implications of it. So I think the big thing here is if you\u2019re a government agency, or you\u2019re somebody who\u2019s still running at home or somewhere else a really old and outdated computer, please update your stuff. Please, please, please. And if you\u2019re working on a company thing, make sure the patch is stable, and then then roll it out to your people.<\/p>\n<p><strong>Dave:<\/strong> Yeah, yeah. Anyway, we have a few other stories, because we could talk about that one all day long. This next story is quite an interesting one. I find it quite interesting. The story\u2019s from Gizmodo and talks about how Amazon has patented an update for its Alexa device that records every word you speak.<\/p>\n<p><strong>Jeff:<\/strong> Now, that\u2019s a feature,<\/p>\n<p><strong>Dave:<\/strong> Take that title with a pinch of salt because you gotta dig into the details a little bit, but basically what it\u2019s saying \u2014<\/p>\n<p><strong>Jeff:<\/strong> I\u2019d rather not dig into the details.<\/p>\n<p><strong>Dave:<\/strong> \u2014 Well, I\u2019m going to go in there. I\u2019m diving in. So basically what he\u2019s saying is and it\u2019s just a patent, so you know, you have to take it a huge pinch of salt. So he\u2019s basically saying that the way that Alexa works at the moment is a little bit \u2026 I wouldn\u2019t say crude, but you have to do a kind of formal step, as in you have to use a wake word called <em>Alexa<\/em> or I think you can change it to say <em>Computer<\/em> these days, which is very Star Trek-y. You have to put that start, and then it records whatever you say. Amazon\u2019s idea with this is that it would listen for the wake word still, but record like, 5\u201310 seconds before you said anything. So essentially, yeah, it\u2019s recording all the time \u2014<\/p>\n<p><strong>Jeff:<\/strong> It knows your safe word before you have to yell it out.<\/p>\n<p><strong>Dave:<\/strong> \u2014 Exactly. And that\u2019s how it will work, basically. A lot of a lot of people have complained this is sort of dystopian,<\/p>\n<p><strong>Jeff:<\/strong> You know what? I think the people complaining or the people that are in the privacy. The general users who have are like yeah, hey, I can [inaudible]. But to me, this is just big Bezos. Forget about Big Brother; Big Bezosbe listening, and business be booming for him. I think when we look at this, to be honest, this is a natural progression. I think, you know, when people complain about Amazon\u2019s employees listening to stuff that\u2019s on Alexa, it\u2019s like, Really? You\u2019re really thinking that\u2019s not going to be a problem? You really don\u2019t think that they\u2019re going to listen to it? You\u2019re just talking to a machine that\u2019s helping them sell stuff. So when this comes to light, the thing to me is, again, we\u2019re looking at convenience over security and privacy. Because it is super hard to pick up your phone or roll out your computer to order a new book, to order a refill a toilet paper, to refill toothpaste, to get some stupid thing that you drunkenly order to Amazon delivered to? Like, there was that study of a drunken Amazon? What\u2019s going to happen with Alexa? Man? I can\u2019t wait for the AI stories of like, some sloppy talk back and forth.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I mean, you hit the nail on the head, these sorts of things. And I suppose we can we can say this because we\u2019re grumpy old man. And we don\u2019t have them. But these this is sort of technology, for the sake of technology in the sense that do you really need it? Can\u2019t we just go on Google? And maybe we, you know, sound a bit old-fashioned, but that\u2019s the way world is turning.<\/p>\n<p><strong>Jeff:<\/strong> I think this is stupid. To be honest, I think we\u2019re looking at this, like, Why do you have this in your home? What do you need it for? Like I see my kids playing with my mother\u2019s more there. And I want to shoot it. I want to go buy a gun and shoot the hell out of it. Because it is so annoying and so disruptive, of just being able to be controlled by a by a 5-year-old and an 8-year-old. So to me, I just think there\u2019s no use for it, like I see that it can help things and it can make certain things easier for people. But do we really need that level of automation? Before we get any of that Jetson-type stuff in the houses, I want a flying car or a robot or that damn machine that you would just pick. When Elroy hit a button, he would get like mac and cheese and then they go over there and hit something else, and all of a sudden you get a hamburger. I want that before I want something talking to me in my house. Because I\u2019ve seen what HAL can do to people.<\/p>\n<p><strong>Dave:<\/strong> You basically want a flying cars instead of an Amazon Alexa, which, you know, I think I can I can go with.<\/p>\n<p><strong>Jeff:<\/strong> Elon Musk, get up on that.<\/p>\n<p><strong>Dave:<\/strong> Yeah, and I mean, just dropping back into the story briefly, as Amazon were contacted about it, and they quite rightly said that, you know, it\u2019s just patent. A lot of these companies create patents, and then you \u2014<\/p>\n<p><strong>Jeff:<\/strong> \u2014 [sings] and you said he\u2019s just a friend. Oh, baby. You got what I need.<\/p>\n<p><strong>Dave:<\/strong> Beautiful. Yeah, it\u2019s just a patent. It\u2019s not necessarily going to turn into a feature. Yes, exactly. For now.<\/p>\n<p><strong>Jeff:<\/strong> Just like just like, just like Facebook wasn\u2019t gonna use facial recognition, huh?<\/p>\n<p><strong>Dave:<\/strong> Yeah. Where did that end up? Anyway, shall we jump over the next one?<\/p>\n<p><strong>Jeff:<\/strong> Yeah, this is this one\u2019s interesting. I think this one\u2019s more of an FYI to those who use it. 200,000 personal records were exposed by Amazingco, an event-planning app. Now, why I think this is interesting is while it does hit mostly Australia, New Zealand, and the US is that this leaked records tied to children\u2019s entertainment, among other types of tours. So it\u2019s kind of like now you\u2019ve got data that can be used in a not-so-good way out there.<\/p>\n<p><strong>Dave:<\/strong> Yeah. I mean, this is another data breach story. And I feel, Jeff, that we talk about data-breach stories, like every day. I think what makes this one unique is, yeah, this is they do have children\u2019s information on here. In terms of size, we\u2019re not talking like AOL or anything like that, but 212,000 records in total. But yeah, it\u2019s the sensitivity of the data, this is, you know, we\u2019re talking private information of individuals, children, and older people. So yeah, it\u2019s concerning, yeah?<\/p>\n<p><strong>Jeff:<\/strong> I think the part that could be more concerning is the IP addresses and storage information that were found, that are things that can be exploited in the future. But again, like with all data breaches, it\u2019s going to be something that comes up, you know, I think this is another reason to use separate e-mails for accounts, or even to just do something along the lines of how do we say change your passwords and keep updated passwords and strong management with something like a password manager if you can\u2019t remember them. Or remember Jacoby\u2019s little formula with monkeys and colors. But that\u2019s a whole different story. So I think with this one, just it\u2019s a smaller one of the breaches but something definitely to keep eyes on. And now it\u2019d be a more happier note, I think we\u2019ve talked about crime, big Bezos listening, and some other things. And I think a good way to kind of get towards the tail end of this is over on Dark Reading this week, they have a story that\u2019s a slideshow on desktops. So sorry, in advance, if you click on the link and get annoyed by clicking through things, really talks about seven recent wins against cybercrime. And I think this is a hats-off to the law-enforcement agencies out there. This one ranges everywhere from talking about the Alexandria online auction fraud network taken down to the xDedic group. And I think with this, it\u2019s really good to see that law enforcement able to start taking down some of these cybercrimes, which seem like they would often take much longer or not be as prevalent in the past, and it seemed just like criminals were getting away with murder. On the Internet.<\/p>\n<p><strong>Dave:<\/strong> I agree. It is a little bit frustrating. It\u2019s a slideshow, but we thought it worth mentioning because we too often talk about bad news on this podcast, It\u2019s nice, as you say, to kind of shout out police forces and the private agencies are bringing these things down. One of my favorite ones actually out of all these is the Webstresser Wipeout, i.e., DDoS for hire. It was a massive operation. And you know, the Webstressers were sort of a huge thing a few years back. Not to say that they\u2019ve disappeared overnight or anything like that, but they I think the Webstresser Wipeout was sort of a big moment because they took down a huge sort of network of these. So it\u2019s, you know, and that was the EU and Europol who took that down so you know, hats off to them. So it\u2019s a great little story well worth reading. It also kind of gives you a little bit of backstory in on in the ransomware or the attacks and things like that. So yeah, it\u2019s a nice little read.<\/p>\n<p><strong>Jeff:<\/strong> I like that we get to talk about good things for once. We don\u2019t get into that too much. And I think with this one, like especially with this Webstresser Wipeout, that\u2019s 4 million DDoS attacks this group had done. If you think about it, that\u2019s a lot of devices that are being done there. And definitely something that\u2019s good to see out of there because we like to see crime pay.<\/p>\n<p><strong>Dave:<\/strong> Wait, crime pay?<\/p>\n<p><strong>Jeff:<\/strong> Well, I like to see criminals pay. By pay I mean, hard time. So good job to our Leo\u2019s out there. So this week, I want to end on something because everybody\u2019s getting jacked up about the new <em>Terminator<\/em> movie with Sarah Connor coming back and everything and Arnold being up in there, but CNET was talking about something this this week, where there\u2019s now a creation of liquid metals for soft robots.<\/p>\n<p><strong>Dave:<\/strong> Yeah, this freaked you out.<\/p>\n<p><strong>Jeff:<\/strong> Listen! I spoke I have seen what they can do.<\/p>\n<p><strong>Dave:<\/strong> The video is quite interesting, but thankfully, it does look like T1000s got a fair way to go yet. But it\u2019s quite funny, actually. You look in the thread on the tweet, and literally every single tweet response is of the T1000 when everyone else is going down the same road as \u2026<\/p>\n<p><strong>Jeff:<\/strong> Researchers in China: Please stop this. I have seen what happens with Skynet. Yes, it was a movie I know. But yo, stuff got really bad.<\/p>\n<p><strong>Dave:<\/strong> Maybe we should show it. They might not have seen the video, so we might need to show them and hopefully change their minds about T1000.<\/p>\n<p><strong>Jeff:<\/strong> I\u2019m pretty sure we might be blocking that in China now. I\u2019m not sure that they have a good relationship with my country right now. Before we get into that, we\u2019re just gonna wrap up this week\u2019s edition of the Transatlantic Cable podcast. Hopefully you guys liked it. If you did, please subscribe or share with your friends. Sharing is caring. If you want to help us out with the podcast, please give us a good rating on your favorite podcast listening tools. And if you like us and haven\u2019t subscribed yet, please subscribe below. We\u2019ve got great links there. We come out each week with a story for you guys and keep it to 20 minutes or less to fit into your busy week. So next week, same cybertime, same cyberchannel. We\u2019ll see you then.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dave and Jeff tackle the latest on the Baltimore ransomware attack, Amazon\u2019s new Alexa patent, recent wins against cybercrime, and more.<\/p>\n","protected":false},"author":636,"featured_media":15909,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1622,2026],"tags":[2093,493,2525,77,314,452,441],"class_list":{"0":"post-15908","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-threats","10":"tag-alexa","11":"tag-amazon","12":"tag-baltimore","13":"tag-cybercrime","14":"tag-data-breach","15":"tag-podcast","16":"tag-ransomware"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-94\/15908\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-94\/15853\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-94\/13382\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-94\/17763\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-94\/27158\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-94\/22688\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-94\/22637\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=15908"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15908\/revisions"}],"predecessor-version":[{"id":17094,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/15908\/revisions\/17094"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/15909"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=15908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=15908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=15908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}