{"id":27802,"date":"2019-07-31T12:16:23","date_gmt":"2019-07-31T16:16:23","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?p=27802"},"modified":"2021-07-10T16:11:13","modified_gmt":"2021-07-10T20:11:13","slug":"transatlantic-cable-podcast-103","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-103\/27802\/","title":{"rendered":"Transatlantic Cable podcast, episode 103"},"content":{"rendered":"<p>For the 103rd instalment of the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky <em>Transatlantic Cable<\/em> podcast<\/a>, Dave and I take a look at some important stories that you may have missed this week.<\/p>\n<p>To start things off, we go to Louisiana, where a handful of schools have been attacked with malware. From there, we jump across the Atlantic to South Africa, where ransomware hit an electrical company in Johannesburg.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kart\">\n<p>The next story looks north to England, where Mozilla has pointed out that a tool meant to show transparency in political ads on Facebook is not working as it should. We then discuss this week\u2019s PSA of updating your iPhone or iPad ASAP. To close things out, we look at a new vulnerability in contactless payments.<\/p>\n<p>If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For the full text of the stories, please visit the links below:<\/p>\n<ul>\n<li><a href=\"https:\/\/edition.cnn.com\/2019\/07\/25\/us\/louisiana-schools-cybersecurity-attack\/index.html\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Louisiana\u2019s governor declares an emergency after cyberattacks on several school systems<\/a><\/li>\n<li><a href=\"https:\/\/www.bbc.com\/news\/technology-49125853\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ransomware hits Johannesburg electricity supply<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/anti-ransomware-tool?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=uk_kart-uk_db0077_organic&amp;utm_content=sm-post&amp;utm_term=uk_kdaily_organic_db0077_sm-post_blog_kart-uk\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky Anti Ransomware Tool<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/technology\/2019\/jul\/29\/tories-facebook-ads-bugs-transparency-dark-money\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Tories continue Facebook ad spree as \u201cmajor bugs\u201d block transparency<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/ios-critical-vulnerabilities-124\/27778\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Researchers found six severe bugs in iMessage \u2014 update to iOS 12.4 right away<\/a><\/li>\n<li><a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2019\/07\/29\/exclusive-hackers-can-break-your-credit-cards-30-contactless-limit\/%23403a618e41e1\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Hack breaks your Visa card\u2019s contactless limit for big frauds<\/a><\/li>\n<\/ul>\n<p><iframe src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/10721762\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"https:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p><strong>Jeff:<\/strong> The first story today goes into a cyberattack on school systems in Louisiana.<\/p>\n<p><strong>Dave:<\/strong> Yeah, that\u2019s right. The governor of Louisiana, Governor John Bel Edwards, has declared a statewide emergency, which I\u2019m going to be honest, I\u2019m gonna hold my hand up here and say that I\u2019ve never seen this before. This is the first time I\u2019ve seen a statewide emergency for some form of cyberattack. And basically, it revolves around the fact that a couple of the schools were hit by, quote, a cyberdata breach. We don\u2019t know any more than that. I know, over in the States, there\u2019s been a lot of publicity around several different attacks. And I think we\u2019ve spoke about these in the past. And Jeff, we\u2019ve talked about the Atlanta ransomware hack \u2014<\/p>\n<p><strong>Jeff:<\/strong> Atlanta. Baltimore.<\/p>\n<p><strong>Dave:<\/strong> \u2014 and in the article, attorneys mentioned that a couple of cities in Florida have also been hit. This is the scary part. We\u2019re in July. So you know, halfway through the year, and quoting from the article here, they have been at least 22 reported breaches of public sector networks in 2019. So far, that\u2019s 22 reported breaches, how many others go unreported?<\/p>\n<p><strong>Jeff:<\/strong> A lot, probably.<\/p>\n<p><strong>Dave: <\/strong>Yeah, probably. So I think it\u2019s fair to say that, you know, this stuff isn\u2019t going away.<\/p>\n<p><strong>Jeff:<\/strong> I think what\u2019s interesting about this one is that you see, by the governor calling it a state of emergency, they\u2019re able to get more agencies helping them. So now you\u2019ve got the Louisiana State Police, the Louisiana National Guard, the government, the Office of Homeland Security and Emergency Preparedness, the State Office of the technology service, Louisiana State University, and other agencies. So there\u2019s a bunch of people working on this, and I think they\u2019re trying to figure out what those next steps are and how to move forward, which I think, you know, as we\u2019ve seen is ransomware on municipalities has become almost a niche industry, if you will, in the in the states over the past, you know, seven months or so. So I think this is something that that\u2019s interesting. But then, you know, we look at the second story today, you know, similar to the city being taken over, Johannesburg\u2019s electrical supply was hit with a ransomware attack.<\/p>\n<p><strong>Dave:<\/strong> All in the same week, we see Louisiana hit by cyberattack. And then in the same week, obviously not related. But in the same week, we see a major electricity supply in South Africa\u2019s largest city, Johannesburg, hit by ransomware attack, which led basically to people not being able to pay bills. And there\u2019s a couple of blackouts. And I think it affected the response times of the engineers fixing the blackout. So I think it\u2019s a difficult one, isn\u2019t it? Because I do wonder if there are criminal gangs out there, specifically targeting municipalities and cities, and state-run networks, because I think they probably know that they\u2019re a bit of a soft target, you know, you\u2019ve got multiple endpoints, some of them running Windows XP, a lot of them not having antivirus software, you know, they\u2019re really easy targets for attackers to hit. So originally, what I probably thought was something, you know, they were just sending this stuff out en masse, I wonder now, if some of the attackers are specifically targeting networks like this, because it\u2019s easy.<\/p>\n<p><strong>Jeff: <\/strong>I think, when you\u2019re looking at it, this kind of gets to the fact that, you know, some of these municipalities paying and now it starts to set the ante up for people where, you know, I think, you know, use the military type of term of \u201cshock and awe,\u201d where you hit something with the maximum impact. And, you know, I think when you look at something like power, it makes it easy for people to want to, you know, pay the ransom, and get everything back up and running, because this is really going to impact people\u2019s way of living. And I think that\u2019s one of those things where you start to look at it. And now that\u2019s, that\u2019s something where the pressure comes on them, where it\u2019s not just the pressure of paying the ransomware and getting the data back. But in a case like this, you\u2019ve got pressure on you based upon your customers who are looking for, for air conditioning, probably or food or, you know, all those types of things, you know, start to add up and it becomes a matter of what\u2019s collateral damage, and what\u2019s the cause and effect, and when you look, you know, getting back to the first story about the some of the ransoms that were paid in the US, you\u2019re looking at almost a million bucks in some areas, I think.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I was I was trying to remember there was a story that we covered a couple of weeks ago, and it was specifically 600,000 US dollars, wasn\u2019t it that they paid?<\/p>\n<p><strong>Jeff:<\/strong> So you\u2019re paying over half a million US dollars.<\/p>\n<p><strong>Dave:<\/strong> Yeah, that\u2019s one attack. You know, that those attackers are rubbing their hands together?<\/p>\n<p><strong>Jeff:<\/strong> Because is easy money. Now, somebody\u2019s mom\u2019s basement is up in this jammy jam.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I think that\u2019s, that\u2019s true. And I do think that these networks have been hit specifically because the attackers know that they\u2019re soft networks. So you know, why, why go for small hits, like Nan and Gran down the road, who might have a few thousand pounds stuffed away somewhere in their laptop, you infect their laptop, ransomware, you might get something off the back of it, you might not, but if they hit some of these bigger networks, we do see that, as you said, you know, we are seeing cities and companies starting to pay now. So it\u2019s just one of those things, and I think it\u2019s just going to snowball,\u00a0 if you don\u2019t stand up against it.<\/p>\n<p><strong>Jeff:<\/strong> That may become a major trend. And I think when you look at this, you know, it\u2019s really one of those things where, you know, municipalities using it, like there are tools there to get this out. So if you haven\u2019t hit with ransomware look at a site like no more ransom or, or install something like the Kaspersky antiransomware tool or KART; we\u2019ll link to that below. But that\u2019s something that watches when a system changes and it\u2019s able to roll things back. Make sure you backup your data to so everybody get up on this city\u2019s nan-and-granddads, as Dave is calling them now. Don\u2019t pay the ransom.<\/p>\n<p><strong>Dave:<\/strong> So you mentioned Facebook, and that is a nice interlude into our next story. So the next story is from the Guardian, talking about how the Tories \u2014 or conservatives, whatever you want to call them \u2014 are continuing a Facebook ad spree as a major bug has been found \u2014 sorry, I meant major bugs, multiple \u2014 which is blocking at all which Facebook has, has created a political transparency tool which, you know, after the whole thing with the Cambridge Analytica and the shockwave from that happened. Facebook developed some tools, one of which is specifically around political adverts inside Facebook. Turns out there\u2019s multiple bugs and problems with it. So yeah, it\u2019s a developing story, shall we say, because I think Facebook have only just been alerted about this, these bugs by Mozilla, who found them. So hopefully Facebook do fix them.<\/p>\n<p><strong>Jeff:<\/strong> I think it\u2019s interesting. And I think this gets back to that point of, you know, there\u2019s no way I don\u2019t think there\u2019s going to be a full way for political ads to be blocked on a Facebook or have that true transparency, or, you know, who\u2019s paying for what and I think in looking at this one, you know, it seems a lot of them with the party now having to test you know, new messaging and, or us and things like that. So I could see why they\u2019re running a lot. But the part that\u2019s interesting is that the tool\u2019s not working. So outside of the fact of where it\u2019s able to say, Hey, this is what\u2019s going on here. Here\u2019s who\u2019s paying for the ads. Yeah, you know, who\u2019s paying for \u2019em, but at this point, they\u2019re not able to, you know, show you exactly what ads are being targeting, which people \u2014<\/p>\n<p><strong>Dave:<\/strong> \u2014 good point there, because there\u2019s a few stories going around the UK at the moment, and I\u2019m not pointing fingers or anything like that, you know, I don\u2019t want to turn this into political podcast. But there\u2019s a lot of stories going around at the moment about, like dark Facebook ads and, and political ads, and who\u2019s paying for them and, and who\u2019s ultimately responsible for a particular advert inside a social network? And, you know, it\u2019s an interesting point, because we are seeing a lot of ads, which are targeted to certain specific groups, but the person who\u2019s paying for the ad, or the company, or the group of people are paying for the it sometimes diluted. And I think this is, like I said, at the start, due to Cambridge Analytica, and it\u2019s great to see that people are taking a lot more interested in where these adverts are coming from and who\u2019s paying for them? Because I think prior to Cambridge Analytica and the, the fallout from that, nobody really cared, right?<\/p>\n<p><strong>Jeff:<\/strong> If you want to get a good watch into, like the Facebook ads, <em>The Great Hack <\/em>on Netflix is a really good documentary on the Cambridge Analytica whistle-blowing and things like that. So, really an interesting watch. But I think when it comes to this, is, I\u2019m gonna say it because we\u2019re not gonna turn political. But I think up with the last two elections, where you had Take Back The Power and Make America Great Again, you know, those, those seven words on there, you know, pretty much caused a crap storm when it comes to, you know, what people are doing with the ads and where people are wondering if people have been manipulated by adverts that they\u2019re seeing within tools like Facebook. And, you know, I think what people have started to realize with this is that people are able to be manipulated when they start seeing propaganda. And the question becomes, is, and I think part of it is, you know, one, both sides, I think both sides of the pond, your side, my side had very charged feelings, you know, about both Brexit and Trump being elected. So when you look at those times, something\u2019s you\u2019ve got another half of the population who wants something completely different. And now you\u2019ve got this powder keg sitting here. And now you\u2019ve got both sides sitting there saying, How are people so stupid to be duped by this? or Was I influenced by these types of ads? So people are wanting to know more, which there\u2019s still not clarity really into. And then you add in the whole level of the Russian troll farms and everything and then it\u2019s like Oh, \u2014<\/p>\n<p><strong>Dave:<\/strong> \u2014 it\u2019s a certain storm.<\/p>\n<p><strong>Jeff:<\/strong> Yeah, crap storm. Let\u2019s keep it PG here.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I think you know, you\u2019re right. But he doesn\u2019t help the, you know, nowadays, and I do think social media is, is partly if not almost entirely responsible for this, that we\u2019re seeing people, you know, on the left moving further left, and people on the right moving right. And it\u2019s like, say, I don\u2019t want to get into too much into politics. But I think, you know, we talked about bubbles. And people have their little silos, sort of Facebook bubble, and everyone inside that Facebook bubble speaks the same language and talks about the same things, and anyone with a different ideology, so to speak, never tend to turn up in that bubble. So, you know, we kind of drift apart and instead of people on the left and right, and in the center talking together, we it\u2019s just like, I think Stephen Fry actually put it best. He said that you have these canyons on the left and right, and they\u2019re shouting at each other. And just normal people are in the bottom of the canyon, just watching these people shouting at each other. I think that\u2019s where social media needs to sort of pop these bubbles.<\/p>\n<p><strong>Jeff:<\/strong> I think it\u2019s really right about here. But I think when you start to look at it, you know, those peaks and valleys that you\u2019re talking about, as you start to look at this is where the ads come in and are able to get to that manipulation point, if you will, and ad copy testing is nothing new. Image testing isn\u2019t anything that\u2019s right. But you know, instead of being like a display ad, where you\u2019re shooting a shotgun at the wall, hoping something sticks in the targeting to do within the social networks, and this is why I think people care some is you can now make what used to be that shotgun blast into a certain surgical slice.<\/p>\n<p><strong>Dave:<\/strong> Naturally. I know we\u2019ve gone to the story, but I know. I know, this story kind of makes it sound a little bit dirty. What conservatives party is doing regarding targeted adverts, but it\u2019s nothing that Labour doesn\u2019t do is nothing that the Brexit point doesn\u2019t do is nothing that Lib Dems does don\u2019t do it, you know, they hold doing it.<\/p>\n<p><strong>Jeff:<\/strong> It\u2019s a matter of how the stories were in our who\u2019s seeing the ads and looking at it. You can you can replace the political party with anything. Yeah, you can, you can replace that with that ad that I shared the other day with the gamer for president of us.<\/p>\n<p><strong>Dave:<\/strong> That did actually genuinely make me laugh out loud.<\/p>\n<p><strong>Jeff:<\/strong> Oh, it\u2019s my favorite.<\/p>\n<p><strong>Dave:<\/strong> Can we share a link in the description? I know it\u2019s not exactly PG, but \u2014<\/p>\n<p><strong>Jeff:<\/strong> Yeah, sure. LinkedIn.<\/p>\n<p><strong>Dave:<\/strong> Yeah, let\u2019s do that. Anyway, shall we jump over to the last couple of stories?<\/p>\n<p><strong>Jeff:<\/strong> I want to give the story from Thomas Webster a little bit of time. So I want to jump into one that we\u2019re going to link to Kaspersky Daily here. And now this is something that\u2019s more of a PSA for everybody. If you use an iPhone, if you use an iPad, you should probably update it right now to 12.4, the new version, because six critical bugs have been disclosed and fixed within the operating system.<\/p>\n<p><strong>Dave:<\/strong> That\u2019s right. Yeah, I don\u2019t think I don\u2019t think 12.4 completely fixes all of the six bugs.<\/p>\n<p><strong>Jeff:<\/strong> But these are six critical vulnerabilities that were found by Google\u2019s zero day projects, Project Zero. Yeah. So one of the things that\u2019s needed here is there\u2019s some pretty bad bugs that To be honest, if these bugs were paid for on the on the dark web are sold to some of these companies that buy vulnerabilities to iPhones to Apple products. They could range between 5 and 10 million bucks. So you\u2019re looking at something that\u2019s not a small bug on there. So update your devices. And now just to give the story the proper time, Dave, let\u2019s talk about the last story here.<\/p>\n<p><strong>Dave:<\/strong> Yeah, this is from Thomas Brewster over on Forbes talking about how I\u2019m I found this story fascinating he\u2019s talking about how a hack can break the Visa card contactless limit. So we all have you know, I think most of us anyway, have contact with cards these days. You just pop into a store spend up to 30 pounds, I don\u2019t know what it is in the States, probably about $50, something like that. And you can just put no need for PIN numbers, no need to put your cars into a machine or anything, you just tap and then you\u2019re off. Turns out that a couple of white hat hackers have been able to make a workaround to be able to break the 30 pound limit. So basically, I think they did it. Yeah, here we are on their own cards. They make contactless payments as high as 101 pound, though is possible, more stolen, just with just one tap. Now, they don\u2019t go into the specifics, for obvious reasons. But they do talk about how he\u2019s done a basically a man-in-the-middle attack. And they place a piece of software in between the card and the reader, which allows them to alter what\u2019s being said, really concerning, I think and Visa have addressed it, but I don\u2019t think there\u2019s a fix ready yet.<\/p>\n<p><strong>Jeff:<\/strong> I think if there\u2019s one thing to look at in this week\u2019s stories, I really think that you guys should check out the video from it. The video is actually quite interesting on here. And you know, I think what makes this pop up is a really eye-opening story is it seems every time a security features put in place, there\u2019s a bad guy who\u2019s got a way around it. And yes, these guys are white hats showing how to do it. But I think at the same time showcasing how you can get around this is the part that should be eye opening to people.<\/p>\n<p><strong>Dave:<\/strong> That\u2019s 100% correct. I think it\u2019s not going to be long before an intuitive, ingenious, shall we say black hat hacker or just someone who wants to make a little bit of money figures out how to do this. I think that you know this. For us as users of the contactless cards it\u2019s a really, really simple fix. It does mean spending a little bit of money, but I think you know, you weighed out versus potentially losing a slot of money, it\u2019s worth the risk is worth the payment, which is you can get a little \u2014 I have one, actually \u2014 it\u2019s a little wallet, which is has got RFID blocker inside the wallet. So you can actually put all your cards inside your normal wallet, it looks exactly the same as any other wallet, but it blocks any sort of RFID payments. So if anyone wants to come along and try and tap your wallet to try and take some money off, which we\u2019ve seen videos on before people have been walking around with content with card machines trying to swipe people\u2019s wallets, they won\u2019t be able to do it because there\u2019ll be no way for them to get by the barrier of the wallet. So definitely worth it. You can also buy little card holders, right, which you put all your cards inside in the same thing.<\/p>\n<p><strong>Jeff:<\/strong> And then we give them away conferences.<\/p>\n<p><strong>Dave:<\/strong> Yeah, we do. Yeah. What was a little plastic things?<\/p>\n<p><strong>Jeff:<\/strong> Yeah, I remember had to bring like, I think like 10 boxes of those things to SAS a few years ago. Definitely. Yeah, I had to bring two releases to Cancun. And like one of them was like, literally, like, try weighing your bags out with these things on there?<\/p>\n<p><strong>Dave:<\/strong> Well, I mean, one on the road. They\u2019re quite light. But you know, it\u2019s plastic and some sort of lightweight.<\/p>\n<p><strong>Dave:<\/strong> But I think Visa\u2019s, I acknowledge the hack, but they\u2019re basically saying that it\u2019s not scalable. It\u2019s not a scalable fraud.<\/p>\n<p><strong>Jeff:<\/strong> I think I think that\u2019s been the issue in the past, when you\u2019ve looked at some of these, you know, hacks in the past when you\u2019ve seen them, they haven\u2019t been at scale. So again, it\u2019s a good vulnerability to be aware of. But how scalable is it? It only takes that one time to lose your money, though. So I think it\u2019s better to be safe than sorry, get one of those RFID tracking wallets.<\/p>\n<p>And with that, this week\u2019s edition of the <em>Transatlantic Cable <\/em>podcast has come to an end. If you liked what you heard, please give us a good rating on iTunes or share it with your friends. Sharing is caring people. If you think we got something wrong, there\u2019s a story we should cover, hit us up on Twitter @Kaspersky or on our Facebook page. And we will try to cover that or address your concerns in a future episode. So, until next time, have a good one guys.<\/p>\n<p><strong>Dave:<\/strong> Bye-bye.<\/p>\n<p><em>[Automated transcription lightly edited]<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jeff and Dave discuss ransomware hitting Johannesburg, political Facebook ads, why you should update your iPhone, and more.<\/p>\n","protected":false},"author":636,"featured_media":27803,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2683],"tags":[14,20,3231,1250,485,420],"class_list":{"0":"post-27802","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-apple","10":"tag-facebook","11":"tag-imessage","12":"tag-ios","13":"tag-podcast","14":"tag-ransomware"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-103\/27802\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-103\/16303\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-103\/13808\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-103\/18311\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-103\/16386\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-103\/23115\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-103\/23055\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27802","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=27802"}],"version-history":[{"count":6,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27802\/revisions"}],"predecessor-version":[{"id":29391,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/27802\/revisions\/29391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/27803"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=27802"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=27802"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=27802"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}