{"id":13405,"date":"2019-06-04T06:41:47","date_gmt":"2019-06-04T10:41:47","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-95\/13405\/"},"modified":"2019-11-15T15:22:15","modified_gmt":"2019-11-15T11:22:15","slug":"transatlantic-cable-podcast-95","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-95\/13405\/","title":{"rendered":"Transatlantic Cable podcast, episode 95"},"content":{"rendered":"<p>Episode 95 of the Kaspersky <em>Transatlantic Cable <\/em>podcast touches on encryption\u2019s power, burger joints, Google Chrome restrictions on ad-blockers, and more.<\/p>\n<p>To start things off, Dave and I tackle a pair of stories dealing with end-to-end encryption and how governments are looking at it. The first is from Germany and ponders if law enforcement should be able to read, in plain text, encrypted messages. Then we jump to how companies such as Apple and Google are pushing back on the GCHQ for proposing the same thing.<\/p>\n<p>Afterward, we move to sports and how a football club may need to recheck where they send their money. Then, we discuss a burger chain in the US hit with point-of-service malware. Finally, we close out the podcast with changes to Chrome and ad blockers.<\/p>\n<p>If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For the full text of the stories, please visit the links below:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/05\/28\/german_government_encryption\/\" rel=\"noopener noreferrer nofollow\">Germany mulls giving end-to-end chat app encryption das boot<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.cnbc.com\/2019\/05\/30\/apple-google-and-whatsapp-condemn-gchq-ghost-proposal.html\" rel=\"noopener noreferrer nofollow\">Apple, Google and WhatsApp condemn UK proposal to eavesdrop on encrypted messages<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/boca-juniors-case\/27107\/\" rel=\"noopener noreferrer nofollow\">Soccer club defrauded<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/threatpost.com\/pos-malware-found-at-102-checkers-restaurant-locations\/145181\/\" rel=\"noopener noreferrer nofollow\">POS malware found at 102 Checkers restaurant locations<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/9to5google.com\/2019\/05\/29\/chrome-ad-blocking-enterprise-manifest-v3\/\" rel=\"noopener noreferrer nofollow\">Google to restrict modern ad-blocking Chrome extensions to enterprise users<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/10026053\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/006d5c\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p><strong>Jeff: <\/strong>Dave, what the heck\u2019s going on in Europe right now where we\u2019ve got two different countries who\u2019re looking at pretty much working at decrypting messages on encrypted messenger apps like WhatsApp, Telegram, Signal, Threema, etc. All those things.<\/p>\n<p><strong>Dave: <\/strong>Yeah, this is a bit of a weird one, isn\u2019t it? This kind of story hasn\u2019t come up out of the blue. We\u2019ve seen this story pop up every now and again with law enforcement agencies and governments around the world, particularly America for a while, all wanting to kind of get in on breaking encrypted messaging, specifically, end-to-end encryption. And it kind of went silent for a bit after the \u2014 now, you have to correct me if I\u2019m wrong, but San Bernardino?<\/p>\n<p><strong>Jeff: <\/strong>California. That\u2019s the shooting where it was, you know, yeah, ties to terrorism and things like that.<\/p>\n<p><strong>Dave: <\/strong>Yeah, we had we had that and the whole Apple versus the FBI situation. But then the FBI got into the phone. And now this has kind of come back up. So, there\u2019s two stories. There\u2019s the Germany\u2019s mulling, basically trying to break end-to-end encryption. And the GCHQ over here in the UK, is not specifically talking about breaking encryption, but more I think their plan would be to add a ghost participant to conversations. So a bit like a group chat, you\u2019d have, you know, a silent participant, i.e., the government listening into specific messages, it wouldn\u2019t be all messages from what I understand this would be a bit like a wiretap or something specific like that. So you know, they, if they had a person of interest, they could basically wiretap a WhatsApp conversation. But it\u2019s troubling, isn\u2019t it? Because, you know, whatever way we go, we\u2019re talking about kind of weakening end-to-end encryption, and that is not a good thing.<\/p>\n<p><strong>Jeff: <\/strong>Now, I think these two stories are really interesting. And one thing to keep in mind, like you said, is, these are just thoughts, proposals, and conversations at this point. And the first thing that stands out to me is, you know, both sides are talking about this from a law enforcement perspective. And, you know, let\u2019s be honest here, law enforcement doesn\u2019t have the easiest time now, when it comes to things. So yeah, I get that point of them needing to have access into getting into some of these types of messages, whether it be an encrypted message, it be an e-mail, but again, with that said, there\u2019s laws to do this. And when you look at something, like you mentioned, bringing up wiretapping, you know, there\u2019s a set of laws that go in those for our countries. Now, when you bring something like private messages here, the part that I think is really bad here, the German story, talks about having networks pretty much break the encryption and store this in plain text.<\/p>\n<p><strong>Dave: <\/strong>Yeah, that\u2019s all levels of bad, isn\u2019t it?<\/p>\n<p><strong>Jeff: <\/strong>So I think when you\u2019re talking about this, and we\u2019ve talked about breaches before when we look at passwords, what\u2019s the first thing that everybody talks about? What was stored in plain text? And now, the problem with this one is, yes, we\u2019re talking about special types of services when it comes to Germany and potentially with law and the police. But the problem is, now that you start saying you\u2019re going to start storing this on plain text. Now, you\u2019re almost making these companies do something different than they normally would have done, you know, the encryption was built to do something that was super secure for the end users. And you know, what, as the articles rightly say, this is mostly used for people who are, you know, an activist groups, journalists, or people who need to be private for some things. And the counterargument is, this becomes a haven for terrorists to hide.<\/p>\n<p><strong>Dave: <\/strong>Yeah, yeah. That\u2019s the usual sort of narrative we hear from governments and law enforcement agencies. And I\u2019m not going to be the person to say that that doesn\u2019t happen. I\u2019m pretty sure that those sorts of individuals will use encrypted messaging. Of course, yeah, it\u2019s going to happen. I mean, they\u2019re not going to be using pigeons or anything stupid like that, you know, so they\u2019re \u2014<\/p>\n<p><strong>Jeff: <\/strong>\u2014 not going to send the Ravens.<\/p>\n<p><strong>Dave: <\/strong>Now, oh, well, it\u2019d be pretty cool if they did something like that. But no, it\u2019s probably just going to be, you know, throwaway mobile phones with throwaway SIM cards and, and, you know, something along those lines in an encrypted chat. So no pigeons or ravens, sadly.<\/p>\n<p><strong>Jeff:<\/strong> Dragons?<\/p>\n<p><strong>Dave:<\/strong> Yeah, that\u2019d be a cool one. But, you know, something needs to be done and I\u2019m not, I\u2019m not going to be that person to say that, you know, we should just have encryption for the sake of encryption, blah, blah, blah, blah. It\u2019s very, very important. But at the same time, I think it\u2019s that balancing act, isn\u2019t it? I think law enforcement are keen to do something about it. But at the moment, all they plan on doing is breaking encryption, which is just going to make it worse for everybody, not just, you know, solve a couple of problems. As you rightly say, storing stuff in plain text is a monumentally bad idea. Whatever we doing, and the other alternative, which is GCHQ\u2019s option of adding a ghost participant, whilst sounds better on paper \u2014<\/p>\n<p><strong>Jeff: <\/strong>\u2014 That\u2019s no. No, no, no, no, no, no, no, no, no, no, no, no, no, no, no. Because you know what this reminds me of? And I think the best example of this is putting somebody on the BCC on an e-mail, when you talk about something sensitive. Now, one of the things that bothers me about this, and I understand the law enforcement side, like I think one of the things to stress is Dave and I are not saying we\u2019re antipolice in any way, shape, or form here. But I think one of the things here is that\u2019s just kind of, I think, if you do that, that ghosting type of thing, and then the private people, you\u2019re losing all trust.<\/p>\n<p><strong>Dave: <\/strong>That is the main concern here, isn\u2019t it?<\/p>\n<p><strong>Jeff: <\/strong>Yeah, I think the big problem you have here is you trust the encryption on these apps. So I use Threema for private conversation. I use Signal for private conversations. WhatsApp, I use for a bunch of dumb things. But when you know that somebody has changed, you see the encryption key has changed for somebody. You think about what you\u2019re saying, and I think we go back to me sending something to the wrong number for our Swedish friends.<\/p>\n<p><strong>Dave: <\/strong>Yes, yes. The infamous message.<\/p>\n<p><strong>Jeff: <\/strong>It wasn\u2019t that bad. But when it comes down to it, and we start looking at some of these things. Like, these applications are based on trust. And what the government\u2019s here with the GCHQ is pretty much saying is trust us to do the right thing. Unfortunately, I think governments have proven in a lot of these areas, if there\u2019s a way to expand their surveillance programs, they\u2019re going to do it. Yeah. And it\u2019s just that whole area of power corrupts, and because you have the ability to do something, it just is there. And I think that\u2019s kind of one of the great back and forth to Apple, Google, WhatsApp and a number of other companies \u2014 47 to be exact \u2014 pushed back on this Ghost Protocol, saying that it not good. And they\u2019re urgent. Abandon it.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I think, you know, we you, as you rightly say, we both were not antipolice or anything, anti\u2013law enforcement agency or anything like that. But I think there\u2019s, this is where, you know, these groups need to come together, and thrash them out. Because one way, which is just hard to encrypt everything isn\u2019t going to help the police forces and the other way, which is just break encryption for everybody isn\u2019t going to help anybody. So there\u2019s, you know, is there a happy middle ground somewhere? You know, that\u2019s where, I mean, I don\u2019t think encryption is the only \u2014<\/p>\n<p><strong>Jeff: \u2014 <\/strong>problem with this is everybody knows Big Brother\u2019s watching, or, or whatever you want to call it for your country. In the US, we call it Big Brother. But at end of the day the problem is that the end user, and I think this is one of those things, both of these stories, a German one and the UK, one, they\u2019re going to win a lot of praise, when it comes to the media. And when it comes to public opinion, because everything is so easy to jump on. You look at Brexit, you look at, you know, Trump becoming president, both of those are based upon a human fear and people coming on something. So you\u2019re saying, with this one, you\u2019re playing, hey, we want to break this encryption, because this stops the criminals. That\u2019s the talking point. That\u2019s the PR point that\u2019s going to go across with this one. And these companies are evil, look at Facebook, they\u2019re evil, they own WhatsApp, they\u2019re evil. They want to make sure that they can protect criminals. Well, in the sense that that\u2019s good for a media in a in a big measuring stick type of thing, if you want to pull it out and measure it. But when it comes to end user, the people who are forgetting this was people who are raising pitch was it? Yeah, yeah. Yeah. Yeah, get the big companies. But then it comes to them. They\u2019re like, yeah, they\u2019re good for crime. But then you start thinking about it, and you\u2019re like, Oh, crap, I just sent a wingwang picture to my wife. Wait, the government can see that.<\/p>\n<p><strong>Dave: <\/strong>There\u2019s a discussion that needs to be had. And I think it\u2019s, you know, definitely something that GCHQ and the law-enforcement agencies around the world need to have with \u2014 and I\u2019m sure they are having it. I\u2019m not sure I\u2019m not. I\u2019m not saying that they\u2019re not having these conversations. But you know, there is something that needs to be done, I think, but as you right, quite rightly pointed out, you know, encryption is either some things either encrypted or it\u2019s not this is not like this soft encryption or things like that. So, shall we jump over to the next few stories? This one is a weird one, isn\u2019t it? It\u2019s over on Kaspersky blog and is talking about soccer clubs, or, you know, football, as we call it in the UK, soccer club being defrauded. And it\u2019s an interesting read, actually. But it all boils down to that all favorite of cybercriminals, which is social engineering, which, you know, is as old as the hills, isn\u2019t it?<\/p>\n<p><strong>Jeff: <\/strong>The story goes back to something we talked about a few weeks ago in the podcast with the family who lost their money on the real-estate transaction.<\/p>\n<p><strong>Dave: <\/strong>Yeah, it\u2019s exactly the same scenario.<\/p>\n<p><strong>Jeff: <\/strong>Except this one\u2019s a boat-ton more money.<\/p>\n<p><strong>Dave: <\/strong>Yeah, half a million euros.<\/p>\n<p><strong>Jeff: <\/strong>That\u2019s a lot of money. I think looking at this one. This just goes to show how people need to be vigilant. Even in areas you don\u2019t think about it. Like we talked about real estate. This one\u2019s talking about transferring of a player and I\u2019m not gonna pretend I know anything about football. I\u2019m not gonna lie here.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I\u2019m basically in the same boat. As you, Jeff. I\u2019m not much of a football fan, to be honest. But the story is, these aren\u2019t actually large numbers. As far as I understand in football, you know, half a million is actually peanuts when you consider the top stars.<\/p>\n<p><strong>Jeff: <\/strong>Yeah, I know, some of the other ones have been big. But I think when you look at this one, that\u2019s a lot of money to be transferred, and the story talks about how these two teams transfer players they shared, like back and forth, and then all of a sudden, somebody don\u2019t get their money. And it\u2019s like, yo, you stole this guy from me, you didn\u2019t send me my money. Then they go back and forth. And you start to realize this half a million euros. Just went to a bank.<\/p>\n<p><strong>Dave: <\/strong>And again, as you rightly say, the story we talked about the homeowner couple of years ago, it just turned out that, you know, somebody had not read the bank account details and not double-checked. And, yeah, they\u2019ve been a bit of social engineering and someone who broke into an e-mail account and, and just changed a couple of bits on the bank account details. And, you know, for a small bit of work, they managed to get half a million euros. Sadly, at the moment, you know, the investigation is still ongoing. But I think if we if we have one PSA for today is if you\u2019re going to be transferring any sort of money over the internet or over the phone or anything else. Yeah, yeah, check those details. Make sure double check everything in order. And you are sending it to the right person.<\/p>\n<p><strong>Jeff: <\/strong>You know what, this just brings up? This is our \u201cyou had one job\u201d moment.<\/p>\n<p><strong>Dave: <\/strong>I\u2019m sure I said it last time on the other podcast, but half a million euros, wouldn\u2019t you? Wouldn\u2019t you check, Jeff? I mean, I personally if I was sending that sort of money.<\/p>\n<p><strong>Jeff: <\/strong>Listen, I haven\u2019t I have never touched that much money in my life. I\u2019m not gonna lie. But I\u2019m thinking somebody might be in some trouble at work. Yeah, that\u2019s a lot. Yes. Somebody might be getting. Yeah. Now, this next story that we\u2019re talking about comes over to a place that\u2019s used to be near and dear to me, because it talks about Checkers restaurants. Now for those of you outside of the US, Checkers is a cheap fast food restaurant that\u2019s delicious, but really, really not good for you. And can cause a heart attack probably. But 102 locations in the US were found with POS malware. Yeah, I know.<\/p>\n<p><strong>Dave: <\/strong>For anybody who doesn\u2019t know what POS malware is, is basically point-of-sale. So you know, those swipe card readers, things like that. Cybercriminals able to put malware onto those devices and which, over in the States you guys still use a lot of swiping, so this specific piece of malware read the magnetic card information and basically stole that information. From what I can understand, though, this is the weird thing. The breach actually happened quite a while ago back in 2015. But he only really got going in 2018. And in this year, in 2019, they find out so it\u2019s a bit odd that it\u2019s taken so long firstly, for Checkers to find out, but also for that sort of malware to kind of sit not doing a great deal because apparently this data hasn\u2019t been used. So not that I\u2019m saying that you should rest easy. If you have been using Checkers and you know you had to swipe the magnetic card, definitely get your credit card checked, your debit card checked, definitely. On a side note that their food looks nice.<\/p>\n<p><strong>Jeff: <\/strong>It\u2019s nice, but at the same time, they put it this way you\u2019re paying like \u2014 when I used to go there, and I was very poor at the time, you would be able to get like two cheeseburgers, some fries, and a soda for like five US dollars.<\/p>\n<p><strong>Dave: <\/strong>That\u2019s like 3 pound 50 or something \u2014 that\u2019s good value. That is, it\u2019s bad food but good value.<\/p>\n<p><strong>Jeff: <\/strong>Listen, listen, my inner fat kid. Still, it poured one reading the story that I think we we look at this. I think this is what I think is not surprising about this is, this seems to be, according to the researchers, a similar group, who went after other accounts in the past, like we\u2019ve seen a bunch, whether it\u2019s Target or Chilis, or Applebee\u2019s, those places that had them had these types of POS attacks on them. You\u2019re looking at something where it just happens. And it just takes a while to find out because you\u2019re not stealing a lot of money. It\u2019s grifting stuff off of you know, different types of accounts. So yeah, I\u2019m not surprised this one laid in the weeds for a bit, a little bit I am but for the most part, not really. Because you know, you\u2019ve seen POS stuff dropped for a while. But again, if you\u2019ve been to Checkers, and your fact you like me, check your stuff.<\/p>\n<p><strong>Dave: <\/strong>Definitely. And so I think we\u2019ve got a little bit of time left for this last story. Yeah, this one got to me a bit. This one\u2019s from nine to five Google. And it\u2019s a little bit frustrating. Because Google have said that they\u2019re going to restrict the use of ad blockers inside Chrome. Now, from a business point of view, it makes complete sense. Google rely on ads. But from an end user point of view, it kind of sucks. Because ads are becoming more and more pervasive, these days, I\u2019m pretty sure you\u2019ll agree, Jeff. So for them to kind of restrict how Adblock and uBlock and Ghostery and things like that work isn\u2019t going to go down well with like the majority of users who use Chrome, right?<\/p>\n<p><strong>Jeff: <\/strong>Yeah, I think when you look about this, and there\u2019s certain changes that come into play with this one, it definitely leaves on a sour note for a lot of people I know that I saw a few people posting, well, I\u2019m moving the Firefox. And these were some notable people, you know, especially a few types of the EFF posting some things out there. And you\u2019re like, you know what, yeah, you know, while you know, this is a business model for areas. I also think there\u2019s an underlying possible security thing that they\u2019re trying to do here with limiting the number of access to people have the things but again, it sucks. They\u2019ve been messing with ad blockers for a little bit lately, where some stuff have gotten like, you know, some of the ones just get devalued just a little bit, if you will. So their power has been restricted. Yeah. Take back that old Spider Man With great power comes great responsibility. I don\u2019t see Google changing because it\u2019s where they make their money on. And if you\u2019re if you\u2019re stripping out the cookies for all the people are blocking display ads from showing eventually, it\u2019s going to hurt some money or hurt partnerships. And as you said, the enterprise level is where the money\u2019s at for them.<\/p>\n<p><strong>Dave: <\/strong>Yeah, yeah. And, you know, if you don\u2019t like the change, Firefox is calling I Firefox is my main browser. I love it. I moved over last year after being on Chrome for quite a while. So and you know, Firefox is not going to get rid of ad blockers anytime soon. So there\u2019s your alternative.<\/p>\n<p><strong>Jeff: <\/strong>See, I still like Chrome. It\u2019s just easier for me. It\u2019s just I\u2019ve been using it for over 10 years now. Get off my lawn.<\/p>\n<p><strong>Dave: <\/strong>Oh, no, it wasn\u2019t gonna say anything. But yeah. That makes you sound old.<\/p>\n<p><strong>Jeff: <\/strong>Well, it does. But I think at the same time, it\u2019s something to watch as it goes through. Also, yeah, I don\u2019t even look at half the ads that are on there. And I also block cookies from half the places that come through. So there\u2019s small small wins, small Punic victories in this big behemoth that is make money off the end user. Yep. All right.<\/p>\n<p>Well, there you have it, guys. This week\u2019s edition of the Kaspersky Lab Transatlantic Cable podcast has come to an end. If you like what you heard, please subscribe or leave us a five-star review. And if you have friends who want to catch up on infosec for the week, please share the link with them because sharing is caring, everybody. So, we\u2019ll see you guys again next week. Same cybertime, same cyberchannel, and have a great weekend.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dave and Jeff discuss a number of issues ranging from backdooring encrypted chats to POS malware and more.<\/p>\n","protected":false},"author":636,"featured_media":13406,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[1520,16,261,22,577,444,2107,579,520],"class_list":{"0":"post-13405","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-backdoors","10":"tag-chrome","11":"tag-encryption","12":"tag-google","13":"tag-messengers","14":"tag-podcast","15":"tag-signal","16":"tag-threema","17":"tag-whatsapp"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-95\/13405\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-95\/15881\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-95\/17787\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-95\/15931\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-95\/27213\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-95\/22712\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-95\/22660\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13405"}],"version-history":[{"count":5,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13405\/revisions"}],"predecessor-version":[{"id":14420,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13405\/revisions\/14420"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13406"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}