{"id":13487,"date":"2019-06-13T12:03:16","date_gmt":"2019-06-13T16:03:16","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-96\/13487\/"},"modified":"2019-11-15T15:22:14","modified_gmt":"2019-11-15T11:22:14","slug":"transatlantic-cable-podcast-96","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-96\/13487\/","title":{"rendered":"Transatlantic Cable podcast, episode 96"},"content":{"rendered":"<p>For the 96th edition of the Kaspersky <em>Transatlantic Cable <\/em>podcast, Dave and I jump all over the place with stories ranging from pizza to hacked US Customs and Border Patrol photos.<\/p>\n<p>We kick things off with an interesting tale from the Brofist Army. Yep, we are talking PewDiePie and a recent advertisement he did with Ukrainian social media Nimses. While there is some concern and fake news surrounding the app and ad, we tried to cut to the meat and potatoes of the tale and the app itself.<\/p>\n<p>From there, we bid farewell to Facebook\u2019s Graph Search, and after that, we discuss the latest snafu from US Customs and Border Control. Seems they have some trouble with storing images of license plates and photos of people entering the States. For the next-to-last story, we discuss an upcoming paid version of Firefox, and to close things out, we discuss a tale of a lone guy who got his pizza account hacked and well, no pizza for him.<\/p>\n<p>If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For the full text of the stories, please visit the links below:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.dexerto.com\/entertainment\/pewdiepie-hits-back-accusations-promoted-scam-fans-701346\" rel=\"noopener noreferrer nofollow\">PewDiePie hits back at accusations that he promoted a \u201cscam\u201d to fans<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/nimses-insecurity\/17114\/\" rel=\"noopener noreferrer nofollow\">Why Nimses isn\u2019t safe (so far)<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.vice.com\/en_us\/article\/zmpgmx\/facebook-stops-graph-search\" rel=\"noopener noreferrer nofollow\">Facebook quietly changes search tool used by investigators, abused by companies<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.washingtonpost.com\/technology\/2019\/06\/10\/us-customs-border-protection-says-photos-travelers-into-out-country-were-recently-taken-data-breach\/?utm_term=.2f71753ca9f4\" rel=\"noopener noreferrer nofollow\">U.S. Customs and Border Protection says photos of travelers were taken in a data breach<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/threatpost.com\/mozilla-confirms-premium-firefox-browser-with-security-features\/145542\/\" rel=\"noopener noreferrer nofollow\">Mozilla confirms premium Firefox browser with security features<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.moneysavingexpert.com\/news\/2019\/06\/pizza-hut-hackers-used-customer-reward-points-to-order-free-pizz\/\" rel=\"noopener noreferrer nofollow\">Pizza Hut loyalty scheme hacker steals customers\u2019 free pizza<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/10139865\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/me-en.kaspersky.com\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p><strong>Jeff:<\/strong> This first story is a little bit weird. You know last time we talked about Nimses was back in 2018 on [Kaspersky] Daily after we updated a post from 2017. So what\u2019s going on with PewDiePie?<\/p>\n<p><strong>Dave:<\/strong> Yeah, this one. It\u2019s been rumbling along in the background for a while. And I don\u2019t know, just off the cuff here as well. I don\u2019t know if it\u2019s Nemsis or Nimses. I\u2019m just going to go with Nimses. The basic premise of the story is that PewDiePie did a sponsored ad or sponsored section on one of his videos promoting Nimses. And there was basically a bit of an online backlash against it because there is a little bit of, shall we say, concern around Nimses at the moment. And some people are thinking that, you know, it\u2019s sort of private privacy just stripped bare. Sorry, stripping your privacy on a social media network that kind of gives you cryptocurrency, for want of a better word, but it\u2019s kind of a sketchy app. A lot of people are saying that and so yeah, a lot of people kind of kicked up a bit of a fuss because PewDiePie is a 90-million-plus subscriber superstar on YouTube, and he is promoting what a lot of people see as a dodgy app. It\u2019s a bit of a strange one. I don\u2019t think this is quite finished yet.<\/p>\n<p><strong>Jeff:<\/strong> I think the thing for those of you that don\u2019t know what the app is, it\u2019s pretty much a social network meets cryptocurrency, and you\u2019re getting virtual currency in exchange for time you spend online. So, take that for what it is. And I think if you look at it, any social network, you\u2019re whenever you\u2019re trading privacy for something, you better hope that there\u2019s something of value in return. And you know, for me looking at it, this is more just something where, you know, the backlash unto itself is kind of funny, because these are the same people who are commenting on YouTube and vlogging. Then again, sharing on their Facebook and their Twitter\u2019s you know, what the app asks for is something that looks like similar things for most app authorizations, you know, that ask for too much. But the thing for me is, I just find it funny that people get up in arms on something after it\u2019s talked on via YouTube celebrity versus the fact that its privacy that\u2019s being traded as currency.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I think one of the things here is a lot of PewDiePie\u2019s, followers and fans, and they call themselves the Bro army. And they\u2019re really protective of PewDiePie. So for someone to kind of come out and criticize them in that he did they kind of rally around him a little bit. And I think that\u2019s where a lot of this hysteria has come from, you know, there\u2019s a lot of counteraccusations a lot of the Bro army\u2019s up in arms saying that, you know, he\u2019s, what he did is fine. And other people are saying no, we shouldn\u2019t have done it. He did acknowledge it in a in a later video saying that he\u2019s going to try and be a little bit more responsible with his sponsorships. But you know, if you\u2019re a, I suppose a reasonable viewer of PewDiePie \u2014<\/p>\n<p><strong>Jeff:<\/strong> \u2014 define reasonable.<\/p>\n<p><strong>Dave:<\/strong> Yeah, I was trying to word correctly. There are still questions about the app. And a lot of people are a little bit concerned about it, because it is basically stripping away your privacy into in exchange for \u2014 I wouldn\u2019t say currency or money, because I don\u2019t think you can actually spend this anywhere, can you, other than a handful of burger joints? So to call it currency is stretching it a little bit.<\/p>\n<p><strong>Jeff:<\/strong> And I\u2019m reading through the article on Kaspersky Daily, catching up on it. And, you know, it\u2019s just one of those things, you\u2019re trading everything for it. It\u2019s got the usual sketchy stuff on it, like most apps do, like the semiporn pictures and talking about services. So for a bigger background, I\u2019d say check out the KD article, we\u2019re going to link in the blog.<\/p>\n<p><strong>Dave:<\/strong> Well worth reading.<\/p>\n<p><strong>Jeff:<\/strong> And I think it\u2019s just one of those things. If you\u2019re going to use this app, it\u2019s another social network. So just be cautious and aware of what you are trading for using a free app.<\/p>\n<p><strong>Dave:<\/strong> So, speaking of free apps, and privacy and concern, I\u2019m gonna say Facebook, never off podcast, it feels anyway. So yeah, this one\u2019s over from Vice.com. And it\u2019s a good one, actually. So Facebook is quietly changing one of their advanced search tools called Facebook graph. I think, from what I gather from the story that basically just closing Facebook graph, or restricting access to it.<\/p>\n<p><strong>Jeff:<\/strong> I think this story is really interesting, because I see both ways of this. They\u2019re talking about, you know, investigators, and journalists who use this to kind of harvest information for stories to see if stuff\u2019s being covered up by certain governments or just crimes against humanity happening, which are very important things to be investigating. But companies also abused us. Let\u2019s be honest here, like with graph search, you can pretty much find somebody based upon certain search string queries if you do it the right way.<\/p>\n<p><strong>Dave:<\/strong> And for those of you who don\u2019t know what Facebook graph is, it is basically just an advanced search tool that Facebook have. And in the article here, or I\u2019ll just quote the article, which kind of gives you a good example of what is possible using Facebook graph. So \u201cFacebook quietly made changes to a set of advanced features that previously allowed users to search the social network in powerful ways, such as finding all posts on Facebook by keyword, within a certain date range, all of the people who like a certain Facebook page and live in a particular city, or places visited by two specific people.\u201d<\/p>\n<p><strong>Jeff:<\/strong> Oh, it was a fantastic tool.<\/p>\n<p><strong>Dave:<\/strong> I never used it personally. But you know, that sort of power in a search function, I mean, you don\u2019t have to be Albert Einstein to figure out that that can be abused. And Facebook, going off the back of their whole new privacy stance, and sort of focusing on user privacy, I still find that odd to say, Facebook, slightly more focused in on user privacy. That\u2019s a really strange sentence for me. Yeah, Facebook has shut it down. And, you know, going back to what you said, I see both sides of the coin here, because a lot of journalists were able to use this, as, as you rightly say, for human rights abuses, and things like that. And if something\u2019s getting covered up on Facebook, via government, but, you know, the flip side is, this has been abused quite badly by a lot of companies, and also, you know, third party malicious actors who want to sort of create databases of people in certain countries. So, you know, I suppose Facebook\u2019s in, in between a rock and a hard place a little bit here.<\/p>\n<p><strong>Jeff:<\/strong> Yeah, like, I think with great power comes great responsibility. And, you know, we\u2019re not talking about Peter Parker here, but we\u2019re talking about Mark Zuckerberg and company. On one hand, you\u2019ve got, as we say, this thing is great from a, you know, open intelligence standpoint for people to be able to gather data, but even some of the companies talking about how they\u2019ve lost access to their tool, talking about how the tools have been abused. And it\u2019s kind of like that old analogy of having your cake and eat it too. I don\u2019t think it\u2019s possible to keep this open and be able for them to keep this and stick to their \u201cHey, we like privacy stuff.\u201d<\/p>\n<p><strong>Dave:<\/strong> The final nail in the coffin, I think, when they announced the changes to privacy, and how they will double down on user privacy. I think that was the end of graph search in that presentation.<\/p>\n<p><strong>Jeff:<\/strong> Happy trails to you, graph search. I really enjoyed you while you lasted. It had some really funny stuff that you could do with it. Like, if you wanted to see people who like Nickelback in a certain area not named Canada, it was awesome. You didn\u2019t want to know those people? Oh, I used to do that one and shame people.<\/p>\n<p><strong>Dave:<\/strong> There are people out there who like Nickelback, sadly.<\/p>\n<p><strong>Jeff:<\/strong> I don\u2019t know any of them. But all right, so jumping along, this one kind of comes back to the US. And it\u2019s kind of a pretty big snafu by my government, isn\u2019t it, Dave?<\/p>\n<p><strong>Dave:<\/strong> Yeah, we were joking about this one. So this is on the <em>Washington Post<\/em>, and it\u2019s talking about how US Customs and Border Protection is saying photos of travelers were taken during a recent data breach. Now there\u2019s a lot of gray area in the story. They don\u2019t know who the hackers were, they don\u2019t know if these photos are being sold on the dark net or anything like that. But what we do know is that these photos, and I think it\u2019s a faces and license plates were taken on a land border. Now, I mean, they didn\u2019t specify which land border but I\u2019m no genius. I\u2019m no genius, and I\u2019m not great at geography, but I\u2019m pretty sure that you guys in the States only have two land borders, right? You know, you have to do, you don\u2019t have to be Einstein to figure out that it\u2019s one of the two. And I think most people are going to figure this one out. But the story itself is troubling, because US Customs and Border Protection are looking to use this information to make sure people aren\u2019t overstaying their welcome in the States and things like that, which is, you know, it\u2019s a border issue. But for this information to get leaked is troubling, right?<\/p>\n<p><strong>Jeff:<\/strong> Not just the leaking, but they also named this thing \u2014 they don\u2019t want to name the vendor. We\u2019re not going to name them here. But they also put the vendor name in the name of the word document they sent over to the WaPo. So this is I think, here is a bigger issue. And I think this is for countries in general. Like I think, how many times are you photographed when you come into a country?<\/p>\n<p><strong>Dave:<\/strong> If you\u2019re in Europe, or especially in London \u2026<\/p>\n<p><strong>Jeff:<\/strong> Yeah, a lot. But I think even when you come through, like I know, I\u2019ve got Global Entry, and we were joking about this before, we come through and for the US what that means for those of you in the UK is you come in, it scans your face, scans your fingerprints, you answer the little questions like you used to do on a piece of paper, boom, it prints out a receipt, you go hand it to a guy, if they\u2019ve got questions, they ask you questions. Other than that, you go wait, you go walk through, and if you haven\u2019t checked luggage, you can walk right out the airport. Yeah. Unfortunately, with checked luggage, it usually takes about 20 minutes to get out.<\/p>\n<p><strong>Dave:<\/strong> Yeah, yeah, the thing that kind of baffles me and you would be better placed to add to this, Jeff, but over in Europe, at least, when I\u2019ve traveled, we have e-gates to be honest, e-gates are a great way of saving time, because you just you just present your passport to the electronic gate. They scan you, take photo of you, and you walk through. It takes, I don\u2019t know, a minute, maybe unless it doesn\u2019t work, which happens a lot. But I was watching the video on the <em>Washington Post<\/em> article, and the video kind of alludes to the fact that these things are quite new in the States.<\/p>\n<p><strong>Jeff:<\/strong> Yeah, we don\u2019t have them like you guys do. So the machines themselves, you know, we\u2019ve moved to more of a digital system. But you still have to see an agent for the most part. You know, I know it\u2019s different when you\u2019re in the Eurozone and you can just pass in and out, you know, with the passports if you\u2019re in the region. I can\u2019t, still, when I go through Europe, so I still have to go and see an agent. But I can tell you I used the e-gates in Abu Dhabi, Sint Maarten. So where else was it? And also, I think in Dubai, to like to leave the country? Yeah. And it is so much faster. And I think, I think it\u2019s also in Europe, it probably helps with a lot of the frickin tight turnarounds, that there are some airports.<\/p>\n<p><strong>Dave:<\/strong> Yeah, it is immensely useful. I remember having a flight flying back from Moscow, and I had to go through Amsterdam. And it was a tight turnaround. The best of times were delayed in Moscow. So coming into Amsterdam, we have 30 minutes, and we had to go through security again. Yeah, and there was a huge queue at Border Patrol, but the e-security gates, you just kind of breezes through really, really quick. And I actually get my flight. So it was it was great. However, the video does go on to say that, you know, what what\u2019s the trade-off? This this info, these photos are stored somewhere wants to trade off in terms of privacy? That\u2019s a good question. I don\u2019t think we\u2019ve got enough time to answer it.<\/p>\n<p><strong>Jeff:<\/strong> I think it\u2019s I think it\u2019s also a matter of how are we protecting these photos? And I think it\u2019s a bigger question for all of the places you go through because they\u2019re storing your passport has got so much information on it, that you\u2019re kind of just wondering where it\u2019s going to end up at. And I think there\u2019s gonna be more to this story. And you know, their Congress is going to be grilling the agency in the next month or so. It\u2019ll be interesting to see what comes with it.<\/p>\n<p><strong>Dave:<\/strong> Yeah, definitely. Um, I\u2019m gonna have to follow that story. I think just see what happens. Shall we move on to the next couple of stories? This one is an interesting one, actually, because we\u2019ve not seen sort of paid browsers since Netscape days \u2014 before that, probably. So to see Firefox and Mozilla try a paid Firefox is an interesting one. Because we, you know, like I say, Chrome is free agent and Internet Explorer throne with Windows Safari, as we Windows and as well, as sorry, so far as with iOS and Mac OS. And<\/p>\n<p><strong>Jeff:<\/strong> I think this will be interesting. I think it you know, they haven\u2019t disclosed the pricing yet, but, you know, some of the features they talked about, including like a VPN to the browser, could be really good.<\/p>\n<p><strong>Dave:<\/strong> I think pricing wise. I, I\u2019ve heard rumors around $6.99, so 7 bucks, $7 a month, which \u2014 it depends what you get with it, I think. There\u2019s rumors going around that there\u2019s going to be a VPN, and possibly cloud storage and a password manager. But I\u2019ve had kind of mixes of, you know, one, two, or three of these. So, I mean, if you\u2019ve got all three plus additional privacy protection, and privacy security, as well, as you know, the browser itself, is it worth it? Possibly, and VPNs are cheap these days. I think you can get a VPN as well, you can get them free, but they\u2019re generally not a good idea. But you can get VPNs for a couple dollars a month.<\/p>\n<p><strong>Jeff:<\/strong> Right? I think it\u2019s I think it\u2019s a pretty cool feature, especially given a lot of the backlash around Chrome lately, and people moving to Firefox for more privacy. This is gonna be an interesting story to keep an eye on. Because, you know, I know you love Firefox. I\u2019m just too lazy to change from Chrome. That\u2019s really what it comes down to. But yeah, so I think and this will be another story just like that Border Patrol things that keep an eye on. But Dave, my favorite story of the week. You\u2019ve been waiting. It\u2019s pizza time.<\/p>\n<p><strong>Dave:<\/strong> Yeah, this one\u2019s, um \u2014 I\u2019m trying to think of pizza puns, but they\u2019ve all just gone out of my head. Or cheese puns or anything.<\/p>\n<p><strong>Jeff:<\/strong> It\u2019s floppy. It\u2019s got a little flop on.<\/p>\n<p><strong>Dave:<\/strong> So this is a hilarious story. It\u2019s on moneysavingexpert.com, talking about how Pizza Hut loyalty scheme so I don\u2019t know. You buy pizzas and you accumulate points and you get points towards free stuff, free pizzas, etc. Pizza Hut loyalty scheme, hackers steal customers free pizza. And it is exactly what it says on the tin. You know, someone compromised some user\u2019s Pizza Hut accounts, logged into their accounts, and ordered free pizza. My favorite line in this entire article is: With one money-saving finding, his points were used to order a medium BBQ meat pizza.<\/p>\n<p><strong>Jeff:<\/strong> I think the best part about this \u2014 and there\u2019s nothing funny about hacking \u2014 but this one kind of is, so he tracks where the pizza delivered to. And the best part is this one customer so when we saw this, this this link when I shared it with you. I saw it on Twitter, and it said \u201cPizza Hut hacked,\u201d and I was like, Oh, great. This could be an interesting story for the podcast. And it\u2019s one person. And here\u2019s the best part of it. So my favorite line is I also saw my Pizza Hut rewards, which is how they cut their pizza. I phone Jake\u2019s number and checked, and they exist and have a WhatsApp not brave enough to do more than hang up. Yeah,<\/p>\n<p><strong>Dave:<\/strong> Jason is the guy who ordered the hack me account presumably him and got the free pizza.<\/p>\n<p><strong>Jeff:<\/strong> Yeah, some friends told me to ask if they enjoyed their pizza.<\/p>\n<p><strong>Dave:<\/strong> I mean, you know, when you shared this link with me, I thought I\u2019ll go you know another day breach story. Yeah, we talked about them every week. And I thought okay, you know, I\u2019ll read this story. And then it just got better and better as I read this story, as far as I can understand, according to the story, literally what one piece has been ordered. This whole data breach. Jake has ordered one, medium BBQ meat cheese pizza.<\/p>\n<p><strong>Jeff:<\/strong> Jake, Jake, all I gotta say is hopefully it was worth it. Because you\u2019re probably good for pizza worst. And worst case scenario, your Mama\u2019s gonna yell at ya.<\/p>\n<p><strong>Dave:<\/strong> This I can\u2019t I can\u2019t help but laugh every time I read this story isn\u2019t Yeah, it\u2019s sort of I think the article kind of makes it out to be like, Oh, you know, it\u2019s really serious. This pizza got stolen. And it is serious You know, he said data breach in in technical terms, but if it makes me laugh is a piece of but<\/p>\n<p><strong>Jeff:<\/strong> but I think this is the matching this PR person is aware of this incident and we\u2019re speaking with the customer.<\/p>\n<p><strong>Dave:<\/strong> Yeah, the individual customer. Poor guy lost his points. Hopefully he gets those points back.<\/p>\n<p><strong>Jeff:<\/strong> Hey, listen, if not, you know, just start saving for a pizza. So with that said, I\u2019m hungry for pizza. Even though it\u2019s super early in the morning. We\u2019re wrapping up this recording, but this week\u2019s edition of the Kaspersky Transatlantic Cable podcast has come to a close. If you like what you heard, please subscribe below. Leave us a comment or give us a good rating. If you think it\u2019s a good podcast for some of your friends, please share it with them because sharing is caring. And if you think there\u2019s a story we should cover hit us up at Kaspersky on Twitter or Facebook. And we\u2019ll try to get those stories into a future podcast. And again, thank you all for checking us out and thanks for the comments. Have a great day.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dave and Jeff discuss Nimses, Facebook shutting down Graph Search, a paid version of Firefox, and more.<\/p>\n","protected":false},"author":636,"featured_media":13488,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1486],"tags":[20,21,2110,2111,444],"class_list":{"0":"post-13487","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-facebook","10":"tag-firefox","11":"tag-nimses","12":"tag-pewdiepie","13":"tag-podcast"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-96\/13487\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-96\/15979\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-96\/17874\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-96\/16013\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-96\/27295\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-96\/22797\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-96\/22742\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=13487"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13487\/revisions"}],"predecessor-version":[{"id":14414,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/13487\/revisions\/14414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/13488"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=13487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=13487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=13487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}