{"id":22822,"date":"2019-06-26T13:06:27","date_gmt":"2019-06-26T11:06:27","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-98\/22822\/"},"modified":"2019-11-15T13:24:34","modified_gmt":"2019-11-15T11:24:34","slug":"transatlantic-cable-podcast-98","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-98\/22822\/","title":{"rendered":"Transatlantic Cable podcast, episode 98"},"content":{"rendered":"<p>For the 98th edition of the Kaspersky <em>Transatlantic Cable <\/em>podcast, Dave and I jump between the consumer and public sectors \u2014 from consumer cybersecurity to government-focused ransomware attacks.<\/p>\n<p>To start things off, we dive into the world of music \u2014 for the second straight week. In this story, Genius.com says it has evidence of Google scraping its site for song lyrics. The devil\u2019s in the (Morse code) details. After that, we look at a story about Instagram testing out new ways for users to recover their accounts following a hack.<\/p>\n<p>The third story has us looking at the Internet of Things and Samsung\u2019s message for users to run antivirus scans of their smart TVs. To wrap up the episode, we head to Florida, where a local municipality decided to pay the ransom after falling victim to ransomware.<\/p>\n<p>If you enjoy the podcast, consider subscribing and sharing with your friends who need more regular updates on security. For the full text of the stories, please visit the links below:<\/p>\n<ul>\n<li><a target=\"_blank\" href=\"https:\/\/www.businessinsider.com\/genius-accuses-google-of-copying-its-lyrics-and-diverting-traffic-2019-6\" rel=\"noopener noreferrer nofollow\">Genius says it caught Google red handed copying its lyrics and robbing them of valuable search traffic<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.vice.com\/en_us\/article\/j5wkap\/instagram-tests-new-methods-how-to-recover-hacked-account\" rel=\"noopener noreferrer nofollow\">Instagram tests new methods to recover hacked accounts<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.bbc.com\/news\/technology-48664251\" rel=\"noopener noreferrer nofollow\">Samsung TVs should be regularly virus-checked, the company says<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/tizen-40-bugs\/14525\/\" rel=\"noopener noreferrer nofollow\">Tizen OS: 40 new vulnerabilities<\/a><\/li>\n<li><a target=\"_blank\" href=\"https:\/\/www.usatoday.com\/story\/news\/nation\/2019\/06\/19\/riviera-beach-florida-pays-hackers-600-000-ransom-save-records\/1505178001\/\" rel=\"noopener noreferrer nofollow\">Florida city pays hackers $600,000 in ransom to save computer records<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/10296899\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/00a88e\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n<p><strong>Jeff: <\/strong>Today I think today we\u2019re going to start off in an era we haven\u2019t talked about, on this podcast much outside of the Radiohead story recently is, we\u2019re going to the world of music today for something with Google, and website Genius.<\/p>\n<p><strong>Dave: <\/strong>I love this story. It\u2019s still in a bit of legal quandary. But yeah, the story\u2019s over from <em>Business Insider<\/em>, and he\u2019s talking about how genius.com apparently, I say apparently, because this is still going through the legal works, apparently called Google red-handed copying lyrics, and basically just robbing them of valuable search traffic. So, for anybody who doesn\u2019t know, I think Google in 2017, maybe 2016 started introducing like these little hot boxes at the top of search. So if you search for something, which has a short answer, or could be kind of truncated down to a short answer, Google, were able to autofill this little box at the top, and you see it for all sorts of things. Google started doing it for lyrics to specific songs. Now, the problem here is that genius.com is a site where artists upload their lyrics, so you can you know, check lyrics on particular songs. And the search bar, little hot box at the top means that you don\u2019t have to go through to a website, Google display that information for you, Genius on losing traffic to their website, because Google was autofilling these responses for them. And the story goes that Genius were sure that they were basically copying, copy-pasting from their site. So they came up with a little plan to try and catch Google out on this. And it\u2019s a fascinating plan, including some Morse code. I don\u2019t want to spoil it because it\u2019s actually quite a fascinating story. But they it was is basically all around fonts and things like that, wasn\u2019t it? And they managed to prove, I\u2019ll use air quotes because none of us has been confirmed yet prove that Google was stealing genius.com\u2019s lyrics than their artists have loaded. It gets more complicated, but that I mean, that\u2019s the general gist of the story so far.<\/p>\n<p><strong>Jeff: <\/strong>I think this whole story is really interesting. For a number of levels. It\u2019s like number one, anything you do with the search boxes, you realize Google\u2019s taking content from a site, whether it\u2019s Wikipedia, it\u2019s a how-to site, or even just a an overview site of what you\u2019re looking for. So on one level, you\u2019re going to get a short, abridged version. But with lyrics, you know, let\u2019s be honest, your songs are only usually two to three minutes at a time, so you\u2019re not going to have much text. So I see the I see the gripe that Genius has here. And I think this plan is not play spoilers. It\u2019s really interesting what they did with the apostrophes here. Yeah, what I find interesting here, Dave, is the closing paragraph of the article that states Genius, of course, does not own the copyright to the lyrics it publishes. The musicians do. That means it may have tough luck taking its complaints and evidence to court to hold Google or its partners accountable. Now, why I find this interesting is, you know, Google has partnerships with a lot of places to get data and put pull it into sources. It\u2019s a lot of he said, she said, of where was this data taken from? And I think, at the same time, you know, there is a compelling story with where the stuff had been scraped from, but, again, it comes down to who owns the lyrics, which isn\u2019t Genius.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I think I think there\u2019s kind of a wider question here as well, that, which you touched on, you know, Google are able to stop people from going to specific sites, if they also fill these hot boxes. And I\u2019m sure that there\u2019s a lot of companies out there that have a real beef with Google about this, not just genius.cam, because, you know, there\u2019s other things like, I was just thinking, as you were talking about a like, another one, which is ripe for complaint is my famous quotes, you know, you might be trying to think of someone who has done a recent quote, or something like that, and you search, I don\u2019t know, Bob Marley quote. And if you do that, Google autofills in a hot box, you know, the most popular quotes. And there are actually quote sites, which I would imagine are losing traffic, because people will see this on Google and never go over to specific sites. So, I\u2019m pretty sure there\u2019s more than Genius, you know, frustrated by this.<\/p>\n<p><strong>Jeff: <\/strong>Yeah. I\u2019m sure there\u2019s a lot of people frustrated with it. But at the same time, you know, search is a game of you\u2019re really playing with Google is the main thing. Then, you know, what I think, on some areas, I think like lyrics and famous quotes, like you\u2019re saying, is something that\u2019s very interesting, because there is that gray area of what\u2019s public domain and what\u2019s not. I know that lawyers and everything have their own statements on this. And I\u2019m building lawyers and take no legal advice for me. But I think when you see something like this, people are going to be scraping this data. And to be honest, if somebody\u2019s blocking Google from scraping their site, but there\u2019s a partner that\u2019s aggregating things, it comes out to where is Google getting the information from? If a partner scraping, shame on the partner, but at the same time, this is something that technically is in the public domain to a certain extent. And, to be fair on this, you know, I think as we look at this, you could see a point where, you know, record labels might not be happy with genius.com from putting lyrics up there. And that\u2019s, that\u2019s something else that\u2019s that comes into it. So I think that ending quote is really what sticks to me in this whole saga, which I\u2019m sure is going to keep going on. Because it\u2019s one thing to, you know, allegedly catch Google in the act, it\u2019s another to allegedly be able to, you know, win at this in a court of law versus a court of public appeal, which I think right now they\u2019ve won the court of public appeal, because it\u2019s, you know, this big monster versus the little guy who\u2019s just sharing what you want.<\/p>\n<p><strong>Dave: <\/strong>Yeah. David, Goliath, the whole thing. Yeah, I don\u2019t, I can\u2019t see this going away anytime soon. I\u2019m sure there\u2019s going to be a few other companies, as we said, who have a bit of a beef with Google. But as you rightly say, you know, Google\u2019s the boss, at the end of the day, you\u2019re playing by their rules. So I mean, who are the competitors like go and Bing and Yahoo search to a lesser extent and things like that. But I mean, what Google online, say, 80-90% of the search traffic, so you know, you kind of play by their rules. So yeah, let\u2019s watch where it goes. And I\u2019m pretty sure it\u2019s not going to go away anytime soon.<\/p>\n<p><strong>Jeff: <\/strong>Yeah. And I think, you know, we\u2019ll see what happens with one thing that hopefully is going away soon is Instagram account takeovers, and I think this is a really big win for users who fall victim to getting their accounts, hacked or locked, is that Instagram\u2019s testing new methods to help people recover their hacked accounts, which I think is a really good thing.<\/p>\n<p><strong>Dave: <\/strong>I think this story touches on a few of the things that are going on in the background. And, you know, we\u2019ve talked about in the past in in the fact that a lot of people put a lot of importance on their Instagram account.<\/p>\n<p><strong>Jeff: <\/strong>Of course, everyone wants to be an influencer, homeboy.<\/p>\n<p><strong>Dave: <\/strong>Yeah, exactly. But very few people take the security of those accounts seriously. So, we tend to find this, that we\u2019re in this unusual position where people are getting their accounts hacked, especially those and Motherboard have touched on this in the past, especially those who have, like, really sought-after accounts, like one lot of characters accounts. And this is similar to what we\u2019ve seen on Twitter in the past, but to a lesser extent, we\u2019ve seen a huge increase in these this sort of activity on Instagram. And you know, the dark net trading of hacked and stolen Instagram accounts is thriving by all accounts. So, to see Instagram, trying to put new measures in place is good. But, you know, a lot of the time I just wonder if just simple security procedures, if people were to follow them in the first place, we wouldn\u2019t be in this situation, would we?<\/p>\n<p><strong>Jeff: <\/strong>I think this one\u2019s interesting, because it\u2019s a multistep process where they\u2019re going to send you a security code to your e-mail address or phone number. And supposedly, it sounds like they\u2019re putting in extra measures to stop people from losing their accounts when somebody does do one of these takeovers.<\/p>\n<p><strong>Dave: <\/strong>Yeah, it sounds to me a bit like, like two-factor authentication, but these specific users.<\/p>\n<p><strong>Jeff: <\/strong>To be honest, looking at this the screenshots in this article, it looks it looks very similar to the Apple ID account, when you\u2019re locked out of your account.<\/p>\n<p><strong>Dave: <\/strong>Yeah, yes, yeah. So when you get you get the little notification number that you have to punch in? Yeah, it just looks similar. I mean, it is morning testament and moments. I mean, we kind of going on, on what they\u2019re saying on here.<\/p>\n<p><strong>Jeff: <\/strong>But I think it\u2019s a good step, Just as you said, this is coming up to be a bigger issue where people are getting locked out of their accounts, blah, blah, blah. And now it\u2019s like, what do we do here? And with this one, you know, this is a way of the company\u2019s doing something to also augment the fact that they have bad customer support for general users.<\/p>\n<p><strong>Dave: <\/strong>Yeah. Unless you\u2019re an influencer, as you said, probably. They probably get 100,000 tickets a day regarding account check ins and things like that. So unless you\u2019re an influencer, you probably should got away.<\/p>\n<p><strong>Jeff: <\/strong>Yeah. I think this quote here that I like about here is it with this feature, we give the account holder the security of knowing that their username will not be available to be claimed by someone else for a period of time following any changes, the spokesman added. The feature is currently available to Android users and the rolling out the iOS, the I don\u2019t know, what I think is good about this is just the fact that, you know, they\u2019re admitting they know that there\u2019s a trade of these sites. And now what it comes up to is, how are they going to stop and protect users from losing those accounts? So it\u2019s a good step in the right direction, but again, in testing programs, and let\u2019s see what happens when hackers alter their methods as well, because let\u2019s be honest, here, it\u2019s going to happen, they\u2019re going to alter the way they do business as well.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I mean, there\u2019s no foolproof security method for something like this. And you know, every step towards a kind of more secure Instagram account is to be lauded is a good thing. But as you rightly say, and as also, as the article also points out, hackers are only going to shift and adjust their methods. If this if there\u2019s something of value that they think they can get across, you\u2019re going to try it in a different way. So yeah, you know, it\u2019s good. But I think simple security procedures like enabling two-factor authentication, strong passwords, and things like that. And obviously, don\u2019t share your account with anybody else, you know, simple steps that we can all take to help stop it in the first place.<\/p>\n<p><strong>Jeff: <\/strong>So yeah, that\u2019s good news. But something else that now pops into the news a little bit more, we\u2019re going to talk about our other favorite thing outside of Facebook-owned companies and talk about the Internet of Things. And the latest update from Samsung.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I feel sorry for Samsung with this one, because I think they\u2019re trying to do the right thing. But obviously got a lot of flack for it. So the story\u2019s from BBC, and it\u2019s talking about how I think this was like two weeks ago, something like that, Jeff, wasn\u2019t it? [Jeff: Yeah.] Samsung support USA tweeted, scanning your computer for malware, and I\u2019m quoting here, scanning your computer for more where virus, malware viruses is important to keep it running smoothly. This is also true of your QLED TV, if it\u2019s connected to Wi-Fi, prevent malicious software attacks on your TV by scanning for viruses on your TV every few weeks. Here\u2019s how. And then there\u2019s a link and a video.<\/p>\n<p><strong>Jeff:<\/strong> I saw that post has also been deleted.<\/p>\n<p><strong>Dave: <\/strong>Yes, it was deleted shortly after it went up. But apparently, video was viewed something like 200,000 times, I think is a case of you know, they\u2019re trying to show that they want people to they\u2019re trying to educate the customers, but it kind of came out the wrong way. Because you know, people don\u2019t want to feel that they have to scan the TV. I mean, what an age we live in, right.<\/p>\n<p><strong>Jeff: <\/strong>You know, the thing is here is that most people don\u2019t like to scan their computers or viruses, let alone the TVs. Yeah, yeah. And I think, you know, this isn\u2019t the first time that we\u2019ve talked about the TOS and potential security issues with it. I think going back to 2017. It says this was talked about but you know, on one hand, you know, I feel for the guys handling, you know, the support handles from Samsung on the Twitter space, because you know, they\u2019re going to get trolled incessantly. But when you look at this, at the end of the day, a smart TV is a computer that\u2019s sitting on your wall.<\/p>\n<p><strong>Dave: <\/strong>Yeah, I think we have seen actual, you know, in the wild malware that attacks TV software. It\u2019s not, it\u2019s not unheard of, it\u2019s not like it doesn\u2019t happen, it is exceptionally rare from what I understand. And you\u2019ve got to be looking at some pretty dodgy sites on your TV, you\u2019ve got to be using the usually using the Internet browser, on built into the TV, or you\u2019re plugging something into it. Why USB? You know, you\u2019ve got to go out your way basically to get a TV in fact that it does happen. But, you know, I think I think going back to what we\u2019ve said in the past, and this is this is a perfect example of does it this device need to be connected to the Internet? Do you need this to be connected to the Internet? And you know, you ask, ask yourself that question first. I mean, for smart TVs, these days, they have all the Netflix apps and BBC I play and things like that. But I mean, for example, like myself, I run all that through an Xbox. And I know there are other alternatives. I think there\u2019s the Amazon Alexa Stick, sorry, Fire TV Stick with Alexa built in. There\u2019s multiple different options, right? So there\u2019s not necessarily any need to have a TV connect to the Internet. And as someone points out, in the tweets below, on the article, make a TV, just a TV. And if you want Internet connectivity, just have a box, Xbox, PlayStation 4, whatever, which does that for you. And that kind of cuts out the need to have your TV connected to the Internet. So, you know, if you want to do it sure, is not a problem. But I think you know, asking that question first.<\/p>\n<p><strong>Jeff: <\/strong>I think that the problem here is there\u2019s a lot of the tweets, say as they\u2019re talking about how the burden is on the end user, and this is could be done by push update. But to be honest here, does anybody really want to see their TV having the blue screen, the Microsoft-style blue screen, it says you\u2019ve got 561 updates to do and, you know, updating, updating your TV is a pain in the ass. I had to do it to one of my TVs. And yeah, even with the Fire Stick have to do it every so often. And it just takes time and it takes away from what you\u2019re doing. So again, is there a better way, probably not. You just need to practice safe Internet Security economist saying that, but I think at the same I think at the same time, take it on to yourself to do some of these because, you know, sadly, we can\u2019t just us to be something that the vendors are going to push on people. And, you know, let\u2019s see what develops with the story because as the people are saying in there, it\u2019s very limited in terms of malware attacking, you know, smart TVs right now. But then again, remember everyone said ransomware was a limited-scope operation outside of a few years ago, too. Now, speaking of ransomware, I\u2019m going to jump over the States here to the latest example of consultants telling governments to do the wrong thing.<\/p>\n<p><strong>Dave: <\/strong>A city in Florida Riviera beach, has agreed to pay \u00a3600,000, which is a whacking amount of money, to hackers. And this is probably the most I\u2019ve seen paid out by the way, you might know different, Jeff. But, you know, this is this was a city that was hit. Their whole infrastructure was affected, apparently. And they unanimously decided that they should pay this. Pay the hackers, this \u00a3600,000. Apparently was put to a vote, although as you quite rightly pointed out, their security consultants suggested that they do it. So, you know, what\u2019s at play here?<\/p>\n<p><strong>Jeff: <\/strong>Governments are a big target, especially small municipalities, as we\u2019ve seen, you know, not even the small ones of Baltimore have seen recently with ransomware. I think what really comes out here is, in a sense, these communities are up a certain type of creek without a paddle. Yeah. And then when you start to go this way, there\u2019s not, you know, a lot of wiggle room. And the problem is, you know, with everything crippled, you\u2019re worried. And for a city of under 40,000 people this this is not, you know, a giant city by any stretch of the imagination, but it\u2019s still a large number of people impacted and day to day operations come to a standstill. Now, in the article, it talks about an employee clicking on a link, my question here is, Why are there no backups?<\/p>\n<p><strong>Dave: <\/strong>Yeah, I think you might have hit the nail on the head there, you know, it\u2019s a city of 35,000 people, so you\u2019re not going to have the budgets of like Boston and larger cities. So that\u2019s probably one of the things that there\u2019s a problem here. But also, I think we\u2019ve seen not only as you can probably attest to in the States, but over here in the UK, we\u2019ve seen like a lack of funding for IT security infrastructure, pretty much everywhere. And I think this is kind of what we\u2019re seeing as a result of it.<\/p>\n<p><strong>Jeff: <\/strong>I think this is one of those areas where you still see people saying, well, that won\u2019t happen to me. Yeah, at the end of the day, when you\u2019re a target, they\u2019re going to come after you municipalities are targets. And you know, unfortunately, as you said, the UK and the US know that a lot of cities being taken and held ransom by attackers. And you know what, we\u2019ve got to start thinking about this, that if you\u2019re somebody who works in one of these municipalities, you really need to start educating yourself on ransomware. And if you don\u2019t, I\u2019m not gonna say bad things aren\u2019t going to happen or if they will, but chances are, you know, it only takes one mistake for stuff to happen.<\/p>\n<p><strong>Dave: <\/strong>Perfect example, because this was apparently just one employee clicking on and downloading something from an e-mail attachment. And it\u2019s crippled the entire infrastructure of the city.<\/p>\n<p><strong>Jeff: <\/strong>The sad part is the people who are discussing this and making the decisions probably aren\u2019t the IT security experts there. They\u2019re probably somebody who\u2019s elected to a job. And they\u2019re looking to keep their job instead role, and do what their consultants say that trust your people, and their people are telling them pay the ransom say do but again, you know, neither the FBI, nor major law enforcement want you to pay those ones because it further enables criminals to do criminal stuff.<\/p>\n<p><strong>Dave: <\/strong>Yeah, exactly.<\/p>\n<p><strong>Jeff: <\/strong>We also don\u2019t recommend that. We think it\u2019s bad.<\/p>\n<p><strong>Dave: <\/strong>No, I think, I suppose, in a way, and I\u2019d always say anyway, but in a way, it\u2019s easy for us to say that because you know, we\u2019re not, we\u2019re not the one with systems down and not being able to pay people and you know, that that looking at it from their point of view, the easy option. And when you\u2019re in the thick of it, the best option seems to be, let\u2019s just pay this money. The insurance company will pay will cover it, let\u2019s just pay this money and get the data back. But, you know, that kind of, as you rightly say, just perpetuates hackers doing what they do, because, hey, I\u2019ve just got $600,000 from this city, just hacking one e-mail, I mean, literally one e-mail did this.<\/p>\n<p><strong>Jeff: <\/strong>Just educate yourselves on what to do and what not to do and, you know, look at possibly investing in better systems and better protections. So with that, guys, this week\u2019s edition of the Transatlantic Cable podcast has come to an end. Hopefully you like what you heard. If you do, please give us a rating on Apple podcasts or your favorite podcast listening station. If you feel that somebody in your life could use the Transatlantic Cable podcast, feel free to share it on your social networks with them because sharing is caring and we love you for that. And hopefully you liked what you heard. You know, we\u2019ll be recording again next week. And until then, we look forward to hearing from you on the interwebs. See you soon.<\/p>\n<p><strong>Dave: <\/strong>Bye bye.<\/p>\n<p><em>[Automated podcast transcript lightly edited]<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dave and Jeff discuss a Florida town that paid to restore data following a ransomware attack, Instagram improving account restoration, and more.<\/p>\n","protected":false},"author":636,"featured_media":22823,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,2670],"tags":[2663,765,658,794,485,420,457,705],"class_list":{"0":"post-22822","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-threats","9":"tag-accounts","10":"tag-instagram","11":"tag-internet-of-things","12":"tag-iot","13":"tag-podcast","14":"tag-ransomware","15":"tag-samsung","16":"tag-tizen"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-98\/22822\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-98\/16062\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-98\/13568\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-98\/17958\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-98\/16094\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-98\/27424\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-98\/22880\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/22822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=22822"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/22822\/revisions"}],"predecessor-version":[{"id":23626,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/22822\/revisions\/23626"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/22823"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=22822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=22822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=22822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}