{"id":23425,"date":"2019-10-25T11:30:44","date_gmt":"2019-10-25T09:30:44","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-115\/23425\/"},"modified":"2019-11-15T13:22:06","modified_gmt":"2019-11-15T11:22:06","slug":"transatlantic-cable-podcast-115","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-115\/23425\/","title":{"rendered":"Transatlantic Cable podcast, episode 115"},"content":{"rendered":"<p>The 115<sup>th<\/sup> installment of the <a href=\"https:\/\/www.kaspersky.com\/blog\/tag\/podcast\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Kaspersky <em>Transatlantic Cable<\/em> podcast<\/a> takes a look at a wide range of stories from phishing devices in your home to the US military.<\/p>\n<p>To kick things off, we look at some new research tied to Google Home and Amazon Alexa devices. This one is more of a proof of concept for malicious apps phishing from a smart device already in homes.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-top3\">\n<p>From there, we stay on the topic of Google and move from smart home devices to smart devices. This time, it\u2019s the new Pixel, which has some issues with its face unlock feature. From smart devices, we jump over to the military, where the US Air Force is bidding happy trails to 8-inch floppy drives for its missile system. To close out the podcast, we take a look at the US Girl Scouts\u2019 National Cyber Security Challenge.<\/p>\n<p>If you like what you heard, please consider sharing with your friends or subscribing. For more details on the stories from this week, please click the links below.<\/p>\n<ul>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/alexa-and-google-home-abused-to-eavesdrop-and-phish-passwords\/?es_p=10378017&amp;fbclid=IwAR2ChwaraH_hwY3Xg4HpKOWisED0GWxiIZDIMTWMY5oTkpYLfHZkGgVyhA4\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Amazon- and Google-approved apps turned both voice-controlled devices into \u201csmart spies.\u201d<\/a><\/li>\n<li><a href=\"https:\/\/www.theverge.com\/2019\/10\/20\/20924143\/google-pixel-4-face-unlock-eyes-security-update-coming-months\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Google to update Pixel 4 face unlock with eye detection \u201cin the coming months\u201d<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2019\/10\/air-force-finally-retires-8-inch-floppies-from-missile-launch-control-system\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Air Force finally retires 8-inch floppies from missile launch control system<\/a><\/li>\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/us-girl-scouts-launch?utm_source=twitterfeed&amp;utm_medium=twitter&amp;es_p=10373845&amp;fbclid=IwAR3wLtWjUxtubozvmv-qXUGTinVBInPhpR4QDP8hJ538WAY05L7tpJlQf3Y\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Girl Scouts of USA launch First National Cybersecurity Challenge<\/a><\/li>\n<\/ul>\n<p><iframe loading=\"lazy\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/11754116\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/backward\/render-playlist\/no\/custom-color\/87A93A\/\" frameborder=\"0\" scrolling=\"no\" marginwidth=\"0\" marginheight=\"0\" width=\"100%\" height=\"90px\"><\/iframe><\/p>\n<div class=\"podcast-subscribe\"><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-itunes\" class=\"itunes\" href=\"https:\/\/itunes.apple.com\/us\/podcast\/talk-security\/id909407206\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-apple.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-spotify\" class=\"spotify\" href=\"https:\/\/open.spotify.com\/show\/1VGCKlOoQ9C24dJiCHGTK5\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-spotify.png\"><\/a><a data-omniture-download-button-type=\"TrialBuilds\" data-omniture-product-name=\"podcast-rss\" class=\"rss\" href=\"http:\/\/talksecurity.kaspersky-podcasts.libsynpro.com\/rss\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" src=\"https:\/\/www.kaspersky.co.za\/blog\/wp-content\/plugins\/kaspersky-embeds\/img\/button-subscribe-rss.png\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>On this podcast, Dave and Jeff take a look at the week\u2019s top cybersecurity news including voice apps turning home assistants into phishing devices, Pixel\u2019s face unlock issue, the Air Force retiring some old tech, and more.<\/p>\n","protected":false},"author":636,"featured_media":23426,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,1788,2670],"tags":[512,22,794,485,43,2920],"class_list":{"0":"post-23425","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-privacy","9":"category-threats","10":"tag-amazon","11":"tag-google","12":"tag-iot","13":"tag-podcast","14":"tag-privacy","15":"tag-voice-assistants"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/transatlantic-cable-podcast-115\/23425\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/transatlantic-cable-podcast-115\/16826\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/transatlantic-cable-podcast-115\/14210\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/transatlantic-cable-podcast-115\/18797\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/transatlantic-cable-podcast-115\/16842\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/transatlantic-cable-podcast-115\/29059\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/transatlantic-cable-podcast-115\/23578\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/podcast\/","name":"podcast"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23425","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/636"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=23425"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23425\/revisions"}],"predecessor-version":[{"id":23550,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/23425\/revisions\/23550"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/23426"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=23425"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=23425"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=23425"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}