Skip to main content

tv   Shift  Deutsche Welle  July 1, 2024 10:30am-10:46am CEST

10:30 am
the way officer rules, the environment is not responsible. make up your own mind. dw, made for mines. the imagine you log into your online banking one day and your account is completely drained, filled out by the likes of cyber. criminal's identity theft is on the rise. with really and occasions where people like you and me. but how do these criminals operate and how can we protect ourselves from attacks? one way scams nor in the victims, by impersonating celebrities like even musk frosts doesn't have long tried capitalizing on the name of the u. s enter pin or more on that later. but just recently a defect of even mosque was streamed over several hours on youtube drawing tens of thousands of you. busy take a look, you can directly deposit any amount of bitcoin if syrian or adults going to say,
10:31 am
you know, directive people to scan a q r code and transfer crypto currency. promising to send back double the amount those cameras use a i to manipulate them 1000000000 s face and voice as well as official looking tesla and space ex branding and other reasons. graham targeted, somewhat less prominent, but was usually political. dfcs were created of this ukrainian student all ago like politeness was used on chinese social media to promote russian products and politics. i saw that this is literally like by face speaking mandarin and on the background and seeing kremlin and most go. and i'm like talking about things like how great russia and china are, but the far less flashy examples of identity theft happening every day. scam us use vague text or was that messages to siphoned off personal information expos at the house of plot the institute in post, i'm explaining this up in the future. these are spend many of these spam or fishing
10:32 am
campaigns. i geared towards aspects of everyday life. i'm expecting a package, a file has been shared with me. i could send a contract scenarios that at 1st glance, don't seem unusual. d as much as you want of understand. like this text message purportedly from the cool re a d h l. clicking on the link, we directs you to a web page with a cookie bene. upon confirming cookie settings, the fake website to p is up and close the inspection. you'll notice this suspicious u. l. a common red flag, and you should exit out immediately. the website looks deceptively real, but if you enter your ca details here, you'll have a real problem and pay attention to the payment methods, paying encrypt of currencies isn't the typical option on the websites. the radically, the same fishing technique is possible via email, but advancements and spam filters mean it's less common among ships. so that's why
10:33 am
it is estimated that well over 90 percent of all emails of spam. but you won't see many of them in your inbox. that's because internet providers have taken very strong measures against spam. so of course the criminals go elsewhere, the social media messages services or some as well the estimate. so best keep an eye out. scam us like using services like whatsapp, especially, and the risk of being targeted is increasing to more and more. we're paying for things via smartphone. awesome. by a social media platforms like instagram payments, how often made digitally and direct with paypal. for example. this gives cameras an advantage to phone to 10, so it has of more interesting data on it and access to, to more accounts than your computer. especially 2nd factor authentication mobile banking, all of these uh, applications running on your phones rather than your computer at these days. and of course, if you can, if through a text message somebody tells you to install the different apps that looks exactly
10:34 am
like. for instance, the banking app that you use before, and then i tried to steal money that way, right? so scam us don't just make fake websites. they make fake apps to not said that is the more time comes to main method. as hackers can really only target individual use as to rake in the big box, heck, a sink out weak spots. and last data bases, which can hold, she was quantities of highly valuable personal information. one such database belongs to the was leading ticket sales company, ticket mazda. i know i've used them have you. if so, it's probably time to change some passwords. the private data of more than 500000000 ticket master customers stolen. according to the hacker group, shiny hunters, the data allegedly contains names, addresses, telephone numbers and even credit card details. the tickets says company was reportedly targeted by exiled stores provide us snowflake. the breaches said to
10:35 am
have given shiny and does access to data from over 150 international companies. 10 companies have already been ordered to pay around some of at least $6.00. it goes to see the return of the customers data. and if you have a space of $500000.00 on you, trying to hunt this is offering to sell tickets. mazda customer data directly on the document conducted at us under both easy, you can get anything on the document. you can rent anything by anything. this 24 hour customer service money back guarantee. you can imagine how professional it is that will hold forums with data from identity theft. us sold all mazda or even given away much unblock cove, pushing bad, bad for the companies that have been hacked was for the use as effected. now your personal data is a commodity on the documents. like for example, of these unencrypted invoices from the multiple one hotel chain researchers at the
10:36 am
house are planning to institute, obtain the records of the heck us to all the data in 2023. not only do they show who stayed with whom pent when, and which hotel, but they also contact personal data, such as s as and credit card numbers to the credit card to be able to complete the detailed cost and pass the credit card. it might cost a few cents, maybe a dollar, and you'll see you at just one of many, it's incredibly lucrative for criminals to take a little money into their hands. and i've seen a lot of identities and go on an internet shopping spree to internet offline and cost what's looking. it's as easy as that. anyone who can skillfully combine pieces of stone and data could sign cell phone contracts, apply for loans, open bank accounts, all under your name, the worst case scenario. victims ultimately have to answer for crimes. they didn't even commit cyber crime effects more people than you might think. 2013 saw the biggest tech in internet history,
10:37 am
with data from all 3000000000 yahoo accounts compromised. similarly, hackers gain access to more than 1000000000 data records at chinese online shopping dining alibaba. and it took over a year before the breeze was even notice, much of the store and data is sold on the dock. i had like a group such as lock bid 3 point, no, show off. the successes on the data page hardly looks like the document does it. if you want to find out whether you've been hacked, you can do so easily online. the hassle, talking to institution identity leaks, heck, out or being pulled out those 2 websites that to collect information on compromise the accounts you just enter your email address to find out. and if you're lucky enough to have been hacked or even locked out of an account, 1st and foremost, stay calm. the 1st thing you want to do is change passwords in all the accounts possible. you don't know what the criminal already has access to. so try to change passwords everywhere, some accounts, you might already be locked out of don't panic in that case. there really is no
10:38 am
stigma anymore. about it. contact the technology provider, google, microsoft, facebook, whatever it is, the old doing does thousands of times per day helping people get back into their own accounts. that said, we should take precautions, protector, identities, through good passports, different passports. multi factor authentication. make it difficult to lock into your account so that if somebody tries to give up and browse it, go somewhere else. secondly, have copies of the important data backups, physical backups, and costing those 3rd tip. if you really want to, to predict this of get a 2nd sim card was a number that nobody knows. and you would use that to recover your accounts. and if your data is being caught of a breach, it's nothing to be ashamed of. hackers can get to just about anybody walk through
10:39 am
a tech james, bill gates even most and to face those have in common all 3 you have that with the accounts hacked in one of the most praise on scans. in recent, he is in 2020 pack us treated our question, the investment proposals from numerous celebrities accounts. they don't use us to send the bid con and promise to double the investment to some, to where the use of it seemed like a good opportunity to scan was quickly uncovered and the culprits were later convicted. still, those cameras were able to catch a big con with some 100000 bureaus. promising the power of celebrity for get rich quick schemes, a match made in scamming haven't. if you can take over a celebrity's twitter account and tweet some nasty things, you know, cause a lot more confusion then it's, it's an unknown person. and so of course, people with either money or high enough of a profile to, to get the money. that is
10:40 am
a lot of money to be made from stone and identities, but some countries affected more than others. in 2022 over 27000000 people with victims of identity theft in india, one and 3 people fear it could happen to them. cyber security experts saga vision or ones of use reps to our digital identities to gather with a company inclusive a i. he wants to improve. the official intelligence literacy cyber crime in india has seen a significant increase in recent years from 2020 to 2003. then i've seen the i've seen an increase off 25 percent as by the official report and cyber trends. what is the biggest reason of this much increase is the lo, this, the literacy in india, more than 900000000 people, how smartphones and destiny? tracy is still on the 10 percent deep phase one threat audio,
10:41 am
a video that's been manipulated with the help of a i took, they may take the real person you can be tricked into thinking it person you know is reaching out to you. for example, cyber criminals can use this technology to cause a lot of damage to the example if i gave you about and the c or for a company and home phone. his voice and face was impersonated by a scammer, and the, and the money was transferred to another account or what 29000000 euros to prevent such crimes in the future. intrusive, i trans companies as well as law enforcement agencies and politicians, female influenza as especially likely to be victims of identity fraud. another example is women. we're, this will identity. the fees is free. it's swept with another. uh, online influenza and a new e id is created,
10:42 am
which is sellable by the scamarus on line. the post such views, maple such content and the on money from the display identity of their b takes up politicians in india have been used to sway the electorate. the danger is real, the truth is using the end and that means having to accept a certain risk. there's no 100 percent effective way to prevent cyber crime unless that is your plan on going off the grid entirely. so all we can do is type it cautions, and stay vigilant. how has cyber crime effected your life? and how do you go about protecting your sensitive data that is know by the, the you can draw the line between the spacings because i don't believe that space is, is
10:43 am
a morally relevant criterion anymore than i believe that rice or sex is on frontier in. 2 2 2 should. 2 2 humans, closer to a chimpanzee, and zanna chimpanzee is even to a dog. a donkey series about our complex relationship with animals, watch now on youtube, dw documentary. the dream of revolution dictates as the most uh was full of something that changed my life. the people hoped for a sara society i imagined we would change the world. tens of thousands of messages from all over the world wanted to help reconstruct the country. this mission became the dream, was simply a spirit of optimism where we encouraged each other. so many things were suddenly
10:44 am
imaginable, their auditors in mid to end making a dream of revolution, thoughts, july 20th dw, the and so between the age of 17 to 23 are so 645 times a week. by and 6 it's, it's a shame to from combining a good they make money doing it so you can't say much against it, and people up for it to go down. books should prostitution be allowed? sweden's answer to this question has been entirely different than germany's and
10:45 am
which country is the situation better for the women involved. we explored this question in sweden and germany. the tim burks sounds poly neighborhood in germany. home to there's a button and it's red light district. here, sex work, the scene is business as usual, especially by men. here it goes with the territory. yeah, i do is literally screwed up. i wouldn't be able to stand that if my sister did at best buy, then i'd say read. somebody says somebody shouldn't go too long ago and they make money doing it so you can't say much against it and people are up for it on books. and sunk probably 6 is a tourist attraction that draws people from around the globe. they are even guided tour is of the so called most sinful mile 54 days here in sunk probably this
10:46 am
process.

11 Views

info Stream Only

Uploaded by TV Archive on