Skip to main content

tv   Shift  Deutsche Welle  June 29, 2024 11:15pm-11:31pm CEST

11:15 pm
since the crowd in the city of assets opposite the breakout technology show shifts, highlights the problem of identity fit. keep watching that advances are going to be back with more international use to mark the not just another day. so much is happening all at once. we take time to understand this is the day in depth look at current use events, analyzed by experts and critical thinking is. this is with the weekdays. on d w. you'll see about the video that goes enabled other data media, legal law, google, i've got to be done by get i will stop into that and i'll give you the order. would you be able to order that up? joe made any a dog color and key people in the eval on worldwide in search of
11:16 pm
a did you have you ever used them in at the accounting method? the guy talking? yeah. do you find out about on the story and from i can imagine you log in to your online banking one day and your account is completely drained, cleared out by the likes of cyber criminals. identity theft is on the rise with really and occasions where people like you and me. but how do these criminals operate? and how can we protect ourselves from attacks? one way scams nor in the victims, by impersonating celebrities like even musk frosts doesn't have long tried capitalizing on the name of the u. s. enter pin or more on that later. but just recently, a defect of even moscow stream the over several hours on youtube drawing tens of thousands of us. take a look. you can directly to posit any amount of bitcoin
11:17 pm
a serial or don't coined the fake email on directive people to scan a q r code and transfer crypto currency. promising to send back double the amount. let's cameras use a i to manipulate them 1000000000 s face and. busy eyes, as well as official looking tesla and space ex branding. another reason scam targeted somewhat less prominent, but let's shields the political dfcs were created of this ukrainian student all ago like politeness was used on chinese social media to promote russian products and politics. i saw that this is literally like by face speaking mandarin and on the background and seeing kremlin in most go. and i'm like talking about things like how great russia and china are. but the far less flashy examples of identity theft happening every day. scam us use vague text or was that messages to siphoned off personal information expos at the hassle plot the institute in post, i'm explain this, have been
11:18 pm
a few to these spend many of these spam or fishing campaigns. i geared towards aspects of everyday life. i'm expecting a package, a file has been shared with me. i could send a contract scenarios that at 1st glance, don't seem unusual. the s money wouldn't have any sense. like this text message, purportedly from the korea del clicking on the link re direct you to a web page with the cookie bene. upon confirming cookie settings, the fake website p is up on closer inspection. you'll notice this suspicious. you will come and red flag and you should exit out immediately. the website looks deceptively real, but if you enter your card details here, you'll have a real problem and pay attention to the payment method. it's taking encrypt of currencies isn't the typical option on legitimate websites. theoretically the same fishing technique is possible via email, but advancements in spam field doesn't mean it's less common. i said,
11:19 pm
so that's the site as estimate to that well over 90 percent of all emails of spam, but you won't see many of them in your inbox. that's because internet providers have taken very strong measures against spam. so of course the criminals go elsewhere to social media, messenger services, or s m s, and all the estimates. so best keep an eye out. scam us like using services like whatsapp, especially, and the risk of being targeted is increasing to more and more. we're paying for things via smartphone, awesome. by us social media platforms like instagram payments, how often made digitally and direct with paypal. for example, this gives kind of an advantage to phone to 10. so it has of more interesting data on it and access to, to more accounts than your computer, especially 2nd factor authentication mobile banking, all of these uh, applications running on your phones for other than your computer this days. and of course, if you can, if through a text message, somebody tells you to install the different apps that looks exactly like,
11:20 pm
for instance, the banking up that you use before and then to try to steal money that way. right? so scam us don't just make fake websites, they make fake apps to not said that is the more time consuming method. as hackers can really only target individual users to rake in the big box, heck of sink out weak spots and lots of data bases, which can hold. she was quantities of highly valuable personal information. once that's database belongs to the was leading ticket sales company, ticket mazda. i know i've used them have you. if so, it's probably time to change some passwords. the private data of more than 500000000 ticket must have customers stolen according to the heck a group shining hunters. the data allegedly contains names, addresses, telephone numbers and even credit card details. the ticket sales company was reportedly targeted via cloud stores provide a snowflake is it said to have given chinese how does access to data from over 150
11:21 pm
international companies. 10 companies have already been ordered to pay around some of at least $6.00. it goes to see the return of the customers data. and if you have a space of $500000.00 on you trying the hunters is offering to sell tickets. master customer data directly on the document. inductive as on the board, easy cuz you can get anything on the document. you can rent any things by anything . this 24 hour customer service money back guarantee. you can imagine how professional it is. they will hold forums with data from identity theft, a, sold all mazda or even given away, must unblock a cov, pushing bad, bad for the companies that have been hacked was for the use as effected. now the personal data is a commodity on the document. like for example, of these unencrypted invoices from the multiple one hotel chain researchers at the
11:22 pm
house applauding to institute, obtain the records of the heck us to all the data in 2023. not only do they show who stayed with whom can when and which hotel, but they also contact personal data such as addresses and credit card numbers. and the continued cotton give a complete detail cost and past the credit card might cost a few cents. maybe a dollar, and you'll see you are just one of many, it's incredibly lucrative for criminal. it's to take a little money into their hands, team, a lot of identities, and go on an internet shopping spree to internet offline and cost. what's looking? it's as easy as that. anyone who comes skillfully combined pieces of stone data could sign, cell phone contracts, apply for loans, open bank accounts, all under your name, the worst case scenario. victims ultimately have to answer for crimes. they didn't even commit cyber crime effects more people than you might think. 2013 saw the biggest tech in internet history,
11:23 pm
with data from all 3000000000 yahoo accounts compromised. similarly, hackers gain access to more than 1000000000 data records at chinese online shopping dining alibaba. and it took over a year before the breeze was even notice. much of the stone data is sold on the dock. i had a group such as lock bid 3 point, no, show off this successes on a leak data page. hardly looks like the document does it. if you want to find out whether you've been hacked, you can do so easily online. the hassle top, my institution identity leave, check out or being pulled out. just 2 websites that to collect information on compromised accounts. you'll just enter your email address to find out. and if you're lucky enough to have been hacked or even locked out of an account. first and foremost, stay calm. the 1st thing you want to do is change passwords in all the accounts possible. you don't know what the criminal already has access to. so tried to change passwords to everyone. some accounts you might already be locked out of
11:24 pm
don't panic in that case. there really is no stigma anymore. about it. contact the technology provider, google, microsoft, facebook, whatever it is they're all doing, does thousands of times per day helping people get back into their own accounts. that said, we should take precautions, protector, identities, through good passports, different passports. multi factor authentication, make it difficult to lock into your account so that if somebody tries to give up and runs it, go somewhere else. secondly, have copies of the important data backups, physical backups, and costing those 3rd tip. if you really want to, to predict this of get a 2nd sim card, was a number that nobody knows. and you would use that to recover your accounts. and if your data is being caught of a breach, it's nothing to be ashamed of. pack us can get to just about anybody want to
11:25 pm
a tech james, bill gates even most and jeff pays us have in common. all 3 have that's we the accounts hacked in one of the most appraising scams. in recent, he is in 2020 pack us treated our questionable investment proposals from numerous celebrities accounts that load uses to send bid calling and promised to double the investment to some, to where the use of it seemed like a good opportunity to scan was quickly uncovered. and the culprits will later convicted. still, those cameras were able to catch a big conduit of some 100000 bureaus. promising the power of celebrity for get rich quick schemes, a match made in scamming have him. if you can take over a celebrity's twitter account and tweet some nasty things, you know, cause a lot more confusion, then it fits an unknown person. and so of course, people with either money or high enough of a profile to, to get to money. that is
11:26 pm
a lot of money to be made from stolen identities, but some countries affected more than others. in 2022 over 27000000 people with victims of identity theft in india, one and 3 people fear it could happen to the cyber security expert saga vision. or it was a view of threats to our digital identities to gather with the company inclusive, a i. he wants to improve the official intelligence literacy, cyber crime. and india has seen a significant increase in recent years from 2020 to 2003. then i've seen the i've seen an increase of 25 percent as by the official report in cyber trends. what is the biggest reason of this much increase is a low based literacy in india. more than 900000000 people. how smartphones are this to chrissy is still under 10 percent. deep phase one threat
11:27 pm
audio video that's been manipulated with the help of a i took, they may take the real person you can be tricked into thinking it person you know is reaching out to you. for example, cyber criminals can use this technology to cause a lot of damage to the example if i give you about and the c or for company and home phone. his voice and face was impersonated by a scammer. and the, and the money was transferred to another account or what 29000000 euros to prevents such crimes in the future. intrusive a, i, trans companies as well as law enforcement agencies and politicians, female influenza as especially likely to be victims of identity fraud. another example is women where they have pittsville identity. the face is free and swept with another uh, online influenza and a new a id is created,
11:28 pm
which is sellable by the scammers on line, the post such views. they both such content and the on money from dr. schuessler identity of the b takes of politicians in india have been used to sway the electorate. the danger is really the truth is using the end and that means having to accept a certain risk. there's no 100 percent effective way to prevent cyber crime unless that is your plan on going off the grid entirely. so all we can do is take precautions and stay vigilant. how has cyber crime effected your life? and how do you go about protecting your sensitive data that is know by the, the, the enter the come 6 own a searching support for the far right cost using the european elections ascend,
11:29 pm
tramos across the continent. my guess is we get some drug costs, the outgoing member of the european parliament in president macros when they saw on the list. how risky is macros? decision to coal, small collections in front part of the conflict on d, w, a chinese prisoners s o s. the letter was hidden in the pregnancy test at a pharmacy in paris, a desperate plea that put their own life at risk. searching for an unknown prisoner. assume that takes a closer look at the modern day system of slavery in china is present in such a minute. d, w, d, w, travel low there. besides the food?
11:30 pm
well, let's go through. so when it comes to sustain dependency information and trends, texas on d. w travel, you can have it wherever you want your opinion. feel free to write your thoughts and the comment a search and support for file right. policies in the european elections are sent tramos across the continent, not more powerful than those who's in paris and berlin for the policies of both leaders for trunk by far right opponents. my guess is we cassandra glossy, outgoing member of the european parliament in president macros. when they saw this list, how risky is macros decision to coal snap elections in front? and when he resigned to for fall, right, with the majority center, i've got to welcome to come pick some. thank you for inviting. are you looking your was.

14 Views

info Stream Only

Uploaded by TV Archive on