Skip to main content

tv   Shift  Deutsche Welle  July 2, 2024 2:45pm-3:01pm CEST

2:45 pm
turn the backs on democracy. and what does this mean for the upcoming you next? the enemy within the to lie 12 on the imagine you log into your online banking one day and your account is completely drained, filled out by the likes of cyber criminals. identity theft is on the rise with really occasions where people like you and me, but how do these criminals operate? and how can we protect ourselves from attacks? one way scam as laura and the victims, by impersonating celebrities like 11 musk frosts, those have long tried capitalizing on the name of the u. s. entropy under more on that later. but just recently, a defect of even mosque was streamed over several hours on youtube drawing tens of thousands of you. busy take a look, you can directly deposit any amount of bitcoin and syrian or don't going to say,
2:46 pm
you know, directive people to scan a q r code and transfer crypto car and see promising to send back double the amount those cameras use. they. i to manipulate them 1000000000 s face and voice as well as official looking tesla and space ex branding and other reasons. graham targeted, somewhat less prominent, but let's shields the political defects were created. of this ukrainian student all ago like politeness was used on chinese social media to promote russian products and politics. i saw that this is literally like by face speaking mandarin and on the background and seeing kremlin and most go. and i'm like talking about things like how great russia and china are, but the far less flashy examples of identity theft happening every day. scam us use vague text or was that messages to siphoned off personal information expos at the house of plot the institute in post. i'm explain this something of you to do this.
2:47 pm
and many of these spam or fishing campaigns are geared towards aspects of everyday life. i'm expecting a package, a file has been shared with me. i've been sent a contract scenarios that at 1st glance don't seem unusual. the s mondays wouldn't have any sense. like this text message, purportedly from the cool re a d h l. clicking on the link to read, directs you to a web page with a cookie bene. upon confirming cookie settings, the fake website to p is up and close the inspection. you'll notice this suspicious you out, a common red flag, and you should exit out immediately. the website looks deceptively real, but if you enter your card details here, you'll have a real problem and pay attention to the payment methods. paying encrypt of currencies isn't the typical option on legitimate websites. the radically, the same fishing technique is possible via email, but advancements in spam filters mean it's less common among ships. so that's why it is estimated that well over 90 percent of all emails are spam. but you won't see
2:48 pm
many of them in your inbox. that's because internet providers have taken very strong measures against spam. so of course the criminals go elsewhere like the social media messages, services or estimates and all the estimates. so best keep an eye out. scam us like using services like whatsapp, especially, and the risk of being targeted is increasing to more and more. we're paying for things via smartphone, often by us social media platforms like instagram payments, how often made digitally and direct with paypal. for example, this gives scam us an advantage deformed, it turns out that has of more interesting data on it and access to, to more accounts than your computer. especially 2nd factor authentication mobile banking, all of these uh, applications running on your phones rather than your computer at these days. and of course, if you can, if through a text message, somebody tells you to install the different that that looks exactly like for
2:49 pm
instance, the banking up that you use before. then to try to steal money that way, right? so scam us don't just make fake websites, they make fake apps to not said that is the more time consuming method. as hackers can really only target individual users to rake in the big box, heck, a sink out weak spots and lots of data bases, which can hold. she was quantities of highly valuable personal information. once such data base belongs to the was leading ticket sales company, ticket mazda. i know i've used them have you. if so, it's probably time to change some passwords. the private data of more than 500000000 tickets most the customers stolen according to the hacker group shining contest. the data allegedly contains names, addresses, telephone numbers and even credit card details. the tickets says company was reportedly targeted by exiled stores provide us snowflake. the breaches said to have given shiny hunters access to data from over 150 international companies. 10
2:50 pm
companies have already been ordered to pay around some of at least $6.00. it goes to see the return of the customers data. and if you have a space of $500000.00 on you trying to hunt this is offering to sell tickets, master customer data directly on the document. conducted audits under both easy code. you can get anything on the document. you can rent anything by anything. this 24 hour customer service money back guaranteed you can imagine how professional it is that will hold forums with data from identity theft . a, sold all mazda or even given away. must block for cove. pushing bad, bad for the companies that have been hacked was for the use as affected. now your personal data is a commodity on the document. like for example, of these unencrypted invoices from the multiple one hotel chain researchers at the house of the institute obtain the records of the heck us to all the data in 2023.
2:51 pm
not only do they show who stayed with whom pent when in which hotel, but they also contain personal data such as addresses and credit card numbers to the credit card to be able to complete the detailed cost and pass the credit card might cost a few cents maybe a dollar, and you'll see you have just one of many, it's incredibly lucrative for criminals to take a little money into their hands in a lot of identities and go on an internet shopping spree to internet offline and cost. what's looking? it's as easy as that. anyone who can skillfully combine pieces of stone and data could sign cell phone contracts, apply for loans, open bank accounts, all under your name, the worst case scenario. victims ultimately have to answer for crimes. they didn't even commit cyber crime effects more people than you might think. 2013 saw the biggest tech in internet history, with data from all 3000000000 yahoo accounts compromised. similarly,
2:52 pm
hackers gain access to more than 1000000000 data records at chinese online shopping dining alibaba. and it took over a year before the breeze was even notice, much of the stone data as sold on the dock. i had like a group such as lock bid 3 point, no, show off the successes on a lead data page. hardly looks like the document does it. if you want to find out whether you've been hacked, you can do so easily online, the hassle topknot institutes, identity leaks, heck, a or a being pulled out. just 2 websites that collects information on compromise the accounts. you just enter your email address to find out, and if you're lucky enough to have been hacked or even locked out of an account, 1st and foremost, stay calm. the 1st thing you want to do is change passwords in all the accounts possible. you don't know what the criminal already has access to, so try to change passwords everywhere. some accounts, you might already be locked out of don't panic in that case. so there really is no
2:53 pm
stigma anymore. about the context of technology provider, google, microsoft, facebook, whether it is the old doing does thousands of times per day, helping people get back into their own accounts. that said, we should take precautions, protect your identities, through good passports, different passports, multi factor authentication, make it difficult to locked into your account so that if somebody tries to give up and browse, it goes somewhere else. secondly, have copies of the important data backups, physical backups, and costing those 3rd tip. if you really want to, to predict this of get a 2nd sim card, was a number that nobody knows. and you would use that to recover your accounts. and if your data is being caught of a breeds, it's nothing to be ashamed of pack us can get to just about anybody. walk through a tech james, bill gates even most,
2:54 pm
and jeff pays us have in common. all 3 have that with the accounts hacked in one of the most raisins. gams, in recent, he is in 2020 pack us treated our questionable investment proposals from numerous celebrities accounts that load uses to send the bid con and promised to double the investment to some, to a to use us. it seemed like a good opportunity to scan was quickly uncovered and the culprits were later convicted. still, those cameras were able to catch a big con, will some 100000 euros. honda sing the power of celebrity for get rich, quick schemes, a match made in scamming have and if you can take over a celebrities, twitter account and tweet some nasty things, you know, cause a lot more confusion then it's, it's an unknown person. and so, of course, people with either money or high enough of a profile to, to get to money. that is
2:55 pm
a lot of money to be made from stolen identities. but some countries affected more than others. in 2022 over 27000000 people with victims of identity theft in india, one and 3 people fear it could happen to them. cyber security expert saga vision or ones of your threats to our digital identities. to gather with a company inclusive a i, he wants to improve. the official intelligence literacy, cyber crime in india has seen a significant increase in recent years from 2020 to 2003. then i've seen the i've seen an increase off 25 percent as by the official report and cyber trends. what is the biggest reason of this much increase is low based literacy in india, more than 900000000 people? how smartphones this to chrissy is still on the 10 percent deep phase
2:56 pm
one threat audio, a video that's been manipulated with the help of a i took the me take the real person you can be tricked into thinking it person you know, is reaching out to you for example, cyber criminals can use this technology to cause a lot of damage to the example if i give you about and the c or for a company and home phone. his voice and face was impersonated by a scammer, and the, and the money was transferred to another counter. what? 29000000 euros to prevent such crimes in the future. the closest i trans companies as well as law enforcement agencies and politicians. female influenza, as especially likely to be victims of identity fraud. another example is women where they've pittsville identity. the fees is free. it's swept with another. uh, online influenza and a new a id is created,
2:57 pm
which is sellable by these scammers on line. the post such views, they post such content and the on money from the disliked entity of their deep takes up politicians in india have been used to sway the electorate. the danger is real. the truth is using the end and that means having to accept a certain risk. there's no 100 percent effective way to prevent cyber crime unless that is your plan on going off grid entirely. so all we can do is take precautions and stay vigilant. how has cyber crime effected your life? and how do you go about protecting your sensitive data that is know by the in the house, the touch of green in the grave wasteland. the kitchen gardens project
2:58 pm
female trash pickers. how to grow their own vegetables. all women to eat better, improving their diet and income in the process. india in 30 minutes on the d. w. i knew that what happened to me wasn't right. i just didn't know where i could share at west who, who is going to believe me. this is greg was staring iced against her well in canada, as with thousands of indigenous women from the 1970s to present a global membrane and 19 minutes on the w, the,
2:59 pm
the similar 16 times to increase the current g. more people than ever on the move worldwide in such a better price than mine. and one great timing is very hard to say very difficult, john. find out about time on store info. my grands why do having does not get drunk? why do grab a tasteful waves, squeeze all bodies. how much more do we need a day? dry stops on painful help. find the office gets much on dw science, outtake talk channel. the
3:00 pm
this is the w news live from the land. europe's most pro russian leader, a just ukraine to consider a ceasefire on his 1st visit to keep since russia's invasion, the hon. garron pregnant, a civic to old bon tells present to load him as well and see that a truce could speed up. he still lensky says, what you cried needs is a just peace coming up on the program. ukraine is also on the agenda at talks and also between germany's trump. flo will of charlotte and his opponent accounts on our part can barrel rips through the se in car van bringing life threatening wins and storm searches.

21 Views

info Stream Only

Uploaded by TV Archive on