tv Shift Deutsche Welle January 7, 2025 10:45pm-11:01pm CET
10:46 pm
cause of the cool breeze. but it was just me of the imagine you log into your online banking one day and your account is completely drained, filled out by the likes of cyber criminals. identity theft is on the rise with really implications for people like you and me. but how do these criminals operate? and how can we protect ourselves from attacks? one way scam as laura and the victims, by impersonating celebrities like 11 musk frosts, those have long tried capitalizing on the name of the u. s. entropy under more on that later. but just recently, a defect of even mosque was streamed over several hours on youtube drawing tens of thousands of you. busy take a look, you can directly deposit any amount of bitcoin and syrian or don't going to say,
10:47 pm
you know, directive people to scan a q r code and transfer crypto currency. promising to send back double the amount those cameras use, they i to manipulate them 1000000000 s face and voice as well as official looking tesla and space ex branding and other reasons. graham targeted somewhat less prominent, but was usually political defects were created of this ukrainian students all ago like politeness was used on chinese social media to promote russian products and politics. i saw that this is literally like by face speaking mandarin and on the background i'm seeing kremlin and most go. and i'm like talking about things like how great russia and china are. but the far less flashy examples of identity theft happening every day. scam us use vague text or was that messages to siphon off personal information expos at the house of plot the institute in post? i'm explain this. i don't know if you did this spend many of these spam or fishing
10:48 pm
campaigns. i geared towards aspects of everyday life. i'm expecting a package, a file has been shared with me. i've been sent a contract scenarios that at 1st glance, don't seem unusual. the as management of understand, like this text message, purportedly from the cool re a, d h l. clicking on the link, re direct you to a web page with a cookie bene. upon confirming cookie settings, the fake website to p is up and close the inspection. you'll notice this suspicious u l. a common red flag, and you should exit out immediately. the website looks deceptively real, but if you enter your card details here, you'll have a real problem and pay attention to the payment methods, paying encrypt of currencies isn't the typical option on the websites. the radically, the same fishing technique is possible via email, but advancements in spam filters mean it's less common among ships. so that's why it is estimated that well over 90 percent of all emails are spam. but you won't see
10:49 pm
many of them in your inbox. that's because internet providers have taken very strong measures against spam. so of course the criminals go elsewhere like the social media messages, services or estimates and all the estimates. so best keep an eye out. scam us like using services like whatsapp, especially, and the risk of being targeted is increasing to more and more. we're paying for things via smartphone. awesome. buy a social media platforms like instagram payments, how often made digitally and direct with paypal. for example. this gives cameras and it lot, it's deformed. it turns out that has of more interesting data on it and access to, to more accounts than your computer, especially 2nd factor, authentication mobile banking, all of these uh, applications running on your phones rather than your computer at these days. and of course, if you can, if through a text message somebody tells you to install the different that that looks exactly
10:50 pm
like for instance, the banking up that you use before. and then i tried to steal money that way, right? so scam us don't just make fake websites, they make fake apps to not said that is the more time comes 2 main methods. as hackers can really only target individual uses to rake in the big box, heck us seek out weak spots and last data bases, which can hold, she was quantities of highly valuable personal information. one such database belongs to the was leading ticket sales company, ticket mazda. i know i've used them have you. if so it's probably time to change some passwords. the private data of more than 500000000 ticket most the customers stolen according to the hacker groups, shiny hunters. the data allegedly contains names, addresses, telephone numbers and even credit card details. the tickets says company was reportedly targeted by exiled stores provide us snowflake. the breaches said to have given shiny hunters access to data from over 150 international companies. 10
10:51 pm
companies have already been ordered to pay around some of at least $6.00. it goes to see the return of the customers data. and if you have a space of $500000.00 on you trying to hunt this is offering to sell ticket master customer data directly on the document. conducted audits under both easy cuz you can get anything on the document. you can rent anything by anything. this 24 hour customer service money back guarantee. you can imagine how professional it is that will hold forums with data from identity theft are sold all mazda or even given away. must block for cove pushing bad bad for the companies that have been hacked was for the use is affected. now the personal data is a commodity on the document. like for example, of these unencrypted invoices from the multiple one hotel chain researchers at the house are planning to institute,
10:52 pm
obtain the records of the heck us to all the data in 2023. not only do they show who stayed with whom pent, when in which hotel, but they also contain personal data such as s's and credit card numbers. to the credit card, to be able to complete the detailed cost and past the credit card might cost a few cents, maybe a dollar. and you'll see you at just one of many. it's incredibly lucrative for criminals to take a little money into their hands in a lot of identities and go on an internet shopping spree t internet. i'll find out and cost what's looking. it's as easy as that. anyone who can skillfully combine pieces of stone and data could sign cell phone contracts, apply for loans, open bank accounts, all under your name, the worst case scenario. victims ultimately have to answer for crimes. they didn't even commit cyber crime effects more people than you might think. 2013 saw the biggest tech in internet history, with data from all 3000000000 yahoo accounts compromised. similarly,
10:53 pm
hackers gain access to more than 1000000000 data records at chinese online shopping dining alibaba. and it took over a year before the breeze was even notice. much of the stone data is sold on the dock. i had a group such as lock bid 3 point, no, show off the successes on a leak data page. hardly looks like the document does it. if you want to find out whether you've been hacked, you can do so easily online, the hassle topknot institutes, identity leaks, heck, a or a being pulled out. just 2 websites that collects information on compromise the accounts. you just enter your email address to find out, and if you're lucky enough to have been hacked or even locked out of an account, 1st and foremost, stay calm. the 1st thing you want to do is change passwords in all the accounts possible. you don't know what the criminal already has access to, so try to change passwords everywhere. some accounts, you might already be locked out of don't panic in that case. there really is no
10:54 pm
stigma anymore. about it. contact the technology provider, google, microsoft, facebook, whatever it is, the old doing does thousands of times per day helping people get back into their own accounts. that said, we should take precautions, protect your identities, through good passports, different passports, multi factor authentication, make it difficult to lock into your account so that if somebody tries to give up and browse, it goes somewhere else. secondly, have copies of the important data backups, physical backups, and costing those 3rd tip. if you really want to, to predict this of get a 2nd sim card, was a number that nobody knows. and you would use that to recover your accounts. and if your data is being caught of a breach, it's nothing to be ashamed of pack us can get to just about anybody. walk through
10:55 pm
a tech james, bill gates, even most, and jeff pays us, have in common. all 3 have that with the accounts hacked in one of the most praise on scans. in recent, he is in 2020 pack us treated our questionable investment proposals from numerous celebrities accounts they load, use us to send the bid con, and promised to double the investment to some, to where the use of it seemed like a good opportunity to scan was quickly uncovered and the culprits were later convicted. still, those cameras were able to catch a big con, will some 100000 euros. honda sing the power of celebrity for get rich quick schemes. a match made in scamming haven't. if you can take over a celebrities, twitter account and tweet some nasty things, you know, cause a lot more confusion then it's, it's an unknown person. and so of course, people with either money or high enough of a profile to, to get to money. that is
10:56 pm
a lot of money to be made from stone and identities, but some countries affected more than others. in 2022 over 27000000 people with victims of identity theft in india. one and 3 people see if it could happen to them . cyber security experts saga vision or ones of use reps to about digital identities to gather with a company inclusive a i. he wants to improve. the official intelligence literacy cyber crime in india has seen a significant increase in recent years from 2020 to 2003. then i have seen the i've seen an increase off 25 percent as by the official report and cyber plans. what is the biggest reason of this much increase is a low vista literacy in india. more than 900000000 people. how smartphones are destiny? please see if the under 10 percent deep phase one threat audio or video that's been
10:57 pm
manipulated with the help of a i took the me take the real person you can be tricked into thinking it person you know, is reaching out to you. for example, cyber criminals can use this technology to cause a lot of damage to the example if i give you about and the c or for a company and home phone. his voice and face was impersonated by a scammer. and the, and the money was transferred to another counter. what 29000000 euros to prevent such crimes in the future. intrusive, i, trans companies as well as law enforcement agencies and politicians, female influenza as especially likely to be victims of identity fraud. another example is women, we're this will identity, the fees is free. it's swept with another uh, online influenza. and the new a id is created,
10:58 pm
which is sellable by the scammers on line, the post such views, they post such content and the on money from the disliked entity of their b takes up politicians in india have been used to sway the electorate. the danger is really the truth is using the end and that means having to accept a certain risk. there's no 100 percent effective way to prevent cyber crime unless that is your plan on going off the grid entirely. so all we can do is take the cautions and stay vigilant. how has cyber crime effected your life? and how do you go about protecting your sensitive data? that is, know by the of the most people are going to choose big business. it is what it is. this week we're going to talk about influence as
10:59 pm
making big money. and the question is, do they have a big responsibility to society? i don't think that the person that comes to my mind when i'm going to places to meet people. so it is your duty, your own civic responsibility to participate in social discourse at the democratic society. the 77 percent in 30 minutes on d, w, the disruption is chaos is the goal. the wrecking crew is radically. they want to bring. this is how come the donald trump will be the next president of the united states? the vision works for him. he wants to increase. polarization. have to wait for
11:00 pm
trump rise to power. usa writes starts january 18th on d, w. the state of the news, these are our top stores. let's match a c e o box truck a bag says the social networking giant will scrap spock checking on facebook and instagram and replace it with a community based models to most of that use by x soccer bucks at the us selection was a tipping point and this platform would get back to its roots prioritizing, freestate, geography media. donald trump has threatened to impose terrace on denmark of, of greenland, saying the us needs the danish or economists territory for national security purposes are much president.
0 Views
Uploaded by TV Archive on