Skip to main content

tv   [untitled]    October 6, 2012 3:30am-4:00am EDT

3:30 am
they do collect some of data for example gill the cation. by fire information about. again locations of the person some of the personal information. identifications of course for the purpose of identify the user in such a network like people store something. and. as far as i concern and i need to say that they do not personally. those devices the what child they're working i'm just reading mostly for sources of the computer security. and they say that the all different forms not on the airport but all different and draw it. to see all provide information back to their producers about. the bod personalities is it
3:31 am
legal to collect this sort of information look good because otherwise how do they protect themselves from lawsuits have you ever read the user agreement license agreement if you or your buddies if not you know whether that's that's a problem because if you do if you would see in the agreement they will collect some of the information. and when you buy your device and you activate the device you automatically agree with dos license agreement which has this clause so basically you give your agreement using your personal information otherwise device wouldn't work so. one other thing i wanted to to clarify you mentioned some some information that they do collect when you mention apple store i mean you thought about who can details do they do they know for a little detail if you play in the. so they do the the pin code the everything
3:32 am
you. call not certain about being caught because you usually don't not provide and you provide the credit card information you give the number. and your security sure security number but not quite so they do have the details so theoretically they can use the data too to buy something in my name is not right. well it's very much theoretically it is that this happens here of course will not us that some somebody withdraw money from you you know how and so then what's so what's so worrying about it i mean do i have i think i think that i do not have anything to hide well from others i mean well what i do have to hide i don't put it under that and. so no i don't i mean i mean i do put my personal pictures in the net and who was that a two person but i still do have to worry about anything do i have to worry about
3:33 am
somebody obtain my card details my mind for example i don't know my medical records or whatever well location well so ridiculous speaking again where we're speaking to ridiculous. that somebody if somebody has so much information about yourself than. he or she or a company if it's a company and in this case it is a company might use that information for some other purpose and they have a big. maybe in desire or chance to use your information so that's not. that their presents itself. why they collect this information for what they do with it or use it somehow sure they use it mostly for providing you with different type of services spam. not necessarily spam.
3:34 am
you know on as a special market for services which is growing here and here i disapprove diktat that will hit eight billion dollars the us time. lose been poor choose a cell phone i switched to go live to one of the plane so welcome to munich. i was very badly. hit in you know when i traveled to europe and there was more going of course when they flew in and germany it was germany it's welcome in germany and then they ceased their border on my car and immediately welcomed me in fizzling so if you never answer the last years and so you know i wasn't terrible every time for example if i if i. get from my so phone and cruiser book called my travelling agent you know the next day i start getting. wired
3:35 am
towards towards australia. is that what you mean. not guilty services is something when you are for example walking down the street and see coffee on the right side or your mobile device says here there is a cafe on the right so you might know you. recently you know yes exactly oh look. you said that theoretically that information is available to to the providers can be can be somehow used to we may be used against me but we're their cases we're really happy if somebody was for it can you tell us about not not have but i would first tell about the case when there's information went up. just recently very recently alyson a months ago or at the beginning of fears this of september six of them or something. groups and to sec has announced that they
3:36 am
managed to get twenty million. and the difficult missions the intimate and user i.d.'s from i phone users. from that which we received from the laptop of a b i. of course. the client they had any leakage of information also declined to prove the case this hacker group put one million records up on the internet. they really did it so that's the first very. dangerous usage so bill imagine to do with. so i just don't get it so so these are these million dollar they're going to there's a records there's no records about users but the records they're all saw get the location of the user maybe not the current location but at least allocation where
3:37 am
you have been for a month or so it was sort of a good move but everybody knows where i am in the news we you are in the problem mom mom people well when i decided to interview you i called my producers who work the tele conspiracy pray give me five minutes she picks up both from me she knows where you are so i mean you don't have to be accurate well yes but if you are looking for somebody for a government agent for example or. your son which. has a big governmental or commercial secrets then that would be different story but ok now we see that buying just commercial i found that may be potentially dangerous for bruce you know your age does that whenever you know. that that was to keep secrets but can his security security from that can there be you know i will mobile device and be safe if i want to keep my privacy is it possible to overcome
3:38 am
this identification thing quite difficult difficult. difficult because you might for example might choose. yeah you might for him but your to the. i phone you can kill the kitchen but as a matter of fact. some of the experts told that despite. does agree to open your kitchen the phone still will send this information back to the producer so. there as a problem is that for example. is conducted so that you can not add any additional extra software on top of the roughly do you want a. phone bill for the jailbreak. they are more dangerous because they can come viruses for a whole year so it is it's another story when the open there you open it for
3:39 am
everyone and we only write. completely dependent on the providers if they want to get information about you they will and you know security service can help you. this is you never to believe a lie as we as we said maybe get a security service because a very quick come. in the miracle company and they. illegally demand. information about such and such so it's only a government agency can protect a government agency but the government offers certain countries that's a problem so for us being russians. co-founder of the spirit spotlight will be back should when you take a break. my
3:40 am
parents really truly honestly believe that what had happened was as a result of my father's exposure to agent orange i was born with multiple problems . i was missing my leg and my fingers and my big toe on my right foot i use my hands a lot in my artwork i find myself drawing my hands quite a bit to me for my hands you know just as if anyone would. but they do tell a story they tell a story of. oxygen. offers
3:41 am
an air show and an on a mission museum was a matter you. most of the residents never
3:42 am
profited from the film and since you'll see him coming all the sinners are there and you look up and there's one check in on you he's the alpha beta gamma he was all the the finance committee and he's let the guy with out there know what's going on they can pinpoint. the dirt right now. those shells become income mortal danger and a piece of art. sticks and fan base jacket. from him free. and there. are two. mornings today violence is once again flared up. and these are the images cobol has been seeing from the streets of canada. china operations are on the day.
3:43 am
3:44 am
plz plz. plz . welcome back to spotlight i'm just a reminder that we're guest on the show today is that talia kaspersky the co-founder of kaspersky lab an expert in computer computer and knowledge is this early and we just we just started talking about people be being safe not safe when
3:45 am
using their mobile devices you said that that the f.b.i. for example can contact the. headquarters of big corporations and ask them to to disclose all the hides so the information so if you are an american president to an american official you can feel relatively secure because because your government agency can control your security what about the russians as we know as we see it on television more than half of the russian high ranking official including prime minister medvedev they use those are gadgets i phones i pads all the time even even when. they work so those that mean that some of the information personal from mission can be disclosed and can be available for the biharis and so the russian the russian business and political elite is pretty transparent for the for the americas should they worry about. well.
3:46 am
that information on the external on their in more device exchanging it could have an edge and physically on this device i hope that the president was smart enough not to use the present of which were victims. rather than security is bought for him something in an ordinary store but to regularly see his location and some other stuff i don't think it will work differently than for us unless something there is not physically and listen what. is it an issue for example for you as a person who does business in this field for example to start working on securing personal information. in gadgets for my current company and doesn't work with
3:47 am
personnel but do you think it will be an issue like it might be an issue if. there is a technical solution possible because in some cases there is not possibility to protect that information completely it still needs to be investigated and secondly for the cost performance like apple i don't think it will be easier to upload such a function than it on the stock let's not you know there's so much ado about these gadget bad information shared by gadgets but people are pretty curious today and themselves i mean most most of the kids especially there they're all social networks they share their information pictures whatever addresses phone numbers i mean i did numbers and so what your family suffered because of that as far as i know i mean i mean your kid was kidnapped and then all started with social networking and the unknown not really they used other sources.
3:48 am
by locking him in but. but you're absolutely right about the prison. or search social networks unfortunately in our sometimes i even think how poor our children are because they are pull all what they have a. video for example on themselves and. i mean it understand that internet is the one big rating machine which takes everything in their forgets so if you once upon a time applaud that something then it stays in internet forever and if twenty years after you become or want to be watered as a president then this particular picture will be votes interestingness and i know that when you register in the social network you can stay there for a while if you want to quit those are the functions i want to kill my page and kill
3:49 am
all the information so what you see means that it doesn't really die you know there's. of course it states something where it may not be available to the wild but somebody can find it absolutely yes but really that's so that in the internet it's like a person's brain i mean everything stays there and you should only be be qualified enough to to find online it really is a true yes who has why you need to be careful enough evolve the cusp era that talia perske son was abducted but quickly released in april two thousand and eleven let's hear more of the story in a report from spotlight. the april two thousand and eleven edition of the russian corpse magazine put the antivirus software model he gave you a spare ski on the list of the country's two hundred wealthiest people shortly afterwards the businessman son yvonne disappears he was abducted the kidnappers demanded three million euro ransom for his release they reportedly getting the
3:50 am
necessary information about the younger kaspersky from the internet among other things they found out he had no bodyguards it one was snatched not far from his work in one of moscow's industrial parks and was kept by his abductors in the suburban house the rescue operation carried out by the federal security service and the police was quick and bloodless after the kidnappers phone call was traced a group of five people was eventually detained in august this year the organizer of the kidnapping was sentenced to four and a half years in prison. what should i teach myself what should my award is teach their kids what kind of world well. thanks should we teach them in order well at least to be. some our security is there something that the kids should never never share. certainly don't give
3:51 am
enough of personal information like home address how do you like where you are now read. function for example i am somewhere. it's. a good good thing for the robbery to start when you announce that you are now out of house for two weeks. stay with or make friendships was only people who personally and not every by dear. friend you know some stranger you who you are not so has. and well don't give too much information i think just. think what you do you know the problem with social networks somehow people are more open than they would be in the real world this is i think like more undress i think this is why they need the because people want to be open but they afraid to be open to strangers so they use it as you know as
3:52 am
a priest i made that that's a problem yes that's a problem so they become you would not have an address if you stay in a room full of people but you would under arrest in the internet which is very strange you know for me because it's like you have a very big audience a looking at you at the very moment and that's something which unfortunately children don't understand will give you date i mean you really should people give the real world around them so i don't see any problems with their real names plus if you really want to it is very easy but well not very easy but it's somehow easy to find out who the person is again and then you must in the internet is not really the case i know not tell you that you are one of those experts that are being used by by the russian government when the when the think about cyber security and stuff there's been reports that some cyber security strategy is being negotiated in
3:53 am
the russian parliament separate chambers. and you might be the strategy developed was all advisors yes. if they ask yes they ask yes well they did. they did in the past so what does this security is that something like well like the chinese know. well there is a discussion now there are many discussions sexually on different platforms about cyber security and about information security as such because it is you probably know russia pass book dream of security which was conducted there can two thousand and one and which is already out of date it is eleven years for information technology is a very long period and now we need to update that somehow or operate i don't know but i would say in real steps it's more like discussions around the topic.
3:54 am
well. in china there's need for a wall of china it's being is being criticized sharply by the human rights activist but it's praised by government officials because it's really something that the chinese built. do you personally think as a brother foreign by the way that that the this freedom of the spread of information should be somehow control i'm absolutely certain and a lot of the buying more but also took the logical. but both because you cannot control technologists on the by law it is impossible. and even in a controlled technologies by technologies but using the low for all. services or lawful. rules if you wish. because we see big big big problems and children being kidnapped or being involved in
3:55 am
bad networks so. drug distribution even if you look at the family or whatever so our children that don't do it in the internet and i'm certain that children must be somehow protected some very much for this limitation . some of the activist of the human rights says that it will potentially block that freedom of speech but. we do not do anything we would not have any protection would just stay in this door which is raising up every day and we need to clean that up somehow therefore i'm certainly a believer and that in by the way in most of the countries in europe and in america as well there are certain laws which protect. children against in
3:56 am
potential dangers information on the internet thank you thank you very much for being with us and just to remind you that my guest on the show today was natalee as you co-founder you are completely. dad so to know if you have your son spotlight drop we'll. be back with more comments on what's going on and alexandra. de you are going to.
3:57 am
overcoming a barrier like this seems impossible. but then you crave something higher. and when you reach the peak. you'll do whatever it takes to get all the talk of the world on artie's. download the official ati application cellphone choose your language stream quality and enjoy your favorites from alzheimer's t.v.
3:58 am
is not required to watch all its hear all you need is your mobile device to watch r.t. in any time. soon which brightened. soon from phones to christian. means friends don't talk t.v. don't come.
3:59 am

34 Views

info Stream Only

Uploaded by TV Archive on