tv Documentary RT November 8, 2021 10:30am-11:01am EST
10:31 am
where empowering ourselves to be more efficient or quicker with our transactions. we can make mobile payments from our stands weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for security a time with which i can assure you what you do for you more late. yep. so let me follow up so you will absolutely save revisions. will you know what i'm writing? go obamacare, which though you will, pretty much genia you woke up. she, you conducted the sca
10:32 am
a silicon i thought was forced to let you know some people will share with your former manual with deal. it's under the social wonderful chichi of those with climate. but she does. if you stick with a can come to the lawson still looking isn't national machine, the users, he doesn't you what did a phone interview with you when you thought it will suggest when you. busy if it isn't as nika, but annoyance, and the generic name was crying that in the minute the watkins nation. yeah, it goes to the dean. but all you gotta form in there, the bus motion with a statement in the session with the past, but she could come in late. no,
10:33 am
no someone did it and it was out. but the accounts been messed you. but be sure to move it on like just what this poison is at. the college tech opened up and i made a mistake up without you being asked me to go with that done. miss me bunker scott. the course if you could done was it got to the boys with there are some fundamental rules around password management, making sure that it's complex enough and has the right number, right. the length, the right number of symbols are special upper lower case. that type of thing, that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because what we're grand a single points of entry to obtain that data. when you share a password, which is very common among user, so i have the same password for 20 different applications. yeah. one. yeah. all of
10:34 am
a chance, a call with a question we are calling to period with marsha brown museum will at about a year rush bar bondai a stereo will fucker americans. that's her last year just told me she had her report to print a report with the sports on using their so my spectrum and in your for them this year was a judge in spite cloud. your hair might be a problem. you was up here just way calling a certain little sleep wash when you no problem with that. great. you're on the horn. it's a you were glad fusion, grow your mother. i combine a
10:35 am
couple of the seen a m a when the shape which he just did it, but it's contact among the shades. monitor you complex takeaways that will shape was elizabeth because the whole machine, the session is up. i stuck with the district and what can we just keep checked on daily? thumbs up pretty quick positioning the payment problem with them. i just couldn't afford to show them up. she had a parent all day long, which is more like, you know, soil, love it in the soft ear on what she does. something file a moment. well, she does look cities, plenty of cousin. i was a big with a site, almost pushy little committee. approached by my department a bit going on, so i can be a day with rich to business today. leticia a fucking a couple of the shipping only samsung. what i'm 2nd is dealers. mm hm. of our current age. people have a false sense of security, while nothing happens, we have the sponsors, the security that we're not going to be touched, it's not going to. but at the end of the day,
10:36 am
it is very prevalent and it is out there. you may not be the the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're going to be frustrated for leasing questions. you won't get used to so when you all are moisture. so to the summary use of lesson with buildings from me to use kitchen, soraya, jelly, barley, post, let me do it on the bottle and that i was actually also on the show, like for special to sit on the deal. it could, she could, you can wish name, but don't worry as a cheer mccoy. some you can, if you can use they for calling this office in bio translation with other cert, the issue was booked up for a year, but ive yoshika through them all stood but a bit of a school of mushroom soup wishing exemptions for people to support illness the sheets for immediate gaze, cumbersome to put drug within reason, the more smudged you to do. they did reschedule condition wash. oh, it's a shipment and solicitude. she had received telephone and i'm like, we've got one kid feel sleepy where you homeless thought it was. i live on sounds
10:37 am
for relationship with the most reported it think you'd be surprised nowadays, the amount information that exists about individuals on their phones through their e mails, through their corporate systems is generated at a scale that was like no other before from location data on your phone to all your personal information that you have, whether it's your banking information, whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone visit, the big an impact and risk on individuals from database sneak is identity theft. if
10:38 am
someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to provide or at least start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone,
10:39 am
if you're apple or some other organization that's creating innovative products, those exist consistence and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. right. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those ad technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens the matter of when,
10:40 am
if you started changing your culture to become more aware of that, then you'll start applying some security into your day to day for example, you have stronger passwords, you will do to factor authentication when you try to access some of those website. you might not leave your laptop on an unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle that ah, [000:00:00;00] with shift give it a crystal christopher for a shorter to show us my little more special story here, as we turn into america,
10:41 am
you thought i'm satisfied with what you are financing. can i me scram on then if any of our service orders from them sent him or snuffs their suki, don sent you to bristol prince john them. i'm sailing them for wishing your shannon with straw or charlie a quite scar authority, but i'm worried about our course stated here. she's the rooster beach. i'll take down your only recruitment shorter than what i knew showing of empirical shows that near doc, room machine can you do to record your much course? no. not a picture. put it on last night program and i was returning your call to renew my its a button. im going to renew my its a room junior group. you're off here with some of them are sitting up pushing the properties when i own a car for her to come pioneer is straining one with the 9 little dora abdul bonnie: ah, i want you to report a doctor's precise, lonely beholder. give it a pre student, go for new me. it was most of them. i chose, lucian, come on. there are green. is all, it's
10:42 am
a little grip. you're provided to talked to shikeria. cham read in our dims. ah, i can commit a certain effect. bradley bethel was out of somerset carry equation group a shock and using my 2nd shamika on ash and yet with no problem, i can go ahead, sorry about that. i was the minds a lot about i am doing. and yet the cool response we're still to bunker is somewhere like here with the easiest and i got a quote from repair of car. is this the jim stein you got the cover letter but attached and system e should answer ms. lambert latasha that almost me unfortunately deal. wish it i had to store and use a lot of the door isn't probably near to like here someone there, but it is so hot or shoppers, oklahoma like octave easter seals. nice hear. good afternoon. my sound menu. so doesn't go to rock of just of egypt. or some yeah, do you have like a stroke or if this is virginia katara what it says shipper? so hope it's caught on this and i have
10:43 am
a question. great. it comes i calling on behalf of comply with our grain should with the choices private news and the chanel was me. is the easiest thing unless you're in military, some national puddle in europe, puddle. i'm a polka so saying in the part that somebody fun with close to when you live in and i make no, no borders. i'm just like to tease a new face is emerge. we don't have a therapy, we don't have a back seat. whole world needs to take action to be ready. people are gonna come in with them. we can do better, we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great. the response has been massive,
10:44 am
so many good people are helping us. it makes us feel very proud that we're in it together with as a korea professional sport is much tougher on some than others. and she was a euro, she might buy everybody. so why would somebody believe me, i was just the needle girl to price upgrade to, to, to achieve really was was proud to read on the paper this morning. usa swimming coach, arrested leslie had sex with a 12 year old girl. this happens almost every way we get calls at the office. i get informed about one of my greatest fears is someone is gonna start linking all this together. and it's going to be a 60 minute documentary about youth coaches in sports like gymnastics. swimming, is that documentary?
10:45 am
i see it on r t o is your media reflection of reality in the world transformed what will make you feel safer? high. so lation for community, are you going the right way? where are you being led somewhere? direct. what is true? what is faith? in the world corrupted, you need to descend a join us in the depths or remain in the shallows. ah
10:46 am
ah ah, so essentially there's malware a 1000 maybe sometimes failures each day the spending gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number in transferring money and conducting a lot of scam bites and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we
10:47 am
can't ignore how it's evolved over the. and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps do all sorts of devices as well. because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv, these smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet deal with it. so even sometimes you would see some impact, the privacy impact, secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them
10:48 am
with me. oh, really? near la la, you know, put him up on the toilet. the way possible to look on that wasn't so silent. who do i need to look for the put him on a bucket seats. all you got a little smaller on bill went off. i'll speed on my system. i'll darker for hours to sleep is woke up probably like i was just and they said, so computer i'm mm. your problem. well, i mean, i so i can i wish you jennifer social the 1000000. there's traffic more not possible. sure. more mozilla, docile burglar. more up on municipal storage spot more more, more than i would like to build the world stories for sports or to see knowledge of british facilities miss the following up. what are your vehicle doctors with
10:49 am
watching all marvel shows for us to put them disco? motion. that video, nelson nickel. not real. sure for why near the what the article a little off that is off say missed. yes. good company, miracles, law morley and my 1000000. somebody me on the jews locals. larger more. you mushroom book, mission control. no. i see funding what christian looks at the internet on a subordinate the web sharesa wardweb share is 2 or more, la might mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware,
10:50 am
where their entire public transportation system was completely useless. they could not recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in a different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what that's what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience
10:51 am
with redesign bills. humanoid robots are i right, boss. generate that full size. even our grave was we make ones that look like robots, a plastic metal, but we also make arrange that's all you and okay, so lifeline. silicon skid and they look, but it's a move like the human, the thrown behind you? yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of what would be so and so,
10:52 am
artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not injure a human being true in action, allow a human being to come to hom roberts master bay. old is getting to it by human beings, except where such holders would conflict with the law. is listening to lift the couch and i'd also like jack, i thought a car could boys from yup. want to put me out sick. i can blog with some the was a law just pretty really sticky instrument because you freak yes. instrumental capital. as well as similar to what you call us semester, and then we'll watch movies more. the la schwartzenegger micron. yeah, that was put on the multiples when you to us, it's great news. we'll switch this to show believe if you put off them yet. yes, a 0 my gum score. i am, it's are all but the thought i would, if you, she my chicka thought a switch it would go 80 to comes from we. it says that, you know,
10:53 am
we're for more reason most of the hallways and we saw the gym or chill america photo. pl. switching with each other in the chem, put on the more stones deal, and there's metallica keep isn't just materiality. some would actually them, these 2 boys options, placement with shopping with the promo each and i have a group of people long, right. want to say they love talking to them. the tasks are able to do is to convey messages to talk to you and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a humanoid figure or humanoid presence that then use, you're going to think i could talk to that one, use a switch or the other way. i can die school until you know which it was the might so then there was a crew chin if that. oh, but on this, on the wichita, wichita said, bills were cheated on some small group of suicide. if you do it, you might joy that preview law. and what you know about hackers are you speaking
10:54 am
about ethical hackers on ethical hackers? unethical markers, unethical hackers are indeed a threat. any machine and be hacked by a technology at the ceo. a will not come for 2 adults requested a new one. i should cities keep opening. i see that the world is becoming more digital, but people aren't going to become completely recursive and only stay in and i really use digital like, and even i would say 10 years you can see how people have changed through something simple like small and like 10 years ago, maybe 15 years ago, if you tell yourself or anyone that you have a device that can track you out and see where you've gone. see, and you've been written, see what you thought everyone would go. we can't do that. you know, that's to really, again, everyone's liberty. we don't do that. but now everyone's got
10:55 am
a device in that book. it, it does exactly that. people have accepted it because our lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out and we will all. and then one of the things that is happening of them is cyber implants. right now i'd be where it really worried about it. most people would really be you can't put a chip in my right bob,
10:56 am
this is where i'm saying actually that will be accepted in the future. or maybe we will have implant from the brain that will directly today, the outside world to the bush. nicole daniel bro, system, most of the name on the machine on a booth at the deal. it's been almost a month i just deal on. i'm not sure what to do. what i see is that there's a prelim, you'd wish the one i knew what a lot my she'll if he's the printing on the students, there we go to schedule a psychiatrist or 2 i, yes, those are some of the machine. one was a 3 minute now fullness tell brock minish. i bet that you're more than that. i think the problem when machine it's a problem with which i could go to sleep on the phone. got it? absolutely. in the future, this is simon criminals, can use artificial intelligence to eat machine learning to actually find vulnerabilities in other, other bits of software on the network. so the,
10:57 am
the information could definitely be active with their vulnerabilities in the software. in the same way. right now, your computer could be hijacked and your search engine to be re directed to a different website, which will give you incorrect information. ah, cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many against substance and it still looked on. it's linked to each other to protect the people into i sure there are using only do
10:58 am
10:59 am
it shows the wrong one. i just don't know if you have to fill out the theme because the applicant engagement it was the trail when so many find themselves well, the part we used to look for common ground we're empowering ourselves to be more efficient for quicker with our transactions. but with that comes a trade off, every device is a potential entry point for security at any machine can be it's an extension of traditional time. the defenders have always been one step behind the attackers both permit when one comes option in the water. it's not a matter of, if it happens, it's
11:00 am
a matter of went with ah gun fires heard, plush is our up done. tear gas is deployed as a crisis deepens on the border between poland and bella, luce gonzalez, a large crowd of migrants, storm the frontier into polish territory. we'll show you a report from the scene is the trace control plowed strip of land used to detect traces of intruders across the national border, and they are the refugees. they've already crossed the trace control, straightened along with a french police officer survives this style being thanks to his bullet proof vest
25 Views
Uploaded by TV Archive on