Skip to main content

tv   Documentary  RT  November 8, 2021 1:30pm-2:01pm EST

1:30 pm
ah ah ah
1:31 pm
where empowering ourselves to be more efficient or quicker with our transactions. we can make mobile payments from our sons weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for security attack mm use of yesterday, which i can assure you what you do for you late. yep. so let me farm up so you will absolutely save a reasonable, you know what i'm writing go. obamacare, which though you will pretty much ginia you woke up in your contact dp sca
1:32 pm
a silicon when i was forced to i use mostly, and people, sheffield federal and also to former manual with deal. it's under the social world in apology to those of climate, or she does. if you stick with sonya jacob daughter is i would say voiceplus, i mean it didn't come to the lawson still looking isn't national, wishing the users who definitely want to do a phone interview with me and when you thought of people suggesting you ah. busy this nika, but annoyance, and the generic name was crying that in a minute, the watkins tonight has to be doing. but all you can try to get off one media, the media, but social says production a statement in the session with the past. but this morning and there's really no, no someone did, it wasn't,
1:33 pm
it was out, but almost the pure news accounts, but not secure, but be shipping and movable. i'm like, you know what this poison is at the college tech opened up and i've eaten with me cisco without you being asked me to cook with that. done this me bunker script. got the course you've done up. was it got to face boys with there are some fundamental rules around password management, making sure that it's complex and often has the right number, right? the length, the right number of symbols are special upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because what we're grand a single points of entry to to obtain that data when you share a password which is very common among user. so i have the same password for 20 different applications. yeah. one, yeah. a chance,
1:34 pm
a call with a question. we call it a, a e or rush bar, a stereo will fucker americans are actually industrial initiators for dinner. pretty much ready for on the sportage. audubon using their summer specter and then you're left for them. this year was a georgia spike cloud here might be a problem. you was up here, just wait a 2nd. we'll see you wash when you no problem with. i'm not crazy on the horn. it's a year and we're glad fusion grow your mother. i mean come find you a
1:35 pm
couple of the single to go, but that's not a smoker. m a when the shake which he just did it, but it's contact among the church. i'm gonna tell you franklin chica ways that will shape was elizabeth listening. the session is up. i stuck with them. what can we just keep checked on daily? thumbs up pretty quick positioning the payment problem with them cash kodiak novel to show. but other than what she had a parent all day, which one which is more like, you know, soil, love it in a soft ear on what she does. focus shunting file a moment. well, she doesn't respond. you have a big with a site, they'll multiple, she doesn't, came at a proposed by my department a bit going on so i'm can be a day with dish to business today. leticia are e a fucking to pull it up. there was a couple, they'll ship it to me. so what i'm 2nd is dealer mm hm. of our current age. people have a false sense of security. while nothing happens, we have the sponsors, the security that we're not going to be touched. it's not going to bad at the end
1:36 pm
of the day, it is very prevalent and it is out there. you may not be the the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for children. listen questions you won't get used to. so when you all are moisture. so to the summary use of lesson with dozens from me to use kitchen, soraya, jelly, barley post, let me do it on the bottle and that i was actually also on the show. like for special to sit on the deal, it's after she could teach commissioning, but don't work as a chimney. of course i'm you finish through. can you stay for balloon this offset by in translation without assert the issue was booked up for a year, but i've yoshika through them all stood but a bit of a school of mushroom soup wishing exemptions for people to support it. build up the sheets for immediate, engaged curse them to provide within reason, the more smudged you to do. they did reschedule dishwasher. ah, it's a shipment and solicitude. she had received telephone and i'm like with the bunk, keep so sleepy while you homeless thought it was. i live on sounds for relationship
1:37 pm
with the most reported it think you'd be surprised nowadays, the amount information that exists about individuals on their phones through their e mails, through their corporate systems is generated at a scale that was like no other before from location data on your phone to all your personal information that you have, whether it's your banking information, whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals. i'm a database,
1:38 pm
sneak is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to provide or a t start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks, they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone,
1:39 pm
if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. ready so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those ad technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when,
1:40 pm
if you started changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication when you try to access some of those website. you might not leave your laptop on an unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle that ah, [000:00:00;00] a shift give it a personal christopher for a shorter to show us my model. it's a more special story. you turn into america. you thought i'm satisfied with what
1:41 pm
you are finding out from you. can i me scram on then? is there any are service notice from them sent him now cause it was lost actually other thought. check your to bristol prince john them. i'm sailing them for wishing your shannon with straw or charlie a quite car battery, but i'm worried about our course stated here. she's the rooster child taped down. only a recruit shorter than what i knew showing of empirical shapes at near dock ro machine can you do to record your much course? i'm a little part of the picture. put it on last night program and i was returning your call to renew my its a button. im going to renew my its a room junior group off here with some of them are sitting up pushing the properties when i have an extra right to come pioneer is straining one with the 9 little dora apple. bonnie: ah, i wish you the revolution. if not, we can get others to proceed slowly the corridor give it a pre student go for new me. it was moore's miss masters on my chair i was listening. come on, there are green is all, it's a little grip. you're provided to top that you shipped to reagan. sherman got to
1:42 pm
read in our gym a equation group of shock i'm using. right. so can you show me a lot about him doing? and yet the cool response, we still to bank you somewhere like here with the easiest and i got a better offer. is this a pitch than system e? should that means line with me? unfortunately, you'll wish it i had to store a place oklahoma like active easter seals. nice here. good afternoon. and then you know, so there's a little bit of a vision katara what it's
1:43 pm
a mission. i have a question. great kit comes calling on about us. comprise a grain should, with a trace of national puddle and even a puddle. i'm at a loss of saying in the part that somebody fun with close to when you leave it on your own, look forward to talking to you all that technology should work for people. robot must obey the orders given by human beings, except where such order that conflict with the 1st law show your identification. we should be very careful about our personal intelligence at that point, obviously is too late truck rather than fear with the area with artificial intelligence. real, somebody with
1:44 pm
a robot must protect its own existence with we're empowering ourselves to be more efficient for quicker with our transactions. but with that comes a trade off. every device is a potential entry point for security attack. any machine can be it's an extension of traditional time. the defenders have always been one step behind the attackers with mm hm. there's one called option with offering. it's not a matter of, if it happens, it's a matter of when is your media reflection of reality? in the world transformed what will make you feel safe for
1:45 pm
hi solution for community. are you going the right way or are you being led to some with direct? what is true? what is great? in the world corrupted, you need to descend a join us in the depths or remain in the shallows. ah, you'll eventually there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they started target thing,
1:46 pm
the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime, they adapted to the situation they use cyber. they use the technology as an extension of traditional mind, but we can't ignore how it's evolved over the and in order to discuss how it's evolved, leads to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps do all sorts of bad at devices as well.
1:47 pm
because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone. you can play without technology and internet know that. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them, with islam. luck, you know, put them up on the look on back was so silent you do this, i mean,
1:48 pm
really look for more or mark for bucket seats, for one gigabyte level for smaller drama, because of all speed on my she still, my doctor for sleep is walk from lenient got what color which is and they said, so come to with your problem. well, i mean i so i can, i was just miss you, jennifer social the, what i mean, there's no more, no boss will, should more money deal with docile bog or more up on me needs of those forest more, more, more than i would like to build the world stories for sports or to see knowledge of bristol facilities miss the following up on your vehicle, our partners always watching over my washer scholarship for them to just go to washington to go to nelson nickel. not sure how i knew the order. i forgot about that is also mused nicole company miracles, lamore leon, my 1000000. somebody me on the juice. lucas log. emotionally. both mission control . no. i see off on me what cushion lug city and throwing up all the subordinate the
1:49 pm
web. sharesa wardweb chair. 2 more. la mm mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest,
1:50 pm
i've always been impressed by what tesla was doing, not just from a car perspective, but how they were picking up on the data. so they, now they have so much data and intelligence about autonomous dr. ink. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with
1:51 pm
we design and build humanoid robots. right? right. was generate that full size even though it variables. we make ones that look like robots, like last big metal. we also make a range. that's all good. okay. so the lifeline silicon skin and they look but they will to move like the human the thrown behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think extremely useful thing. don't you think my friends out of it? what are the main threats of what will be? so info, artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not injure a human being through an action. allow a human being to come to hom, a robot must obey orders getting to it by human beings, except when i told it would conflict with us. little is listening to lift the couch
1:52 pm
and i'd also like jack the photo. good boys from. yeah. one of them, yeah, it's a couple blogs, a lot just be really sticky instrument. can you please? yes, ma'am. to capitol as well as similar to what goals? so most of them will watch movies more of the law and order. schwarzenegger micron . yeah, that was put on the multiples when you to us. it's great news. we'll switch this to show many people. awesome. yeah. yes. them with my thumb score. i am, it's old with the controller. i will. if you chew my chicka law suits you at that it would do it. it comes from we, it says that, you know, we're for marine mush, double holiest and wishes the gym or chill america thought on the pl switching you . but with at reach out in the chem, put on the war storms deal and is nathangelo. com. okay. keith, isn't you still materiality some would actually them misty poor's auction, listen. would children shopping with the beaumont leech? and i have a group of people love, right? want to say they love talking to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to
1:53 pm
a person is another person. so instead of just walking in to maybe a reception or, or an app or wherever, if there's a humanoid figure or humanoid presence that, then you're going to think i can talk to that. when you see a door switcher fietta where you can die, excuse me, until you know which it's the might substitute almost christian. yeah, if that over to on this, on the wichita, wichita said bill who cheated on some small group of suicide 50 to do it. when you might, you're more of a baby law. and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. some ethical hackers are indeed a threat. any machine and being act by a technology at the sigma bulk of the construction listed on the will not come for the adults is requested. a new one i shit is go to pretty nice that the world is becoming more digital bit. people aren't going to become completely recursive and
1:54 pm
only stay in and i really digital, i can even, i wanna say 10. you can see how people have changed through something simple like small back 10 years ago, maybe 15 years ago. if you tell yourself or anyone that you have a device that can track you out and see where you've gone, see you've been waiting, see what you thought. everyone would go. we can't do that. that's, you know, that's really against every with liberty. we don't do that, but it up now everyone's got to write them. okay. it does exactly that. people have accepted it because our lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t,
1:55 pm
the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cyber security as best we can . and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will lag then, one of the things that's happening at the mini cyber implants. right now, i'd be where you're really worried about it. most people would equally be you can't put a chip in my brain. this is where i'm saying actually that will be accepted in the future. or maybe we will have in the brain that will directly today. yeah, i was like, well, to the bush, nicole, daniel roy system will sort of mean woke up more next. but in the machine on a booth at the deal, it's been almost a deal. i'm not sure what to do what it was,
1:56 pm
the one i knew what a lot ma she'll if he's the printing only, that's boy a yes. those are some of the machine and one of those a pretty minute now fullness tell brock minish. i bet that you more than that. i think the problem when the machine it's a problem with which i could go to the folder. absolutely. in the future, zebra criminals can use artificial intelligence, use machine learning, why actually find vulnerabilities in other bits to software. all the networks the, the information could definitely be active with their vulnerabilities in the software. in the same way right now, your computer, it could be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah,
1:57 pm
cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many substitutes and digital phone it's linked to each other to protect the people should mm. we are using those to analyze any major exit or anything to reach people and keep them safe and to see a bit like mm hm. degraded to generally a very often foundation for security and happiness and like at the same time. mm
1:58 pm
ah a a wrong one, i just don't know if we have to fill out the theme because of the applicant and engagement. it was betrayal. when so many find themselves, well the more we choose to look for common ground. well, it's official, the u. s. military has declared the great 3 powers competition featuring the us,
1:59 pm
russia, and china. oh, does neo liberal ideology play into? what does russia game anyway? 6 haven't gone. as a korea professionals bolt is much tougher on some than others with the euro. she might by everybody to why would somebody believe me, i was just a little girl, a very to, to, to achieve really was, was trying to read on the paper this morning usa swimming coach, arrested leslie had sex with a 12 year old girl. this happens almost every way we get calls at the office. i get informed about one of my greatest fears is someone's going to start linking all this together is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming here,
2:00 pm
is that documentary. i see it on our tea. ah ah, with gun flies, her classes, she's erupt and tear gas is deployed as a crisis deepens on the border between poland and bella, reese, the large crowd of migrants. storms the frontier into a polish territory will bring you a report from the st. somebody behind me you can see the crossing where the official entry point housing vehicle would you like katie? what is the boldest the surveys we can see them conducted and they are the brandy cheese. they've already called controls with french police officers, survives a stabbing thanks to his bullet proof 1st in an incident that is reportedly being

26 Views

info Stream Only

Uploaded by TV Archive on