tv Documentary RT November 8, 2021 4:30pm-5:01pm EST
4:30 pm
imac kaiser with more of my guys, his financial survival. this is a hedge fund. it's a device used by professional scale. you eggs to earn money. that's right. these hedge funds are completely not accountable. and we're just adding more more to them . totally. they stabilize that global economy. you need to protect yourself and get inform. watch guys who are all driven by dreamers shaped bankers. those with theirs sinks. we dare to ask, in
4:32 pm
ah mm. in for an hour in ourselves to be more efficient or quicker with our transactions, we can make mobile payments from our stand weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is out there, there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is potential entry point for security
4:33 pm
a time with more choice in the shortness uniform late. yep. so let me farm up. so if you're absolutely stable, reasonable, you know what i'm writing go obamacare, which so you will pretty much danya you woke up. she and you conducted a silicon that was supposed to like easily. and people would share with your former manual with dealerships under the social wouldn't she to guide me to what she does? so if you speak with a i think under the lawson still looking is national, wishing the users
4:34 pm
a . busy this in your car, but i'm went and the generic name was crying that in a minute thought of the dean. but with this you could come in this way. no, no someone did. it was out. but almost the account's been nice to you, but be sure to move on like, you know what this poison is at the college tech opens up and i be in with cisco without you being asked me to cook with us. done this for me. bunker scott the course, if you can done up with these boys with there are some fundamental rules around password management, making sure that it's complex enough and has the right number. right. the length,
4:35 pm
the right number of symbols are special. upper lower case, that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're grant a single points of entry to to obtain that data. when you share a password, which is very common among user, so i have the same password for 20 different applications. yeah. one. yeah. all of them. a pretty. i was in the question with marcia brown a year in rush, borrowing a nash, industrial generous report to print a report with the sport or specter and then you're left for them this year was i?
4:36 pm
and now spike loud here. might be a problem. you know, just way calling the bus monitor to record your service or will sleep wash when you no problem with our crate here on the horn, it's a year a fusion grow. if you're margaret a company or a triple play the single term income, but that's on somewhat less of a smoker. m a when the shade which he just did a reported contact among the shirts. i'm gonna tell you franklin taker when he's that will change boys. elizabeth will, michelle, the session is up as like with the district, you put them. what's critical going? just keep checked on daily. thumbs up pretty quick positioning the payment problem with them. cash. it could be, i can afford a show, but other than what she had a parent all day that voice, bullshit. mortals like you know, soil love it in the soft ear on what she does. focus something file a moment,
4:37 pm
but she does have cities bonnie of color browser big with a site. they almost push a little community approach by my the perimeter bit going on. so i can be a day with rich to business today. leticia for some great for quote, a fucking to pull a couple of the shampoo, my samstone what i'm 2nd is there a dilemma of our current age? people have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for sheila, i wish in places you won't get used to. so when you all are moist. so the last time we use a lesson with phone meter. yes, good general tara. yeah. julie probably post. let me do it as a part of that. i was actually also from the show, like for special to stanley deal. it could, she could teach commissioning, but don't we as a cheer for some reason, it's still,
4:38 pm
can you stay for balloon this often plans, especially without assert the estimates book that's for a year that i've yoshika through them all stood but a bit of a school of mushroom soup wishing exemptions for people to support illness. the sheets for immediate gains, cumbersome to provide within reason to a more smudged youtube. they did a contract with dish washer. it's a shipper's, it's alisha. she receive telephone and i'm like, leave my card, but keep so sleepy. while you're homeless, dorothy, like bon sons for relations to go to mush reported it. think you'd be surprised nowadays, the amount information that exists about individuals on their phones through their e mails, through their corporate systems is generated at a scale that was like,
4:39 pm
no other before from location data on your phone to all your personal information that you have. whether it's your banking information, whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to provide or at the start to create an identity theft type of exercise. they can maybe go to a bank pretending to be take loans in your name,
4:40 pm
take credits in your name when they access your email through fishing attacks. they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist assistance. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of
4:41 pm
those ad technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication when you try to access all of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with
4:42 pm
ah, [000:00:00;00] a shift give it a pistol for a shorter to switch. my little more special story into america. you thought i'm satisfied with what you were finding out me. can i me scram on then if any of her separation notice from them. so i am now clause with the other thought, said bristol prince john, them, i'm sailing enough for washing machine on a straw or try to get quite scar authority. but i wanted to talk with you only a recruiting shorter than what i knew, showing up a bit of cliches that new dog groomers name can you use to record your much course on a picture, put it on last night and i was returning your call to renew my a to plan. i am going to renew my and so we were doing
4:43 pm
a group off here with some of them are sitting up pushing the property when i own a car from the heights you come pioneer is showing him one with the 9 a which is the revolution you can also look at the doctors slowly backorder, give it a pre stupid go for me. it was more 1st after that my chair doesn't come on. i mean there's always a little grip here. ready to talk like you shikeria chem and g for june . i guess can get a better with status. my fake bethel, someone say to me, katy equation group was shock. i'm using my 2nd be shamika nash. and yet that go with the boy and they've yet, i'm gonna show with, i mean, i can get any better, get those the mindset about i am doing any adequate sponsors. filter bunkie is on like here with the easiest. and i got a quote with my is this the jim stein? yeah, the come i live,
4:44 pm
but at some ear chavez lamb with latasha. but i must meet lamp switch lent dealership. i had to store a supplement, but it is so hot. shoppers, oklahoma, like octave easter seals. nice hear good afternoon and then you know, so doesn't go to rock of just and with this just a vision katara what it says, shipper. so hope it's caught on mission. i have a question. great kit comes calling on about us, comply with our grain should with the news. and the chanel was me. is the easiest thing unless you're in washington national puddle in the u. n. a puddle. i'm a broker. so saying in the part that somebody fun with close to when you leave, ah, well, the fund i make no,
4:45 pm
no borders line to tease and you as a merge, we don't have authority. we don't have a back seen. the whole world needs to be ready. people are just, you know. 2 come in with them, we can do better, we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive. so many good people are helping us. it makes us feel very proud that we're in it together with oh,
4:46 pm
seemed wrong when i just don't move any new world yet to say proud. disdain becomes the attitude and engagement equals the trail. when so many find themselves worlds apart, we choose to look for common ground. ah ah, essentially there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will
4:47 pm
try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we can't ignore how it's evolved over the years. and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps, do all sorts of that and devices as well. because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's
4:48 pm
a smartphone, there's a smart tv, smart cars, smart homes, you can't live without your smartphone. you can't live without technology and internet with it. so even sometimes you would see some impact, the privacy impact, secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with, [000:00:00;00] ah, really years old old law. you're putting up on your toys near the way close will
4:49 pm
look on that was so silent you assignment to remove the putting more a market research and all you go vulnerable for smaller on because of all speed on my system on darker for so sleep is walk for probably in the got calla, which is and they said, so come to that. i'm me see a problem. well, ms. watson. i so again, i wish macy jennifer so so what i mean there's dr. morner possible. should mozilla docile bark while i'm warm up on me? in each of those stores for more more, more than i would like to build the world stories for the sports or to seek knowledge of bristol facility. miss the following up order re exile dr. school was watching over my washer scholarship. i didn't want to just go to washington to go to nelson, near or not sure for all i knew the author. i forgot about that. his officer mused . yes, good company. medical is lamore, liam of the my media. somebody me on the juice. locals are more emotionally book mission control. no, i stuff, i mean, what christian looks at the internet on
4:50 pm
a sporting web. sharesa. wardweb share, 2 more la might. mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be hacked. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest,
4:51 pm
i've always been impressed by what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with
4:52 pm
we design and build humanoid robots arrivals, generate that full size even though it variables. we make ones that look like robots, a plastic metal. we also make arrange that all human located lifeline silicon skin and they look but there was a move like a human being the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of what the visual with artificial intelligence has not many main threat. this is due to the 3 was have robotics. a robot may not injure a human being true in action, allow a human being to come to hom, a robot mazda bay orders getting to it by human beings. it's that where stockholders would conflict with the bus little thing to lift the couch and also lloyd. yeah, avoidance to him. yep. want to put him?
4:53 pm
yeah. a couple blog with something that was a law just previously. stickiest america. you, craig? yes, ma'am. to capitol as well as similar to what you call us semester. i'm in washington law and order. schwartzenegger micron. yeah. that was put on the a multiple is when you to wash. i scraped knee will switch this to show me, but if you put all some yeah, yes, a 0. my thumb score i am, it's are all but the cutoff will near future. my ciocca thought suits here. 3 would do 80 to come to me. it says that, you know, we're for maurice mush, double holiest. and we saw the gym, no chilly america photo. pl. switching with at reach out to me. chem, could i miss the war stones deal? and there's me follow, i'm a coquettish each committee alex is some would actually with him just to port his options, placement with shopping with the bowl each night at the cooper people love, right. want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to
4:54 pm
a person is another person. so instead of just walking in to maybe a reception whole or an app or wherever, if there's a human noise figure or humanoid presence that then you're going to think i could talk to that with a switcher fietta where i can die, excuse me, to live. now which it says the might stop soon, there was a christian. yeah. if that. oh but on this, on the which which outside bills were cheated on some small group of suicide. 50 to do it. you might enjoy that pretty real law. and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. ethical hackers are indeed a threat. any machine and being a bulk of construction listed on the will not come forward to adulthood requested a new one. i should to the speaker go to putting on that the world is becoming more digital bit people are going to become completely recursive and only stay in and i
4:55 pm
really use digital liked and even i would say 10 years, you can see how people have changed through something simple like small by 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that can track you out and see where you've gone, see you've been waiting and see what you thought. everyone would go. we can't do that, that's, you know, that's completely against everyone, liberty, we can't do that. but now everyone's got a device from them. okay. it does exactly that. people have accepted it because our lives are inherently carry with them. the more we allow our lives to be taken over, if you can use that term with digital aspects, with io t,
4:56 pm
the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out with. one of the things that's happening at the minute is cyber implants right now . i'd be where they're really worried about it. most people would equally be you can't put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. maybe we will have in classes that will directly today. yeah, i was like, well, in the bush, nicole daniel roy system more sort of a d at the machine on a booth at the deal, but also need a deal on i'm not sure what to do. what id supported. i mean, wish the one i knew what a lot my shilling. he's
4:57 pm
a senior crew sick guy used to i. yes. those are some are machine one was a pretty bad, you know like not bonus telegraph, minish. i bet that you more than that. that's the problem. with my family, which would probably me, which i could go to go get a legally in the future. this is ivan criminals can use artificial intelligence to use machine learning. so actually find vulnerabilities in all the bits and software, all the networks, the information could definitely be active if you're, if they're all her abilities in the software. and in the same way right now, your computer could be hijacked and your search engine to be re directed to a different website, which will give you the correct information. ah,
4:58 pm
4:59 pm
5:00 pm
a join us in the depths or remain in the shallows. ah, ah! ah! don't pass her class, she's erupt and pig is deployed. as a crisis deepens on the border between poland and bella roost, that was a large crowd of migrants storing the frontier into polish territory. will bring you a report from the same we're now at the batteries holding board and he can see a huge camp for refugees. he wants to get to your, from better on the right than
20 Views
Uploaded by TV Archive on