tv Documentary RT November 8, 2021 6:30pm-7:00pm EST
6:30 pm
ah, ah, driven by dream shaped banks concur sent those with dares sinks we dare to ask as a career, professional sport is much tougher on some than others. mission with maya by everybody here. so why would somebody believe me? i was just a little girl to price to to, to achieve really was, was a read on the paper this morning, usa swimming coach,
6:31 pm
arrested leslie had sex with a 12 year old girl. this happens almost every week. we get calls at the office. i get informed about one of my greatest fears is someone's gonna start leaking all this together. there's going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming here, is that documentary? i see it on r t a blue ah
6:33 pm
we're empowering ourselves to be more efficient or quicker with our transactions. we can make mobile payments from our phones. we can tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for a yes, the more chill open, the shortness, new york city for you late. yep. so,
6:34 pm
farm also on your side of stable reasonable. you know what i'm writing global writing, which though you will be by genia, you woke up in your contact with silicon i was forced to, i use mostly, and people will share with everyone and also to your former manual with dealerships under the social world in the pool chichi of those for the climate or she'd also if you speak with g got a horrible thing, isn't national listening users, you definitely want to your phone interview with me and when you thought it was just send you. busy this in your group, but on the went in the clear was crying that in a minute the organs tonight is going to the dean. but all you gotta form in the other thing about social with
6:35 pm
fish. and there's like no one has owned it gives out. but that more stuff a comes, but most your book, the shipment would look like you know what this poison was at the college a couple days. it wasn't for presses warmer. she was to have that done this me bumper script. got the course done. was it got to face boys with there are some fundamental rules around password management, making sure that it's claxon often has the right number, right. the length, the right number of symbols are special upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location, is because we're, we're granting single points of entry to, to obtain that data. when you share a password,
6:36 pm
which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them a call with a question. we call it a wash or ground example, a lot of material inside ear wash bar and i have no, my name wasn't done with the stairs will fucked on average. and that's her last year. that's told me she had her report to print a report from one of the sports on, on using this in west virginia, left for them. this year was a georgia spike cloud unit. where might be a problem. it was up here just way calling the bus monitor at your school. she had a certain little sleep wash, wed unit bardon. we're proud to with our credits here on the hornets. are part of a year. and we're glad fusion grow if you're margaret
6:37 pm
or she may come find you a couple of play the seeing the ultimate income, but that's not something. what am i supposed to to pull it out for him? i'm not sure which he just did. a reported to contact him, i'm gonna try to monitor different, but takeaways talk we'll check was elizabeth because, well, michelle, the session was up last night with the district. but then what could we just have checked on daily? thumbs up pretty quick positioning the payment a problem with them. it could be a couple to show, but other than what she had there with all day that boys will. michelle moore's liking. the soil love it in the soft ear on one of in the center file among those cities. plenty of rooms, browser big with a site there, almost push a little community approach. my mind to put them in a bit going on for him can be a day with the business today. leticia for some great for quote, a couple of the shopping doing with some, some more. i'm sitting there, but
6:38 pm
a dilemma of our current age. people have a false sense of security, while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money and you're out and you're going to be frustrated for leasing questions. you won't get used as a one year solar moisture. so there are some we use of lesson with dozens from me to use, which i'm sorry, julie purpose, let me do it on the power and that is also on the show. like for special to start on the deal, it could, she could use your machine by the way, as a cio, neil course i'm you can just look in your stay for balloon this offset by the last question. what other sort of the issue was? because frank, via shoshua catherine a school of mushroom soup, she exemptions please press 4. if this has reached for immediate gaze, curse them to provide with reason to more smoke you tube. they did reschedule. oh,
6:39 pm
a teacher. she had received telephone in the car. one kid feel sleepy when you home restore. it was like one sentence for relations to one of the must have to push it through with you'd be surprised nowadays, the amount of information that exists about individuals on their phones, through their emails, through their corporate systems, is generated at a scale that was like, while there before, from location data on your phone to all your personal information that you have, whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's. busy on your either social media
6:40 pm
pages or on your phone, visit the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, has a know a lot more about you. at basal nothing, they can use that information to add, provide ortiz start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credit in your name when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for
6:41 pm
example, the design for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organisation that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. right. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers in some of those and technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. ah, do you need to be aware that it could happen to you?
6:42 pm
it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access all of those website. you might not leave your laptop on an unlocked when you're in a coffee shop. if you go to the toilets or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with your shift, giving crystal reciprocal for shorter to show us my little more special story
6:43 pm
returned into america. utilize generous or are worth what you are finding out from your crime. you scrambling. then there's left on the author's service and not us to them sent him now clause with almost lost their secret of thought. said you were to crystal, please, john them up early enough for ginia sherman with a strong high character parkway. charlie, a quite car battery, but i'm worried about our course and started here. see the rooster childhood? is it only a recruitment shorter than what could i new showing of empirical shapes at near thought, ro machine can you do to with what you're much core? some of them are taught us, but if you're on, the group are still to pitcher predominant program and i was returning a call to renew my a to put in the canadian to renew my its a room junior group off your summer home. are asking about a high to come pioneer a slowly back order to pursue a resolution come on,
6:44 pm
i mean is all it's a rubric. you're provided to talk to your security insurance. got to read it for them. i guess commute a equation group is the shock. i'm using right, so can you show me a call with a high can get any better because the mindset about them being and you know, like we response, we still to bunk, you somewhere like here with the easiest and i got a quote with is this the jim stein you at the cover, but i pitched them system the should say it means them with rotation with how much money is now to wish you deal. wish i had to store a place oklahoma. my talk to mr. c. as nice here. good. good afternoon. my sound menu, so doesn't you get off of just a medium or some you do. you have a daughter,
6:45 pm
but it's not sure how to ship a sofa whole. yes, it's a mission. i think we should have a kid that was i calling on behalf of comply with are going should with believe some mission out for me is the easiest option to put in a series of national puddle. and then you've got to put a line with a protocol. so saying in the part that somebody fun with close to when you leave it for well, it's official. the u. s. military has declared the great 3 powers competition featuring the us, russia and china. oh, does neo liberal ideology to play into? what does russia game and january 6 haven't come? join me every 1st aid on the alex simon. sure. i'll be speaking to guess with the world politics sport,
6:46 pm
business. i'm show business. i'll see you then. ah, essentially there's a malware attack, thousands made sometimes millions each day. this pandemic gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call him swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone. ready and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we
6:47 pm
can't ignore how it's evolved over the years. and in order to discuss how it's evolved, lead to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps to all sorts of devices as well because everyone is digitized, everyone is moving to online banking, our online retail and so on. there's a smartphone, there's a smart tv smart cars, smart tones you can't live without your smartphone. you can't live without technology and internet know that. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with,
6:48 pm
[000:00:00;00] ah, really years old old law. you're putting up a little easier the way possible. look on that muzzle. so silently, you saw me look for the but the more a bucket seats or you go vulnerable for smaller on built off or speed on. i says jim, i'll darker for so sleep is walk for probably in the car. what color, which is and they said, so come through that i met. mm hm. lemme is a process so i can, i wish it nicely, jennifer. so so what i mean there's nothing more not possible. should mozilla docile barble and warm up on me needs? are those stories are more more than i would like to build the world stories for
6:49 pm
support or to seek knowledge of being the possibility of miss the following up order re exile dr. school was watching over my washer scholarship. i didn't want to just go to watch on that video to nelson, near or not mr. fall, i knew the author i forgot about that is also mused. yes, good company. medical is lamore leon. media. somebody me on the juice. locals. larger, more emotionally book mission control. no, i see off, i mean, what christian looks at the internet on the sportage, which she had written wardweb generously more. la might. mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have
6:50 pm
happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in the different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tests i was doing, not just from a car perspective, but how they were picking up on the data. so they, now they have so much data and intelligence about autonomous driving. i think for me it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience
6:51 pm
with we design and build a humanoid. robots arrivals generate that full size humanoid variables. we make ones that look like robots, like last big metal. we also make arrange that all human. okay, so the lifeline silicon skin and they look but they will to move like the human. do you see drone behind you? yes. this drone in the future will be used using artificial intelligence. it is
6:52 pm
a taxi service that has an extremely useful thing. don't you think my friends out of it? what are the main threats of what we show info? artificial intelligence has not many main threat. this is due to the 3 robotics a robot may not injure a human being through inaction allow a human being to come to hom, a robot must obey orders getting to it by human beings, except where such order would conflict with the law is listening to lift the couch and also to can align yeah. a photo boys from. yup. want to put him? yeah. a couple a blog with something that was a law just be really sticky instrument. you quake. yes ma'am. to capitol as well as similar to what you call us semester and then we'll watch movies more the law and order. schwarzenegger micron. yeah, that was put on the a multiple is when you to a shot. scraped knee will switch this to show bleep. if you put off some, yeah, yes, a 0. my com score. i am, it's are all but the cutoff will near future. my chicka law suits you at that it
6:53 pm
would do it. it comes to me. it says that, you know, we're for maureen, mush, double holiest, and we saw the gym. no chill america thought on the pl switching with reach out to the chem quote on the war storms deal. and is natal? i'm a coquettish each committee. alex is some would actually come to port options, placement with shopping with the home each night at the cooper people love, right. want to say they love to sit in the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception whole or an app or wherever, if there's a human noise figure or humanoid presence that then use, you're going to think i could talk to that one, use a door switcher fietta, where i can die, excuse me, to live now, which it's the might stop soon. there was a crew chain. yeah. if that over down this on the which which outside bills were
6:54 pm
cheated on some small group of suicide. 50 to do it when you might have 2 more that preview law. and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. ethical hackers are indeed a threat. any machine can be a bulk of consumption listed on that will not come forward to adulthood requested a new one. i shit is go to putting on that the world is becoming more digital bit. people are going to become completely recursive and only stay in and i really use digital liked and even able to say 10 years. you can see how people have changed through something simple like small buttons, europe 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that can track you out and see where you've gone, see you've been waiting to see what you thought. everyone would go. we can't do
6:55 pm
that. that's, you know, that's completely against everyone, liberty. we don't do that, but now everyone's got to write that book. it does exactly that. people have accepted it because our lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will all and then one of the things that's happening is the mini cyber
6:56 pm
implants. right now i'd be where it really worried about it. most people would equally be you can put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have it a little directly today. yeah, i was like, well, around the bush and you can, daniel roy system will sort of a e at the machine on a booth at the deal. but also we need a deal on that. you boot to do what it is a brand new to wish the one i knew what a lot of machine that used to print a student's paper that was kind of like mission your crew. sig, i used to i, yes, those are some are machine. one was a pretty good and you know like not fullness. telegraph minish, but that wasn't an issue. i took the problem on my screen. it just the problem with which i could go to go get it and absolutely in the future, this is cyber criminals can use occupational intelligence, machine learning to actually find vulnerabilities in all the bits and software,
6:57 pm
all the networks, the information could definitely be active with if their goal, her abilities in the software, in the same way. right now, your computer to be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah, cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many substance going linked
6:58 pm
6:59 pm
7:00 pm
we choose to look for common ground. with ah, gun fires heard clashes erupt and tear gas is deployed as a crisis deepens on the border between poland and bellows. that's as a large cod of migrants and refugees, storm the frontier into polish territory will show you a report from the scene. we are now at the fairies towed in poland. he can see huge cap for refugees. he wants to get to europe from better on the right than a russian forest intent on the left to punish poor damper devolved life and the punishment treated a friendship. police officer survive the stabbing thanks to his bullet proof vest
22 Views
Uploaded by TV Archive on