Skip to main content

tv   Documentary  RT  November 8, 2021 11:30pm-11:59pm EST

11:30 pm
you need to descend, ah, to join us in the depths or remain in the shallows of inviting shaped bankers, those with airs. sinks. we dare to ask lou
11:31 pm
. ah ah
11:32 pm
ah we're allowing our selves to be more efficient or quicker with our transactions. we can make mobile payments from our sons weekend, tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for security a time with
11:33 pm
which i can assure you what you do for you late. yep. so look for them up. so if you're looking to stay with the mining go obamacare, which though you will, pretty much jane. you woke up she and you're conducting a silicon that was supposed to easily and people will share with your former manual with deal. it's under the shadow, wasn't apology to guide me to it, but she does. if you stick with a mobile thing is rational wishing fusion is she definitely want to do a phone interview or she steam even when you thought it was a new. busy account but a meeting, but i want to try to get
11:34 pm
a phone with what's most with sales promotion and what time he's going to get the next statement in the session with the best, but she could come in late. no, no someone did it. so she was out, but almost a cons petoskey, michigan, removable in life with this boy's i'm just calling to check in with you when you asked me to go with uh done this for me. bunker scott the push it down up was it got to bass boys with there are some fundamental rules around password management, making sure that it's complex enough and has the right number, right. the length, the right number of symbols are special, upper lower case that type of thing. that's stuff that we're all familiar with. why
11:35 pm
we want to be careful when we're storing it all in one location is because what we're grant a single points of entry to, to obtain that data. when you share a password which is very common among user. so i have the same password for 20 different applications. yeah. one. yeah. all of them a whole with what is a question we're calling to put him into the marcia brown a year rush, a fuck directions for last year. industrial miss. generous reporting and putting in a rush for on the report that we did the sportage on bonnie's in there. somebody turned in your left for them this year was i ga spike loud here. might be a problem. you know, just way calling a sir. we'll see you wash. well, you know, i don't or problem to, would you just, you know, and you really,
11:36 pm
i wasn't crazy on the horn. it's a part of the usa with ours a year. and we're glad fusion grow with your mother. or she can find you a couple of like the single term income, but that's not something what my sister borrowed out for a smoker. yeah. mm hm. the shape which he just didn't put it, contact among the shirts, or monitor different particular. well, he's a doctor, will shake boys, elizabeth, hello michelle. the session is up, i think with the district what krycek went out. he checked on de la thumbs up pretty quick positioning the payment problem with them cash cardiac off of the show . but other than what she had there with all day that which one which is more like, you know, so love in the soft ear on what of what she does will confront her file a moment. she does look cities, pony of color, browser big with a site. they'll much push a little committee approach by minute to put a little bit going into. i'm can be a day with the business today. leticia for each grade for a quote of
11:37 pm
a component. there was a couple, they'll ship it on with some still more i'm systems don't miss until i'm of our current age. people who have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us, but at the end of the day it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for additional questions you won't get used to. so when you all are moisture, so there are some we use of lesson with from meter use, which i'm sorry. yeah. the only purpose let me do it as a source of furniture like for special to stanley deal. it could, she could, his can machine. i don't we as that she of course let me finish looking. if they for calling this office in by the installation without authority, it was because frank, yes, w shoshua, catherine de la stood but a bit of a school of mushroom soup. she knew exemptions for people to support illness
11:38 pm
decisions civil needed. yes. curse them to prove. do i go? that's been reason the more smudged youtube they did reschedule from dish washer it's a shipper is it's alicia. sheila is su, telephone in, but i couldn't have called mom keeps just repeating what you homeless. dorothy was elect bonham's for relationship, was the most reported it through you'd be surprised nowadays, the amount information that exists about individuals on their phones, through their emails, through their corporate systems, is generated at a scale that was like no other before, from location data on your phone to all your personal information that you have, whether it's your banking information at whether it's your at personal location
11:39 pm
and information about where you live, where your kids go to school. all of that information is available and it's on your either social media pages or on your phone, visit. the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint cuz they know a lot more about you. at basal nothing, they can use that information to provide ortiz start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks, they can then use your identity within the organization to reach out to other since
11:40 pm
within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car, if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them assistance. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been a lot of progress from the hacker site, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those at technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like.
11:41 pm
ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cyber security industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access all of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with
11:42 pm
a shift. give it a pistol for a shorter to show my little more special story of the check in for america. you thought i'm generous or, or where to what you were financed. me can i mean grandma and then if any of her services are from them, sent him now cause it almost last night. you could have brought secular bristol, prince john, them, i'm sailing enough for which in your shoes with straw or charlie are quite scar authority, but i wanted to talk with you during the, a recruitment shorter than could i new showing up a bit of cliches that new doc roll machine can be used to work with your much course. i'm a little part of the picture pretty done last night and i was bitchy, nick wrote a reminder to put in the canadian to renew my. and so we were them junior group. you're off, you're with some of them are asking about the ocean properties when i, when i grow right to come pioneer is straining one with doesn't use 9 a. i want you to revolution. you cannot hear. we're going to
11:43 pm
a doctors were so slowly the order. give it a pre supanik or funny me. it was more just ask them why charlie shan't come on them. or when is all, it's a little breath. you're provided to talk like you shikeria, cham and g for june. i can commute the one with betty mental as i say to me, katy equation group with shock. i'm using my 2nd be shamika nash. and yet that was a keep about the way in the view of them. i'm still with probably yeah, i can get that about that. there was a mindset about m g and yet the cool response we still to bunker is on the key with the easiest. and i got a little bit about that the coverage of car needs. this is jim stein you at the color, but at the system it should say it's mammoth latasha, but almost me now to wish lead you wish i had such thought i was coming out of the door places, but i really knew that the key or someone about it is up to suppressor poa i got to
11:44 pm
use a rock of just the media. i mean, do you have a vision katara, but it's a mission. i have a question about us comprise a grain should with some of them a release. and the chanel was miss easiest. a national model in europe on alignment a protocol. so saying in the part that somebody fun with close to when you as a korea professional sport is much tougher on some than others. mission with my by everybody. so why would somebody believe me? i was just a little girl. the price of a to, to, to achieve really was,
11:45 pm
was proud to read on the paper this morning. usa swimming coach, arrested leslie had sex with the 12 year old girl. this happens almost every week. we get calls at the office. i get informed about one of my greatest fears is someone is gonna start linking all this together and is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming, is that documentary? i see it on our t. well, the pandemic, no said no board is designed to tease and new fresh as emerge. we don't have with the we don't have a vaccine. the whole world needs to take action and to be ready, people are judgment, common crisis with we can do better,
11:46 pm
we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive. so many good people are helping us. it makes us feel very ah, essentially there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to
11:47 pm
that mobile number and transferring money and conducting a lot of scam bites and major organized crime, they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we can't ignore how it's evolved over the and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps to all sorts of bad at devices as well. because everyone is digitized, as john is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet deal with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they
11:48 pm
use. but people eventually use them because they can't live without them with, [000:00:00;00] ah, really years old old lock me up, put them up on the board near the window. look on that muzzle. so silent. who do? i mean, look, he put him on a foreclosure. of course, it's not one gigabyte level for smaller one because of all speed on my system. i'll darker for so sleep is woke up probably in god what color which is and they said, so computer mm problem. well, ms. watson. i so i can,
11:49 pm
i wish i knew precisely what i mean. there's traffic more not possible, said mozilla docile bark while i'm warm up on municipal stores for more more, more than i would like to build the world boys for the sport or to seek knowledge of british facilities miss the following up with me, i will talk to your school with watching all my wish was for us to put in with rescheduled motion that video, nelson nichol. not been master for all. i know the author. i think a little off that he's also mused yesco company medical law morley. and after my media, somebody, me on the juice noodles larger, more emotionally book mission control. no, i self, i mean, what christian looks at the input on that on the sportage, the web sharesa wardweb share is 2 or more, la, my mm
11:50 pm
mm. connected systems and connected cars. yeah. connected buses, even the connected trains and metros, they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the train, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what that's what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know,
11:51 pm
being into an early adopter of electric vehicles. i wanted to try it. i want to experience with we design and build a humanoid. robots are i was generate that full size even though it variables. we make ones that look like robots, a plastic metal. we also make arrange that all human. okay, so lifeline. silicon skin and they look, but there was a move like a human being,
11:52 pm
the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of why the visual with artificial intelligence has not many main threat? this is due to the 3 because everybody a robot may not injure a human being through an action, allow a human being to come to hom, a robot monster, bay orders getting to it by human beings. except where such orders would conflict with the law. is kristian select the couch and i'd also like jack, i thought a car. could you boys throw me up more to put me out sick, or call blog with something that was a law just be really sticking? remember the break? yes ma'am. to capitol as well as similar to what you call us semester and then watch a movie la monica, schwarzenegger micron. yeah. that was put on there are multiple when you to
11:53 pm
a little slow this the show believe if you put off some yeah yes, a 0. my come score. i am, it's a robot to cut a near future. my short acre law suits here. 3 would do it is a comes to me. it says that, you know, we're far more, he's much double holiest. and we saw the gym or chill america and i'll switch and you were with at reach out in the chem, put on the war storms deal and there's natal. i'm a keep this in this committee. all of the, some would argue with them is to port his options. question would george crush walton north to beaumont reach now almost christian. yeah. if that over down this on the wichita, wichita said bills were cheated on some small group of suicide. 50 to do it when you might, you more at that particular law. and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. unethical hackers are indeed a threat. any machine and being, act by a technology at the bulk of the construction listed on the will not come for the adults was requested
11:54 pm
a new one. i shit is quoted pretty nice that the world is becoming more digital bit . people aren't going to become completely recursive and only stay in and i only use digital items even over the past, saying we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will lag san juan things that's happening in the mini cyber implants right now . i'd be really, really worried about it. most people would really be you can't put a chip in my brain, bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have implants in the brain that will directly today. yeah, i was like, well, to the bush and you can, daniel ro, system will sort of a d at the machine on a booth at the deal, but also we need to deal on any boot to do with it. i mean, wish the one i knew what a lot ma schiller, he's
11:55 pm
a senior crew psychiatrist or to i. yes. those are some of the machine. one was a brand new to like no bonus. telegraph minish. i bet that you more than that. that's the problem. when machine, it's a problem with which i could go to godaddy and absolutely in the future like criminals can use artificial intelligence to eat machine learning to actually find vulnerabilities in other, other bits of software or the network speed. the information could definitely be active with if their vulnerabilities in the software. and in the same way right now, your computer could be hijacked and your search engine to be re directed to a different website, which will give you incorrect information. ah cities
11:56 pm
can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many substitutes and it linked with me. we are using the only do any major exit to reach you with me would be great. it do generally very often on the ship,
11:57 pm
most secure and happy in. mm ah, good day again to global macro economics. and once again, visit the treacherous path of our central planners to control the money printing. the world is driven by dreamers shaped banks. concur some of those with
11:58 pm
theirs sinks. we dare to ask ah, cashiers pay gas and k, offset the border between poland and deliveries to migrant crisis deepens with refugees trying to force their way into polish territory. while on another border between france and the u. k. a record number of migrants that have importantly, been legally crossing the channel to england, while both countries brighten each other. we hear from no course on the french group all together. they are under the impression that when they arrive, everything will be easy. in reality, it is not at all like that. the story is about those to help them cross, because it's not migrant to buy the boat. it's always the traffic is. russian

38 Views

info Stream Only

Uploaded by TV Archive on