tv Documentary RT November 9, 2021 8:30am-9:00am EST
8:31 am
ah ah. where empowering ourselves to be more efficient or quicker with our transactions, we can make mobile payments from our phones. we can tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of
8:32 am
paranoia. the truth is that every device is a potential entry point for us. a blue moon. yes, the more show up in the shortness new york uniform late. yep. so let me farm up. so when you're outside of stay with the mining go, obamacare, which though you will, pretty much ginia, you will corruption. your contact with silicon i thought was supposed to easily and people would share with your former manual with the social world in apology. she had those with climate or she'd also if you stick with
8:33 am
a the lawson silica my whole thing is a national machine. the users, you definitely want to do a phone interview with me when you thought it will suggestion if it isn't, is nika, but annoyance. and the generic name was crying that in a minute the water and the dean. but if you try to get a form in there, the about smoking with on the 3rd statement in the session for the past, but she could come in late. no, no someone did it. that is out. but almost the pure a comes but not secure, but be shaken and movable. i'm like, you know what, this poison is at the college tech opened up, and i be in there with me. cisco, without you being asked me to go with that done the 3 months ago. got the course you've done was it got to face boys with there are some fundamental rules around password management,
8:34 am
making sure that it's complex and often has the right number, right length. the right number of symbols are special on the upper lower case that had the same. that's the stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to obtain that data. when you share a password, which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them a call with a question we're calling to put him into the marcia until a year rush or a urgency. that's her last year, just told me she had her report to print a report on the sportage, audubon using there somewhere spectrum. and in your for them this year was
8:35 am
a georgia spike loud here. might be a problem. you was up here just way calling the bus more thing to record your service or we'll see you wash when you no problem with wasn't documented here in the corner a year and you were glad fusion grow your mother. i me combine a couple of some type of thing though to me, but that's not a smoker. m a when she could, she just did it, but it's contact among the church. i'm gonna tell you franklin chica will raise up . we'll shape was elizabeth as well. michelle, the session is up, i stuck with a decent cheaper than what we just keep checked on daily. thumbs up pretty quick positioning the payment popping up with them. she couldn't afford to show up with other than what she had the full day that voice. bullshit, margins, liking the soil limited and soft ear on what she does for
8:36 am
a shuttle file. a moment when she does cities, plenty of color was a big with a site. want to push the whole community approach my mind a little bit going on so i'm can be a day. busy with to business today, leticia for some great for a quote of a composer a couple though. sure. but don't wear some, some more incentives. don't miss a dilemma of our current age. people who have a false sense of security, while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're going to be frustrated for leasing questions. you won't get used to so when you all are moisture. so to the summary use of lesson with buildings from me to use kitchen. sorry, julie barley post legend and that i was actually also on the show for special just
8:37 am
on the deal. it's on because she confused commissioning, but don't worry. i was that she, i mean of course i'm you finish looking. you stay for on this often by the last question. what other 3rd, the it was because frank, yes, w. shoshua. catherine almost stood but a bit of a school of mushroom soup wishing exemptions for people to support it. if you're on that sheets for immediate gays or some type of dog with a different reason, the more smart you to do, they did reschedule. oh, it's the shipper's, it's alisha. she had a recei telephone and i'm like with the mom keeps so sleepy you homeless or it's more like want sounds for relations to with the most reported it think you'd be surprised nowadays the amount of information that exists about individuals on their phones through their emails through their corporate systems is generated
8:38 am
at a scale that was like, no other before, from location data on your phone to all your personal information as you have, whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database. lee is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprint, and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to provide ortiz start to create an identity theft type of exercise. they can maybe go to
8:39 am
a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks, they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car, if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exists them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. right. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive
8:40 am
side. the defenders have always been one step behind the attackers in some of those at knology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like, ah, do you need to be aware that it could happen to you? it could happen to you and for us from the cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication when you try to access some of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle that ah,
8:41 am
with your shift, give it a personal reciprocal for a shorter to show us my little. it's a more special story return in from our parent utilize generous or, or where it will be yours or finance me. can i me, scram on. then you're clear. if any of our service orders from them sent him closer than was lost, their secret of dawn said you were a bristol prince john, them. i'd certainly love to watch in your shoes with straw cried kit other boy charted quite scar authority, but i'm worried about our course in the state here. she's the western childhood. is it only a recruitment shorter than what could i new showing of empirical shapes? it's near doc role machine can you do to with, with your mom or some of them are pretty, you know, in their group are auto to put it on last night program and i was returning your call to renew my a to put in the canadian auto renew my its
8:42 am
a room junior group off here with some of them are sitting up pushing the properties when i opened the car girl for her to come pioneer a quarter. give it a pre stupid go for me. it was more of a resolution. come on, there really is always a rubric you provided to talked to shikeria a in a equation group of shock. i'm using my, it's a human shamika a, it's a lot about him being and yet the cool response we still to bank is on my back here with the easiest and i got a quote from the repair of car. is this the jim stein you got the cover
8:43 am
with me? unfortunately, the dealership i had to store a supplement, but it is so hot. osha fresh, oklahoma. my got tv is there. it says, nights here. good afternoon. is my sound on you? so doesn't go to rock of just in with this, just a vision here. katara what it is actually hotter shoppers, oklahoma, it's got an issue and i have a question about us comply with our grain should with a release in the scenario for a year. and you're still seeing the brother in law shopping ministry of national puddle in the even a puddle. i'm at a total cost of saying in the part that somebody fun with close to when you lease with ah,
8:44 am
and i make no borders line to tease and use as a merge. we don't have with the we don't to look back seen the whole world leads to take action and to be ready. people are judgment, common crisis with we can do better, we should be doing better. everyone is contributing each of their own way. but we also know that this crisis will not go on forever. the challenge is great. the response has been massive. so many good people are helping us. it makes us feel very proud that we are in it together with hello driven by drill shaped bankers. as in
8:45 am
there's things we dare to ask all, eventually there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call him swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on
8:46 am
a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bikes. and major organized crime, they adapted to the situation they use cyber. they use the technology as an extension of traditional crime, but we can't ignore how it's evolved over the years. and in order to discuss how it's evolved, leads to discuss how us as people using digital technologies have evolved as well. everybody is online. we are all sharing information through social media, through messaging apps to all sorts of devices as well, because everyone is digitize. everyone is moving to online banking out online, retail and so on. there's a small saunders, sir, smarty, these smart cars, smart homes, you can't live without your smartphone. you can play without technology and
8:47 am
internet with it. so even sometimes you would see some impact, the privacy impact, secured the impact from certain tools and technology that they use, but people eventually use them because they can't live without them with school. really. islam luck. now putting up on the boys near the way possible, poor look on black muzzle, so silent, who knew the slimy billy? look, he put him on a foreclosure about your seats. well, you got a little fish more than one bill went off all speed all nicely. still my doctor for sleep is walkable, probably in the car. what color which is and they said, so
8:48 am
a computer. mm. your problem? well, ms. i saw a guy that was january so so what i mean there's dr. morner boss will show more of mozilla docile barble. i'm more than up on me needs. are those forced on more more, more than the with see below the world boys for sports or to seek knowledge of beautiful city miss the following up with mc, that'll dr. school with washing olga. my wish was for us if i didn't want to just go to washington video notes, nickel. not master for why near the author. i think a little off that he's honestly mused. yes. good company, medical law morley and my belief, somebody, me only juice noodles log, emotionally, both mission control. no, i say i mean what cushion looks at the input on that. on a subordinate with she had risen. what the web shadow say more than i thought it was la might mm. ah.
8:49 am
connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not recover from it. a lot of people trying to use the metro trying to use the train, but they couldn't buy a ticket. those situations happen. they happened in different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me,
8:50 am
it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with we design build humanoid robots are i right. was generate that full size, even hard variables. we make ones look like, right? well, it's a plastic metal. we'll say make a range, that's all human. okay. so lifelike. silicon skin and they know,
8:51 am
but they will to move like a human. do you see drone behind you? yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think stream lee useful thing. don't you think my friends are good? what are the main thread supposed to be? so intelligent, artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not injure a human being true in action. allow a human being to come to hom, a robot monster, bay old is getting to it by human beings, except where such orders would conflict with the bus no. is listening to lift the couch and i'd also like jack, a photo car could boys from yup. want to put him? yeah. like i can blog with the wasn't law just be really sticky instrument. can you please? yes. it's been a man's capital as well. that's similar to where the goal is submitted on the watch
8:52 am
movies more the law on joshua soniega micron. yeah, good, wasted. i know i'm wonderful when you to wash it. it's great news. we'll switch this to show many people. awesome. yeah. yes. them with my thumb score. i am, it's are all but the thought i will, if you chew my ciocca law suits, you had to reboot do it. it comes from we, it says that, you know, we're for more, he's much simpler, holiest. and we saw the gym or chill america, about i'm switching you with at reach out to new chem, put on the war storms deal. there's natal look, i'm a cookie efficiency materiality. some would actually come to boys. auction placement would kill a crush. watson with the bowl each and i have a group of people who love, right. want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. instead of just walking in to maybe a reception or an apple where it says a humanoid figure, a humanoid presence that then you're going to think i can talk to that one. you
8:53 am
want it to walk a switch or fietta where i can die school until you know which it says the my soaps . then there was a clue change. if that over down this i don't know which, which outside bill who cheated on some small with them. a switch, i think the, the dish to it when you, my cham or the pretty well. and what they know about hackers, are you speaking about ethical hackers on ethical hackers? i had to go parkers unethical. hackers are indeed a threat. any machine and being, act, biotechnology at the bulk of construction, listed on the will not come forth to adulthood requested a new one. i shit is keep opening on that. the world is becoming more digital bit. people aren't going to become completely recursive and only stay in and i only use digital likes and even i would say 10 years you can see how people have changed through something simple like small that you know, 10 years ago,
8:54 am
maybe 15 years ago. if you tell your salary or anyone that you have a device that can track you out and see where you've gone, see, and you've been waiting and see what you thought. everyone would go. we can do that . that's, you know, that's completely against everyone. liberties we can do that, but it up now everyone's got a device mem, okay. it does exactly that. people have accepted in case our lives are inherently carry with them the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue dabble, cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital
8:55 am
transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out with one of the things that is happening at the mini cyber implants. right now i'd be where is it really worried about it? most people would equally be you can't put a chip in my brain. bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have implant from the brain that will directly today the outside world to the bush. nicole, daniel roy system will sort of mean while ago, when i put in the l. e, at the machine on a booth at the deal, it's been almost a deal. i know you boot to do what i see that there's a problem you wish the one i knew what a lot machine look used to print a machine. you agree, sig, i used to i, yes, those are some of my shoes. one was a pretty bad, you know like no fullness. halbrook minish. i bet that you're more than that. that's the problem when machine, it's
8:56 am
a problem with which i could go to sleep cult. oh, got it. absolutely. in the future, hybrid criminals can use artificial intelligence. use machine learning, well actually find vulnerabilities in other, other bits you software on the networks the, the information could definitely be active if you're checking if there are vulnerabilities in the software. in the same way right now, your computer could be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah,
8:57 am
8:58 am
a adult of i was, i did a little about money laundering personally because it was a 3 different oh, good start. well, we have our 3 bags all set up here. maybe something in europe, something in america, something overseas and the island? no real. well, he's a good hey, i'm ready to do some serious my laundry. okay. let's see how we did. well, we've got, oh, look at that and i agree. watch for max. and for stacy, oh, beautiful jewelry. and how about a bill again for mag, you know, it, money, one is highly legal. don't want to buy the record. we're an ally ourselves to be more efficient quicker with our transactions. but with that comes a trade off. every device is a potential entry point for security at any machine because
8:59 am
it's an extension of traditional time. the defenders have always been one step behind the attackers with offering. it's not a matter of, if it happens, it's a matter of when who when i was wrong, when i just don't know, i mean you have to figure out the same becomes the answer to an engagement equals the trail. when so many find themselves worlds apart, we choose to look for common ground.
9:00 am
ah, i'm now we were both reg, several under my grants, including children, remained stranded this afternoon on the baller, russian polish borders. they try to reach the e u while warsaw accuses men's give escalating the refugee crisis on purpose. a correspondent is at the site of the crisis right now. this is what's going on here . we were told that at least 2500 people haven't come here and that this is so this is what they do. and so here can see a family with, with children. they're trying to warm up from the fire woods that is off for a day of clashes, tear gas, and chaos that the boulder with droves of migrants trying to break through fences and winter just on top of him as well. elsewhere behind closed.
29 Views
Uploaded by TV Archive on