Skip to main content

tv   Documentary  RT  November 9, 2021 4:30pm-5:01pm EST

4:30 pm
a, a in ah
4:31 pm
ah ah for an hour in ourselves to be more efficient or quicker with our transactions, we can make mobile payments from our sons weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is there, there's more cyber security risk. an extraordinary amount of paranoia. the truth is
4:32 pm
that every device is a potential entry point for security attack. mm use. the more she'll open the shortness new york city for you late. yep. so i'd love to hear from us. so on your side of save reason will you know what i'm writing? go obamacare, which though you will be bunch. genia, you woke up in your contact with him to silicon when i was forced to i usually, and people will share with i don't. and also your formal anymore with deal. it's under the social world level chichi of those for the climate, but she does with jacob daughter a can come to the lost and so come home with his national,
4:33 pm
wishing the users. he definitely want to do a phone interview with me and when you thought it was just send you. busy this in your group, but on the went and the generic name on that. and then when you thought of them tonight it goes to the dean. but all you gotta for many of them, you know, but social sales production that i've been working on. the ticket that i'm stating on the session with this you can come in this way. no, no someone's in. it was out but almost a comes but not secure, but be sure to move on my teeth with this boys and that's at the college tech opens up. and i be in the worst mistake with cup without you being asked me to come up with that. i done this for a bunker script. got the course if you had done was it got to face boys with,
4:34 pm
ah, there are some fundamental rules around password management, making sure that it's complex and often has the right number, right? the length, the right number of symbols are special, upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to obtain that data. when you share a password, which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them a call with a question we're calling to put him into the washer until a couple of each year. year rush hour and i have nobody bothered down went by, the owners are still fucked on average. and that's her last year. industrial initiators here for you to put in a rush for on the report. when you're the sports,
4:35 pm
or do you think there's some west virginia left for them? this year was a georgia spike allow you where might be a problem, you know, just way calling the bus monitor to record your service or we'll see you wash when you no problem with the credits here on the hornets are part of the you are in the last 10 engineer and you're, we're glad fusion grow your model where i can combine a couple of those type of thing that can go. but that, that sounds a little tricky. just some student, but it's contact, i'm only sure it's, i'm one or 2 different parts. teacher will always talk. we'll try to publish it back because when the session is up, i stuck with the district. but then what can we just keep checked on daily? thumbs up pretty quickly. positioning the payment problem with them. it could be a couple to show, but other than what she had there all day. thank one which is more like you know,
4:36 pm
so love in the soft ear or more or she doesn't consent to file a moment, but she's also responding catherine browser bit with re sites almost push a little community approach by minute to put a little bit going on for him can be a day with the business today, leticia for some great for quote, a couple they'll shop with don't. with some someone with a dilemma of our current age, people have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're gonna be frustrated for leasing questions. you won't get used to. so when you all are moisture, so there was some way use of lesson with dozens from me to use, which i'm sorry, i'm the only part of a source of from the show,
4:37 pm
like we're still just on the deal. it could, she could, his can machine, but don't worry us that she i'm, you're curious i'm, you can just look in your stay for on this often by in the last question. what other 3rd, the issue was because frank, yes, w. shoshua. catherine, don't all stood but a bit of a school of mushroom soup. she exemptions for people to support illnesses as sheets for immediate gays. course i'm to put the dog. oh there's been trees on the more somebody you to do they did reschedule convention. oh, it's a shipment, it's alisha. she had received telephone and i'm like with one kid so sleepy when you home restore, it was like one sentence for relations to or to mush reported it. think you'd be surprised nowadays, the amount of information that exists about individuals on their phones,
4:38 pm
through their emails, through their corporate systems is generated at a scale that was like, no other before from location data on your phone to all your personal information that you have. whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database, lee is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint cuz they know a lot more about you. at basal nothing, they can use that information to add, provide ortiz start to create an identity theft type of exercise. they can maybe go
4:39 pm
to a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks, they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car, if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist consistence and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors rainy. so there has been a lot of progress from the hacker side, a lot more progress actually on the high inside using ai and using other advanced
4:40 pm
technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those ad technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you started changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication. when you try to access some of those websites . you might not leave your laptop on an unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure
4:41 pm
lifestyle with your shift, giving crystal reciprocal, fresh wonder to show us my rental. at a more special story you as a meter into america, utilize generous or, or where it will be. you are manion from your crime, you scram on then there is there any authors or must not assume them sent him closer than was left there. secret thought said you were bristol prince john, them up there new enough for which english amounts are strong. alright, your other boy, char, your quite car battery, but i'm worried about our course in the started here. she's the worst of the childhood. is it only a recruitment show to them or could i new showing of empirical shapes? it's near doc, rule machine can you do to with, with your much core. some of them are thought is pretty strong, their group are contribution for it. i'm also program and i was disconnected to
4:42 pm
renew my it's a to renew my and so we were gonna junior group off here with some of them are asking about the property when you come pioneer, it's a good doctors are slowly the order, give it a pre supanik off, i mean it was more of a resolution come on. there are being is always a little grip. your priority to talk like you should give me a commute, a equation group of shock. i'm using my 2nd be shamika nash a i can get a better get towards the mindset about the game. and yet that cool response, we still to bunk. you somewhere like here with the easiest and i got
4:43 pm
a little of news. this is jim stein you at the system. you should say it's meeting with latasha, but i'm just gonna use them to wish you deal. wish i had to stall. i want to but i've got a little later. but i mean, you got the key or someone there, but it is so hot. osha, fresh, oklahoma. my got tv is there. she has nights here. good afternoon. is my sound than human? so doesn't good care. of course. just to meet with me. do you have like a vision katara what it is actually hotter, suppress oklahoma? yes, it's called on this and i have a question about comply with are going should with them a little later, but i knew that she was just, i mean you submission out for me is the easiest option to put in last year in latrice of national model in there, you've got to put a line with a protocol. so saying in the part that somebody fun with the course when you leave it for me. oh,
4:44 pm
seemed wrong. i just don't hold any world yet to shave out disdain. because the african and engagement equals the trail. when so many find themselves worlds apart, we choose to look for common ground. as a korea professional sport is much tougher on some than others with my by everybody here. so why would somebody believe me? i was just a little girl. the price of paid to, to, to achieve really was, was proud to read on the paper this morning. usa swimming coach, arrested, allegedly had sex with a 12 year old girl. this happens almost every week. we get calls at the office. i
4:45 pm
get informed about one of my greatest fears is someone's gonna start linking all this together is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming here, is that documentary. i see it on r t l look forward to talking to you all that technology should work for people. a robot must obey the orders given by human beings except where such order that conflict with the 1st law show your identification. we should be very careful about artificial intelligence and the point obviously is to great trust rather than fear. a very job with artificial intelligence, real summoning with a robot must protect its own existence with
4:46 pm
oh, eventually there's malware. thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they started target thing to sim cards and the telecom industry. why? because they on to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam fights and major organized crime, they adapted to the situation they use cyber they used the technology as an
4:47 pm
extension of traditional crime. but we can't ignore how it's evolved over the years . and in order to discuss how it's evolved, leave discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps do all sorts of bad at devices as well. because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them. with
4:48 pm
islam, the old old la neil put them up on the floor near the window, looking back and was so silent. who knew a market focus? it's for one gigabyte level for smaller drama because of all speed on my system. i'll darker for so sleep is walk for probably in the car. what color which is and they said, so confused a problem. well, there's a process. so again, i wish i knew precisely what the one b, there's traffic more not possible should more want to deal with docile bark. while i'm more than up on municipal stores for more, more than i would like to build the world stories for the sports or to receive
4:49 pm
knowledge of bristol facility. miss the following up order me a call back from school with watching all the marble shows for us to put it in with rescheduled motion with nelson nichol. nothing me a sure from i knew the order. i forgot the results. so mused yes, good company, medical law morley, my media, somebody me on the juice. lucas log, emotionally. book mission control. no, i see a funny what christian looks at the internet on a sporting web. sharesa, wardweb sheriff's 2 or more, la much mm mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago,
4:50 pm
get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a, a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with
4:51 pm
online sales. humanoid robots arrivals generally, that full size, even though i grade what we make ones that look like robots, a plastic metal. we also make arrange that all human. okay, so lifeline. silicon skin and they know, but there was a move like even the thrown behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that to think, screaming, a useful thing. don't you think my friends out it was out of my in threats of what
4:52 pm
would be showing an artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not india, a human being through inaction allow a human being to come to a robot must obey orders getting to it by human beings, except with our orders. would conflict with the bus no excuse me to lift the couch . and i'd also like jack, a boy, yes. more of a blog with a lot just really sticking. remember you? quake. yes, ma'am. to cut that up as well as similar to what you call us some nice, but on the watch movies more the law and order. schwartzenegger micron. yeah. that was put on the one more look was when you to rush, i mean we'll switch this the show me, but if you put all some yeah, yes. a 0 my thumb score. i am, it's a robot to cut a near future. my ciocca thought suits here 3 would do. it comes to me. it says
4:53 pm
that, you know, we're for maureen, mush, double holiest. and we saw the more chill america thought on the pl switching you were with at reach out, some new chem quote on the war storms. deal and there's metallic, i'm a coquettish materiality. some would argue with them. these 2 boys options play some with home each night at the cooper people love, right? want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a human noise figure or humanoid presence that you're going to think, i could talk to that with a switcher fietta where i can die, excuse me, to live now, which is the might soap stone, there was a christian. yeah. if that. oh, but on this, on the, which i'm which out said bill who cheated on some small group of suicide. 50 to do
4:54 pm
it. you much more the preview law and what do you know about hackers? are you speaking about ethical hackers on an ethical hackers? unethical markers, unethical. hackers are indeed a threat. any machine and being act, a bulk of construction listed on the will not come for the adults is requested a new one. i cities go to pretty nice that the world is becoming more digital bit. people aren't going to become completely recursive and only stay in and i only use digital, i can even able to say 10. you can see how people have changed through something simple like small, like 10 years ago, maybe 15 years ago. if you tell yourself or anyone that you have a device that can track you out and see where you've gone and you've been waiting and see what you thought, everyone would go. we can't do that. that's. that's to really, again,
4:55 pm
every with liberty, we don't do that. but now everyone's got a device mem, okay, that does exactly that. people have accepted in because our lives are inherently carry with them the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will then one of the things is happening at the mini cyber implants right now . i really, really worried about it. most people would really be you can put
4:56 pm
a chip in my right. bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have in the rain that will directly today. yeah, i was like, well, to the bush and convenient royce or some more sort of a motion on a booth at the deal, but also we need to deal and then you would to do what id supported. i mean, wish the one i knew what a lot my she'll if he's a student there a to i yes. go to someone. motion was a brand new to like not bonus, telegraph, minish. i bet that you more than that. that's the problem. on my screen. it just them would probably double check a courtesy call to follow. absolutely. in the future zebra criminals can use artificial intelligence to use machine learning to actually find vulnerabilities in other, all the bits, the software or the network speed. the information could definitely be active with
4:57 pm
if there are vulnerabilities in the software. in the same way. right now, your computer to be hijacked and your search engine to be re directed to a different website, which will give you the correct information. ah cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many a substance wanted link with me. we are using only,
4:58 pm
do i need any major exit or anything to reach you with me? i'd be glad to do generally very often foundation most secure and happy with. mm ah, who are all those driven by dreamers shaped bank for some of those with
4:59 pm
theirs sinks? we dare to ask in an alley ourselves to be more efficient quicker with our transactions. but with that comes a trade off. every device is a potential entry point for security at any machine. it's an extension of traditional time. the defenders have always been one step behind the attackers. both with this one becomes option in the offering. it's not a matter of, if that happens, it's a matter of when i
5:00 pm
was in the area now with thousands of migrants including children, remain stranded at the border between borrow some poland. also claims mince is escalating the refugee crisis on purpose. i'll call respond that is that they are running low on food and water. i was in between doing live reports for the news. one man walk top to me and back for my open bottle of water daughter with me. while russia claims the west simply launched a smear campaign against that over the border crisis after the polish prime minister directly blamed bloody may potent for creating the situation. also this hour, germany tries to get control over the corona virus by imposing tough restrictions. is the number of infections reaches its highest level since the start of the
5:01 pm
pandemic and moscow's defense ministers.

14 Views

info Stream Only

Uploaded by TV Archive on