109
109
Sep 3, 2014
09/14
by
FOXNEWSW
tv
eye 109
favorite 0
quote 0
everything seems hackable. government computers are hackable at some point.le find this to be surprising that your information is accessible by people who want to sell it, make a little money, but these are private photos. >> i know. you know, i feel bad for the celebrities in some respects because nobody want their private contents stolen off their phones or computers. but they should have a little bit of common sense here. i'm going to have to implement tough love, you know, they should know that they are high-interest target s so to speak. they're famous, the world is fascinated with them. we live in an age of sophisticated hackers. the cautious thing is keep your sexual life and sexual content off line. that's one option. or -- >> at least get a polaroid or old polaroid camera. if that's really what float your boat, keep it in house. >> go old school, go with the polaroid, that's right. or implement common sense cybersecurity things that exist that are not difficult, that would prevent hacker from penetrating their contents. for example, on apple, all the
everything seems hackable. government computers are hackable at some point.le find this to be surprising that your information is accessible by people who want to sell it, make a little money, but these are private photos. >> i know. you know, i feel bad for the celebrities in some respects because nobody want their private contents stolen off their phones or computers. but they should have a little bit of common sense here. i'm going to have to implement tough love, you know, they should...
42
42
Sep 4, 2014
09/14
by
CSPAN2
tv
eye 42
favorite 0
quote 0
we know that all technology is hackable. we have seen the best and brightest get hacked into. and you know that data in the wrong hands could be potentially dangerous. and then i think as we learned when it comes to the private sector having the data then law enforcement may request access to that data as well. you could see things progressing that way whether it is recording conversations or photographs while people are shopping >> that is the big fear. in the private field when you are shopper and go in you should be given a heads up to what information is being collected on you. most people know about zip codes and so forth. they have now technology pinging on your i-phone. if you a big shopper, it will ping and let the clerks know this big spender is here and let's swarm on them and get him or her do buy more. shoppers may appreciate the convenience but not knowing or given the choice to participate in that or not. and you have to think when stores are collecting data there is a database somewhere being kept. it isn't just data floating around. there is a database where in
we know that all technology is hackable. we have seen the best and brightest get hacked into. and you know that data in the wrong hands could be potentially dangerous. and then i think as we learned when it comes to the private sector having the data then law enforcement may request access to that data as well. you could see things progressing that way whether it is recording conversations or photographs while people are shopping >> that is the big fear. in the private field when you are...
86
86
Sep 25, 2014
09/14
by
FBC
tv
eye 86
favorite 0
quote 0
everything at some level is hackable. this is a more secure systems and using credit card numbers.a victim. got a call the other day that someone produced a mastercard that looked like -- $500 wortufo cancel all the master cards which i have for myself and my children. occurs to me that this hacking which is going on at an extraordinary rate is placing an enormous financial burden on banks, credit card companies and retailers and society as a whole. we went around our production team and about half of them that have their cards cancelled because of tax. >> on average it costs the bank $2 to $3 a card when you are in manufacturing and shipping and everything else so you multiplied by 50 million accounts you are talking huge amounts. stuart: somebody is going to have to pay for the new chip cards which are less hackable than the old plastic ones. >> the technology has to go into it. with copy protection, everything broken at some level. all these customers moving over to that creates a bigger need. stuart: thanks for staying on top of us. how many millions of dollars are we losing in
everything at some level is hackable. this is a more secure systems and using credit card numbers.a victim. got a call the other day that someone produced a mastercard that looked like -- $500 wortufo cancel all the master cards which i have for myself and my children. occurs to me that this hacking which is going on at an extraordinary rate is placing an enormous financial burden on banks, credit card companies and retailers and society as a whole. we went around our production team and about...
74
74
Sep 14, 2014
09/14
by
FBC
tv
eye 74
favorite 0
quote 0
that has been hackable in the past but apple assures us they have got sort of new encryption methodshat they're using that will help with this. but as a consumer there is a couple of watch points that i want to point out. the first one is, when you think about the celebrity hacking, you stealing of their photos, that happened on the icloud through social engineering. social engineering will be alive and well in a big way that the cyber criminals will use to get into your data. so, to protect yourself, you're going to have to think differently how set up these accounts. new email address that you never used before. use a code name. call yourself, superman or wonder woman. don't use a name that-eyed face back to you. gerri: some great advice there. apple seems to be riding high on this. let me tell you this announcement couldn't have come at better time. just had home depot announce it had problems with hacking. jpmorgan chase is announced that they have had problems with hacking. they are in the sweet spot of the curve if this can really work. do you think they will be able to take ad
that has been hackable in the past but apple assures us they have got sort of new encryption methodshat they're using that will help with this. but as a consumer there is a couple of watch points that i want to point out. the first one is, when you think about the celebrity hacking, you stealing of their photos, that happened on the icloud through social engineering. social engineering will be alive and well in a big way that the cyber criminals will use to get into your data. so, to protect...
82
82
Sep 25, 2014
09/14
by
FBC
tv
eye 82
favorite 0
quote 0
i always say every piece of technology is hackable which means a breach is inevitable. but companies don't need to throw their hands up, there are some creative, different approaches they can take to protective themselves from cybercriminals. >> with that in mind, michael what is the biggest mistakes you believe that the companies businesses make white hack hackers it comes to protecting customer's information. >> well, as you said earlier, everybody needs to expect that a breach is going to happen. and the key to it is having a data breach response in place. a recent study that we did with the upon the man institute dhaitd 73 percent of executives have a plan in place which is up about 12 percent from last year, and that's the best defense to have in place before an event occurs. >> michael, you know, it seems to me as a consumer, if your information is stolen, it seems like it's incumbent to prove, hey, i'm not the ones who bought these goods. i'm not the one responsible for this. what can consumers do if they can't prevent it, what should they do if they suspect some
i always say every piece of technology is hackable which means a breach is inevitable. but companies don't need to throw their hands up, there are some creative, different approaches they can take to protective themselves from cybercriminals. >> with that in mind, michael what is the biggest mistakes you believe that the companies businesses make white hack hackers it comes to protecting customer's information. >> well, as you said earlier, everybody needs to expect that a breach is...
68
68
tv
eye 68
favorite 0
quote 0
anything is hackable if it's on the internet.you want to be secure, use cash, don't carry a smartphone. neil: what's the alternative, back it up on a hard drive? what do you do? >> you don't send nude pictures first of all. second of all -- neil: speak for yourself, i see what you're getting at. >> there's things you can do. two-step verification processes that apple has put in place. you know i think there was vulnerability in the find my iphone where hackers were trying to guess passwords over and over and over using brute force technology. typically that can be stopped after you guess a password wrong a couple of times. there is definitely something wrong with the security here and i think companies, everyone is a target, target was a target, apple is a target. any big name company is a target so you're never going to be completely safe so you always need to be on the lookout. change password, use two-step verification processes. everyone is a target on the internet. neil: i think this is something we never assigned to apple,
anything is hackable if it's on the internet.you want to be secure, use cash, don't carry a smartphone. neil: what's the alternative, back it up on a hard drive? what do you do? >> you don't send nude pictures first of all. second of all -- neil: speak for yourself, i see what you're getting at. >> there's things you can do. two-step verification processes that apple has put in place. you know i think there was vulnerability in the find my iphone where hackers were trying to guess...
169
169
tv
eye 169
favorite 0
quote 0
everything is hackable. no such thing as unhackable system. they made a good case about the security. >> i agree with you. >> one thing whenever you lose with the credit card company. i wouldn't be surprised if the same thing is here true. is it apple's concern if something happens to the credit card? melissa: we'll take a quick pause and more with the iwatch and everything apple no doubt. >>> out with the old and in with the glue. ford gets into sticky situation to assemble their cars. amazon brings drones to the masses. thank goodness. hope you save up, jeff bezos drone store is reality. i can't wait. smart money and more apple coming right up. ♪ whenwork with equity experts who work with regional experts who work with portfolio management experts that's when expertise happens. mfs. because there is no expertise without collaboration. melissa: it is here. apple unveiling a new smart watch along with twoism phones. stock is going bananas. is everybody watching? is everybody on twitter? i'm pretty sure internet is broken. go to nicole petallid
everything is hackable. no such thing as unhackable system. they made a good case about the security. >> i agree with you. >> one thing whenever you lose with the credit card company. i wouldn't be surprised if the same thing is here true. is it apple's concern if something happens to the credit card? melissa: we'll take a quick pause and more with the iwatch and everything apple no doubt. >>> out with the old and in with the glue. ford gets into sticky situation to...
273
273
Sep 2, 2014
09/14
by
CNNW
tv
eye 273
favorite 0
quote 0
. >> first time i heard the word 67 i-cloud, i said, that sounds hackable, and i'm an idiot, honestly big mass hacks. can you deet whlete what you ha is it out there already? >> i spoke to michael greg, a hacker who helps celebrities, i said, what's the number one thing you tell the celebrities? he said the number one thing is don't uplot your information to the cloud because even when you do delete that information it takes four to six weeks to actually disappear. there are some steps you can take. you can disable the photo stream on your iphone because it automatically syncs your pictures to the cloud. also, make sure you delete your photos from your camera roll on your phone. >> really, you can't have them cycling on your phone? >> delete in every single place. also, turn on two factor authentication. it basically makes it two steps. you get a text message and then enter the code. that could have potentially prevented something like this. >> jeffrey, think i know the answer to this, but do these celebrities have a hope in you know what of ever getting any kind of action on whomever
. >> first time i heard the word 67 i-cloud, i said, that sounds hackable, and i'm an idiot, honestly big mass hacks. can you deet whlete what you ha is it out there already? >> i spoke to michael greg, a hacker who helps celebrities, i said, what's the number one thing you tell the celebrities? he said the number one thing is don't uplot your information to the cloud because even when you do delete that information it takes four to six weeks to actually disappear. there are some...
508
508
Sep 13, 2014
09/14
by
KQED
tv
eye 508
favorite 0
quote 0
can -- we think we can make a contribution beyond just doing -- just making sure the cloud is not hackable. >> charlie: this is different than the hacking of home depot or -- >> totally different. >> charlie: that was part one of our two-part conversation with tim cook, c.e.o. of apple. part two will be monday. we'll talk about many things including this question, what comes after the internet? thank you for joining us. see you on monday. for more about this program and earlier episodes, visit us online at pbs.org and charlierose.com. captioning sponsored by rose communications captioned by media access group at wgbh access.wgbh.org . >>> is this is "nightly business report" with tyler mathisen and susie gharib. >>> out of hiding, new data shows people are spending again and sentiment is upbeat. is this the start of a consumer revival? >>> i demand, apple says pre-orders for the new phone hit a new record, and now, the wireless carriers are fighting tooth and nail to win your business but at what cost to them? >>> and big week ahead, rest up this weekend. three key events this weekend to k
can -- we think we can make a contribution beyond just doing -- just making sure the cloud is not hackable. >> charlie: this is different than the hacking of home depot or -- >> totally different. >> charlie: that was part one of our two-part conversation with tim cook, c.e.o. of apple. part two will be monday. we'll talk about many things including this question, what comes after the internet? thank you for joining us. see you on monday. for more about this program and...
122
122
Sep 15, 2014
09/14
by
KQED
tv
eye 122
favorite 0
quote 0
can -- we think we can make a contribution beyond just doing -- just making sure the cloud is not hackable. >> charlie: this is different than the hacking of home depot or -- >> totally different. >> charlie: that was part one of our two-part conversation with tim cook, c.e.o. of apple. part two will be monday. we'll talk about many things including this question, what comes after the internet? thank you for joining us. see you on monday. for more about this program and earlier episodes, visit us online at pbs.org and charlierose.com. captioning sponsored by rose communications captioned by media access group at wgbh access.wgbh.org >> the following kqed production was produced in high definition. ♪ ♪ must have soup >> the pancake is to die for! >> it was a gut-bomb, but i liked it. >> i actually fantasize in private moments abouttthe food i had. >> i didn't like it. >> you didn't like it? >> dining here makes me feel rich.
can -- we think we can make a contribution beyond just doing -- just making sure the cloud is not hackable. >> charlie: this is different than the hacking of home depot or -- >> totally different. >> charlie: that was part one of our two-part conversation with tim cook, c.e.o. of apple. part two will be monday. we'll talk about many things including this question, what comes after the internet? thank you for joining us. see you on monday. for more about this program and...
279
279
Sep 23, 2014
09/14
by
WHYY
tv
eye 279
favorite 0
quote 0
flourishing biosystems that generate huge amounts of power, hackable systems that will teach us to be more productive and creative. >> what happens if we could do something like grow a cell phone using a mushroom, to physically make electronics. >> reporter: literally grow the entire cell phone, or grow some parts of it that you put into a cell phone? >> obviously we'd start with figuring out how to grow parts, and then we'd see how far we could take it. >> reporter: the biohackers at "glowing plant" in san francisco are shooting for a more modest goal. using this video, they raised around half a million dollars to research how to make a normal plant glow in the dark using d.n.a from a squid. >> what if we used trees to light our streets instead of electric street lamps? >> reporter: antony evans, not a biologist but a marketing specialist is co-founder. >> bioluminescence is the process by which biological organisms make light from their d.n.a. so we go online, we download the genes responsible for making a bacteria glow we put them on our software and we press print. it's nearly as
flourishing biosystems that generate huge amounts of power, hackable systems that will teach us to be more productive and creative. >> what happens if we could do something like grow a cell phone using a mushroom, to physically make electronics. >> reporter: literally grow the entire cell phone, or grow some parts of it that you put into a cell phone? >> obviously we'd start with figuring out how to grow parts, and then we'd see how far we could take it. >> reporter: the...
160
160
Sep 9, 2014
09/14
by
CNBC
tv
eye 160
favorite 0
quote 0
>> the banks are so hackable. you look at the spending, look at the revenues of palo alto, which i regard as the best. revenues are so small versus what needs to be spent. doesn't that say it all? people are not focused on this issue. they won't be until they wake up and see they have zero balance or they bought a power tool in california. >> it's been some time from now i picked up from board members that it is a board level issue. that was not the case a couple of years ago. my reporting has been focused much more on chinese cyber crime, stealing intellectual property, becoming a board level issue. this clearly is, too. >> jack spoke about it differing alpha. i had to interview him. my first reaction was gibb them that story about breaching. no. no. someone, we don't know -- remember, we only know the ones of the people who weren't good and got caught. we don't have the ones of the people that are ongoing and fooling everybody. we are only seeing the morons who do this. the smart guys, we don't know about. >> ri
>> the banks are so hackable. you look at the spending, look at the revenues of palo alto, which i regard as the best. revenues are so small versus what needs to be spent. doesn't that say it all? people are not focused on this issue. they won't be until they wake up and see they have zero balance or they bought a power tool in california. >> it's been some time from now i picked up from board members that it is a board level issue. that was not the case a couple of years ago. my...
341
341
Sep 28, 2014
09/14
by
FOXNEWSW
tv
eye 341
favorite 0
quote 1
all technology is hackable. so we have to make sure we strike that right balance. our privacy and security. but let's make sure we say if the protocols with law enforcement are not working, we'll modify those. let's not say we are locking out the bad guys and they can hack in yet the good guys can't get access to the information without taxpayer expense and a longer wait time. >> what does it mean to be a good guy? the nsa did it without their permission anyway. it's a great debate this morning. eric, teresa, thank you so much. we want to hear from our viewers this morning, where do you come down on this? do you think the federal working with apple, e access to google and others? or butt out, keep out of my privacy? let us know. >>> coming up on the show, she went to show a house to a prospective home buyer and never came back. the latest on the intense search for the missing real estate agent. >>> and turn your kitchen into a laboratory. this scientist turned stay-at-home mom is cooking up experiments perfect for you and your kids. @zvf ♪ >>> that's your shot of
all technology is hackable. so we have to make sure we strike that right balance. our privacy and security. but let's make sure we say if the protocols with law enforcement are not working, we'll modify those. let's not say we are locking out the bad guys and they can hack in yet the good guys can't get access to the information without taxpayer expense and a longer wait time. >> what does it mean to be a good guy? the nsa did it without their permission anyway. it's a great debate this...