172
172
Feb 7, 2015
02/15
by
WPVI
tv
eye 172
favorite 0
quote 0
is sharing password illegal. many terms of agreement seem ambiguous and companies don't seem to be cracking down. >> business models are evolving and things could be different next year. for the time being they're interested in creating streaming media addicts. >> what do you feel like watching tonight. >> while it may be okay to turn out your password you could get a surprise like marina's did when the show they wanted to watch was unavailable. >> my daughter said oh, i bet so and so is watching and i said how would they be watching and she said i gave her my password. >> simultaneous viewing is limited. netflix is 1 to 4. amazon prime two at a time and hbo go allows three and hulu plus one. watch espn does not state any limits. if you don't want to interrupt your viewing pleasure those should make you think twice before you give out your password hbo and dish network offered more open line contact and they may get more interested in who is watching. we put company resopss on 6abc.com. i'm nydia han, chapel 6abc
is sharing password illegal. many terms of agreement seem ambiguous and companies don't seem to be cracking down. >> business models are evolving and things could be different next year. for the time being they're interested in creating streaming media addicts. >> what do you feel like watching tonight. >> while it may be okay to turn out your password you could get a surprise like marina's did when the show they wanted to watch was unavailable. >> my daughter said oh, i...
210
210
Feb 5, 2015
02/15
by
WPVI
tv
eye 210
favorite 0
quote 0
plus -- >> to stream tv shows you need a password and people are sharing passwords to save extra bucks what you need to know about this practice. >>> "action news" continues with meteorologist, adam joseph alicia vitarelli, shirleen allicot and brian taff. >> it is 4:30 and "action news" continues with sad news about whitney houston's only daughter bobbi kristina what we are hearing about her condition. >> and boy tox more men are turning to the needle for a tuneup why doctors dub their request as the wall street wrinkle. >>> and a clueless boater missing a whale by staying glued to his phone the guy that snapped the picture is local. >> we'll begin with a cross county investigation into stolen goods. this was the scene outside of a north philadelphia home in january, officers hauled away items from a stash house. this afternoon police made a similar discovery in delaware county and now investigators are working to find out if these might be connected. john rawlins live in landsdowne with what we have learned today. hi john. >> reporter: hi brian this is west green wood avenue in lands
plus -- >> to stream tv shows you need a password and people are sharing passwords to save extra bucks what you need to know about this practice. >>> "action news" continues with meteorologist, adam joseph alicia vitarelli, shirleen allicot and brian taff. >> it is 4:30 and "action news" continues with sad news about whitney houston's only daughter bobbi kristina what we are hearing about her condition. >> and boy tox more men are turning to the...
585
585
Feb 4, 2015
02/15
by
WCAU
tv
eye 585
favorite 0
quote 0
i will give you each of you a a password.have a clue is illegal as determined by our judges, you will hear this -- [ buzzer ] and you will forfeit your turn. and the team with the most points after the four words wins. any questions? great. ellen -- >> who are the judges? >> jimmy: what are the rules? >> steve: why don't you start us off. there you go. >> jimmy: who goes? >> me. >> the password is -- >> jimmy: i can't see it. >> call. [ laughter and applause ] >> jimmy: booty? >> yes. [ cheers and applause ] [ ding ] ♪ >> no way. no, no, no, no. >> jimmy: oh, my gosh. >> are you kidding me? wow. >> jimmy: i swear. >> that's not fair. >> jimmy: we are really good. >> steve: oh, hall of shame. >> pirate. >> jimmy: oh, yeah. steve, get your mind out of the gutter. >> jimmy, steve. >> the password is. >> i got a terrible feeling about this. >> yeah, i don't feel good about this. >> steve: steve, you're going start us off. >> tony. [ laughter and applause ] >> soprano. [ cheers and applause ] [ ding ] ♪ >> steve: apparently this b
i will give you each of you a a password.have a clue is illegal as determined by our judges, you will hear this -- [ buzzer ] and you will forfeit your turn. and the team with the most points after the four words wins. any questions? great. ellen -- >> who are the judges? >> jimmy: what are the rules? >> steve: why don't you start us off. there you go. >> jimmy: who goes? >> me. >> the password is -- >> jimmy: i can't see it. >> call. [ laughter...
28
28
Feb 14, 2015
02/15
by
CSPAN
tv
eye 28
favorite 0
quote 0
he actually has used different passwords, everyone says you need strong passwords, but it is no longer just passwords, they are not enough. you need tech security companies working on a multifaceted spectrum of not just authentication security. it is costly. you cannot do it on the cheap. what we do see is that in the last 10 or so years, companies are making progress. in the larger companies, it has been dedicated -- they have a large amounts of money. they put that toward security and you can see that the executives are listening more and more about how do we institute risk management programs. the concerned though, with smaller businesses which cannot always afford the cost, so i completely agree with that, the note sent in that it is not about convenience. it is no longer acceptable. these standards, the framework that the president actually supported, that they came out with in 2014, it allows us to have a benchmark for companies. even the sophisticated companies and newer companies, they are assessing benchmarks. we need to measure security. there is nothing convenient about secu
he actually has used different passwords, everyone says you need strong passwords, but it is no longer just passwords, they are not enough. you need tech security companies working on a multifaceted spectrum of not just authentication security. it is costly. you cannot do it on the cheap. what we do see is that in the last 10 or so years, companies are making progress. in the larger companies, it has been dedicated -- they have a large amounts of money. they put that toward security and you can...
90
90
Feb 17, 2015
02/15
by
KNTV
tv
eye 90
favorite 0
quote 0
but is sharing your password illegal? many of the terms of agreement seem ambiguous, unclear, and the companies don't seem to be cracking down. >> business models, however, are evolving, and next year things could be different, but for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> while it technically may be okay to hand out your password you could get a nasty surprise like the muranos did when the show they wanted to watch was suddenly blocked. >> they said netflix is not connecting. so my husband said see if the girls are watching. that should have been okay but my daughter said i bet so-and-so is watching. i'm like how would so-and-so be watching? she said i gave her my password. >> netflix, like several others limited simultaneous viewing. each subskrpgz plan is different. netflix is 1 to 4. amazon prime, two at a time hbo go allows three. hulu plus only one. watch espn unlike the other, does not state any limit. so if you don't want to interrupt
but is sharing your password illegal? many of the terms of agreement seem ambiguous, unclear, and the companies don't seem to be cracking down. >> business models, however, are evolving, and next year things could be different, but for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> while it technically may be okay to hand out your password you could get a nasty surprise like the muranos did when the show...
159
159
Feb 18, 2015
02/15
by
WRC
tv
eye 159
favorite 0
quote 0
but is share yurg password illegal? the terms of agreement seem ambiguous but the companies don't seem to be cracking down. >> their business models however are evolving and next year things cob different. but for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: while it technically may be okay to hand out your password, you could get a nasty surprise like the moranos did when the show they wanted to watch got blocked. >> they said netflix is not connecting. my husband said, see if the girls are on. see what's going on. that should have been okay except my daughter said, oh i bet so and so is watching. i said, how would so and so be watching? she said i gave her my password. >> reporter: netflix like others limits simultaneous viewing. each plan is different. netflix is one to four amazon two at a time hbo go alous three, hulu plus only one. watch espn, unlike the others, does not state a limit. so, if you don't want to interrupt your own vie
but is share yurg password illegal? the terms of agreement seem ambiguous but the companies don't seem to be cracking down. >> their business models however are evolving and next year things cob different. but for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: while it technically may be okay to hand out your password, you could get a nasty surprise like the moranos did when the show they wanted...
102
102
Feb 22, 2015
02/15
by
WRC
tv
eye 102
favorite 0
quote 0
but is sharing your password illegal?y of the terms of agreement seem ambiguous, but the companies don't seem to be cracking down. >> their business models however, are evolving. next year things could be different. for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: while it technically may be okay to hand out your password you could get a nasty surprise like the moranos did when the show they were watching got blocked. it said netflix isn't connecting. my daughter said oerks i bet so and so watching. i said how would so and so be watching? she said gave her my password. >> reporter: each subscription plan is different. netflix is one to four, amaz prime two at a time. hbo go allows three, hul low plus allows one. watch espn unlike the others does not state any limits. if you don't want to interrupt your own viewing pleasure those limits should make you think twice before you give up your password. erika gonzalez news 4. >>> right now it is j
but is sharing your password illegal?y of the terms of agreement seem ambiguous, but the companies don't seem to be cracking down. >> their business models however, are evolving. next year things could be different. for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: while it technically may be okay to hand out your password you could get a nasty surprise like the moranos did when the show they...
44
44
Feb 27, 2015
02/15
by
BLOOMBERG
tv
eye 44
favorite 0
quote 0
our job is to make your face your password.ive years from now we were -- we will be wondering what the heck those things even work. >> we are talking about the dual identification to biometric identification. what is the role of silicon and when will the technology's focus around that? >> one of the benefits is we're merging hardware and software technologies. we launched a new product where you can use multifactor authentication. you can use your face or fingerprint or voice to be able to login. we think it will be more secure. whether it is logging into your favorite websites, no more passwords as we roll these things out. >> when you look at the business , a lot of companies talk about it. the revenues are getting to be something serious. is this the place where mobility matches, even though it is not the main chip in a cell phone? >> everything is getting smart and connected from vending machines to kiosks. we are a communication company. our job is to make everything in the world more smart and connected and to do it in a
our job is to make your face your password.ive years from now we were -- we will be wondering what the heck those things even work. >> we are talking about the dual identification to biometric identification. what is the role of silicon and when will the technology's focus around that? >> one of the benefits is we're merging hardware and software technologies. we launched a new product where you can use multifactor authentication. you can use your face or fingerprint or voice to be...
80
80
Feb 20, 2015
02/15
by
KOFY
tv
eye 80
favorite 0
quote 0
third hacker cracked a password by running a program with every imaginable password combination until it spit out the network key. >> once you can get the network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is all the people about aren't security people don't have the security background to officially design a product. >>reporter: we went with mr. while he hacked into a home in menlo park. he did it from his car outside. but he could have been anywhere. hacking into a home in the bay area and then sending someone else to carry out the burglary women. call the reverse engineer the device and just determine how it worked and once you know how it work then figure out how you can the compromise it. >> reverse engineering can take week and once it happens the rest can be done in a matter of seconds. took him less than 30 s
third hacker cracked a password by running a program with every imaginable password combination until it spit out the network key. >> once you can get the network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is...
99
99
Feb 13, 2015
02/15
by
FBC
tv
eye 99
favorite 0
quote 0
>> yeah, we all laughed very loudly as he describes his own password usage as password and 123457. but i think really the point was, we have to evolve a bit. and authentication. some of the technologies that we have, some of the things that tim cook laid out with apple as well as what rj laid out with mastercard were important too. we need a personal identifiable password. wristband. ekg information. retina scans. ways to identify yourself so we can avoid fraud. liz: we weren't on the inside there. can you tell us quickly what tim cook said that you thought was really important. >> well, he laid out the future where he was baking in security in some of the servers he's laying out. particularly apple pay. in apple pay's case, how do we go about securing better, not worrying about storing credit card data, but creating a one-time usage of a token to make a transaction that can never breach privacy or security. i think this revolution there is the evolution of sort of how we do commerce online and how apple -- liz: well, tom, i think apple pay and all the mobile payments, harvard will
>> yeah, we all laughed very loudly as he describes his own password usage as password and 123457. but i think really the point was, we have to evolve a bit. and authentication. some of the technologies that we have, some of the things that tim cook laid out with apple as well as what rj laid out with mastercard were important too. we need a personal identifiable password. wristband. ekg information. retina scans. ways to identify yourself so we can avoid fraud. liz: we weren't on the...
123
123
Feb 20, 2015
02/15
by
KGO
tv
eye 123
favorite 0
quote 0
third hacker cracked a password by running a program with every imaginable password combination until it spit out the network key. >> once you can get the network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is all the people about aren't security people don't have the security background to officially design a product. >>reporter: we went with mr. while he hacked into a home in menlo park. he did it from his car outside. but he could have been anywhere. hacking into a home in the bay area and then sending someone else to carry out the burglary women. call the reverse engineer the device and just determine how it worked and once you know how it work then figure out how you can the compromise it. >> reverse engineering can take week and once it happens the rest can be done in a matter of seconds. took him less than 30 s
third hacker cracked a password by running a program with every imaginable password combination until it spit out the network key. >> once you can get the network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is...
92
92
Feb 20, 2015
02/15
by
KGO
tv
eye 92
favorite 0
quote 0
third hacker cracked a password by running a program with every imaginable password combination untile network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is all the people about aren't security people don't have the security background to officially design a product. >>reporter: we went with mr. while he hacked into a home in menlo park. he did it from his car outside. but he could have been anywhere. hacking into a home in the bay area and then sending someone else to carry out the burglary women. call the reverse engineer the device and just determine how it worked and once you know how it work then figure out how you can the compromise it. >> reverse engineering can take week and once it happens the rest can be done in a matter of seconds. took him less than 30 seconds to gain access to the camera. now watch in re
third hacker cracked a password by running a program with every imaginable password combination untile network key it's as if you were in the person apartments house. you are another device because you are on their network. >>reporter: weak password one of the main reasons why hacker job is so easy. another is look oven drippings which requires secret key or password to read it. >> one of the reasons the security is so bad is all the people about aren't security people don't have...
57
57
Feb 27, 2015
02/15
by
BLOOMBERG
tv
eye 57
favorite 0
quote 0
our job is to basically make your face your password.ars from now, we will be wondering what the heck does things even more. cory: what is the technology around that? we are constantly doing cyber security stories on "humbert west," talking about the -- "bloomberg west," talking about dual identification, biometrics. kirk: at intel we are merging hardware and software technologies together. we have launched a new product called tricky, where you can use multifactor authentication. that means multiple factors like your face, your fingerprints, or your voice to be able to login. whether it is logging into windows or your favorite websites, no more passwords as we roll this thing out. cory: when we look at the internet of things business, you guys put some numbers up and the revenues are something serious. is this a place where sort of mobility matches with the internet of things, and you end up having a presence in the mobile world, even if it is not the main chip in a cell phone? kirk: the internet of things, everything is getting connect
our job is to basically make your face your password.ars from now, we will be wondering what the heck does things even more. cory: what is the technology around that? we are constantly doing cyber security stories on "humbert west," talking about the -- "bloomberg west," talking about dual identification, biometrics. kirk: at intel we are merging hardware and software technologies together. we have launched a new product called tricky, where you can use multifactor...
43
43
Feb 17, 2015
02/15
by
CSPAN3
tv
eye 43
favorite 0
quote 0
the password is gone. it's gone. what they really want is to identify in other ways is going that direction. the ones look at the heartbeat of you which identify wearing a bracelet and you tap the computer and you're fully live and connected, or you open your car with it and it starts and sets your map to your office, and on the way to dunkin' donuts to buy coffee and pay with your mastercard automatically that's where it's going. that takes away the pain of remembering the password to converting to who you are. i think that will be where this will end up finally. there are challenges of privacy there are challenges of a lot of information about you which you may not want, and those are real topics to be discussed which we began talking outside with our presenter, but the fact is that's the first one. the second one is you can use data and analytics in a clever way and a smart way to create a safety net. it's one of the things they're launching to be able to protect wrong transactions that come through by them being
the password is gone. it's gone. what they really want is to identify in other ways is going that direction. the ones look at the heartbeat of you which identify wearing a bracelet and you tap the computer and you're fully live and connected, or you open your car with it and it starts and sets your map to your office, and on the way to dunkin' donuts to buy coffee and pay with your mastercard automatically that's where it's going. that takes away the pain of remembering the password to...
59
59
Feb 13, 2015
02/15
by
FBC
tv
eye 59
favorite 0
quote 0
. >> this is just too easy for hackers to figure out user names and passwords like, password. [laughing] or, one, two, three, four, five. seven. [laughter] those are some of my previous passwords. [laughing] i changed them since then. >> mine too and me too. as for initiatives the white house announced that dozens of companies like apple and intel are supporting the president's 2014 cybersecurity framework. he also sign ad new executive order for information-sharing. companies also announced support for new, secure, payment technologies and multifactor authentication systems to replace passwords. apple ceo tim cook urged participants to work together. >> we must get this right. history has shown us that sacrificing our right to privacy can have dire consequences. >> but among the no shows of silicon valley, mark zuckerberg of facebook, marissa mayer of yahoo! and eric schmidt of google. they reportedly are still upset about the lack of reforms by the administration in washington of the government's surveillance programs that edward snowden leaked, leaked information about, but
. >> this is just too easy for hackers to figure out user names and passwords like, password. [laughing] or, one, two, three, four, five. seven. [laughter] those are some of my previous passwords. [laughing] i changed them since then. >> mine too and me too. as for initiatives the white house announced that dozens of companies like apple and intel are supporting the president's 2014 cybersecurity framework. he also sign ad new executive order for information-sharing. companies also...
390
390
Feb 26, 2015
02/15
by
KNTV
tv
eye 390
favorite 0
quote 0
that is one secure password. intel. this is where it all changes.e ocean ♪ ♪ causing a commotion, coz they are so awesome ♪ ♪ narwhals, narwhals, swimming in the ocean ♪ ♪ pretty big and pretty white...♪ check out sprint's unlimited plan. unlimited data, talk & text for just $50 a month. switch now and we'll even buy out your current contract. visit us online or at a sprint store today. whaa box.is? it takes worn out things and makes 'em better. it's our biggest breakthrough yet! we're taking worn out batteries... ...and making them into something strong. energizer ecoadvanced. world's first battery made with recycled batteries. that's positivenergy. sure! i offer multi-car, safe driver, and so many other discounts that people think i'm a big deal. and boy, are they right. ladies, i can share hundreds in savings with all of you! just visit progressive.com today. but right now, it's choosing time. ooh! we have a winner. all: what? [chuckles] he's supposed to pick one of us. this is a joke, right? that was the whole point of us being here. ♪ [ cheers
that is one secure password. intel. this is where it all changes.e ocean ♪ ♪ causing a commotion, coz they are so awesome ♪ ♪ narwhals, narwhals, swimming in the ocean ♪ ♪ pretty big and pretty white...♪ check out sprint's unlimited plan. unlimited data, talk & text for just $50 a month. switch now and we'll even buy out your current contract. visit us online or at a sprint store today. whaa box.is? it takes worn out things and makes 'em better. it's our biggest breakthrough...
74
74
Feb 17, 2015
02/15
by
CSPAN3
tv
eye 74
favorite 0
quote 0
like, password. or 12345. 7. those are some of my previous passwords. i've changed them since then. [ applause ] so this summit is an example of what we need more of. all of us working to the to do what none of us can achieve alone. and it is difficult. some of the challenges i have described today have defied solutions for years. and i want to say very clearly that as somebody who is a former constitutional law teacher and somebody who deeply values his privacy and his family's privacy, although i chose the wrong job for that. but -- but will be a private citizen again and cares deeply about this. i have to tell you that grappling with how government protects the american people from adverse events while at the same time making sure that government itself is not abusing its capabilities is hard. you know, the cyber world is sort of the wild, wild west and to some degree we're asked to be the sheriff. when something like sony happens, people want to know what can government do about this. if informat
like, password. or 12345. 7. those are some of my previous passwords. i've changed them since then. [ applause ] so this summit is an example of what we need more of. all of us working to the to do what none of us can achieve alone. and it is difficult. some of the challenges i have described today have defied solutions for years. and i want to say very clearly that as somebody who is a former constitutional law teacher and somebody who deeply values his privacy and his family's privacy,...
43
43
Feb 14, 2015
02/15
by
CSPAN2
tv
eye 43
favorite 0
quote 0
so the passwords is gone.t they really want is identifying -- the previous question is going in that direction. everything from biometrics to new technology that looks at the underlying heart beat which identifies by wearing a bracelet that it is -- you tap the computer and year you're fully connected or your open your car and it starts your maps to your office and on the way to dunkin' doughnuts and pay with the mastercard automatically. that's where it's going, and takes away the pain of remembering the passwords and that will be where this will end up. there are challenges of privacy. there are challenges of a lot of information, a lot of people about you, which you may not want and those are opportunities to discuss -- talking with the presenters, but the fact is that that is the first one. the second one is you can use data and analytics in a really clever way and a smart way, with anonhighsed data to create a safety net one thing they're launching to -- enough data and enough predictive analytics you can
so the passwords is gone.t they really want is identifying -- the previous question is going in that direction. everything from biometrics to new technology that looks at the underlying heart beat which identifies by wearing a bracelet that it is -- you tap the computer and year you're fully connected or your open your car and it starts your maps to your office and on the way to dunkin' doughnuts and pay with the mastercard automatically. that's where it's going, and takes away the pain of...
199
199
Feb 11, 2015
02/15
by
CNBC
tv
eye 199
favorite 0
quote 0
>> when you forgot my password. find out about you that are super simple. they're not very challenging. >> and i'm happily, or at least double authenticated, can you beat me now? >> double authentication is a very good thing. you can enable this on your social media accounts. i highly recommend it. it's not impervious but makes it definitely harder to break into. >> david, thank you for joining us and scaring us. we appreciate it. >> thanks. appreciate it. >> we don't need those skills anymore, right? >> some might -- something that you don't want the rest of the world to hear. >> speak for yourself. >>> coming up jim cramer is getting fired up for the trading day. we're going to head had downtown to the new york stock exchange. >>> and as we head to break take a look at shares of starbucks hitting an all-time high as the company's plan for global growth continues to gain momentum. ♪ when you run a business, you can't settle for slow. that's why i always choose the fastest intern. the fastest printer. the fastest lu
>> when you forgot my password. find out about you that are super simple. they're not very challenging. >> and i'm happily, or at least double authenticated, can you beat me now? >> double authentication is a very good thing. you can enable this on your social media accounts. i highly recommend it. it's not impervious but makes it definitely harder to break into. >> david, thank you for joining us and scaring us. we appreciate it. >> thanks. appreciate it. >>...
116
116
Feb 14, 2015
02/15
by
KGO
tv
eye 116
favorite 0
quote 0
names and passwords like password. [ laughter ] or one, two, three, four five. seven. those are some of my previous passwords. >> jokes aside he solicited help in forming a partnership of the private sector with government to exchange intelligence on cyberthreats and to work on protection. recent attacks on sony, anthem and retailers such as target reflect how everyone is at risk. >> because when it comes to the rights of customers and the rights of citizens, it's important to realize we're all talking about the same people. >> however, there was little caution raised about tech companies can collaborating with government. >> today we heard a lot of we can, we want to. and not a lot of we don't want to and this is why. >> a few key ceos from facebook anya who didn't attend. some firms are at odds over allegations the national security agency is spying on customers through software and hardware. >> we have not had a national level discussion where and when the government can do surveillance and on who. >> meanwhile new technology is struggling to keep the bad guy
names and passwords like password. [ laughter ] or one, two, three, four five. seven. those are some of my previous passwords. >> jokes aside he solicited help in forming a partnership of the private sector with government to exchange intelligence on cyberthreats and to work on protection. recent attacks on sony, anthem and retailers such as target reflect how everyone is at risk. >> because when it comes to the rights of customers and the rights of citizens, it's important to...
62
62
Feb 13, 2015
02/15
by
FBC
tv
eye 62
favorite 0
quote 0
like "password." those are some of my previous passwords. [laughter] i've changed them since then. [applauding] president obama: so this summit is an example of what we need more of. all of us working together to do what none of us can achieve alone. and it is difficult. some of the challenges i've described today have defied solutions for years. and -- and i want to say very clearly that, as somebody who is a former constitutional law teacher and somebody who deeply values his privacy and his family's privacy, although i chose the wrong job for that but -- but will be a private citizen again and cares deeply about this. i have to tell you that grappling with how government protects the american people from adverse events while at the same time making sure that government itself is not abusing its capabilities it's hard. you know, this cyber world is sort of the wild, wild west. and to some degree, we're asked to be the sheriff. when something like sony happens, people want to know what can government
like "password." those are some of my previous passwords. [laughter] i've changed them since then. [applauding] president obama: so this summit is an example of what we need more of. all of us working together to do what none of us can achieve alone. and it is difficult. some of the challenges i've described today have defied solutions for years. and -- and i want to say very clearly that, as somebody who is a former constitutional law teacher and somebody who deeply values his...
94
94
Feb 5, 2015
02/15
by
LINKTV
tv
eye 94
favorite 0
quote 0
the most important thing is to not enter private information such as ids or passwords while using freei. >> reporter: computer networking plays a key role in modern life. a failure to crack down on cyber crime could greatly upset society and have serious consequences. "nhk world".." >>> flooding continues to cause problems in southern europe including serious damage to a unesco world heritage site. jonathan oh is here with details. >> hi, gene, we are keeping an eye in southern europe once again because we haven't been seeing persistent rainfall extending the past week or so and further back in some places. you can see the clear area of rotation south of france pushing towards italy bringing a lot of ample moisture with it. all the moisture is affecting east to italy and the ballkans peninsula. we will start in macedonia first and give you an idea what's happening there. this lingering low pressure system and waves of other low pressure system have caused days of severe weather in southern europe. drenching waves led to widespread flooding in macedonia and could for flooding defenses w
the most important thing is to not enter private information such as ids or passwords while using freei. >> reporter: computer networking plays a key role in modern life. a failure to crack down on cyber crime could greatly upset society and have serious consequences. "nhk world".." >>> flooding continues to cause problems in southern europe including serious damage to a unesco world heritage site. jonathan oh is here with details. >> hi, gene, we are keeping...
45
45
Feb 14, 2015
02/15
by
CSPAN2
tv
eye 45
favorite 0
quote 0
like password or 123457. those are some of my previous passwords. i have changed them since then. this summit is an example of what we need more of. all of us working together to do what none of us can achieve alone. it is difficult. some of the challenges i described today have defied solutions for years and i want to say very clearly that as somebody who is a former constitutional law teacher, somebody who deeply values his privacy and his family's privacy although i chose the wrong job for that but will be a private citizen again and cares deeply about this, i have to tell you that grappling with how government protects the american people from adverse events, at the same time making sure government itself is not abusing its capabilities is hard. the cyberworld is a sort of wild wild west and to some degree we are asked to be the sheriff. when something like sony happens people want to know what government can do about this. information being shared by terrorists in the cyberworld and attack happens, peopl
like password or 123457. those are some of my previous passwords. i have changed them since then. this summit is an example of what we need more of. all of us working together to do what none of us can achieve alone. it is difficult. some of the challenges i described today have defied solutions for years and i want to say very clearly that as somebody who is a former constitutional law teacher, somebody who deeply values his privacy and his family's privacy although i chose the wrong job for...
99
99
Feb 20, 2015
02/15
by
CNNW
tv
eye 99
favorite 0
quote 1
this is your password. you have to use your password.f anyone wanted to steal your bitcoins, they have to steal your phone and your chips. tap back into the phone, it's encrypted in your wallet. >> genius. >> this is your bitcoin address. think of it as an e-mail address. send bitcoins to that address. >> so if i want to buy bitcoins here tonight, what do i have to do? >> you have to place a bid and ask order. that guy right there. he'll match you with someone else to sell. >> there are people here tonight paying cash, giving cash for bitcoins. >> yeah, basically. >> awesome. this place is no different than an auction house. instead of art, it's bitcoin. >> how much you want to buy? >> one. >> mark at 627. buyers pay that. 634. 630 right now and then become the best bid. >> great. let's go for 630 right now. >> 627 bid. 630. for 627. >> 31. 31. >> okay, 628 bid. 631. 628. >> i have no idea what's happening. i have no idea what's going on. >> 633. 633. >> i'm buying 630 from you? >> yeah. >> okay. so now explain it to me. >> no problem. y
this is your password. you have to use your password.f anyone wanted to steal your bitcoins, they have to steal your phone and your chips. tap back into the phone, it's encrypted in your wallet. >> genius. >> this is your bitcoin address. think of it as an e-mail address. send bitcoins to that address. >> so if i want to buy bitcoins here tonight, what do i have to do? >> you have to place a bid and ask order. that guy right there. he'll match you with someone else to...
89
89
Feb 13, 2015
02/15
by
BLOOMBERG
tv
eye 89
favorite 0
quote 0
like "password."hter] or 123457. [laughter] those are some of my previous passwords. [laughter] i have changed them since then. so this summit is an example of what we need more off, working together to do what none of us can achieve alone. and it is difficult. some of the challenges i have described today have defied solutions for years. and i want to say very clearly as someone who is a former constitutional law teacher and someone who deeply values his privacy and his family's privacy -- although a chose the wrong job for that -- [laughter] but will be a private citizen again and cares deeply about this, i have to tell you grappling with how government protects the american people from adverse events, while at the same time making sure that the government itself is not abusing its capabilities, is hard. the cyber world is the wild, wild west. to some degree we are asked to be the sheriff. when something like sony happens, people want to know what government can do about this. if information is bein
like "password."hter] or 123457. [laughter] those are some of my previous passwords. [laughter] i have changed them since then. so this summit is an example of what we need more off, working together to do what none of us can achieve alone. and it is difficult. some of the challenges i have described today have defied solutions for years. and i want to say very clearly as someone who is a former constitutional law teacher and someone who deeply values his privacy and his family's...
111
111
Feb 14, 2015
02/15
by
KGO
tv
eye 111
favorite 0
quote 0
. >> too easy to figure out user names and passwords like "password" or 1, 2, 3, 4, 5. those were some of my previous passwords. i've changed them since then. he also signed an executive order to encourage tech companies to help stop companies stop cyber threats. >>> police and firefighters responded to complaints of loud explosions. inside a home near indian valley road they discovered more than 80 explosive devices and arrested a 43-year-old mom. abc7 news reporter alan wang has the story. >> a great mother. i mean, she's a sweet person. >> joy brown was floored when police arrested her roommate 43-year-old maureen mason. the bomb squad found her b full of explosives. >> she has the master bedroom and keeps her door locked, it's not my area. if they were in there, we didn't know about it. >> they said mason ignited some explosives to intimidate someone. residents also complained of loud explosions during the week. they searched her room and discovered 87 explosive devices. of it was in an upscale neighborhood in novato. >> apparently they were so loud they heard them
. >> too easy to figure out user names and passwords like "password" or 1, 2, 3, 4, 5. those were some of my previous passwords. i've changed them since then. he also signed an executive order to encourage tech companies to help stop companies stop cyber threats. >>> police and firefighters responded to complaints of loud explosions. inside a home near indian valley road they discovered more than 80 explosive devices and arrested a 43-year-old mom. abc7 news reporter...
87
87
Feb 14, 2015
02/15
by
KOFY
tv
eye 87
favorite 0
quote 0
. >> just too easy for hack tore figure out user names and pass words leak tell password. or 1, 2, 3 4 5, 7. 1, 2, 3, 4 5, 7.s to are some of my previous pass words. >>reporter: it can cost the company estimated close to 6 million dollars for a breach. high profile recent attack hit sony anthem and retailer including target. >> cybersecurity everyone has to be part of it for to it work. i think people should all buy into this but it's hard to guarantee that especially with tell politic. >> he sits on the house intelligence committee. >> very bad people want to do very bad things that hurt us financially and also hurt our personal security so if we are in the all at the table we are all at risk. >> professor mccall u.s. ambassador to russia says international approach to cybersecurity may be needed similar to the did you know of the nuclear era. >> it took us decades to figure out the rules of the road particularly with the soviet of course but how to manage the technology and there is some parallel here. >> safe guarding a world of digitizes personal information is enormou
. >> just too easy for hack tore figure out user names and pass words leak tell password. or 1, 2, 3 4 5, 7. 1, 2, 3, 4 5, 7.s to are some of my previous pass words. >>reporter: it can cost the company estimated close to 6 million dollars for a breach. high profile recent attack hit sony anthem and retailer including target. >> cybersecurity everyone has to be part of it for to it work. i think people should all buy into this but it's hard to guarantee that especially with...
360
360
Feb 14, 2015
02/15
by
WTXF
tv
eye 360
favorite 0
quote 0
have a safety password. >> my one son would not go with my friend until he told her the password. you knew the friend rather well. >> reporter: police are asking people with home security cameras to live in the area to look through video to see if they spot the car believed to be a white older model four door possible al bmw. >> extremely important that people contact us immediately because then we can get patrols into the area and check the area and see if we can locate the vehicle. >> reporter: john rothman has teenaged son much he's also concerned. >> just scary situation any time any child is, you know, put in any dane russ situation unfortunately we have sick people all around, you know society in today's world and you know we as parents need to educate our children, i believe to the dangers that are out there. >> reporter: and police say they have increased patrols in the area specifically around the school with unmarked and marked cars. chris? >> thanks, shawnette. torments night friends family and police officers pay tribute to an officer who lost his life in the line of d
have a safety password. >> my one son would not go with my friend until he told her the password. you knew the friend rather well. >> reporter: police are asking people with home security cameras to live in the area to look through video to see if they spot the car believed to be a white older model four door possible al bmw. >> extremely important that people contact us immediately because then we can get patrols into the area and check the area and see if we can locate the...
84
84
Feb 15, 2015
02/15
by
KPIX
tv
eye 84
favorite 0
quote 0
don't use the same password for your social mediaaccounts and anything secure. and guard your social security numbers. because credit cards are not where the money is on the black market. stolen identity is much more valuable. julie watts, kpix5. >>> a few more ways to protect yourself. always try to opt out of providing a social security number. many forms that ask, don't actually require them. and watch what you post on social media. hackers can guess your security question and passwords based on your profile. >>> she inspired one of the mostconnic love songs of our time. patty boyd was in san francisco tonight. she is the inspiration behind this picture and the song leila by eric clapton and jim gordon. boyd was at the san francisco art exchange tonight promoting some photographty of her own which included some pretty famous rock stars. >> christy wood. >> yeah. >> christy is wearing those outrageous argyle socks. he is wearing the colorful hawaiian type trousers. we are in the english country side. >> she married george harrison in 1966 when she was a model.
don't use the same password for your social mediaaccounts and anything secure. and guard your social security numbers. because credit cards are not where the money is on the black market. stolen identity is much more valuable. julie watts, kpix5. >>> a few more ways to protect yourself. always try to opt out of providing a social security number. many forms that ask, don't actually require them. and watch what you post on social media. hackers can guess your security question and...
127
127
Feb 12, 2015
02/15
by
BLOOMBERG
tv
eye 127
favorite 0
quote 0
>> we need to leave the password system. >> thank you very much, ben lawsky.ing up on bloomberg. pershing square's bill ackman will be joining stephanie ruhle at 5:00 eastern time today from harvard annual wall street investor conference. ♪ >> the 2015 harvard investor conference is taking place in manhattan is afternoon where top managers share their best ideas. bill ackman is cohosting the conference and 70 rule will be sitting down with the pershing square capital ceo minutes after the event. everyone will be on tenterhooks wondering what he will say. the big topic of the conference will be what? >> we will soon find out. all of the proceeds go to boys and girls harvard, a nonprofit educational organization here in new york, but it is not just about that. those that go will be getting investment ideas. the conference has been going on six 2006. six out of the seven years, all the ideas beat the s&p. the best idea we saw last year was northstar financial. it is up over 50% he would i will be sitting down with them as soon as they leave the stage today. if yo
>> we need to leave the password system. >> thank you very much, ben lawsky.ing up on bloomberg. pershing square's bill ackman will be joining stephanie ruhle at 5:00 eastern time today from harvard annual wall street investor conference. ♪ >> the 2015 harvard investor conference is taking place in manhattan is afternoon where top managers share their best ideas. bill ackman is cohosting the conference and 70 rule will be sitting down with the pershing square capital ceo...
168
168
Feb 22, 2015
02/15
by
WRC
tv
eye 168
favorite 0
quote 0
is sharing your password illegal? of agreement seem ambiguous, but the companies don't seem to be cracking down. >> the business models are, however, evolving. next year things could be different. for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: you get a nasty like the muranos did when the show they wanted to watch got blocked. netflix is not connected. my daughter said i bet so and so is watching. i said how is that? she said i gave her my password. >> netflix limits simultaneous viewing. netflix is one to four depending on your plan amazon prime, two at a time. hbo go allows three. hulu plus only one. watch espn unlike the others doesn't state any limits. if you don't want to interrupt your own viewing pleasure those limits should make you think twice before giving out your password. erika gonzalez news 4. >>> we all know snow makes driving and parking difficult. where a will, there's a way. take a look at this parking shot. that ice
is sharing your password illegal? of agreement seem ambiguous, but the companies don't seem to be cracking down. >> the business models are, however, evolving. next year things could be different. for the time being, they're interested in creating streaming media addicts. >> what do you feel like watching tonight? >> reporter: you get a nasty like the muranos did when the show they wanted to watch got blocked. netflix is not connected. my daughter said i bet so and so is...
216
216
Feb 20, 2015
02/15
by
KRON
tv
eye 216
favorite 0
quote 0
another step do not reuse the same password on various sites.ublic computers and your clear. you'll find surfing but you should avoid locking into any sites that require personal information your password. >>: good information especially the part about nine using the same password above to different sites. go to the web site is a rich context and that tv. >>: <
another step do not reuse the same password on various sites.ublic computers and your clear. you'll find surfing but you should avoid locking into any sites that require personal information your password. >>: good information especially the part about nine using the same password above to different sites. go to the web site is a rich context and that tv. >>:
138
138
Feb 18, 2015
02/15
by
WTXF
tv
eye 138
favorite 0
quote 0
forget about passwords, right?icrosoft wants to you use fingerprints, and maybe your eyeballs to log into your devices, i really like this technology. and i want it to h >>> all right, 7:24. how would this work now? explain this thing. i never saw minority report. >> talking about where it scans your eye, it knows it use, you can have things targeted specifically for you, kind of like that movie minority report. >> like i said, yes. >> with tom cruise. >> so are you tell me this technology is getting closer to reality? >> true. whether it comes it your computer, lauren, right? >> i think later this year, yes. so, mike soft is working on bio metrics. eye scans, fingerprint scans to get rid of traditional passwords forever on it new operating system. yes, because, you know what? we're always changing those passwords, they're so difficult to create, because they need, you know, a number, a letter, a capitol letter, a symbol, et cetera. >> so easy to crack. so essentially microsoft has team up with the universal allian
forget about passwords, right?icrosoft wants to you use fingerprints, and maybe your eyeballs to log into your devices, i really like this technology. and i want it to h >>> all right, 7:24. how would this work now? explain this thing. i never saw minority report. >> talking about where it scans your eye, it knows it use, you can have things targeted specifically for you, kind of like that movie minority report. >> like i said, yes. >> with tom cruise. >> so are...
47
47
Feb 14, 2015
02/15
by
CSPAN2
tv
eye 47
favorite 0
quote 0
like password. [laughter] or 12345. seven. those are some of my previous passwords. i've changed since then. so this comes as an example of what we need more of a cabal of us together to do what none of us can achieve a lot and it is difficult. some of the challenges i described today have to find solutions for years. and i want to say very clearly that as somebody who is a former constitutional law teacher and somebody who deeply values although i chose the wrong job. but we we will be a private citizen again and cares deeply about this. i have to tell you that grappling with our government protects the american people from adverse events not abusing his capabilities it's hard. the cyber world is the wild wild west. to some degree we are asked to be the sheriff went something like sony happens people want to no what government can do about this. if information is being shared by terrorists in the cyber world and attack happens people want to no other ways of stopping that happened? by necessity tha
like password. [laughter] or 12345. seven. those are some of my previous passwords. i've changed since then. so this comes as an example of what we need more of a cabal of us together to do what none of us can achieve a lot and it is difficult. some of the challenges i described today have to find solutions for years. and i want to say very clearly that as somebody who is a former constitutional law teacher and somebody who deeply values although i chose the wrong job. but we we will be a...
301
301
Feb 20, 2015
02/15
by
CSPAN
tv
eye 301
favorite 0
quote 0
they use the same password on a system that they do on facebook. the bad guys get it. the vast majority of espionage issues will be done by employees rogue nation states and , candidly, organized crime. we are going to try to transition to be the number one security company. today, the people in this room have 50-75 security companies in their environment. the bad guys will always get around it. you take a problem and say how do you solve it? we have never given our source code to any government. there are no backdoors that we are aware of. we find weaknesses, we close them. we find any government in any customer's network, we give them up immediately. it doesn't matter if it's china, u.s., or europe. >> germany has been vocal about u.s. interests invading german space, for a lack of better term. what do you tell merkel? you have a conversation, what do you tell ms.merkel? working on it. >> if you share conversations with any government leader, you do not have them very long. >> generically speaking. >> the first thing you say if you are not part of the transition you
they use the same password on a system that they do on facebook. the bad guys get it. the vast majority of espionage issues will be done by employees rogue nation states and , candidly, organized crime. we are going to try to transition to be the number one security company. today, the people in this room have 50-75 security companies in their environment. the bad guys will always get around it. you take a problem and say how do you solve it? we have never given our source code to any...
55
55
Feb 6, 2015
02/15
by
BLOOMBERG
tv
eye 55
favorite 0
quote 0
it's a wide net, but then you narrow it down. >> change his password, he should change his name. it's incredible that a company like anthem all they do is collected data. protecting data is job number one around their. are they worse at this them they should have been? is that the direction the investigator is trying to figure out? >> there's a lot of information that will come out as the investigation goes on further. by some accounts, the fact that they discovered this attack on their own is a good sign. it's not an easy thing to do. there are lingering questions about how long attackers have been in there, what other day-to-day they may have had access to, and those questions are going to be the question that anthem has to face now. >> it's a fascinating story. michael riley, our cyber security reporter in d.c. from china, to north korea, asian states becoming more dangerous in the security of the cyber world. laura, this is an incredible story. i feel like the nature of the threat is dramatically changing. >> that's right. not only are we seeing attack groups coming from chin
it's a wide net, but then you narrow it down. >> change his password, he should change his name. it's incredible that a company like anthem all they do is collected data. protecting data is job number one around their. are they worse at this them they should have been? is that the direction the investigator is trying to figure out? >> there's a lot of information that will come out as the investigation goes on further. by some accounts, the fact that they discovered this attack on...
43
43
Feb 14, 2015
02/15
by
BLOOMBERG
tv
eye 43
favorite 0
quote 0
if you're only using a password these days, you are very exposed.n you use strong authentication whether it is a token or fingerprint or facial recognition or any types of these modern technologies, you really increase the level of protection you afford. any information you put into any of the sites you interact with. >> do you guys feel like the nsa issue that was raised with lots of companies -- some like rsa cooperated with the government -- and others finding out that the nsa was in the systems anyway. is that hurting business? >> rsa is very careful. we never do anything to actively degrade the level of security and protection we applied to our customers. one of the fundamental line shifts that is occurring in government -- i think it is occurring in technology -- organizations should not rely on the government to protect them. it is up to rsa and every technology company to protect itself and its infrastructure and not rely on somebody else which might not understand the value of their data or their systems to protect them. >> the president of
if you're only using a password these days, you are very exposed.n you use strong authentication whether it is a token or fingerprint or facial recognition or any types of these modern technologies, you really increase the level of protection you afford. any information you put into any of the sites you interact with. >> do you guys feel like the nsa issue that was raised with lots of companies -- some like rsa cooperated with the government -- and others finding out that the nsa was in...
139
139
Feb 14, 2015
02/15
by
KGO
tv
eye 139
favorite 0
quote 0
those were some of my previous passwords. i've changed them since then. he also signed an executive order to encourage tech companies to help stop companies scopae tax. >>> police and firefighters responded to complains of loud explosions in of. inside a home near indian valley road they discovered more than 80 explosive devices and arrested a 43-year-old mom. abc7 news reporter alan wang has the story. >> a great mother. i mean she's a sweet person. >> joy brown was floored when police arrested her roommate, 43-year-old maureen mason. the bomb squad found her bedroom full of explosives. >> she has the master bedroom and keeps her door locked it's not my area. they were in there and we didn't know about it. >> they said mason ignited some explosives to intimidate someone residents also complained of loud explosions during the week. they searched her room and discovered 87 explosive devices. >> apparently they were so loud they heard them across town. >> homes in the immediate area were evacuated evacuated and other neighbored were ordered to stay inside.
those were some of my previous passwords. i've changed them since then. he also signed an executive order to encourage tech companies to help stop companies scopae tax. >>> police and firefighters responded to complains of loud explosions in of. inside a home near indian valley road they discovered more than 80 explosive devices and arrested a 43-year-old mom. abc7 news reporter alan wang has the story. >> a great mother. i mean she's a sweet person. >> joy brown was...
133
133
Feb 15, 2015
02/15
by
FBC
tv
eye 133
favorite 0
quote 1
log in credentials and user name and password. you're setting up account. you will have to give them all the information pick your log-in, pick the password. you have to go through what is referred to as authentication. authentication is what they're going to put you through so that you can identify yourself. so they will ask you questions only gerri willis would know answers to. once they feel comfortable that you are in fact gerri willis on other end of that computer screen then they will allow to you proceed to lock the credit file down. >> okay. so, you are an expert on this stuff. you saw what happened with anthem. we're talking something like 80 million people out there impacted. have you ever seen another breach of this magnitude, the size sort of the severity of this issue? >> no. anthem is checkmate. anthem is absolutely checkmate. you know what? the information that was stolen from anthem is as valuable in 20 years as it is today. gerri: oh. >> people will not change their names. people will not change their social. you can't change your date of b
log in credentials and user name and password. you're setting up account. you will have to give them all the information pick your log-in, pick the password. you have to go through what is referred to as authentication. authentication is what they're going to put you through so that you can identify yourself. so they will ask you questions only gerri willis would know answers to. once they feel comfortable that you are in fact gerri willis on other end of that computer screen then they will...
48
48
Feb 11, 2015
02/15
by
BLOOMBERG
tv
eye 48
favorite 0
quote 0
we have 14 different websites print they all require different usernames and passwords.t is difficult for veterans to figure out how to connect with the v.a. and get what they need. we're going to go to one website, one password. simple vocation to allow veterans to connect. my first national press conference, i gave out my cell phone double -- cell phone number publicly. i get calls and texts. i did that to show the kind of customer service we need to provide to our veterans. >> why are so many committed suicide -- why are some he veterans committing suicide? >> of all those veterans who have been in combat, we estimate anywhere from 8-20% have something that we call post-traumatic stress. it is a real illness, real disease. it is one that is treatable. we know how to treat it. of those 22 on average veterans that commit suicide by day, we estimate that 17 of them are not connected to the v.a. one of the things we're trying to do is connect as many of our veterans as we can because we know the disease, we know the treatment that works, and we want to get in -- we want t
we have 14 different websites print they all require different usernames and passwords.t is difficult for veterans to figure out how to connect with the v.a. and get what they need. we're going to go to one website, one password. simple vocation to allow veterans to connect. my first national press conference, i gave out my cell phone double -- cell phone number publicly. i get calls and texts. i did that to show the kind of customer service we need to provide to our veterans. >> why are...
63
63
Feb 24, 2015
02/15
by
CSPAN3
tv
eye 63
favorite 0
quote 0
you know people are definitely choosing insecure passwords, something that is easy to remember.d if you have low literate skills or limited english skills you are going to pick something that is much easier to remember that a computer could decipher quite easily. you are more than likely sharing your password and user name with other individuals because you are not done this before. and so usability -- i mean, it seems like an obvious thing to really focus on. and i'm -- i guess i'm hearing that is not -- >> i think we shouldn't pit usability with securitied infrastructure against one another. i think we need both. for me to say that infrastructure needs to be built in a secure way is not at all to say that we should discard usability. i agree with you that that is a critical concern. but we have usable tools like mobile phones that people understand and learn how to use. even people who have a low technological literacy, that are working in a insecure way. so the fact of the usability doesn't actually solve the securityhf >g problem. >> i spent a lot of time in usability and se
you know people are definitely choosing insecure passwords, something that is easy to remember.d if you have low literate skills or limited english skills you are going to pick something that is much easier to remember that a computer could decipher quite easily. you are more than likely sharing your password and user name with other individuals because you are not done this before. and so usability -- i mean, it seems like an obvious thing to really focus on. and i'm -- i guess i'm hearing...
50
50
Feb 26, 2015
02/15
by
CSPAN
tv
eye 50
favorite 0
quote 0
they use the same password on a system that they do on facebook. vast majority of espionage issues will be done by employees, rogue nationstates, and candidly organized crime. we are going to try to transition to a security company. today, the people in this room have 70 security companies in their environment. that means you have none. the bad guys while to get around. you take a problem and say how do you solve it? espionage issues will be done >> absolutely do. if you watch what most of my customers view >> absolutely do. if you watch what most of my customers view and concerned about, it is the emerging markets. a data point, the emerging markets are in the mid-teens. mexico went for 15% growth to flat and one quarter, year over year and the next year -12%. it was a good forerunner. if rates are raised dramatically, you would choke growth in emerging markets. there's only one engine going well and that is the u.s. 3% growth, not bad. if rates and get raised, it. the world. our central breaks have to be concerned. yes, it really could. >> china,
they use the same password on a system that they do on facebook. vast majority of espionage issues will be done by employees, rogue nationstates, and candidly organized crime. we are going to try to transition to a security company. today, the people in this room have 70 security companies in their environment. that means you have none. the bad guys while to get around. you take a problem and say how do you solve it? espionage issues will be done >> absolutely do. if you watch what most...
111
111
Feb 27, 2015
02/15
by
WCAU
tv
eye 111
favorite 0
quote 0
that is one secure password. intel. this is where it all changes. i found an apartment.e place. there's just one little problem... it's got everything. i barely get a signal so i can't download videos or stream music. i don't have that problem. i'm on verizon. i'm not. sometimes i get a signal, if i hold my shower curtain rod with one hand... but not always. join us and save without settling on the largest, most reliable network. intra bite size waynis. to enjoy the full size sensation of peppermint and rich dark chocolate. york minis, get the sensation. on our students is already scoming through, it's alreadyg showing, and they haven't even taken the test yet. my first-grader came home the other day and cried, because he couldn't - he didn't feel like going to karate practice. after he was done with his work, he said, "mom, i'm just tired," and started to cry. in first grade. what are we doing? what are we doing to our kids? ♪ [ cheers and applause ] >> seth: welcome back, everybody. tonight's band recently released their first album in nearly ten years to overwhelming
that is one secure password. intel. this is where it all changes. i found an apartment.e place. there's just one little problem... it's got everything. i barely get a signal so i can't download videos or stream music. i don't have that problem. i'm on verizon. i'm not. sometimes i get a signal, if i hold my shower curtain rod with one hand... but not always. join us and save without settling on the largest, most reliable network. intra bite size waynis. to enjoy the full size sensation of...
500
500
Feb 17, 2015
02/15
by
KPIX
tv
eye 500
favorite 0
quote 0
. >> reporter: his second tip don't use the same password for social media sites and anything secure. watts, kpix 5. >> wow a few more ways to protect yourself. always try to opt out of providing a social security number. many forms that ask for it don't actually require it. and watch what you post on social media. hackers can guess your security question and passwords based on your profile. >>> still ahead it may be their last hope for survival. >> the north bay program scrambling to try to save an endangered salmon. >> mother nature gave us all two seasons in one day. earlier today felt like spring. highs near 70 in san francisco. now it feels like sumwer fog and temperatures in the mid 50s. what's coming up tomorrow? [alarms blaring] ohhhhh... whoa whoa whoa! who's responsible for this?!? if something goes wrong, you find a scapegoat. ...rick. it's what you do. ahhhhhhhh! what'd you say? uh-oh! kelly! if you want to save fifteen percent or more on car insurance, you switch to geico. it's what you do. rick. don't walk away from me. ahhhhhhhh! why do we do it? why do we spend every w
. >> reporter: his second tip don't use the same password for social media sites and anything secure. watts, kpix 5. >> wow a few more ways to protect yourself. always try to opt out of providing a social security number. many forms that ask for it don't actually require it. and watch what you post on social media. hackers can guess your security question and passwords based on your profile. >>> still ahead it may be their last hope for survival. >> the north bay...