Skip to main content

tv   Documentary  RT  November 8, 2021 4:30am-5:00am EST

4:30 am
a with a in we're empowering ourselves to be more efficient or quicker with our transactions. we can make mobile payments from our stand weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and
4:31 am
a lot of benefits. but with that comes a trade off, which is out there, there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for security attack. mm use of yes. yeah. which i can assure you to, for you more is late. yep. so let me farm up so you will absolutely save reasonable . you know, what i'm writing go obamacare, which though you will pretty much ginia. you woke up she, you conducted a silicon that was supposed to easily and people she had to literally follow the annual with deal. it's under the social wonderful she to those with climate but she does if you
4:32 am
a be to card. yep. okay. can come to the lawson still looking isn't national machine the users to w, what to do a phone interview with me and when you go to the wilson jackson, you ah, this is nika, but annoyance. and the generic name was crying that in a minute thought of the dean, but with the best, but she could come in this way. no, no someone did it and it was out. but the show on the accounts, but not secure, but be sure to move on like, you know what this poison is at the college tech opens up and i be in the butt of misty through that with you being asked me to come up
4:33 am
with that done this from a bunker script got the course done was it got to bass boys with there are some fundamental rules around password management, making sure that it's complex enough and has the right number right. the length, the right number of symbols are special upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because what we're grand a single points of entry to obtain that data. when you share a password which is very common among user. so i have the same password for 20 different applications. yeah. one. yeah. all of them. a pretty. i was in the question way calling with marsha brown, a ear wash bar fungi,
4:34 am
riding the bus with a fuck origins. that's her last year. that's to me, she had it for you to print a report on the sportage, audubon using there somewhere spectrum in your for them this year was a georgia spike allowed your hair might be a problem. you was up here just wait a little sleep wash when you no problem with our crazy on the horn. it's a year and you were glad fusion grow your mother. i combine a couple of those type of thing though to me, but that's not a smoker. m, i'm not sure which he just did it, but it's contact among the church. i'm gonna tell you franklin taker when he's that will change boys. elizabeth,
4:35 am
listening. the session is up last night with the district you put on what kind of truck we just keep checked on daily, thumbs up pretty quick positioning the payment problem with them. she couldn't afford to show other than what she had been all day. you know which one which is more like, you know, soil, love it in a soft ear, on what she does. something file a moment. well, she doesn't respond. you have a big with a site. they'll multiple, she doesn't came at a proposed by my department a bit going on so i'm can be a day. busy with rich to business today, leticia for somebody to call a couple of the shop to do my samsung what i'm 2nd, is there a dilemma of our current age? people have a false sense of security. while nothing happens, we have the sponsor for security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money and you're out and you're really frustrated for a year. mortgage is just
4:36 am
a one year solar moisture. so to the summary use of lesson with buildings from me to use kitchen, soraya, jelly, barley, post legina apparel. and that i was actually also on the show for special to sit on the deal. it could, she could teach commissioning, but don't worry, as i cheer me. of course i'm you finish looking. you stay for a while in this office and by a translation without a cert vehicles book that's for a year. but i've yoshika through them all stood but a bit of a school of mushroom soup wishing exemptions for people to support it. if you're on the sheets for immediate gays, curriculum to provide within reason, the more smudged you to do, they did a contract with dish washer. it's a shipper is alisha series, say telephone. and i'm like with the mom keeps just repeating what your homeless dorothy like on tones for relationship with the most reported it. think
4:37 am
you'd be surprised nowadays, the amount information that exists about individuals on their phones, through their emails, through their corporate systems is generated at a scale that was like, no other before from location data on your phone to all your personal information that you have. whether it's your banking information, whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone. physically. the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have little footprints, they have your digital footprints,
4:38 am
and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to provide or a t start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credits in your name. when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it
4:39 am
or providing it to competitors really. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers in some of those and technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication when you try to access some of those website. you, if not, leave your laptop on an unlocked when you're in
4:40 am
a coffee shop. if you go to the toilet or you go to order some, all of those things you need to start putting into your life as part of that secure life biotech. a shift give it a pistol for a shorter to show us my little more special story in america. you thought i'm satisfied with what you were finding out from you. can i me scram on. then you see if any other services from them sent him hows with withdrawn, said, you were to crystal christian, them, i'm sailing enough for washing machine on a straw, or try to get quite a car battery. but i wanted to talk or some states where should the rooster beach?
4:41 am
i'll take down your only recruitment shorter than what i knew showing up a bit of cliches that new doc roll machine can use to record your much course them a picture. put it on last night program that was between your quote to renew my exit button. im going to renew my its a group off here with some of them are sitting up pushing the properties when i own a car from the heights you come pioneer is straining one with the 9 a. i want you to revolutionize here. look at the doctors. we're slowly the order. give it a pre stupid go for new me. it was most of them i chose, lucian, come on. there are green is always a little grip year. ready to talk to shikeria, cham a i guess, can get a better with betty bethel. so i'm assuming katie equation group of shock i'm using my 2nd
4:42 am
a lot about him doing. and yet the cool response we still to bank is i'm, we are back here with the easiest and i got a quote from the repair. okay. is this the jim stein you got the picture in system? it should answer me line with me unfortunately. and you know, should i have to store a key or someone there, but it is so hot. osha place oklahoma like octave easter seals nice here. and then you know, so doesn't go to rock of just the media there. some you do, you have a vision, katara what it says a lot on this and i have a question. great kit comes calling on about us. comply with our grain should with a lot of national bundle in the even a puddle. i'm a broker. so saying in the part that somebody fun with close to when you look
4:43 am
forward to talking to you all that technology should work for people, robot must obey the orders given by human beings, except where such order to conflict with the 1st law show your identification. we should be very careful about our personal intelligence, and the point obviously, is to great track, rather than fear a very job with artificial intelligence. real. somebody with a robot must protect its own existence, with a korea professionals thought is much tougher on some than others with everybody. so why would somebody believe me? i was just a little girl. the price of a to,
4:44 am
to achieve really was a read on the paper this morning, usa swimming coach, arrested, allegedly had sex with a 12 year old girl. this happens almost every way we get calls at the office. i get informed about one of my greatest fears is someone is going to start linking all this together is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming. is that documentary? see it on our tea? ah ah
4:45 am
. mm. oh, eventually there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone. ready and then convince the bank or convince whoever is attached to that mobile number in transferring money and conducting a lot of scam bites and major organized crime. they adapt us to the situation they
4:46 am
use cyber. they use the technology as an extension of traditional crime, but we can't ignore how it's evolved over the. and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps to all sorts of that and devices as well. because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them
4:47 am
with islam. old old law. yeah. putting them up on the idea of the way. like going back and wasn't so silent. who knew with a bucket seats? no one gigabyte. they've all been austin did all nicely still my doctor for sleep is woke up probably in a guy that wishes and they said, so i'm good, i'm mm problem. hello, ms. pasto again. i wish i knew precisely what i mean. there's like more not possible. sure. more than one to deal with docile bob or more them up on me needs of those forest law of war along with the world boys for supporters or
4:48 am
to seek knowledge of bristol facility. miss the following up on your vehicle. albertson's school was watching over marble show scholarship. i've been with your scuttle motion with nelson nichol, loving national. i know the old article article studies officer mused yes. good company. beautiful. who lamore leon of the my media? somebody. me on the juice. lucas. long emotionally book mission control. no, i see a funding what christian looks at the internet on a sporting web, sharesa, wardweb, shedra, 2 or more, la mart. mm mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be hacked. some of those cases have happened to us cities, so we had
4:49 am
a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience
4:50 am
a with a humanoid robots. right? right. boss. generally, that full size, even though i grade what we make ones look like robots, a plastic metal. we also make arrange that humans. okay? so like light silicon skin and they know but able to move like to keep in the drone behind you. yes. this drone in the future will be used using
4:51 am
artificial intelligence. it is a taxi service that to think extremely useful thing. don't you think my friends out? it was out that way in threats of what would be so intelligent, artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not injure a human being true in action. allow a human being to come to hom, a robot must obey orders getting to it by human beings. exec wessa told us, would conflict with the bus will need to lift the couch and i'd also like jack a boy from yep. want to put him? yeah. a couple, a blog with something that wasn't law just be really sticky. remember you quake. yes, ma'am. to cut that up as well as similar to what you call us semester and then we'll watch movies more of a micron. yeah, that was put on that one more to put when you to a shot and we'll switch this to show believe if you put off some. yeah, yes, a 0 my come score. i am, it's
4:52 am
a my ciocca thought it would do it. it comes to me, it says dialing over for maureen marsh, double holiest, and with no chill america photo. pl. switching you were with at reach out some new chem quote on the war storms deal on this natal. i'm a coquettish committee. alex is some would argue with him just to port his options with the home each night at the cooper people not right. want to say they love talking to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a humanoid figure or humanoid presence that, then you're going to think i could talk to that with a switch, a better way can die, excuse me, to live now, which it's the might so there was a christian yeah. if that over down this on the which i'm which out said bill who
4:53 am
cheated up on some small group of suicide. 50 to do it. you much more the baby law . and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? i'm a ticket factors unethical. hackers are indeed a threat. any machine and being act, a bulk of the construction listed on the will not come for the adults is requested and they will not sit at east kicker, go to putting on that the world is becoming more digital bit people aren't going to become completely recursive and only stay in and i only use digital liked and even i would say 10 years you can see how people have changed through something simple like small that you know, 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that can track you out and see where you've gone, see you've been waiting,
4:54 am
see what you thought. everyone would go. we can't do that. that's not, that's completely against everyone's liberty. we can't do that. but now everyone's got a device in them. okay. it does exactly that. people have accepted in case our lives are inherently carry with them the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out with one of the things that's happening in the mini cyber implants right now. i'd
4:55 am
be where you're really worried about it. most people would equally be you can't put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have implants in the rain that will directly today. yeah, i was like, well, to the bush and you can daniel royce or some more sort of a d at the machine on a booth at the deal, but also we need to deal and then you would to do what id supported. i mean, wish the one i knew what a lot my she'll if used to print a lot of what mission your community guy. but you i yes, those are some of the machine and one was a brand new to like no bonus. tell about my dish. i bet that you more than that, i think the problem with machine, it's a problem with what check it go to godaddy. absolutely, in the future like criminals can use artificial intelligence, machine planning,
4:56 am
applying vulnerabilities, or all the software, all the networks. the information could definitely be active a software in the same way. right now, your computer could be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah, it is gonna be hard and connected. cars can be had all the different devices now that are connected to the internet can be hack. lou . we have many substitutes and digital phone and linked with me we are using
4:57 am
don't do any large any major exit or anything to reach people and keep them safe and to see if they have like. mm hm. a degree to generate a very often foundation for security and happiness and like at the same time mm for we're an ally ourselves to be more efficient for quicker with our transactions. but
4:58 am
with that comes a trade off. every device is a potential entry point for security attack. any machine can be here. it's an extension of traditional time. the defenders have always been one step behind the attackers, both with them as well because option in the offering. it's not a matter of, if it happens, it's a matter of when who, what we've got to do is identify the threats that we have. it's crazy even foundation, let it be an arms race is often very dramatic. development only personally and getting to resist. i don't see how that strategy will be successful, very difficult time time to sit down and talk
4:59 am
as a korea professionals. bolt is much tougher on some than others with the euro, mired by everybody. so why would somebody believe me? i was just a little girl. the price of a to, to, to achieve really was, was a read on the paper this morning, usa swimming coach, arrested leslie had sex with a 12 year old girl. this happens almost every week. we get calls at the office. i get informed about one of my greatest fears is someone's going to start linking all this together. and it's going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming here. is that documentary? see it on r t a
5:00 am
ah, this i was told that lines here one r t a french police officer, survived a stabbing thanks to his bullet proof vest in an incident report really being investigated as a possible act of terrorism. hvac seen divisions swapping big protest in the united states offer a court temporarily blocked the biden administration's plan to impose compulsory cope with shots on businesses and charged over the capitol hill. riots compares foul conditions and a washington jail to that of one ton of obeyed in the program. we speak with an investigative journalist who received the prisoner's letter. i know that he january prisoners are being treated worse than those pre.


info Stream Only

Uploaded by TV Archive on