Skip to main content

tv   Documentary  RT  November 9, 2021 12:30am-1:00am EST

12:30 am
[000:00:00;00] move, ah
12:31 am
ah ah ah, where empowering ourselves to be more efficient or quicker with our transactions or we can make mobile payments from our sons weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is
12:32 am
a potential entry point for us. a yes of yes, the more chill open the shortness, georgia you for you late. yup. so farm also on your off site, save with writing go obamacare, which though you will pay by showing you a quick option. you are contracted with bucket info, silicon a and also to your former manual with dealerships under the social wasn't chichi of those for the climate. but she does. if you skiing with a book,
12:33 am
i can come to the most them still thing is rational and wishing that you're suggesting you want to do a phone interview with me when you thought it was just send you. busy this in your group, but on the way in the clear with you on that in a minute. the organs international. go to the dean, but all yeah, sure. i can get a form in the mail, but social and sales process that i've been with this year, and there's no one has owned it was out, but that most of comes, but most your book, the shipment will look like, you know what this point is at the column a and with that done the 3 bump prescript. got the question done or is it got to face poison with there are some fundamental rules
12:34 am
around password management, making sure that it's claxon often has the right number, right? the length, the right number of symbols are special, upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to obtain that data. when you share a password, which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them a call with a question. we call them to put him into the wash or ground. a material ear wash or up and i have no my name wasn't done with plenty of them are stairs will fuck on average. and that's her last year that's told me she had her report to print a report from one of the sports on,
12:35 am
on using their some west virginia left for them. this year was a georgia bio cloud. really, where might be a problem. it was up here just way calling the bus monitor to record your service. so we'll see you wash one unit bottom. we're proud to with our community on the hornets are part of a year and we're glad fusion growth is your mother or she may come find you a couple of play the seeing those of income, but that's also a check which he just did a reported contact among the church, i'm one or 2 different parts. teacher will always talk. we'll check was elizabeth listening. the session was up last night with the district. but then what could we just have checked on daily? thumbs up pretty quickly. positioning the payment a problem with them. it could be a couple to show, but other than what she had there all day that boys will,
12:36 am
michelle moore's liking. the soil love it in the soft ear on one of it. also center file among those cities. plenty of rooms, browser big with a site, almost a little community approach by minute to put them in a bit, going into a to business today. leticia this of some great for chrome, a couple of them. but don't with some, some more incentives. don't miss a dilemma of our current age. people have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's gonna be missing some money in your account. and you're gonna be frustrated for leasing questions. you won't get used to. so when you all are moisture, so there was some way use of lesson with dozens from me to use, which i'm sorry, i'm just borrowing a source from the show. like for special to start on the deal,
12:37 am
it could, she could use your machine, but don't worry us that she, i mean of course i'm you finish looking at stay for on this often by in the last question. what other sort of the issue was because frank, via shoshua, catherine demos, 3rd people of a school of mushroom soup wishing exemptions. please press 4. if this has reached for immediate gaze, curse them to provide more than reason to more smoke you tube. they did reschedule . oh, it's a shipments on the seat. she had a recei telephone and i clean the car. one kid so sleepy when you home restore. it was a light on sunday for relations to one of the most reported it things, but you'd be surprised nowadays, the amount of information that exists about individuals on their phones, through their emails, through their corporate systems is generated at
12:38 am
a scale that was like, while there before, from location data on your phone to all your personal information that you have, whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database league is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal nothing, they can use that information to provide ortiz start to create an identity theft type of exercise. they can maybe go to
12:39 am
a bank pretending to be you take loans in your name, take credit in your name when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. ready right, so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side,
12:40 am
using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those and technology developments because there's more collaboration and more sharing of information in the packing and ecosystem. if you like. ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access some of those websites . you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilets or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle
12:41 am
with your shift. give it a crystal christopher for shorter to show us my little more special story. return in from their parent utilize generous or, or where to what you were planning on coming economy scrambling, then there's left on your 1st and listen to them. send them closer down. what's left, their secret blog said you were to crystal chris john, them up early enough for junior sherman with a strong high care other boy char, your coach, car battery. but i wanted to talk or someone started here. shit. the rest of the childhood. is it only a recruitment shorter than what could i new showing of binnacle shows that your dog groomers name can you do to with, with your much cost on them or thought us putting it on their group are contribution for did almost my program and i was returning your call to renew my a to plan. i mean im going to renew my its
12:42 am
a room junior group off. get someone on a high to come pioneer a slow me the order to pursue play golf. i need a solution. come under a rubric. you're provided to talk to the security teacher a in a equation group is the shock i knew that you might succeed shamika and you had a lot about the him game and you had like we were sponsors still to bunk. you somewhere. the key with the easiest man. i got
12:43 am
a quote with car needs this jim stein you had to come with me line with me now to switch the new dealership i had to store a place oklahoma. my got tv is there. she has nice hear. good afternoon. is my sound, my name so doesn't go to the office just to meet with me. do you have a daughter but it's a whole? yes. it's called a mission. i have a question about us comprise a should with pollution. mission out for me is the easiest option. to puddle in a national model in a car. so saying in the part that somebody fun with close to when you leave it with as
12:44 am
a korea professional sport is much tougher on some than others with my by everybody. so why would somebody believe me? i was just a little girl to price upgrade to, to, to achieve really was was a read on the paper this morning. usa swimming coach, arrested leslie had sex with a 12 year old girl. this happens almost every way we get calls at the office. i get informed about one of my greatest fears is someone's go start linking all this together is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming, is that documentary? i see it on our t wonder make no certainly no borders another piece,
12:45 am
a new face is emerge. we don't have with the we don't on the back seat. the whole world leads to take action to be ready. people are judgment. 2 common crisis with we can do better, we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive. so many good people are helping us. it makes us feel very proud that we are in it together. oh
12:46 am
ah, essentially there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we called him swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime, they adapted to the situation they use cyber, they use the technology, it's an extension of traditional crime, but we can't ignore how it's evolved over the and in order to discuss how it's evolved,
12:47 am
leads to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps to all sorts of devices as well. because everyone is digitized, as john is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet deal with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with,
12:48 am
[000:00:00;00] ah, really years old old law. yeah. put them up on the toilet. the way to school look on black muzzle. so silent, who do i need to be looked for. he put him on a foreclosure. of course it's you know, well, you got a little fish on me off. i'll speed on. i see jim, i'll, dr for sleep is woke up probably in the god what color which is and they said, so come to that. i met. mm hm. mm. well, ms. watson, i saw a guy that was jennifer social b one b, there's norfolk more. no boss will should more mozilla docile bark while i'm warm up on me needs. are those stories are more more than the with the to build the world boys for the sport or to see knowledge of british facility. miss the following up with you all back to your school with watching all my wish was for us
12:49 am
to for them. disco. motion that video. nelson nichol. not been minister for all i knew the what the article a little off that is off say missed yes. good company, medical law morley and my media. somebody me on the juice. noodles log, emotionally book, mission control. no, i stuff. i mean, what christian looks at the internet on the sportage the web sharesa wardweb share is 2 or more la maya. mm mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware,
12:50 am
where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the train, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what that's what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to
12:51 am
try it. i want to experience with redesign bills, humanoid robots, right? right. was generate that full size, even our variables. we make ones that look like robots, a plastic metal, but we also make arrange that all human. okay, lifeline. silicon skin and they look, but they will to move like a human being the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of why the visual with artificial intelligence has not
12:52 am
many main threat? this is due to the 3 have robotics. a robot may not injure a human being true in action, allow a human being to come to hom, a robot monster, bay orders getting to it by human beings, except where such orders would complete with the law. listening to lift the couch and i'd also like jack a thought, a cock who boys throw me up more look, but i'm not sick. i can blog with something that was a law just be really sticky instrument because the plague yes is but amanda cathedral as well. as similar to what you call us semester and then we'll watch a movie la monica, schwarzenegger micron. yeah. that was put on that one more look was when you to us i see it's great news. we'll switch this the show. believe if you put all some yeah, yes, a 0 my come score. i am, it's a robot to cut a near future. my ciocca thought suits it would do it is it comes to me. it says that, you know, we're far more, he's most of the hallways and we saw the more chill america about an opportunity with at reach out some new chem quote on the war storms deal. and there's natal,
12:53 am
i'm a cookie efficiency committee. alex is some would argue with them just to port his options. question would george crush walton beaumont each and i have a group of people love, right. want to say they love it and the tasks are able to do is to convey messages to talk to you and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a humanoid figure or humanoid presence that, then you're going to think i can talk to them. when you do a switch or the other way can die school until you know which it's as the might substance. there was a christian. yeah. if that. oh, but on this all know which, which out said bill who cheated on some small group of suicide. 50 to do it when you might joy the preview law. and what they know about hackers are you speaking
12:54 am
about ethical hackers on ethical hackers? unethical factors. ethical, indeed, a threat. any machine can be hacked by a technology at the bulk of construction listed on the will not come for 2 adults is requested a new one. i shit is quoted pretty nice that the world is becoming more digital bit . people aren't going to become completely recursive and only stay in and i really use digital like, and even i would say 10 years. you can see how people have che, through something simple like small like 10 years ago, maybe 15 years ago. if you tell your salary or anyone that you have a device that can track you out and see where you've gone, see you've been waiting and see what you thought. everyone would go. we can't do that. that's, you know, that's completely, again, every with liberty. we don't do that,
12:55 am
but now everyone's got the right ment. okay. that does exactly that. people have accepted in because our lives are inherently carry with them the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to that, or cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out on. we willow lags, and one of the things that's happening at the minute is cyber implants. right now. i'd be where you're really worried about it. most people would really be you can't put a chip in my brain. bob,
12:56 am
this is where i'm saying actually that will be accepted in the future, or maybe we will have in classes that will directly today. yeah, i was like, well, in the bush nicole daniel ross, i'm more sort of a l. e at the machine on a booth at the deal, but also we need to deal on that would be what i see is that there's a prelim, you'd wish the one i knew what a lot ma schiller, he's a senior crew sick guy used to i. yes. those are some of the machine was a brand new to like no bonus, telegraph minish. i bet that you more than that, that's the problem when machine. it's a problem with which i could go to godaddy and absolutely in the future, the cyber criminals can use artificial intelligence, youth machine learning to actually find vulnerabilities over all the bits. the software or the networks the, the information could definitely be active with their vulnerabilities in the software. and in the same way right now,
12:57 am
your computer could be hijacked and your search engine to be re directed to a different website, which will give you incorrect information. ah cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have maybe a substance and it linked with me. we are using only a major exit or anything
12:58 am
with me. degraded. we generally very often foundation for secure and happy in the same 9. mm ah, we're gonna dig into global macro economics. and once again, visit the treacherous path of our central planners to control the money printing
12:59 am
for empowering ourselves to be more efficient, quicker with our transactions. but with that comes a trade off. every device is a potential entry point for security attack. any machine, it's an extension of traditional time. the defenders have always been one step behind the attackers. another when one comes option in the offering. it's not a matter of if it happens, it's a matter of when they're all driven by dreamers shaped banks. concur some of those with
1:00 am
theirs sinks, we dare to ask ah, deadlines issa cashiers pay gas and chaos border between poland and bella. ring since the migrant crisis. stevens with refugees trying to force their way into polish territory. while from, from the u. k. tried blows. is a record number of believe, migrants naked across the channel into england. we hear from locals on the french side, group, austria. they are under the impression that when they arrive, everything will be easy. in reality, it is not at all like that. the story is about those who helped me cross because it's not migrant to buy that boat. it's always the traffickers and the climate of


info Stream Only

Uploaded by TV Archive on