Skip to main content

tv   Documentary  RT  November 9, 2021 6:30pm-7:01pm EST

6:30 pm
[000:00:00;00] move ah
6:31 pm
ah ah ah where empowering ourselves to be more efficient or quicker with our transactions we can make mobile payments from our phones. we can tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits, but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is
6:32 pm
a potential entry point for a yes, the more chill open, the shortness, new york city for you late. yep. so let me farm also on your upside with mine and go obamacare, which though you will be if i show you a quick option, you are contracted with public info silicon. so it was supposed to, i use mostly, and people will share with everyone and also your formal manual with dealerships under the social on the pl, chichi of those for the climate. she'd also if you speak with a card. yep. okay. i can come to them. awesome. so my whole thing is national
6:33 pm
machine, the users who definitely want to do a phone interview with me when you thought it wilson jackson. busy this is an echo, but i'm more than that, you know, clear with crying that in a minute the water internationally because of the dean, but also try to get a form in the other one. but social with this you could come in late. no one has someone did it and it was out, but i'm not a big master, but be sure to move on like you know what this poison was at the college a couple of days it was to make up a precious bomb or she was to have that done with me bumper scott. the question, if you can done up was it got to face boys with there are some fundamental rules around password management,
6:34 pm
making sure that it's claxon often has the right number, right. the length, the right number of symbols are special, upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to obtain that data. when you share a password, which is very common among user. so i'm the same password for 20 different applications. yeah, one, yeah. all of them. a call with a question. we call it a washer until a retailer ear rush hour and i have no i my name wasn't done by the nurse or stairs will fuck on average. and that's for now, she had asked me, she had it here for you to print a report from one of the sports on, on using there some west virginia,
6:35 pm
left for them. this year was a direction spike loud here might be a problem. you was up here just way calling the bus monitor to record your service . so we'll see you wash when you no problem with our community. and i wanted to put a $1000000.00 a year and we're glad fusion growth. if you're margaret, i may come find you a couple of try to sing those, but that that sounds a little tricky just to, to report it to contact them. i'm going to try to monitor the complexity. ways that will shape was elizabeth because the whole mission, the session was up last night with the district. but then what could we just have checked on daily? thumbs up pretty quickly. positioning the payment a problem with them because it could be a couple to show. but other than what she had, a parent will do that boys will michelle moore's liking the soil,
6:36 pm
love it in the soft ear on one of the and also cost center file among those cities . plenty of rooms, browser big with a site, almost pushy little community approach. my mind to put them in a bit going on for a day with the business today. leticia. this of some great work on a couple of the shop and doing some some more incentives don't. it's a dilemma of our current age. people have a false sense of security, while nothing happens, we have this sense of security that we're not going to be touched. it's not gonna affect us, but at the end of the day, it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money and you're out and you're going to be frustrated for leasing questions. you won't get used to. so when you all are moisture. so to the summary use of lesson with dozens from me to general, i just brought up a flesh a salsa from the show for special to start on the deal if she could use your
6:37 pm
machine. but don't worry us that she, i mean, of course let me finish through. can you stay on this often by in translation without assert the issue was because friend of yours, russia, a school of mushroom soup. she exemptions please press 4. if this has reached for immediate jay's curse, them to provide with reason to more smoke you tube they did reschedule. oh, it's a shipment. it's alisha. she had received jennifer and then i'm like with one kid feel sleepy when you home restore. it was like one sounds for relations to or to mush reported it. think you'd be surprised nowadays, the amount of information that exists about individuals on their phones, through their emails, through their corporate systems is generated at
6:38 pm
a scale that was like, while there before, from location data on your phone to all your personal information that you have. whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone, visit the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal natalie, they can use that information to add, provide ortiz start to create an identity theft type of exercise. they can maybe go
6:39 pm
to a bank pretending to be you take loans in your name, take credit in your name when they access your email through fishing attacks. they can then reuse your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organisation that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. right. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive
6:40 pm
side. the defenders have always been one step behind the attackers and some of those and technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access all of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure
6:41 pm
life, smiled, ah, with a shift give it a pistol. mister production shorter to show us my little. it's a more special story, returned into america. you thought i'm serious. i'm not worth what you are finding out for me to come. i me scram on. then there's there. if any authors written notice from them sent him cause it almost lost their secret of thought. central bristol place, john, them up there, new enough for which in your shoes, where we're going to strong pride character parkway. charlie, a quite car battery, but i'm worried about our course and started here. see the rooster be shouted down it only a recruitment shorter than what i knew showing of empirical shows that your thought room machine can you do to record your much course. some of them are thought us pretty, you know, in their group are still to put it on the internet program and i was returning a call to renew my at some point. you can have him go to renew my, its
6:42 pm
a room junior group off your salmon on a high to come pioneer a slow me the order. give me a solution. come on. i mean is all what's a little grip? you're providing a hm . i guess commute a katie equation group is the shock i'm using my 2nd shamika nash and you have a hiking any better because the mindset about the him doing and yet the cool response which to to bunk is i'm like here with the easiest thing. and i got a quote with is this the gym, so i need to cover,
6:43 pm
but at the system it should say it means language additional. but how much can we use now to wish when you deal with? i had to store a sub in there, but it is so hot or shoppers. oklahoma my got tv is there. she has nice hear. good afternoon. and then you know, so doesn't you go to rock of just of egypt or some you do. you have to stop for it . if it's just a vision, i thought it what it says shipper. so hope it's not caught on this. and i have a question to break it comes i calling on behalf of comply with should with some of them a new submission out for me is the easiest option to put in a series of national bundle in the you want to buy a car. so saying in the part that somebody fun with close to when you leave it for they would same with every passing day were allowed to openly discuss fewer and
6:44 pm
fewer topics. the events on capitol hill on january 6 is one of them. what happened that day is a 3rd rail. was it a riot or an insurrection? even asking, this is inflammatory? it shouldn't be for is your media a reflection of reality in the world transformed what will make you feel safer? tice, elation for community. are you going the right way or are you being that somewhere? direct? what is true war? his faith in the world corrupted. you need to descend a join us in the depths or remain in the
6:45 pm
shallows. ah ah, and i make no, no board is a piece and you fresh as emerge. we don't have with the we don't have a vaccine. the whole world leads to take action. that would be ready. people are judgment, common crisis with we can do better, we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive. so many good people are helping us it makes us feel very proud that we are in it together
6:46 pm
with ah, essentially there's malware thousands, maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number in transferring money and conducting a lot of scam bites and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we
6:47 pm
can't ignore how it's evolved over the. and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps do all sorts of devices as well. because everyone is digitized, everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can't live without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them
6:48 pm
with, [000:00:00;00] ah, really years old old law. you're putting up on your toys near the word close. look on. that was so silent you was, i mean look, he put him on a bucket seats and all you got a little for smaller on me off. i'll speed on my system. i'll darker for so sleep is woke up probably in the car what color which is and they said, so computer, i'm a problem. well, ms. watson, i saw a guy and i was just making sure i knew precisely what i mean. there's traffic more not possible, should morgan want to deal with docile bark while i'm warm up on me needs of those stories for more, more, more than i would like to build the world stories for his cortisol to seek
6:49 pm
knowledge of bristol facility, mr. following up order re, external doctrines with watching over marble shows for us to put them to reschedule motion that video to nelson near or loving. yes, sure for a why near the order i forgot about that is also mused. yes. good company, medical is lamore, liam of the my media. somebody me on the juice. locals log, emotionally, book, mission control. no, i see a funny what christian looks at the internet on a sporting web sharesa wardweb generously more la might. mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be hacked. some of those cases have happened to us cities. so we had
6:50 pm
a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the train, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tests i was doing, not just from a car perspective, but how they were picking up on the data. so they, now they have so much data and intelligence about autonomous driving. i think for me it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to
6:51 pm
try it. i want to experience with we design and sales. humanoid robots arrivals generally, that full size, even though it variables. we make ones look like robots, a plastic metal. we also make a range, that's all human. ok, lifeline silicon skin. and they look, but there was a move like a human being the thrown behind you. yes. this drone in the future will be used using artificial intelligence. it is
6:52 pm
a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of what will be show in artificial intelligence has not many main threat. this is due to the 3 was have robotics. a robot may not injure a human being in action, allow a human being to come to hom, a robot mazda bay orders getting to it by human beings. it's that where stockholders would conflict with the law is listening to lift the couch and hydro shirts from the line. jack avoidance from yep. want to put him? yeah. a couple blog with something that was a law just previously sticking the ramp you quake. yes, ma'am. to capitol as well as similar to what you call us semester. i'm in washington law and order schwartzenegger micron. yeah. that was put on the model was when you to wash it, scraped me a little slower than just the show me. but if you put all of them, yeah, yes, a 0 my gum score. i am, it's are all but the controller a near future. my ciocca thought suits it would do it. it comes to me. it says that,
6:53 pm
you know, we're for marine mush, double holiest, and we saw the gym. no chill america thought on the pl switching you were with at reach out to you chem quote on the war storms deal on this metallic. i'm a cookie fishing committee. alex is on board with him. he's 2 boys options, placement with to fomo, leach and i have to cooper. people log right. want to say the log in the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an app or wherever, if there's a humanoid figure or humanoid presence that, then you're going to think i can talk to that with a switcher fietta where i can die, excuse me, to live now, which it says the might stop soon. there was a christian. yeah. if that. oh but on this, on the which which outside bills were cheated on some small group of suicide. 50
6:54 pm
the do you much more that preview law and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. ethical hackers are indeed a threat. any machine and being act. but it's melissa at the bulk of construction listed on the will not come for 2 adults is requested a new one. i shit is go to putting on the world is becoming more digital, but people aren't going to become completely recursive and only stay in and i really use digital like, and even i would say 10 years. you can see how people have changed through something simple like small and back 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that i can track you out and see where you've gone. see, you've been with see what you thought everyone would go. we can't do that. that's. that's completely against everyone,
6:55 pm
liberty. we don't do that. but now everyone's got a device mem, okay. it does exactly that. people have accepted in because our lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects with i o t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out with one of the things that's happening in the mini cyber implants right now. i'd be where you're really worried about it. most people would really be you can't put
6:56 pm
a chip in my right bob, this is where i'm saying actually that will be accepted in the future. maybe we will have in classes that will directly today. i was like, well, to the bush and convenient, your system will sort of a l. e at the machine on a booth at the deal, but also we need to deal on i'm not sure what to do with id supported. i mean, wish the one i knew what a lot machine that he used to printed on the students, the able to discuss all what mission your community guys are to i. yes, those are some of the machine. and one was a pretty like, you know, like not fullness. telegraph minish. i bet that you more than that. that's the problem with my family. it just them would probably me, which i could go to godaddy. ah, absolutely. in the future, this is cyber criminals can use artificial intelligence, use machine learning to actually find vulnerabilities in other, all the bits and software, all the networks the,
6:57 pm
the information could definitely be active if you're, if they're all her abilities in the software, in the same way right now, your computer to be hijacked and your search engine to be re directed to a different website, which will give you the correct information. ah, cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many substance that linked
6:58 pm
with me. we are using only do any major exit or anything to reach you with me. that would be great, it generally very often foundation with mm ah, we're gonna dig into global macro economics. and once again,
6:59 pm
visit the treacherous pattern of our central planners. control the money printing for empowering ourselves to be more efficient or quicker with our transactions. but with that comes a trade off, every device is a potential entry point for security of any machine. it's an extension of traditional time. the defenders have always been one step behind the attackers with offering. it's not a matter of, if it happens, it's a matter of when who when i looked showed the wrong one. i just don't know. i mean,
7:00 pm
you have to figure out this thing becomes the kid and engagement equals the trail. when so many find themselves worlds apart, we choose to look for common ground. ah, and now we, we both brag thousands of migrants, including children, remains stranded at the border between belarus and poland. warsaw claims minced is escalating, the refugee crisis on purpose. our correspondence is there. they are running low on food and water. i was in between doing live reports for the news when one man walked top to me and back for my open bottle of water for his daughter. meanwhile, russia claims the west has launched a smear campaign against over the border crisis. that's after the polish prime minister directly blamed vladimir putin for creating the situation. also this hour


info Stream Only

Uploaded by TV Archive on