tv Documentary RT November 9, 2021 10:30pm-11:01pm EST
ah ah for empowering ourselves to be more efficient or quicker with our transactions, we can make mobile payments from our sterns weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cybersecurity risk in mary amount of
paranoia. the truth is that every device is at potential entry point for security attack. mm yes. the more choice in the shortest, your telephone, you late? yep. so far, i'm also in your office. i have stayed with i'm writing global writing, which though you will pretty much ginia you woke up in your contact with silicon i was i thought was forced to i use a little motion and people would share with your former manual with deal. it's under the social world in apology to those of climate. if she'd also, if you stick with this one and you got a, the lawson silica my whole thing is
a national machine. users, you definitely want to do a phone interview with you when you thought of people suggesting this isn't isn't nika, but annoyance. and the generic name was crying that in the minute the organs tonight is because of the dean. but all you can cut off one mid day of the about smoking with fish, and there's no, no someone's in it. the ocean is out, but i'm the one that does your accounts, but not secure, but be sure. and then we'll look online to see what this poison is at. the college tech opens up and i've eaten with me cisco without you being asked me to come up with that done this me bunker got the course you've done up was it got to face boys with for some fundamental rules
around password management, making sure that it's complex enough and has the right number, right? the length, the right number of symbols are special. upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because what we're granting single points of entry to obtain that data. when you share a password, which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them. a call with a question. we call it a marcia gall until a retailer ear rush. a steroids will fuck origins forgot for last year, just to finish it for you to pretty much ready for on the report. we did the
sportage, audubon using a similar procurement in your for them this year was a georgia spike allowed here might be a problem. you was up here just way call and the bus monitor to record your service or will sleep wash when you no problem with wasn't crazy on the horn. it's a year and you burglar fusion grow your mother. i can find you a couple of some type of thing though to go, but that's not something like a smoker. m a when the show which he just didn't, but it's contact among the church. i'm gonna tell you franklin taker when he's that will change boys. elizabeth, hello michelle. the session is up us like with the district, you put them. what can we just keep checked on daily? thumbs up pretty quickly. positioning the payment problem with them. she couldn't afford to show other than what she had. the parent will day them, which one,
which is more like in a slow love in the soft ear or more of what she does for cassandra file a moment while she does look serious plenty of room browser big with a site there are multiple, she little committee proposed by my department a bit going on so i'm can be a day. busy with the business today, leticia for some great recording of a component of a couple of the shop and doing some sort of more incentives. dylan. it's a dilemma of our current age. people have a false sense of security. while nothing happens, we have the sponsors, the security that we're not going to be touched, it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for leasing questions. you won't get used to. so when you all are moisture, so to the summary use of lesson with dozens from meta description, sorry, just a source of from the show for special to stanley deal. it could,
she could use the machine, but don't we as a cio mccrae some international. can you stay for on this often by in translation without assert the issue was because friend, diverse russia, a school of mushrooms wishing exemptions for people to support illnesses as sheets for immediate gaze, for some type of drug within reason. the more somebody you tube, they charge a conventional bush. oh, it's a shipment solicitude series, say telephone and i'm like with the mom keeps just repeating what you homeless like on. sounds for relationship with the motion to preach it think you'd be surprised nowadays, the amount information that exists about individuals on their phones
e mails through their corporate systems is generated at a scale that was like no other before from location data on your phone to all your personal information that you have, whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school. all of that information is available and it's on your either social media pages or on your phone, visit. the big an impact and risk on individuals from a database league is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprint, and they also have your physical footprint as a know a lot more about you. at basal nothing, they can use that information to add, provide, or a t start to create an identity theft type of exercise. they can maybe go to
a bank pretending to be you take loans in your name, take credit in your name. when they access your email through fishing attacks. they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been a lot of progress from the hacker side. a lot more progress actually on the hacking saw using ai,
ai and using other advanced technologies that there has been on the defensive side . the defenders have always been one step behind the attackers in some of those and technology developments. because there's more collaboration and more sharing of information in the hacking and ecosystem, if you like, ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you started changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access some of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure
lifestyle with your shift. give it to crystal, please to prepare for a shorter to show us my little more special story. your other meter into america. utilize generous or i'm not worth what you are finding out for me to come. i'm each scram on. then there's left on your 1st service and honestly i'm send him now clause with almost lost their secret blog sent over to bristol, chris john, them. i'm turning them both junior sherman through agreement or straw. i get other parkway charter, quite car battery, but i'm worried about our course and started here. so the rooster be shouted down. is it only a recruitment shorter than could i new showing of empirical shapes? it's near doc. rule machine can you do to with, with your mulch course. some of them are taught us, but you know they're groupon could alter, put it on last my program i was disconnected to renew my. it's a, it's a seminar,
are sitting up pushing the property or from the high to come pioneer a quarter to pursue a position. come on there are green, is always a little grip here. ready to talk. you should give me a chairman a in i can commute a equation group a shock. i'm using my so can you show me a lot about him doing? and yet the cool response, we still to bank you somewhere like here with the easiest, and i got a quote from the repair. okay. is this the jim stein?
you have to come with me now switch the dealership. i had to store a supplement, but it is so hot. osha place oklahoma. my got tv. is there a good rock of just a medium there? some. yeah. do you have a vision katara what it's a whole. yes, it's a mission. i have a question. great kit comes i calling on behalf of us, comply with our green should with news initially was me and you're still seeing the brother in law shipping ministry of national puddle in the even a puddle. i'm a protocol. so saying in the part that somebody fun with close to where you are in a join me every thursday on the alex simon show and i'll be speaking to guess in the
world, the politics sport, business. i'm show business. i'll see you then me as a korea professional sport is much tougher on some than others, a euro, he might by everybody here. so why would somebody believe me? i was just a little girl. the price of a to, to, to achieve really was, was trying to read on the paper this morning, usa swimming coach, arrested, allegedly had sex with a 12 year old girl. this happens almost every week. we get calls at the office. i get informed about one of my greatest fears is someone is going to start linking all this together is going to be a 60 minute documentary about youth coaches in sports like gymnastics swimming, is that documentary?
i see it on r t l look forward to talking to you all that technology should work for people. a robot must obey the orders given it by human beings, except where such order does that conflict with the 1st law show your identification . we should be very careful about artificial intelligence at the point obviously is to great trust rather than fear. a very job with artificial intelligence, real summoning with a robot must protect its own existence with oh, essentially, there's malware. thousands made sometimes millions each day. the spend down and
gave again, another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they on to achieve or wear out what we call sim swapping. so they will try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone. ready and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam fights and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we can't ignore how it's evolved over the and in order to discuss how it's evolved, lead to discuss how us as people using digital technologies have evolved as well.
everybody is online, we are all sharing information through social media, through messaging apps to all sorts of that and devices as well. because everyone is digitized, everyone is moving to online banking, our online retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can't live without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them, with
islam. old old la. yeah, put you up on the idea of the way, looking back and wasn't so silent with focus. it's for one gigabyte level for smaller drama because of all speed on my system. on darker for so sleep is walk for probably in the car what color which is and they said, so come with a problem or is a process. so again, i wish i knew precisely what the one b, there's traffic more not possible should more than one to deal with docile bark. while i'm warm up on me needs of those stories for more, more than i would like to build the world. stories for supporters or to see knowledge recreational facilities missed the following up order via auction or school was watching all mobile shows for us to put them disco. motion that video to nelson near or loving. yes, sure from i knew the other article, a little of that is also music. yes, good company, beautiful, la, marlene my media,
somebody me on the juice. lucas are more emotionally book mission control. no, i see a funny what christian looks at the internet on a sportive web, shared risa with web services more la, much mm mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be hacked. some of those cases have happened to us cities, so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy
a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a, a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. i think for me it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with
we design build humanoid robots arrivals, generate that full size even though it variables. we make ones that look like robots, a plastic metal. we also make arrange that all humans. okay? so lifeline. silicon skin and they know but able to move like a human, being the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming a useful thing. don't you think my friends are? what are the main threats of what to be show into artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not india a human being through inaction allow a human being to come to. a robot must obey orders getting to it by human beings.
it's that what i told us would conflict with the bus will need to lift the couch. and i'd also like jack a boy. yes. more of a blog with a lot just really sticking to remember. you quake? yes, ma'am. to capitol as well as similar to what you call us semester and then we'll watch movies more the law or the schwarzenegger micron. yeah, that was put on the a multiple is when you to rush, i mean we'll switch this to show bleep if you put all of them. yeah. yes. a 0. my thumb score. i am, it's are all but the controller a near future. my ciocca thought suits you, it would do it. it comes to me. it says that, you know, we're far more, he's much double holiest and with no chill america political switching with at reach out to the chem quote on the war storms deal. and there's natal, look, i'm a coquettish committee, alex is some would argue with him. he's 2 boys options, placement with to beaumont leech and i have
a group of people long. right. want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a humanoid figure or humanoid presence that, then you're going to think i could talk to that with a switch, a better way can die, excuse me, to live now, which it's the might stop soon, there was a christian. yeah. if that. oh but on this, on the which, which out said bills were cheated up on some small group of suicide. 50 to do it. you much more the preview law and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors unethical. hackers are indeed a threat. any machine and being act, a bulk of construction listed on the will not come for the adults was requested,
i knew will not cities kicker go to putting on that the world is becoming more digital bit people aren't going to become completely recursive and only stay in and i only use digital, i can even able to say 10. you can see how people have changed through something simple like small, like 10 years ago, maybe 15 years ago. if you tell yourself or anyone that you have a device that can track you out the way you've gone. if you've been waiting and see what you thought, everyone would go, we can't do that. that's, that's completely, again, every with liberty. we can do that. but now everyone's got a device mem, okay, it does exactly that. people have accepted in because our lives are inherently carry with them. the more we allow our lives to be taken over. if you
can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out with one of the things that's happening in the mini cyber implants right now. i'd be where you're really worried about it. most people would equally be you can't put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have implants in the rain that will directly today. yeah, i was like, well, to the bush and convenient royce or some more sort of
a d at the motion on a booth at the deal, but also we need to deal on i'm not sure what to do. what id supported. i mean, wish the one i knew what a lot my she'll if he's a student there a yes, those are some are motion was a pretty when you know like not fullness. telegraph minish. i bet that you're more than that. that's the problem. on my screen. it just them would probably double check a courtesy call to follow that. absolutely. in the future, this is cyber criminals can use artificial intelligence, use machine learning, why actually find vulnerabilities in all the bits and software. all the networks the, the information could definitely be active with, if their vulnerabilities in the software. in the same way right now, your computer could be hijacked and your search engine to be re directed to a different website, which will give you the correct information. ah,
with that comes a trade off. every device is a potential entry point for security attack any machine, depending on it's an extension of traditional time. the defenders have always been one step behind the attackers with offering. it's not a matter of if it happens, it's a matter of when who when i was a out, the scene becomes the advocate and engagement equals the trail. when so many find themselves, well, the part we choose to look for common ground.
ah, i am now with both reg, thousands of migrants, including children, remain stranded at the border between belarus and poland. warsaw claims minsky is escalating the refugee crisis on purpose. meanwhile, russia claims the west that has launched a smear campaign against it over the border crisis. that's after the polish prime minister directly blamed vladimir, put in for creating the situation in germany, tries to gain control over the crown of virus by imposing tougher restrictions as the number of infections it reaches its highest level. since the start of the pandemic and moscow's defense minister says us warships in the black sea near russia's borders, are a threat to regional security. does your headlines at this hour? my colleague andrew farmer will be here in just under an hour's time with an.