Skip to main content

tv   Documentary  RT  November 9, 2021 12:30pm-1:01pm EST

12:30 pm
ah, join us in the depths or remain in the shallows. ah move ah ah
12:31 pm
ah ah. for empowering ourselves to be more efficient or quicker with our transactions, we can make mobile payments from our stands weekend. tell alexa to open up our
12:32 pm
garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for charity. ah yes. the more chicken, the shortness, your telephone, you more late. yep. so far, i'm also in your office. i have saved with them bilingual obamacare, which though you will. pretty much genia you woke up in your contact with silicon i was i thought was forced to i use mostly and people will share with your former manual with deal.
12:33 pm
it's under the social world in apology to those with climate. if she does so, if you speak with a lawson silica my whole thing is a national listing of users, you definitely want to do a phone interview with me when you thought it was just send you this in your car, but i'm more than the generic leave on that in a minute, the watkins tonight has to be dean, but if you try to get a form in there, the about smoking with fish coming in late. no one has owned it is out, but that most the accounts but not secure, but be sure to move it on like just what this poison is at. the college tech opens up and i be in with cisco without you being asked me to come up
12:34 pm
with that done this me bunker got the course you've done up. was it got to face boys with there are some fundamental rules around password management, making sure that it's claxon often has the right number, right. the length, the right number of symbols are special upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're storing it all in one location is because we're, we're granting single points of entry to obtain that data. when you share a password, which is very common among users on the same password for 20 different applications . yeah, one, yeah. all of them. a call with a question. we call it a marcia account, a retailer ear rush bar, and i have no, i'm riding the bus,
12:35 pm
barn or stairs will fucker americans forgot her last year just told me she had it for you to print a report on the sportage. audubon using a similar procurement in your for them this year was a georgia spike cloud here might be a problem. you know, you're just way calling the bus monitor. it's your score. you're scared of a certain little sleep wash when you no problem with wasn't a hornet's a regular fusion grow your mother. i was listening to combine a couple of those type of thing though to go. but that that sounds somewhat less of a smoker. m a when the shape which he just did it, but it's contact among which i someone introduce complex takeaways that will shape
12:36 pm
boys. elizabeth, because will michelle, the session is up us back up with a decent cheaper than what we just keep checked on daily. thumbs up pretty quickly . positioning the payment of problem with them because you couldn't afford to show . but other than what she had, the parent will do. that voice. bullshit. mortals liking the soil, love it in the soft ear almost. and also cost center file among those cities. bonnie of color browser big with my sight almost push a little community approached by my department of bitcoin and phone company and they. busy were rich to business today, leticia for some great for a quote of a component of a couple of the show room or some, some more incentives don't. it's a dilemma of our current age, people who have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your
12:37 pm
account. and you're going to be frustrated for leasing questions. you won't get used to. so when you all are moisture. so to the summary use of lesson with dozens from meter, yes questions. are you deliberately polyphony. and that is also from the show, like for special to start the deal, it could, she could use your machine, but don't work as a cio. neil course i'm you finish to can you stay for on this often bypass question without assert the issue was because for a year, 5 years, russia, a school of mushrooms wishing exemptions for people to support it on the sheets for immediate gave her some type of drug within reason, the more somebody, youtube, they did a contract with dish washer. oh, it's a shipment. it's alisha series, c, telephone and i'm like with the bunk, keep so sleepy. you homeless store? it's more like one tons for relations to or to motion to push it. it think
12:38 pm
you'd be surprised nowadays, the amount information that exists about individuals on their phones, through their emails, through their corporate systems is generated at a scale that was like, while there before, from location data on your phone to all your personal information that you have. whether it's your banking information at whether it's your at personal location and information about where you live, where your kids go to school, all of that information is available and it's on your either social media pages or on your phone. physically. the big an impact and risk on individuals from a database. lee is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they
12:39 pm
have digital footprints, they have your digital footprints, and they also have your physical footprint as a know a lot more about you. at basal nothing. they can use that information to provide or at least start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credit in your name. when they access your email through fishing attacks. they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist them systems. and hackers and attackers are always trying to gain the
12:40 pm
upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers in some of those at technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you started changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports,
12:41 pm
you will do to factor authentication when you try to access some of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with your shift. give it a pistol reciprocal for a shorter to show us my little more special story. your meter into america. utilize generous or, or not worth what for years or finance me. can i me scram on. then there's clear if any authors, some results from them, sent him across, almost lost their secret blog, sent you to bristol, prince john them on turning them, but which in your schuman sort of agreement, are strong pride character parkway. charlie, a quite car battery,
12:42 pm
but i'm worried about our course and started here. see the rooster beach out? it. is it only a recruitment shorter than what could i knew showing of empirical shapes? it's near doc. rule machine can you do to with with your much core some of them are thought us putting it on the girl product or to put it on last night program and i was returning your call to renew my its a plan. i really am going to renew my, its a woocommerce in your group, your off your salmon on are asking about a high to come pioneer a quarter to pursue a solution. come on there are going is always a rubric here. ready to talk. you should give me a, in a
12:43 pm
equation group, a shock. i'm using my, it's a, it's a lot about him doing. and yet the cool response we still to bank is on the key with the easiest and i got a quote from the repair. okay. is this the jim stein you had to come with me now switch the dealership. i had to store a supplement, but it is so hard. osha place oklahoma. my gosh tv. is that a good off? just a medium there. some. yeah. do you have a vision? katara what it's a whole, it's a mission. i have a question. great kit comes calling about us. comprise a grain should with news initially was me, is the easiest, a national model in the even a puddle. i'm a protocol. so saying in the part that somebody fun with close to where you live
12:44 pm
with, ah, and i make no, certainly no borders line, please and you various as emerge. we don't have with the we don't have a vaccine. the whole world leads to take action and be ready. people are judge, you know, common crisis with we can do better, we should be better. everyone is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is going to response has been massive, so many good people are helping us. it makes us feel very proud that we're in it
12:45 pm
together with best buy is a viable guy. i go to stored safely at the federal reserve. so there are you, don't forget about it. oh no, it's a recreation came where we get the rest the 7 years. so what does that mean? what kind of report join me every posting on the alex simon show. i'll be speaking to guess in the world of politics, sport, business. i'm show business. i'll see you then. mm. ah, essentially there's malware thousands,
12:46 pm
maybe sometimes millions each day. the spend down and gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card. ready to clone your mobile number and then use that on a different phone. ready and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime. they adapted to the situation they use cyber. they used the technology as an extension of traditional crime. but we can't ignore how it's evolved over the years. and in order to discuss how it's evolved, leave to discuss how us as people using digital technologies have evolved as well.
12:47 pm
everybody is online, we are all sharing information through social media, through messaging apps to all sorts of devices as well because everyone is digitize. everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart tones you can't live without your smartphone, you can't live without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with, [000:00:00;00]
12:48 pm
ah, really years law, old old law, you're putting up on your toys near the way possible. look on that was so silent you assignment to remove the putting more a bucket seats and all your global level for smaller on one bill. but i'll speed on my system. on dark a 4 hour sleep is woke up probably in the got calla, which is and they sit. so computer, i'm me see a problem. well, ms. watson, i saw a guy that was sent, mr. danny, precisely what i mean. there's traffic more not possible. sure. more mozilla docile bark, warm warm up on me needs at those stores for more more, more than i would like to build the world stories for his supporters or to seek knowledge of being a possibility of missed the following up order react albertsons with watching over marble shows for us to put them with rescheduled, washing that video to nelson near or loving yes, sure from i knew the other article
12:49 pm
a little of that is also mused. yes. good company metaphors lamore, liam of the my media. somebody, me on the juice locals are more emotionally book mission control. no, i see. i mean, what christian looks at the internet on the sportage, which she had written wardweb generously more. la might. mm hm. mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. lot of people trying to use the metro trying to use the
12:50 pm
train, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what that's what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. i think for me it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience
12:51 pm
with we design build humanoid robots arrivals, generate that full size even though it variables. we make ones that look like robots, a plastic metal. the we also make arrange that all human. okay, so lifeline. silicon skin and they look, but there was a move like a human being, the drone behind you. yes. this drone in the future will be used using artificial intelligence. it is a taxi service that i think streaming useful thing. don't you think my friends are? what are the main threats of what the visual with artificial intelligence has not many main threat. this is due to the 3 robotics of robots may not india. a human
12:52 pm
being true in action, allow a human being to come to hom, a robot must obey orders getting to it by human beings, except where such orders would conflict with the law. is listening to lift the couch and how should i turn to lloyd? yeah, coca cola boys from yep. want to put him yeah. a couple blog with something that wasn't law just previously. stickiest america you quake. yes, ma'am. to capitol as well as similar to what you call us semester. i'm in washington law and order. schwarzenegger micron. yeah. that was put on that one more look was when you to rush skype, me a little slow. this the show bleep. if you put off some. yeah, yes, a 0 my gum score. i am, it's are all but the cathedral will near future. my ciocca law suits you at that it would do it. it comes to me. it says that, you know, we're for marine mush, double holiest. and we saw that the more chill america thought on the pl switching with at reach out some new chem quote on the war storms deal. and there's natal, i'm a cookie, isn't each committee? alex is some boy, actually them is 2 boys options,
12:53 pm
placement with shopping with the home each night at the cooper people long. right. want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an app or wherever, if there's a human noise figure or humanoid presence that then you're going to think i could talk to that one, use a switch or the other way can die, excuse me, to live now which it says the might substitute was a christian. yeah. if that over down this on the which, which out said bill who cheated on some small group of suicide. 50 to do it. you might, you more the preview law and what do you know about hackers? are you speaking about ethical hackers on ethical hackers? unethical factors. ethical hackers are indeed a threat. any machine and being
12:54 pm
a bulk of consumption listed on the will not come forward to adulthood requested i knew will not city speaker go to putting on, that the world is becoming more digital, but people aren't going to become completely recursive and only stay in and i really use digital liked and even i would say 10 years you can see how people have che, through something simple like small that you look 10 years ago. maybe 15 years ago . if you've told yourself or anyone that you have a device that can track you out and see where you've gone. if you've been waiting and see what you thought, everyone would go. we can't do that. that's, you know, that's completely, again, every with liberty. we don't do that, but now everyone's got a device in them. okay. it does exactly that. people have accepted it because our
12:55 pm
lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will all and then one of the things that's happening at the minute is cyber implants. right now, i'd be where they're really worried about it. most people would equally be you can't put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have in classes that will directly today. i was like, well,
12:56 pm
to the bush and you can, daniel ro, system will sort of a e at the machine on a booth at the deal. but also we need a deal on, i need to, to do what id supported. i need to wish the one i knew what a lot machine that he used to print the long distance. there we go to school all. what machine you agree with? you guys are 2 i yes, those are some are machine. one of those are pretty like, literally not bonus telegraph noonish. i bet that you more than that. that's it. the problem on my screen, which would probably me, which i could go to godaddy, absolutely in the future, this is cyber criminals can use artificial intelligence to use machine learning to actually find vulnerabilities in all the bits and software, all the networks. the information could definitely be active if you're, if there are vulnerabilities in the software. in the same way right now, your computer could be hijacked and your search engine to be re directed to
12:57 pm
a different website, which will give you the correct information. ah, cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have many substance and digital phone and linked to each other to protect the people into i sure there are using only do analyze if there's any major leg exit or anything to reach that people and keep them in just
12:58 pm
a bit like mm hm. a degree that to generate a very often foundation for security and happiness and like at the same time. mm ah ah, when i would think wrong when i just don't know if you have to figure out if they become an advocate, an engagement. it was betrayal. when so many find themselves,
12:59 pm
well the more we choose to look so common ground, we're empowering ourselves to be more efficient quicker with our transactions. but with that comes a trade off every device p as a potential entry point for security attack. any machine can be hacked, it's an extension of traditional time. the defenders have always been one step behind the attackers. both with this one comes option in the offering. it's not a matter of, if it happens it's a matter of went to what we've got to do is identify the threats that we have. it's crazy confrontation, let it be an arms race is on offense. very dramatic development. only personally and getting to resist. i don't see how that strategy will be successful,
1:00 pm
very difficult time. time to sit down and talk with this is outside breaking news. russia claims the west has launched a smear campaign over the migrant crisis unfolding on the border between bella, ruth and poland, it's off. the polish prime minister directly blamed the demon potent for creating the situation. now with both by now several 100 migrants including young children, remain stranded at the border state to try to reach the e. u. l correspondent is that this is what's going on here. we were told that at least 2500 people have intent here and that this is, this is what, what they do. and so here we can see a family with children. they're trying to warm up from the fire woods also, their salad. germany tries to get control over the corona virus by imposing tough


info Stream Only

Uploaded by TV Archive on