Skip to main content

tv   Documentary  RT  November 14, 2021 3:30pm-4:00pm EST

3:30 pm
ah ah mm hm. robin by dreamer shaped baskin cursed out of those with you dares sinks. we dare to ask
3:31 pm
ah, lou ah
3:32 pm
ah ah. we're allowing ourselves to be more efficient or quicker with our transactions. we can make mobile payments from our stands weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is out there. there's more cyber security risk. an extraordinary amount of
3:33 pm
paranoia. the truth is that every device is a potential entry point for security a time with which you like, and the shortest your g fornia late. yep. so let me farm up. so you're absolutely shave reasonable. you know what i'm writing go obamacare, which so you will pretty much ginia you cook option you conducted a silicon that was supposed to easily and people would share with them and also follow the annual with diligence under the social wonderful, chichi of those of climate. what she does for ppc with
3:34 pm
a whole thing is a national machine that use it for you with your phone if you wish to me. and when you thought it was can just send you. busy this in your car, but annoying and the generic name on that and then the thought of the dean, but all you got a phone with us, but she could come in those way. no, no someone did. it was out, but the accounts been not secure, but the shipping removal on my teeth with this boys at the college tech opens up and i've eaten with uh, done this to me. bunker got a question. if you're done up,
3:35 pm
was it got to face boys with there are some fundamental rules around password management, making sure that it's complex enough and has the right number, right? the length, the right number of symbols or special upper lower case that type of thing. that's stuff that we're all familiar with why we want to be careful when we're storing it all in one location is because what we're grand a single points of entry to obtain that data. when you share a password which is very common among user. so i have the same password for 20 different applications. yeah. one. yeah. all of them. a pretty. i was in the question we are calling to put them into the washer account a year, a
3:36 pm
americans, you got sir? not industrial miscarriage. here for you to pretty much ready for on the sports or bon using their summer specter and then you're left for them. this year was a georgia spike allowed your hair might be a problem. you was up here just way calling the bus monitor to record your service or will sleep wash when you no problem with that. great. you're on the horn, it's a year and we're glad fusion grow your mother or haitian. you combine a couple of play the single income, but that's not a smoker. yeah. mm hm. the shape which he just did a reported contact among the church. i'm gonna tell you franklin taker when he's that will change boys. elizabeth can hello michelle. the session is up us like with the district, you put them. what can we just keep checked on daily? thumbs up pretty quickly. positioning the payment problem with them. i just
3:37 pm
couldn't afford to show up with other than what she had been all day. that voice bullshit. mortals like, you know, slow love it in the soft ear on what she does focus center file a moment. well, she does have cities bonnie of color and i was a big with a site, almost pushy little committee approached by my department a bit going on. so i'm can be a day with rich to business today. leticia are some great for quote, a fucking to paul is a couple of a couple of the show, but it only samstone what i'm 2nd is dylan. it's a dilemma of our current age. people have a false sense of security, while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the, the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for leasing questions. you won't get used to. so when you're swallow moisture,
3:38 pm
summer you select from dozens from meta description, soraya, jelly, barley, post, letting you know it has no power. and that is also from the chalet or special to sit on the deal. it's after she could use commissioning. but don't worry as a chimney, chris, i'm you finished looking. you stay for balloon this offset by in translation without assert the issue was because for a year with ivy sugar through them all stood but a bit of a school of mushroom soup wishing exemptions for people to support it. build up the sheets for immediate gays curriculum to provide within reason to a more smudged youtube. they did a contract with dish wash. oh, it's a shipper's, it's alisha. she receive telephone and i'm like with the money keeps just repeating what you homeless. dorothy, like bon sounds for relationship with the motion to push it through you'd be surprised nowadays,
3:39 pm
the amount information that exists about individuals on their phones through their e mails, through their corporate systems is generated at a scale that was like no other before from location data on your phone to all your personal information that you have, whether it's your banking information, whether it's your at personal location and information about where you live, where your kids go to school. all of that information is available and it's on your either social media pages or on your phone physically. the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint as they know a lot more about you. so they can use that information to death provides ortiz
3:40 pm
start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credit in your name. when they access your email through fishing attacks. they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers or maybe some secret intellectual property that only your organization hass. for example, the design for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist assistance. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been
3:41 pm
a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers in some of those at technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like. do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passwords, you will do to factor authentication when you try to access some of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you org or something,
3:42 pm
all of those things you need to start putting into your life as part of that secure life bio with shift, give it to christopher, to prepare for a shorter to show us my little more special story in america, you thought i'm satisfied with what you were finding out from you. can i me scram on then. if any of our service orders from them sent him out with the other thought said bristol prince john, i'm not saying enough for washing machine on a straw or try to get quite a car battery, but i wanted to talk or some states where should the rooster be chopping down, you'd only a recruitment shorter than what i knew showing up a bit of cliches that new doc, room, which name can you do to record your much course?
3:43 pm
i'm not a picture. put it on last night program that was between your club to renew my it's a but you can, i mean you go to renew my, it's a group you're off. you're with, some of them are sitting up pushing the properties or heights you come pioneer is straining one with the night a, which is the revolution. you cannot say, look at the doctors. so slowly the order give it a pre student go for me. it was more of a vision. come on, i mean, there's always a little grip year ready to talk like you shipped to reagan, sherman and g r d hm. i can get a better with steps now. i can barely bethel lattice. i'm a shit at me. katy equation group a shock. i'm using my 2nd be shamika spanish and yet i was thinking about the way in if you had them, i'm still with no i can get any better. reminds
3:44 pm
a lot about the him doing any other cool response. we still to bunch is time, we are the key what the easiest thing and i got a quote from repair. okay. is this the jim stein? yeah, the carrier, but at the system it should say it means land with, with how much to me. unfortunately, if you wish it, i had to store a supplement, but it is so hot. osha place oklahoma like octave easter seals. nice hear, good afternoon and then you know, so doesn't you go to rock of just and we did some you do you have that with the structural issues of virginia katara, what it is is actually hotter shoppers, oklahoma, it's got a mission. i have a question. great kit comes calling on behalf of us. comply with our grain should with private news. and the chanel was me. is the easiest option to bundle unless you're not sure of national puddle in the u. n. a puddle. i'm a protocol. so saying in the part that somebody fun with close to where you live in a
3:45 pm
year. so what we've got to do is identify the threats that we have. it's crazy even foundation, let it be in arms. race is on a very dramatic development, only personally. and getting to resist, i don't see how that strategy will be successfully, very critical time. time to sit down and talk a border around the try a seal island in contention between canada and the united states, where their government has suddenly become optimal for lobster. our population here is exploded, one of the most valuable fisheries that ever existed. suddenly you had me and canadian fishermen in these waters at the same time jousting for position and attention to high violence is bound to happen. this is the last land border dispute between canada and the united states. it could be magnified to the point where
3:46 pm
there could be costs that would be significant to poke countries border dispute don't go away. it's assessed or something's going to happen. as a career professional sport is much tougher on some than others with the euro. she might by everybody here. so why would somebody believe me? i was just a little girl. the price of a to, to, to achieve really was, was fall to read on the paper this morning, usa swimming coach, arrested, allegedly had sex with a 12 year old girl. this happens almost every way we get calls at the office. i get informed about one of my greatest fears is someone is gonna start leaking all this together. there's going to be a 60 minute documentary about youth coaches in sports like gymnastics in
3:47 pm
swimming here, is that documentary? i see it on our t ah, essentially there's a malware attack thousands, maybe sometimes millions each day. this pandemic gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone. ready and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bikes and major organized crime. they add that of the situation. they
3:48 pm
use the cyber. they use the technology as an extension of traditional crime. but we can't ignore how it's evolved over the and in order to discuss how it's evolved, leave discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps. do all sorts of that and devices as well, because everyone is digitize. everyone is moving to online banking out online, retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone. you can play without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with
3:49 pm
islam. luck. we'll put you up on the look on back was so silent with a far corner bucket seats all you got a little fish for them on bill. i'll spend it all nicely still. while dr for sleep is woke up with a guy that was sent and they said, so come through that. i'm not a problem. hello, ms. watson. i saw a guy that was jennifer social, the, what i mean, there's dr. morner boss will should more to deal with dorsal barble and more up on me needs of those forest law more more than i would like to build the world boys
3:50 pm
supporters or to seek knowledge abuse facilities miss the following up with rick robertson with watching over my wish was for us to for them to use go to washington, video nelson, nickel, local, national. i knew the author. i forgot the lady's officer mused. yes. good company. beautiful. la merlin, my 1000000 somebody me on the juice. lucas log. emotionally. both mission control. no. i see off on me what crucial look city and filling up on a subordinate with sharesa wardweb children to lamar mm mm. connected systems and connected cars, connected buses, even the connected trains and metros, they can be hacked. some of those cases have happened to us cities, so we had
3:51 pm
a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not recover from it. a lot of people trying to use the metro trying to use the trains, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what tesla was doing, not just from a car perspective, but how they were picking up on the data. so they, now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience with,
3:52 pm
ah, a, [000:00:00;00] with a sales humanoid. robots are i right, boss, generate that full size even though i grab what we make ones look like robots, a plastic metal. we also make a range, that's a lifeline. silicon skin and they know but able to move like the human, the thrown behind you. yes. this drone in the future will be
3:53 pm
used using artificial intelligence. it is a taxi service that to think extremely useful thing. don't you think my friends out of it? what are the main threats of what the vso intelligence, artificial intelligence has not many main threat. this is due to the 3 laws of robotics. a robot may not india, a human being through inaction allow a human being to come to. a robot must obey orders getting to it by human beings, except when i told it would conflict with listening to lift the couch. and i'd also like jack a boys from. yep. want to put him. yeah. it's a couple blogs, a lot of law just be really sticky instrument. can you please? yes, ma'am. to capitol as well, that's similar to what you call us submitted on the watch movies. la schwartzenegger micron. yeah, that was put on the multiples. when you to rush, it was like this, the show many people are awesome. yeah. yes them was. you don't like them score. i am, it's all but the thought i had
3:54 pm
a huge she might clicker. we thought it would go, it comes from we, it says that, you know, we're for maureen marsh, double holiest. and we saw the gym or chill, america photo, switching uber with some new chem, put on the war storms dealing with all comma keep isn't just materiality. some would actually come to port auction with home each night. a group of people love, right? want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception or, or an apple web, if there's a humanoid figure or humanoid presence that, then you're going to think i could talk to that with a switcher fietta where you can die, excuse me, until you know which it's the might substitute almost a crew chin if that over to on this, on the wichita, wichita,
3:55 pm
i'd be able to cheated on some small group of suicide. if you do it, when you might get you more of a preview, and what do you know about hackers? are you speaking about ethical hackers on an ethical hackers? unethical markers. some ethical hackers are indeed a threat. any machine can be hacked by a technology at the bulk of the construction listed on the will not come for the adults is requested. a new one. i shit is quoted pretty nice that the world is becoming more digital bit. people aren't going to become completely recursive and only stay in and i will use digital items even over the past, say, 10 years. you can see how people have changed through something simple like small that 10 years ago, maybe 15 years ago. if you tell yourself or anyone that you have a device that can track you out and see where you've gone, see,
3:56 pm
and you've been waiting and see what you thought. everyone would go. we can't do that is to really against everyone's liberty because it now everyone's got the right mem. okay, that does exactly that. people have accepted in the case our lives are inherently carry with them the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cyber security as best we can . and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out . we will all and then one of the things that's happening as
3:57 pm
a mini cyber implants right now, i'd be really, really worried about it. most people would equally be you can put a chip in my right, this is where i'm saying actually that will be accepted in the future. or maybe we will have it in the brain that will directly today. yeah, i was like, well, to the bush nika, daniel roy system will sort of a more like but in the machine on a booth at the deal. but also we need a deal on i'm not sure what to do with the one. i knew what a lot of my sheila used to print the students. they are going to school. well, what mission your community see guy used to i. yes. those are some of my shoes. one was a pretty when you know like no fullness tell drop minish my bed. that wasn't an issue . that the problem, when my family, it's a problem when i wish i could go to go daddy. absolutely. in the future, the cyber criminals can use artificial intelligence,
3:58 pm
machine learning, so i actually find all, let's see another other bit to software. all the network information could definitely be active if their goal or abilities in the software. in the same way. right now, your computer could be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah, it is going to be hard and connected. cars can be had all the different devices now that are connected to the internet can be hard for me for many on it. and it still looked on,
3:59 pm
it's linked to each other to protect the people and to assure they've mm, we are using only to analyze if there's any major exit or anything to reach that people and keep them safe and to see if they have like mm would degrade it to generally a very often foundation for security and happiness and like at the same. mm hm. a
4:00 pm
the the me ah, we stop stories on our teeth, food and medical supplies, run low for thousands of margaret cams on the better route potent board or trying to get in the you pay groups of call the situation desperately correspondent reports from the thing. frankly, this girl sadly, with the phrase, now she's bleeding and she needs help. but the problem is that there are no medics around. there are no doctors around and really nobody knows what, how to deal with this brochure. as the modern chaos on potent watering down to western conventions in the middle east was also an id. you claim that it's last monday in the crisis. developing story from the liverpool you were police arrest

7 Views

info Stream Only

Uploaded by TV Archive on