Skip to main content

tv   Documentary  RT  November 14, 2021 8:30pm-9:01pm EST

8:30 pm
ah, we're allowing ourselves to be more efficient or quicker with our transactions. how we can make mobile payments from our stands weekend. tell alexa to open up our garage door, all those things come with it. a lot of efficiency and a lot of benefits. but with that comes a trade off, which is where there's more cyber security risk. an extraordinary amount of paranoia. the truth is that every device is a potential entry point for security a time with
8:31 pm
a lot. so if you're looking to stay with the mining goal, obamacare, which though you will, pretty much jane. you woke up she, you conducted a silicon that was supposed to use a formal manual with dealerships under the social world. a she does for ppc with a phone interview which is to me when you thought it was just when you. busy a minute,
8:32 pm
i can get a phone with someone to call again coming in today since a got a pest, but if she could come in and there's really no one has someone did it the names out, but the one that does come to the best you but be she can move on like, you know what this boys in the, at the college tech opens up and i've eaten with uh, done this me bunker got a question. if you can down up with these boys with there are some fundamental rules around password management, making sure that it's complex enough. and as the right number, right, the length, the right number of symbols are special. upper lower case that type of thing. that's stuff that we're all familiar with. why we want to be careful when we're
8:33 pm
storing it all in one location is because what we're grand a single point of entry to obtain that data. when you share a password, which is very common among user, still have the same password for 20 different applications. yeah, one. yeah. all of them. a call with a question. we're going to put them into the marcia gall and the chairs are each year, year wash bar up and i have a steroids will fucked on average. and that's for last year. that's called miss generous report due to putting on my credit report with the sports on, on using their some west virginia left for them. this year was i do and spike loud here might be a problem. you was up here just way calling the bus monitor. record your service, sir. will you wash one unit button? no problem with the document, donna horn for the usa,
8:34 pm
our storm were unease near you. burglar fusion, grow your mother. i can find you a couple of play the same other income, but that'll sense in what was just a part of that facebook or m a when the check which he just did a report or did contact among the shirts or monitor different particular worries that will shape was elizabeth critical mission. the session is up as like with the district, you put them what krycek winter. he took them daily, thumbs up pretty quick positioning the premium proper with them sketches, cardiac now for the show, but other than what she will pair with. although you know which one which is more like, you know, so love it in a soft ear or more of what she does focus something file emotional. she does look cities, pony of color, browser big, which we cite, almost push a little committee proposed by my department of bitcoin. and so i'm can be a day with rich to business today. leticia this of some great for quote,
8:35 pm
a fucking to post a couple of the shop and doing some, some more incentives. don't miss until i'm of our current age. people have a false sense of security. while nothing happens, we have this sense of security that we're not going to be touched. it's not going to affect us. but at the end of the day, it is very prevalent and it is out there. you may not be the the primary focus right now, but as soon as you become a profile target, then you're going to be the one who's going to be missing some money in your account. and you're really frustrated for sheila, i wish in questions you won't get used to. so when you all are moist. so to the summary use of lesson with dozens from media use, which in for a year, julie barley post lesson, you know, it has no power in that as a source of furniture. like for special to stanley deal, it could she could use can machine, pardon me, as i cheer me. of course i me finish to can you stay for balloon this offset by the last question. what other 30th it was because frank year mcdavia, russia thorough domino stood people of a school of mushroom soup wishing exemptions. please press 4. if you're not the sheets for immediate gaze, curse them. oh, do i go to the pen reasons?
8:36 pm
i'm more smudged youtube. they did reschedule dishwasher. hello. this is shippers and solicit, you shall receive to the phone, and i'm in a group called bonn, keep so sleepy while you homeless thought it was the lead on sounds for relationship was the most reported it through with you'd be surprised nowadays, the amount information that exists about individuals on their phones, through their e mails, through their corporate systems is generated at a scale that was like, no other before, from location data on your phone to all your personal information that you have. whether it's your banking information at whether it's your at personal location and information about where you live,
8:37 pm
where your kids go to school. all of that information is available and it's on your either social media pages or on your phone, visit. the big an impact and risk on individuals from a database leak is identity theft. if someone has your name, your address, your date of birth, your email address, potentially also the password that you use to access that specific website. they have digital footprints, they have your digital footprints, and they also have your physical footprint, as they know a lot more about you. at basal nothing, they can use that information to provide ortiz start to create an identity theft type of exercise. they can maybe go to a bank pretending to be you take loans in your name, take credit in your name. when they access your email through fishing attacks. they can then use your identity within the organization to reach out to other systems within the organization that might store either personal information of customers
8:38 pm
or maybe some secret intellectual property that only your organization hass. for example, that designed for the next car. if you're a car manufacturer or the design for the next i phone, if you're apple or some other organization that's creating innovative products, those exist assistance. and hackers and attackers are always trying to gain the upper hand and competitive advantage by reaching those systems and maybe selling it or providing it to competitors. so there has been a lot of progress from the hacker side, a lot more progress actually on the hacking side, using ai and using other advanced technologies that there has been on the defensive side. the defenders have always been one step behind the attackers and some of those and technology developments because there's more collaboration and more sharing of information in the hacking and ecosystem. if you like.
8:39 pm
ah, do you need to be aware that it could happen to you? it could happen to you and for us from a cybersecurity industry, we say it's not a matter of if it happens, it's a matter of when, if you start changing your culture to become more aware of that, then you'll start applying some security into your day to day, for example, you have stronger passports, you will do to factor authentication when you try to access all of those website. you might not leave your laptop on and unlocked when you're in a coffee shop. if you go to the toilet or you go to order something, all of those things you need to start putting into your life as part of that secure lifestyle with . ah yes, shift give it
8:40 pm
a prescription to produce fresh from there to show us my little more special story of the check in for america. you thought i'm saturdays or, or where the, what you are finding out to me you can, i mean square on then you see if any of her separation notice from them. so i am now clause with space. you could have thought, check your to bristol, prince john, them, i'm sailing them for which in your shoes with a straw or try to get quite a car battery or some mistake here. shoot the recent reach out to you only a real crew that shorter than what i knew showing of the vehicle shows that new dog groomers name can you use to record your much course? i'm not. i taught us, but if you don't, the girl part of the picture put it on last night program that was between your club to renew my exit button. im going to renew my its and we were gonna junior group. you're off here with some of them are sitting up pushing the properties when i own a car from the heights come pioneer is straining one with doesn't use nice little dora a. i want you to revolution. you cannot hear. we're going to
8:41 pm
a doctors. we're slowly back order. give it a preschool playground. funny me. it was more of this. i why cherry resolution come under? i mean it's all, it's a little breath. you're ready to talk to you. security insurance. got to read and g . r dims. mm. i can scan it one more that i did not. they sent them probably better with some my fake betty bethel as adults. i'm a shadow. teddy equation group a shock. i'm using my 2nd be shamika nash. and yet i cool with way in the view, i'm still with no, but i mean i can get any better. get those the mindset about the m d and yet the cool response we still to bunker, you sound like he was the easiest man. i got a little bit about that quote with my knees. this is jim stein you at the come i live, but i pitched in system e should i it means lam with what portion of that much to me now to wish you deal. wish i had such thought, i use that much, but i've got me out of the door, lead placement. but i mean, you put the key or someone there, but it's is up so hot. osha push oklahoma. my got tv there. she has
8:42 pm
a daughter, but it's a mission i have a question about comply with with them a national puddle in the you want to buy a car. so saying in the part that somebody fun with close to when you please. ah oh. so security breach in the 10 percent is the true believers usually are highly committed to this well, a few songs that i would call scientific fundamentalists. i'm not very interested in the evidence about psychic phenomena or about values,
8:43 pm
spiritual practices because it goes against our world view. but the evidence is very strong, spiritual practices and religious practices make people happier, healthier and live longer. ah, there's a patch of water around the try a seal island that's in contention between canada and the united states, you know, where they go for me and i suddenly become optimal for lobster. our population here is exploded. one of the most valuable fisheries that ever existed. suddenly you had me and canadian fishermen in these waters at the same time jousting for position and tensions or high violence is bound to happen. this is the last land border dispute between canada and the united states. it could be magnified to the point where there could be costs that would be significant to hold countries. border
8:44 pm
dispute don't go away. it's assessed or something's going to happen. what a t a b we don't to look back. see the whole world needs to take action and be ready. people are judge, you know. 2 come in crisis, ah, we can do better, we should be better. every one is contributing each in their own way. but we also know that this crisis will not go on forever. the challenge is great, the response has been massive. so many good people are helping us. it makes us feel very proud that we're in it together
8:45 pm
with ah, essentially, there's malware thousands, maybe sometimes millions each day. this pandemic gave again another push for cyber criminals to adapt to the situation. they start targeting the sim cards and the telecom industry. why? because they want to achieve or work out what we call sim swapping. so they will try to get a clone of your sim card to clone your mobile number and then use that on a different phone and then convince the bank or convince whoever is attached to that mobile number and transferring money and conducting a lot of scam bites and major organized crime, they adapted to the situation they use cyber. they use the technology as an
8:46 pm
extension of traditional crime. but we can't ignore how it's evolved over the and in order to discuss how it's evolved, leads to discuss how us as people using digital technologies have evolved as well. everybody is online, we are all sharing information through social media, through messaging apps to all sorts of bad at devices as well. because everyone is digitized, everyone is moving to online banking, our online retail and so on. there's a smartphone, there's a smart tv smart cars, smart homes, you can't live without your smartphone, you can play without technology and internet with it. so even sometimes you would see some impact, the privacy impact secured the impact from certain tools and technology that they use. but people eventually use them because they can't live without them with,
8:47 pm
[000:00:00;00] ah, really years old old la, you know, put them up on the toys near the way. look on. that was so silent. who do? i need to renew it anymore. a brokerage, no one gigabyte label on it, or spend it on my system. my doctor for sleep is woke up probably in a guy which is and they sit so computer. mm. yeah. problem. well, i mean i. so again, i wish i knew precisely what i mean. there's traffic more not possible, said mozilla docile bark while i'm warm up on me. neither of those stores are more,
8:48 pm
more than lucy. build the world stories for the sport or to seek knowledge of british facilities. miss the following up order. re external darkness always watching over. marble shows for us to put it on the schedule. motion that video, nelson nickel. not sure for all. i know the author, i forgot about that is also mused yes. good company, medical law, marlene my media, somebody me on the juice. locals are more emotionally book mission control. no, i stuff. i mean, what christian looks at the internet on the sportage, the web sharesa wardweb shedra 2 or more, la mice. mm mm. connected systems and connected cars, connected buses, even the connected trains and metros they can be had. some of those cases have
8:49 pm
happened to us cities. so we had a san francisco not too long ago, get hit hard by a ransomware, where their entire public transportation system was completely useless. they could not to recover from it. a lot of people trying to use the metro trying to use a train, but they couldn't buy a ticket. those situations happen. they happened in and different types of cities. they haven't happened in dubai, thankfully yet. but it's definitely something that we see a lot of to be honest, i've always been impressed by what that's what i was doing, not just from a car perspective, but how they were picking up on the data. so they now they have so much data and intelligence about autonomous driving. and i think for me, it's part of being in this new world, you know, being into an early adopter of electric vehicles. i wanted to try it. i want to experience
8:50 pm
with we design and build humanoid robots are, i was generate that full size even though i grade was we make ones that look like robots, a plastic metal. but we also make arrange that all human. okay, so lifeline. silicon skin and they look, but there was a move like a human being the thrown behind you. yes. this drone in the future will be used using artificial intelligence. it is
8:51 pm
a taxi service that i think streaming useful thing. do you think my friends are? what are the main threats of what the visual with artificial intelligence has not many main threat. this is due to the 3 have robotics. a robot may not injure a human being true in action, allow a human being to come to hom, a robot monster, bay orders getting to it by human beings. except where such orders would conflict with the law. listening to lift the couch and i'd also like jack, i thought a cock who boys throw me up more look, but i'm not sick. i could blog with something that was a law just be really sticky instrument. can you please? yes. instrument capital as well as similar to what you call us semester. and then we'll watch a movie la. schwartzenegger micron. yeah, that was put on that one more to put when you to a little slow this the show believe if you put awesome. yeah. yes. a 0 my come score. i am, it's a robot to cut
8:52 pm
a near future. my ciocca thought suits it would do. it is it comes to me. it says that, you know, we're far more, he's much double holiest, and we saw the gym or chill america, and switching you were with at reach out to the chem, put on the war storms deal. and there's natal. i'm a could keep this in materiality. some folks with them just to port options, placement with shopping with the bowl. and i have a group of people love, right? want to say they love to the tasks are able to do is to convey messages to talk to you. and the best for them to talk to a person is another person. so instead of just walking in to maybe a reception whole or an app or wherever, if there's a humanoid figure or humanoid presence that then you're going to think i can talk to that. when you want a switcher fietta where you can die school until you know which it's says the might stop soon. there was a christian. yeah, if that. oh, but on this, on the wichita,
8:53 pm
wichita said, be as we cheated on some small group of suicide, 50 to do it when you might joy the preview law. and what they know about hackers are you speaking about ethical hackers on ethical hackers? unethical factors, ethical, indeed, a threat. any machine can be hacked by a technology at the bulk of will construction listed on that will not come forth to adulthood requested a new one. i shit is quoted pretty nice that the world is becoming more digital, but people aren't going to become completely recursive and only stay in and i really use digital like and even over the past, say, 10 years, you can see how people have changed through something simple like small, like 10 years ago, maybe 15 years ago. if you count your salary or anyone that you have a device that can track you out and see where you've gone, see if you've been with see what you thought everyone would go. we can't do that.
8:54 pm
that's, you know, that's completely against everyone's liberty. we don't do that. but now everyone's got their rights in that book. it does exactly that. people have accepted it because our lives are inherently carry with them. the more we allow our lives to be taken over. if you can use that term with digital aspects, with io t, the more open we are to security threats. so it's a bit of a trade off, but it is, i think one that's worth while we continue to battle cybersecurity as best we can. and it's one of those things that i think that trade off pays for itself over and over again. we can't deny that the digital transformation is happening and it's a good thing for humanity. we just have to be careful what technology will come out on. we will all and then one of the things is happening as
8:55 pm
a mini cyber implants. right now i'd be where you're really worried about it. most people would equally be you can't put a chip in my right bob, this is where i'm saying actually that will be accepted in the future. or maybe we will have in classes that will directly today. yeah, i was like, well, in the bush, nicole, daniel roy system will sort of a l. e at the machine on a booth at the deal, but also need a deal on i'm not sure what to do with it. i'm you to wish the one i knew what a lot ma schiller, he's a senior crew sick guy used to i. yes. those are some of the machine. one was a brand new, like no bonus. telegraph minish. i bet that you more than that. that's the problem . when machine, it's a problem with which i could go to some cult oh got it. absolutely . in the future the cyber criminals can use operational inside of the machine
8:56 pm
learning to actually find vulnerabilities in other, other bits of software on the network. so the, the information could definitely be active with all her abilities in the software. and in the same way right now, your computer, it could be hijacked on your search engine to be re directed to a different website, which will give you incorrect information. ah, cities can be had connected cars can be had all the different devices now that are connected to the internet can be hack. ah, we have maybe one against substance going linked
8:57 pm
with me. we are using only a major leg exit or anything with me. degraded to generally very often foundation for secure and happy like a 9. mm ah. as a career professionals, boat is much tougher on some than others. mission with my by
8:58 pm
everybody here. so why would somebody believe me? i was just a little girl to price upgrade to, to, to achieve really was was prior to a read on the paper this morning, usa swimming coach, arrested leslie had sex with a 12 year old girl. this happens almost every week. we get calls at the office. i get informed about one of my greatest fears is someone is gonna start linking all this together is going to be a 60 minute documentary about youth coaches. in sports like gymnastics in swimming, is that documentary? i see it on our tea join me every posted on the alex simon. sure. but i'll be speaking to guess in the world of politics. sport, business. i'm show business. i'll see you then. mm.
8:59 pm
ah, new york, it's really what america is about. ah, when our mayor took our vacation, he was elected because of his campaign on our city, being a tale of 2 cities, the haves and i have not. and those who have not are usually the ones who weren't being buried on hard i. the city is always wanted to forget about hold island. city is wanted to forget about the people who are buried there. wanted to forget about the fact that there is a potter's field that there was a place where difficult stories are hidden. the fact that we're using inmates to maintain this active burial site, where 1000000 souls are buried, where so much of new york city history is buried, is document of the quality that has existed in the city for centuries.
9:00 pm
ah, ah ah weeks told stories on, on tape food and medical supplies run low for thousands of my gordons counts on beller worries in florida trying to get into the you 8 groups to pull the situation desk of correspondent report from the c. have rightly this girl a, with a branch. now she's bleeding and she needs help. but the problem is that there are no medic around, there are no doctors around and really nobody knows what, how to deal with essays, the migrant chaos on poland border is down to western interventions in the middle east. well, it was also denied ear claims for this last minding the crisis. and austria
9:01 pm
analysis is a national lockdown starting monday,

8 Views

info Stream Only

Uploaded by TV Archive on