:00:10. > :00:19.in the next week. It is now time for Click that works
:00:20. > :00:36.
:00:36. > :00:44.luck -- that looks like an Ever get the feeling you are not
:00:44. > :00:47.alone? This week, Click meets the hackers to break into your system
:00:47. > :00:51.with your permission. A after the big video console
:00:51. > :00:55.announcements last week, we check out the smaller alternatives hoping
:00:55. > :00:57.to level the playing field. And we seek out the detective's
:00:57. > :01:02.both -- spotting the Photoshop fakes.
:01:02. > :01:05.All that plus the latest techniques and a network for any parent
:01:05. > :01:15.striving to get the right amount of technology into your children's
:01:15. > :01:21.
:01:21. > :01:25.Welcome to Quit. If you have been hacked... You can go now. Just my
:01:25. > :01:30.personal haka. If you have been hacked, it generally means that
:01:30. > :01:34.someone uninvited is watching your computer's every move. There is
:01:34. > :01:38.another side to hacking, where companies actually invite people to
:01:38. > :01:46.test their differences. It is called penetrance and testing. We
:01:46. > :01:50.have been to stop, and London to -- Stockholm and London to take a
:01:50. > :01:53.closer look at the people being paid to hack.
:01:53. > :01:59.Hacking, often illustrated by anonymous, lingering typing shots
:01:59. > :02:04.like these. Scaremongering stories abound of just how easy it is to
:02:04. > :02:13.tap into your precious information. Hacking doesn't necessarily just
:02:13. > :02:17.mean the bad guys, though. Other hackers try to defend our data. So,
:02:17. > :02:24.what actually happens during the Battle beneath that the weather's
:02:24. > :02:34.trickle surface? I have come to Stockholm to need a company who
:02:34. > :02:38.
:02:38. > :02:48.This is a grand old building, certainly not the place I would
:02:48. > :02:49.
:02:49. > :02:53.expect to find lots of gadgets. Now this is what I imagined an ethical
:02:53. > :02:58.hacking company's headquarters would look like. Welcome to the
:02:58. > :03:03.security operation centre. This company looks out for over 70
:03:03. > :03:06.clients, monitoring the website for potential attacks. Each screen
:03:07. > :03:10.shows different data, from attack rates in the last day or so to a
:03:10. > :03:17.visualised world map where each circle represents the region of a
:03:17. > :03:22.potential attack. Operators handle around 1,700 alerts daily and
:03:22. > :03:27.attempted invasions can come from anyone. You have Brendon kids on
:03:27. > :03:37.the internet. They are not usually skilled, but they will find the
:03:37. > :03:37.
:03:37. > :03:40.most obvious form abilities -- vulnerabilities. Then we will have
:03:41. > :03:45.slightly more experienced people. That is when you cross into
:03:45. > :03:49.hacktivists. They might dislike your company or they will put in
:03:50. > :03:55.more effort to try and make you look bad or still your data. Then
:03:55. > :03:59.we have the category of competitors wanting to steal your data. With
:03:59. > :04:05.all these threats it is to pinning -- tending to think that ethical
:04:05. > :04:12.hacking companies and the monitor and defending sides. There is
:04:12. > :04:15.another side. Organisers ask them to have a go at stealing their data.
:04:15. > :04:21.A lot of companies that compromised from within. You have rogue traders
:04:21. > :04:31.in the bank's. They start trading for and a fake authorisation from
:04:31. > :04:36.their bosses. They are harder to mitigate against because all it
:04:36. > :04:41.takes is a fake e-mail. Working out how attackers might breach a system
:04:41. > :04:46.means penetration testers need to think like the malicious hackers
:04:46. > :04:52.they try to stop. Consequently, they know the tricks of the trade.
:04:52. > :04:57.I asked Bjorn to show me. I found a web for mobility on this side that
:04:57. > :05:01.I can use to inject code into the side. I can add a malicious applet
:05:01. > :05:07.to the site that you can view later on. Do worry, this site has been
:05:07. > :05:13.specially built for the demo. He into some innocent tax on and
:05:13. > :05:23.online forum, but tax am not so innocent code onto the end. It
:05:23. > :05:26.exploits a vulnerability on the side. When his terminal tells him I
:05:26. > :05:31.am there, he can look through my files, turn on the microphone or
:05:31. > :05:37.even at divide the webcam. In short, he can do anything remotely that I
:05:37. > :05:40.can do for my keyboard. You can combat the sort of attack by making
:05:40. > :05:45.sure you are using the latest version of your browser and keep
:05:45. > :05:55.your Java plug-in updated. Of course, running up-to-date anti-
:05:55. > :05:56.
:05:56. > :06:00.Now, you are unlikely to give your PIN number out to just anyone in
:06:00. > :06:05.real life or on the Web, but malicious hackers use something
:06:05. > :06:09.called social engineering to extract our data that way. Testers
:06:09. > :06:13.also use this technique to discover if the company they are
:06:13. > :06:16.investigating is vulnerable to it. I need some help of. I am trying to
:06:16. > :06:21.log into error would nail application and I cannot seem to
:06:21. > :06:26.get this to work. It sounds brutal believable. It works by relying on
:06:26. > :06:29.a very human trade to want to help someone in need. Very often, this
:06:30. > :06:35.persuasive approach is used in conjunction with technology to
:06:35. > :06:39.create an almost irresistible urge to collect. You will probably have
:06:39. > :06:43.received something like this before. An e-mail designed to get you to
:06:44. > :06:48.click on a link and if you do it could compromise your computer's
:06:48. > :06:52.security. It is called a phishing e-mail. To be honest, you'll have
:06:52. > :06:56.your suspicions about quitting this one. Here at Trustwave, a central
:06:56. > :07:03.London company, this man showed me a much subtler phishing technique
:07:03. > :07:07.which works even if you have a fully patch computer. I am used
:07:07. > :07:17.ding -- using software called before. We can track the victim to
:07:17. > :07:18.
:07:18. > :07:25.enter their credentials. Essentially it is the programme
:07:25. > :07:33.that does the social engineering. Fake details go straight to the
:07:33. > :07:37.hacker's desktop. If you're not sure about a short mink, a website
:07:37. > :07:42.link them are like longurl.org can trade -- can tell you where it is
:07:42. > :07:49.headed by extending it for you. Think about having one password for
:07:49. > :07:52.social site and another fort site which access sensitive data. Most
:07:52. > :07:56.people in the industry are keen to point out that attempting and or
:07:56. > :08:01.achieving systems access without permission is generally against the
:08:01. > :08:07.law, but assuming consent has been given, what happens if, and more
:08:07. > :08:13.likely when, testers breach companies' defences? There has been
:08:13. > :08:15.some very surprised people at the other end of the phone. When you
:08:15. > :08:19.were doing a test of the internet, there is sometimes an expectation
:08:19. > :08:24.that he will only get surface deeper. Quite often it is the case
:08:24. > :08:28.that they might be a Web server at the prominent -- promoter. As part
:08:28. > :08:30.of the process we will punch a hole further down into the corporate
:08:30. > :08:34.network by chaining different vulnerabilities and exploits
:08:34. > :08:38.together. Eventually we will find ourselves with the keys to the
:08:38. > :08:44.kingdom. A can a company ever guarantee the security of our data
:08:44. > :08:47.if we can access it in the outside world? Balancing the need to deny
:08:47. > :08:55.impersonators with the genuine users' need for access is where the
:08:55. > :08:58.battle continues. Of course, the main message in all
:08:58. > :09:06.of this is if you're not entirely sure about what you're clicking on,
:09:07. > :09:11.don't click on it. Next up is this week's attack news.
:09:11. > :09:16.Microsoft has made a dramatic U- turn over its decision to impose
:09:16. > :09:21.restrictions on brio and gains on its new Xbox One console. On a not
:09:21. > :09:24.-- in an online statement, the company said the new console will
:09:24. > :09:28.now not need to connect to Microsoft's service for
:09:28. > :09:32.authentication every 24-hour and that physical copies of games,
:09:32. > :09:36.whether they be second-hand or brand new, will play on any a Xbox
:09:36. > :09:40.One if that against this is in the machine's drain. The move comes
:09:40. > :09:43.after Microsoft came under increasing pressure from press and
:09:43. > :09:49.fans concerned about digital rights management.
:09:49. > :09:54.It is time for another world's finessed smartphone. This time from
:09:54. > :09:59.Huawei. The Ascend P6 is just over six millimetres thick. It features
:09:59. > :10:05.a higher resolution than normal five megapixel forward-facing
:10:05. > :10:09.camera. A feature called Instant Beauty support is supposed to
:10:09. > :10:15.reduce wrinkles and blends skin tones to create a more flattering
:10:15. > :10:18.picture. Something that could be achieved with a low-quality camera.
:10:18. > :10:25.Finally, if you are sick of being stuck in traffic on your daily
:10:25. > :10:26.commute, why not take to the sky? Dubbed the Paravelo, this British
:10:26. > :10:31.bike down aircraft works by combining an everyday folding
:10:31. > :10:36.bicycle with a trailer fitted with a very powerful fan and a Paris
:10:36. > :10:41.sale. It is not quite as easy as riding a bike, but the inventor's
:10:41. > :10:46.insisted is in -- it is portable enough to take apart and carrying
:10:46. > :10:55.two and Office. Capable of reaching 4,000 feet at the speed of 25mph it
:10:55. > :11:00.is truly a hair-raising experience. Last week we were at the E3 video
:11:00. > :11:05.games conference in LA, where the source Sony, Microsoft and
:11:05. > :11:08.Nintendo's flooded out in the next generation console war. -- Nintendo
:11:08. > :11:14.are slugging it out. These days the battle lines are not as clear as
:11:14. > :11:18.they used to be because there are other contenders to be gaining
:11:18. > :11:25.ground. Welcome to the new playing-field in
:11:25. > :11:28.gaming. This, for example, is a $99 Android Micra console. It is
:11:28. > :11:33.designed to get you playing smartphone like games in your
:11:33. > :11:36.living room. The logic is simple - take on the likes of Sony,
:11:36. > :11:39.Microsoft and Nintendo by luring into the home of the fast
:11:40. > :11:46.multiplying new breed of game as, once weaned on far cheaper, but of
:11:46. > :11:50.the compelling titles. The big question, will enough cash will
:11:50. > :11:58.gain this want to play the more basic fodder on their 42 inch
:11:58. > :12:02.television? Another salvo on the interview --
:12:02. > :12:05.living room is the PC in a box brigade. It will sit in your living
:12:05. > :12:10.room and walked up to the big screen. Due for launch later this
:12:10. > :12:16.year, they will be running high- spec PC games. They are potentially
:12:16. > :12:22.easily upgrade double. -- upgrade doubled.
:12:22. > :12:27.There are even devices that can combine both of those ideas. This
:12:27. > :12:30.is a consort with two main purposes. The first is to act as a gaming
:12:30. > :12:36.system on a controller. It is a five inch high-definition screen.
:12:36. > :12:43.At the moment it is running Android. You have access to all of your
:12:43. > :12:47.normal applications, but a quick press a button and it takes you to
:12:47. > :12:53.its core purpose, which is to play games. Gaming is what this device
:12:53. > :12:55.is all about. It is being powered underneath the controller by a big
:12:55. > :12:59.graphics processor which has been specifically optimised for gaming
:12:59. > :13:03.in a way that your normal smartphone or tablet simply
:13:03. > :13:08.wouldn't be. And you get details like lighting and shadows, which
:13:08. > :13:15.make for a visually richer experience. Its other purpose in
:13:15. > :13:18.life is to stream games directly from your PC. The company has
:13:18. > :13:22.traditionally made hardware that lie in a computer. What if you want
:13:22. > :13:27.to onto the yourself from that and play those games in a different
:13:27. > :13:31.room? Over wi-fi you can simply string those games using the
:13:31. > :13:34.graphical grant of your PC onto the screen here. If you are in your
:13:34. > :13:38.living room you can stream directly out of here on to your flat-screen
:13:39. > :13:42.TV. The biggest feature about this kind of device is that it is truly
:13:42. > :13:50.portable. You have an entry experience on the bus and train
:13:50. > :13:54.which isn't just on your smart find. $350, it is not cheap. It is more
:13:54. > :14:01.expect -- more expensive than the PlayStation data, but gains will be
:14:01. > :14:05.a lot cheaper. Maybe from $1 upwards. One thing is clear, this
:14:05. > :14:15.is just the first in a new breed of devices that will help create a
:14:15. > :14:19.
:14:19. > :14:29.much richer, more varied landscape Do you think the hybrid model will
:14:29. > :14:29.
:14:29. > :14:34.appeal? Let us know. Week still place incredible faith
:14:34. > :14:40.in photographs to prove that what we say happens happens. The irony
:14:40. > :14:44.being that it has never been easier to Dr an image digitally. But
:14:44. > :14:49.technology has a habit of catching up with even the most audacious
:14:49. > :14:59.tricksters. We have been meeting those who investigate whether
:14:59. > :15:03.photographs are a fact or fiction. On show in Geneva, the false Fakes
:15:03. > :15:07.Exhibition of photographs that are not what they seem. They Michael
:15:07. > :15:17.Clarke documents of our time, but they are staged, manipulated,
:15:17. > :15:21.doctored. If I told to the camera does not quite, I would be fibbing.
:15:21. > :15:27.With all this photograph of bakery going on, you would think by now we
:15:28. > :15:37.would be able to tell the difference. The problem is, we are
:15:38. > :15:44.
:15:44. > :15:48.being played. We cannot tell the difference. TRANSLATION: I asked
:15:48. > :15:52.for so hop from one of the exhibition curators. He suggested
:15:52. > :16:01.that if someone is spent on deceiving us, they will probably
:16:01. > :16:06.succeed. TRANSLATION: What is complicated is when a big company
:16:06. > :16:16.sets out to manipulate us. They employ complicated strategies that
:16:16. > :16:22.are hard for us to fix, even if we are educated. We might expect
:16:22. > :16:26.images in a gallery to be manipulated. But with programmes,
:16:26. > :16:34.anyone can distort reality. Much to the dismay of insurance companies
:16:34. > :16:42.dealing with claims based on photographic evidence. So what can
:16:42. > :16:47.you do? You can go to certain companies in the US to -- for
:16:47. > :16:52.Europe. They can tell if an image has been tampered with or
:16:52. > :16:58.completely transformed. We have a number of mathematical and
:16:58. > :17:07.computational methods which analyse pixel values in digital photographs
:17:07. > :17:11.or videos. We can search for some kind of inconsistency in them. This
:17:11. > :17:18.way, we're able to highlight if some part of the photograph or a
:17:18. > :17:24.video has been tampered with. us say you wanted to change a birth
:17:24. > :17:29.certificate. The most famous is the US President. Recently sent out by
:17:29. > :17:32.the White House to stop the controversy. It is easy enough to
:17:32. > :17:41.alter ripped so the President appears to have been born in
:17:41. > :17:48.Nairobi. But this highlights the dodgy area. This is the original
:17:48. > :17:57.one and this is the photograph. software examines the data and
:17:57. > :18:07.shows a week compression of the original. There are some periodic
:18:07. > :18:07.
:18:07. > :18:13.artifacts, some holes. Doctoring photographs has a long and glorious
:18:13. > :18:17.history. Here are some from the archives. You know what it is like
:18:17. > :18:27.to invite to her friends and which some of them have not turned up. He
:18:27. > :18:31.is Chairman Mao and his diminishing entourage, Mussolini looking more
:18:31. > :18:41.heroic and more recently, Nicholas Sarkozy doing away with his muffin
:18:41. > :18:45.
:18:45. > :18:49.top. This is real, isn't it? Here are internet parodies of Iran's
:18:49. > :18:55.missile launch. It is a growing field, with applications for
:18:55. > :19:04.anybody who needs to know if an image is true. Cameras can lie, but
:19:04. > :19:09.now there is a lie detector. The false Fakes Exhibition is on
:19:09. > :19:14.back to Geneva's Centre of photography until 28th July.
:19:14. > :19:22.According to a recent survey, children start using the internet
:19:22. > :19:26.on average at the age of three. As the parents of a three-year old, I
:19:26. > :19:31.find that truly terrifying. If you are in a similar situation, you
:19:31. > :19:38.need to check out a social network dedicated to parenting in the
:19:38. > :19:43.digital age. It cannot be easy being a parents
:19:43. > :19:50.in a world where everything seems to be connected to the internet and
:19:50. > :19:54.needs charging up overnight. You're a kid's batteries never run out.
:19:54. > :19:58.Curious parents can get some support at a new social platform
:19:58. > :20:08.where you can talk to experts and other concerned parents about the
:20:08. > :20:09.
:20:09. > :20:13.risks and opportunities presented by technology today. I get sent a
:20:13. > :20:18.lot of new and amazing social platforms to consider for review.
:20:18. > :20:23.Most of which offered nothing new and are not particularly amazing.
:20:23. > :20:31.If you want it to succeed, it has to have something different.
:20:31. > :20:38.Otherwise, what is the point? For me, this one has hit the nail on
:20:38. > :20:47.the head with its focus on parenting in the digital age.
:20:47. > :20:54.Clipping tools are an essential part of an organised online life.
:20:54. > :21:02.This might be interesting to people, it is a dedicated food application.
:21:02. > :21:05.It lets you explore a feast of delicious content. If you have ever
:21:05. > :21:09.found yourself at a random restaurant that happens to serve
:21:09. > :21:16.the best spicy chicken wings you have ever tasted, but cannot
:21:16. > :21:26.remember where it was, this is for you. Take a picture, use the
:21:26. > :21:32.
:21:32. > :21:36.location had end when you're in the Lots of people share their
:21:36. > :21:41.photographs online. But are you giving away the rights your
:21:41. > :21:47.creativity. Make sure you're i P his coverage and earn some extra
:21:47. > :21:51.cash by putting your images on this website. A new co-operative.
:21:51. > :21:56.Photography, where people can buy and sell high-quality images they
:21:56. > :22:01.nicely presented market place. The problem with this kind of website
:22:01. > :22:08.is that they are usually pretty stingy. We have looked at some in
:22:08. > :22:13.the past. Not so with this one. If your photograph is sold, you get
:22:13. > :22:19.50% of the standard licence-fee and the extended licences for 100% to
:22:19. > :22:23.the photographer. Not only that, registered artists get a share with
:22:24. > :22:29.the company profits. It is a trickle whopper to. Your work is
:22:29. > :22:39.going to have to be of the pretty high standard to get listed. But
:22:39. > :22:45.
:22:45. > :22:49.you never know until you try. -- it is a true co-operative.
:22:49. > :22:52.Dave Prins new music discovery application launched this week that
:22:52. > :23:02.last year which are friends or those you follow are listening to
:23:02. > :23:02.
:23:03. > :23:06.right now. It is free for iPhone an Road. You can also set the data for
:23:06. > :23:16.the local area. Assuming you are connected to people with good taste,
:23:16. > :23:19.
:23:19. > :23:23.this could be the new revolution in music discovery.
:23:23. > :23:27.Wimbledon 2013 starts on Monday. BBC Sport will be acing the digital
:23:27. > :23:33.coverage this year with the most comprehensive line-up of life and
:23:33. > :23:37.on-demand content. Up to 10 streams will be served through the Web,
:23:37. > :23:42.connected televisions, tablets, a new mobile site and connected
:23:42. > :23:51.applications. You could never miss another ball. Sadly, we cannot
:23:51. > :23:59.guarantee Andy Murray will make the final.
:23:59. > :24:04.Thank you. If you would like to suggest a website for future
:24:04. > :24:09.application, please e-mail us. You'll also find us on Twitter and