22/06/2013

Download Subtitles

Transcript

:00:10. > :00:19.in the next week. It is now time for Click that works

:00:20. > :00:36.

:00:36. > :00:44.luck -- that looks like an Ever get the feeling you are not

:00:44. > :00:47.alone? This week, Click meets the hackers to break into your system

:00:47. > :00:51.with your permission. A after the big video console

:00:51. > :00:55.announcements last week, we check out the smaller alternatives hoping

:00:55. > :00:57.to level the playing field. And we seek out the detective's

:00:57. > :01:02.both -- spotting the Photoshop fakes.

:01:02. > :01:05.All that plus the latest techniques and a network for any parent

:01:05. > :01:15.striving to get the right amount of technology into your children's

:01:15. > :01:21.

:01:21. > :01:25.Welcome to Quit. If you have been hacked... You can go now. Just my

:01:25. > :01:30.personal haka. If you have been hacked, it generally means that

:01:30. > :01:34.someone uninvited is watching your computer's every move. There is

:01:34. > :01:38.another side to hacking, where companies actually invite people to

:01:38. > :01:46.test their differences. It is called penetrance and testing. We

:01:46. > :01:50.have been to stop, and London to -- Stockholm and London to take a

:01:50. > :01:53.closer look at the people being paid to hack.

:01:53. > :01:59.Hacking, often illustrated by anonymous, lingering typing shots

:01:59. > :02:04.like these. Scaremongering stories abound of just how easy it is to

:02:04. > :02:13.tap into your precious information. Hacking doesn't necessarily just

:02:13. > :02:17.mean the bad guys, though. Other hackers try to defend our data. So,

:02:17. > :02:24.what actually happens during the Battle beneath that the weather's

:02:24. > :02:34.trickle surface? I have come to Stockholm to need a company who

:02:34. > :02:38.

:02:38. > :02:48.This is a grand old building, certainly not the place I would

:02:48. > :02:49.

:02:49. > :02:53.expect to find lots of gadgets. Now this is what I imagined an ethical

:02:53. > :02:58.hacking company's headquarters would look like. Welcome to the

:02:58. > :03:03.security operation centre. This company looks out for over 70

:03:03. > :03:06.clients, monitoring the website for potential attacks. Each screen

:03:07. > :03:10.shows different data, from attack rates in the last day or so to a

:03:10. > :03:17.visualised world map where each circle represents the region of a

:03:17. > :03:22.potential attack. Operators handle around 1,700 alerts daily and

:03:22. > :03:27.attempted invasions can come from anyone. You have Brendon kids on

:03:27. > :03:37.the internet. They are not usually skilled, but they will find the

:03:37. > :03:37.

:03:37. > :03:40.most obvious form abilities -- vulnerabilities. Then we will have

:03:41. > :03:45.slightly more experienced people. That is when you cross into

:03:45. > :03:49.hacktivists. They might dislike your company or they will put in

:03:50. > :03:55.more effort to try and make you look bad or still your data. Then

:03:55. > :03:59.we have the category of competitors wanting to steal your data. With

:03:59. > :04:05.all these threats it is to pinning -- tending to think that ethical

:04:05. > :04:12.hacking companies and the monitor and defending sides. There is

:04:12. > :04:15.another side. Organisers ask them to have a go at stealing their data.

:04:15. > :04:21.A lot of companies that compromised from within. You have rogue traders

:04:21. > :04:31.in the bank's. They start trading for and a fake authorisation from

:04:31. > :04:36.their bosses. They are harder to mitigate against because all it

:04:36. > :04:41.takes is a fake e-mail. Working out how attackers might breach a system

:04:41. > :04:46.means penetration testers need to think like the malicious hackers

:04:46. > :04:52.they try to stop. Consequently, they know the tricks of the trade.

:04:52. > :04:57.I asked Bjorn to show me. I found a web for mobility on this side that

:04:57. > :05:01.I can use to inject code into the side. I can add a malicious applet

:05:01. > :05:07.to the site that you can view later on. Do worry, this site has been

:05:07. > :05:13.specially built for the demo. He into some innocent tax on and

:05:13. > :05:23.online forum, but tax am not so innocent code onto the end. It

:05:23. > :05:26.exploits a vulnerability on the side. When his terminal tells him I

:05:26. > :05:31.am there, he can look through my files, turn on the microphone or

:05:31. > :05:37.even at divide the webcam. In short, he can do anything remotely that I

:05:37. > :05:40.can do for my keyboard. You can combat the sort of attack by making

:05:40. > :05:45.sure you are using the latest version of your browser and keep

:05:45. > :05:55.your Java plug-in updated. Of course, running up-to-date anti-

:05:55. > :05:56.

:05:56. > :06:00.Now, you are unlikely to give your PIN number out to just anyone in

:06:00. > :06:05.real life or on the Web, but malicious hackers use something

:06:05. > :06:09.called social engineering to extract our data that way. Testers

:06:09. > :06:13.also use this technique to discover if the company they are

:06:13. > :06:16.investigating is vulnerable to it. I need some help of. I am trying to

:06:16. > :06:21.log into error would nail application and I cannot seem to

:06:21. > :06:26.get this to work. It sounds brutal believable. It works by relying on

:06:26. > :06:29.a very human trade to want to help someone in need. Very often, this

:06:30. > :06:35.persuasive approach is used in conjunction with technology to

:06:35. > :06:39.create an almost irresistible urge to collect. You will probably have

:06:39. > :06:43.received something like this before. An e-mail designed to get you to

:06:44. > :06:48.click on a link and if you do it could compromise your computer's

:06:48. > :06:52.security. It is called a phishing e-mail. To be honest, you'll have

:06:52. > :06:56.your suspicions about quitting this one. Here at Trustwave, a central

:06:56. > :07:03.London company, this man showed me a much subtler phishing technique

:07:03. > :07:07.which works even if you have a fully patch computer. I am used

:07:07. > :07:17.ding -- using software called before. We can track the victim to

:07:17. > :07:18.

:07:18. > :07:25.enter their credentials. Essentially it is the programme

:07:25. > :07:33.that does the social engineering. Fake details go straight to the

:07:33. > :07:37.hacker's desktop. If you're not sure about a short mink, a website

:07:37. > :07:42.link them are like longurl.org can trade -- can tell you where it is

:07:42. > :07:49.headed by extending it for you. Think about having one password for

:07:49. > :07:52.social site and another fort site which access sensitive data. Most

:07:52. > :07:56.people in the industry are keen to point out that attempting and or

:07:56. > :08:01.achieving systems access without permission is generally against the

:08:01. > :08:07.law, but assuming consent has been given, what happens if, and more

:08:07. > :08:13.likely when, testers breach companies' defences? There has been

:08:13. > :08:15.some very surprised people at the other end of the phone. When you

:08:15. > :08:19.were doing a test of the internet, there is sometimes an expectation

:08:19. > :08:24.that he will only get surface deeper. Quite often it is the case

:08:24. > :08:28.that they might be a Web server at the prominent -- promoter. As part

:08:28. > :08:30.of the process we will punch a hole further down into the corporate

:08:30. > :08:34.network by chaining different vulnerabilities and exploits

:08:34. > :08:38.together. Eventually we will find ourselves with the keys to the

:08:38. > :08:44.kingdom. A can a company ever guarantee the security of our data

:08:44. > :08:47.if we can access it in the outside world? Balancing the need to deny

:08:47. > :08:55.impersonators with the genuine users' need for access is where the

:08:55. > :08:58.battle continues. Of course, the main message in all

:08:58. > :09:06.of this is if you're not entirely sure about what you're clicking on,

:09:07. > :09:11.don't click on it. Next up is this week's attack news.

:09:11. > :09:16.Microsoft has made a dramatic U- turn over its decision to impose

:09:16. > :09:21.restrictions on brio and gains on its new Xbox One console. On a not

:09:21. > :09:24.-- in an online statement, the company said the new console will

:09:24. > :09:28.now not need to connect to Microsoft's service for

:09:28. > :09:32.authentication every 24-hour and that physical copies of games,

:09:32. > :09:36.whether they be second-hand or brand new, will play on any a Xbox

:09:36. > :09:40.One if that against this is in the machine's drain. The move comes

:09:40. > :09:43.after Microsoft came under increasing pressure from press and

:09:43. > :09:49.fans concerned about digital rights management.

:09:49. > :09:54.It is time for another world's finessed smartphone. This time from

:09:54. > :09:59.Huawei. The Ascend P6 is just over six millimetres thick. It features

:09:59. > :10:05.a higher resolution than normal five megapixel forward-facing

:10:05. > :10:09.camera. A feature called Instant Beauty support is supposed to

:10:09. > :10:15.reduce wrinkles and blends skin tones to create a more flattering

:10:15. > :10:18.picture. Something that could be achieved with a low-quality camera.

:10:18. > :10:25.Finally, if you are sick of being stuck in traffic on your daily

:10:25. > :10:26.commute, why not take to the sky? Dubbed the Paravelo, this British

:10:26. > :10:31.bike down aircraft works by combining an everyday folding

:10:31. > :10:36.bicycle with a trailer fitted with a very powerful fan and a Paris

:10:36. > :10:41.sale. It is not quite as easy as riding a bike, but the inventor's

:10:41. > :10:46.insisted is in -- it is portable enough to take apart and carrying

:10:46. > :10:55.two and Office. Capable of reaching 4,000 feet at the speed of 25mph it

:10:55. > :11:00.is truly a hair-raising experience. Last week we were at the E3 video

:11:00. > :11:05.games conference in LA, where the source Sony, Microsoft and

:11:05. > :11:08.Nintendo's flooded out in the next generation console war. -- Nintendo

:11:08. > :11:14.are slugging it out. These days the battle lines are not as clear as

:11:14. > :11:18.they used to be because there are other contenders to be gaining

:11:18. > :11:25.ground. Welcome to the new playing-field in

:11:25. > :11:28.gaming. This, for example, is a $99 Android Micra console. It is

:11:28. > :11:33.designed to get you playing smartphone like games in your

:11:33. > :11:36.living room. The logic is simple - take on the likes of Sony,

:11:36. > :11:39.Microsoft and Nintendo by luring into the home of the fast

:11:40. > :11:46.multiplying new breed of game as, once weaned on far cheaper, but of

:11:46. > :11:50.the compelling titles. The big question, will enough cash will

:11:50. > :11:58.gain this want to play the more basic fodder on their 42 inch

:11:58. > :12:02.television? Another salvo on the interview --

:12:02. > :12:05.living room is the PC in a box brigade. It will sit in your living

:12:05. > :12:10.room and walked up to the big screen. Due for launch later this

:12:10. > :12:16.year, they will be running high- spec PC games. They are potentially

:12:16. > :12:22.easily upgrade double. -- upgrade doubled.

:12:22. > :12:27.There are even devices that can combine both of those ideas. This

:12:27. > :12:30.is a consort with two main purposes. The first is to act as a gaming

:12:30. > :12:36.system on a controller. It is a five inch high-definition screen.

:12:36. > :12:43.At the moment it is running Android. You have access to all of your

:12:43. > :12:47.normal applications, but a quick press a button and it takes you to

:12:47. > :12:53.its core purpose, which is to play games. Gaming is what this device

:12:53. > :12:55.is all about. It is being powered underneath the controller by a big

:12:55. > :12:59.graphics processor which has been specifically optimised for gaming

:12:59. > :13:03.in a way that your normal smartphone or tablet simply

:13:03. > :13:08.wouldn't be. And you get details like lighting and shadows, which

:13:08. > :13:15.make for a visually richer experience. Its other purpose in

:13:15. > :13:18.life is to stream games directly from your PC. The company has

:13:18. > :13:22.traditionally made hardware that lie in a computer. What if you want

:13:22. > :13:27.to onto the yourself from that and play those games in a different

:13:27. > :13:31.room? Over wi-fi you can simply string those games using the

:13:31. > :13:34.graphical grant of your PC onto the screen here. If you are in your

:13:34. > :13:38.living room you can stream directly out of here on to your flat-screen

:13:39. > :13:42.TV. The biggest feature about this kind of device is that it is truly

:13:42. > :13:50.portable. You have an entry experience on the bus and train

:13:50. > :13:54.which isn't just on your smart find. $350, it is not cheap. It is more

:13:54. > :14:01.expect -- more expensive than the PlayStation data, but gains will be

:14:01. > :14:05.a lot cheaper. Maybe from $1 upwards. One thing is clear, this

:14:05. > :14:15.is just the first in a new breed of devices that will help create a

:14:15. > :14:19.

:14:19. > :14:29.much richer, more varied landscape Do you think the hybrid model will

:14:29. > :14:29.

:14:29. > :14:34.appeal? Let us know. Week still place incredible faith

:14:34. > :14:40.in photographs to prove that what we say happens happens. The irony

:14:40. > :14:44.being that it has never been easier to Dr an image digitally. But

:14:44. > :14:49.technology has a habit of catching up with even the most audacious

:14:49. > :14:59.tricksters. We have been meeting those who investigate whether

:14:59. > :15:03.photographs are a fact or fiction. On show in Geneva, the false Fakes

:15:03. > :15:07.Exhibition of photographs that are not what they seem. They Michael

:15:07. > :15:17.Clarke documents of our time, but they are staged, manipulated,

:15:17. > :15:21.doctored. If I told to the camera does not quite, I would be fibbing.

:15:21. > :15:27.With all this photograph of bakery going on, you would think by now we

:15:28. > :15:37.would be able to tell the difference. The problem is, we are

:15:38. > :15:44.

:15:44. > :15:48.being played. We cannot tell the difference. TRANSLATION: I asked

:15:48. > :15:52.for so hop from one of the exhibition curators. He suggested

:15:52. > :16:01.that if someone is spent on deceiving us, they will probably

:16:01. > :16:06.succeed. TRANSLATION: What is complicated is when a big company

:16:06. > :16:16.sets out to manipulate us. They employ complicated strategies that

:16:16. > :16:22.are hard for us to fix, even if we are educated. We might expect

:16:22. > :16:26.images in a gallery to be manipulated. But with programmes,

:16:26. > :16:34.anyone can distort reality. Much to the dismay of insurance companies

:16:34. > :16:42.dealing with claims based on photographic evidence. So what can

:16:42. > :16:47.you do? You can go to certain companies in the US to -- for

:16:47. > :16:52.Europe. They can tell if an image has been tampered with or

:16:52. > :16:58.completely transformed. We have a number of mathematical and

:16:58. > :17:07.computational methods which analyse pixel values in digital photographs

:17:07. > :17:11.or videos. We can search for some kind of inconsistency in them. This

:17:11. > :17:18.way, we're able to highlight if some part of the photograph or a

:17:18. > :17:24.video has been tampered with. us say you wanted to change a birth

:17:24. > :17:29.certificate. The most famous is the US President. Recently sent out by

:17:29. > :17:32.the White House to stop the controversy. It is easy enough to

:17:32. > :17:41.alter ripped so the President appears to have been born in

:17:41. > :17:48.Nairobi. But this highlights the dodgy area. This is the original

:17:48. > :17:57.one and this is the photograph. software examines the data and

:17:57. > :18:07.shows a week compression of the original. There are some periodic

:18:07. > :18:07.

:18:07. > :18:13.artifacts, some holes. Doctoring photographs has a long and glorious

:18:13. > :18:17.history. Here are some from the archives. You know what it is like

:18:17. > :18:27.to invite to her friends and which some of them have not turned up. He

:18:27. > :18:31.is Chairman Mao and his diminishing entourage, Mussolini looking more

:18:31. > :18:41.heroic and more recently, Nicholas Sarkozy doing away with his muffin

:18:41. > :18:45.

:18:45. > :18:49.top. This is real, isn't it? Here are internet parodies of Iran's

:18:49. > :18:55.missile launch. It is a growing field, with applications for

:18:55. > :19:04.anybody who needs to know if an image is true. Cameras can lie, but

:19:04. > :19:09.now there is a lie detector. The false Fakes Exhibition is on

:19:09. > :19:14.back to Geneva's Centre of photography until 28th July.

:19:14. > :19:22.According to a recent survey, children start using the internet

:19:22. > :19:26.on average at the age of three. As the parents of a three-year old, I

:19:26. > :19:31.find that truly terrifying. If you are in a similar situation, you

:19:31. > :19:38.need to check out a social network dedicated to parenting in the

:19:38. > :19:43.digital age. It cannot be easy being a parents

:19:43. > :19:50.in a world where everything seems to be connected to the internet and

:19:50. > :19:54.needs charging up overnight. You're a kid's batteries never run out.

:19:54. > :19:58.Curious parents can get some support at a new social platform

:19:58. > :20:08.where you can talk to experts and other concerned parents about the

:20:08. > :20:09.

:20:09. > :20:13.risks and opportunities presented by technology today. I get sent a

:20:13. > :20:18.lot of new and amazing social platforms to consider for review.

:20:18. > :20:23.Most of which offered nothing new and are not particularly amazing.

:20:23. > :20:31.If you want it to succeed, it has to have something different.

:20:31. > :20:38.Otherwise, what is the point? For me, this one has hit the nail on

:20:38. > :20:47.the head with its focus on parenting in the digital age.

:20:47. > :20:54.Clipping tools are an essential part of an organised online life.

:20:54. > :21:02.This might be interesting to people, it is a dedicated food application.

:21:02. > :21:05.It lets you explore a feast of delicious content. If you have ever

:21:05. > :21:09.found yourself at a random restaurant that happens to serve

:21:09. > :21:16.the best spicy chicken wings you have ever tasted, but cannot

:21:16. > :21:26.remember where it was, this is for you. Take a picture, use the

:21:26. > :21:32.

:21:32. > :21:36.location had end when you're in the Lots of people share their

:21:36. > :21:41.photographs online. But are you giving away the rights your

:21:41. > :21:47.creativity. Make sure you're i P his coverage and earn some extra

:21:47. > :21:51.cash by putting your images on this website. A new co-operative.

:21:51. > :21:56.Photography, where people can buy and sell high-quality images they

:21:56. > :22:01.nicely presented market place. The problem with this kind of website

:22:01. > :22:08.is that they are usually pretty stingy. We have looked at some in

:22:08. > :22:13.the past. Not so with this one. If your photograph is sold, you get

:22:13. > :22:19.50% of the standard licence-fee and the extended licences for 100% to

:22:19. > :22:23.the photographer. Not only that, registered artists get a share with

:22:24. > :22:29.the company profits. It is a trickle whopper to. Your work is

:22:29. > :22:39.going to have to be of the pretty high standard to get listed. But

:22:39. > :22:45.

:22:45. > :22:49.you never know until you try. -- it is a true co-operative.

:22:49. > :22:52.Dave Prins new music discovery application launched this week that

:22:52. > :23:02.last year which are friends or those you follow are listening to

:23:02. > :23:02.

:23:03. > :23:06.right now. It is free for iPhone an Road. You can also set the data for

:23:06. > :23:16.the local area. Assuming you are connected to people with good taste,

:23:16. > :23:19.

:23:19. > :23:23.this could be the new revolution in music discovery.

:23:23. > :23:27.Wimbledon 2013 starts on Monday. BBC Sport will be acing the digital

:23:27. > :23:33.coverage this year with the most comprehensive line-up of life and

:23:33. > :23:37.on-demand content. Up to 10 streams will be served through the Web,

:23:37. > :23:42.connected televisions, tablets, a new mobile site and connected

:23:42. > :23:51.applications. You could never miss another ball. Sadly, we cannot

:23:51. > :23:59.guarantee Andy Murray will make the final.

:23:59. > :24:04.Thank you. If you would like to suggest a website for future

:24:04. > :24:09.application, please e-mail us. You'll also find us on Twitter and