22/06/2013 Click


22/06/2013

Click meets the ethical hackers who break into systems with permission and takes a look at alternative gaming consoles. Includes tech news and web reviews.


Similar Content

Browse content similar to 22/06/2013. Check below for episodes and series from the same categories and more!

Transcript


LineFromTo

in the next week. It is now time for Click that works

:00:10.:00:19.
:00:20.:00:36.

luck -- that looks like an Ever get the feeling you are not

:00:36.:00:44.

alone? This week, Click meets the hackers to break into your system

:00:44.:00:47.

with your permission. A after the big video console

:00:47.:00:51.

announcements last week, we check out the smaller alternatives hoping

:00:51.:00:55.

to level the playing field. And we seek out the detective's

:00:55.:00:57.

both -- spotting the Photoshop fakes.

:00:57.:01:02.

All that plus the latest techniques and a network for any parent

:01:02.:01:05.

striving to get the right amount of technology into your children's

:01:05.:01:15.
:01:15.:01:21.

Welcome to Quit. If you have been hacked... You can go now. Just my

:01:21.:01:25.

personal haka. If you have been hacked, it generally means that

:01:25.:01:30.

someone uninvited is watching your computer's every move. There is

:01:30.:01:34.

another side to hacking, where companies actually invite people to

:01:34.:01:38.

test their differences. It is called penetrance and testing. We

:01:38.:01:46.

have been to stop, and London to -- Stockholm and London to take a

:01:46.:01:50.

closer look at the people being paid to hack.

:01:50.:01:53.

Hacking, often illustrated by anonymous, lingering typing shots

:01:53.:01:59.

like these. Scaremongering stories abound of just how easy it is to

:01:59.:02:04.

tap into your precious information. Hacking doesn't necessarily just

:02:04.:02:13.

mean the bad guys, though. Other hackers try to defend our data. So,

:02:13.:02:17.

what actually happens during the Battle beneath that the weather's

:02:17.:02:24.

trickle surface? I have come to Stockholm to need a company who

:02:24.:02:34.
:02:34.:02:38.

This is a grand old building, certainly not the place I would

:02:38.:02:48.
:02:48.:02:49.

expect to find lots of gadgets. Now this is what I imagined an ethical

:02:49.:02:53.

hacking company's headquarters would look like. Welcome to the

:02:53.:02:58.

security operation centre. This company looks out for over 70

:02:58.:03:03.

clients, monitoring the website for potential attacks. Each screen

:03:03.:03:06.

shows different data, from attack rates in the last day or so to a

:03:07.:03:10.

visualised world map where each circle represents the region of a

:03:10.:03:17.

potential attack. Operators handle around 1,700 alerts daily and

:03:17.:03:22.

attempted invasions can come from anyone. You have Brendon kids on

:03:22.:03:27.

the internet. They are not usually skilled, but they will find the

:03:27.:03:37.
:03:37.:03:37.

most obvious form abilities -- vulnerabilities. Then we will have

:03:37.:03:40.

slightly more experienced people. That is when you cross into

:03:41.:03:45.

hacktivists. They might dislike your company or they will put in

:03:45.:03:49.

more effort to try and make you look bad or still your data. Then

:03:50.:03:55.

we have the category of competitors wanting to steal your data. With

:03:55.:03:59.

all these threats it is to pinning -- tending to think that ethical

:03:59.:04:05.

hacking companies and the monitor and defending sides. There is

:04:05.:04:12.

another side. Organisers ask them to have a go at stealing their data.

:04:12.:04:15.

A lot of companies that compromised from within. You have rogue traders

:04:15.:04:21.

in the bank's. They start trading for and a fake authorisation from

:04:21.:04:31.

their bosses. They are harder to mitigate against because all it

:04:31.:04:36.

takes is a fake e-mail. Working out how attackers might breach a system

:04:36.:04:41.

means penetration testers need to think like the malicious hackers

:04:41.:04:46.

they try to stop. Consequently, they know the tricks of the trade.

:04:46.:04:52.

I asked Bjorn to show me. I found a web for mobility on this side that

:04:52.:04:57.

I can use to inject code into the side. I can add a malicious applet

:04:57.:05:01.

to the site that you can view later on. Do worry, this site has been

:05:01.:05:07.

specially built for the demo. He into some innocent tax on and

:05:07.:05:13.

online forum, but tax am not so innocent code onto the end. It

:05:13.:05:23.

exploits a vulnerability on the side. When his terminal tells him I

:05:23.:05:26.

am there, he can look through my files, turn on the microphone or

:05:26.:05:31.

even at divide the webcam. In short, he can do anything remotely that I

:05:31.:05:37.

can do for my keyboard. You can combat the sort of attack by making

:05:37.:05:40.

sure you are using the latest version of your browser and keep

:05:40.:05:45.

your Java plug-in updated. Of course, running up-to-date anti-

:05:45.:05:55.
:05:55.:05:56.

Now, you are unlikely to give your PIN number out to just anyone in

:05:56.:06:00.

real life or on the Web, but malicious hackers use something

:06:00.:06:05.

called social engineering to extract our data that way. Testers

:06:05.:06:09.

also use this technique to discover if the company they are

:06:09.:06:13.

investigating is vulnerable to it. I need some help of. I am trying to

:06:13.:06:16.

log into error would nail application and I cannot seem to

:06:16.:06:21.

get this to work. It sounds brutal believable. It works by relying on

:06:21.:06:26.

a very human trade to want to help someone in need. Very often, this

:06:26.:06:29.

persuasive approach is used in conjunction with technology to

:06:30.:06:35.

create an almost irresistible urge to collect. You will probably have

:06:35.:06:39.

received something like this before. An e-mail designed to get you to

:06:39.:06:43.

click on a link and if you do it could compromise your computer's

:06:44.:06:48.

security. It is called a phishing e-mail. To be honest, you'll have

:06:48.:06:52.

your suspicions about quitting this one. Here at Trustwave, a central

:06:52.:06:56.

London company, this man showed me a much subtler phishing technique

:06:56.:07:03.

which works even if you have a fully patch computer. I am used

:07:03.:07:07.

ding -- using software called before. We can track the victim to

:07:07.:07:17.
:07:17.:07:18.

enter their credentials. Essentially it is the programme

:07:18.:07:25.

that does the social engineering. Fake details go straight to the

:07:25.:07:33.

hacker's desktop. If you're not sure about a short mink, a website

:07:33.:07:37.

link them are like longurl.org can trade -- can tell you where it is

:07:37.:07:42.

headed by extending it for you. Think about having one password for

:07:42.:07:49.

social site and another fort site which access sensitive data. Most

:07:49.:07:52.

people in the industry are keen to point out that attempting and or

:07:52.:07:56.

achieving systems access without permission is generally against the

:07:56.:08:01.

law, but assuming consent has been given, what happens if, and more

:08:01.:08:07.

likely when, testers breach companies' defences? There has been

:08:07.:08:13.

some very surprised people at the other end of the phone. When you

:08:13.:08:15.

were doing a test of the internet, there is sometimes an expectation

:08:15.:08:19.

that he will only get surface deeper. Quite often it is the case

:08:19.:08:24.

that they might be a Web server at the prominent -- promoter. As part

:08:24.:08:28.

of the process we will punch a hole further down into the corporate

:08:28.:08:30.

network by chaining different vulnerabilities and exploits

:08:30.:08:34.

together. Eventually we will find ourselves with the keys to the

:08:34.:08:38.

kingdom. A can a company ever guarantee the security of our data

:08:38.:08:44.

if we can access it in the outside world? Balancing the need to deny

:08:44.:08:47.

impersonators with the genuine users' need for access is where the

:08:47.:08:55.

battle continues. Of course, the main message in all

:08:55.:08:58.

of this is if you're not entirely sure about what you're clicking on,

:08:58.:09:06.

don't click on it. Next up is this week's attack news.

:09:07.:09:11.

Microsoft has made a dramatic U- turn over its decision to impose

:09:11.:09:16.

restrictions on brio and gains on its new Xbox One console. On a not

:09:16.:09:21.

-- in an online statement, the company said the new console will

:09:21.:09:24.

now not need to connect to Microsoft's service for

:09:24.:09:28.

authentication every 24-hour and that physical copies of games,

:09:28.:09:32.

whether they be second-hand or brand new, will play on any a Xbox

:09:32.:09:36.

One if that against this is in the machine's drain. The move comes

:09:36.:09:40.

after Microsoft came under increasing pressure from press and

:09:40.:09:43.

fans concerned about digital rights management.

:09:43.:09:49.

It is time for another world's finessed smartphone. This time from

:09:49.:09:54.

Huawei. The Ascend P6 is just over six millimetres thick. It features

:09:54.:09:59.

a higher resolution than normal five megapixel forward-facing

:09:59.:10:05.

camera. A feature called Instant Beauty support is supposed to

:10:05.:10:09.

reduce wrinkles and blends skin tones to create a more flattering

:10:09.:10:15.

picture. Something that could be achieved with a low-quality camera.

:10:15.:10:18.

Finally, if you are sick of being stuck in traffic on your daily

:10:18.:10:25.

commute, why not take to the sky? Dubbed the Paravelo, this British

:10:25.:10:26.

bike down aircraft works by combining an everyday folding

:10:26.:10:31.

bicycle with a trailer fitted with a very powerful fan and a Paris

:10:31.:10:36.

sale. It is not quite as easy as riding a bike, but the inventor's

:10:36.:10:41.

insisted is in -- it is portable enough to take apart and carrying

:10:41.:10:46.

two and Office. Capable of reaching 4,000 feet at the speed of 25mph it

:10:46.:10:55.

is truly a hair-raising experience. Last week we were at the E3 video

:10:55.:11:00.

games conference in LA, where the source Sony, Microsoft and

:11:00.:11:05.

Nintendo's flooded out in the next generation console war. -- Nintendo

:11:05.:11:08.

are slugging it out. These days the battle lines are not as clear as

:11:08.:11:14.

they used to be because there are other contenders to be gaining

:11:14.:11:18.

ground. Welcome to the new playing-field in

:11:18.:11:25.

gaming. This, for example, is a $99 Android Micra console. It is

:11:25.:11:28.

designed to get you playing smartphone like games in your

:11:28.:11:33.

living room. The logic is simple - take on the likes of Sony,

:11:33.:11:36.

Microsoft and Nintendo by luring into the home of the fast

:11:36.:11:39.

multiplying new breed of game as, once weaned on far cheaper, but of

:11:40.:11:46.

the compelling titles. The big question, will enough cash will

:11:46.:11:50.

gain this want to play the more basic fodder on their 42 inch

:11:50.:11:58.

television? Another salvo on the interview --

:11:58.:12:02.

living room is the PC in a box brigade. It will sit in your living

:12:02.:12:05.

room and walked up to the big screen. Due for launch later this

:12:05.:12:10.

year, they will be running high- spec PC games. They are potentially

:12:10.:12:16.

easily upgrade double. -- upgrade doubled.

:12:16.:12:22.

There are even devices that can combine both of those ideas. This

:12:22.:12:27.

is a consort with two main purposes. The first is to act as a gaming

:12:27.:12:30.

system on a controller. It is a five inch high-definition screen.

:12:30.:12:36.

At the moment it is running Android. You have access to all of your

:12:36.:12:43.

normal applications, but a quick press a button and it takes you to

:12:43.:12:47.

its core purpose, which is to play games. Gaming is what this device

:12:47.:12:53.

is all about. It is being powered underneath the controller by a big

:12:53.:12:55.

graphics processor which has been specifically optimised for gaming

:12:55.:12:59.

in a way that your normal smartphone or tablet simply

:12:59.:13:03.

wouldn't be. And you get details like lighting and shadows, which

:13:03.:13:08.

make for a visually richer experience. Its other purpose in

:13:08.:13:15.

life is to stream games directly from your PC. The company has

:13:15.:13:18.

traditionally made hardware that lie in a computer. What if you want

:13:18.:13:22.

to onto the yourself from that and play those games in a different

:13:22.:13:27.

room? Over wi-fi you can simply string those games using the

:13:27.:13:31.

graphical grant of your PC onto the screen here. If you are in your

:13:31.:13:34.

living room you can stream directly out of here on to your flat-screen

:13:34.:13:38.

TV. The biggest feature about this kind of device is that it is truly

:13:39.:13:42.

portable. You have an entry experience on the bus and train

:13:42.:13:50.

which isn't just on your smart find. $350, it is not cheap. It is more

:13:50.:13:54.

expect -- more expensive than the PlayStation data, but gains will be

:13:54.:14:01.

a lot cheaper. Maybe from $1 upwards. One thing is clear, this

:14:01.:14:05.

is just the first in a new breed of devices that will help create a

:14:05.:14:15.
:14:15.:14:19.

much richer, more varied landscape Do you think the hybrid model will

:14:19.:14:29.
:14:29.:14:29.

appeal? Let us know. Week still place incredible faith

:14:29.:14:34.

in photographs to prove that what we say happens happens. The irony

:14:34.:14:40.

being that it has never been easier to Dr an image digitally. But

:14:40.:14:44.

technology has a habit of catching up with even the most audacious

:14:44.:14:49.

tricksters. We have been meeting those who investigate whether

:14:49.:14:59.

photographs are a fact or fiction. On show in Geneva, the false Fakes

:14:59.:15:03.

Exhibition of photographs that are not what they seem. They Michael

:15:03.:15:07.

Clarke documents of our time, but they are staged, manipulated,

:15:07.:15:17.

doctored. If I told to the camera does not quite, I would be fibbing.

:15:17.:15:21.

With all this photograph of bakery going on, you would think by now we

:15:21.:15:27.

would be able to tell the difference. The problem is, we are

:15:28.:15:37.
:15:38.:15:44.

being played. We cannot tell the difference. TRANSLATION: I asked

:15:44.:15:48.

for so hop from one of the exhibition curators. He suggested

:15:48.:15:52.

that if someone is spent on deceiving us, they will probably

:15:52.:16:01.

succeed. TRANSLATION: What is complicated is when a big company

:16:01.:16:06.

sets out to manipulate us. They employ complicated strategies that

:16:06.:16:16.

are hard for us to fix, even if we are educated. We might expect

:16:16.:16:22.

images in a gallery to be manipulated. But with programmes,

:16:22.:16:26.

anyone can distort reality. Much to the dismay of insurance companies

:16:26.:16:34.

dealing with claims based on photographic evidence. So what can

:16:34.:16:42.

you do? You can go to certain companies in the US to -- for

:16:42.:16:47.

Europe. They can tell if an image has been tampered with or

:16:47.:16:52.

completely transformed. We have a number of mathematical and

:16:52.:16:58.

computational methods which analyse pixel values in digital photographs

:16:58.:17:07.

or videos. We can search for some kind of inconsistency in them. This

:17:07.:17:11.

way, we're able to highlight if some part of the photograph or a

:17:11.:17:18.

video has been tampered with. us say you wanted to change a birth

:17:18.:17:24.

certificate. The most famous is the US President. Recently sent out by

:17:24.:17:29.

the White House to stop the controversy. It is easy enough to

:17:29.:17:32.

alter ripped so the President appears to have been born in

:17:32.:17:41.

Nairobi. But this highlights the dodgy area. This is the original

:17:41.:17:48.

one and this is the photograph. software examines the data and

:17:48.:17:57.

shows a week compression of the original. There are some periodic

:17:57.:18:07.
:18:07.:18:07.

artifacts, some holes. Doctoring photographs has a long and glorious

:18:07.:18:13.

history. Here are some from the archives. You know what it is like

:18:13.:18:17.

to invite to her friends and which some of them have not turned up. He

:18:17.:18:27.

is Chairman Mao and his diminishing entourage, Mussolini looking more

:18:27.:18:31.

heroic and more recently, Nicholas Sarkozy doing away with his muffin

:18:31.:18:41.
:18:41.:18:45.

top. This is real, isn't it? Here are internet parodies of Iran's

:18:45.:18:49.

missile launch. It is a growing field, with applications for

:18:49.:18:55.

anybody who needs to know if an image is true. Cameras can lie, but

:18:55.:19:04.

now there is a lie detector. The false Fakes Exhibition is on

:19:04.:19:09.

back to Geneva's Centre of photography until 28th July.

:19:09.:19:14.

According to a recent survey, children start using the internet

:19:14.:19:22.

on average at the age of three. As the parents of a three-year old, I

:19:22.:19:26.

find that truly terrifying. If you are in a similar situation, you

:19:26.:19:31.

need to check out a social network dedicated to parenting in the

:19:31.:19:38.

digital age. It cannot be easy being a parents

:19:38.:19:43.

in a world where everything seems to be connected to the internet and

:19:43.:19:50.

needs charging up overnight. You're a kid's batteries never run out.

:19:50.:19:54.

Curious parents can get some support at a new social platform

:19:54.:19:58.

where you can talk to experts and other concerned parents about the

:19:58.:20:08.
:20:08.:20:09.

risks and opportunities presented by technology today. I get sent a

:20:09.:20:13.

lot of new and amazing social platforms to consider for review.

:20:13.:20:18.

Most of which offered nothing new and are not particularly amazing.

:20:18.:20:23.

If you want it to succeed, it has to have something different.

:20:23.:20:31.

Otherwise, what is the point? For me, this one has hit the nail on

:20:31.:20:38.

the head with its focus on parenting in the digital age.

:20:38.:20:47.

Clipping tools are an essential part of an organised online life.

:20:47.:20:54.

This might be interesting to people, it is a dedicated food application.

:20:54.:21:02.

It lets you explore a feast of delicious content. If you have ever

:21:02.:21:05.

found yourself at a random restaurant that happens to serve

:21:05.:21:09.

the best spicy chicken wings you have ever tasted, but cannot

:21:09.:21:16.

remember where it was, this is for you. Take a picture, use the

:21:16.:21:26.
:21:26.:21:32.

location had end when you're in the Lots of people share their

:21:32.:21:36.

photographs online. But are you giving away the rights your

:21:36.:21:41.

creativity. Make sure you're i P his coverage and earn some extra

:21:41.:21:47.

cash by putting your images on this website. A new co-operative.

:21:47.:21:51.

Photography, where people can buy and sell high-quality images they

:21:51.:21:56.

nicely presented market place. The problem with this kind of website

:21:56.:22:01.

is that they are usually pretty stingy. We have looked at some in

:22:01.:22:08.

the past. Not so with this one. If your photograph is sold, you get

:22:08.:22:13.

50% of the standard licence-fee and the extended licences for 100% to

:22:13.:22:19.

the photographer. Not only that, registered artists get a share with

:22:19.:22:23.

the company profits. It is a trickle whopper to. Your work is

:22:24.:22:29.

going to have to be of the pretty high standard to get listed. But

:22:29.:22:39.
:22:39.:22:45.

you never know until you try. -- it is a true co-operative.

:22:45.:22:49.

Dave Prins new music discovery application launched this week that

:22:49.:22:52.

last year which are friends or those you follow are listening to

:22:52.:23:02.
:23:02.:23:02.

right now. It is free for iPhone an Road. You can also set the data for

:23:03.:23:06.

the local area. Assuming you are connected to people with good taste,

:23:06.:23:16.
:23:16.:23:19.

this could be the new revolution in music discovery.

:23:19.:23:23.

Wimbledon 2013 starts on Monday. BBC Sport will be acing the digital

:23:23.:23:27.

coverage this year with the most comprehensive line-up of life and

:23:27.:23:33.

on-demand content. Up to 10 streams will be served through the Web,

:23:33.:23:37.

connected televisions, tablets, a new mobile site and connected

:23:37.:23:42.

applications. You could never miss another ball. Sadly, we cannot

:23:42.:23:51.

guarantee Andy Murray will make the final.

:23:51.:23:59.

Thank you. If you would like to suggest a website for future

:23:59.:24:04.

application, please e-mail us. You'll also find us on Twitter and

:24:04.:24:09.

Click meets the ethical hackers who break into systems with permission and takes a look at alternative gaming consoles. Includes tech news and web reviews.


Download Subtitles

SRT

ASS