Browse content similar to 22/06/2013. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
in the next week. It is now time for Click that works | :00:10. | :00:19. | |
:00:20. | :00:36. | ||
luck -- that looks like an Ever get the feeling you are not | :00:36. | :00:44. | |
alone? This week, Click meets the hackers to break into your system | :00:44. | :00:47. | |
with your permission. A after the big video console | :00:47. | :00:51. | |
announcements last week, we check out the smaller alternatives hoping | :00:51. | :00:55. | |
to level the playing field. And we seek out the detective's | :00:55. | :00:57. | |
both -- spotting the Photoshop fakes. | :00:57. | :01:02. | |
All that plus the latest techniques and a network for any parent | :01:02. | :01:05. | |
striving to get the right amount of technology into your children's | :01:05. | :01:15. | |
:01:15. | :01:21. | ||
Welcome to Quit. If you have been hacked... You can go now. Just my | :01:21. | :01:25. | |
personal haka. If you have been hacked, it generally means that | :01:25. | :01:30. | |
someone uninvited is watching your computer's every move. There is | :01:30. | :01:34. | |
another side to hacking, where companies actually invite people to | :01:34. | :01:38. | |
test their differences. It is called penetrance and testing. We | :01:38. | :01:46. | |
have been to stop, and London to -- Stockholm and London to take a | :01:46. | :01:50. | |
closer look at the people being paid to hack. | :01:50. | :01:53. | |
Hacking, often illustrated by anonymous, lingering typing shots | :01:53. | :01:59. | |
like these. Scaremongering stories abound of just how easy it is to | :01:59. | :02:04. | |
tap into your precious information. Hacking doesn't necessarily just | :02:04. | :02:13. | |
mean the bad guys, though. Other hackers try to defend our data. So, | :02:13. | :02:17. | |
what actually happens during the Battle beneath that the weather's | :02:17. | :02:24. | |
trickle surface? I have come to Stockholm to need a company who | :02:24. | :02:34. | |
:02:34. | :02:38. | ||
This is a grand old building, certainly not the place I would | :02:38. | :02:48. | |
:02:48. | :02:49. | ||
expect to find lots of gadgets. Now this is what I imagined an ethical | :02:49. | :02:53. | |
hacking company's headquarters would look like. Welcome to the | :02:53. | :02:58. | |
security operation centre. This company looks out for over 70 | :02:58. | :03:03. | |
clients, monitoring the website for potential attacks. Each screen | :03:03. | :03:06. | |
shows different data, from attack rates in the last day or so to a | :03:07. | :03:10. | |
visualised world map where each circle represents the region of a | :03:10. | :03:17. | |
potential attack. Operators handle around 1,700 alerts daily and | :03:17. | :03:22. | |
attempted invasions can come from anyone. You have Brendon kids on | :03:22. | :03:27. | |
the internet. They are not usually skilled, but they will find the | :03:27. | :03:37. | |
:03:37. | :03:37. | ||
most obvious form abilities -- vulnerabilities. Then we will have | :03:37. | :03:40. | |
slightly more experienced people. That is when you cross into | :03:41. | :03:45. | |
hacktivists. They might dislike your company or they will put in | :03:45. | :03:49. | |
more effort to try and make you look bad or still your data. Then | :03:50. | :03:55. | |
we have the category of competitors wanting to steal your data. With | :03:55. | :03:59. | |
all these threats it is to pinning -- tending to think that ethical | :03:59. | :04:05. | |
hacking companies and the monitor and defending sides. There is | :04:05. | :04:12. | |
another side. Organisers ask them to have a go at stealing their data. | :04:12. | :04:15. | |
A lot of companies that compromised from within. You have rogue traders | :04:15. | :04:21. | |
in the bank's. They start trading for and a fake authorisation from | :04:21. | :04:31. | |
their bosses. They are harder to mitigate against because all it | :04:31. | :04:36. | |
takes is a fake e-mail. Working out how attackers might breach a system | :04:36. | :04:41. | |
means penetration testers need to think like the malicious hackers | :04:41. | :04:46. | |
they try to stop. Consequently, they know the tricks of the trade. | :04:46. | :04:52. | |
I asked Bjorn to show me. I found a web for mobility on this side that | :04:52. | :04:57. | |
I can use to inject code into the side. I can add a malicious applet | :04:57. | :05:01. | |
to the site that you can view later on. Do worry, this site has been | :05:01. | :05:07. | |
specially built for the demo. He into some innocent tax on and | :05:07. | :05:13. | |
online forum, but tax am not so innocent code onto the end. It | :05:13. | :05:23. | |
exploits a vulnerability on the side. When his terminal tells him I | :05:23. | :05:26. | |
am there, he can look through my files, turn on the microphone or | :05:26. | :05:31. | |
even at divide the webcam. In short, he can do anything remotely that I | :05:31. | :05:37. | |
can do for my keyboard. You can combat the sort of attack by making | :05:37. | :05:40. | |
sure you are using the latest version of your browser and keep | :05:40. | :05:45. | |
your Java plug-in updated. Of course, running up-to-date anti- | :05:45. | :05:55. | |
:05:55. | :05:56. | ||
Now, you are unlikely to give your PIN number out to just anyone in | :05:56. | :06:00. | |
real life or on the Web, but malicious hackers use something | :06:00. | :06:05. | |
called social engineering to extract our data that way. Testers | :06:05. | :06:09. | |
also use this technique to discover if the company they are | :06:09. | :06:13. | |
investigating is vulnerable to it. I need some help of. I am trying to | :06:13. | :06:16. | |
log into error would nail application and I cannot seem to | :06:16. | :06:21. | |
get this to work. It sounds brutal believable. It works by relying on | :06:21. | :06:26. | |
a very human trade to want to help someone in need. Very often, this | :06:26. | :06:29. | |
persuasive approach is used in conjunction with technology to | :06:30. | :06:35. | |
create an almost irresistible urge to collect. You will probably have | :06:35. | :06:39. | |
received something like this before. An e-mail designed to get you to | :06:39. | :06:43. | |
click on a link and if you do it could compromise your computer's | :06:44. | :06:48. | |
security. It is called a phishing e-mail. To be honest, you'll have | :06:48. | :06:52. | |
your suspicions about quitting this one. Here at Trustwave, a central | :06:52. | :06:56. | |
London company, this man showed me a much subtler phishing technique | :06:56. | :07:03. | |
which works even if you have a fully patch computer. I am used | :07:03. | :07:07. | |
ding -- using software called before. We can track the victim to | :07:07. | :07:17. | |
:07:17. | :07:18. | ||
enter their credentials. Essentially it is the programme | :07:18. | :07:25. | |
that does the social engineering. Fake details go straight to the | :07:25. | :07:33. | |
hacker's desktop. If you're not sure about a short mink, a website | :07:33. | :07:37. | |
link them are like longurl.org can trade -- can tell you where it is | :07:37. | :07:42. | |
headed by extending it for you. Think about having one password for | :07:42. | :07:49. | |
social site and another fort site which access sensitive data. Most | :07:49. | :07:52. | |
people in the industry are keen to point out that attempting and or | :07:52. | :07:56. | |
achieving systems access without permission is generally against the | :07:56. | :08:01. | |
law, but assuming consent has been given, what happens if, and more | :08:01. | :08:07. | |
likely when, testers breach companies' defences? There has been | :08:07. | :08:13. | |
some very surprised people at the other end of the phone. When you | :08:13. | :08:15. | |
were doing a test of the internet, there is sometimes an expectation | :08:15. | :08:19. | |
that he will only get surface deeper. Quite often it is the case | :08:19. | :08:24. | |
that they might be a Web server at the prominent -- promoter. As part | :08:24. | :08:28. | |
of the process we will punch a hole further down into the corporate | :08:28. | :08:30. | |
network by chaining different vulnerabilities and exploits | :08:30. | :08:34. | |
together. Eventually we will find ourselves with the keys to the | :08:34. | :08:38. | |
kingdom. A can a company ever guarantee the security of our data | :08:38. | :08:44. | |
if we can access it in the outside world? Balancing the need to deny | :08:44. | :08:47. | |
impersonators with the genuine users' need for access is where the | :08:47. | :08:55. | |
battle continues. Of course, the main message in all | :08:55. | :08:58. | |
of this is if you're not entirely sure about what you're clicking on, | :08:58. | :09:06. | |
don't click on it. Next up is this week's attack news. | :09:07. | :09:11. | |
Microsoft has made a dramatic U- turn over its decision to impose | :09:11. | :09:16. | |
restrictions on brio and gains on its new Xbox One console. On a not | :09:16. | :09:21. | |
-- in an online statement, the company said the new console will | :09:21. | :09:24. | |
now not need to connect to Microsoft's service for | :09:24. | :09:28. | |
authentication every 24-hour and that physical copies of games, | :09:28. | :09:32. | |
whether they be second-hand or brand new, will play on any a Xbox | :09:32. | :09:36. | |
One if that against this is in the machine's drain. The move comes | :09:36. | :09:40. | |
after Microsoft came under increasing pressure from press and | :09:40. | :09:43. | |
fans concerned about digital rights management. | :09:43. | :09:49. | |
It is time for another world's finessed smartphone. This time from | :09:49. | :09:54. | |
Huawei. The Ascend P6 is just over six millimetres thick. It features | :09:54. | :09:59. | |
a higher resolution than normal five megapixel forward-facing | :09:59. | :10:05. | |
camera. A feature called Instant Beauty support is supposed to | :10:05. | :10:09. | |
reduce wrinkles and blends skin tones to create a more flattering | :10:09. | :10:15. | |
picture. Something that could be achieved with a low-quality camera. | :10:15. | :10:18. | |
Finally, if you are sick of being stuck in traffic on your daily | :10:18. | :10:25. | |
commute, why not take to the sky? Dubbed the Paravelo, this British | :10:25. | :10:26. | |
bike down aircraft works by combining an everyday folding | :10:26. | :10:31. | |
bicycle with a trailer fitted with a very powerful fan and a Paris | :10:31. | :10:36. | |
sale. It is not quite as easy as riding a bike, but the inventor's | :10:36. | :10:41. | |
insisted is in -- it is portable enough to take apart and carrying | :10:41. | :10:46. | |
two and Office. Capable of reaching 4,000 feet at the speed of 25mph it | :10:46. | :10:55. | |
is truly a hair-raising experience. Last week we were at the E3 video | :10:55. | :11:00. | |
games conference in LA, where the source Sony, Microsoft and | :11:00. | :11:05. | |
Nintendo's flooded out in the next generation console war. -- Nintendo | :11:05. | :11:08. | |
are slugging it out. These days the battle lines are not as clear as | :11:08. | :11:14. | |
they used to be because there are other contenders to be gaining | :11:14. | :11:18. | |
ground. Welcome to the new playing-field in | :11:18. | :11:25. | |
gaming. This, for example, is a $99 Android Micra console. It is | :11:25. | :11:28. | |
designed to get you playing smartphone like games in your | :11:28. | :11:33. | |
living room. The logic is simple - take on the likes of Sony, | :11:33. | :11:36. | |
Microsoft and Nintendo by luring into the home of the fast | :11:36. | :11:39. | |
multiplying new breed of game as, once weaned on far cheaper, but of | :11:40. | :11:46. | |
the compelling titles. The big question, will enough cash will | :11:46. | :11:50. | |
gain this want to play the more basic fodder on their 42 inch | :11:50. | :11:58. | |
television? Another salvo on the interview -- | :11:58. | :12:02. | |
living room is the PC in a box brigade. It will sit in your living | :12:02. | :12:05. | |
room and walked up to the big screen. Due for launch later this | :12:05. | :12:10. | |
year, they will be running high- spec PC games. They are potentially | :12:10. | :12:16. | |
easily upgrade double. -- upgrade doubled. | :12:16. | :12:22. | |
There are even devices that can combine both of those ideas. This | :12:22. | :12:27. | |
is a consort with two main purposes. The first is to act as a gaming | :12:27. | :12:30. | |
system on a controller. It is a five inch high-definition screen. | :12:30. | :12:36. | |
At the moment it is running Android. You have access to all of your | :12:36. | :12:43. | |
normal applications, but a quick press a button and it takes you to | :12:43. | :12:47. | |
its core purpose, which is to play games. Gaming is what this device | :12:47. | :12:53. | |
is all about. It is being powered underneath the controller by a big | :12:53. | :12:55. | |
graphics processor which has been specifically optimised for gaming | :12:55. | :12:59. | |
in a way that your normal smartphone or tablet simply | :12:59. | :13:03. | |
wouldn't be. And you get details like lighting and shadows, which | :13:03. | :13:08. | |
make for a visually richer experience. Its other purpose in | :13:08. | :13:15. | |
life is to stream games directly from your PC. The company has | :13:15. | :13:18. | |
traditionally made hardware that lie in a computer. What if you want | :13:18. | :13:22. | |
to onto the yourself from that and play those games in a different | :13:22. | :13:27. | |
room? Over wi-fi you can simply string those games using the | :13:27. | :13:31. | |
graphical grant of your PC onto the screen here. If you are in your | :13:31. | :13:34. | |
living room you can stream directly out of here on to your flat-screen | :13:34. | :13:38. | |
TV. The biggest feature about this kind of device is that it is truly | :13:39. | :13:42. | |
portable. You have an entry experience on the bus and train | :13:42. | :13:50. | |
which isn't just on your smart find. $350, it is not cheap. It is more | :13:50. | :13:54. | |
expect -- more expensive than the PlayStation data, but gains will be | :13:54. | :14:01. | |
a lot cheaper. Maybe from $1 upwards. One thing is clear, this | :14:01. | :14:05. | |
is just the first in a new breed of devices that will help create a | :14:05. | :14:15. | |
:14:15. | :14:19. | ||
much richer, more varied landscape Do you think the hybrid model will | :14:19. | :14:29. | |
:14:29. | :14:29. | ||
appeal? Let us know. Week still place incredible faith | :14:29. | :14:34. | |
in photographs to prove that what we say happens happens. The irony | :14:34. | :14:40. | |
being that it has never been easier to Dr an image digitally. But | :14:40. | :14:44. | |
technology has a habit of catching up with even the most audacious | :14:44. | :14:49. | |
tricksters. We have been meeting those who investigate whether | :14:49. | :14:59. | |
photographs are a fact or fiction. On show in Geneva, the false Fakes | :14:59. | :15:03. | |
Exhibition of photographs that are not what they seem. They Michael | :15:03. | :15:07. | |
Clarke documents of our time, but they are staged, manipulated, | :15:07. | :15:17. | |
doctored. If I told to the camera does not quite, I would be fibbing. | :15:17. | :15:21. | |
With all this photograph of bakery going on, you would think by now we | :15:21. | :15:27. | |
would be able to tell the difference. The problem is, we are | :15:28. | :15:37. | |
:15:38. | :15:44. | ||
being played. We cannot tell the difference. TRANSLATION: I asked | :15:44. | :15:48. | |
for so hop from one of the exhibition curators. He suggested | :15:48. | :15:52. | |
that if someone is spent on deceiving us, they will probably | :15:52. | :16:01. | |
succeed. TRANSLATION: What is complicated is when a big company | :16:01. | :16:06. | |
sets out to manipulate us. They employ complicated strategies that | :16:06. | :16:16. | |
are hard for us to fix, even if we are educated. We might expect | :16:16. | :16:22. | |
images in a gallery to be manipulated. But with programmes, | :16:22. | :16:26. | |
anyone can distort reality. Much to the dismay of insurance companies | :16:26. | :16:34. | |
dealing with claims based on photographic evidence. So what can | :16:34. | :16:42. | |
you do? You can go to certain companies in the US to -- for | :16:42. | :16:47. | |
Europe. They can tell if an image has been tampered with or | :16:47. | :16:52. | |
completely transformed. We have a number of mathematical and | :16:52. | :16:58. | |
computational methods which analyse pixel values in digital photographs | :16:58. | :17:07. | |
or videos. We can search for some kind of inconsistency in them. This | :17:07. | :17:11. | |
way, we're able to highlight if some part of the photograph or a | :17:11. | :17:18. | |
video has been tampered with. us say you wanted to change a birth | :17:18. | :17:24. | |
certificate. The most famous is the US President. Recently sent out by | :17:24. | :17:29. | |
the White House to stop the controversy. It is easy enough to | :17:29. | :17:32. | |
alter ripped so the President appears to have been born in | :17:32. | :17:41. | |
Nairobi. But this highlights the dodgy area. This is the original | :17:41. | :17:48. | |
one and this is the photograph. software examines the data and | :17:48. | :17:57. | |
shows a week compression of the original. There are some periodic | :17:57. | :18:07. | |
:18:07. | :18:07. | ||
artifacts, some holes. Doctoring photographs has a long and glorious | :18:07. | :18:13. | |
history. Here are some from the archives. You know what it is like | :18:13. | :18:17. | |
to invite to her friends and which some of them have not turned up. He | :18:17. | :18:27. | |
is Chairman Mao and his diminishing entourage, Mussolini looking more | :18:27. | :18:31. | |
heroic and more recently, Nicholas Sarkozy doing away with his muffin | :18:31. | :18:41. | |
:18:41. | :18:45. | ||
top. This is real, isn't it? Here are internet parodies of Iran's | :18:45. | :18:49. | |
missile launch. It is a growing field, with applications for | :18:49. | :18:55. | |
anybody who needs to know if an image is true. Cameras can lie, but | :18:55. | :19:04. | |
now there is a lie detector. The false Fakes Exhibition is on | :19:04. | :19:09. | |
back to Geneva's Centre of photography until 28th July. | :19:09. | :19:14. | |
According to a recent survey, children start using the internet | :19:14. | :19:22. | |
on average at the age of three. As the parents of a three-year old, I | :19:22. | :19:26. | |
find that truly terrifying. If you are in a similar situation, you | :19:26. | :19:31. | |
need to check out a social network dedicated to parenting in the | :19:31. | :19:38. | |
digital age. It cannot be easy being a parents | :19:38. | :19:43. | |
in a world where everything seems to be connected to the internet and | :19:43. | :19:50. | |
needs charging up overnight. You're a kid's batteries never run out. | :19:50. | :19:54. | |
Curious parents can get some support at a new social platform | :19:54. | :19:58. | |
where you can talk to experts and other concerned parents about the | :19:58. | :20:08. | |
:20:08. | :20:09. | ||
risks and opportunities presented by technology today. I get sent a | :20:09. | :20:13. | |
lot of new and amazing social platforms to consider for review. | :20:13. | :20:18. | |
Most of which offered nothing new and are not particularly amazing. | :20:18. | :20:23. | |
If you want it to succeed, it has to have something different. | :20:23. | :20:31. | |
Otherwise, what is the point? For me, this one has hit the nail on | :20:31. | :20:38. | |
the head with its focus on parenting in the digital age. | :20:38. | :20:47. | |
Clipping tools are an essential part of an organised online life. | :20:47. | :20:54. | |
This might be interesting to people, it is a dedicated food application. | :20:54. | :21:02. | |
It lets you explore a feast of delicious content. If you have ever | :21:02. | :21:05. | |
found yourself at a random restaurant that happens to serve | :21:05. | :21:09. | |
the best spicy chicken wings you have ever tasted, but cannot | :21:09. | :21:16. | |
remember where it was, this is for you. Take a picture, use the | :21:16. | :21:26. | |
:21:26. | :21:32. | ||
location had end when you're in the Lots of people share their | :21:32. | :21:36. | |
photographs online. But are you giving away the rights your | :21:36. | :21:41. | |
creativity. Make sure you're i P his coverage and earn some extra | :21:41. | :21:47. | |
cash by putting your images on this website. A new co-operative. | :21:47. | :21:51. | |
Photography, where people can buy and sell high-quality images they | :21:51. | :21:56. | |
nicely presented market place. The problem with this kind of website | :21:56. | :22:01. | |
is that they are usually pretty stingy. We have looked at some in | :22:01. | :22:08. | |
the past. Not so with this one. If your photograph is sold, you get | :22:08. | :22:13. | |
50% of the standard licence-fee and the extended licences for 100% to | :22:13. | :22:19. | |
the photographer. Not only that, registered artists get a share with | :22:19. | :22:23. | |
the company profits. It is a trickle whopper to. Your work is | :22:24. | :22:29. | |
going to have to be of the pretty high standard to get listed. But | :22:29. | :22:39. | |
:22:39. | :22:45. | ||
you never know until you try. -- it is a true co-operative. | :22:45. | :22:49. | |
Dave Prins new music discovery application launched this week that | :22:49. | :22:52. | |
last year which are friends or those you follow are listening to | :22:52. | :23:02. | |
:23:02. | :23:02. | ||
right now. It is free for iPhone an Road. You can also set the data for | :23:03. | :23:06. | |
the local area. Assuming you are connected to people with good taste, | :23:06. | :23:16. | |
:23:16. | :23:19. | ||
this could be the new revolution in music discovery. | :23:19. | :23:23. | |
Wimbledon 2013 starts on Monday. BBC Sport will be acing the digital | :23:23. | :23:27. | |
coverage this year with the most comprehensive line-up of life and | :23:27. | :23:33. | |
on-demand content. Up to 10 streams will be served through the Web, | :23:33. | :23:37. | |
connected televisions, tablets, a new mobile site and connected | :23:37. | :23:42. | |
applications. You could never miss another ball. Sadly, we cannot | :23:42. | :23:51. | |
guarantee Andy Murray will make the final. | :23:51. | :23:59. | |
Thank you. If you would like to suggest a website for future | :23:59. | :24:04. | |
application, please e-mail us. You'll also find us on Twitter and | :24:04. | :24:09. |