All language subtitles for [English] The Most Dangerous Virus In The World [DownSub.com]

af Afrikaans
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bn Bengali
bs Bosnian
bg Bulgarian Download
ca Catalan
ceb Cebuano
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
tl Filipino
fi Finnish
fr French
fy Frisian
gl Galician
ka Georgian
de German
el Greek
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
km Khmer
ko Korean
ku Kurdish (Kurmanji)
ky Kyrgyz
lo Lao
la Latin
lv Latvian
lt Lithuanian
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mn Mongolian
my Myanmar (Burmese)
ne Nepali
no Norwegian
ps Pashto
fa Persian
pl Polish
pt Portuguese
pa Punjabi
ro Romanian
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
st Sesotho
sn Shona
sd Sindhi
si Sinhala
sk Slovak
sl Slovenian
so Somali
es Spanish
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
te Telugu
th Thai
tr Turkish
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
or Odia (Oriya)
rw Kinyarwanda
tk Turkmen
tt Tatar
ug Uyghur
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,060 --> 00:00:07,800 cybercrime is set to cost the world 10.5 trillion  dollars by 2025. this is larger than the entire   2 00:00:07,800 --> 00:00:13,860 GDP of Germany France and the UK combined in  2021 but what if I told you that the world's   3 00:00:13,860 --> 00:00:19,260 most dangerous virus is completely legal and could  be running on your phone right now without a trace   4 00:00:19,260 --> 00:00:25,620 introducing Pegasus the world's most dangerous  computer virus why is it so dangerous well the   5 00:00:25,620 --> 00:00:30,480 virus Grant almost complete access to your device  and to get infected you don't need to click a link   6 00:00:30,480 --> 00:00:37,620 download something by mistake or do well anything  Pegasus tracks everything you do with or near your   7 00:00:37,620 --> 00:00:42,840 smartphone and does so undetected a government  anywhere in the world could be accessing your   8 00:00:42,840 --> 00:00:47,940 phone learning all of your activities and using  that information against you or those around you   9 00:00:47,940 --> 00:00:54,060 simply put Pegasus is a malware program which  is a small viral file usually delivered online   10 00:00:54,060 --> 00:00:59,100 a malware file might enable the tracking of  how a computer is used and even its immediate   11 00:00:59,100 --> 00:01:04,500 environment but exactly what it does depends on  how it was programmed in the case of Pegasus the   12 00:01:04,500 --> 00:01:10,200 access is almost complete it enables hackers  to record phone calls track location use the   13 00:01:10,200 --> 00:01:15,900 phone camera to take photos or video read text  messages and much more the system then passes   14 00:01:15,900 --> 00:01:20,820 back this data to the person who planted them  out where the name comes from Greek mythology a   15 00:01:20,820 --> 00:01:26,280 nod to the winged horse of the same name it was  first discovered in 2016 when it was found in a   16 00:01:26,280 --> 00:01:31,740 message to the iPhone of a human rights activist  called Ahmed Mansour Mansour forwarded the link   17 00:01:31,740 --> 00:01:36,960 to the citizen lab of the University of Toronto  who were able to work out its capabilities at the   18 00:01:36,960 --> 00:01:42,600 time the virus was programmed to exploit three  specific unknown security vulnerabilities these   19 00:01:42,600 --> 00:01:47,100 vulnerabilities were found in phone apps and  allowed the Pegasus file to infiltrate a phone   20 00:01:47,100 --> 00:01:53,220 without the knowledge of users the Pegasus malware  has existed since at least 2013 having taken so   21 00:01:53,220 --> 00:01:58,140 many years to discover and has proven to be very  high profile in its use the killing of journalist   22 00:01:58,140 --> 00:02:03,120 Jamal khasogi and the Saudi Arab Arabian  Consulate in Abu Dhabi for example resulted   23 00:02:03,120 --> 00:02:07,860 in a lawsuit against the makers of Pegasus by  friends of khasogi who alleged it was used by   24 00:02:07,860 --> 00:02:13,260 the Saudi government to spy on them in late 2021  it was proven that Pegasus had been on the phone   25 00:02:13,260 --> 00:02:18,660 of kasoki's wife for several months placed there  by a government agency the information gathered   26 00:02:18,660 --> 00:02:24,240 before his death in 2018 may have led to kasogi  becoming a Target and the connection is explored   27 00:02:24,240 --> 00:02:29,940 in the Frontline documentary on kosogi produced  by PBS many people first heard of Pegasus though   28 00:02:29,940 --> 00:02:36,180 when it was used to hack Amazon boss Jeff Bezos  in 2018 the same year kosogi died the Bezos hack   29 00:02:36,180 --> 00:02:42,000 is likely connected to WhatsApp messages exchanged  with Saudi Prince Mohammed bin Salman who bezos's   30 00:02:42,000 --> 00:02:47,220 Washington Post had been critical of the hackers  had access to bezos's phone for months as well   31 00:02:47,220 --> 00:02:52,320 as compromising his business privacy the hack also  notably led to the destruction of bezos's marriage   32 00:02:52,320 --> 00:02:57,480 this was after leaked texts publicly revealed his  affair with reporter Lauren Sanchez the reason   33 00:02:57,480 --> 00:03:02,280 Pegasus is a particularly dangerous example  full of this kind of spying is that it is sold   34 00:03:02,280 --> 00:03:08,160 specifically to governments often for millions of  dollars made by the Israeli NSO group the purpose   35 00:03:08,160 --> 00:03:13,560 officially is to track and Trace terrorists and  their activities however in practice the way   36 00:03:13,560 --> 00:03:18,660 Pegasus is used is suspected to often be quite  a lot more underhand since its introduction   37 00:03:18,660 --> 00:03:24,060 Pegasus has gone through several versions each  more powerful and capable than the last in its   38 00:03:24,060 --> 00:03:29,220 newest guys if the malware is installed on your  device then nearly everything you do involving   39 00:03:29,220 --> 00:03:35,220 or close to your smartphone becomes available to  the user Pegasus does this by exploiting security   40 00:03:35,220 --> 00:03:40,200 bugs a type of security related programming  error in things like software packages and   41 00:03:40,200 --> 00:03:46,200 operating platforms specifically Pegasus looks for  something called zero day vulnerabilities which is   42 00:03:46,800 --> 00:03:51,480 suck issues that are known by some top security  Specialists but not yet known by the programmers   43 00:03:51,480 --> 00:03:56,400 who created the software these weaknesses which  can be found across all operating systems allow   44 00:03:56,400 --> 00:04:01,200 Pegasus to exploit the system to gain admin  rights to a smartphone or other device which   45 00:04:01,200 --> 00:04:07,140 in turn grants extensive access the easiest way  for Pegasus malware to arrive on a device is via   46 00:04:07,140 --> 00:04:12,120 a disguised link though there are far more subtle  methods too at one stage for example a security   47 00:04:12,120 --> 00:04:17,760 issue meant that simply making a call to a device  via FaceTime on the iPhone allowed Pegasus to   48 00:04:17,760 --> 00:04:23,220 install itself that security glitch thankfully  has now been fixed but new ones are always being   49 00:04:23,220 --> 00:04:28,260 filmed when a government wants to make use of a  program like Pegasus it is nearly impossible to   50 00:04:28,260 --> 00:04:32,820 prevent to the point that some Security Experts  simply recommend throwing out a smartphone as   51 00:04:32,820 --> 00:04:37,860 the best solution or of course not carrying a  smartphone at certain strategic times to allow   52 00:04:37,860 --> 00:04:42,840 for privacy others suggest removing a camera from  the device or other functionality that poses a   53 00:04:42,840 --> 00:04:48,660 clear security risk a more practical if incomplete  solution is key keeping a smartphone fully up to   54 00:04:48,660 --> 00:04:53,340 date which helps limit the security gaps that  Pegasus can operate through as companies learn   55 00:04:53,340 --> 00:04:58,440 of them remember though that Pegasus often targets  security gaps that the program makers are not yet   56 00:04:58,440 --> 00:05:04,020 aware of in its most modern formats Pegasus  is incredibly extensive it essentially uses   57 00:05:04,020 --> 00:05:09,300 your phone at the same time as you anonymously  pulling in huge amounts of data and supplying   58 00:05:09,300 --> 00:05:13,980 that data back to whoever placed the malware so  why should this worry you of course you're most   59 00:05:13,980 --> 00:05:18,960 likely to be at risk if you do something that your  government won't like while terrorist tracking is   60 00:05:18,960 --> 00:05:23,220 the official purpose of Pegasus it's quite likely  to have been used around the world for things   61 00:05:23,220 --> 00:05:27,840 ranging from tracking protesters to learning  about the activities of political opponents   62 00:05:27,840 --> 00:05:33,720 with use highly secretive and likely to be subject  to protest in itself if discovered it is hard in   63 00:05:33,720 --> 00:05:38,580 practice to know quite how governments are using  the software what is certain though is that it has   64 00:05:38,580 --> 00:05:43,800 been used against some journalists and activists  with the not-for-profit Forbidden stories doing a   65 00:05:43,800 --> 00:05:48,780 wide-reaching expose in 2021 they even found  that relatively modern States like Hungary   66 00:05:48,780 --> 00:05:53,580 and Poland have abused the software while another  investigation uncovered 10 other states using the   67 00:05:53,580 --> 00:06:00,360 malware including India Mexico and Morocco in fact  research done by Amnesty International found 50   68 00:06:00,360 --> 00:06:05,880 000 specific targets including 180 journalists  from 20 countries they included journalists   69 00:06:05,880 --> 00:06:11,400 with CNN Al Jazeera the financial times and the  Wall Street Journal that's likely the tip of the   70 00:06:11,400 --> 00:06:16,380 iceberg after all it would be a bit naive to think  the amnesty report caught everything while the   71 00:06:16,380 --> 00:06:21,060 average person might feel their data isn't worth  stealing and in comparison to journalists and   72 00:06:21,060 --> 00:06:26,280 politicians perhaps it isn't it's also true that  data is now used in everything from advertising   73 00:06:26,280 --> 00:06:31,080 to monitoring Behavior so everyone's data has  some value while there is certainly something   74 00:06:31,080 --> 00:06:36,240 to be gained commercially in tracking the average  person on the street and due to its very nature   75 00:06:36,240 --> 00:06:42,180 nobody including its makers likely knows quite  how widespread Pegasus actually is it is though   76 00:06:42,180 --> 00:06:46,620 thought to still be in the hands of governments  alone which is somewhat reassuring when you think   77 00:06:46,620 --> 00:06:51,300 how its wider use could be abused one of the  best efforts to work out just how common the   78 00:06:51,300 --> 00:06:56,760 malware is was by the Pegasus project which saw  major media organizations from around the world   79 00:06:56,760 --> 00:07:01,140 investigate the malware over 80 journalists  from Publications including the Wall Street   80 00:07:01,140 --> 00:07:07,080 Journal the guardian and LaMont spent months  working on amnesty International's list of 50   81 00:07:07,080 --> 00:07:11,580 000 phone numbers and trying to establish its  accuracy they were able to link many of the   82 00:07:11,580 --> 00:07:16,860 phone numbers concerned to the Pegasus spyware  despite this Pegasus makers denied a connection   83 00:07:16,860 --> 00:07:21,720 this is an attempt to build something on a crazy  lack of information they said there is something   84 00:07:21,720 --> 00:07:26,460 fundamentally wrong with this investigation  they also claim that the list has nothing to   85 00:07:26,460 --> 00:07:32,760 do with us in fact despite pegasus's abuse the  NSO group consistently defend the software in   86 00:07:32,760 --> 00:07:38,280 the same way they say that they provide authorized  governments with technology that helps them combat   87 00:07:38,280 --> 00:07:43,740 Terror and crime naturally your feelings about  pegasus's use might depend on the extent of your   88 00:07:43,740 --> 00:07:48,480 trust of various National governments but the  more skeptical experts point out that as well   89 00:07:48,480 --> 00:07:54,060 as the NSO group app producers have a degree of  responsibility here they are after all providing   90 00:07:54,060 --> 00:07:59,460 the apps that have security vulnerabilities to so  many mobile devices experts feel tech companies   91 00:07:59,460 --> 00:08:04,260 rewards for finding such vulnerabilities are not  enough to compete with the black market values   92 00:08:04,260 --> 00:08:09,840 of the same information Apple for example top out  their bug Bounty at two hundred thousand dollars   93 00:08:09,840 --> 00:08:15,060 while the black market value of some bugs could  be in the millions as it has developed Pegasus   94 00:08:15,060 --> 00:08:20,520 has expanded the amount of information that can be  accessed has expanded too and even includes access   95 00:08:20,520 --> 00:08:25,920 to Wi-Fi passwords through a device a version that  targets Android phones has been found and dubbed   96 00:08:25,920 --> 00:08:30,960 chrysal after pegasus's brother in the Greek myth  the list of countries where the software is used   97 00:08:30,960 --> 00:08:36,240 or has been deployed is ever expanding the FBI  are thought to use the software in the US and   98 00:08:36,240 --> 00:08:41,100 it's been found on the phones of several State  Department employees at least two EU officials   99 00:08:41,100 --> 00:08:45,780 have been targeted while Israel's refusal to  sell the software to Ukraine to assist with   100 00:08:45,780 --> 00:08:50,700 their defense against Russia is widely seen as  a sign of Israeli support for Russian leader of   101 00:08:50,700 --> 00:08:55,500 Vladimir Putin naturally you might want to know  why such a thing is legal it's legal in most   102 00:08:55,500 --> 00:09:00,960 places only where it is used with permission the  software has a genuine practical application it   103 00:09:00,960 --> 00:09:04,800 could be on a government official's phone for  the purpose of recording their environment or   104 00:09:04,800 --> 00:09:10,500 meetings for example enabling a simple smartphone  to appear normal while being used to protect or   105 00:09:10,500 --> 00:09:15,840 take in information the fact that many uses of  the malware are illegal does not make Pegasus   106 00:09:15,840 --> 00:09:21,060 itself illegal in principle the Silver Lining  to the story is that Amnesty International has   107 00:09:21,060 --> 00:09:25,620 come up with a way of detecting Pegasus the  tool is explained thoroughly on the Amnesty   108 00:09:25,620 --> 00:09:30,540 International website and is definitely worth  considering for anyone with serious worries the   109 00:09:30,540 --> 00:09:36,060 tool copies the entire contents of a phone onto a  computer and then examines it for signs of Pegasus   110 00:09:36,060 --> 00:09:41,100 some level of computing knowledge is helpful  but not necessary at the end of the day Pegasus   111 00:09:41,100 --> 00:09:46,140 is a scary reminder that our private information  isn't as private as we might like to think it is 15029

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.