on the internet and turned on the phone and did a little browsing, we were quickly compromised. in terms of how people can defend themselves, i guess, what is the advice people are getting on how to travel so what happened to you with the security expert in that controlled environment doesn t happen in a more widespread way? reporter: generally if you don t need something, don t bring it. if you have that extra laptop or that extra ipad and it has all your personal information or sensitive banking data, don t bring it. also try not to download anything suspicious. what happened in our case, i turned on the computer. it was a brand new computer. a lot of people gave me flak for the way i opened it out of the box. but we wanted to show that these were new, fresh machines. and we put this profile, a fake profile, on the computer so that it would be some data. you want to have something there so people have something that
brought a security expert with us what happened. as soon as we plugged our machines in and started surfing on the internet and turned on the phone and did a little browsing, we were quickly compromised. in terms of how people can defend themselves, i guess, what is the advice people are getting on how to travel so what happened to you with the security expert in that controlled environment doesn t happen in a more widespread way? reporter: generally if you don t need something, don t bring it. if you have that extra laptop or that extra ipad and it has all your personal information or sensitive banking data, don t bring it. also try not to download anything suspicious. what happened in our case, i turned on the computer. it was a brand new computer. a lot of people gave me flak for the way i opened it out of the box. but we wanted to show that these were new, fresh machines. and we put this profile, a fake
controlled environment doesn t happen in a more widespread way? reporter: generally if you don t need something, don t bring it. if you have that extra laptop or that extra ipad and it has all your personal information or sensitive banking data, don t bring it. also try not to download anything suspicious. what happened in our case, i turned on the computer. it was a brand new computer. a lot of people gave me flak for the way i opened it out of the box. but we wanted to show that these were new, fresh machines. and we put this profile, a fake profile, on the computer so that it would be some data. you want to have something there so people have something that they want to steal. and very quickly, within a minute, there were probing attacks, if you will. people just checking out, who is this, who owns this new machine? what kind of computer is this?