<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Computer virus &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/computer-virus/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Tue, 18 May 2021 17:06:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Bkav 2021 solution set, 5-layer protection technology for AI applications</title>
		<link>https://en.spress.net/bkav-2021-solution-set-5-layer-protection-technology-for-ai-applications/</link>
		
		<dc:creator><![CDATA[KIM THANH]]></dc:creator>
		<pubDate>Tue, 18 May 2021 17:06:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[Anti Malware]]></category>
		<category><![CDATA[Antivirus program]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Endpoint Enterprise]]></category>
		<category><![CDATA[Endpoint SME]]></category>
		<category><![CDATA[Endpoint Total]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/bkav-2021-solution-set-5-layer-protection-technology-for-ai-applications/</guid>

					<description><![CDATA[Today, May 11, Bkav Technology Group officially launched the Bkav 2021 solution set with 5-layer protection technology, attack prevention for digital transformation. The product suite includes anti-virus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. New solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Today, May 11, Bkav Technology Group officially launched the Bkav 2021 solution set with 5-layer protection technology, attack prevention for digital transformation. The product suite includes anti-virus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses.</strong><br />
<span id="more-15884"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_17_38807519/4dc3db05c5472c197556.jpg" width="625" height="464"> </p>
<p> <em> New solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system</em> The new solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system, helping businesses and individual users closely protect the digital environment and digital data. The main protection layers of Bkav 2021 include the Network Layer that protects and monitors all incoming and outgoing network connections. The operating system layer monitors and detects operating system vulnerabilities. The data layer is responsible for protecting and monitoring changes to data or system configuration. The application layer performs behavioral and vulnerability monitoring of applications. Finally, the User Layer helps ensure the enforcement of information security policies. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_17_38807519/5d26c1e0dfa236fc6fb3.jpg" width="625" height="860"> The manufacturer said that the new version of Artificial Intelligence technology applied in Bkav 2021 has enhanced the ability to identify malicious code by up to 99.9% as well as reduce the possibility of mistakenly catching clean files to approximately 0. %. Bkav&#8217;s new technology is also 144% more efficient than the previous 2020 version. In particular, the business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard. Businesses will get an overall picture of the protection situation periodically by week, month, and year, including the number of scanned files, the number of malicious files, the number of controlled connections, and the number of blocked dangerous connections. , the rate of infected malicious code, the number of times to prevent data encryption, spying attacks, the number of operating system vulnerabilities&#8230; Bkav Endpoint is provided in 3 versions, suitable for different sizes of businesses, including Endpoint SME for small and medium scale, Endpoint Enterprise for large scale and Endpoint Total for very large scale. Vu Ngoc Son, Vice President in charge of Anti-Malware of Bkav, said: “Bkav 2021&#8217;s 5-layer protection system provides comprehensive protection and does not miss any risks. At the same time, the system is also equipped with centralized administration features and periodic reports to help agencies, businesses and users always know the latest overview and details about the computer virus situation. in the whole system, so that they can really feel secure and actively participate in the digital transformation process”.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15884</post-id>	</item>
		<item>
		<title>Vietnam lost more than 23.9 trillion dong due to computer virus</title>
		<link>https://en.spress.net/vietnam-lost-more-than-23-9-trillion-dong-due-to-computer-virus/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 13 May 2021 19:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Anti Malware]]></category>
		<category><![CDATA[Antivirus program]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Damages]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dong]]></category>
		<category><![CDATA[due]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Identified]]></category>
		<category><![CDATA[Launched]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[Next time]]></category>
		<category><![CDATA[Overview]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Statistical]]></category>
		<category><![CDATA[trillion]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/vietnam-lost-more-than-23-9-trillion-dong-due-to-computer-virus/</guid>

					<description><![CDATA[According to Bkav&#8217;s statistics, in 2020, Vietnam lost more than 23.9 trillion VND due to computer viruses, the damage will continue to increase in the near future. In Vietnam, digital transformation is taking place strongly in all areas of life such as education, health, banking and finance &#8230; Activities of management, administration, production, business and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to Bkav&#8217;s statistics, in 2020, Vietnam lost more than 23.9 trillion VND due to computer viruses, the damage will continue to increase in the near future.</strong><br />
<span id="more-13908"></span> In Vietnam, digital transformation is taking place strongly in all areas of life such as education, health, banking and finance &#8230;</p>
<p> Activities of management, administration, production, business and procurement of enterprises and people will be gradually changed, implemented through the digital environment. This also increases the risk of cyber attacks, especially attacks on digital data and the digital environment. To help users limit attacks and minimize damage in the future, Bkav has introduced anti-virus software version 2021, applying artificial intelligence to create a 5-layer protection system, helping businesses. and more secure users. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_331_38815200/4dc3db05c5472c197556.jpg" width="625" height="464"> Mr. Vu Ngoc Son, Bkav&#8217;s Vice President in charge of Anti Malware, said: “Bkav 2021&#8217;s 5-layer protection system provides comprehensive protection and does not leave any risk out. At the same time, the system is also equipped with centralized management features, periodic reports to help agencies, businesses and users always grasp general information, so they can be assured and actively participate. number converter ”. According to the manufacturer, Bkav 2021 is capable of detecting malware up to 99.9% as well as reducing the possibility of catching a clean file by approximately 0%, optimizing performance by 144% compared to the previous version. . Users who are installing Bkav antivirus software will be automatically upgraded to the new version.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13908</post-id>	</item>
		<item>
		<title>Cyber ​​weapons &#8211; Weapons of immeasurable danger</title>
		<link>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</link>
					<comments>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/#respond</comments>
		
		<dc:creator><![CDATA[CTV Lê Ngọc/VOV.VN (theo topwar.ru)]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 07:28:29 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[APCS]]></category>
		<category><![CDATA[Apple II]]></category>
		<category><![CDATA[BELL]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Computer worm]]></category>
		<category><![CDATA[Container ship]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Evergreen Group]]></category>
		<category><![CDATA[Gas]]></category>
		<category><![CDATA[immeasurable]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Robert Morris]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Stuxnet virus]]></category>
		<category><![CDATA[Suez Canal]]></category>
		<category><![CDATA[Tankers]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Weapons]]></category>
		<guid isPermaLink="false">https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</guid>

					<description><![CDATA[The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently. The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently.</strong><br />
<span id="more-976"></span> </p>
<p>The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, is already networked at one level or another. In the &#8220;smart home&#8221; with TVs, refrigerators, vacuum cleaners, washing machines, microwave ovens &#8230;, and even smart light bulbs are becoming common; On the street, there were the first cars with autonomous driving systems.</p>
<p>Such devices are expected to make people&#8217;s lives easier, but certainly these technologies will also be applied in other areas as well. While digital systems and services make the quality of human life much better, in theory all digital systems can be hacked &#8211; which is already in practice. positive.</p>
<p><strong>Computer virus</strong></p>
<p>Theoretical basis for the development of the &#8220;computer virus&#8221; was formed almost simultaneously with the emergence of the computer itself in the mid-20th century. In 1961, engineers Viktor Vysotsky, Doug McIlroy and Robert Morris of the Room Bell&#8217;s telephone experiment had developed programs that could make copies of themselves &#8211; the first viruses. They are created in the form of a game that engineers call &#8220;Darwin&#8221;, the purpose of which is to send bots to friends to see which will destroy more of the competitors&#8217; programs and create more copies of itself to fill someone else&#8217;s computer.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/984065cd4f8fa6d1ff9e.jpg" width="625" height="397"></p>
<p><em>Cyber ​​weapons are said to be equally complex and are weapons of mass destruction; Source: topwar.ru</em></p>
<p>In 1981, Virus 1,2,3 and Elk Cloner appeared on Apple II personal computers; a few years later, the first anti-virus programs appeared. The word &#8220;computer virus&#8221; in fact includes many types of malware: worms, hijackers (rootkits), spyware, zombies, adware, virus blocking (winlock), Trojan viruses (trojans) and their combination. If the first viruses are often written for entertainment, over time they begin to be &#8220;commercialized&#8221; &#8211; to steal personal and financial data, disrupt device operations, encrypt the data. for the purpose of blackmail &#8230;</p>
<p>With the advent of electronic money, computer viruses received a new function &#8211; bringing the user&#8217;s computer &#8220;as a slave&#8221; to mining cryptocurrency, forming a huge network of computers. botnet infection (before that, botnet also existed, such as to send spam mail or DDoS attack). Opportunities like this cannot help but make the military and intelligence agencies in general with missions &#8211; steal something, destroy something &#8230;, care.</p>
<p><strong>Computer virus &#8211; a strategic weapon</strong></p>
<p>On June 17, 2010, for the first time in history, the win32 / Stuxnet virus &#8211; a computer worm that infects not only computers running the Microsoft Windows operating system, but also industrial systems that control the processes. automatic production, detected. This worm can be used as a means of gathering unauthorized data (spying) and sabotaging automated process control systems (APCS) of industrial enterprises, power plants, boilers, etc.</p>
<p>According to cybersecurity experts, this virus is the most complex software product, developed by a professional team of dozens of experts. In terms of complexity, it can be compared to a Tomahawk cruise missile, and is designed for cyber operations. The Stuxnet virus has damaged some uranium enrichment centrifuges, slowing down Iran&#8217;s nuclear program. Intelligence agencies of Israel and the US are suspected of developing the Stuxnet virus.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/5397a01a8a5863063a49.jpg" width="625" height="391"></p>
<p><em>Industrial facilities, infrastructure, services &#8230; all can be targets of cyber weapons; Source: topwar.ru</em></p>
<p>Later, other computer viruses were discovered, with a degree of complexity similar to that of win32 / Stuxnet (most suspected of being an Israeli / US product), such as: Duqu, designed to collect confidential data in a confidential manner; Wiper (late April 2012), destroyed all information on some of the servers of one of the largest oil companies in Iran and completely paralyzed its work for a few days; Flame, a spy virus, is believed to be developed specifically for attacks on Iran&#8217;s computer infrastructure (can identify mobile devices with Bluetooth module, track location, stealing confidential information and eavesdropping on conversations); Gauss, aimed at stealing financial information: e-mail, passwords, bank account data, cookies, as well as system configuration data; Maadi (suspected of Iran) &#8211; can collect information, remotely change computer parameters, record audio and transmit it to remote users &#8230;</p>
<p><strong>Application</strong></p>
<p>In the Middle East, for example, the largest producer of liquid natural gas (LNG), has an interest that seriously conflicts with the interests of another country. The Middle East country has a network of oil and gas pipelines, LNG production lines and a fleet of Q-Flex and Q-Max tankers designed to transport LNG and has a military base of the third country. three are on its territory. An armed attack directly on a Middle Eastern country could do more harm than good. Then, the solution might be the use of cyber weapons.</p>
<p>Modern oil and container ships are becoming more and more automated; No less automation is used in LNG plants. Therefore, specialized malware is loaded into the control systems of the Q-Flex and Q-Max tankers, or their LPG storage systems, theoretically permissible at a certain time ( or on an external command, if there is a network connection) creates an artificial accident that completely or partially destroys selected tanks / tanks. It is very likely that flaws in the LNG production process lead to neutralization, including potentially destroying the plant.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/2c2cdda1f7e31ebd47f2.jpg" width="625" height="359"></p>
<p><em>Cyber ​​weapons can easily have the same effects as the recent Suez Canal clogging; Source: topwar.ru</em></p>
<p>An explosion of an LNG carrier due to an accident at the entrance to a port or the failure of the LNG storage device can not only result in damage to the vessel itself, but also damage to coastal infrastructure. The goals could therefore be: undermine the energy supplier&#8217;s reputation, with the possibility of consumers reorienting the natural gas market of another country; increasing prices for world energy sources, helping to generate more revenue for the national budget; undermining political activity and interfering in the internal affairs of other countries in the region, due to a decrease in the financial capacity of the country in question.</p>
<p>Depending on the economic damage inflicted, a complete shift in ruling elites could occur, as well as a limited conflict between that state and its neighbors, who may want to take advantage of neighboring countries&#8217; weaknesses to change the balance of power in the region. The crux of this activity is secrecy, so that there is no direct blame without clear evidence. The United States has repeatedly been accused of conducting hostile operations against even its most staunchest allies.</p>
<p>Another option for using cyber weapons has been suggested by a recent incident. A giant ship &#8211; an oil tanker or a container ship, passing through a narrow canal, suddenly the control system gives out a series of commands to dramatically change the direction and speed of movement, resulting in the ship spinning break and completely block the channel. It can even be flipped, making it extremely time-consuming and costly to rescue it. The Evergreen Group&#8217;s container ship blocking the Suez Canal shows how congestion of shipping arteries affects the global economy. It is especially effective if such incidents occur simultaneously on several channels.</p>
<p>Or most recently, Iran is accusing Israel of terrorizing its Natanz nuclear base network &#8230; In the absence of a clear trace of the culprit, it would be extremely difficult to establish &#8211; anyone can also be blamed for this. Therefore, the development of industrial-scale cyber weapons is considered to be a top priority. Information technology along with nanotechnology and biotechnology are the cornerstones of dominance in the 21st century, but the development of cyber weapons is much cheaper than the development of promising nano biotechnology. and conventional modern weapons ./.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">976</post-id>	</item>
	</channel>
</rss>