<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Gap &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/gap/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 25 Jun 2021 05:30:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>I am used to driving the Camry and replaced my friend’s Passat, finally clarifying the gap between Toyota and Volkswagen</title>
		<link>https://en.spress.net/i-am-used-to-driving-the-camry-and-replaced-my-friends-passat-finally-clarifying-the-gap-between-toyota-and-volkswagen/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 05:30:06 +0000</pubDate>
				<category><![CDATA[Vehicles]]></category>
		<category><![CDATA[Camry]]></category>
		<category><![CDATA[clarifying]]></category>
		<category><![CDATA[driving]]></category>
		<category><![CDATA[finally]]></category>
		<category><![CDATA[friends]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Passat]]></category>
		<category><![CDATA[replaced]]></category>
		<category><![CDATA[Toyota]]></category>
		<category><![CDATA[Volkswagen]]></category>
		<guid isPermaLink="false">https://en.spress.net/i-am-used-to-driving-the-camry-and-replaced-my-friends-passat-finally-clarifying-the-gap-between-toyota-and-volkswagen/</guid>

					<description><![CDATA[The current joint venture B-class car market mainly depends on the German and Japanese cars. The German cars are represented by Volkswagen. Both the Passat and the Magotan have good sales. The Japanese cars are represented by Toyota, Honda and Nissan, and the Camry, Accord and Teana are the representatives. It is also a frequent [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> The current joint venture B-class car market mainly depends on the German and Japanese cars. The German cars are represented by Volkswagen. Both the Passat and the Magotan have good sales. The Japanese cars are represented by Toyota, Honda and Nissan, and the Camry, Accord and Teana are the representatives. It is also a frequent visitor on the B-class car sales rankings. The remaining American, Korean, French and British cars have no strength to compete head-on with the German and Japanese cars. Therefore, most of the friends who want to buy a joint venture B-segment car will choose one from German and Japanese. Personally, I prefer Japanese cars. GAC Toyota’s new Camry mentioned a 2.5G car when it first launched. The deluxe version has been driving for a while now, and I am impressed with its comfortable driving experience. A friend of mine mentioned the SAIC Volkswagen Passat at the beginning of the year, and then drove it instead, finally clarifying the gap between Toyota and Volkswagen.   For the new Camry, I have been driving it for a while, and I have been very familiar with it. My 2.5G luxury version has landed less than 250,000. Its power system is composed of a 2.5L naturally aspirated engine + 8AT gearbox. With the blessing of Toyota&#8217;s TNGA architecture, the texture of the chassis has changed from the original partial comfort to the current one. Comfortable, sporty, and more compatible. This 2.5L engine has a maximum power of 209 horsepower and a maximum torque of 250 N·m. Although it is not as strong as some 2.0T engines according to the book data, the power output of the Camry is also It is very abundant, and the fuel consumption performance is lower than I expected. I originally thought that a B-class car with a 2.5L engine would consume more than 10L/100km, but the result was 8.3L/100km when it was running in. , After the running-in period, it has dropped to below 8.0L/100km. Those who often say five or six fuels should not have actually driven a Camry. If it is a 2.5L hybrid model, the fuel consumption of this five or six fuels is my Believe it, but the normal level of 2.5L fuel is about 8.0L/100km. You can&#8217;t let the horse run fast and let the horse eat less, right? This is not normal and not scientific.   Why do I wait for the new car to be listed before buying it? Very simple, because the new car is smarter, the 12.3-inch LCD instrument panel + 10.1 inch central control screen + HUD head-up display system enhances the sense of science and technology in the car. In terms of functions, it supports GPS navigation, voice recognition control, car WeChat, and AutoNavi. Maps, CarLife, Internet of Vehicles and OTA upgrades, etc., the new dynamic radar cruise control system can now follow the car at full speed, making driving easier. In terms of smart configuration, Camry can be said to be ahead of the Japanese counterparts, but its rich smart configuration does not mean that it has no shortcomings, such as not supporting CarPaly, etc., obviously it is not friendly to Apple mobile phone users. The compatibility of Camry could be stronger.  As for space, the length of 4885mm and the wheelbase of 2825mm bring a spacious &#8220;large rear&#8221; to the Camry. The space is very spacious in all B-class cars. On the whole, the Camry’s performance in all aspects is as expected. 2.5L+8AT also meets my requirements for power output. The 2.5L engine has a strong power reserve, and the AISIN 8AT gearbox has a clear shift logic. The gear is also very smooth, the chassis is sporty and comfortable, and the texture of the chassis is very different from that of the previous Japanese cars. How do you say? It combines the comfortable characteristics of Japanese cars and the sporty temperament of European cars. This is a change that I personally like very much.   The SAIC Volkswagen Passat 380TSI flagship version chosen by my friend is the top option of the 2.0T high-power model. The price is much higher than my Camry, but the actual landing price is very close. So, what kind of experience is it like to change a friend&#8217;s Passat? In other words, what are the differences between Camry and Camry? In terms of power, it is indeed stronger than the Camry. The Camry has 209 horsepower and the Passat has 220 horsepower. The difference is not obvious. The obvious is the maximum torque. The Camry’s 250 Nm vs. Passat’s 350 Nm is reflected in personal acceleration. The above is that the Camry is more linear, the power output of the large displacement self-priming engine is continuous, and the Passat has a sense of abruptness. After a deep step on the accelerator, the power output will come after a short period of reflection. It may not be suitable for the first time. , But after getting used to it, I will like this sense of acceleration very much. The 7DSG dual-clutch gearbox shifts quickly, and there is no sense of frustration under acceleration, but in the stop-and-go congested section, especially the 2nd gear up to the 3rd gear. Or you can feel the frustration when you get 3 gears down to 2 gears. In other words, in terms of acceleration experience, Passat is better, while in terms of ride comfort, Camry is better.   Reflected in the chassis, the two are also very different in style. Although their chassis structure is the same, the tuning style is quite different. The Camry&#8217;s chassis is moderately soft and hard, which can ensure both comfort and sportiness, while the Passat is pure sports. The style is adjusted and the chassis texture is hard. When passing speed bumps and uneven roads, the body bounces more and the chassis damping stroke is shorter, which can cause a certain impact on the people in the car. I personally think that the Camry is more suitable for home use. In terms of configuration, the Camry is better in terms of intelligence. For example, its full-speed domain follow-up function is not available in Passat. Passat does not have an OTA upgrade that can evolve the car system, but in terms of compatibility, it is still Passat. Stronger, for example, it has both CarLife and CarPaly. In terms of interior texture, the Camry has a more technological sense. Its LCD instrument panel and central control screen are larger than Passat, and the central control layout looks younger, while the Passat’s interior looks very mature. Personal preference of decoration style, I prefer Camry&#8217;s youthful design and intelligent configuration.  It has to be said that the Passat’s rear row space is indeed large, at least larger than the Camry. The 4933mm car length and the 2871mm wheelbase have advantages over the Camry, and the rear space is more spacious, but spaciousness does not necessarily mean Comfort and comfort are closely related to the seat design. Passat’s seat is still hard, not as soft as Camry’s. In general, the Passat’s power output is stronger, the space is larger, and the control feel is good; the Camry’s ride comfort is more advantageous, the seats are more comfortable, and the chassis is more balanced. Judging from the comprehensive performance of the two, it happens that one represents the Japanese car and the other represents the German car. For family use, I still prefer the Japanese car, otherwise I would not choose the GAC Toyota Camry. What do you think of the Camry and Passat differently?</strong></p>
<p><span id="more-27356"></span></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27356</post-id>	</item>
		<item>
		<title>There is no difference between original non-deposit and deposit?Expert: In another 5 years, the gap will be clear at a glance</title>
		<link>https://en.spress.net/there-is-no-difference-between-original-non-deposit-and-depositexpert-in-another-5-years-the-gap-will-be-clear-at-a-glance-2/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 19:17:09 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[At a glance]]></category>
		<category><![CDATA[clear]]></category>
		<category><![CDATA[depositExpert]]></category>
		<category><![CDATA[difference]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[glance]]></category>
		<category><![CDATA[nondeposit]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[Years]]></category>
		<guid isPermaLink="false">https://en.spress.net/there-is-no-difference-between-original-non-deposit-and-depositexpert-in-another-5-years-the-gap-will-be-clear-at-a-glance-2/</guid>

					<description><![CDATA[As the saying goes, &#8220;You have surplus food in your hands, and you don&#8217;t panic in your heart.&#8221; In many people&#8217;s eyes, they should learn to plan ahead and be prepared for danger under any circumstances. As a result, many people have a &#8220;love to save money&#8221; mentality. Jack Ma, the founder of Alibaba. As [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>As the saying goes, &#8220;You have surplus food in your hands, and you don&#8217;t panic in your heart.&#8221; In many people&#8217;s eyes, they should learn to plan ahead and be prepared for danger under any circumstances. As a result, many people have a &#8220;love to save money&#8221; mentality.</strong></p>
<p><span id="more-25166"></span> <img fifu-featured="1" decoding="async" src="https://p9.itc.cn/images01/20210615/200dce1148144b4e8103b0d018afe828.jpeg" max-width="600"></p>
<p>Jack Ma, the founder of Alibaba. As a well-known entrepreneur in my country, he once stated in a public occasion that even in a special period, domestic market demand still exists. In Jack Ma’s view, today, 1 yuan can move 12 dollars. For a dollar, if the advance consumption is removed, the actual driving consumption can also reach 3.5 times, while the US consumer vouchers are only 0.4 times the driving force. It can be seen that the Chinese have savings.</p>
<p><img decoding="async" src="https://p3.itc.cn/images01/20210615/10f0dac2dff848c8bf19b733d8f12a1d.jpeg" max-width="600"></p>
<p>With the rapid development of our country’s economy, people’s income has been greatly improved, and many people’s &#8220;money concept&#8221; has also undergone certain changes. After solving the &#8220;supply and clothing&#8221; problem, many people have turned their attention to a higher level. Spiritual desire.</p>
<p>A related report shows that among the younger generation interviewed, young people between the ages of 18 and 34 have an average monthly savings of 994 yuan, and this data has dropped significantly compared with 2018.</p>
<p>Previously, other data showed that there are about 560 million people in my country with zero deposits, and many young people even have a lot of debt. Is it true that everyone is really out of money? In this regard, some people in the industry said that it is not that Chinese people have no money, but that many people&#8217;s consumption concepts have changed slightly.</p>
<p><img decoding="async" src="https://p4.itc.cn/images01/20210615/cdcf06ff2a5a4783a59c7fd5d69d15ed.jpeg" max-width="600"> </p>
<p> Nowadays, many young people in our country have no longer the consumption view of the older generation of &#8220;they have surplus food in their hands, and their hearts are not panicked&#8221;. These people are more inclined to enjoy the moment and hold the attitude of &#8220;wine and drunk now&#8221;. .</p>
<p>There are even many young people who say that there is no difference between &#8220;no deposit&#8221; and deposit. After all, no matter whether you choose the former or the latter, the purpose is the same, all for a better life, but is that true? ? In this regard, some experts said that in another five years, the gap will be clear at a glance.</p>
<p>Those who choose &#8220;have surplus food in their hands&#8221; may be more &#8220;stretched&#8221; in their current lives in order to live better in the future, but such people are often full of enthusiasm in their lives, and their lives may be more planned. After another five years, they will be able to save a certain amount, which is a certain gap between the lives of those who choose not to save.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210615/78228815667d479c934f05285dfabd1a.jpeg" max-width="600"></p>
<p>Those who choose &#8220;who are drunk now&#8221; should be able to live a good life if they have a stable job. However, after another five years, their wealth and savings may not change much, and once they become unemployed And so on, his life may become difficult.</p>
<p>In addition, people who choose &#8220;who are drunk today&#8221; may be inferior to the former in response to emergencies due to their relatively &#8220;discrete&#8221; attitude towards life.</p>
<p>What&#8217;s more, “from frugality to luxury is easy, and from luxury to frugality is difficult”. Those who choose not to save, if they maintain a “discrete” attitude for a long time, once they develop the habit of “going idle” and spending money lavishly, they may become “leisure”. Indebted&#8221;.</p>
<p>Of course, different people need different things, whether they choose to deposit or &#8220;no deposit&#8221;, this is a kind of personal perception of current life.</p>
<p><img decoding="async" src="https://p1.itc.cn/images01/20210615/2f1d5dd29cee489c9b1bd097f730e1b0.jpeg" max-width="600"></p>
<p>However, as the saying goes, &#8220;Young and strong don&#8217;t work hard, and the boss is sad.&#8221; In many cases, for young people, &#8220;holding surplus food&#8221; is still more important. What do you think about this?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25166</post-id>	</item>
		<item>
		<title>Users need to update Google Chrome 91 immediately</title>
		<link>https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 04:13:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sergei Glazunov]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</guid>

					<description><![CDATA[Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers. Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus Recently, a security researcher from the Project Zero team discovered a critical security vulnerability [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers.</strong><br />
<span id="more-24823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/606fb267bc25557b0c34.jpg" width="625" height="390"> </p>
<p> <em> Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus</em> Recently, a security researcher from the Project Zero team discovered a critical security vulnerability (CVE-2021-30551) in Google Chrome, affecting many users. Not much is known about this vulnerability, instead, it is only briefly described: &#8220;Confusion in V8&#8221;. This is a JavaScript engine, used quite commonly on Google Chrome and browsers using Chromium source code (including Microsoft Edge). In a blog post, Google confirmed that the CVE-2021-30551 vulnerability exists in the wild. To limit future attacks, Google Chrome users should update their browser immediately by going to Settings &#8211; Help &#8211; About Google Chrome (about Google Chrome). When the update to version 91.0.4472.101 is complete, simply press Relaunch to restart the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/2dbde3b5edf704a95de6.jpg" width="625" height="335"> <em> Update Google Chrome browser to the latest version. Photo: Tieu MINH</em> This is the sixth zero day vulnerability found on Google Chrome since the beginning of the year. The latest version of the browser also contains a total of 10 security patches, seven of which are listed as High threat and one is described as Critical. Sharing with BleepingComputer, Kaspersky warned that a new group of hackers calling themselves PuzzleMaker successfully hacked both Chrome and Windows this month, prompting Microsoft to issue an urgent upgrade notice for Windows users. In addition, Kaspersky also recommends that users update their browser and operating system to the latest version to limit future attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24823</post-id>	</item>
		<item>
		<title>Unpatched vulnerability in Samsung phones allows hackers to read messages</title>
		<link>https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:51:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy S10]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Read]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[TECHCRUNCH ONLY]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[Unpatched]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</guid>

					<description><![CDATA[Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages. Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages. Not stopping there, things are even more dangerous when two other vulnerabilities [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages.</strong><br />
<span id="more-24695"></span> Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/8314b223bc61553f0c70.jpg" width="625" height="417"> Not stopping there, things are even more dangerous when two other vulnerabilities can be exploited by hackers to manipulate arbitrary files with higher permissions. What makes these even scarier is that they can be exploited without any user interaction. Samsung is aware of these security flaws and it may take the company about 2 months to fix. For now, the best defense is to make sure your Samsung phone is up to date with the latest firmware. Toshin said he has found more than a dozen vulnerabilities in Samsung devices since the start of the year, with many of these vulnerabilities already fixed. One of the bugs lies in apps and components like the Secure Folder app and the Knox security software that come pre-installed on Samsung devices. Tohsin told TechCrunch that these may have given attackers access to sensitive user data. Among +Samsung devices, the Galaxy S10+ is verified as affected. Another vulnerability resulted in the deletion of all previously downloaded apps once device admin rights were granted to a newly installed app. Additionally, a vulnerability in the Settings app could grant read/write access to files with system user-level privileges. A security flaw that was resolved in February could have given hackers access to users&#8217; SMS/MMS messages and call details. Toshin also warned Samsung about issues that may have helped bad guys get the SD card content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/bf9499a397e17ebf27f0.jpg" width="625" height="416"> While Samsung says the vulnerability affects &#8220;certain&#8221; Galaxy devices, the company appears to be downplaying the scope of the incident. “No issues have been reported globally and users should rest assured that their sensitive information is not at risk. We have addressed the potential vulnerability by developing and releasing security patches through a software update in April and May 2021 as soon as we identify the issue.” Korean company stated. (According to VOV, PhoneArena)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24695</post-id>	</item>
		<item>
		<title>Will the gap between Mac computers with different chips gradually widen?</title>
		<link>https://en.spress.net/will-the-gap-between-mac-computers-with-different-chips-gradually-widen/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 14:34:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[computers]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[gradually]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[widen]]></category>
		<guid isPermaLink="false">https://en.spress.net/will-the-gap-between-mac-computers-with-different-chips-gradually-widen/</guid>

					<description><![CDATA[Source: CSDN Recently, Apple officially released the next-generation desktop system macOS Monterey, and also added some interesting features. such as: The portrait mode in FaceTime video blurs the background; Live text used to copy and paste, find or translate text in photos; Interactive 3D earth in map application; More detailed maps of cities such as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Source: CSDN</p>
<p>Recently, Apple officially released the next-generation desktop system macOS Monterey, and also added some interesting features. such as:</p>
<p>The portrait mode in FaceTime video blurs the background;</p>
<p>Live text used to copy and paste, find or translate text in photos;</p>
<p>Interactive 3D earth in map application;</p>
<p>More detailed maps of cities such as San Francisco, Los Angeles, New York and London in the Maps app;</p>
<p>Text-to-speech conversion in more languages, including Swedish, Danish, Norwegian and Finnish;</p>
<p>Device keyboard dictation that performs all processing completely offline;</p>
<p>Unlimited keyboard dictation (previously limited to 60 seconds per instance);</p>
<p>&#8230;&#8230;</p>
<p><img decoding="async" src="https://p6.itc.cn/q_70/images03/20210615/c284a480e03844e0836aa6352f57ceca.jpeg"></p>
<p>It seems that a lot of new capabilities have been added, but the problem is that on the function page of macOS Monterey, there is a line of small characters displayed. The following functions require a Mac equipped with an M1 chip to use.</p>
<p>Give up Intel processors?</p>
<p>Judging from the currently confirmed news, even if these machines are not old enough to be compatible with new functions, and are still very smooth and easy to use, some new functions of macOS Monterey cannot be used on Macs and MacBooks equipped with Intel processors.</p>
<p>macOS Monterey currently looks like it was designed specifically for the M1. If you still want to use an Intel processor version of the Mac, you may not be able to blur the background when using FaceTime; you cannot use the neural network to read the text in Swedish , Danish, Norwegian, Finnish; offline device dictation is not possible, that is, voice-to-text, and unlimited continuous voice-to-text, etc.</p>
<p> <img fifu-featured="1" decoding="async" src="https://p5.itc.cn/q_70/images03/20210615/e8a7b6527d28457bada0c68a5744d89f.jpeg"></p>
<p>This kind of &#8220;special treatment&#8221; actually makes some users feel uncomfortable. They think that it is also an Apple product and some function optimization should be synchronized; some users think that some functional differences based on hardware capabilities are unavoidable, and the problem is not big understanding.</p>
<p>In addition, Apple has always done a good job in supporting old devices. Even though the transition to its own chips has been completed, Cook still publicly promised to continue to support Intel-based Macs.</p>
<p>Intel processors lack the neural engine needed for new features?</p>
<p>Apple did not directly explain why these features cannot be used on Intel-based Mac computers. But according to speculation, it is because Intel-based Mac computers lack the neural engine needed for some new features.</p>
<p><img decoding="async" src="https://p1.itc.cn/q_70/images03/20210615/341a67c138864f23af795d52b9b1d589.jpeg"></p>
<p>At present, Apple is making a two-year transformation for Mac computers, from using Intel processors to using custom Apple silicon chips, which is expected to be completed before the 2022 World Developers Conference (WWDC).</p>
<p>However, facts have also proved that Macs equipped with M1 chips are much faster than &#8220;predecessors&#8221; equipped with Intel chips, and even the basic MacBook Air equipped with M1 chips outperformed the 16-inch ones equipped with Intel chips in benchmark tests. MacBook Pro.</p>
<p>There are also rumors that Apple plans to redesign the 14-inch and 16-inch MacBook Pro around the end of this year and will use the faster M1 chip.</p>
<p>At present, although some of the new features are not available, macOS Monterey is still compatible with a variety of Intel-based Mac computers, and Apple is also providing a beta version for developers. Software updates may be rolled out to all users between September and November.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24460</post-id>	</item>
		<item>
		<title>There is no difference between original non-deposit and deposit?Expert: In another 5 years, the gap will be clear at a glance</title>
		<link>https://en.spress.net/there-is-no-difference-between-original-non-deposit-and-depositexpert-in-another-5-years-the-gap-will-be-clear-at-a-glance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 21:45:09 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[At a glance]]></category>
		<category><![CDATA[clear]]></category>
		<category><![CDATA[depositExpert]]></category>
		<category><![CDATA[difference]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[glance]]></category>
		<category><![CDATA[nondeposit]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[Years]]></category>
		<guid isPermaLink="false">https://en.spress.net/there-is-no-difference-between-original-non-deposit-and-depositexpert-in-another-5-years-the-gap-will-be-clear-at-a-glance/</guid>

					<description><![CDATA[As the saying goes, &#8220;You have surplus food in your hands, and you don&#8217;t panic in your heart.&#8221; In many people&#8217;s eyes, they should learn to plan ahead and be prepared for danger under any circumstances. Therefore, many people have a &#8220;love to save money&#8221; mentality. Jack Ma, the founder of Alibaba. As a well-known [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>As the saying goes, &#8220;You have surplus food in your hands, and you don&#8217;t panic in your heart.&#8221; In many people&#8217;s eyes, they should learn to plan ahead and be prepared for danger under any circumstances. Therefore, many people have a &#8220;love to save money&#8221; mentality.</strong></p>
<p><span id="more-23033"></span> <img fifu-featured="1" decoding="async" src="https://p9.itc.cn/images01/20210615/200dce1148144b4e8103b0d018afe828.jpeg" max-width="600"></p>
<p>Jack Ma, the founder of Alibaba. As a well-known entrepreneur in my country, he once stated in a public occasion that even in a special period, domestic market demand still exists. In Jack Ma’s view, today, 1 yuan can move 12 dollars. For a dollar, if the advance consumption is removed, the actual driving consumption can also reach 3.5 times, while the US consumer vouchers are only 0.4 times the driving force. It can be seen that the Chinese have savings.</p>
<p><img decoding="async" src="https://p3.itc.cn/images01/20210615/10f0dac2dff848c8bf19b733d8f12a1d.jpeg" max-width="600"></p>
<p>With the rapid development of our country’s economy, people’s income has been greatly improved, and many people’s &#8220;money concept&#8221; has also undergone certain changes. After solving the &#8220;supply and clothing&#8221; problem, many people have turned their attention to a higher level. Spiritual desire.</p>
<p>A related report shows that among the younger generation interviewed, young people between the ages of 18 and 34 have an average monthly savings of 994 yuan, and this data has dropped significantly compared with 2018.</p>
<p>Earlier, other data showed that there are about 560 million people in my country with zero deposits, and many young people even have a lot of debt. Is it true that everyone is really out of money? In this regard, some people in the industry said that it is not that Chinese people have no money, but that many people&#8217;s consumption concepts have changed slightly.</p>
<p><img decoding="async" src="https://p4.itc.cn/images01/20210615/cdcf06ff2a5a4783a59c7fd5d69d15ed.jpeg" max-width="600"> </p>
<p> Nowadays, many young people in our country have no longer the old generation&#8217;s &#8220;have surplus food in their hands, but don&#8217;t panic&#8221;. These people are more inclined to enjoy the present and hold the attitude of &#8220;wine and drunk now&#8221;. .</p>
<p>There are even many young people who say that there is no difference between &#8220;no deposit&#8221; and deposit. After all, no matter whether you choose the former or the latter, the purpose is the same, all for a better life, but is that true? ? In this regard, some experts said that in another five years, the gap will be clear at a glance.</p>
<p>Those who choose &#8220;have surplus food in their hands&#8221; may be more &#8220;stretched&#8221; in their current lives in order to live better in the future, but such people are often full of enthusiasm in their lives, and their lives may be more planned. After another five years, they will be able to save a certain amount, which is a certain gap between the lives of those who choose not to save.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210615/78228815667d479c934f05285dfabd1a.jpeg" max-width="600"></p>
<p>Those who choose &#8220;who are drunk now&#8221; should be able to live a good life if they have a stable job. However, after another five years, their wealth and savings may not change much, and once they become unemployed And so on, his life may become difficult.</p>
<p>In addition, people who choose &#8220;who are drunk today&#8221; may be inferior to the former in response to emergencies due to their relatively &#8220;discrete&#8221; attitude towards life.</p>
<p>What&#8217;s more, “from frugality to luxury is easy, and from luxury to frugality is difficult”. Those who choose not to save, if they maintain a “discrete” attitude for a long time, once they develop the habit of “going idle” and spending money lavishly, they may become “leisure”. Indebted&#8221;.</p>
<p>Of course, different people need different things, whether they choose to deposit or &#8220;no deposit&#8221;, this is a kind of personal perception of current life.</p>
<p><img decoding="async" src="https://p1.itc.cn/images01/20210615/2f1d5dd29cee489c9b1bd097f730e1b0.jpeg" max-width="600"></p>
<p>However, as the saying goes, &#8220;Young and strong don&#8217;t work hard, and the boss is sad.&#8221; In many cases, for young people, &#8220;holding surplus food&#8221; is still more important. What do you think about this?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23033</post-id>	</item>
		<item>
		<title>Netizens &#8216;gasp&#8217; at the Hoe Nhai steak with only half a hand, but it&#8217;s true to every detail: The egg must be burned to the side!</title>
		<link>https://en.spress.net/netizens-gasp-at-the-hoe-nhai-steak-with-only-half-a-hand-but-its-true-to-every-detail-the-egg-must-be-burned-to-the-side/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 04:02:12 +0000</pubDate>
				<category><![CDATA[Cuisine]]></category>
		<category><![CDATA[Burnt steam]]></category>
		<category><![CDATA[Clay]]></category>
		<category><![CDATA[Divided by two]]></category>
		<category><![CDATA[Egg]]></category>
		<category><![CDATA[Fire]]></category>
		<category><![CDATA[Fried egg]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Gourmet]]></category>
		<category><![CDATA[Group Love Kitchen]]></category>
		<category><![CDATA[Hoe Nhai]]></category>
		<category><![CDATA[kitchen]]></category>
		<category><![CDATA[QUALITY NGUYEN]]></category>
		<category><![CDATA[rate]]></category>
		<category><![CDATA[Steak]]></category>
		<category><![CDATA[To every detail]]></category>
		<guid isPermaLink="false">https://en.spress.net/netizens-gasp-at-the-hoe-nhai-steak-with-only-half-a-hand-but-its-true-to-every-detail-the-egg-must-be-burned-to-the-side/</guid>

					<description><![CDATA[Looking at this steak, gourmets know what it is and where it is sold. Not only sharing recipes or cooking experiences, the Kitchen Love group recently also has extremely cute &#8220;super products&#8221; of food. What makes people admire the most is that these products, even though they are molded from clay, are completely handmade by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Looking at this steak, gourmets know what it is and where it is sold.</strong><br />
<span id="more-22168"></span> Not only sharing recipes or cooking experiences, the Kitchen Love group recently also has extremely cute &#8220;super products&#8221; of food. What makes people admire the most is that these products, even though they are molded from clay, are completely handmade by hand, but are realistic in every detail.</p>
<p> Typically, recently, the post about beef steak has made netizens admire each other. In less than an hour, this post received nearly 3k likes and hundreds of comments. And the most interesting thing is that looking at this tiny product, everyone immediately remembers a famous dish in Hanoi, which is Hoe Nhai steak. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_101_39126679/2e2d0a5e061cef42b60d.jpg" width="625" height="500"> According to the share of the owner of these photos, Ms. Nhu Quynh Nguyen, this product is made from clay, mixed colors and resin. It is known that to make this steak tray, it took Quynh more than 1 day to make every little detail in it. Except for the aluminum tray, all of them are made by the owner himself. You can see the feat of making each piece of potato in detail, the bread is broken in half, the fried egg on the edge or the chili sauce&#8230; That makes the netizens admire each other. <em> &#8211; Oh, at first, I thought it was a cold day that you made beef steak. After reading it, I know the tiny food. Love so much.</em> <em> &#8211; The fried egg is still a bit burnt, it&#8217;s amazing. </em> <em> &#8211; Oh my god, looking at the omelet, my eyes are round and flat.</em> <em> &#8211; It looks so magical!</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_101_39126679/f51ad469d82b3175683a.jpg" width="625" height="353"> Looking at this product, many people immediately realize that this is Hoe Nhai steak &#8211; a very famous steakhouse in Hanoi that almost all gourmets know. Currently, this post still attracts the attention of many netizens. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_101_39126679/e19ffeecf2ae1bf042bf.jpg" width="625" height="407"> <em> Source: Nhu Quynh Nguyen/ Love Kitchen Group (Esheep Kitchen family)</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22168</post-id>	</item>
		<item>
		<title>Apple just issued an important warning iPhone users need to know</title>
		<link>https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 11:23:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[ASN]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[I O]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPHONE IPAD]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[OTA]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Sean Wright]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Smooth]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</guid>

					<description><![CDATA[Users should update their iPhone software immediately, even if their device is running smoothly. On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious. This means that users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Users should update their iPhone software immediately, even if their device is running smoothly.</strong><br />
<span id="more-20023"></span> On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious.</p>
<p> This means that users should update their iPhone immediately, even if their device is running smoothly. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/db01fa42ed00045e5d11.gif" width="625" height="416"> <em> (Photo courtesy: Guardsquare)</em> Accordingly, iOS 14.6 contains patches for 43 security holes, with some of which are considered to need serious attention. Apple&#8217;s support document says the update addresses a number of security vulnerabilities that could allow attackers to remotely execute code on a device. In a sharing with Forbes, security expert Sean Wright said the security flaws &#8211; which have been resolved in the latest iOS update &#8211; are &#8220;pretty bad to get.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/c957fe14e95600085947.jpg" width="625" height="409"> <em> (Artwork: NewsBeezer)</em> While there is no indication that any of the security vulnerabilities Apple lists have been actively exploited, iPhone/iPad users should update their devices as soon as possible. Apple notes that some of the vulnerabilities were discovered by security researchers working for Trend Micro, a multinational cybersecurity company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/155321103652df0c8643.jpg" width="625" height="374"> <em> (Artwork: Getty Images/iStockphoto)</em> Some of the security and performance issues that have been fixed by the listed update include: &#8211; A memory corruption issue in the ASN decoder affecting the handling of manually generated certificates can lead to arbitrary code execution. &#8211; Audio problems related to the processing of audio files loaded with malware that can lead to arbitrary code execution. &#8211; ImageIO interferes with the processing of an image loaded with malware that can lead to arbitrary code execution. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/48fe77bd60ff89a1d0ee.jpg" width="625" height="416"> <em> (Artwork: PhoneArena)</em> The kernel allows a malicious application to execute arbitrary code with system kernel privileges. &#8211; The I/O pattern affects handling of a manually generated USD file that can lead to unexpected application termination or arbitrary code execution. &#8211; WebKit affects the processing of web content with malware installed that can lead to scripting on multiple sites. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/d074ed37fa75132b4a64.jpg" width="625" height="468"> <em> (Artwork: Rahul Chakraborty / Unsplash)</em> Currently, iOS 14-compatible iPhone/iPad users can download the iOS 14.6 and iPadOS 14.6 updates for free via the OTA protocol. To update to iOS 14.6, users need to access the app <strong> Setting</strong> => <strong> General settings</strong> => <strong> Software updates</strong> .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20023</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>Hackers in Vietnam are on the rise</title>
		<link>https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Wed, 26 May 2021 14:20:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Complicated developments]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Kong]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subset]]></category>
		<category><![CDATA[Traditional approach]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</guid>

					<description><![CDATA[In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230; Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230;</strong><br />
<span id="more-18353"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_3_38951174/fc0f0f191b5bf205ab4a.jpg" width="625" height="416"> </p>
<p> Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of remote working. This manifests itself in large-scale and increasingly complex attacks. Hackers perform an average of 50 million password attacks per day, 579 attacks per second. <strong> AGAINST MALWARE AND RAMSOMWARE WITH DEVELOPMENT</strong> Microsoft&#8217;s telemetry results released over the weekend showed that the prevalence of malware and ransomware infections in Asia-Pacific has been increasing over the past 18 months, stretching back to before the Covid-19 pandemic. -19 outbreak to date. Specifically, in Australia it is 23%; China is 80%; India 15%; Japan 16%; New Zealand 19%, Singapore 43%, Hong Kong 38%, South Korea 22%, Malaysia 2%, Philippines 15%, Taiwan 16%, Thailand 3% and Vietnam 7%. Among them, Indonesia alone has a 24% decrease in malware infection rate. The number of cyber attacks and the number of Vietnamese IP addresses in botnets increased in March 2021 due to hackers taking advantage of the increasing demand for Internet use by users as well as people&#8217;s interest in translation information. Covid-19. During the same period, the number of ransomware infections (a subset of malware) also increased by 453% in Australia; China (463%); India (100%); Japan (541%); New Zealand (825%); Singapore (296%), Hong Kong (179%), Indonesia (31%), South Korea (64%), Malaysia (72%), Philippines (70%), Taiwan (407%), Thailand (6%) ). This figure in Vietnam is recorded at 15%. In Vietnam, in March 2021 alone, the Information Security Administration recorded 491 incidents of cyber attacks on information systems, an increase of 8.15% compared to February 2021. In which, the number of Malware attacks is 180, while Phishing and Deface attacks are 164 and 147, respectively. In the first quarter of 2021, although compared to the same period in 2020, the number of cyberattacks causing problems on information systems decreased by 20%, but from the beginning of 2021 to now, the number of cyberattack incidents has decreased by 20%. is still in an uptrend. Experts believe that the reason for the increase in the number of cyberattacks and the number of Vietnamese IP addresses in botnets in March 2021 was because hackers took advantage of users&#8217; increasing demand for Internet use as well as the interest People&#8217;s attention to information about Covid-19 epidemic. Therefore, the number of Phishing and Malware attacks on systems has increased to cheat, destroy and steal information illegally&#8230; It can be seen that, in the context of complicated epidemic developments, when more and more organizations, businesses and individual users work remotely, work from home, they are creating an environment for bad guys to exploit vulnerabilities, Attacks, information theft, large-scale cyberattacks take place in Vietnam and around the world. <strong> ABOUT 3.5 MILLION SECURITY PROFESSIONALS IN 2021</strong> Experts say that even as more people begin returning to the office, hybrid work is forecast to remain the norm in the future. According to Forrester, as people gradually settle into a new working model after the pandemic, we will still see an increase in the proportion of employees working remotely compared to before the pandemic, at 300%. And the current Job Trends Index report shows that 53% of respondents in Asia plan to move to a new place because they can work remotely, compared to 46 percent globally. %. That change has been demanding an urgent need for new security solutions to meet the way of working, especially when the network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. Organizations and businesses need to take data and authentication as the center. While there are many other ways to secure these days, addressing identity, authentication, and information management issues is still critical. Experts have pointed out 4 main pillars to protect users against new work era cyber threats, including: identity protection, Zero Trust mindset, cloud application, and resource investment. security personnel. The network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. As recent attacks have shown, identity will be the &#8220;battlefield&#8221; for future attacks. Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal said that, in a world where identity is the new battleground, adopting a Zero Trust strategy has become a must for businesses. Karma. The hybrid workplace is virtually borderless, so it&#8217;s important to establish protective &#8220;barriers&#8221; around identities and devices. As part of his journey to building a Zero Trust mindset, the expert emphasized that “passwordless authentication will be the trend of the future and that transformation will be seen this year”. Besides the application of technology, experts also emphasize the special importance of people and skills in ensuring information security of each business organization. However, the lack of security professionals and the lack of diversity in security teams are two weaknesses that attackers will find to hit next year, the expert said. It is estimated that the information security industry will be short of about 3.5 million security professionals this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18353</post-id>	</item>
		<item>
		<title>Launching 5-layer protection solution, attack prevention for digital transformation</title>
		<link>https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Wed, 19 May 2021 12:25:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Launching]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[transformation]]></category>
		<category><![CDATA[Unnecessary]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</guid>

					<description><![CDATA[Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation. Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation.</strong><br />
<span id="more-16156"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38803011/5b5d6bf475b69ce8c5a7.jpg" width="625" height="375"> </p>
<p> Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. This set of solutions is applied artificial intelligence (AI) to kill viruses even without updating the identification pattern, especially integrating a series of new technologies to protect personal information and user data. Specifically, the set of AI application solutions aims to create a 5-layer protection system including: The network layer is responsible for protecting and monitoring all incoming and outgoing network connections; operating system layer to monitor and detect operating system vulnerabilities; the data layer is responsible for protecting and monitoring changes to data or system configuration; application layer that monitors the behavior and vulnerabilities of applications; The user layer helps ensure enforcement of information security policies. According to Mr. Vu Ngoc Son, Vice President in charge of anti-malware of Bkav, the new version of AI technology applied in Bkav 2021 can identify malicious code up to 99.9% as well as reduce the ability to &#8220;catch&#8221;. clean files down to approximately 0%. This new technology also optimizes performance 144% more than the previous 2020 version. The business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard, helping businesses get an overall picture of the periodic protection situation by week, month, and year, including the number of scanned files. , number of files are malicious code, number of controlled connections, number of dangerous connections blocked, rate of infected malware types, number of times to prevent data encryption, spy attacks, number of holes OS vulnerabilities&#8230; Customers who already have a license will be automatically upgraded to the new version for free from May 11, 2021.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16156</post-id>	</item>
		<item>
		<title>Users are crazy about missing iOS updates</title>
		<link>https://en.spress.net/users-are-crazy-about-missing-ios-updates/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Wed, 19 May 2021 11:15:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Crazy]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Feedback]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IOS 14 5 1]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 11]]></category>
		<category><![CDATA[IPhone 12]]></category>
		<category><![CDATA[IPhone Xr]]></category>
		<category><![CDATA[Missing]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-are-crazy-about-missing-ios-updates/</guid>

					<description><![CDATA[Apple&#8217;s latest iOS 14.5.1 update is receiving bad feedback from users when it causes many errors when used. The iOS 14.5.1 update was released by Apple on May 4 to fix two dangerous vulnerabilities that, according to Apple, have been exploited by hackers. Specifically, it fixes a pair of zero-day vulnerabilities in WebKit that could [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Apple&#8217;s latest iOS 14.5.1 update is receiving bad feedback from users when it causes many errors when used.</strong><br />
<span id="more-16139"></span> The iOS 14.5.1 update was released by Apple on May 4 to fix two dangerous vulnerabilities that, according to Apple, have been exploited by hackers. Specifically, it fixes a pair of zero-day vulnerabilities in WebKit that could allow maliciously generated web content to result in arbitrary code execution. The first vulnerability is caused by a memory corruption issue, while the second is caused by an integer overflow.</p>
<p> However, this update is causing many iPhone users to face more serious problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_5_38802520/013acde8d3aa3af463bb.jpg" width="625" height="414"> <em> Apple&#8217;s iOS 14.5.1 update received a bad response.</em> According to users&#8217; feedback, the iPhone after updating to iOS 14.5.1 often exits the application suddenly while in use, the applications also load longer, the response of the device is also slower. The iOS 14.5.1 update is also said to be the cause of the iPhone 12&#8217;s performance loss of up to 60% through a series of tests on the Geekbench measuring tool, the iPhone 12 (iOS 14.5) reached 1,583 single-core points and 3,967 multi-core points. kernel, while the corresponding scores of iPhone 12 (iOS 14.5.1) are 1,478 and 2,339. Similarly, the scores on the iPhone 11 (iOS 14.5) are 1,318 and 3,019, while the iPhone 11 (iOS 14.5.1) is 794 and 1,271. The performance scores of the iPhone XR (iOS 14.5.1) are 1,105 and 2,085, while the iPhone 7 (iOS 14.5.1) is 728 and 1,291. Performance is even worse than the &#8220;old&#8221; elder brother iPhone XR born in 2018.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16139</post-id>	</item>
		<item>
		<title>At first glance, it looks like an old garage, when you enter, you will be overwhelmed by the impressive space everyone wants to live in</title>
		<link>https://en.spress.net/at-first-glance-it-looks-like-an-old-garage-when-you-enter-you-will-be-overwhelmed-by-the-impressive-space-everyone-wants-to-live-in/</link>
		
		<dc:creator><![CDATA[Ngọc Huyền – Theo tips-and-tricks]]></dc:creator>
		<pubDate>Wed, 19 May 2021 03:00:06 +0000</pubDate>
				<category><![CDATA[Architecture]]></category>
		<category><![CDATA[Architect]]></category>
		<category><![CDATA[Bordeaux]]></category>
		<category><![CDATA[Corrugated iron sheet]]></category>
		<category><![CDATA[Dark]]></category>
		<category><![CDATA[Dirty]]></category>
		<category><![CDATA[Enter]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Garage]]></category>
		<category><![CDATA[glance]]></category>
		<category><![CDATA[Haven]]></category>
		<category><![CDATA[House]]></category>
		<category><![CDATA[Impressive]]></category>
		<category><![CDATA[Live]]></category>
		<category><![CDATA[Messy]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[Open space]]></category>
		<category><![CDATA[Overwhelmed]]></category>
		<category><![CDATA[Rust]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[Square]]></category>
		<category><![CDATA[Storehouse]]></category>
		<category><![CDATA[The light]]></category>
		<category><![CDATA[Unexpected]]></category>
		<category><![CDATA[Wardrobe]]></category>
		<category><![CDATA[Wet]]></category>
		<guid isPermaLink="false">https://en.spress.net/at-first-glance-it-looks-like-an-old-garage-when-you-enter-you-will-be-overwhelmed-by-the-impressive-space-everyone-wants-to-live-in/</guid>

					<description><![CDATA[Unexpectedly, inside the old garage was a beautiful little house. When thinking about a warehouse or a garage, most people think of it as a dark, damp, and musty place. But this 41 square meter house is different. French photographer Jeremy Buchholz didn&#8217;t have the money to buy an apartment in Bordeaux, so he decided [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unexpectedly, inside the old garage was a beautiful little house.</strong><br />
<span id="more-16005"></span> When thinking about a warehouse or a garage, most people think of it as a dark, damp, and musty place. But this 41 square meter house is different.</p>
<p> French photographer Jeremy Buchholz didn&#8217;t have the money to buy an apartment in Bordeaux, so he decided to buy an abandoned garage and turn it into a great hideaway. This old garage has a big corrugated iron door and inside is a messy, dirty room. So, Jeremy Buchholz called his friend architect Matthieu de Marien, who specializes in renovating shops, offices and other spaces into homes. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/057962ed7baf92f1cbbe.jpg" width="625" height="418"> The front of the garage was formerly a rusted white corrugated board and has now been replaced with a sturdy sliding wood panel. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/b0aecb3ad2783b266269.jpg" width="625" height="414"> Stepping into the house, you will gasp in surprise. The living space is very cozy and beautifully decorated, different from the outside. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/40543cc02582ccdc9593.jpg" width="625" height="415"> To make the space feel larger, De Marien created a “home within a house”: a large piece of furniture that includes a small bathroom, bedroom, desk, wardrobe, chair sofa and storage. All space is designed in this large furniture box. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/a80dd799cedb27857eca.jpg" width="625" height="363"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/30f640625920b07ee931.jpg" width="625" height="464"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/503e23aa3ae8d3b68af9.jpg" width="625" height="414"> The rest of the house is open plan with kitchen, dining area, living room and front yard. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_17_276_38873995/945ae6ceff8c16d24f9d.jpg" width="625" height="414"> Indoor skylights both bring in more natural light and create a more open feel.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16005</post-id>	</item>
		<item>
		<title>Bkav 2021 solution set, 5-layer protection technology for AI applications</title>
		<link>https://en.spress.net/bkav-2021-solution-set-5-layer-protection-technology-for-ai-applications/</link>
		
		<dc:creator><![CDATA[KIM THANH]]></dc:creator>
		<pubDate>Tue, 18 May 2021 17:06:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[Anti Malware]]></category>
		<category><![CDATA[Antivirus program]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Endpoint Enterprise]]></category>
		<category><![CDATA[Endpoint SME]]></category>
		<category><![CDATA[Endpoint Total]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/bkav-2021-solution-set-5-layer-protection-technology-for-ai-applications/</guid>

					<description><![CDATA[Today, May 11, Bkav Technology Group officially launched the Bkav 2021 solution set with 5-layer protection technology, attack prevention for digital transformation. The product suite includes anti-virus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. New solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Today, May 11, Bkav Technology Group officially launched the Bkav 2021 solution set with 5-layer protection technology, attack prevention for digital transformation. The product suite includes anti-virus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses.</strong><br />
<span id="more-15884"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_17_38807519/4dc3db05c5472c197556.jpg" width="625" height="464"> </p>
<p> <em> New solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system</em> The new solution Bkav 2021 applies Artificial Intelligence to create a 5-layer protection system, helping businesses and individual users closely protect the digital environment and digital data. The main protection layers of Bkav 2021 include the Network Layer that protects and monitors all incoming and outgoing network connections. The operating system layer monitors and detects operating system vulnerabilities. The data layer is responsible for protecting and monitoring changes to data or system configuration. The application layer performs behavioral and vulnerability monitoring of applications. Finally, the User Layer helps ensure the enforcement of information security policies. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_17_38807519/5d26c1e0dfa236fc6fb3.jpg" width="625" height="860"> The manufacturer said that the new version of Artificial Intelligence technology applied in Bkav 2021 has enhanced the ability to identify malicious code by up to 99.9% as well as reduce the possibility of mistakenly catching clean files to approximately 0. %. Bkav&#8217;s new technology is also 144% more efficient than the previous 2020 version. In particular, the business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard. Businesses will get an overall picture of the protection situation periodically by week, month, and year, including the number of scanned files, the number of malicious files, the number of controlled connections, and the number of blocked dangerous connections. , the rate of infected malicious code, the number of times to prevent data encryption, spying attacks, the number of operating system vulnerabilities&#8230; Bkav Endpoint is provided in 3 versions, suitable for different sizes of businesses, including Endpoint SME for small and medium scale, Endpoint Enterprise for large scale and Endpoint Total for very large scale. Vu Ngoc Son, Vice President in charge of Anti-Malware of Bkav, said: “Bkav 2021&#8217;s 5-layer protection system provides comprehensive protection and does not miss any risks. At the same time, the system is also equipped with centralized administration features and periodic reports to help agencies, businesses and users always know the latest overview and details about the computer virus situation. in the whole system, so that they can really feel secure and actively participate in the digital transformation process”.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15884</post-id>	</item>
		<item>
		<title>Knowing this, you&#8217;ll want to update Google Chrome right away</title>
		<link>https://en.spress.net/knowing-this-youll-want-to-update-google-chrome-right-away/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 16 May 2021 18:41:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[API]]></category>
		<category><![CDATA[AURA]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Chrome 89]]></category>
		<category><![CDATA[Chrome 90]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[Data tracing machine]]></category>
		<category><![CDATA[Fixes]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[knowing]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Offline]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Tab]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[Web browser]]></category>
		<category><![CDATA[youll]]></category>
		<guid isPermaLink="false">https://en.spress.net/knowing-this-youll-want-to-update-google-chrome-right-away/</guid>

					<description><![CDATA[Chrome 90 version released by Google recently patched a total of 19 vulnerabilities affecting this web browser. Recently, Google announced another patch for Chrome, which addresses a total of 19 vulnerabilities affecting this web browser. The latest version of Chrome &#8211; 90.0.4430.212 &#8211; is available for Windows, Mac and Linux users. Updates for Android and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Chrome 90 version released by Google recently patched a total of 19 vulnerabilities affecting this web browser.</strong><br />
<span id="more-15070"></span> Recently, Google announced another patch for Chrome, which addresses a total of 19 vulnerabilities affecting this web browser.</p>
<p> The latest version of Chrome &#8211; 90.0.4430.212 &#8211; is available for Windows, Mac and Linux users. Updates for Android and iOS phones of the browser have also been released. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38819220/d4630ede119cf8c2a18d.jpg" width="625" height="391"> <em> (Image: Shutterstock / XanderSt)</em> Of the 19 vulnerabilities patched in this release, 15 have been reported by 3rd party security researchers, of which 13 are rated high severity and 2 vulnerabilities are rated as medium severity. The parts of Chrome affected by these issues include: Installing apps over the web; offline mode; media feeds; Aura; tab group; notification; V8; autofill; File API; history, reading mode; payment and tab strip. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38819220/1edaca67d5253c7b6534.jpg" width="625" height="350"> <em> (Photo: Gadgets To Use)</em> As usual, the company will not release details of the bugs that have been patched until the fixes are sent to most users. In its recommendation, Google does not mention that any of these vulnerabilities are exploited in online attacks. However, over the past few months, the Internet search giant has released patches for a number of dangerous zero-day vulnerabilities appearing in the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38819220/009f2f223060d93e8071.jpg" width="625" height="312"> <em> (Photo: MakeUseOf)</em> In March, Google released an urgent fix to address CVE-2021-21193, a dangerous zero-day vulnerability. In April, the company released patches for the CVE-2021-21206 and CVE-2021-21220 (in Chrome 89) and CVE-2021-21224 (Chrome 90) series of vulnerabilities. Back in April, a Chromium vulnerability (in the V8 JavaScript engine) was announced before patches were sent to Chrome and Microsoft Edge users. In the same month, Google also patched another critical bug in V8. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38819220/d0dff562ea20037e5a31.jpg" width="625" height="416"> <em> (Photo: Lesterman/Shutterstock)</em> Chrome users should install the recently released security update to prevent any possible attacks. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38819220/bc7f9ec2818068de3191.jpg" width="625" height="783"> <em> To update the Google Chrome browser, click the menu icon (3 dots) in the upper right corner, then select Help > About Chrome (about Chrome). After the update is complete, click Relaunch to restart the browser.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15070</post-id>	</item>
		<item>
		<title>New &#8216;Ghost&#8217; in Intel and AMD CPUs</title>
		<link>https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</link>
		
		<dc:creator><![CDATA[HOÀNG THY (Theo Thehackernews)]]></dc:creator>
		<pubDate>Sun, 16 May 2021 18:11:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[CPUs]]></category>
		<category><![CDATA[Cushion]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Equidistant]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[ghost]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intel CPU]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[path]]></category>
		<category><![CDATA[Processor]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[San Diego]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[SPECTER]]></category>
		<category><![CDATA[The spectre]]></category>
		<category><![CDATA[University of California]]></category>
		<guid isPermaLink="false">https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</guid>

					<description><![CDATA[When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time. The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO Indeed, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time.</strong><br />
<span id="more-15060"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_418_38819288/08f0b3e5ada744f91db6.jpg" width="625" height="351"> </p>
<p> <em> The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO</em> Indeed, 3 years have passed, and there is still no end to the vulnerability. Meanwhile, experts from the University of Virginia and the University of California, San Diego, have discovered a new attack method that bypasses all current Specter protections built into the chip. This attack method has the potential to put almost any system &#8211; desktops, laptops, cloud servers and smartphones &#8211; once again at risk. Revealing Specter ushered in a wave of more powerful attacks, allowing malicious code to directly read passwords, encryption keys, and other valuable information from the computer&#8217;s kernel memory. Although chip manufacturers such as Intel, ARM and AMD already know this and combine defenses to reduce the threat from vulnerabilities, the methods have not yielded the desired effect. A Specter attack is capable of tricking the processor into executing instructions along a wrong path, the researchers say. Even though the processor recovers and completes its task correctly, hackers can still access confidential data while the processor goes in the wrong direction. The new attack method exploits what is called a micro-operator buffer (called micro-ops), an on-chip component that breaks machine instructions into simpler instructions and speeds up computation, like a secondary channel to reveal confidential information. Micro-op cache is built into Intel processors, manufactured since 2011. According to researchers at the University of Virginia, Intel&#8217;s defense proposal against Specter (called LFENCE) is to place sensitive code in a waiting area until security checks are done and only then the code Only sensitive is allowed to execute. However, research has shown how attackers can steal information through micro-op caching and use it as a secret channel. Although exploiting the Specter vulnerability is very difficult, the researchers say that with computers with a lot of sensitive data, hackers do not mind the difficulty. To protect the system from the new attack, the researchers propose to clear the micro-ops cache. This is a technical solution that comes at the expense of performance benefits. According to the researchers, micro-op caching has some dangerous effects. First, it ignores all caching reduction techniques such as side channels. Second, attacks in this zone go undetected like an existing attack or malware. Third, because the micro-op cache is at the front of the path, prior to execution, Intel&#8217;s Specter protections or recommendations to limit cache updates are still compromised. public.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15060</post-id>	</item>
		<item>
		<title>Kanye West&#8217;s Yeezy sandals sold out for a day</title>
		<link>https://en.spress.net/kanye-wests-yeezy-sandals-sold-out-for-a-day/</link>
		
		<dc:creator><![CDATA[Dĩ An]]></dc:creator>
		<pubDate>Sun, 09 May 2021 20:53:06 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[Adidas]]></category>
		<category><![CDATA[Beat box]]></category>
		<category><![CDATA[Cardi B]]></category>
		<category><![CDATA[Day]]></category>
		<category><![CDATA[Expensive]]></category>
		<category><![CDATA[Fire]]></category>
		<category><![CDATA[Fox News]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Kanye]]></category>
		<category><![CDATA[Kanye West]]></category>
		<category><![CDATA[Lil Nas X]]></category>
		<category><![CDATA[Nike]]></category>
		<category><![CDATA[Nursing]]></category>
		<category><![CDATA[Praise]]></category>
		<category><![CDATA[Rapper]]></category>
		<category><![CDATA[REEBOK]]></category>
		<category><![CDATA[sandals]]></category>
		<category><![CDATA[Shoe model]]></category>
		<category><![CDATA[Shoes]]></category>
		<category><![CDATA[Slippers]]></category>
		<category><![CDATA[sold]]></category>
		<category><![CDATA[Sold out]]></category>
		<category><![CDATA[Teen Vogue]]></category>
		<category><![CDATA[Travis Scott]]></category>
		<category><![CDATA[Wests]]></category>
		<category><![CDATA[YEEZY]]></category>
		<guid isPermaLink="false">https://en.spress.net/kanye-wests-yeezy-sandals-sold-out-for-a-day/</guid>

					<description><![CDATA[Besides compliments, many people believe that the new line of sandals from male rapper has a normal design but is expensive. On the morning of April 27, Fox News reported that Kanye West&#8217;s Yeezy Slide line of shoes in partnership with adidas sold out on the same day after appearing on the sportswear website. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Besides compliments, many people believe that the new line of sandals from male rapper has a normal design but is expensive.</strong><br />
<span id="more-12753"></span> On the morning of April 27, <em> Fox News</em> reported that Kanye West&#8217;s Yeezy Slide line of shoes in partnership with adidas sold out on the same day after appearing on the sportswear website. The male rapper did not promote this line of sandals on his personal pages.</p>
<p> The slippers retail for $ 35 for infants, $ 45 for children, and $ 60 for adults. Besides brown and beige two-tone safety, customers who love the highlight can opt for pastel green sandals. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_27_119_38648608/595f3008174afe14a75b.jpg" width="625" height="749"> <em> The Yeezy Slide sandals sold out quickly. Screenshots. </em> The brand quickly informed customers that the Yeezy Slide will be added at some point in June. Under the post, many people share pictures and videos of successful purchases. Meanwhile, other users expressed frustration at having to wait longer. However, not everyone loves this line of sandals. Some people confuse it: &#8220;Why would anyone love that sandals? Its price is quite expensive compared to the design&#8221;. &#8220;I think the nursing home bought the whole thing,&#8221; another account left humorous comments. Previously, Yeezy sandals were released in the summer of 2020 and winter of 2019. The reaction of the online community is no different now. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_27_119_38648608/c876a02187636e3d3772.jpg" width="625" height="766"> <em> Yeezy sandals version is released in the summer of 2020. Photo: @highsnobietysneakers. </em> Kanye started partnering with adidas in 2015 from sneakers that cost several hundred dollars. Over the years, the rapper has vowed to make products more affordable, according to the report <em> Teen Vogue</em> . In July 2020, Kanye signed a 10-year contract with Gap to create affordable clothing lines &#8211; a move many other rappers have done with brands. For example, Cardi B with Reebok or Travis Scott vs. Jordan. <em> <strong> Break the box of Satan shoes for $ 1,018</strong> </em> <em> Lil Nas X&#8217;s shoe model was controversial, even sued by Nike, but still attracted customers. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12753</post-id>	</item>
		<item>
		<title>Kanye West authorized Balenciaga to design the shirt</title>
		<link>https://en.spress.net/kanye-west-authorized-balenciaga-to-design-the-shirt/</link>
		
		<dc:creator><![CDATA[Phương An]]></dc:creator>
		<pubDate>Sun, 09 May 2021 13:10:07 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[Authority]]></category>
		<category><![CDATA[authorized]]></category>
		<category><![CDATA[Balenciaga]]></category>
		<category><![CDATA[Blue]]></category>
		<category><![CDATA[DAZED]]></category>
		<category><![CDATA[Design]]></category>
		<category><![CDATA[DMX]]></category>
		<category><![CDATA[donations]]></category>
		<category><![CDATA[Dying]]></category>
		<category><![CDATA[Font]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Grave]]></category>
		<category><![CDATA[Kanye]]></category>
		<category><![CDATA[Kanye West]]></category>
		<category><![CDATA[Layout]]></category>
		<category><![CDATA[Page Six]]></category>
		<category><![CDATA[Rapper]]></category>
		<category><![CDATA[Registering trademark]]></category>
		<category><![CDATA[Shirt]]></category>
		<category><![CDATA[T shirt]]></category>
		<category><![CDATA[West]]></category>
		<category><![CDATA[YEEZY]]></category>
		<category><![CDATA[Yeezy x Gap]]></category>
		<guid isPermaLink="false">https://en.spress.net/kanye-west-authorized-balenciaga-to-design-the-shirt/</guid>

					<description><![CDATA[A $ 1 million proceeds from the sale of shirts will be donated to the family of the late rapper DMX. Dazed said Kanye West helped donate $ 1 million to the family of the deceased rapper DMX through the sale of tribute T-shirts. DMX just passed away on April 9. According to sources, through [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A $ 1 million proceeds from the sale of shirts will be donated to the family of the late rapper DMX.</strong><br />
<span id="more-12671"></span> <em> Dazed</em> said Kanye West helped donate $ 1 million to the family of the deceased rapper DMX through the sale of tribute T-shirts. DMX just passed away on April 9.</p>
<p> According to sources, through the Yeezy brand, West authorized Balenciaga to design the T-shirt and sell it for $ 200. Within 24 hours, this product is reported &#8220;out of stock&#8221;. Balenciaga says it will return the net profit to the DMX family. At the memorial service, West kept a solemn attitude. He also assists with stage staging. Additionally, the 1970-born rapper recruits visual artist Akeem Smith to help design the layout. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_119_38644937/8702c07ae7380e665729.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_119_38644937/423807402002c95c9013.jpg" width="625" height="625"> <em> Kanye West authorized Balenciaga to design a shirt to honor his dead friend. Photo: @dmx.</em> Other way, <em> Page Six</em> reported on April 16, West&#8217;s company applied for an official logo registration application for the upcoming Yeezy x Gap fashion line. In addition to the rounded edges and the letter &#8220;YZY&#8221; in the center, the white typeface on a navy blue background bears a resemblance to the Gap&#8217;s longstanding logo. This image was posted by West on his personal page when he announced a surprise 10-year partnership in June 2020. According to the April 9 trademark application, the partnership may include clothing, shoes, hats, accessories, and bags. However, an official release date for the collection has yet to be announced. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_119_38644937/39487a305d72b42ced63.jpg" width="625" height="327"> <em> The official Yeezy x Gap logo is trademarked. Photo: World Architecture Festival. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12671</post-id>	</item>
		<item>
		<title>IOS users should immediately turn off AirDrop</title>
		<link>https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 06 May 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hashing]]></category>
		<category><![CDATA[Ignored]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[USB C]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</guid>

					<description><![CDATA[User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch. According to the Mashable The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch.</strong><br />
<span id="more-11904"></span> According to the <em> Mashable</em> The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the Technical University of Darmstadt, have warned Apple about this dangerous vulnerability since May. 2019 but the company still ignored it. About 1.5 billion devices are still unpatched.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/6f599621b063593d0072.jpg" width="625" height="351"> <em> Hackers can obtain sensitive user&#8217;s information through the vulnerability in AirDrop. Photo: TU Darmstadt. </em> &#8220;An attacker could obtain a user&#8217;s phone number and email through AirDrop,&#8221; the team said. &#8220;They just need to use a device with Wi-Fi capable, reach the target at close range to start the mining process by opening the sharing feature on iOS or macOS device.&#8221; According to the <em> 9to5mac</em> There are two steps in the mechanism of AirDrop action leading to this critical vulnerability. First, in order to provide users with the option &#8220;Contacts Only&#8221; in the AirDrop sharing feature, Apple devices silently collect information on devices within the connection range. To see if the &#8220;other party&#8221; is in the contacts list, AirDrop uses a mutual authentication mechanism, comparing the user&#8217;s phone number and email address with the entries in the address book. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/07bce1c4c7862ed87797.jpg" width="625" height="351"> <em> The device authentication step in the directory can be exploited to get information. Photo: Monica Chin. </em> In the next step, data is exchanged for both parties. Despite encryption, Apple uses a relatively weak hashing mechanism. Security experts can decompile the hash using a simple technique like a brute-force attack. The team addressed the AirDrop vulnerability with a more secure approach, they named PrivateDrop. However, Apple did not move after being warned of the risk of personal information leaks and privacy breaches. In the immediate future, experts from the Technical University of Darmstadt advise users to protect themselves by disabling AirDrop discovery in the system settings and not opening the share menu. The detailed results of the study will be presented at the USENIX security Symposium taking place in August. <em> <strong> Why does iPhone not have USB-C port?</strong> </em> <em> In the past 5 years, USB-C has become the suitable connector for a wide variety of devices such as Android phones, laptops and tablets. However, Apple still doesn&#8217;t make iPhones with USB-C ports.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11904</post-id>	</item>
		<item>
		<title>Apple&#8217;s AirDrop feature isn&#8217;t safe</title>
		<link>https://en.spress.net/apples-airdrop-feature-isnt-safe/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Sun, 02 May 2021 23:45:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[Breaking down]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[isnt]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[OS X Yosemite]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Windows Phone]]></category>
		<guid isPermaLink="false">https://en.spress.net/apples-airdrop-feature-isnt-safe/</guid>

					<description><![CDATA[Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature. Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature. AirDrop is very useful for Apple ecosystem users but is being warned of being insecure. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature.</strong><br />
<span id="more-11163"></span> Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_5_38638799/a5daa9648e2667783e37.jpg" width="625" height="417"> <em> AirDrop is very useful for Apple ecosystem users but is being warned of being insecure.</em> Experts said, AirDrop allows users to share files with Apple devices in contacts. During the process of verifying the connection between devices, AirDrop uses a &#8220;mutual authentication mechanism&#8221; to compare the user&#8217;s phone number and email with the entries in the other device&#8217;s phonebook. Basically, data exchanged via AirDrop is encrypted by Apple, but this security mechanism is assessed by experts as relatively weak. In fact, Apple just scrambles the phone numbers and email addresses exchanged in the process of transmitting through AirDrop. This security mechanism can be easily circumvented using simple techniques like brute-force attacks. Also according to security experts at Technical University of Darmstadt (Germany), the above vulnerability was discovered in May 2019 and has been notified to Apple, but Apple still has no specific patch. to fix the problem. Airdrop is a feature that comes pre-installed on iPhone, iPad or Mac (depending on the version of the operating system). Helps iOS, Mac devices connect together and can easily share files wirelessly with each other very quickly without affecting the quality of the file. Airdrop has been integrated on iPhone, iPod, iPad devices using iOS 7 or higher. Macbook from 2012 with OS X Yosemite (10.0) higher (except Mac Pro mid-2012). In addition, AirDrop cannot be used with other operating systems (Android phones, Windows Phone phones &#8230;).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11163</post-id>	</item>
		<item>
		<title>Solving the problem of human resources and talents in the 4.0 era</title>
		<link>https://en.spress.net/solving-the-problem-of-human-resources-and-talents-in-the-4-0-era/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 09:32:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[age]]></category>
		<category><![CDATA[Artificial intelligence]]></category>
		<category><![CDATA[Bui Khac Linh]]></category>
		<category><![CDATA[CMCN]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[drag]]></category>
		<category><![CDATA[Engineer]]></category>
		<category><![CDATA[era]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[human]]></category>
		<category><![CDATA[Human Resources]]></category>
		<category><![CDATA[LTS]]></category>
		<category><![CDATA[Majority]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Rolling core]]></category>
		<category><![CDATA[Skill]]></category>
		<category><![CDATA[Solving]]></category>
		<category><![CDATA[Talent]]></category>
		<category><![CDATA[talents]]></category>
		<category><![CDATA[The answer]]></category>
		<category><![CDATA[The hammer]]></category>
		<category><![CDATA[The times]]></category>
		<guid isPermaLink="false">https://en.spress.net/solving-the-problem-of-human-resources-and-talents-in-the-4-0-era/</guid>

					<description><![CDATA[Solving the problem of human resources and talents in the 4.0 era From the experience of some successful countries in digital transformation, identifying the characteristics of the 4.0 era, the authors offer a solution to the problem of human resources and talents for Vietnam to successfully convert numbers. LTS: Industrial revolution 4.0 opens a new [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Solving the problem of human resources and talents in the 4.0 era</strong><br />
<span id="more-10546"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_23_38634559/256a18a63fe4d6ba8ff5.jpg" width="625" height="312"> </p>
<p> <strong> <em> From the experience of some successful countries in digital transformation, identifying the characteristics of the 4.0 era, the authors offer a solution to the problem of human resources and talents for Vietnam to successfully convert numbers.</em> </strong> <em> LTS: Industrial revolution 4.0 opens a new era of development. There, a country that cares about building human resources, talent that quickly adapts to the times, knows how to use advanced technology and constantly innovates, that country will win in this fierce competition.</em> We have synergistic advantages that not all countries have. Due to historical circumstances, we have a plentiful amount of overseas Vietnamese intellectual resources. Hundreds of thousands of Vietnamese scientists, experts and engineers are in countries with advanced science, many of whom are great experts, famous professors, and excellent engineers in human intelligence. Create is working for major industrial corporations, leading universities and research institutes in the world. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_23_38634559/9252ae9e89dc608239cd.jpg" width="625" height="337"> <em> Apply advanced data analysis and machine learning to smart fraud management in e-commerce. Photo: idea.gov.vn</em> Another advantage is that currently, we have about 900,000 human resources in the information technology field, there are a large number of engineers in artificial intelligence, data science &#8230; The number of engineers in Blockchain and Fintech is on the rise. These viable factors do not turn into power by themselves, but require wise and creative leadership, organization and combination, knowing how to choose and focus resources on priority goals to create. so the synergy brought the country to a breakthrough. Those advantages are only brought into play when we have a contingent of talented, caring and competent national leaders. <strong> Challenges for human resources</strong> Besides advantages, our human resources have many limitations and weaknesses. Specifically, the number of untrained human resources is too large, accounting for 75% of the workforce, about 45 million people, which is a rather gloomy picture if we do not quickly equip the right skills. The World Economic Forum&#8217;s 2018 report assesses that our human resources are not ready for the 4.0 era, ranked 70 out of 100 countries. Also due to the low skill and nature of labor, our people are vulnerable to technological breakthroughs, losing their jobs and being replaced by automation, intelligent robots, and artificial intelligence. The number of 25% trained also has many problems. Vocational training quality ranks 80/100 countries, only higher than Cambodia (92/100), highly skilled human resources are also in the bottom group, ranking 81/100 countries. We are also close to the penultimate of 90 out of 100 countries in technology and innovation, especially the labor productivity is too low, only 7% of Singapore &#8230; Not to mention that there will be a large number of talented people. to other countries if we do not have a clear improvement in the working environment and regimes, policies &#8230; Furthermore, the manufacturing base is not ready for Industry 4.0, which belongs to the group of the book team, the average score is 4.9 / 10 &#8211; below the average, of which the production structure index is 4.96 / 10. ranked 48/100 countries, production motivation index reached 4.93 / 10, ranked 53rd. <strong> Two difficult human resources problems</strong> In order to bring into play the advantages and to overcome and overcome the challenges, we have to solve 3 very difficult problems at the same time. Firstly, the requirements for developing skilled human resources and talented people who are ready for digital transformation are extremely large, both in quantity and quality, while the education and training system, especially the elite. Study and vocational training are still weak and cannot be overcome overnight. Second, we need to maintain a consistently high GDP growth rate (over 7% / year) to reach the goal of becoming a high-income country by 2045, while the GDP growth momentum tends to slow down. over the 10-year span in the 1991-2018 period as pointed out by economist Tran Dinh Thien. Third, we need to develop and fully exploit advanced technology and constantly innovate, towards an economy based on innovation, increasing productivity, competitiveness and efficiency while The national innovation system is not only weak and stagnant, but also lacks strong enough pressure and motivation, lacks momentum and a favorable environment for development. Thus, we have to clear up growth bottlenecks and create new growth engines, at the same time we have to solve 2 difficult human resources problems to meet the requirements of the digital transformation period. Firstly, quickly equip the right skills for the majority of people to adapt to the digital transformation, and second, build a team of talent transforming core numbers with the spirit of innovation and leadership. the country&#8217;s digital transformation journey. <em> Next period: Blocking skill gaps so as not to be dragged into the 4.0 era </em> <strong> Dr. Pham Manh Hung &#8211; Dr. Bui Khac Linh</strong> <em> (Institute of World Economics and Politics)</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10546</post-id>	</item>
		<item>
		<title>Explore world-class blueberry farms in Canada</title>
		<link>https://en.spress.net/explore-world-class-blueberry-farms-in-canada/</link>
		
		<dc:creator><![CDATA[Ngọc Vy]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 22:04:08 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[BC Blueberries]]></category>
		<category><![CDATA[blueberry]]></category>
		<category><![CDATA[British Columbia]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[crushed]]></category>
		<category><![CDATA[Discover]]></category>
		<category><![CDATA[English Model]]></category>
		<category><![CDATA[Explore]]></category>
		<category><![CDATA[Farm]]></category>
		<category><![CDATA[farms]]></category>
		<category><![CDATA[Food safety]]></category>
		<category><![CDATA[Forge]]></category>
		<category><![CDATA[fresh]]></category>
		<category><![CDATA[frozen]]></category>
		<category><![CDATA[fruit]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Good taste]]></category>
		<category><![CDATA[LDO]]></category>
		<category><![CDATA[Mineral]]></category>
		<category><![CDATA[Picking fruit]]></category>
		<category><![CDATA[Rich]]></category>
		<category><![CDATA[Strict]]></category>
		<category><![CDATA[World class]]></category>
		<category><![CDATA[worldclass]]></category>
		<guid isPermaLink="false">https://en.spress.net/explore-world-class-blueberry-farms-in-canada/</guid>

					<description><![CDATA[The 4 member farms of BC Blueberries meet a wide range of requirements from weather monitoring to soil quality and adhering to stringent food safety regulations. With over 80 years of experience, the BC Blueberry Council represents more than 600 high-dust blueberry farms in Canada. The farms&#8217; total high dust cranberry farming area amounts to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The 4 member farms of BC Blueberries meet a wide range of requirements from weather monitoring to soil quality and adhering to stringent food safety regulations.</strong><br />
<span id="more-8685"></span> With over 80 years of experience, the BC Blueberry Council represents more than 600 high-dust blueberry farms in Canada. The farms&#8217; total high dust cranberry farming area amounts to more than 11,000 hectares (27,000 acres) to meet the growing consumer demand. British Columbia&#8217;s blueberry growers have honed agricultural skills over the generations, while focusing on food quality and safety. They are proud to produce top quality blueberry varieties for Canada and the world.</p>
<p> <strong> Farm RussLynn Blueberries</strong> They have grown blueberries on their small farms since 1986 with an initial area of ​​just 10 acres. They worked hard and achieved success by having a group of loyal customers who return every year to pick blueberries on the farm. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_83_38621769/22186d7d4b3fa261fb2e.jpg" width="625" height="522"> <em> Farm RussLynn Blueberries.</em> All of their fruit is Bluecrop, one of the sweetest and tastiest blueberry varieties in Canada. Unlike large commercial enterprises, RussLynn Blueberries decided to ignore the crop of early harvestable varieties such as Duke and Reka to focus on Bluecorp with higher quality and great taste. Blueberries are hand-harvested by the farm to avoid crushing caused by picking with automatic fruit pickers. <strong> Didar Berry Farm</strong> is located in Delta BC which was established in 2005 on the rich farmland of Burns Bog. Burns Bog&#8217;s Unique Ecological Wonders provides a soil rich in minerals and nutrients needed for the growth of delicious blueberries during the summer months. Didar Farm is owned and operated by a household by taking advantage of the fertile soil to ensure high quality and rich blueberries. In 1997, Parm and Satwinder founded it <strong> Westberry farm</strong> to diversify the vision and export the fruit to the world. Soon after, they included the packaged fruit in their product portfolio. The farm started production with a slow, labor-intensive process, even having to cover fruit trays with plastic bags by hand; has now evolved into a globally recognized standardization process. Their love of the land enabled them to foster a sustainable farm with a combination of disease management and crop protection. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_83_38621769/4d2b074e210cc852911d.jpg" width="625" height="466"> <em> Farm Klaassen.</em> Final, <strong> Klaassen farm</strong> 80 acres owned and dedicated by the household to grow delicious-tasting blueberries at an affordable price. Their goal is to grow and produce quality, natural blueberries by focusing on sustainable farming. The farm uses all natural and non-toxic products to provide its customers with nutritious, year-round fresh and frozen blueberries. By using a non-toxic spray and spraying only when absolutely necessary, the Klaassen farm blueberries are so safe that they can be eaten right away from the garden. All Klaassen blueberries are GAP (Good Agricultural Practices) certified.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8685</post-id>	</item>
		<item>
		<title>Tesla&#8217;s self-driving function was found to have fatal flaws</title>
		<link>https://en.spress.net/teslas-self-driving-function-was-found-to-have-fatal-flaws/</link>
		
		<dc:creator><![CDATA[Hoàng Phạm]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 16:56:07 +0000</pubDate>
				<category><![CDATA[Vehicles]]></category>
		<category><![CDATA[accident]]></category>
		<category><![CDATA[Activated]]></category>
		<category><![CDATA[Back seat]]></category>
		<category><![CDATA[Consumer Reports]]></category>
		<category><![CDATA[Cop]]></category>
		<category><![CDATA[deadly]]></category>
		<category><![CDATA[DIE]]></category>
		<category><![CDATA[driver]]></category>
		<category><![CDATA[Driver s seat]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[fatal]]></category>
		<category><![CDATA[flaws]]></category>
		<category><![CDATA[Function]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Houston]]></category>
		<category><![CDATA[Seat behind]]></category>
		<category><![CDATA[Self]]></category>
		<category><![CDATA[Selfdriving]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steering wheel]]></category>
		<category><![CDATA[Suicide]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[Tesla Model Y]]></category>
		<category><![CDATA[Teslas]]></category>
		<category><![CDATA[The driver]]></category>
		<guid isPermaLink="false">https://en.spress.net/teslas-self-driving-function-was-found-to-have-fatal-flaws/</guid>

					<description><![CDATA[The Autopilot function on Tesla electric vehicles can be activated and used even without the driver&#8217;s seat. In a test conducted by Consumer Reports (CR), a safety hole in Tesla cars is discovered when the Autopilot function can be activated even if no one is behind the wheel. To do this, a Consumer Reports expert [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Autopilot function on Tesla electric vehicles can be activated and used even without the driver&#8217;s seat.</strong><br />
<span id="more-8551"></span> In a test conducted by Consumer Reports (CR), a safety hole in Tesla cars is discovered when the Autopilot function can be activated even if no one is behind the wheel.</p>
<p> To do this, a Consumer Reports expert used a chain to hang a heavy object at the bottom end and tie it to the steering wheel to simulate the presence of a human hand on the wheel. At the same time, the seat belt is also installed pretending that someone is using the driver&#8217;s seat. Then, the driver moves to the extra seat and activates Autopilot driving assistance mode. As a result, the Tesla Model Y ran for hundreds of meters on the test track without giving any warning about no one in the driver&#8217;s seat. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38621645/a50e2c640a26e378ba37.jpg" width="625" height="416"> <em> The Tesla Model Y is deceived that someone is behind the wheel and operates in Autopilot mode. Screenshots. </em> Through this test, an expert from Consumer Reports found that Tesla&#8217;s system does not use seat sensors and small cameras to track the driver&#8217;s eye movement like other manufacturers. Such systems are recently introduced in some Subaru, Ford and General Motors vehicles. Instead, Tesla uses sensors at the steering wheel and seat belts to detect if someone is behind the wheel. Consumer Reports&#8217; experiments have shown weaknesses of this practice. Last weekend, a 2019 Tesla Model S crashed into a tree in the Houston suburbs, Texas (USA), killing two people on the car. Police said they believed that one person was in the front passenger seat and the other was in the back seat at the time of the accident. Before this serious incident, Elon Musk, the CEO of the electric car company, explained on Twitter that the recovered data records showed that the Autopilot was not activated and the car that had crashed did not purchase the Full Self Driving feature. fully self-driving). Tesla believes the car&#8217;s Autopilot function won&#8217;t be activated without the driver&#8217;s seat. But according to Consumer Reports&#8217; testing, it seems that the system is quite easy to be &#8220;deceived&#8221;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38621645/fdf30c9828dac18498cb.jpg" width="625" height="351"> <em> Police said that no one was in the driver&#8217;s seat when the Tesla crashed in Texas. Photo: Matt Dougherty. </em> Currently, Autopilot only offers level 2 autonomous functionality, which only adds active safety features to limit collisions. The driver when activating Autopilot is always warned to put his hand on the steering wheel to intervene when the software does not work as expected. Still, many Tesla owners still find ways to make their cars drive themselves, putting their lives in danger.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8551</post-id>	</item>
		<item>
		<title>Burberry sells less charming bras</title>
		<link>https://en.spress.net/burberry-sells-less-charming-bras/</link>
		
		<dc:creator><![CDATA[Thiên Minh]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 10:16:09 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[bras]]></category>
		<category><![CDATA[Burberry]]></category>
		<category><![CDATA[charming]]></category>
		<category><![CDATA[Cheese]]></category>
		<category><![CDATA[Chest openness]]></category>
		<category><![CDATA[collection]]></category>
		<category><![CDATA[Cut]]></category>
		<category><![CDATA[discussed]]></category>
		<category><![CDATA[Duyen]]></category>
		<category><![CDATA[FARFETCH]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hard to understand]]></category>
		<category><![CDATA[Knitting]]></category>
		<category><![CDATA[Make a hole]]></category>
		<category><![CDATA[Montage]]></category>
		<category><![CDATA[Offensive]]></category>
		<category><![CDATA[Prada]]></category>
		<category><![CDATA[Reproduce]]></category>
		<category><![CDATA[sells]]></category>
		<category><![CDATA[Shirt]]></category>
		<category><![CDATA[Stock bottle]]></category>
		<category><![CDATA[Sweatshirts]]></category>
		<guid isPermaLink="false">https://en.spress.net/burberry-sells-less-charming-bras/</guid>

					<description><![CDATA[The British brand is confusing with designs with piercing details on the body. The product is part of its Spring &#8211; Summer 2021 collection. A cut-out detail montage shirt with a vignette is sold for $ 500. The other design is made of knitted material with a square neck and belly cut detail, helping the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The British brand is confusing with designs with piercing details on the body. The product is part of its Spring &#8211; Summer 2021 collection.</strong><br />
<span id="more-6526"></span> A cut-out detail montage shirt with a vignette is sold for $ 500. The other design is made of knitted material with a square neck and belly cut detail, helping the boys to show off their toned body.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/361286eaa0a849f610b9.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/d4f965014343aa1df352.jpg" width="625" height="625"> <em> Burberry bra model. Photo: Burberry. </em> The design of the British brand makes it difficult for netizens to understand because the cut-out details are not reasonable. Besides, the holes are easy to expose the body in an offensive way and not enough to keep the wearer warm. Because of the uniqueness, the shirt has become a topic of discussion. One comment commented: &#8220;This shirt is only for people with good shape and I cannot wear with an overweight body&#8221;. However, Burberry&#8217;s products were sold out on online stores, including Farfetch. The cut-out detail montage shirt is not reproduced in the following fashion season. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/84343acc1c8ef5d0ac9f.jpg" width="625" height="625"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/4b43f7bbd1f938a761e8.jpg" width="625" height="833"> <em> Perforated outfits are the fashion trends of British brands in the Spring-Summer fashion season of 2021. Photo: Burberry. </em> Previously, Prada was controversial with a yellow turtleneck sweatshirt, with many revealing details. The holes in the body make the design likened to Swiss cheese. The shirt is in the Spring &#8211; Summer 2021 collection. Openwork Viscose Turtleneck Sweater design sells for $ 1,239. The fashion house introduces other color versions of the shirt such as orange, white, gray and black. Prada describes Openwork Viscose Turtleneck Sweater with a &#8220;chic revealing pattern with holes&#8221;. However, netizens perceived the item as no different from cheese. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/cdba70425600bf5ee611.jpg" width="625" height="784"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_119_38611404/2c1196e9b0ab59f500ba.jpg" width="625" height="765"> <em> Prada&#8217;s shirt pattern is said to resemble the shape of a piece of cheese. Photo: Prada. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">6526</post-id>	</item>
		<item>
		<title>Windows users need to update their software immediately</title>
		<link>https://en.spress.net/windows-users-need-to-update-their-software-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Mon, 19 Apr 2021 07:25:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[As soon as possible]]></category>
		<category><![CDATA[Boris Larin]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Check for updates]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Kaspersky Labs]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[start]]></category>
		<category><![CDATA[Three dots]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows Update]]></category>
		<guid isPermaLink="false">https://en.spress.net/windows-users-need-to-update-their-software-immediately/</guid>

					<description><![CDATA[Recently, Microsoft has officially released a new update, helping to fix 108 critical vulnerabilities. This update fixes 108 vulnerabilities, of which 19 are classified as &#8220;critical&#8221; and 89 are &#8220;critical&#8221;. A total of 5 zero-day threats are patched in this update. Through the Win32k vulnerability, hackers can gain access to your computer and have full [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, Microsoft has officially released a new update, helping to fix 108 critical vulnerabilities.</strong><br />
<span id="more-4771"></span> This update fixes 108 vulnerabilities, of which 19 are classified as &#8220;critical&#8221; and 89 are &#8220;critical&#8221;. A total of 5 zero-day threats are patched in this update.</p>
<p> Through the Win32k vulnerability, hackers can gain access to your computer and have full control over the device, however, this requires user interaction. Security researcher Boris Larin at Kaspersky Labs said the vulnerability was exploited by a group of hackers called BITTER APT. Other vulnerabilities such as the Windows NTFS denial of service vulnerability have not been actively exploited. But Microsoft notes that they have been publicly disclosed, meaning everyone knows about them. To limit attack, users should update the operating system as soon as possible by clicking on the Start menu and selecting Settings &#8211; Security &#038; Update &#8211; Windows Update &#8211; Check for Updates. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_16_331_38545485/58fd60074b45a21bfb54.jpg" width="625" height="390"> Recently, Google has just released two patches for Chrome browser on the computer, although they do not provide detailed information, both vulnerabilities are labeled &#8220;high&#8221; and have been exploited by hackers. To update Google Chrome browser, click the three-dot icon in the upper right corner, then select Help &#8211; About Google Chrome (about Google Chrome), finally click Relaunch to restart. Browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_16_331_38545485/9de5a31f885d6103384c.jpg" width="625" height="301"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4771</post-id>	</item>
	</channel>
</rss>