<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Hacker &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 16 Jun 2021 22:06:06 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Meat producer JBS pays ransom after hacker attack The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States.</title>
		<link>https://en.spress.net/meat-producer-jbs-pays-ransom-after-hacker-attack-the-worlds-largest-meat-company-jbs-has-apparently-paid-a-ransom-of-11-million-after-a-cyber-attack-by-hackers-it-was-another-incident-in-a-serie/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 22:06:06 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Apparently]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cases]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[meat]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[pays]]></category>
		<category><![CDATA[Producer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Series]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[worlds]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24057</guid>

					<description><![CDATA[After a hacker attack Meat producer JBS pays ransom Status: 10.06.2021 7:13 a.m. The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. The US subsidiary of the Brazilian [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/usa-jbs-fleischproduzent-101https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP" title="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP"></p>
<h1> After a hacker attack Meat producer JBS pays ransom </h1>
<p>Status: 10.06.2021 7:13 a.m. </p>
<p> <strong> The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. </strong> The US subsidiary of the Brazilian meat processor JBS paid the equivalent of eleven million dollars in ransom after a hacker attack. The payment was made to prevent further disruption by the hackers and to restore the smooth operation of the affected locations, said the Dallas-based company. According to the US media, the payment was made in Bitcoin. According to the US government, the company had received a ransom note from a criminal organization likely based in Russia. The attack paralyzed JBS production in Australia and affected Canada and the United States.</p>
<h2> &#8220;A difficult decision&#8221;</h2>
<p>&#8220;This was a very difficult decision for our company and for me personally,&#8221; explained Managing Director Andre Nogueira. &#8220;However, we felt that this decision had to be made in order to avoid any potential risk to our customers.&#8221; The investigations are still ongoing, but preliminary results have suggested &#8220;that no company, customer or employee data has been compromised.&#8221;</p>
<h2> US investigators suspect Russia is behind it</h2>
<p>US President Joe Biden said last week that investigators had linked Russia to the JBS case. &#8220;JBS USA was in constant contact with government officials throughout the incident,&#8221; the company said. In the USA, the state and business are currently fighting a series of attacks with blackmail software known as &#8220;ransomware&#8221;. The data of the attacked systems are encrypted. The hackers demand cash payments in cryptocurrency so that they can unlock access again and not publish the data.</p>
<h2> Ransom payment in Bitcoin</h2>
<p>The US utility company was also last month <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIOw7DIAwA0LuwOzRrzsJiEfNRjUHGiKHq3duM733ccpcrZmNewQe_9z4MM80ZC67jpn9VtUfJgl9ipEKlkQQfO3epyDDqIK5CwJ0mZeIbCsY3KaBkrSmBoszeNirB-TqPYo3d9wc5S6jTfAAAAA.." class="textlink" title="Link zu: Colonial Pipeline räumt Lösegeld-Zahlung an Hacker ein" target="_blank" rel="nofollow noopener"> Colonial pipeline</a> The victim of a hacker attack with a blackmail Trojan that temporarily shut down the entire pipeline network. The US Federal Police FBI blames a hacker group called &#8220;Darkside&#8221; for the attack and later tracked down the ransom of 75 Bitcoin that Colonial had paid &#8211; at the time it was worth $ 4.4 million.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24057</post-id>	</item>
		<item>
		<title>After hacker attack, investigators reach extorted millions in pipeline It has been a month since the largest gasoline pipeline in the USA was the victim of a hacker attack. The operator paid millions to the extortionists. Now the investigators report a success.</title>
		<link>https://en.spress.net/after-hacker-attack-investigators-reach-extorted-millions-in-pipeline-it-has-been-a-month-since-the-largest-gasoline-pipeline-in-the-usa-was-the-victim-of-a-hacker-attack-the-operator-paid-millions/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 19:03:11 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[As the]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[extorted]]></category>
		<category><![CDATA[extortionists]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[investigators]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Millions]]></category>
		<category><![CDATA[month]]></category>
		<category><![CDATA[operator]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[reach]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[success]]></category>
		<category><![CDATA[USA]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=22868</guid>

					<description><![CDATA[After a hacker attack Investigators come to extorted pipeline millions Status: 08.06.2021 02:12 a.m. It has been a month since the largest gasoline pipeline in the United States was hacked. The operator paid millions to the extortionists. Now the investigators report a success. After the hacker attack on the largest gasoline pipeline in the United [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/pipeline-hacker-103https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="An aerial view of a colonial pipeline in the US state of Maryland. | AFP" title="An aerial view of a colonial pipeline in the US state of Maryland. | AFP"></p>
<h1> After a hacker attack Investigators come to extorted pipeline millions </h1>
<p>Status: 08.06.2021 02:12 a.m. </p>
<p> <strong> It has been a month since the largest gasoline pipeline in the United States was hacked. The operator paid millions to the extortionists. Now the investigators report a success.</strong> After the hacker attack on the largest gasoline pipeline in the United States, investigators recovered most of a ransom payment in the digital currency Bitcoin. The US Department of Justice announced that 63.7 Bitcoin, currently valued at around 2.3 million US dollars, had been seized. The FBI was able to identify a digital wallet that hackers allegedly used to collect a payment from the company concerned, said the agency&#8217;s deputy director Paul Abbate.</p>
<h2> Hacker from Russia suspected behind the act</h2>
<p>The company Colonial Pipeline announced in early May that it had been the victim of a hacker attack. As a result, the pipeline, through which about 45 percent of all fuel consumed on the US east coast runs, was temporarily completely shut down. There were petrol shortages in parts of the country. The capital Washington was particularly hard hit, where at times 88 percent of the gas stations ran out of fuel. &#8220;It was an attack on one of our most important national infrastructures,&#8221; said Lisa Monaco from the US Department of Justice. The US government suspects hackers from the DarkSide group from Russia behind the crime. Both US authorities and IT security experts strongly advise companies against paying ransom so as not to incentivize cyber criminals to blackmail them. But the pipeline operator paid, as company boss Joseph Blount admitted in the &#8220;Wall Street Journal&#8221; at the end of May. He authorized a payment of $ 4.4 million. Blount explained the controversial decision by saying that the company was unsure about the extent of the system damage caused. According to the US Department of Justice, Colonial Pipeline had quickly notified the FBI that DarkSide had broken into the computer network and the company had paid the requested ransom of 75 Bitcoin.</p>
<h2> Colonial boss praises investigators</h2>
<p>In so-called ransomware attacks, data on computers is encrypted &#8211; and the attackers usually demand a ransom for the release. Cases in which companies paid were also known before. But it is extremely rare to get the money back. Colonial chief Blount praised the work of the FBI investigators in a statement. He also said the private sector needs to take cyber threats seriously and invest to better defend against them. &#8220;Ransomware attacks have increased in scope and sophistication over the past year, targeting our critical infrastructure, businesses of all kinds, entire cities and even law enforcement agencies,&#8221; said Monaco from the Justice Department. &#8220;Ransomware and digital extortion pose a threat to national and economic security in the United States.&#8221; Just a few weeks after the attack on the gasoline pipeline, the world&#8217;s largest meat company JBS was hit by a massive cyber attack. Large parts of the production in North America and Australia were paralyzed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22868</post-id>	</item>
		<item>
		<title>The DarkSide hacker group received $90 million worth of bitcoins from the victim before disappearing</title>
		<link>https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</link>
		
		<dc:creator><![CDATA[Thu Thắm]]></dc:creator>
		<pubDate>Sun, 23 May 2021 18:52:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoins]]></category>
		<category><![CDATA[Close the door]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[DarkSide]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Disappear]]></category>
		<category><![CDATA[disappearing]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel 471]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pull down]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[received]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Value]]></category>
		<category><![CDATA[Victim]]></category>
		<category><![CDATA[victims]]></category>
		<category><![CDATA[worth]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</guid>

					<description><![CDATA[DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week. DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week.</strong><br />
<span id="more-17648"></span> DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but before that they were able to extort and receive from many victims $ 90 million worth of bitcoins.</p>
<p> This hacker organization has received ransom from many victims. This shows that data ransom attacks have become a lucrative business for cybercriminals. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_365_38931872/03d1f6cded8f04d15d9e.jpg" width="625" height="375"> <em> Bitcoin is increasingly preferred by criminal organizations </em> Earlier this month, Colonial Pipeline suffered a severe attack that forced the company to shut down nearly all of its fuel system supplying the southeastern states of the United States. The FBI confirmed the crime was DarkSide, a cybercrime organization believed to be located in Eastern Europe. Last week, it was reported that Colonial had agreed to pay $ 5 million to DarkSide (in bitcoin) for the data recovery password. Recently, the CEO of the company confirmed this information. DarkSide operates like a business. This group develops malicious code to crack and steal the target&#8217;s data, then trains partners, the partners continue to train the hackers. When hackers use this malicious code to carry out successful missions, DarkSide will receive a percentage of those successful attacks. In March 2021, when it announced a new software that can crack data faster than before, DarkSide even released a press release and invited reporters to interview. Hackers often demand ransom in virtual currency. London-based blockchain analytics firm Elliptic has identified a bitcoin wallet that DarkSide uses to receive ransoms from victims. On May 14, London-based blockchain analytics firm Elliptic said it had identified a bitcoin wallet used by DarkSide to collect ransoms from victims. That same day, Intel 471 security researchers said DarkSide closed after losing access to its servers and when the organization&#8217;s virtual currency wallets were empty. According to Elliptic, DarkSide and other affiliates of this organization have collected at least $90 million in bitcoin ransoms, and they receive funds through 47 different digital wallets. “To our knowledge, this analysis includes all payments to DarkSide,” said Tom Robinson, Elliptic co-founder and chief scientist. However, there may be other undetected transactions, so this $90 million figure should be considered the lowest limit.” Also according to Elliptic&#8217;s research, DarkSide&#8217;s bitcoin wallet was holding $5.3 million in cryptocurrency before it was all withdrawn last week. There are some rumors that these bitcoins have been seized by the US government. Of the $90 million ransom, $15.5 million went to the developers of DarkSide and $74.7 million to affiliates. Much of that is being sent to cryptocurrency exchanges and thereby converted into fiat. Bitcoin is increasingly preferred by criminal organizations as crypto traders do not reveal their identities. However, because the digital ledger that underpins bitcoin is public, researchers can keep track of where these funds are going.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17648</post-id>	</item>
		<item>
		<title>Hacker group speaks out after the hack that shook the US energy industry</title>
		<link>https://en.spress.net/hacker-group-speaks-out-after-the-hack-that-shook-the-us-energy-industry/</link>
		
		<dc:creator><![CDATA[Phúc Thịnh]]></dc:creator>
		<pubDate>Thu, 20 May 2021 05:17:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[shook]]></category>
		<category><![CDATA[speaks]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[victims]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacker-group-speaks-out-after-the-hack-that-shook-the-us-energy-industry/</guid>

					<description><![CDATA[A cyberattack on the largest U.S. fuel system operator could have serious consequences, causing gas prices like gasoline to rise. On May 10, DarkSide, the hacker group believed to be behind the attack on Colonial Pipeline, the company that operates the largest refined fuel pipeline in the US, posted a new statement. According to the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A cyberattack on the largest U.S. fuel system operator could have serious consequences, causing gas prices like gasoline to rise.</strong><br />
<span id="more-16460"></span> On May 10, DarkSide, the hacker group believed to be behind the attack on Colonial Pipeline, the company that operates the largest refined fuel pipeline in the US, posted a new statement.</p>
<p> According to the <em> Vice</em> , DarkSide&#8217;s message does not directly refer to the Colonial Pipeline attack, but is titled &#8220;Regarding the Latest News&#8221;. The group said its actions were unrelated to politics. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38797147/fdec97078945601b3954.jpg" width="625" height="416"> <em> The cyber attack on May 7 caused the Colonial Pipeline&#8217;s fuel pipeline system to stop working. Photo: Bloomberg. </em> “We are a non-political group, not involved in geopolitics. Don&#8217;t tie us to a government or look for other motives&#8230; Our aim is to make money, not to cause problems for society,&#8221; a DarkSide representative wrote on a website belonging to the dark web. According to the <em> Washington Post</em> , some US officials believe that DarkSide is the hacker group behind the Colonial Pipeline attack. Also in the new statement, DarkSide said it will change the way it works and selects targets. “From today, we will examine and analyze each company that partners want to encrypt to avoid social consequences,” the group wrote. On May 7, Colonial Pipeline announced that it had to disconnect some systems after discovering it was &#8220;a victim of a cyber attack&#8221;. According to the <em> Business Insider</em> , this move caused more than 8,046 km of fuel pipes and some computer systems of Colonial Pipeline to stop working. In an updated statement on May 8, the company representative confirmed that the software used for the attack was in the form of ransomware, which encrypts files in the system and requires victims to pay if they want to get it. again. The company hired a cybersecurity firm to investigate the severity of the attack. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38797147/22b34958571abe44e70b.jpg" width="625" height="208"> <em> The DarkSide hacker group spoke out after the alleged implementation of a cyber attack against the Colonial Pipeline. Photo: Motherboard.</em> According to information on its website, Colonial Pipeline transports about 45% of all fuel consumed on the East Coast of the United States. On May 9, the company said that while the main pipelines are still closed, some smaller pipelines have been reactivated. In response to the incident, the US Department of Transportation has declared a state of emergency in 17 states and Washington to lift restrictions on carriers and drivers assisting in fuel shortages. The declaration of emergency will be in effect until the end of the state of affairs, or until 23:59 on June 8 (local time). After the Colonial Pipeline incident, gasoline prices in the US increased more than 3% to $2,217 per gallon &#8211; the highest price since May 2018. Experts warn that the price of gas raw materials may increase further if Colonial Pipeline does not reopen the pipeline in the next few days. <em> <strong> How did the FBI hack the suspect&#8217;s iPhone?</strong> </em> <em> Cellebrite has invented a phone-cracking technology that makes it easier for the FBI to investigate.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16460</post-id>	</item>
		<item>
		<title>The hacker said it was not intentionally disrupting the fuel supply in the US</title>
		<link>https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</link>
		
		<dc:creator><![CDATA[Bình An]]></dc:creator>
		<pubDate>Fri, 14 May 2021 05:41:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Deliberate]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Non political]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[State of Georgia]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</guid>

					<description><![CDATA[The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply. Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply.</strong><br />
<span id="more-14111"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_232_38816896/60abcba6d5e43cba65f5.jpg" width="625" height="365"> </p>
<p> Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, headquartered in Georgia, USA. The group also said that it will carefully examine its goals in the future, while emphasizing that the group is not affiliated with any governments when the cyber attack takes place because the group is always acting alone. DarkSide wrote on the website: &#8220;We are a non-political organization. We are not tied to a government. Our goal is to make money, not to put society in a difficult situation like it is today. in&#8221;. &#8220;From today, we will carefully examine each company that our partners want to attack to avoid future consequences,&#8221; the DarkSide team stressed. The partners the group refers to are &#8220;affiliates&#8221; of the group, DarkSide said. This group of hackers acts as a company that specializes in providing &#8220;hacking services&#8221; and is not directly involved in cyber attacks on companies or governments. The team will develop malware for the cyber attacks and negotiate the ransom with the victim, at the request of their partner. One source believes that DarkSide will receive 20-30% of the ransom for its services.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14111</post-id>	</item>
		<item>
		<title>The hacker said it was not intentionally disrupting the fuel supply in the US</title>
		<link>https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</link>
		
		<dc:creator><![CDATA[Bình An]]></dc:creator>
		<pubDate>Fri, 14 May 2021 05:41:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Deliberate]]></category>
		<category><![CDATA[disrupting]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Intentionally]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Non political]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Post words]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Sorry]]></category>
		<category><![CDATA[State of Georgia]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</guid>

					<description><![CDATA[The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply. Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply.</strong><br />
<span id="more-14112"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_232_38816896/60abcba6d5e43cba65f5.jpg" width="625" height="365"> </p>
<p> Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, headquartered in Georgia, USA. The group also said that it will carefully examine its goals in the future, while emphasizing that the group is not affiliated with any governments when the cyber attack takes place because the group is always acting alone. DarkSide wrote on the website: &#8220;We are a non-political organization. We are not tied to a government. Our goal is to make money, not to put society in a difficult situation like it is today. in&#8221;. &#8220;From today, we will carefully examine each company that our partners want to attack to avoid future consequences,&#8221; the DarkSide team stressed. The partners the group refers to are &#8220;affiliates&#8221; of the group, DarkSide said. This group of hackers acts as a company that specializes in providing &#8220;hacking services&#8221; and is not directly involved in cyber attacks on companies or governments. The team will develop malware for the cyber attacks and negotiate the ransom with the victim, at the request of their partner. One source believes that DarkSide will receive 20-30% of the ransom for its services.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14112</post-id>	</item>
		<item>
		<title>What information should not be shared on social networks?</title>
		<link>https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Wed, 12 May 2021 21:26:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Baby boomers]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Potential]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Root]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[Take advantage]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</guid>

					<description><![CDATA[The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users. Users need to be cautious before providing personal information on social networks. According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users.</strong><br />
<span id="more-13505"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/94598b8877cb9e95c7da.jpg" width="625" height="351"> </p>
<p> <em> Users need to be cautious before providing personal information on social networks. </em> According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia have become more aware of online risks. Netizens in Southeast Asia do not want to share identity information, family directly, where they live and work on their personal pages. Up to 76% of survey participants do not want to upload financial information online. This percentage is highest among Baby Boomers (people born two decades after World War II), accounting for 85%. Gen Z &#8211; the youngest generation &#8211; is the group with the lowest rate at 68%. Judging by the current tendency of young people to be more open to sharing information on cyberspace, Kaspersky believes that this is the main driver of the development of electronic payments in the region. However, this also poses a risk when young users do not pay much attention to information security. To best ensure privacy on social networks, especially financial information and personal data, Kaspersky has made a number of recommendations to users. The first is not to publish travel information, not to disclose too much personal information such as date of birth or workplace in the profile section. You should also not post your home address or phone number on any public forum. Second, you should check automatic positioning settings in posts, don&#8217;t share location publicly if it&#8217;s not absolutely necessary. Third, you should not participate in the quiz that appears on social networks. Usually, these games silently extract personal information with simple questions. That is the information commonly used in security questions. If you provide too much, hackers can use them to break into online accounts. Fourth, be wary of the contest or winning information, because they pose the risk of disguising fraud. If you share it on social media, you could inadvertently spread malicious code or pave the way for the disclosure of sensitive data. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/dbeeadffb1bd58e301ac.jpg" width="625" height="474"> Hackers can take advantage of security holes on mobile devices to steal information. Artwork: BS <strong> Raise awareness about mobile device security</strong> According to a Kaspersky report, 71% of survey respondents in Southeast Asia use passwords to protect their mobile devices. However, just over half of them check and change privacy settings regularly and have internet security software installed on their devices. In order to keep financial information and personal data on your device safe, you need to take note of the following recommendations. Specifically, the most basic security method is to lock your phone with a password that is difficult to guess and update the system regularly. You absolutely do not jailbreak or root your phone. This can pave the way for hackers to enter the system and install malicious code. You should only use licensed and verified apps and games on reputable app stores. An application capable of remotely erasing data is also recommended, making it easy to erase information in case your phone is stolen.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13505</post-id>	</item>
		<item>
		<title>The XcodeGhost malware spread to millions of iPhones</title>
		<link>https://en.spress.net/the-xcodeghost-malware-spread-to-millions-of-iphones/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 16:53:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[Juridical]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Millions]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Program]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[XcodeGhost]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-xcodeghost-malware-spread-to-millions-of-iphones/</guid>

					<description><![CDATA[The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users. According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected. The malware affected 128 million iPhone users. The XcodeGhost malware was spread by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users.</strong><br />
<span id="more-12934"></span> According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_5_38782308/476e8edd939f7ac1238e.jpg" width="625" height="390"> <em> The malware affected 128 million iPhone users. </em> The XcodeGhost malware was spread by hackers through the hidden installation of a version of Xcode programming software, then sharing on forums for iOS developers. Some of these malicious applications at that time included many popular names such as WeChat, the Chinese version of Angry Birds 2. Statistics show that about 2500 applications were infected with malware and up to 203 million users who downloaded these anti-malware applications Security experts believe that the XcodeGhost malware can collect information such as infected application name, device model, network information and some other data. Later, Apple said it did not record the data associated with the user&#8217;s identity, or the iCloud login password was collected. After the problem was discovered, Apple asked developers to use the official version of Xcode to compile the app before re-releasing it on the App Store. According to the <em> 9to5mac</em> Apple also strengthens the security process when installing Xcode, checking the application&#8217;s malicious code before releasing it on the App Store after the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12934</post-id>	</item>
		<item>
		<title>More than half of Australian businesses were attacked by hackers</title>
		<link>https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Sun, 02 May 2021 12:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[As usual]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[It is illegal]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Useful]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</guid>

					<description><![CDATA[A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers. A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers.</strong><br />
<span id="more-11035"></span> A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. years earlier. This fact happened when in the last year, because of the Covid-19 translation, many companies switched to working online</p>
<p> Experts say that in each attack, typically hackers will attack networks or systems, steal personal or sensitive information and then demand ransom to return or unlock them. that information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_65_38643050/39d0b9be9efc77a22eed.jpg" width="625" height="346"> Although experts say that companies should not pay a ransom to hackers because this action helps to foster legal violations, according to Mimecast statistics, 54% of the companies have paid the ransom. Of these, 76% of the companies got their data back, while 24% couldn&#8217;t get it back. Prior to this report, since last year, many entities including major Australian companies have reported being attacked by hackers. The recent victim is Nine Network Television, which makes some programs unable to broadcast as usual. Previously, the Australian National Assembly&#8217;s computer network was also attacked a number of times. In response to this situation, Australia&#8217;s Cybersecurity Center issued recommendations and procedures to instruct entities on how to secure cyber security. At the same time, experts believe that regular software updates as well as the use of multi-factor authentication are also useful measures for security in a cyberspace environment./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11035</post-id>	</item>
		<item>
		<title>Risk of leaking private images from poor quality camera equipment</title>
		<link>https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</link>
		
		<dc:creator><![CDATA[Vân Anh]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 16:08:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[Camera]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Drop]]></category>
		<category><![CDATA[Equipment]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Ha Toan]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[Leaking]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[ONVIF]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[poor]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[Rao]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Safety information]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Viettel Cyber Security]]></category>
		<category><![CDATA[VSEC]]></category>
		<guid isPermaLink="false">https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</guid>

					<description><![CDATA[In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private. Information and data from personal cameras become targets of hackers Recently, on social networks, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private.</strong><br />
<span id="more-10620"></span> <strong> Information and data from personal cameras become targets of hackers</strong> </p>
<p> Recently, on social networks, there has been a situation of buying and selling clips from camera accounts stolen by bad objects. Depending on the quality of the content, the associations that sell the 18+ clip will collect a fee from 100,000 to 250,000 VND per joining. Not only providing depraved content, some groups also share hacked camera access accounts for a package fee of about 3-4 million VND. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_107_38635585/fb80f843df01365f6f10.jpg" width="625" height="368"> The fact that cameras are installed everywhere, the number of cameras is constantly increasing, making data from the camera a source of information targeted by many objects. (Artwork: Internet) According to experts of the National Cyber ​​Security Monitoring Center (NCSC), the Information Security Department, the Ministry of Information and Communications, the sale of account information on social networks is not a new behavior, but it has exported. appeared long ago. However, in the past, normally subjects only sold bank accounts, social networks or accounts containing information such as email, phone number, identity card number &#8230; Nowadays, when cameras are installed everywhere, the number is constantly increasing, being a source of information targeted by many audiences, the camera account also becomes &#8220;hot goods&#8221; on the account trading pages. “This form of purchase is becoming more popular because the number of cameras is increasing. Victims who lost their camera account can be monitored by others through their own camera, ”said the NCSC representative. <strong> Many users accidentally revealed the camera system login information</strong> According to experts, there are many reasons for the widespread purchase and sale of clips and camera accounts on the network, in part due to regulations and sanctions against acts of buying, selling and distributing personal data. not enough deterrent. Commenting on the reason that the personal camera system is vulnerable to hacker attacks, both subjectively and objectively, NCSC&#8217;s representative said: “Subjective is because users accidentally reveal account login information. camera. And objectively, because users use poor quality camera equipment, do not ensure enough information security, leading to the device can be hacked by hackers, thereby getting the login account &#8220;. Having the same opinion with the representative of NCSC, a security expert for IoT devices at Viettel Cyber ​​Security, Ha Toan, emphasized: A fundamental reason that makes personal and household cameras easy. Hacker attacks are due to the user&#8217;s limited knowledge of using IoT devices or cameras. For example, do not change the default password of the device when it is put into use. According to Toan, another reason is that the camera device of the manufacturer does not have a protection mechanism such as verifying the integrity of the firmware running on the camera device, allowing hackers to buy camera equipment and insert backdoors. (back door &#8211; PV) and then sold to the market. &#8220;During the work, we also discovered many backdoors allowing remote access in cameras originating in China&#8221;, Viettel Cyber ​​Security expert added. Along with that, there are cameras that have vulnerabilities in firmware due to programming errors such as buffer overflow, hardcode login information, logic errors &#8230; allowing hackers to exploit to take control of the device. Camera account information can also be revealed because the installation staff deliberately fails to notify the password change during installation or notice the change but does not notice the change of the entire service as mentioned above also includes services RTSP, onVIF. <strong> Raise awareness of personal information protection, choose a reputable camera</strong> To overcome the widespread situation of buying and selling clips, camera accounts in particular as well as personal information and data, experts say that the Decree on personal data protection should be issued soon and come to life. This draft Decree has regulated heavy fines for violations of personal data protection regulations. &#8220;The more penalties for handling violations related to the purchase and sale of personal data will help increase deterrence and reduce the rate of violation&#8221;, expert of Vietnam Cyber ​​Security Joint Stock Company (VSEC) Vuong Trong Nhan stated his point of view. But experts also emphasized the limitation in the sense of protecting personal data of users as well as the organization providing services related to user data. Making recommendations to users, VSEC experts advise them to first increase their sense of self-protection by not using the camera manufacturer&#8217;s default password, setting a strong password and setting a Private network system is only for indoor security equipment, instead of sharing the same Wi-Fi network. According to representatives of NCSC, individuals and businesses when using cameras need to have strict regulations and decentralization when allowing users to access their camera systems, need to change passwords regularly to avoid in case the login information is known by many people, the risk of leaking is also higher. Emphasizing on the safety factor of the device, experts say that choosing to buy cameras manufactured from major brands, products that have been assessed for information security as well as choose a reputable installation unit. is an effective solution to help users avoid the risk of information insecurity. On the other hand, is it time for camera manufacturers to pay more attention to whether their equipment meets information security requirements?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10620</post-id>	</item>
		<item>
		<title>The Apple partner was blackmailed by hackers immediately after the Spring Loaded event</title>
		<link>https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</link>
		
		<dc:creator><![CDATA[Anh Phạm]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 07:12:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alphabet]]></category>
		<category><![CDATA[Amounts]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[blackmailed]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Happy]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Loaded]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Partner]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[spring]]></category>
		<category><![CDATA[Spring Loaded]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Surprise attack]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</guid>

					<description><![CDATA[A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs. While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs.</strong><br />
<span id="more-10140"></span> While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed to have hacked into the computer network of Quanta Computer and stole some blueprints. new Apple products.</p>
<p> Quanta is headquartered in Taiwan (China), is the main MacBook manufacturing partner for Apple. The company is also a partner of HP, Facebook, and Alphabet (the parent company of Google). <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_280_38621478/db5d33351577fc29a566.jpg" width="625" height="482"> Accordingly, when the event just ended, REvil posted an article containing 15 pictures detailing a device that is supposed to be a MacBook designed in March 2021. Images include the part number, specific sizes and capacities, detailing many of the parts that work inside the Apple laptop. One of the images signed by designer John Andreadis. REvil has asked Apple to pay a ransom of $ 50 million by May 1. Previously, this group posted information on &#8220;Happy Blog&#8221; &#8211; where hackers announced their &#8220;victory&#8221;. REvil is said to have made an agreement with Quanta before but did not get the victim&#8217;s consent, then the new hacker group released the records on the day of the Apple event. Quanta, for its part, admitted the company had suffered a hacker attack but did not detail whether any data was stolen. The Apple partner also reported to law enforcement about the day-to-day attack and said it had immediately activated an information security defense system, upgraded its infrastructure to protect data. Whether. Apple representatives have not released any official comment on the incident. <em> according to Bloomberg</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10140</post-id>	</item>
		<item>
		<title>Hacker threatened, demanded a ransom with Apple</title>
		<link>https://en.spress.net/hacker-threatened-demanded-a-ransom-with-apple/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 03:45:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[BlackBerry]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[demanded]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hewlett packard]]></category>
		<category><![CDATA[Keep silent]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[MacBook Air]]></category>
		<category><![CDATA[Macbook Pro]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[Specialized pages]]></category>
		<category><![CDATA[Technical drawings]]></category>
		<category><![CDATA[threatened]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Understand]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacker-threatened-demanded-a-ransom-with-apple/</guid>

					<description><![CDATA[Hacker (hacker) warns that if Apple does not pay the ransom, it will publicly disclose the secrets they have about the Apples. Information on the 9to5mac technology site on April 22 said that a group of hackers known as Revil recently announced that they had thousands of confidential data files related to technical techniques. Apple [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hacker (hacker) warns that if Apple does not pay the ransom, it will publicly disclose the secrets they have about the Apples.</strong><br />
<span id="more-9253"></span> Information on the 9to5mac technology site on April 22 said that a group of hackers known as Revil recently announced that they had thousands of confidential data files related to technical techniques. Apple products. This group of hackers asked Apple to pay a ransom if they wanted the above data to be kept private and returned to this technology giant.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_5_38602731/5daa8bfeaebc47e21ead.jpg" width="625" height="479"> <em> One of the drawings was published by the Revil hacker group, threatening Apple.</em> According to technology experts, it is likely that the group of hackers above got the data after they attacked the network on Quanta Computer, an Apple partner in the production of Macbook. Initially, Quanta Computer was targeted by the Revil team with a $ 50 million ransom request, but the deal broke down then made Apple the victim of hackers. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_5_38602731/3853e907cc45251b7c54.jpg" width="625" height="406"> To prove it, the hacker group has posted a few screenshots showing technical drawings of the MacBook Air and MacBook Pro and accompanied by a liquidity request before May 1. If Apple doesn&#8217;t respond, they&#8217;ll reveal more data after each day of transaction delay. It is known that, in addition to Apple, Quanta Computer is also a partner in manufacturing equipment for many other technology companies such as Dell, Hewlett-Packard, BlackBerry, Lenovo, LG &#8230; so it is likely that hackers will not stop at demanding. Apple ransom. Currently, the Revil hacker group has not given specific numbers on the ransom they demanded on Apple as well as Apple without any official response.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9253</post-id>	</item>
		<item>
		<title>Hacker claimed holding hands of Apple secret, asking for $ 50 million in ransom</title>
		<link>https://en.spress.net/hacker-claimed-holding-hands-of-apple-secret-asking-for-50-million-in-ransom/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 15:52:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Silicon]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[claimed]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hands]]></category>
		<category><![CDATA[Hold in hand]]></category>
		<category><![CDATA[holding]]></category>
		<category><![CDATA[J314]]></category>
		<category><![CDATA[J316]]></category>
		<category><![CDATA[J374]]></category>
		<category><![CDATA[J375]]></category>
		<category><![CDATA[M1X]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[MacBook Air]]></category>
		<category><![CDATA[Macbook Pro]]></category>
		<category><![CDATA[Macbook Pro 2021]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[Technical drawings]]></category>
		<category><![CDATA[The Record]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacker-claimed-holding-hands-of-apple-secret-asking-for-50-million-in-ransom/</guid>

					<description><![CDATA[Hacker gang REvil asked Apple to liquidate before May 1. If they don&#8217;t, they will reveal more data after each day of transaction delay. 9to5Mac reported, the hacker gang behind the ransomware REvil claims to have in hand confidential data about the technical information of Apple products. These guys are asking Apple to pay a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hacker gang REvil asked Apple to liquidate before May 1. If they don&#8217;t, they will reveal more data after each day of transaction delay.</strong><br />
<span id="more-9050"></span> 9to5Mac reported, the hacker gang behind the ransomware REvil claims to have in hand confidential data about the technical information of Apple products. These guys are asking Apple to pay a ransom if they don&#8217;t want the information to be released.</p>
<p> According to The Record, the hacker gang got this information after a data attack Quanta Computer, one of Apple&#8217;s main MacBook manufacturing partners. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/6a0cca46ef04065a5f15.jpg" width="625" height="481"> <em> Several internal technical design drawings for Apple devices such as the MacBook and Apple Watch have been announced by REvil. (Photo: CryptoInsane)</em> The hacker gang behind the ransomware REvil claims to have in-house technical blueprints for Apple devices like the MacBook and Apple Watch, which Quanta Computer uses to assemble products. The hacker group asked Quanta Computer to pay 50 million USD to keep the data confidential. However, due to the unsuccessful agreement, the hacker group asked Apple to pay this ransom. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/e4774a3d6f7f8621df6e.jpg" width="625" height="482"> <em> The technical drawings of the MacBook Air and MacBook Pro revealed by the hacker group. (Photo: CryptoInsane)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/59d7f29dd7df3e8167ce.jpg" width="625" height="479"> <em> (Photo: CryptoInsane)</em> To prove it, the hacker group has posted a few screenshots showing technical drawings of the MacBook Air and MacBook Pro and included with the liquidity request before May 1. If Apple doesn&#8217;t respond, they&#8217;ll reveal more data after each day of transaction delay. According to Estrategia &#038; Negocios, on the REvil website (where the gang publishes stolen data to threaten companies to comply with ransom demands), the hacker group said: &#8220;To not have to wait for these Apple&#8217;s next presentation, we, the REvil team, will make information about the company&#8217;s next upcoming products available to many. Tim Cook can thank Quanta. On our side, we have shown goodwill. Quanta has made it clear to us that they are not interested in customer and employee data, giving permission to publish and sell all the data we have. &#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/0643d309f64b1f15465a.jpg" width="625" height="406"> <em> MacBook Pro 2021 image revealed by hacker group. (Photo: 9to5Mac)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/7ee8a8a28de064be3df1.jpg" width="625" height="481"> <em> (Photo: CryptoInsane)</em> 9to5Mac said that in some leaked images there are technical information of two unreleased MacBook Pro models, codenamed J314 and J316. Products equipped with Apple Silicon chip, MagSafe charging port, HDMI and SD card slot. These information are true to what analyst Ming-Chi Kuo revealed in January. According to Bloomberg, the codename J316 is the 16-inch MacBook Pro, while the J314 is the 14-inch version. In the image also appears codenamed J374 and J375, which are said to be the Mac mini with the new M1X processor chip. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_329_38601254/0f41de0bfb4912174b58.jpg" width="625" height="314"> <em> (Photo: CryptoInsane)</em> The hacker gang also said that they are &#8220;negotiating to sell a large amount of confidential drawings, GB of personal data with some major brands&#8221;. This means, Apple is likely not the only data attack victim. At the moment, representatives from Apple and Quanta Computer said they are reviewing the matter.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9050</post-id>	</item>
		<item>
		<title>Warning: Don&#8217;t click the pink settings link for WhatsApp</title>
		<link>https://en.spress.net/warning-dont-click-the-pink-settings-link-for-whatsapp/</link>
		
		<dc:creator><![CDATA[Bảo Tuấn]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 09:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Click]]></category>
		<category><![CDATA[Click the mouse]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Green Blue]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[pink]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Settings]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[Web service]]></category>
		<category><![CDATA[WHATSAPP]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-dont-click-the-pink-settings-link-for-whatsapp/</guid>

					<description><![CDATA[Some WhatsApp users recently received a link over the phone saying the app will change the theme from green to pink while promising more new features. However, once a user clicks on this fake link, their WhatsApp account will be hijacked by the hacker. Many security experts warned WhatsApp users not to click on the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Some WhatsApp users recently received a link over the phone saying the app will change the theme from green to pink while promising more new features. However, once a user clicks on this fake link, their WhatsApp account will be hijacked by the hacker.</strong><br />
<span id="more-8335"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_20_38594733/33cd307c153efc60a52f.jpg" width="625" height="417"> </p>
<p> <em> Many security experts warned WhatsApp users not to click on the pink settings link for WhatsApp called WhatsappPink. </em> Many security experts including Mr. Rajesh Rajaharia have voiced a warning about a virus hidden in a fake pink update link for WhatsApp called WhatsappPink. Once a user clicks on the WhatsappPink link, the virus will help hackers break in, take all access to WhatsApp in particular as well as their phones in general. The ultimate goal of a hacker is to steal victims&#8217; personal information and bank passwords. According to Mr. Rajaharia, if a user has clicked on the fake pink update link for WhatsApp and lost access to their account or suspected something unusual happened to their account, they should immediately take action. like uninstall WhatsappPink immediately; uninstall all WhatsApp web services; clear browser cache from settings; double-check access to all applications on your phone; If you suspect losing access to any application try to get it back immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_20_38594733/42d44f656a278379da36.jpg" width="625" height="493"> <em> Warning about WhatsappPink by security expert Rajesh Rajaharia</em> Experts also warn users to follow the basics and never install other mobile apps than those available on the official Google or Apple app store. For its part, WhatsApp has also warned users through media reports that: &#8220;Anyone can receive an unusual or suspicious message through any service, including email, private messages, and so on. text the phone and we strongly encourage everyone to be cautious before answering or participating. WhatsApp also suggests users send them a report about malicious links similar to WhatsappPink if they received it.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8335</post-id>	</item>
		<item>
		<title>Warning: Android and iOS users need to immediately change the password for this app!</title>
		<link>https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 02:49:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[License plate]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Public sale]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</guid>

					<description><![CDATA[If you are already using this app, quickly change your password immediately. WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application. On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If you are already using this app, quickly change your password immediately.</strong><br />
<span id="more-8140"></span> WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application.</p>
<p> On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked data, including the application user&#8217;s email address, phone number, license plate number, customer birth date, and email address. and password. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5d49ebf6ceb427ea7ea5.jpg" width="625" height="416"> <em> (Photo: Seacoast Online)</em> Information about the data breach was first discovered by the threat intelligence firm Gemini Advisory based in New York City (USA). “Gemini Advisory shared an image showing that my personal data was publicly available on a crime forum, including my ParkMobile account information in screenshots, along with information about the data. stolen. The data contains email addresses and phone numbers, as well as license plates for four different vehicles that I have used in the past 10 years, ”said cybersecurity expert Brian Krebs. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5811e8aecdec24b27dfd.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> On March 26, ParkMobile notified users that they had discovered &#8220;a cybersecurity incident related to a vulnerability in the third party software we use.&#8221; &#8220;We immediately launched an investigation with the assistance of a leading cybersecurity company to resolve the incident. We have also notified the appropriate law enforcement authorities. The investigation is still ongoing and we cannot provide details at this time, &#8220;said ParkMobile. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/a0351d8a38c8d19688d9.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> According to ParkMobile, no user&#8217;s credit card information was stolen. “Our investigation indicated that no sensitive data or credit card information that we encrypted, was affected. We will continue to maintain the security and monitor our systems closely, ”the statement said. According to cybersecurity expert Brian Krebs, if you are already using ParkMobile, quickly change your password. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/221a9ea5bbe752b90bf6.jpg" width="625" height="416"> <em> (Artwork: Shutterstock)</em> In the event that this password is used by you with other accounts as well, you should change everything to limit the likelihood of an attack, although it may take a while to complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8140</post-id>	</item>
		<item>
		<title>The clubhouse hype continues</title>
		<link>https://en.spress.net/the-clubhouse-hype-continues/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 23 Apr 2021 22:06:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Capital]]></category>
		<category><![CDATA[CLUBHOUSE]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attacks]]></category>
		<category><![CDATA[hype]]></category>
		<category><![CDATA[investors]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Value]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=7152</guid>

					<description><![CDATA[Investors have provided the audio app Clubhouse with fresh money, and growth continues. There have recently been new problems with data protection. Does the company have speed under control? The management of the audio app Clubhouse has raised fresh money from investors. On the one hand, this is intended to cope with the rush of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Investors have provided the audio app Clubhouse with fresh money, and growth continues. There have recently been new problems with data protection. Does the company have speed under control?</strong> </p>
<p> The management of the audio app Clubhouse has raised fresh money from investors. On the one hand, this is intended to cope with the rush of users over the past few months. Clubhouse wants to &#8220;welcome more users&#8221;, strengthen its infrastructure and &#8220;support&#8221; the providers of the discussions. The rapid growth meant that the servers were overloaded, and the algorithms were not designed for the high number of users. According to the company, around ten million users are currently on the platform every week. On the other hand, the capital injection should also serve to drive the growth course further. So far, Clubhouse has been above target in this regard: Clubhouse has &#8220;grown faster than expected,&#8221; the company said.</p>
<h2> Success arouses desire</h2>
<p>The audio-based social network app had already completed a financing round in January. As reported by financial news agency Bloomberg, Clubhouse is now worth around four billion dollars. That corresponds to around 3.3 billion euros and is four times as much as in January. The success of the app developed by Alpha Explorations in the USA last spring arouses desires and imitators. According to media reports, the news service Twitter is said to have recently been interested in a purchase, and Facebook is said to be working on a clubhouse clone. Facebook boss Mark Zuckerberg recently had a look in the virtual salon himself, and Tesla boss Elon Musk was also a guest &#8211; this of course increases the attractiveness of the audio offering. Listen to important people once: Many clubhouse users are likely to know these or similar wishes.</p>
<h2> Privacy advocates warn</h2>
<p>But the success story also has its downsides. Data protection advocates repeatedly express serious concerns. A relevant incident occurred only recently. In a hacker forum, data from 1.3 million clubhouse users emerged. Clubhouse denied being hacked. The data is publicly visible in the profile information that has been tapped in bulk, including name, user name, user ID, profile photos and contact lists. Sensitive data such as credit card information were not included. Such information could be used for targeted phishing attacks, warns the consumer advice center. The data can also be used to create fake accounts in social networks and practically carry out identity theft. The consumer association also criticizes the fact that conversations are recorded and evaluated on the servers in the USA. In addition, the app would have access to all saved contacts in the phone book.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7152</post-id>	</item>
		<item>
		<title>America is about to expel 10 Russian diplomats?</title>
		<link>https://en.spress.net/america-is-about-to-expel-10-russian-diplomats/</link>
		
		<dc:creator><![CDATA[Trang Trần]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 22:31:06 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Aimed at]]></category>
		<category><![CDATA[Allegations]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Confidence]]></category>
		<category><![CDATA[Diplomat]]></category>
		<category><![CDATA[diplomats]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[expel]]></category>
		<category><![CDATA[Expulsion]]></category>
		<category><![CDATA[Government]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hotspot]]></category>
		<category><![CDATA[Intervention]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Officials]]></category>
		<category><![CDATA[Punishment]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[Solar Winds]]></category>
		<category><![CDATA[the U S Treasury Department]]></category>
		<category><![CDATA[U S president]]></category>
		<category><![CDATA[USS Donald Cook]]></category>
		<category><![CDATA[Vladimir Putin]]></category>
		<category><![CDATA[Vote]]></category>
		<guid isPermaLink="false">https://en.spress.net/america-is-about-to-expel-10-russian-diplomats/</guid>

					<description><![CDATA[The US administration will show its diplomacy with Russia through two actions related to alleged cyber attacks and Ukraine hotspots. Russian President and US President &#8211; documentary photo. On April 15, the administration of US President Joe Biden intends to impose new sanctions on many Russian individuals and organizations. The US news agency, citing some [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US administration will show its diplomacy with Russia through two actions related to alleged cyber attacks and Ukraine hotspots.</strong><br />
<span id="more-1986"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_30_38535889/22eadfa3f5e11cbf45f0.jpg" width="625" height="375"></p>
<p>Russian President and US President &#8211; documentary photo.</p>
<p>On April 15, the administration of US President Joe Biden intends to impose new sanctions on many Russian individuals and organizations.</p>
<p>The US news agency, citing some well-informed sources, said Washington would punish 30 entities in Russia and expel 10 officials from the United States.</p>
<p>This is part of the US response to Russia over accusations that Moscow is the culprit behind large-scale cyber attacks against US software supply chain SolarWinds in December last year.</p>
<p>Through that attack, the hackers gain access to the data of thousands of companies and government offices that are partners of Solar Winds.</p>
<p>However, the Russian side has always strongly rejected and affirmed that it had prepared the scenario to deal with the worst situations.</p>
<p>Official sources from the White House, the State Department and the US Treasury Department have not officially announced or responded to the leaked information.</p>
<p>If confirmed, this is the &#8220;pain&#8221; of the US and Russia at the moment when the tense relationship between the two countries is falling into disagreement regarding the hot spot on the Russia-Ukraine border.</p>
<p>Earlier, this disagreement led the US to send two destroyers to the Black Sea towards Russia to show support for Ukraine.</p>
<p>However, after Russian President Vladimir Putin and US President Joe Biden made a phone call and the two sides agreed to hold a summit meeting in the near future, the US stopped the plan to destroy the USS Theodore Roosevelt and USS destroyers. Donald Cook into the Black Sea.</p>
<p>Turkey has received notification of this route change. This is a move that is expected to help cool the situation in Ukraine and ease tensions between the US and Russia.</p>
<p>Thus, in combination with the frigate developments and the US administration&#8217;s imposition of sanctions on Russia, it can be seen that the Biden administration probably wants to demonstrate the diplomatic stance with Moscow, which he immediately identified. from the beginning.</p>
<p>That is the US will react strongly to protect national interests against Russian actions such as accusations of cyber attacks, election interference &#8230; but will not make too much tension in matters related to international affairs. .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1986</post-id>	</item>
	</channel>
</rss>