<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>hackers &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 05:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Users need to update Google Chrome 91 immediately</title>
		<link>https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 04:13:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sergei Glazunov]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</guid>

					<description><![CDATA[Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers. Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus Recently, a security researcher from the Project Zero team discovered a critical security vulnerability [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers.</strong><br />
<span id="more-24823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/606fb267bc25557b0c34.jpg" width="625" height="390"> </p>
<p> <em> Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus</em> Recently, a security researcher from the Project Zero team discovered a critical security vulnerability (CVE-2021-30551) in Google Chrome, affecting many users. Not much is known about this vulnerability, instead, it is only briefly described: &#8220;Confusion in V8&#8221;. This is a JavaScript engine, used quite commonly on Google Chrome and browsers using Chromium source code (including Microsoft Edge). In a blog post, Google confirmed that the CVE-2021-30551 vulnerability exists in the wild. To limit future attacks, Google Chrome users should update their browser immediately by going to Settings &#8211; Help &#8211; About Google Chrome (about Google Chrome). When the update to version 91.0.4472.101 is complete, simply press Relaunch to restart the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/2dbde3b5edf704a95de6.jpg" width="625" height="335"> <em> Update Google Chrome browser to the latest version. Photo: Tieu MINH</em> This is the sixth zero day vulnerability found on Google Chrome since the beginning of the year. The latest version of the browser also contains a total of 10 security patches, seven of which are listed as High threat and one is described as Critical. Sharing with BleepingComputer, Kaspersky warned that a new group of hackers calling themselves PuzzleMaker successfully hacked both Chrome and Windows this month, prompting Microsoft to issue an urgent upgrade notice for Windows users. In addition, Kaspersky also recommends that users update their browser and operating system to the latest version to limit future attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24823</post-id>	</item>
		<item>
		<title>Unpatched vulnerability in Samsung phones allows hackers to read messages</title>
		<link>https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:51:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy S10]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Read]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[TECHCRUNCH ONLY]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[Unpatched]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</guid>

					<description><![CDATA[Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages. Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages. Not stopping there, things are even more dangerous when two other vulnerabilities [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages.</strong><br />
<span id="more-24695"></span> Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/8314b223bc61553f0c70.jpg" width="625" height="417"> Not stopping there, things are even more dangerous when two other vulnerabilities can be exploited by hackers to manipulate arbitrary files with higher permissions. What makes these even scarier is that they can be exploited without any user interaction. Samsung is aware of these security flaws and it may take the company about 2 months to fix. For now, the best defense is to make sure your Samsung phone is up to date with the latest firmware. Toshin said he has found more than a dozen vulnerabilities in Samsung devices since the start of the year, with many of these vulnerabilities already fixed. One of the bugs lies in apps and components like the Secure Folder app and the Knox security software that come pre-installed on Samsung devices. Tohsin told TechCrunch that these may have given attackers access to sensitive user data. Among +Samsung devices, the Galaxy S10+ is verified as affected. Another vulnerability resulted in the deletion of all previously downloaded apps once device admin rights were granted to a newly installed app. Additionally, a vulnerability in the Settings app could grant read/write access to files with system user-level privileges. A security flaw that was resolved in February could have given hackers access to users&#8217; SMS/MMS messages and call details. Toshin also warned Samsung about issues that may have helped bad guys get the SD card content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/bf9499a397e17ebf27f0.jpg" width="625" height="416"> While Samsung says the vulnerability affects &#8220;certain&#8221; Galaxy devices, the company appears to be downplaying the scope of the incident. “No issues have been reported globally and users should rest assured that their sensitive information is not at risk. We have addressed the potential vulnerability by developing and releasing security patches through a software update in April and May 2021 as soon as we identify the issue.” Korean company stated. (According to VOV, PhoneArena)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24695</post-id>	</item>
		<item>
		<title>Meat producer JBS pays ransom after hacker attack The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States.</title>
		<link>https://en.spress.net/meat-producer-jbs-pays-ransom-after-hacker-attack-the-worlds-largest-meat-company-jbs-has-apparently-paid-a-ransom-of-11-million-after-a-cyber-attack-by-hackers-it-was-another-incident-in-a-serie/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 22:06:06 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Apparently]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cases]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Hacker attack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[meat]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[pays]]></category>
		<category><![CDATA[Producer]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Series]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<category><![CDATA[worlds]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=24057</guid>

					<description><![CDATA[After a hacker attack Meat producer JBS pays ransom Status: 10.06.2021 7:13 a.m. The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. The US subsidiary of the Brazilian [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/usa-jbs-fleischproduzent-101https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP" title="Logo of the Brazilian meat producer JBS on a factory in the USA | AFP"></p>
<h1> After a hacker attack Meat producer JBS pays ransom </h1>
<p>Status: 10.06.2021 7:13 a.m. </p>
<p> <strong> The world&#8217;s largest meat company JBS has apparently paid a ransom of $ 11 million after a cyber attack by hackers. It was another incident in a series of corporate blackmail cases in the United States. </strong> The US subsidiary of the Brazilian meat processor JBS paid the equivalent of eleven million dollars in ransom after a hacker attack. The payment was made to prevent further disruption by the hackers and to restore the smooth operation of the affected locations, said the Dallas-based company. According to the US media, the payment was made in Bitcoin. According to the US government, the company had received a ransom note from a criminal organization likely based in Russia. The attack paralyzed JBS production in Australia and affected Canada and the United States.</p>
<h2> &#8220;A difficult decision&#8221;</h2>
<p>&#8220;This was a very difficult decision for our company and for me personally,&#8221; explained Managing Director Andre Nogueira. &#8220;However, we felt that this decision had to be made in order to avoid any potential risk to our customers.&#8221; The investigations are still ongoing, but preliminary results have suggested &#8220;that no company, customer or employee data has been compromised.&#8221;</p>
<h2> US investigators suspect Russia is behind it</h2>
<p>US President Joe Biden said last week that investigators had linked Russia to the JBS case. &#8220;JBS USA was in constant contact with government officials throughout the incident,&#8221; the company said. In the USA, the state and business are currently fighting a series of attacks with blackmail software known as &#8220;ransomware&#8221;. The data of the attacked systems are encrypted. The hackers demand cash payments in cryptocurrency so that they can unlock access again and not publish the data.</p>
<h2> Ransom payment in Bitcoin</h2>
<p>The US utility company was also last month <a   href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXIOw7DIAwA0LuwOzRrzsJiEfNRjUHGiKHq3duM733ccpcrZmNewQe_9z4MM80ZC67jpn9VtUfJgl9ipEKlkQQfO3epyDDqIK5CwJ0mZeIbCsY3KaBkrSmBoszeNirB-TqPYo3d9wc5S6jTfAAAAA.." class="textlink" title="Link zu: Colonial Pipeline räumt Lösegeld-Zahlung an Hacker ein" target="_blank" rel="nofollow noopener"> Colonial pipeline</a> The victim of a hacker attack with a blackmail Trojan that temporarily shut down the entire pipeline network. The US Federal Police FBI blames a hacker group called &#8220;Darkside&#8221; for the attack and later tracked down the ransom of 75 Bitcoin that Colonial had paid &#8211; at the time it was worth $ 4.4 million.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24057</post-id>	</item>
		<item>
		<title>Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code</title>
		<link>https://en.spress.net/warning-hackers-take-advantage-of-the-covid-19-epidemic-to-spread-malicious-code/</link>
		
		<dc:creator><![CDATA[Hà Thanh]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 06:15:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[advantage]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[DOCX]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Penetrate in]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Take advantage]]></category>
		<category><![CDATA[Title]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[Vaccines for COVID 19]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-hackers-take-advantage-of-the-covid-19-epidemic-to-spread-malicious-code/</guid>

					<description><![CDATA[Fake emails with content related to the Covid-19 vaccine sent to users. If you click on the document, the user will be attacked by the hacker. Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code. Illustration Taking advantage of the complicated development of the Covid-19 epidemic in many countries around the world [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Fake emails with content related to the Covid-19 vaccine sent to users. If you click on the document, the user will be attacked by the hacker.</strong><br />
<span id="more-23498"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_11_39141171/2965abeaa6a84ff616b9.jpg" width="625" height="327"> </p>
<p> <em> Warning: Hackers take advantage of the Covid-19 epidemic to spread malicious code. Illustration</em> Taking advantage of the complicated development of the Covid-19 epidemic in many countries around the world and even in Vietnam, hacker groups have opened many cyberattack campaigns through fake emails with documents containing malicious code. , with titles and content related to the Covid-19 epidemic to trick users into opening documents. As noted by experts of CyRadar Information Security Joint Stock Company, the hot topic of the Covid-19 epidemic and the Covid-19 vaccine has continued to be exploited by many hacker groups in their campaigns to defraud Vietnamese users. Nam through the form of sending fake emails with attached document files containing malicious code. Specifically, two cyberattack campaigns in the form of sending fake emails with attached documents related to the Covid-19 epidemic, including &#8220;Jam Gia Dien dich Covid-19.docx&#8221; and &#8220;Covid-19&#8211; Vaccines.xlsm”. The above docx and xlsm file formats, according to experts&#8217; analysis, have malicious code installed. When the user opens the document file, the malicious code will penetrate the computer, allowing the remote hacker to control the computer through commands. From there, hackers can also order to download many other malicious codes, steal data, passwords, screenshots&#8230; Currently, as noted by CyRadar, the number of cases where users are tricked into downloading and opening fake documents related to the Covid-19 epidemic and the Covid-19 vaccine are not many. However, in the context of a complicated epidemic and a growing remote working model, experts predict that in the coming time, there may be more hacker groups that continue to take advantage of the Covid-19 epidemic to attack scams. user island. Therefore, in addition to recommending the use of protection software, experts also recommend that organizations, businesses and users need to be careful and consider carefully when downloading email attachments.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23498</post-id>	</item>
		<item>
		<title>Beware of fake link called &#8216;Coca-Cola Welfare Fund&#8217; on Facebook that makes you lose your account tài</title>
		<link>https://en.spress.net/beware-of-fake-link-called-coca-cola-welfare-fund-on-facebook-that-makes-you-lose-your-account-tai/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 07:50:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[beverage]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Bleach]]></category>
		<category><![CDATA[brand]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[Ceiling paint]]></category>
		<category><![CDATA[Coca cola]]></category>
		<category><![CDATA[CocaCola]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[fund]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[lose]]></category>
		<category><![CDATA[Marketing campaign]]></category>
		<category><![CDATA[MESSENGER]]></category>
		<category><![CDATA[On face]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Pretend]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Tai]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[welfare]]></category>
		<category><![CDATA[Welfare Fund]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-fake-link-called-coca-cola-welfare-fund-on-facebook-that-makes-you-lose-your-account-tai/</guid>

					<description><![CDATA[Recently, Facebook users stirred when there were many fake links of Coca-Cola beverage brand. Notably, when clicking on this link, the Facebook account is immediately &#8220;discolored&#8221;. Specifically, the road link Fake Coca-Cola beverage brand spread through Messenger on smartphone leading many Facebook users to believe that this is a new advertising campaign of this beverage [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, Facebook users stirred when there were many fake links of Coca-Cola beverage brand. Notably, when clicking on this link, the Facebook account is immediately &#8220;discolored&#8221;.</strong><br />
<span id="more-22322"></span> Specifically, the road <em> link</em> Fake Coca-Cola beverage brand spread through Messenger on <em> smartphone</em> leading many Facebook users to believe that this is a new advertising campaign of this beverage company. Therefore, users have <em> click </em> into the road<em> link</em> The above leads to many accounts being &#8220;discolored&#8221;.</p>
<p> Street <em> link </em> This fake is called &#8220;Coca-Cola Welfare Fund&#8221;. Furthermore, the user after clicking on <em> website </em> Above, provide personal information, link to Facebook will receive a gift worth 2 million VND from this &#8220;fake&#8221; brand. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_105_39086514/10e4d2ccc08e29d0709f.jpg" width="625" height="351"> Website pretending to be Coca-Cola. The web interface is designed similar to <em> website</em> mainstream Coca-Cola. However, after trying the login steps, the Facebook account will immediately be disabled <em> hacker</em> intrusion, the user loses control of his personal page. Accounts that are disabled <em> hacker</em> Intrusion will continue to send <em> spam links link</em> Go to your friends Facebook account and post continue the way <em> link</em> up <em> newsfeed </em> to attract the attention of those who are curious and want to receive the gift of 2 million VND. Roads <em> link</em> &#8220;poison&#8221; contains <em> virus</em> could get into the computer or <em> smartphone</em> personal data, stealing important user data such as passwords, pictures even ID numbers, CCCD and bank passwords and many other security information. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_105_39086514/f07f33572115c84b9104.jpg" width="625" height="351"> Coca-Cola denied any connection to this fake website. The Coca-Cola brand has confirmed that this brand currently does not have any Welfare Fund <em> link</em> on the whole is due <em> hacker </em> impersonate. Up to the present time, the road <em> link</em> This fake is still spreading extremely widely on the Facebook platform in Vietnam. Facebook users need to be wary of strange links, not linked by personal accounts and absolutely do not provide information on any website. <em> website</em> any suspicious signs. <strong> Ceiling paint</strong> According to News TGDD</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22322</post-id>	</item>
		<item>
		<title>6 malicious Android apps users need to remove urgently from their phones</title>
		<link>https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:57:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Keyloggers]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virus removal]]></category>
		<guid isPermaLink="false">https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[In case your phone has 1 of the 6 applications below, quickly remove them immediately. Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware. (Artwork: Presse-citron) Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In case your phone has 1 of the 6 applications below, quickly remove them immediately.</strong><br />
<span id="more-21921"></span> Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/880527933cd1d58f8cc0.jpg" width="625" height="415"> <em> (Artwork: Presse-citron)</em> Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; steal their banking and other important personal information through tools like keyloggers. The analysis report from Bitdefender researchers said that Teabot malware can perform attacks through Android Accessibility Services, view private messages, steal banking information, steal authentication codes. of Google,&#8230; and even take full remote control of the victim&#8217;s devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/eb8fa8e1b7a35efd07b2.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Distributing malware directly from app stores would be difficult, so hackers use the method of impersonating top-rated apps distributed on third-party websites. . According to research by Bitdefender, fake Android apps include antivirus, media player, health, etc. To deceive users, the fake app&#8217;s name and logo will be copied. copy almost or exactly like the real application. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/732d887b9a3973672a28.jpg" width="625" height="468"> <em> (Artwork: Panda Security)</em> Here are 6 malicious apps impersonating famous apps to scam users. If you are using Android devices, please check all the applications on the device. In case your phone has 1 of the 6 applications below, quickly remove them immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/08f4f0a2e2e00bbe52f1.jpg" width="625" height="441"> <em> The main app icon (right) and the fake app (left) have some differences in the 5th and 6th apps. (Image: Bitdefender)</em> Bitdefender emphasizes that the campaign against these malicious applications is still active. For this reason, Android users need to be careful about downloading apps, especially apps from third parties, that aren&#8217;t part of the Google app market; Don&#8217;t click on strange links and always look carefully at the permission requests of Android apps.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21921</post-id>	</item>
		<item>
		<title>South Korea warns of increased malware attacks</title>
		<link>https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</link>
		
		<dc:creator><![CDATA[Phương Oanh (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:02:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[adjacent]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[South]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[warns]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</guid>

					<description><![CDATA[According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. (Artwork. Source: bitcoinexchangeguide.com) Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year.</strong><br />
<span id="more-21907"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_293_39085748/2281fbd0e99200cc5983.jpg" width="625" height="417"> </p>
<p> <em> (Artwork. Source: bitcoinexchangeguide.com)</em> Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase in online shopping activities. . On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Malware attacks <strong> blackmail</strong> was aimed at various businesses in Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local fashion and retail group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Mr. Kim Seung-joo, Professor of Cyber ​​Security at University <strong> Korea</strong> , commented that as companies are forced to choose to increase their reliance on remote work during the pandemic, cyber attacks <strong> malicious code</strong> Blackmail has become a bigger threat because they can paralyze the entire working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. He urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks in the near future, last month, the Korean Ministry of Information and Communications Technology set up a 24-hour monitoring group to support hacked companies. . The government is now providing assistance to affected companies in system recovery.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21907</post-id>	</item>
		<item>
		<title>Covid-19: Explosion of ransomware attacks in Korea</title>
		<link>https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 21:12:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Explosion]]></category>
		<category><![CDATA[Go to work]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Urging]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</guid>

					<description><![CDATA[Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea. The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap) On June 3, a large plastic surgery hospital in the south of Seoul announced on its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea.</strong><br />
<span id="more-21891"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_194_39085601/2ef7a1a1b3e35abd03f2.jpg" width="625" height="424"> </p>
<p> <em> The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap)</em> On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Ransomware attacks have targeted various businesses in South Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local retail and fashion group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Kim Seung-joo, a professor of cybersecurity at Korea University, said that in the context of companies being forced to choose to increase their reliance on remote working during the pandemic, ransomware attacks Money has become a bigger threat because they can paralyze the whole working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. Kim Seung-joo urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks, last month, South Korea&#8217;s Ministry of Information and Communications Technology set up a 24-hour monitoring team to assist hacked companies. The government is now providing assistance to affected companies in system recovery. (according to Yonhap)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21891</post-id>	</item>
		<item>
		<title>The US raised the level of investigation into the crime of extortion hackers to the level of &#8216;terrorists&#8217;</title>
		<link>https://en.spress.net/the-us-raised-the-level-of-investigation-into-the-crime-of-extortion-hackers-to-the-level-of-terrorists/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 08 Jun 2021 11:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[DOJ]]></category>
		<category><![CDATA[Establish]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[Guidelines]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[John Carlin]]></category>
		<category><![CDATA[level]]></category>
		<category><![CDATA[Level up]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[raised]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Terrorists]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[US Department of Justice]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-us-raised-the-level-of-investigation-into-the-crime-of-extortion-hackers-to-the-level-of-terrorists/</guid>

					<description><![CDATA[The US Department of Justice has raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases. Associated Reuters Citing a senior US official on June 3, the US Justice Department had raised the level of investigation into ransomware attacks to the same level of priority as investigating [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US Department of Justice has raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases.</strong><br />
<span id="more-21521"></span> Associated <em> Reuters </em> Citing a senior US official on June 3, the US Justice Department had raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases.</p>
<p> The move comes after the attack on the US oil and gas shipping company Colonial Pipeline and the growing damage caused by cybercriminals. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_114_39072829/49c50b18195af004a94b.jpg" width="625" height="432"> <em> The US raised the level of investigation into the crime of extortion hackers to the level of &#8216;terrorists&#8217;. Photo: REUTERS</em> In an internal guideline document sent to law offices across the United States on June 3, the US Department of Justice directed that investigations into ransomware should be coordinated with the central government, specifically: A new task force was established in Washington. &#8220;This will be a specialized process to ensure we can track all cases of extortion hackers regardless of where they happen in the US, so we can capture the connection between subjects and proceed to break the whole link,&#8221; said Deputy Attorney General John Carlin. Previously, in May, the largest US oil pipeline system, the Colonial Pipeline, was crippled by hackers. Colonial Pipeline has decided to pay hackers who have compromised their systems nearly $5 million to regain access. According to the <em> Reuters</em> , the DOJ&#8217;s guidance document specifically mentions the Colonial attack as an example of &#8220;the growing threat posed by cybercriminals and digital ransomware to the nation.&#8221; . &#8220;To ensure we can uncover connections between incidents and investigations across the country and globally, and to paint a big picture of national security and economic threats, The economy we face, we must strengthen and focus our internal monitoring,&#8221; the guidance document states. <em> Reuters </em> Citing US officials, the decision to include ransomware attacks in a special process by the Department of Justice shows that the issue is being prioritized. &#8220;We&#8217;ve used this model in the past for counterterrorism, but never with ransomware,&#8221; said Carlin, adding that the process typically applies to cases involving direct national security. In practice, this means that investigators at US attorneys&#8217; offices dealing with ransomware cases will have to share both up-to-date case details and technical information with officials in Washington. The guidelines also require offices to review and report other investigations related to the large-scale cybercrime ecology. According to the guidelines, the list of investigations currently required to be reported to the central government includes: anti-virus services, illegal online forums or marketplaces, cryptocurrency exchanges, cybercriminal server services, botnets, and online money laundering services. “We would like to emphasize that prosecutors and criminal investigators need to report and conduct monitoring of cryptocurrency exchanges, illegal online forums or marketplaces for trading hacking tools. , as well as tracking botnets that serve a variety of purposes,” said Carlin. According to Mark Califano, a former US attorney and cybercrime expert, raising the level of investigation could allow the US Justice Department to &#8220;deploy resources more effectively&#8221; and &#8220;identify common exploits&#8221; variables&#8221; used by cybercriminals.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21521</post-id>	</item>
		<item>
		<title>Why ransomware attacks will be more and more popular?</title>
		<link>https://en.spress.net/why-ransomware-attacks-will-be-more-and-more-popular/</link>
		
		<dc:creator><![CDATA[Theo QQ]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 22:40:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Company]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[JBS]]></category>
		<category><![CDATA[JBS USA]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Visual China]]></category>
		<guid isPermaLink="false">https://en.spress.net/why-ransomware-attacks-will-be-more-and-more-popular/</guid>

					<description><![CDATA[After successfully extorting Colonial &#8211; the largest fuel pipeline operator in the US, the world&#8217;s leading meat processing corporation became the target of ransomware. In a statement on May 31, JBS USA said it detected an organized cyberattack that affected several servers that support the corporation&#8217;s information technology systems at its North American facilities. and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After successfully extorting Colonial &#8211; the largest fuel pipeline operator in the US, the world&#8217;s leading meat processing corporation became the target of ransomware.</strong><br />
<span id="more-21154"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_309_39056915/179775ff64bd8de3d4ac.jpg" width="625" height="416"> </p>
<p> In a statement on May 31, JBS USA said it detected an organized cyberattack that affected several servers that support the corporation&#8217;s information technology systems at its North American facilities. and Australia. JBS is the world&#8217;s largest meat processing company, with operations in many countries such as the US, Australia, Canada, Europe, Mexico, New Zealand and the UK. The company said no customer, supplier or employee data was leaked or used for shady purposes following the cyberattack. However, the company said it will take a long time to resolve this issue and as a result, some transactions with customers and suppliers may be disrupted. All US beef processing plants under JBS have stopped production, affecting nearly a quarter of the total supply in the US market. The company&#8217;s other meat processing plants were also disrupted to a certain extent. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_309_39056915/6747012f106df933a07c.jpg" width="625" height="355"> Photo: Visual China Although the company has not publicly stated that it is threatened by ransomware, the White House said the attack was ransomware, possibly from a group based in Russia, although JBS has not made it public. confirm this. White House spokeswoman Karine Jean-Pierre told Reuters the FBI was investigating. Ransomware is malicious software that encrypts a target&#8217;s system, preventing users from accessing and using their computer system or document files (mainly detected on Windows operating systems). In some cases, hackers also gain access to the target&#8217;s data and demand a ransom if they want to get the data back. Since November last year, a series of ransomware attacks have targeted well-known companies such as the US factory Foxconn, Apple&#8217;s Macbook Quanta laptop assembly partner, and the Colonel Pipeline pipeline company. Among them, Quanta has stolen a large number of drawings of the new MacBook, which has a certain effect on Apple. The hacker group asked Apple to pay a ransom of $ 50 million to not publicly publish the data they have, Apple flatly refused. Leading US fuel pipeline operator Colonial Pipeline has shut down its entire network following a ransomware-related cyberattack. According to CNBC, the company Colonial paid $4.4 million in ransom in the form of Bitcoin cryptocurrency to the DarkSide hacker group. For these companies, there are two issues that need to be considered: First, why the security team can&#8217;t resist hacker attacks; second, what role does cryptocurrencies play in these transactions? <strong> The &#8220;fragility&#8221; of businesses before a cyber attack</strong> When you hear the word &#8220;cybersecurity,&#8221; you probably think of large companies or government organizations that invest tens of millions of dollars in firewalls, anti-virus software, and other security protocols to protect their systems from potentially malicious attacks or data leaks. Or you would think of the large internal cybersecurity teams who are knowledgeable and know how to deploy the latest technology to fight hackers and protect corporate information. The reality is that security issues affect every company &#8211; from the smallest store, fledgling startups to the largest multinationals. Any system is not immune to loopholes, and hackers who have the guts to attack large businesses are organized and premeditated. The security team of a large enterprise cannot avoid negligence, giving hackers the opportunity to take advantage. <strong> Hackers take advantage of cryptocurrency to make blackmail transactions</strong> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_309_39056915/57e63d8e2cccc5929cdd.jpg" width="625" height="428"> Photo: QQ After successful attacks, many hacker groups now demand ransom in the form of cryptocurrencies, namely Bitcoin instead of real money. All transactions are assigned to Bitcoin addresses, but this address is not assigned to a specific person or organization. To increase anonymity, each transaction you can use a Bitcoin address to send and receive money, no one can know who you are. So Bitcoin is definitely the best choice when it comes to making illegal transactions. As the most valuable cryptocurrency today, Bitcoin has become a favorite object of hackers. The market value of cryptocurrencies skyrocketed around October of last year. Since mid-May of this year, this market price has been continuously falling, but it seems that the cryptocurrency still has a chance to explode again. In 2017, a type of malicious code called WannaCry opened a huge cyber attack in 150 countries, causing many users&#8217; files to be locked. If they want the right to unlock, the victim has to pay the hackers 300 USD worth of Bitcoin. In 2019, hackers attacked the city of Baltimore (Maryland state, USA), froze thousands of computers, turned off emails &#8230; and demanded the city pay about 100,000 USD in Bitcoin. <strong> Ransomware attacks will get stronger and stronger</strong> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_309_39056915/a85bc433d5713c2f6560.jpg" width="625" height="399"> Photo: QQ According to Ekram Ahmed, a spokesman for cybersecurity firm Check Point: &#8220;Hackers are pursuing larger and more advanced targets because they know they can succeed. Networks like Colonial paid $4.4 million in ransom, ransomware monetization will attract many new entrants. Things are getting worse, and I firmly believe that ransomware is now a national security threat.&#8221; . The consecutive attacks signal a worrying trend in ransomware attacks, especially those that can cause major disruption. Ransomware attacks are becoming more and more common, although hackers often find smaller and more vulnerable targets, less network security, and will pay a ransom to keep their systems normal. usually return as quickly as possible. Cryptocurrencies like Bitcoin have made it much easier for hackers to obtain ransoms. &#8220;Ransomware is now a lucrative business for hackers. Since the beginning of 2020, the number of organizations affected by ransomware has increased by 120%.&#8221; According to a recent report by cybersecurity firm Sophos, the average cost of recovering from a ransomware attack also appears to have doubled. Software company Chainalysis determined that $350 million was spent on ransomware ransoms in 2020. But it can be difficult to know the full scale of the attacks and the amount of ransom paid, because many the company did not report them in the first place. CNA Financial Corporation, one of the largest insurance companies in the US, paid $40 million in ransom last March, which was revealed only two months later. Law enforcement agencies advise businesses hit by ransomware not to pay the ransom, and say it will encourage hackers to continue demanding increasingly high amounts. However, not every company has the technological capabilities to deal with a group of hackers as sophisticated as Apple.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21154</post-id>	</item>
		<item>
		<title>4 recommendations to limit risks from ransomware</title>
		<link>https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 17:16:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[FTP]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Right from the start]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</guid>

					<description><![CDATA[Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats. Appropriate measures should be taken to limit the risk from ransomware. Illustration. With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats.</strong><br />
<span id="more-20877"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/fcc826223760de3e8771.jpg" width="625" height="351"> </p>
<p> <em> Appropriate measures should be taken to limit the risk from ransomware. Illustration. </em> With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and demand ransom. Cybercriminals carry out cyberattacks according to a concise strategy that is applicable to many industries. An analysis of recent experts shows that, in 2020 alone, the amount of damage related to ransomware attacks has reached billions of dollars. More dangerously, this behavior also targets the government&#8217;s information technology systems, causing serious impact. To protect critical data from attacks, government IT systems need to ensure external layers of security, while having the added responsibility of maintaining the infrastructure if an intrusion occurs. offense. According to studies, despite the development and expansion of the scope, the attacker&#8217;s methods still have similarities. Most hackers will illegally exploit the lowest-level vulnerabilities first, through some common and easy-to-implement method. Therefore, experts recommend to prevent ransomware from this initial step through some of the following methods. <strong> 1. Secure remote access</strong> Remote access is a familiar method often used by attackers, especially through unpatched vulnerabilities of information systems. Accordingly, hackers are constantly scanning the internet, looking for ways to exploit these vulnerabilities to perform attacks. To combat vulnerability scanning, organizations should prioritize patching vulnerabilities first. Along with that, to protect the system, experts recommend that organizations identify remote access systems to their systems by looking up IP addresses. If an attack is suspected, users should block public access to remote desktop protocol services (iRemoteDesktop &#8211; RDP), a secure shell that encrypts transmission data (Secure Socket Shell &#8211; SSH) ) and file transfer protocol (File Transfer Protocol &#8211; FTP). Agencies and organizations need to ensure that systems for remote access such as firewalls, VPN gateways, and email gateways are regularly patched, perform scanning for security holes, and deploy multi-factor authentication. Multi-factor Authentication (MFA) for accounts that are authorized for remote access. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/6d7e059ab8d9518708c8.jpg" width="625" height="499"> Hackers take advantage of security holes to attack the network. Illustration. <strong> 2. Email security</strong> Many ransomware incidents can start with an email sent to a user. This attack method is gradually becoming popular for hackers to perform blackmail. Experts say it&#8217;s safer to prevent unsolicited emails in the first place. The email security system acts as a &#8220;fence&#8221; to protect the strange messages from the internet and private mailboxes in the intranet system. To avoid email threats, users need to make sure email messages are scanned through a filtering system, and check attachments and links for advanced threats. In addition, account holders should audit or block password-protected documents as hackers often use this method to bypass email data scanning. <strong> 3. Keep data backups safe </strong> The third most common method for ransomware is to identify the target, encrypt the data, and then completely delete the backups. In addition to the data on the network and the data being used directly, the hacker will search all backups and encrypt them, disabling the data to increase the possibility of ransom from the victim. The victim then has a high probability of paying to buy back these encrypted data. Therefore, individuals, agencies and organizations should have backup plans to ensure the safety of all data. <strong> 4. Implement a 3-2-1 . Backup Strategy</strong> Without the right protections, backups, and archiving, concurrent copies on the same network are vulnerable to hackers. To avoid network-wide attacks, experts have come up with a safe backup measure for users&#8217; data systems. For all important files, users should store 3 copies, including 1 primary backup for daily use and 2 backup copies. In it, the files will be saved on 2 different media environments to reduce the possibility of mass attacks. These copies must be in place so that data can be accessed and restored easily and quickly in the event of a failure. At the same time, users should save 1 copy outside the work network or home network, in case of force majeure situations due to natural disasters, unexpected disasters.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20877</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>MB transferred the agency to investigate the perpetrators of the release of the artist Hoai Linh&#8217;s account statements</title>
		<link>https://en.spress.net/mb-transferred-the-agency-to-investigate-the-perpetrators-of-the-release-of-the-artist-hoai-linhs-account-statements/</link>
		
		<dc:creator><![CDATA[Phúc Lâm -]]></dc:creator>
		<pubDate>Sun, 30 May 2021 15:55:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Culprit]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[lot]]></category>
		<category><![CDATA[MB Bank]]></category>
		<category><![CDATA[Overhead]]></category>
		<category><![CDATA[perpetrators]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[statements]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[transferred]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-transferred-the-agency-to-investigate-the-perpetrators-of-the-release-of-the-artist-hoai-linhs-account-statements/</guid>

					<description><![CDATA[On the evening of May 27, MB released a press release saying that the culprit was an MB employee who leaked customer information, seriously violating the bank&#8217;s regulations&#8230; &#8220;After information was spread online about the image of artist Hoai Linh&#8217;s account statement, the Bank checked and verified the incident and discovered that an employee intentionally [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the evening of May 27, MB released a press release saying that the culprit was an MB employee who leaked customer information, seriously violating the bank&#8217;s regulations&#8230;</strong><br />
<span id="more-19315"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_3_38990010/ca32264e300cd952801d.jpg" width="625" height="390"> </p>
<p> &#8220;After information was spread online about the image of artist Hoai Linh&#8217;s account statement, the Bank checked and verified the incident and discovered that an employee intentionally copied the screen and leaked it. Currently, MB has suspended this person&#8217;s work and will take disciplinary action at the highest level; at the same time, transfer the entire case file to the investigating agency for handling in accordance with the law.&#8221; , the statement said. MB Bank also confirmed that the disclosure of information on the air was caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. Because this system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with hundreds of millions of safe transactions. The MB representative also said that in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information throughout the system. The Bank will take appropriate disciplinary measures for all individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with legal regulations, industry and MB. It is known that a week ago, on social networks, a &#8220;controversial&#8221; case appeared, artist Hoai Linh was more than 6 months late paying over 14 billion VND in relief money for flood victims in the Central region, transferred by benefactors. come. Just a few days later, the online community released photos of dozens of statements showing the transactions of comedian Hoai Linh&#8217;s account opened at MB bank. Immediately, a wave of protests against MB&#8217;s disclosure/passage of confidential customer account information. After about 3 days of actively researching, until today, May 27, MB has an official feedback.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19315</post-id>	</item>
		<item>
		<title>MB transferred the profile of the person who leaked Hoai Linh&#8217;s account information to the investigating agency</title>
		<link>https://en.spress.net/mb-transferred-the-profile-of-the-person-who-leaked-hoai-linhs-account-information-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[Thanh Lịch]]></dc:creator>
		<pubDate>Sun, 30 May 2021 15:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Again]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Profile]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Smart eKYC]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[transferred]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-transferred-the-profile-of-the-person-who-leaked-hoai-linhs-account-information-to-the-investigating-agency/</guid>

					<description><![CDATA[Military Bank (MB) has just released a statement saying that, having discovered an individual working at this bank to leak customer information, this individual has been suspended from work and transferred to the Bank. investigation agency. It is known that in the past few days, public opinion has been constantly interested in information reflecting the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Military Bank (MB) has just released a statement saying that, having discovered an individual working at this bank to leak customer information, this individual has been suspended from work and transferred to the Bank. investigation agency.</strong><br />
<span id="more-19304"></span> It is known that in the past few days, public opinion has been constantly interested in information reflecting the fact that artist Hoai Linh is holding more than 13 billion VND for charity in the past several months and the spread of information. about this artist&#8217;s MB account transaction on social networks.</p>
<p> After the investigation process, the Military Bank (MB) said that MB discovered an individual working at this bank to leak customer information, this individual had seriously violated the regulations of the Bank. Bank. MB&#8217;s announcement emphasized that, in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. <em> MB transferred the profile of the person who leaked Hoai Linh&#8217;s account information to the investigating agency</em> At the same time, there will be appropriate disciplinary measures for individuals who disclose/leave information, fail to comply with professional ethics regulations, and do not comply with Laws and regulations of the bank. Currently, MB has suspended the work of the above violator and will organize disciplinary action with the highest form of the violator, and at the same time, the bank has transferred the file to the investigation agency for handling. MB confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. Because the bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_359_38989872/af23b441a2034b5d1212.jpg" width="625" height="357"> MB&#8217;s representative also emphasized that transaction information at MB is protected by 3 layers of fences, including: First, the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). Along with that, &#8220;In order not to let similar incidents happen again, in order to secure information and transaction data of customers, MB has also reviewed the working processes, strictly decentralized and tightened more work discipline&#8221; &#8211; MB representative confirmed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19304</post-id>	</item>
		<item>
		<title>MB staff revealed the account of artist Hoai Linh was disciplined, the bank sent the file to the investigating agency</title>
		<link>https://en.spress.net/mb-staff-revealed-the-account-of-artist-hoai-linh-was-disciplined-the-bank-sent-the-file-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[PV]]></dc:creator>
		<pubDate>Sun, 30 May 2021 14:10:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[disciplined]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[Linh]]></category>
		<category><![CDATA[Revealed]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Smart eKYC]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-staff-revealed-the-account-of-artist-hoai-linh-was-disciplined-the-bank-sent-the-file-to-the-investigating-agency/</guid>

					<description><![CDATA[On the evening of May 27, 2021, Military Commercial Joint Stock Bank informed that artist Hoai Linh&#8217;s account statement was posted on social networks a few days ago, and is said to have been posted by &#8220;Bank staff&#8221;. Accordingly, MB has found the person who caused the violation and conducted strict disciplinary action and sent [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the evening of May 27, 2021, Military Commercial Joint Stock Bank informed that artist Hoai Linh&#8217;s account statement was posted on social networks a few days ago, and is said to have been posted by &#8220;Bank staff&#8221;. Accordingly, MB has found the person who caused the violation and conducted strict disciplinary action and sent the file to the investigation agency.</strong><br />
<span id="more-19296"></span> Specifically, the Bank checked, and verified the above incident, discovered an individual working at the bank to leak customer information, this individual had seriously violated the Bank&#8217;s regulations.</p>
<p> In the spirit of respecting the law, the Bank commits to take strict measures to ensure absolute compliance with the provisions of the law on protecting customer information; take appropriate disciplinary measures for individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with the provisions of law, regulations of the bank. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_35_38989732/9ee5b086a6c44f9a16d5.jpg" width="625" height="416"> Specifically, the Bank has suspended the work of individual violators and will organize disciplinary action with the highest form of violators, and at the same time transfer the file to the investigating agency for handling. Information to the press, MB confirmed that the disclosure of information was not due to a breakdown in the bank&#8217;s information technology (IT) system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. Transaction information is protected by 3 layers of fences including: The first is the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). “In order not to let similar incidents happen again, in order to secure the information and transaction data of our customers, we have also reviewed the working processes, strictly decentralized and tightened the working discipline. more work”- MB emphasized.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19296</post-id>	</item>
		<item>
		<title>Hoai Linh account information leaked: MB handled employees with serious violations</title>
		<link>https://en.spress.net/hoai-linh-account-information-leaked-mb-handled-employees-with-serious-violations/</link>
		
		<dc:creator><![CDATA[Anh Tuấn]]></dc:creator>
		<pubDate>Sun, 30 May 2021 11:32:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[handled]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linh]]></category>
		<category><![CDATA[MB Bank]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Serious violation]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[Violations]]></category>
		<category><![CDATA[Vo Nguyen Hoai Linh]]></category>
		<guid isPermaLink="false">https://en.spress.net/hoai-linh-account-information-leaked-mb-handled-employees-with-serious-violations/</guid>

					<description><![CDATA[Regarding the leaked account statement of artist Hoai Linh, MB Bank discovered an individual working at the Bank to reveal customer information. MB has suspended the work of the violator&#8230; In the past few days, the incident has spread on the social network of the artist Hoai Linh&#8217;s account transaction statement (full name is Vo [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Regarding the leaked account statement of artist Hoai Linh, MB Bank discovered an individual working at the Bank to reveal customer information. MB has suspended the work of the violator&#8230;</strong><br />
<span id="more-19272"></span> In the past few days, the incident has spread on the social network of the artist Hoai Linh&#8217;s account transaction statement (full name is Vo Nguyen Hoai Linh) in charity work, attracting public attention. This incident is said to be posted by an employee of Military Bank (MB).</p>
<p> Regarding this incident, MB Bank said that after receiving information from public opinion that the artist Hoai Linh&#8217;s account was spread on the social network that was supposed to be opened at MB, the Bank checked and verify the facts. And MB has discovered an individual working at the Bank to leak customer information. This individual has seriously violated the Bank&#8217;s regulations. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_23_38989670/db9280f296b07fee26a1.jpg" width="625" height="398"> In the spirit of respecting the law, MB is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. The Bank will take appropriate disciplinary measures for individuals who disclose/leave information, fail to comply with professional ethics regulations, and do not comply with laws and regulations of the bank. Regarding MB&#8217;s handling method for violators, the Bank has suspended the violators&#8217; work and will organize disciplinary action with the highest form of violators, and the bank has transferred the files to the violators. to the investigating agency for handling. In addition, the Bank confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the App MB product, transaction information is protected by three layers of fences, including: The first is the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; the second is an encryption layer that protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; third, the ultimate protective barrier is built on each feature that Ebank offers&#8230; In order not to let similar incidents happen again, in order to secure information and transaction data of customers, MB&#8217;s representative said that the Bank has reviewed the working processes, strictly decentralized and tightened stricter work discipline.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19272</post-id>	</item>
		<item>
		<title>Find out who leaked Hoai Linh&#8217;s account information, send the file to the investigating agency</title>
		<link>https://en.spress.net/find-out-who-leaked-hoai-linhs-account-information-send-the-file-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[Nha Trang]]></dc:creator>
		<pubDate>Sun, 30 May 2021 08:48:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Find]]></category>
		<category><![CDATA[Find out]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[Military joint stock commercial bank]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Send]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<guid isPermaLink="false">https://en.spress.net/find-out-who-leaked-hoai-linhs-account-information-send-the-file-to-the-investigating-agency/</guid>

					<description><![CDATA[Regarding the case that artist Hoai Linh &#8216;om&#8217; more than 13 billion dollars for charity from floods in the Central region for more than 6 months and the disclosure of the artist&#8217;s MB account transaction information, the Military Bank (MB) MB has checked, and verified the above incident, discovered an individual working at the bank [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Regarding the case that artist Hoai Linh &#8216;om&#8217; more than 13 billion dollars for charity from floods in the Central region for more than 6 months and the disclosure of the artist&#8217;s MB account transaction information, the Military Bank (MB) MB has checked, and verified the above incident, discovered an individual working at the bank to leak customer information, this individual has seriously violated the bank&#8217;s regulations.</strong><br />
<span id="more-19244"></span> MB&#8217;s announcement emphasized that, in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. The Bank will take appropriate disciplinary measures for individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with the Laws and Regulations of the bank.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_11_38989276/e78b54434201ab5ff210.jpg" width="625" height="445"> <em> MB confirmed that this information disclosure was not caused by a breakdown in the bank&#8217;s IT system or a hacker attack</em> The Bank&#8217;s handling method for violators: The Bank has suspended the violator&#8217;s work and will organize disciplinary action with the highest form of violators, and the bank has transferred the file to to the investigating agency for handling. MB confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. Transaction information is protected by 3 layers of fences including: First, the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). &#8220;In order not to let similar incidents happen again, in order to secure the information and transaction data of our customers, we have also reviewed the working processes, strictly decentralized, and tightened the working discipline. more work&#8221; &#8211; MB representative confirmed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19244</post-id>	</item>
		<item>
		<title>Lost my password because I opened an email attachment</title>
		<link>https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 27 May 2021 17:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Attachment]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Camouflage]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PDF]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Somethings like that]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[The same]]></category>
		<category><![CDATA[Trojans]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</guid>

					<description><![CDATA[Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you. Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers. The form of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you.</strong><br />
<span id="more-18631"></span> Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/1459f36ae6280f765639.jpg" width="625" height="351"> <em> The form of attack and distribution of malware via email is quite common. Photo: Yahoo</em> Recently, Microsoft&#8217;s security research team discovered a new attack via email. When the victim downloads and opens the attached PDF files, the Trojan will access the device and steal login information, passwords, etc. In addition, the malware also takes control of the system and disguises itself as fake ransomware. “Version 1.5 of the malware has quite a few changes compared to the previous version, but their functionality remains largely the same, including collecting browser passwords, running remote commands and PowerShell, remembering operations. keyboard operation… and some other features”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/c47f244c310ed850811f.jpg" width="625" height="534"> <em> Malicious PDF file attached to email. Photo: Microsoft</em> According to the report of <em> Threatpost</em> , malware is being distributed by attackers by email, users can identify their signs through messages like &#8220;Outgoing Payments&#8221;, &#8220;Accounts Payable Department&#8221; &#8230; Microsoft said that Microsoft 365 Defender software can detect and prevent malware from attacking computers based on machine learning.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18631</post-id>	</item>
		<item>
		<title>Is Colonial Pipeline covered by insurance?</title>
		<link>https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 27 May 2021 09:40:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CNA]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Evil Corp]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hades myth]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurance company]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[sensitive]]></category>
		<category><![CDATA[Steal]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</guid>

					<description><![CDATA[CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack. Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack.</strong><br />
<span id="more-18536"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_232_38971994/d799f8a1ede304bd5df2.jpg" width="625" height="312"> </p>
<p> Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The hackers then demanded a payment to unlock the files and promised not to leak the stolen data. In recent years, hackers have targeted victims with cyber insurance policies, and large volumes of sensitive consumer data make them more likely to pay ransoms, according to cybersecurity experts. According to the unnamed source, CNA paid the hackers about two weeks after a bunch of company data was stolen and CNA officials were locked out of its own network. CNA does not comment on the ransom, with a CNA spokesperson saying CNA followed all laws, regulations and guidelines, including OFAC&#8217;s 2020 ransomware guide, in handling the matter. CAN also shares attack intelligence and hackers&#8217; identities with the FBI and the Treasury Department&#8217;s Office of Foreign Assets Control because facilitating ransom payments to hackers can cause punishment risk. <strong> The largest ransom amount</strong> Ransomware attacks &#8211; and payments in particular &#8211; are rarely disclosed so it&#8217;s difficult to know what the largest ransom is. The $40 million payout is larger than any previously disclosed payments to hackers. The hackers attacking CNA used malware called Phoenix Locker, a variant of ransomware called &#8216;Hades.&#8217; According to cybersecurity experts, Hades was created by a Russian cybercrime organization called Evil Corp. Evil Corp. was sanctioned by the United States in 2019. However, identifying attacks can be difficult because hacking groups can share code or sell malware to each other. CNA, which provides cyber insurance, said its investigation concluded that the Phoenix hacker group was not on the US sanctions list. The disclosure of the payment is likely to draw outrage from lawmakers and regulators who are unhappy that US companies are paying large sums of money to criminal hackers who over the past year have targeted hospitals, drug manufacturers, police forces and other entities critical to public safety. The FBI discourages organizations from paying ransoms because it encourages additional attacks and does not guarantee data will be returned. Last year was a standout year for ransomware groups, with a task force made up of security experts and law enforcement agencies estimating that victims paid around $350 million in ransom last year, up 311% compared to 2019. The Task Force suggested 48 actions the Biden administration and the private sector could take to mitigate such attacks, including better regulation of money markets. digital currency used to make ransom payments. The report, prepared by the Institute for Security and Technology, was delivered to the White House days before the Colonial Pipeline Company was compromised in a ransomware attack that resulted in fuel shortages and long lines at stores. gas stations along the US East Coast Bloomberg reported that Colonial paid hackers nearly $5 million shortly after the attack. Colonial CEO Joseph Blount, in an interview with the Wall Street Journal published Wednesday, confirmed that the company paid the hackers &#8211; $4.4 million in ransom. According to two people familiar with the CNA attack, the company initially ignored the hacker&#8217;s request and attempted to recover the data without negotiating with the criminals. But within a week, the company decided to start negotiating with the hackers, who were demanding $60 million. Residents said the payment was made a week later. According to Barry Hensley, chief intelligence officer at cybersecurity firm Secureworks Corp. then the Phoenix Locker seems to be a variation of Hades based on the overlap of the code used in each. He said they have not yet identified which hackers used the Hades variant to attack CNA. Cybersecurity firm CrowdStrike Holdings Inc believes Hades was created by Evil Corp. to bypass US sanctions against the hacking group. In December 2019, the Treasury Department announced sanctions against 17 individuals and six entities associated with Evil Corp. At the time, the Treasury Department said Evil Corp used malware &#8220;to infect computers and collect login information from hundreds of banks and financial institutions in more than 40 countries, causing more than 100 million dollars of theft. “It is illegal for any U.S. company to knowingly pay a ransom to Evil Corp. According to Melissa Hathaway, President of Hathaway Global Strategies and a former cybersecurity adviser to Presidents George W. Bush and Barack Obama, demand for ransomware has grown exponentially over the past six months. Hathaway said the average hacker&#8217;s ransom demand is between $50 million and $70 million. Those claims are often negotiable, and companies often pay ransoms in the tens of millions of dollars, in part because cyber insurance policies cover some or all of the costs. Hathaway estimates that the average payout is between $10 and $15 million. <strong> Ngoc Linh </strong> &#8211; According to Insurance Journal</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18536</post-id>	</item>
		<item>
		<title>Hackers in Vietnam are on the rise</title>
		<link>https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Wed, 26 May 2021 14:20:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Complicated developments]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Kong]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subset]]></category>
		<category><![CDATA[Traditional approach]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</guid>

					<description><![CDATA[In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230; Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230;</strong><br />
<span id="more-18353"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_3_38951174/fc0f0f191b5bf205ab4a.jpg" width="625" height="416"> </p>
<p> Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of remote working. This manifests itself in large-scale and increasingly complex attacks. Hackers perform an average of 50 million password attacks per day, 579 attacks per second. <strong> AGAINST MALWARE AND RAMSOMWARE WITH DEVELOPMENT</strong> Microsoft&#8217;s telemetry results released over the weekend showed that the prevalence of malware and ransomware infections in Asia-Pacific has been increasing over the past 18 months, stretching back to before the Covid-19 pandemic. -19 outbreak to date. Specifically, in Australia it is 23%; China is 80%; India 15%; Japan 16%; New Zealand 19%, Singapore 43%, Hong Kong 38%, South Korea 22%, Malaysia 2%, Philippines 15%, Taiwan 16%, Thailand 3% and Vietnam 7%. Among them, Indonesia alone has a 24% decrease in malware infection rate. The number of cyber attacks and the number of Vietnamese IP addresses in botnets increased in March 2021 due to hackers taking advantage of the increasing demand for Internet use by users as well as people&#8217;s interest in translation information. Covid-19. During the same period, the number of ransomware infections (a subset of malware) also increased by 453% in Australia; China (463%); India (100%); Japan (541%); New Zealand (825%); Singapore (296%), Hong Kong (179%), Indonesia (31%), South Korea (64%), Malaysia (72%), Philippines (70%), Taiwan (407%), Thailand (6%) ). This figure in Vietnam is recorded at 15%. In Vietnam, in March 2021 alone, the Information Security Administration recorded 491 incidents of cyber attacks on information systems, an increase of 8.15% compared to February 2021. In which, the number of Malware attacks is 180, while Phishing and Deface attacks are 164 and 147, respectively. In the first quarter of 2021, although compared to the same period in 2020, the number of cyberattacks causing problems on information systems decreased by 20%, but from the beginning of 2021 to now, the number of cyberattack incidents has decreased by 20%. is still in an uptrend. Experts believe that the reason for the increase in the number of cyberattacks and the number of Vietnamese IP addresses in botnets in March 2021 was because hackers took advantage of users&#8217; increasing demand for Internet use as well as the interest People&#8217;s attention to information about Covid-19 epidemic. Therefore, the number of Phishing and Malware attacks on systems has increased to cheat, destroy and steal information illegally&#8230; It can be seen that, in the context of complicated epidemic developments, when more and more organizations, businesses and individual users work remotely, work from home, they are creating an environment for bad guys to exploit vulnerabilities, Attacks, information theft, large-scale cyberattacks take place in Vietnam and around the world. <strong> ABOUT 3.5 MILLION SECURITY PROFESSIONALS IN 2021</strong> Experts say that even as more people begin returning to the office, hybrid work is forecast to remain the norm in the future. According to Forrester, as people gradually settle into a new working model after the pandemic, we will still see an increase in the proportion of employees working remotely compared to before the pandemic, at 300%. And the current Job Trends Index report shows that 53% of respondents in Asia plan to move to a new place because they can work remotely, compared to 46 percent globally. %. That change has been demanding an urgent need for new security solutions to meet the way of working, especially when the network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. Organizations and businesses need to take data and authentication as the center. While there are many other ways to secure these days, addressing identity, authentication, and information management issues is still critical. Experts have pointed out 4 main pillars to protect users against new work era cyber threats, including: identity protection, Zero Trust mindset, cloud application, and resource investment. security personnel. The network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. As recent attacks have shown, identity will be the &#8220;battlefield&#8221; for future attacks. Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal said that, in a world where identity is the new battleground, adopting a Zero Trust strategy has become a must for businesses. Karma. The hybrid workplace is virtually borderless, so it&#8217;s important to establish protective &#8220;barriers&#8221; around identities and devices. As part of his journey to building a Zero Trust mindset, the expert emphasized that “passwordless authentication will be the trend of the future and that transformation will be seen this year”. Besides the application of technology, experts also emphasize the special importance of people and skills in ensuring information security of each business organization. However, the lack of security professionals and the lack of diversity in security teams are two weaknesses that attackers will find to hit next year, the expert said. It is estimated that the information security industry will be short of about 3.5 million security professionals this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18353</post-id>	</item>
		<item>
		<title>Response at an international level to ensure cybersecurity for the energy industry</title>
		<link>https://en.spress.net/response-at-an-international-level-to-ensure-cybersecurity-for-the-energy-industry/</link>
		
		<dc:creator><![CDATA[Nangluongquocte.petrotimes.vn]]></dc:creator>
		<pubDate>Tue, 25 May 2021 22:41:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[ARAMCO]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Cope with]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Digitizing]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[international]]></category>
		<category><![CDATA[level]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[National level]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Oil and Gas]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[React]]></category>
		<category><![CDATA[Rehibilitate]]></category>
		<category><![CDATA[response]]></category>
		<category><![CDATA[Siemens]]></category>
		<category><![CDATA[Siemens Energy]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[United States Biden]]></category>
		<category><![CDATA[World Economic Forum]]></category>
		<guid isPermaLink="false">https://en.spress.net/response-at-an-international-level-to-ensure-cybersecurity-for-the-energy-industry/</guid>

					<description><![CDATA[Oilprice May 22 reported, Aramco, Siemens Energy and the World Economic Forum announced they will be launching a joint report on cyber resilience, Siemens also announced a cybersecurity partnership with ServiceNow to helps energy companies monitor and respond to cyberthreats. After the cyberattack on Colonial Pipeline this month, which forced the company to suspend and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Oilprice May 22 reported, Aramco, Siemens Energy and the World Economic Forum announced they will be launching a joint report on cyber resilience, Siemens also announced a cybersecurity partnership with ServiceNow to helps energy companies monitor and respond to cyberthreats.</strong><br />
<span id="more-18215"></span> After the cyberattack on Colonial Pipeline this month, which forced the company to suspend and reduce oil and gas operations for several weeks, paying ransoms to hackers, cybersecurity has become a top concern for the energy industry. quantity.</p>
<p> First, US President Biden announced $20 billion in funding to modernize the energy system and address digital security breaches. Other international and regional companies around the world also come up with their own strategies to mitigate this threat. Saudi Arabia&#8217;s oil giant Aramco, Siemens Energy and the World Economic Forum (WEF) have announced they will be releasing a joint report on cyber resilience in the oil and gas industry. The report will establish a blueprint for assessing how best to manage the various risks and threats associated with cyberattacks. The report brings together the experiences of 40 energy experts, who will provide their experience and expertise to outline some of the key cyber threats facing the industry and how best to mitigate those. this threat to improve energy security worldwide. The report comes after years of the oil and gas industry suffering from digital security breaches not only in the United States, which saw the Colonial Pipeline attack this month and a hack in February 2020 for a compressed air facility that caused a two-day power outage. Other oil and gas facilities around the world have also suffered similar losses. In 2012, Saudi Arabia experienced a cyber attack that resulted in more than 30,000 computers being hacked. In addition to this report, Siemens also announced a partnership with US software company ServiceNow to establish a unified software to monitor, detect, and respond to cyberthreats targeting power infrastructure. important amount. Siemens Energy&#8217;s artificial intelligence (AI)-based software combined with ServiceNow&#8217;s Operations Technology Management system exposes cyber threats for analysts to assess and prioritize early response. Leo Simonovich, Vice President and Global Head of Industrial Networks at Siemens Energy said of the report: “Digitalization is empowering the oil and gas sector to be more efficient, flexible and reliable &#8211; but it also opens up many new vulnerabilities for cyberattacks. More than ever, cybersecurity must be at the core of companies&#8217; business and operating models, especially in the oil and gas industry. Effective defenses depend on robust monitoring and detection – which means companies cannot act alone. Coordination and alignment are very important; This latest book, based on insights from leaders in the oil and gas sector, reflects these efforts. &#8221; “Most energy companies grapple with complex technological and economic challenges associated with monitoring, detecting, and preventing cyberattacks on critical infrastructure,” emphasized Leo Simonovich. important. Our MDR, powered by the Eos.ii solution, is the first AI-based platform built to provide visibility and context across the energy industry&#8217;s entire digital operating environment. to promptly prevent attacks”. This is one of the ways the oil and gas industry is using AI and other innovative technologies to improve security and monitoring and evaluation operations across multiple sectors. As the United States ramps up its game in cybersecurity, the rest of the world has taken note of this recent attack and is responding at the international level to ensure that energy security is not compromised. development is synchronized with the digitization of the energy system. Establishing and regulating cybersecurity practices across the industry enhances the collective recovery efforts of oil and gas companies, presenting a united front against cybercrime and security threats other importance.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18215</post-id>	</item>
		<item>
		<title>Australian Parliament computer network hacked by hackers</title>
		<link>https://en.spress.net/australian-parliament-computer-network-hacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Tue, 25 May 2021 19:01:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Agent]]></category>
		<category><![CDATA[Andrew Hastie]]></category>
		<category><![CDATA[Assistant Minister]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Defense]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[Broadcasting]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[Congress voting]]></category>
		<category><![CDATA[Cope with]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Media company]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Nine Entertainment]]></category>
		<category><![CDATA[Parliament]]></category>
		<category><![CDATA[Parliamentarian]]></category>
		<category><![CDATA[President of the Senate]]></category>
		<category><![CDATA[Scott Ryan]]></category>
		<category><![CDATA[The right]]></category>
		<category><![CDATA[Toxic]]></category>
		<guid isPermaLink="false">https://en.spress.net/australian-parliament-computer-network-hacked-by-hackers/</guid>

					<description><![CDATA[Australian media today (May 24) reported that the Speaker of the country&#8217;s Senate has confirmed that the computer network of the National Assembly of this country was attacked by hackers in March 2021. However, because the response measures were deployed immediately when the attack was discovered, Australia was not harmed. Artwork: The Conversation The Australian [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Australian media today (May 24) reported that the Speaker of the country&#8217;s Senate has confirmed that the computer network of the National Assembly of this country was attacked by hackers in March 2021.</strong><br />
<span id="more-18181"></span> However, because the response measures were deployed immediately when the attack was discovered, Australia was not harmed.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_65_29245741/e0ed2eea3aa8d3f68ab9.jpg" width="625" height="417"> <em> Artwork: The Conversation</em> The Australian newspaper today, quoting Senate Speaker Scott Ryan, said that on March 27, the computer network of the Australian Parliament was attacked by hackers for nearly 24 hours. As soon as the attack was discovered, appropriate controls were put in place to lock down the accounts of MPs and staff working in Parliament to ensure that information was not compromised. These measures prevented malicious actors, but left MPs and staff working for the Australian Parliament unable to access their accounts on the Parliament computer network for about a week. On the same day, March 27, the computer network of one of Australia&#8217;s largest media companies, Nine Entertainment, was also attacked by hackers, affecting the broadcast of many television programs. Nine Entertainment was forced to change broadcast locations and rebroadcast some old shows to overcome the impact of this attack. According to information from Australian authorities, in recent years, public agencies and businesses of this country have become the target of many cyber attacks. Typically, the National Assembly computer network attack before the country held the National Assembly elections in 2019. MP Andrew Hastie, Australia&#8217;s assistant defense minister, said: &#8220;Cyber ​​attacks are low-cost and difficult to detect. At the same time, these attacks can be carried out at any time and from any location&#8221;, so it&#8217;s time to think about &#8220;cyberspace as a battlefield&#8221;.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18181</post-id>	</item>
		<item>
		<title>Gasoline shortage continues after Colonial Pipeline attack tấn</title>
		<link>https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Tue, 25 May 2021 04:31:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Continue]]></category>
		<category><![CDATA[continues]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[North Carolina]]></category>
		<category><![CDATA[Panic]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Rio Grande Valley]]></category>
		<category><![CDATA[shortage]]></category>
		<category><![CDATA[South Caroline]]></category>
		<category><![CDATA[Southeast America]]></category>
		<category><![CDATA[Status]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Tan]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[US East Coast]]></category>
		<category><![CDATA[Virginia]]></category>
		<guid isPermaLink="false">https://en.spress.net/gasoline-shortage-continues-after-colonial-pipeline-attack-tan/</guid>

					<description><![CDATA[Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas. Illustration. https://tinhtexaydung.petrotimes.vn According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Two weeks after the pipeline was disrupted due to the hack, gasoline shortages in the Southeast have been rectified, but some drivers are still finding it difficult to find gas.</strong><br />
<span id="more-18031"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_232_38942005/9a8ccdedd9af30f169be.jpg" width="625" height="261"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> According to GasBuddy, about 30% of all retail gas stations in North Carolina, South Carolina and George are out of gas. Virginia and Tennessee are also experiencing significant blackouts. Colonial Pipeline&#8217;s main pipeline transporting gasoline and diesel to the US East Coast has been shut down, following a ransomware attack earlier this month. More than a thousand fuel stations in the Southeast have run out of petrol and diesel due to panic buying and pipeline closures. Even people in Texas, in the Rio Grande Valley, are flocking to gas stations to fill up with fuel, when news of gas stations running out of fuel. Colonial Pipeline paid almost $5 million in ransom in the form of a cryptocurrency to the hackers. But 2 weeks after shutting down, some gas stations are still shutting down. In Georgia, according to AAA data, the average price of a gallon of regular retail gasoline was $2,944 as of May 20, up from $2,708 a month before the pipeline failure. In North Carolina, the average price for gasoline is $2,929 per gallon, compared with $2,627 a month ago. According to Reuters, U.S. gasoline consumption is nearing pre-pandemic levels and is now down just 4% in the four weeks since May 14 from the five-year pre-pandemic average. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18031</post-id>	</item>
		<item>
		<title>Here&#8217;s why iPhone users should update to iOS 14.6 right after it&#8217;s released</title>
		<link>https://en.spress.net/heres-why-iphone-users-should-update-to-ios-14-6-right-after-its-released/</link>
		
		<dc:creator><![CDATA[Hiệp Phan]]></dc:creator>
		<pubDate>Mon, 24 May 2021 22:03:17 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Beta]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Heres]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[IOS 14 5 1]]></category>
		<category><![CDATA[iOS 14 6]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 11]]></category>
		<category><![CDATA[IPhone 12]]></category>
		<category><![CDATA[IPhone Xr]]></category>
		<category><![CDATA[Loss]]></category>
		<category><![CDATA[Nick Ackerman]]></category>
		<category><![CDATA[Note]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[YouTuber]]></category>
		<guid isPermaLink="false">https://en.spress.net/heres-why-iphone-users-should-update-to-ios-14-6-right-after-its-released/</guid>

					<description><![CDATA[The official iOS 14.6 version will be available to the community soon, Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers. On May 4, Apple released the iOS 14.5.1 update to fix a serious security issue in the iOS 14.5 update. According to Apple&#8217;s release notes, the update provides [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The official iOS 14.6 version will be available to the community soon, Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers.</strong><br />
<span id="more-17956"></span> On May 4, Apple released the iOS 14.5.1 update to fix a serious security issue in the iOS 14.5 update.</p>
<p> According to Apple&#8217;s release notes, the update provides an important security patch, which fixes two major vulnerabilities in the WebKit suite of applications that could allow hackers to penetrate users&#8217; iPhones. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/c6f2ef60fb22127c4b33.jpg" width="625" height="416"> <em> iPhone battery life and overall device performance have taken a big hit since installing iOS 14.5. (Photo: TechnoSports)</em> Apple recommends that users immediately update to iOS 14.5.1 as soon as possible. However, Apple seems to have rushed to roll out this update to fix those problems early, which leads to some new problems. Some users have reported that iPhone battery life and overall device performance have degraded significantly since installing iOS 14.5. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/e11dd6a9c9eb20b579fa.jpg" width="625" height="350"> <em> (Photo: Internet)</em> In a video posted on YouTube on May 5, YouTuber Nick Ackerman showed this problem. In a speed test between iPhone XR, iPhone 11 and iPhone 12, YouTuber Nick Ackerman found that iOS 14.5.1 reduced the performance of iPhone 12 and 11 by 60% through the test posted on YouTube. In the benchmark test using the 3DMark application, the iPhone 12 and iPhone 11 both performed worse than the iPhone XR &#8211; an iPhone model that was released in 2018. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/ca5dfecfea8d03d35a9c.jpg" width="625" height="350"> <em> (Photo: Nick Ackerman / YouTube)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/ad229bb08ff266ac3fe3.jpg" width="625" height="350"> <em> (Photo: Nick Ackerman / YouTube)</em> In the Geekbench battery life test performed by iAppleBytes, the iPhone 11 running iOS 14.5.1 gave about 5.5 hours of battery life, down from 6 hours for the iPhone 11 running iOS 14.5 in same test. This puts users between two difficult choices, because if they choose to stay in iOS 14.5, users will be at risk of being hacked into their iPhone through a security hole. Meanwhile, if updating to iOS 14.5.1, users will be forced to accept many errors that arise after updating. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/b7e384719033796d2022.jpg" width="625" height="625"> <em> (Photo: AR7 / Twitter)</em> Luckily iOS 14.6 will bring a fix for this performance issue. The upcoming update is currently in beta, and as of now, the iOS 14.6 beta shows that the update won&#8217;t affect the device&#8217;s battery life. The official iOS 14.6 version will be rolling out to the community soon as Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers. Therefore, users should be aware of this important update in the coming days.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17956</post-id>	</item>
		<item>
		<title>The DarkSide hacker group received $90 million worth of bitcoins from the victim before disappearing</title>
		<link>https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</link>
		
		<dc:creator><![CDATA[Thu Thắm]]></dc:creator>
		<pubDate>Sun, 23 May 2021 18:52:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bitcoins]]></category>
		<category><![CDATA[Close the door]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[DarkSide]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Disappear]]></category>
		<category><![CDATA[disappearing]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[ELLIPTIC]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel 471]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pull down]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[received]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Tom Robinson]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Value]]></category>
		<category><![CDATA[Victim]]></category>
		<category><![CDATA[victims]]></category>
		<category><![CDATA[worth]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-darkside-hacker-group-received-90-million-worth-of-bitcoins-from-the-victim-before-disappearing/</guid>

					<description><![CDATA[DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week. DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>DarkSide, the hacker organization behind the Colonial Pipeline&#8217;s network crash, received $90 million worth of bitcoins from victims before shutting down its operations last week.</strong><br />
<span id="more-17648"></span> DarkSide is a famous hacker organization that caused the collapse of the largest fuel pipeline system in the US operated by Colonila Pipeline company. After this incident, they disappeared, but before that they were able to extort and receive from many victims $ 90 million worth of bitcoins.</p>
<p> This hacker organization has received ransom from many victims. This shows that data ransom attacks have become a lucrative business for cybercriminals. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_365_38931872/03d1f6cded8f04d15d9e.jpg" width="625" height="375"> <em> Bitcoin is increasingly preferred by criminal organizations </em> Earlier this month, Colonial Pipeline suffered a severe attack that forced the company to shut down nearly all of its fuel system supplying the southeastern states of the United States. The FBI confirmed the crime was DarkSide, a cybercrime organization believed to be located in Eastern Europe. Last week, it was reported that Colonial had agreed to pay $ 5 million to DarkSide (in bitcoin) for the data recovery password. Recently, the CEO of the company confirmed this information. DarkSide operates like a business. This group develops malicious code to crack and steal the target&#8217;s data, then trains partners, the partners continue to train the hackers. When hackers use this malicious code to carry out successful missions, DarkSide will receive a percentage of those successful attacks. In March 2021, when it announced a new software that can crack data faster than before, DarkSide even released a press release and invited reporters to interview. Hackers often demand ransom in virtual currency. London-based blockchain analytics firm Elliptic has identified a bitcoin wallet that DarkSide uses to receive ransoms from victims. On May 14, London-based blockchain analytics firm Elliptic said it had identified a bitcoin wallet used by DarkSide to collect ransoms from victims. That same day, Intel 471 security researchers said DarkSide closed after losing access to its servers and when the organization&#8217;s virtual currency wallets were empty. According to Elliptic, DarkSide and other affiliates of this organization have collected at least $90 million in bitcoin ransoms, and they receive funds through 47 different digital wallets. “To our knowledge, this analysis includes all payments to DarkSide,” said Tom Robinson, Elliptic co-founder and chief scientist. However, there may be other undetected transactions, so this $90 million figure should be considered the lowest limit.” Also according to Elliptic&#8217;s research, DarkSide&#8217;s bitcoin wallet was holding $5.3 million in cryptocurrency before it was all withdrawn last week. There are some rumors that these bitcoins have been seized by the US government. Of the $90 million ransom, $15.5 million went to the developers of DarkSide and $74.7 million to affiliates. Much of that is being sent to cryptocurrency exchanges and thereby converted into fiat. Bitcoin is increasingly preferred by criminal organizations as crypto traders do not reveal their identities. However, because the digital ledger that underpins bitcoin is public, researchers can keep track of where these funds are going.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17648</post-id>	</item>
		<item>
		<title>Biden declares state of emergency after serious cyber attack</title>
		<link>https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</link>
		
		<dc:creator><![CDATA[Thanh Hảo]]></dc:creator>
		<pubDate>Fri, 21 May 2021 06:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Biden]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[declares]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Planes]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State of emergency]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/biden-declares-state-of-emergency-after-serious-cyber-attack/</guid>

					<description><![CDATA[The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code. Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US government has just declared a state of emergency after the largest fuel pipeline in the country was attacked by malicious code.</strong><br />
<span id="more-16831"></span> Colonial Pipeline transports 2.5 million barrels of fuel a day – accounting for 45% of the East Coast&#8217;s supplies of diesel, gasoline and jet fuel. This arterial oil route was completely paralyzed after being attacked by a cyberattack on May 7 and is still in the process of restoring operation.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/84535b29466baf35f67a.jpg" width="625" height="351"> <em> Colonial Pipeline transports 2.5 million barrels of fuel per day. Photo: Colonial Pipeline</em> According to the BBC, the state of emergency allows fuel to be transported by road. The news agency quoted experts as saying that fuel prices could increase by 2-3% on May 10, but the real impact would be much worse if this situation continued for longer. Many sources confirm that the malicious code attack is caused by a cybercriminal gang called DarkSide, which infiltrated Colonial&#8217;s system on May 6 and stole nearly 100GB of data as a &#8220;hostage&#8221;. After taking over the data, the group of hackers locked this data on some computers and servers, demanded a ransom and warned that if they did not receive the money, they would release the data on the internet. Colonial is working with law enforcement, cybersecurity and the US Department of Energy to restore service. On the evening of May 9, the company announced that although the four main pipelines continued to stop, some smaller lines between the terminals and delivery points were still operating. &#8220;Immediately after learning of the attack, Colonial proactively shut down certain systems to stop the threat. These actions temporarily halted all pipeline operations and affected some systems. our information technology system, which we are actively working on restoring,&#8221; said Colonial. &#8220;We are in the process of restoring service to other pipelines and will bring the entire system back online when we believe it is safe and in full compliance with all federal regulations. &#8220;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_23_38787518/ff0927733a31d36f8a20.jpg" width="625" height="414"> <em> The DarkSide message appears on the victim&#8217;s computer screen. </em> DarkSide isn&#8217;t the largest cybercriminal gang in the field, but the incident demonstrates the heightened risk that malware poses to critical U.S. industrial infrastructure, not just businesses. This gang lists all types of stolen data and sends the victim the URL of the &#8220;personal leak site&#8221;, where the data is pre-loaded waiting for automatic publication, if the company or organization does not. payment before the deadline. DarkSide claims to provide proof of the data obtained, and is ready to delete all such data from the victim&#8217;s network. According to Digital Shadows, a London-based cybersecurity company that tracks global cybercrime groups to help businesses limit their risk of being hacked, DarkSide acts like a company.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16831</post-id>	</item>
		<item>
		<title>Ransomware Attack Targets US Fuel Pipelines</title>
		<link>https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</link>
		
		<dc:creator><![CDATA[Anh Duy]]></dc:creator>
		<pubDate>Fri, 21 May 2021 01:15:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Pipelines]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Targets]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</guid>

					<description><![CDATA[On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security. Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security.</strong><br />
<span id="more-16746"></span> Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to close a network. an important fuel supply to the populous states in the East.</p>
<p> The attack was one of the most disruptive digital ransom schemes reported, prompting US lawmakers to call for increased protection of America&#8217;s critical energy infrastructure from hackers. Commerce Secretary Gina Raimondo said pipeline repairs were a priority for the Biden administration and Washington was working to avoid more severe fuel supply disruptions by helping Colonial restart the road network. The tube is more than 5,500 miles (8,850 km) long. &#8220;Right now it&#8217;s an all-in-one effort,&#8221; Raimondo said on CBS&#8217;s &#8220;Face the Nation.&#8221; &#8220;We are working closely with company, state and local officials to ensure they return to normal operations as quickly as possible and without disruption to supplies,&#8221; Colonial said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/fbf5adbdb0ff59a100ee.jpg" width="625" height="473"> <em> The pipeline network was attacked &#8211; Photo: Reuters</em> Their main fuel lines are still offline, but some of the smaller routes between the terminals and delivery points are now up and running. Neither Raimondo nor the company has given an estimate of a full reboot date. U.S. gasoline futures rose more than 3% to $2,217 a gallon, the highest since May 2018 as trading opened for the week and market participants reacted to pipeline closures. Colonial ships about 2.5 million barrels per day of gasoline and other fuels from refineries on the Gulf Coast to consumers. Its extensive pipeline network serves major US airports including Atlanta&#8217;s Hartsfield Jackson Airport, the world&#8217;s busiest airport by passenger traffic. A spokeswoman for Charlotte Douglas International Airport said the airport had supplies on hand and was &#8220;monitoring the situation closely&#8221;. Retail fuel experts including the American Automobile Association say outages lasting several days could have a significant impact on fuel supplies in the region, particularly in the southeastern US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/427e10360d74e42abd65.jpg" width="625" height="326"> <em> Colonial Pipeline&#8217;s fuel tanks &#8211; Photo: Reuters</em> While the US government investigation is in its early stages, a former official and three industry sources said the suspected hackers were a professional cybercrime group called DarkSide. DarkSide is one of many gangs that often use malware to extort victims. These groups gain access to private networks, encrypt files with software, and often steal data. They ask for money to decrypt the files and ask for more money to not publish the stolen content. During the Colonial attack, the hackers stole more than 100 gigabytes of data.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16746</post-id>	</item>
		<item>
		<title>US &#8216;red alert&#8217; after malicious code attack on fuel system</title>
		<link>https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</link>
		
		<dc:creator><![CDATA[Ngọc Hà (TTXVN)]]></dc:creator>
		<pubDate>Thu, 20 May 2021 12:44:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</guid>

					<description><![CDATA[America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack. Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack.</strong><br />
<span id="more-16577"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38793245/cd9b8e6093227a7c2333.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com</em> The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid disruption to supply. Experts say gas prices will not be affected if the company resumes normal operations in the next few days. However, this cyberattack, rated as the worst ever for the US infrastructure system, should be a warning bell for other companies about the risk they will become the next target of similar attacks. According to Colonial Pipeline, the company&#8217;s pipeline carries gasoline and other fuels from Texas to the Northeast, providing nearly 45 percent of the fuel for the East Coast of the United States. Although Colonial Pipeline has not revealed who is responsible for the cyber attack, an unnamed person on the team investigating the incident confirmed that the culprit was a hacker group nicknamed Darkside. This group has been spreading ransomware since August 2020 and is classified as one of the most attackable groups. Over the past 3 years, Darkside has become more and more professional and has caused Western countries tens of billions of dollars in losses. Ransomware attacks are malicious code designed to lock down computer systems using encrypted data and demand a ransom to restore access. US Commerce Secretary Gina Raimondo on May 9 warned US businesses to be wary of ransomware attacks. The female minister affirmed that she would work closely with the Department of Homeland Security to handle the issue, considering this a top priority of the government. Reuters news agency, citing a notice from the White House, said the administration was working to help Colonial Pipeline company resume operations to avoid supply disruptions. According to sources, before activating ransomware, hackers often steal data, which is used to blackmail businesses or distort the truth. Sometimes stolen data is more valuable to hackers than the benefit they get by disrupting business operations. Security experts say the attack is a warning to operators and managers of essential infrastructure in the US such as electricity, water, energy and transportation facilities that have long been built. do not update the method to ensure security against the risk of being attacked. Mr. David Kennedy, a senior security consultant and founder of the security consulting firm TrustedSec, admitted that ransomware attacks have spiraled out of control in the US and are currently under development. is one of the greatest threats facing the United States. However, most American companies lack the ability to prepare for such threats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16577</post-id>	</item>
		<item>
		<title>Hacker group speaks out after the hack that shook the US energy industry</title>
		<link>https://en.spress.net/hacker-group-speaks-out-after-the-hack-that-shook-the-us-energy-industry/</link>
		
		<dc:creator><![CDATA[Phúc Thịnh]]></dc:creator>
		<pubDate>Thu, 20 May 2021 05:17:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[shook]]></category>
		<category><![CDATA[speaks]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[victims]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacker-group-speaks-out-after-the-hack-that-shook-the-us-energy-industry/</guid>

					<description><![CDATA[A cyberattack on the largest U.S. fuel system operator could have serious consequences, causing gas prices like gasoline to rise. On May 10, DarkSide, the hacker group believed to be behind the attack on Colonial Pipeline, the company that operates the largest refined fuel pipeline in the US, posted a new statement. According to the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A cyberattack on the largest U.S. fuel system operator could have serious consequences, causing gas prices like gasoline to rise.</strong><br />
<span id="more-16460"></span> On May 10, DarkSide, the hacker group believed to be behind the attack on Colonial Pipeline, the company that operates the largest refined fuel pipeline in the US, posted a new statement.</p>
<p> According to the <em> Vice</em> , DarkSide&#8217;s message does not directly refer to the Colonial Pipeline attack, but is titled &#8220;Regarding the Latest News&#8221;. The group said its actions were unrelated to politics. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38797147/fdec97078945601b3954.jpg" width="625" height="416"> <em> The cyber attack on May 7 caused the Colonial Pipeline&#8217;s fuel pipeline system to stop working. Photo: Bloomberg. </em> “We are a non-political group, not involved in geopolitics. Don&#8217;t tie us to a government or look for other motives&#8230; Our aim is to make money, not to cause problems for society,&#8221; a DarkSide representative wrote on a website belonging to the dark web. According to the <em> Washington Post</em> , some US officials believe that DarkSide is the hacker group behind the Colonial Pipeline attack. Also in the new statement, DarkSide said it will change the way it works and selects targets. “From today, we will examine and analyze each company that partners want to encrypt to avoid social consequences,” the group wrote. On May 7, Colonial Pipeline announced that it had to disconnect some systems after discovering it was &#8220;a victim of a cyber attack&#8221;. According to the <em> Business Insider</em> , this move caused more than 8,046 km of fuel pipes and some computer systems of Colonial Pipeline to stop working. In an updated statement on May 8, the company representative confirmed that the software used for the attack was in the form of ransomware, which encrypts files in the system and requires victims to pay if they want to get it. again. The company hired a cybersecurity firm to investigate the severity of the attack. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_119_38797147/22b34958571abe44e70b.jpg" width="625" height="208"> <em> The DarkSide hacker group spoke out after the alleged implementation of a cyber attack against the Colonial Pipeline. Photo: Motherboard.</em> According to information on its website, Colonial Pipeline transports about 45% of all fuel consumed on the East Coast of the United States. On May 9, the company said that while the main pipelines are still closed, some smaller pipelines have been reactivated. In response to the incident, the US Department of Transportation has declared a state of emergency in 17 states and Washington to lift restrictions on carriers and drivers assisting in fuel shortages. The declaration of emergency will be in effect until the end of the state of affairs, or until 23:59 on June 8 (local time). After the Colonial Pipeline incident, gasoline prices in the US increased more than 3% to $2,217 per gallon &#8211; the highest price since May 2018. Experts warn that the price of gas raw materials may increase further if Colonial Pipeline does not reopen the pipeline in the next few days. <em> <strong> How did the FBI hack the suspect&#8217;s iPhone?</strong> </em> <em> Cellebrite has invented a phone-cracking technology that makes it easier for the FBI to investigate.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16460</post-id>	</item>
		<item>
		<title>Facebook disregards the privacy of Vietnamese users</title>
		<link>https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</link>
		
		<dc:creator><![CDATA[Điệp Lưu]]></dc:creator>
		<pubDate>Thu, 20 May 2021 02:40:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Aim]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[Cambridge Analytica]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[clearly]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disregards]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Forum]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Philippines]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Scandal]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<guid isPermaLink="false">https://en.spress.net/facebook-disregards-the-privacy-of-vietnamese-users/</guid>

					<description><![CDATA[The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus. The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The case that the information of 533 million Facebook accounts has just been released by hackers has brought the issue of user privacy back into focus.</strong><br />
<span id="more-16406"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/ee2a50c34e81a7dffe90.jpg" width="625" height="296"> </p>
<p> <strong> <em> The case that the information of 533 million Facebook accounts has just been released by hackers has made the issue of user privacy once again the focus of all attention. </em> </strong> Agreeing on the fee of 5 million dong to regain the account after clicking on a strange link sent by a friend thanks to a vote on Facebook, Ms. LA, the owner of a famous beauty spa in Hanoi, spent 2 more days considering the proposal. about identity verification. Due to the characteristics of her job and the desire to create credibility with her partner, Ms. LA accepts to spend an additional 50 million to ask an intermediary to register for a green certificate. People who need to authenticate their Facebook accounts and other social networks like LA are not rare, especially business people, or celebrities. They are willing to spend a small amount of money to assert something that is their own property. While some platforms allow for free and simple identity verification, with Facebook it is both a difficult challenge and an intermediary fee is an option that is almost mandatory. That seemingly absurd thing is still happening every day, every hour, but no one is sure whether those verified accounts are guaranteed forever or not, because of the status of blue-tick accounts being occupied. becoming an online sales channel in recent times is easy to find. Especially when information about the data of 533 million Facebook users has just been released, many people cannot help but worry. The above data source is being sold by hackers on a hacker forum last week, including information such as phone number, login ID, full name, home address, date of birth, profile and email address &#8230; Which involves users in 106 countries, with 32 million Americans, 11 million British and 6 million Indians. In this regard, Facebook said the stolen data did not include users&#8217; financial, health and password information. However, these data can provide valuable information for hackers and other breaches. More importantly, this is not the first time Facebook&#8217;s user data has been exposed on a large scale. <strong> Facebook user data is regularly leaked</strong> The 2015 cult case involving the British consulting firm Cambridge Analytica illegally used the personal data of more than 87 million Facebook users to target political ads. This is a scandal that caused Facebook to accept a settlement of up to $ 5 billion, and also caused founder Mark Zuckerberg to testify before the US Congress. Then in September 2019, a database of more than 400 million phone numbers related to Facebook accounts was released, including about 50 million Vietnamese users. Just 3 months later, the information of 267 million users including login IDs, names and phone numbers continued to fall into the hands of hackers. At the same time, the data leak in Belgium and Luxembourg, including that of European Justice Didier Reynders, many EU cabinet members and diplomats, has caused Facebook to suffer for a while. long time. However, Facebook explained that these data leaks were not caused by hackers breaking into the system, but rather by a vulnerability in the sync communication tool that was exploited by vandals in 2019. Facebook later The company has discovered the vulnerability and fixed it, and confirmed that similar incidents will not happen again in the future. Meanwhile, Mike Clark, Facebook&#8217;s director of product management, is constantly moving to try to downplay the impact of this large-scale leak. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38796906/d9c2662b78699137c878.jpg" width="625" height="393"> By March 2021, netizens were again shocked by the information that the data of 41 million Facebook users in Vietnam was distributed by hackers. Talking to a VietNamNet reporter at the time, a Facebook representative acknowledged that the leaked data was from users of this social network, but said &#8220;this may be information obtained before we (Facebook &#8211; PV) made changes over the past few years to protect users&#8217; information. However, whether Facebook really protects users&#8217; information according to what the head of this platform often says, that is another story. Judging by the recent situation, it seems that the problem of leaking Facebook user information is difficult to completely solve and needs to be looked at in detail. The spread of user information may first be because Facebook did not pay attention to this aspect, nor did it establish a complete and strict system to protect user information. At the same time, after a data breach, Facebook did not thoroughly summarize the problem, how to fix loopholes and prevent new problems from appearing. Not only that, a Facebook spokesperson said it is not clear which users should be notified in the recent incident. Because users cannot patch the vulnerabilities themselves and their personal data has been spread on the Internet, Facebook will not specifically notify the users involved. As a result, Facebook&#8217;s performance in this area is relatively poor, and user data leaks are frequent. After all, compared to other social software, users&#8217; dependence on Facebook is still very high. If it leaks many times, I am afraid that it will easily cause irreparable losses and bad consequences. <strong> Legal privacy of Facebook users</strong> With the data of 87 million users exposed in the Cambridge Analytica scandal, the 10 countries with the most Facebook accounts being collected are the US, Philippines, Indonesia, UK, Mexico, Canada, India, Brazil, Vietnam and Australia. Vietnam has 427,446 user accounts whose data has been collected. CEO Mark Zuckerberg admitted that Facebook made mistakes and that his company failed to protect customer data, losing users&#8217; trust. &#8220;We have a responsibility to protect your data, and if we can&#8217;t do that, we don&#8217;t deserve to serve you,&#8221; Zuckerberg wrote in a post on his personal Facebook page after the scandal. In addition to the $5 billion settlement with the US Federal Trade Commission (FTC) at the time, the two sides reached a landmark settlement against allegations of misuse of user data. . According to the settlement reached by the FTC, when more than 500 user information is illegally stolen, Facebook is required to report it within 30 days. In connection with this case, Facebook also had to pay £500,000 (about $ 649,000) after a fine from the UK Information Commissioner&#8217;s Office (ICO). By October last year, a user group called Facebook You Owe Us in the United Kingdom, led by the law firm Milberg London and supported by former CEO Richard Lloyd, continued to sue Facebook and seek compensation. another large sum. Meanwhile, most of Facebook&#8217;s data disclosure scandals have a direct impact on users of this social network in Vietnam. No one has been able to determine how many of the 427,446 Vietnamese user accounts in the Cambridge Analytica incident, or the 41 million accounts in the newly announced case in March 2021, were affected, even appropriated and had to be stolen. spend a small amount of money to get your account back like LA One thing is for sure, users are solely responsible for the security of personal account information in accordance with the general provisions of most platforms, including Facebook. However, if personal information on platforms like Facebook is leaked without subjective reasons from the user, on the contrary due to a security incident from the platform, who will be responsible for this? Since Facebook is obligated to compensate users in the US or EU affected by security incidents on the platform, why are 69,280,000 users using this social network in Vietnam, accounting for 70 .1% of the entire population (statistics as of June 2020), of which many are victims of Facebook incidents, are automatically responsible? This question, the writer would like to leave the answer open, because currently Vietnam does not have specific regulations and sanctions that apply specifically to social networking platforms, or the object of application in this case is outside of Vietnam. the scope of control under applicable law due to not having a home office. However, it is a problem that needs to be solved in the near future…</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16406</post-id>	</item>
		<item>
		<title>Users are crazy about missing iOS updates</title>
		<link>https://en.spress.net/users-are-crazy-about-missing-ios-updates/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Wed, 19 May 2021 11:15:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Crazy]]></category>
		<category><![CDATA[efficiency]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Feedback]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IOS 14 5 1]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 11]]></category>
		<category><![CDATA[IPhone 12]]></category>
		<category><![CDATA[IPhone Xr]]></category>
		<category><![CDATA[Missing]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[performance]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updates]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-are-crazy-about-missing-ios-updates/</guid>

					<description><![CDATA[Apple&#8217;s latest iOS 14.5.1 update is receiving bad feedback from users when it causes many errors when used. The iOS 14.5.1 update was released by Apple on May 4 to fix two dangerous vulnerabilities that, according to Apple, have been exploited by hackers. Specifically, it fixes a pair of zero-day vulnerabilities in WebKit that could [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Apple&#8217;s latest iOS 14.5.1 update is receiving bad feedback from users when it causes many errors when used.</strong><br />
<span id="more-16139"></span> The iOS 14.5.1 update was released by Apple on May 4 to fix two dangerous vulnerabilities that, according to Apple, have been exploited by hackers. Specifically, it fixes a pair of zero-day vulnerabilities in WebKit that could allow maliciously generated web content to result in arbitrary code execution. The first vulnerability is caused by a memory corruption issue, while the second is caused by an integer overflow.</p>
<p> However, this update is causing many iPhone users to face more serious problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_5_38802520/013acde8d3aa3af463bb.jpg" width="625" height="414"> <em> Apple&#8217;s iOS 14.5.1 update received a bad response.</em> According to users&#8217; feedback, the iPhone after updating to iOS 14.5.1 often exits the application suddenly while in use, the applications also load longer, the response of the device is also slower. The iOS 14.5.1 update is also said to be the cause of the iPhone 12&#8217;s performance loss of up to 60% through a series of tests on the Geekbench measuring tool, the iPhone 12 (iOS 14.5) reached 1,583 single-core points and 3,967 multi-core points. kernel, while the corresponding scores of iPhone 12 (iOS 14.5.1) are 1,478 and 2,339. Similarly, the scores on the iPhone 11 (iOS 14.5) are 1,318 and 3,019, while the iPhone 11 (iOS 14.5.1) is 794 and 1,271. The performance scores of the iPhone XR (iOS 14.5.1) are 1,105 and 2,085, while the iPhone 7 (iOS 14.5.1) is 728 and 1,291. Performance is even worse than the &#8220;old&#8221; elder brother iPhone XR born in 2018.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16139</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>New &#8216;Ghost&#8217; in Intel and AMD CPUs</title>
		<link>https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</link>
		
		<dc:creator><![CDATA[HOÀNG THY (Theo Thehackernews)]]></dc:creator>
		<pubDate>Sun, 16 May 2021 18:11:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[CPUs]]></category>
		<category><![CDATA[Cushion]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Equidistant]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[ghost]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intel CPU]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[path]]></category>
		<category><![CDATA[Processor]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[San Diego]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[SPECTER]]></category>
		<category><![CDATA[The spectre]]></category>
		<category><![CDATA[University of California]]></category>
		<guid isPermaLink="false">https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</guid>

					<description><![CDATA[When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time. The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO Indeed, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time.</strong><br />
<span id="more-15060"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_418_38819288/08f0b3e5ada744f91db6.jpg" width="625" height="351"> </p>
<p> <em> The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO</em> Indeed, 3 years have passed, and there is still no end to the vulnerability. Meanwhile, experts from the University of Virginia and the University of California, San Diego, have discovered a new attack method that bypasses all current Specter protections built into the chip. This attack method has the potential to put almost any system &#8211; desktops, laptops, cloud servers and smartphones &#8211; once again at risk. Revealing Specter ushered in a wave of more powerful attacks, allowing malicious code to directly read passwords, encryption keys, and other valuable information from the computer&#8217;s kernel memory. Although chip manufacturers such as Intel, ARM and AMD already know this and combine defenses to reduce the threat from vulnerabilities, the methods have not yielded the desired effect. A Specter attack is capable of tricking the processor into executing instructions along a wrong path, the researchers say. Even though the processor recovers and completes its task correctly, hackers can still access confidential data while the processor goes in the wrong direction. The new attack method exploits what is called a micro-operator buffer (called micro-ops), an on-chip component that breaks machine instructions into simpler instructions and speeds up computation, like a secondary channel to reveal confidential information. Micro-op cache is built into Intel processors, manufactured since 2011. According to researchers at the University of Virginia, Intel&#8217;s defense proposal against Specter (called LFENCE) is to place sensitive code in a waiting area until security checks are done and only then the code Only sensitive is allowed to execute. However, research has shown how attackers can steal information through micro-op caching and use it as a secret channel. Although exploiting the Specter vulnerability is very difficult, the researchers say that with computers with a lot of sensitive data, hackers do not mind the difficulty. To protect the system from the new attack, the researchers propose to clear the micro-ops cache. This is a technical solution that comes at the expense of performance benefits. According to the researchers, micro-op caching has some dangerous effects. First, it ignores all caching reduction techniques such as side channels. Second, attacks in this zone go undetected like an existing attack or malware. Third, because the micro-op cache is at the front of the path, prior to execution, Intel&#8217;s Specter protections or recommendations to limit cache updates are still compromised. public.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15060</post-id>	</item>
		<item>
		<title>Colonial Pipeline Company has no plans to pay hackers</title>
		<link>https://en.spress.net/colonial-pipeline-company-has-no-plans-to-pay-hackers/</link>
		
		<dc:creator><![CDATA[Hồng Định]]></dc:creator>
		<pubDate>Sat, 15 May 2021 21:59:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Amount]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Ministry of Energy]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[owner]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[plans]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[Russian Government]]></category>
		<category><![CDATA[US East Coast]]></category>
		<category><![CDATA[Wednesday]]></category>
		<guid isPermaLink="false">https://en.spress.net/colonial-pipeline-company-has-no-plans-to-pay-hackers/</guid>

					<description><![CDATA[The owner of the Colonial pipeline has no plans to pay the ransom demanded by the hackers who encrypted their data, sources familiar with the company said Wednesday. Illustration. The hack brought down the pipeline, now in its sixth day, and led to panic buying and gas shortages in the Southeastern United States. Colonial said [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The owner of the Colonial pipeline has no plans to pay the ransom demanded by the hackers who encrypted their data, sources familiar with the company said Wednesday.</strong><br />
<span id="more-14756"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_318_38821723/4a11c3eedcac35f26cbd.jpg" width="625" height="390"> </p>
<p> <em> Illustration.</em> The hack brought down the pipeline, now in its sixth day, and led to panic buying and gas shortages in the Southeastern United States. Colonial said it began reopening its pipeline late Wednesday afternoon, a process that could take days, but declined to comment on the ransom issue. Colonial is working closely with law enforcement, the Department of Energy, and US cybersecurity company FireEye to minimize damage and restore operations. Colonial and government responses to the breach are being closely watched following one of the most direct hacking attacks on US critical infrastructure after years of warnings. Ransomware attacks have increased in number and ransom prices, with hackers encrypting data and seeking cryptocurrency payments to unlock. Investigators in the Colonial case say the malware was distributed by a gang known as DarkSide, which consisted of Russian-speaking people and evaded attack targets in the former Soviet Union. DarkSide previously said that it has no intention of meddling in geopolitics and will be more careful about its affiliates going forward. On Wednesday, the group said on its website that it was &#8220;dropping&#8221; data from three other victims, including a technology company in Chicago. Officials have so far found no significant connection to the Russian government, concluding instead that the pipeline company that supplies 45% of the US East Coast&#8217;s oil was crippled by the attack. ransomware. DarkSide allows &#8220;affiliates&#8221; to infiltrate targets in different places, then handle ransom negotiation and data release. Two people involved in the Colonial investigation said the man linked in this case was a Russian criminal with no special ties to the government.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14756</post-id>	</item>
		<item>
		<title>The Problem Behind DarkSide&#8217;s Cyber ​​Attack</title>
		<link>https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</link>
		
		<dc:creator><![CDATA[Trang Hoàng]]></dc:creator>
		<pubDate>Sat, 15 May 2021 10:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Colony]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[DarkSides]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Energy]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Half]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[The White House]]></category>
		<category><![CDATA[worry]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-problem-behind-darksides-cyber-%e2%80%8b%e2%80%8battack/</guid>

					<description><![CDATA[A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast. Illustration. https://tinhtexaydung.petrotimes.vn The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A cyberattack shuts down the largest energy infrastructure in the United States, the Colonial Pipeline system that supplies nearly half of the gasoline and diesel consumed by the East Coast.</strong><br />
<span id="more-14602"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_232_38828024/c76a29db3699dfc78688.jpg" width="625" height="362"> </p>
<p> <em> Illustration. https://tinhtexaydung.petrotimes.vn</em> The attack resulted in higher gas prices, causing drivers to worry about shortages, while Colonial Pipeline Co. is working to restart the fuel line. However, the price of gasoline sold at pumping stations is higher and the possibility of fuel supply shortage is inevitable. After all, it is only temporary and its effects will be fleeting. But there&#8217;s a bigger problem: this has to do with America&#8217;s energy infrastructure, exactly how secure is its cybersecurity infrastructure? Experts soon said: The team that carried out this attack consisted of seasoned hackers. Later, a ransomware group called DarkSide claimed responsibility for the attack, and the FBI also pointed to this group as the culprit. Here&#8217;s what DarkSide said in its statement: “We are apolitical, we do not engage in geopolitics, do not need to tie us to a defined government, and seek our motives. . Our goal is to make money, and not create any other problems for society. Starting today, we&#8217;re introducing censorship and vetting of each company that our partners want to encrypt to avoid future social consequences.&#8221; The statement was clearly intended to address allegations made that Russia was behind the attack, but even the White House was careful not to point the finger at Moscow. President Biden said there was no evidence that they were involved in the attack. That&#8217;s related to geopolitical motives, but the statement also suggests that DarkSide and its partners won&#8217;t stop, even if they don&#8217;t intentionally cause problems. “Colonial may be at risk of leaking consignor confidential data,” said Vicki Knott, CEO of CruxOCM, a provider of control room operations services to the oil and gas industry. https://tinhtexaydung.petrotimes.vn</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14602</post-id>	</item>
		<item>
		<title>More than half of Australian businesses were attacked by hackers</title>
		<link>https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Sun, 02 May 2021 12:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[As usual]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[It is illegal]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Useful]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</guid>

					<description><![CDATA[A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers. A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers.</strong><br />
<span id="more-11035"></span> A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. years earlier. This fact happened when in the last year, because of the Covid-19 translation, many companies switched to working online</p>
<p> Experts say that in each attack, typically hackers will attack networks or systems, steal personal or sensitive information and then demand ransom to return or unlock them. that information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_65_38643050/39d0b9be9efc77a22eed.jpg" width="625" height="346"> Although experts say that companies should not pay a ransom to hackers because this action helps to foster legal violations, according to Mimecast statistics, 54% of the companies have paid the ransom. Of these, 76% of the companies got their data back, while 24% couldn&#8217;t get it back. Prior to this report, since last year, many entities including major Australian companies have reported being attacked by hackers. The recent victim is Nine Network Television, which makes some programs unable to broadcast as usual. Previously, the Australian National Assembly&#8217;s computer network was also attacked a number of times. In response to this situation, Australia&#8217;s Cybersecurity Center issued recommendations and procedures to instruct entities on how to secure cyber security. At the same time, experts believe that regular software updates as well as the use of multi-factor authentication are also useful measures for security in a cyberspace environment./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11035</post-id>	</item>
		<item>
		<title>The Apple partner was blackmailed by hackers immediately after the Spring Loaded event</title>
		<link>https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</link>
		
		<dc:creator><![CDATA[Anh Phạm]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 07:12:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alphabet]]></category>
		<category><![CDATA[Amounts]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[blackmailed]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Happy]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Loaded]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Partner]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[spring]]></category>
		<category><![CDATA[Spring Loaded]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Surprise attack]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</guid>

					<description><![CDATA[A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs. While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs.</strong><br />
<span id="more-10140"></span> While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed to have hacked into the computer network of Quanta Computer and stole some blueprints. new Apple products.</p>
<p> Quanta is headquartered in Taiwan (China), is the main MacBook manufacturing partner for Apple. The company is also a partner of HP, Facebook, and Alphabet (the parent company of Google). <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_280_38621478/db5d33351577fc29a566.jpg" width="625" height="482"> Accordingly, when the event just ended, REvil posted an article containing 15 pictures detailing a device that is supposed to be a MacBook designed in March 2021. Images include the part number, specific sizes and capacities, detailing many of the parts that work inside the Apple laptop. One of the images signed by designer John Andreadis. REvil has asked Apple to pay a ransom of $ 50 million by May 1. Previously, this group posted information on &#8220;Happy Blog&#8221; &#8211; where hackers announced their &#8220;victory&#8221;. REvil is said to have made an agreement with Quanta before but did not get the victim&#8217;s consent, then the new hacker group released the records on the day of the Apple event. Quanta, for its part, admitted the company had suffered a hacker attack but did not detail whether any data was stolen. The Apple partner also reported to law enforcement about the day-to-day attack and said it had immediately activated an information security defense system, upgraded its infrastructure to protect data. Whether. Apple representatives have not released any official comment on the incident. <em> according to Bloomberg</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10140</post-id>	</item>
	</channel>
</rss>