<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Interrupt &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/interrupt/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 05:06:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Tomorrow, APG cable will be repaired, AAE-1 is expected to interrupt service until July 23</title>
		<link>https://en.spress.net/tomorrow-apg-cable-will-be-repaired-aae-1-is-expected-to-interrupt-service-until-july-23/</link>
		
		<dc:creator><![CDATA[Vân Anh]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 01:59:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A GRID]]></category>
		<category><![CDATA[AAE 1]]></category>
		<category><![CDATA[AAE1]]></category>
		<category><![CDATA[AAG]]></category>
		<category><![CDATA[APG]]></category>
		<category><![CDATA[Asia Africa Europe 1]]></category>
		<category><![CDATA[Asia Pacific Gateway]]></category>
		<category><![CDATA[Cable]]></category>
		<category><![CDATA[capacity]]></category>
		<category><![CDATA[CMC Telecom]]></category>
		<category><![CDATA[CSC]]></category>
		<category><![CDATA[Discontinuity]]></category>
		<category><![CDATA[expected]]></category>
		<category><![CDATA[international]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[Isp]]></category>
		<category><![CDATA[July]]></category>
		<category><![CDATA[Maintenance]]></category>
		<category><![CDATA[Marine fiber optic cable]]></category>
		<category><![CDATA[repaired]]></category>
		<category><![CDATA[service]]></category>
		<category><![CDATA[SMW3]]></category>
		<category><![CDATA[Tomorrow]]></category>
		<category><![CDATA[Trouble]]></category>
		<category><![CDATA[Vnpt]]></category>
		<guid isPermaLink="false">https://en.spress.net/tomorrow-apg-cable-will-be-repaired-aae-1-is-expected-to-interrupt-service-until-july-23/</guid>

					<description><![CDATA[According to the latest information from ISPs, it is expected that on June 11, transmission channels on the APG cable route will be fully restored. Meanwhile, the problem on the S1H.1 segment of the AAE-1 cable route will be fixed from June 22 to July 13. As 2 of the 5 undersea cable routes that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the latest information from ISPs, it is expected that on June 11, transmission channels on the APG cable route will be fully restored. Meanwhile, the problem on the S1H.1 segment of the AAE-1 cable route will be fixed from June 22 to July 13.</strong><br />
<span id="more-23264"></span> As 2 of the 5 undersea cable routes that account for the majority of Internet connection capacity from Vietnam to international, Asia Pacific Gateway (APG) and Asia Africa Europe 1 (AAE-1) are currently experiencing service interruptions.</p>
<p> Sharing with ICTnews this afternoon, June 10, a representative of Viettel confirmed, according to information from the operator of the undersea optical cable routes, on May 11 and May 25, two routes APG and AAE-1 have crashes in turn. Specifically, on May 11, a problem occurred on the S6 segment of the APG undersea cable line. The location of the cable problem is about 352 to 355 km from the TKO docking station in Hong Kong, China. The cause of the problem was determined to be a “shunt fault” but did not cause service disruption. The cable route management unit has mobilized the ship and started to carry out maintenance to fix the fault on the APG cable line from June 6 and is expected to be completed tomorrow, June 11. During the repair period, it will disrupt all services to and from Hong Kong, China of APG project member partners. The APG route is invested by four Vietnamese carriers, VNPT, Viettel, FPT and CMC. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_107_39141059/fcdded50e012094c5003.jpg" width="625" height="471"> The incident occurred on May 25 on the S1H.1 segment of the AAE-1 cable line, which is expected to be fixed from June 22 to July 13 (Artwork: Internet) With the AAE-1 undersea cable, according to Internet service providers (ISPs) in Vietnam, the incident occurred on May 25 on the FP10 pair of the S1H.1 segment, far from the Cape D&#8217;Aguilar landing station. , HongKong, China about 2,072 km towards the port of Vung Tau, Vietnam. The cause of the problem was a fiber break, which partially disrupted the service to Hong Kong on the FP10 pair. The plan to overcome the problem that occurred on May 25 on the S1H.1 segment of the AAE-1 international undersea fiber optic cable has also been announced to ISPs in Vietnam, expected to start from June 22. and completed on 7/13. The fact that sea cable incidents occurred at the same time in the past time has affected the international connection capacity of telecommunications service providers in Vietnam. This is a common problem affecting all network operators and Internet service providers in Vietnam. However, according to a Viettel representative, the level of influence of this network operator is the lowest because before the sea cable incident, Viettel actively planned, routed, allocated and supplemented capacity, including capacity. redundancy on international connection cables to ensure the quality of service provided to customers. When an incident occurred, Viettel immediately implemented a routing plan, optimized and added capacity on other undersea cable routes including: TGN-IA towards Hong Kong and Singapore; APG heading to Singapore; AAE-1 goes to France as well as prepares land cable resources for international connections to ensure quality service for customers. “Viettel is continuing to work with the Management Board, operating the APG, AAE-1 undersea cable lines and the NEC contractor to have continuous updates on the plan to repair the above incidents. In case of difficulty accessing, customers contact Viettel via the switchboard 18008119 to find out the exact cause and support the fastest, &#8220;a Viettel representative said. Previously, talking to ICTnews, other carriers said that they had carried out load balancing, redirected connections to other undersea cable routes as well as some land cables to ensure the quality of service provided to customers. row. Specifically, CMC Telecom has increased capacity through the cable direction across Southeast Asia (A-Grid), connecting the Internet from Vietnam to Cambodia, Thailand, Malaysia and Singapore. VNPT has actively navigated and loaded other cable directions that are operating stably such as CSC, AAG, IA, SMW3&#8230; Besides, VNPT is also actively coordinating with relevant units and partners to thoroughly check and fix international Internet connection problems.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23264</post-id>	</item>
		<item>
		<title>The organization behind the SolarWinds attack is back</title>
		<link>https://en.spress.net/the-organization-behind-the-solarwinds-attack-is-back/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 12:55:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advisory]]></category>
		<category><![CDATA[Aim]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brad Smith]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[launch]]></category>
		<category><![CDATA[Le Duyen]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Corporation]]></category>
		<category><![CDATA[NOBELIUM]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Oil pipeline]]></category>
		<category><![CDATA[organization]]></category>
		<category><![CDATA[SolarWinds]]></category>
		<category><![CDATA[US Department of Homeland Security]]></category>
		<category><![CDATA[USAID]]></category>
		<category><![CDATA[Wave]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-organization-behind-the-solarwinds-attack-is-back/</guid>

					<description><![CDATA[Microsoft Corporation said that the organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, consulting agencies and non-profit organizations. goverment. Microsoft said on its Blog: &#8220;This week, we discovered cyberattacks by Nobelium &#8211; the group that is targeting government agencies, research and consulting organizations and NGOs government&#8221; Also according [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Microsoft Corporation said that the organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, consulting agencies and non-profit organizations. goverment.</strong><br />
<span id="more-19780"></span> Microsoft said on its Blog: &#8220;This week, we discovered cyberattacks by Nobelium &#8211; the group that is targeting government agencies, research and consulting organizations and NGOs government&#8221;</p>
<p> Also according to Microsoft, Nobelium is the &#8220;Russian guy&#8221; and is also the person behind the attack targeting SolarWinds customers in 2020. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_107_39008801/6264eddffa9d13c34a8c.jpg" width="625" height="413"> The organization behind the SolarWinds cyberattack discovered last year is currently targeting government agencies, research institutions, think tanks and NGOs. The comments come weeks after a May 7 ransomware attack on the Colonial Pipeline that shut down the largest US fuel pipeline network for several days, disrupt the national supply, On May 27, Microsoft announced that: &#8220;This wave of attacks targeted approximately 3,000 email accounts at more than 150 different organizations.&#8221; Microsoft said that US organizations are the most vulnerable to attacks, targeted victims come from at least 24 different countries. According to Microsoft, at least a quarter of the organizations targeted are engaged in international development, humanitarian and human rights issues. This week, Nobelium launched attacks by breaking into a marketing email account of the United States Agency for International Development (USAID), thereby launching phishing attacks to multiple organizations. other. In statements issued Friday, the US Department of Homeland Security and USAID both said they have received and are in the process of investigating the above attack. The attack on information technology company SolarWinds, identified in December, accessed the information of thousands of companies and government offices using its products. Microsoft President Brad Smith described the attack as &#8220;the largest and most sophisticated attack the world has ever seen&#8221;. The attacks announced Thursday appear to be a continuation of multiple attempts to target government agencies involved in foreign policy, as part of an intelligence-gathering effort, Microsoft said. Intelligence. The company is currently in the process of notifying all of its target customers and has &#8220;no reason to believe&#8221; that these attacks are related to any exploits or vulnerabilities in the system. Microsoft products or services. <strong> Le Duyen</strong> (According to Reuters)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19780</post-id>	</item>
		<item>
		<title>The hacker said it was not intentionally disrupting the fuel supply in the US</title>
		<link>https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</link>
		
		<dc:creator><![CDATA[Bình An]]></dc:creator>
		<pubDate>Fri, 14 May 2021 05:41:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Deliberate]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Non political]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[State of Georgia]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</guid>

					<description><![CDATA[The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply. Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply.</strong><br />
<span id="more-14111"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_232_38816896/60abcba6d5e43cba65f5.jpg" width="625" height="365"> </p>
<p> Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, headquartered in Georgia, USA. The group also said that it will carefully examine its goals in the future, while emphasizing that the group is not affiliated with any governments when the cyber attack takes place because the group is always acting alone. DarkSide wrote on the website: &#8220;We are a non-political organization. We are not tied to a government. Our goal is to make money, not to put society in a difficult situation like it is today. in&#8221;. &#8220;From today, we will carefully examine each company that our partners want to attack to avoid future consequences,&#8221; the DarkSide team stressed. The partners the group refers to are &#8220;affiliates&#8221; of the group, DarkSide said. This group of hackers acts as a company that specializes in providing &#8220;hacking services&#8221; and is not directly involved in cyber attacks on companies or governments. The team will develop malware for the cyber attacks and negotiate the ransom with the victim, at the request of their partner. One source believes that DarkSide will receive 20-30% of the ransom for its services.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14111</post-id>	</item>
		<item>
		<title>The hacker said it was not intentionally disrupting the fuel supply in the US</title>
		<link>https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</link>
		
		<dc:creator><![CDATA[Bình An]]></dc:creator>
		<pubDate>Fri, 14 May 2021 05:41:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Deliberate]]></category>
		<category><![CDATA[disrupting]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Intentionally]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Non political]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Post words]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Sorry]]></category>
		<category><![CDATA[State of Georgia]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Victim]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-hacker-said-it-was-not-intentionally-disrupting-the-fuel-supply-in-the-us/</guid>

					<description><![CDATA[The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply. Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The group of hackers behind the network attack of America&#8217;s largest oil pipeline operator Colonial Pipeline has apologized and confirmed that they did not intentionally interrupt the fuel supply.</strong><br />
<span id="more-14112"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_232_38816896/60abcba6d5e43cba65f5.jpg" width="625" height="365"> </p>
<p> Accordingly, on the group&#8217;s website, DarkSide confirmed that it never intended to interrupt the US fuel supply when attacking the network of the Colonial Pipeline company, headquartered in Georgia, USA. The group also said that it will carefully examine its goals in the future, while emphasizing that the group is not affiliated with any governments when the cyber attack takes place because the group is always acting alone. DarkSide wrote on the website: &#8220;We are a non-political organization. We are not tied to a government. Our goal is to make money, not to put society in a difficult situation like it is today. in&#8221;. &#8220;From today, we will carefully examine each company that our partners want to attack to avoid future consequences,&#8221; the DarkSide team stressed. The partners the group refers to are &#8220;affiliates&#8221; of the group, DarkSide said. This group of hackers acts as a company that specializes in providing &#8220;hacking services&#8221; and is not directly involved in cyber attacks on companies or governments. The team will develop malware for the cyber attacks and negotiate the ransom with the victim, at the request of their partner. One source believes that DarkSide will receive 20-30% of the ransom for its services.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14112</post-id>	</item>
		<item>
		<title>To this hotel, visitors will sleep between 2 countries France and Switzerland</title>
		<link>https://en.spress.net/to-this-hotel-visitors-will-sleep-between-2-countries-france-and-switzerland/</link>
		
		<dc:creator><![CDATA[Theo Hà Anh/VOV]]></dc:creator>
		<pubDate>Tue, 11 May 2021 17:35:06 +0000</pubDate>
				<category><![CDATA[Architecture]]></category>
		<category><![CDATA[19th century]]></category>
		<category><![CDATA[bed]]></category>
		<category><![CDATA[Border]]></category>
		<category><![CDATA[countries]]></category>
		<category><![CDATA[Dining room]]></category>
		<category><![CDATA[entrance]]></category>
		<category><![CDATA[Farsighted and far sighted]]></category>
		<category><![CDATA[France]]></category>
		<category><![CDATA[French government]]></category>
		<category><![CDATA[Geneva]]></category>
		<category><![CDATA[Homey]]></category>
		<category><![CDATA[Hotel]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[land]]></category>
		<category><![CDATA[Multinational]]></category>
		<category><![CDATA[On lower]]></category>
		<category><![CDATA[Pact]]></category>
		<category><![CDATA[Sleep]]></category>
		<category><![CDATA[Snowboarding]]></category>
		<category><![CDATA[Souvenir]]></category>
		<category><![CDATA[Switzerland]]></category>
		<category><![CDATA[Traveler]]></category>
		<category><![CDATA[visitors]]></category>
		<guid isPermaLink="false">https://en.spress.net/to-this-hotel-visitors-will-sleep-between-2-countries-france-and-switzerland/</guid>

					<description><![CDATA[This special hotel has beds located between the two countries France and Switzerland, room rates are just above 100 USD / night. Arbez Hotel is a 2-star hotel located in the town of La Cure, 5 km north of Geneva, Switzerland. This is a small, beautiful, cozy hotel built in the nineteenth century, is a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>This special hotel has beds located between the two countries France and Switzerland, room rates are just above 100 USD / night.</strong><br />
<span id="more-13163"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/162119110453ed0db442.jpg" width="625" height="468"> </p>
<p> <em> Arbez Hotel is a 2-star hotel located in the town of La Cure, 5 km north of Geneva, Switzerland. This is a small, beautiful, cozy hotel built in the nineteenth century, is a suitable getaway for skiers.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/768b7fbb62f98ba7d2e8.jpg" width="625" height="460"> <em> In 1862, when the French and Swiss governments decided to change the border line in the Dappes valley. With the foresight, businessman Monsieur Ponthus decided to build a building on family property for cross-border business. In February 1863, when the border treaty came into effect, the building was also completed.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/72d576e56ba782f9dbb6.jpg" width="625" height="468"> <em> Mr. Ponthus then opened a bar in France and a souvenir shop in Switzerland inside the building. In 1921, businessman Jules &#8211; Jean Arbeze acquired this building, turning it into a unique multinational hotel and officially renaming it Arbez Franco-Suisse.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/609863a87eea97b4cefb.jpg" width="625" height="468"> <em> The hotel viewed from the French side. In the bottom corner is an image of a landmark located next to the wall of the house. The dining room, kitchen, hallway and some rooms are located between the border of the two countries. Photo: Hotel Arbez Franco-Suisse, March 2012.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/df0ec03edd7c34226d6d.jpg" width="625" height="609"> <em> The border line cuts across the stairs.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/24e03dd02092c9cc9083.jpg" width="625" height="833"> <em> The entrance to the hotel from the French side.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/a412bf22a2604b3e1271.jpg" width="625" height="468"> <em> The border line runs through the hotel dining room. Everything in the hotel is decorated in parallel with two symbols of France and Switzerland.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/0bee1ede039ceac2b38d.jpg" width="625" height="423"> <em> A border landmark behind the hotel.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_304_38793264/f5bfe18ffccd15934cdc.jpg" width="625" height="1358"> <em> Viewed from the air, the French and Swiss border runs through the hotel.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13163</post-id>	</item>
		<item>
		<title>What happens to you while sleeping without a pillow?</title>
		<link>https://en.spress.net/what-happens-to-you-while-sleeping-without-a-pillow/</link>
		
		<dc:creator><![CDATA[Hoàng Anh]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 22:32:11 +0000</pubDate>
				<category><![CDATA[Beauty]]></category>
		<category><![CDATA[Accustomed to]]></category>
		<category><![CDATA[Acne]]></category>
		<category><![CDATA[Align]]></category>
		<category><![CDATA[Backache]]></category>
		<category><![CDATA[Cooper]]></category>
		<category><![CDATA[Express]]></category>
		<category><![CDATA[Habit]]></category>
		<category><![CDATA[healthy]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[INTO]]></category>
		<category><![CDATA[Lie on your stomach]]></category>
		<category><![CDATA[Mattress]]></category>
		<category><![CDATA[Medical News Today]]></category>
		<category><![CDATA[Nerve]]></category>
		<category><![CDATA[pillow]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Sleep]]></category>
		<category><![CDATA[sleeping]]></category>
		<category><![CDATA[Smooth]]></category>
		<category><![CDATA[Temple]]></category>
		<category><![CDATA[Wrinkle]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-happens-to-you-while-sleeping-without-a-pillow/</guid>

					<description><![CDATA[You should practice the above routine to reduce acne, wrinkles and prevent back pain. 1. Wrinkle reduction: Medical News Today says studies have shown pillows to compress the skin while sleeping, especially in people on their stomach or on their backs. Over time will cause wrinkles and other signs of aging. In the beginning, sleeping [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>You should practice the above routine to reduce acne, wrinkles and prevent back pain.</strong><br />
<span id="more-10376"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/f003e06fcb2d22737b3c.jpg" width="625" height="424"> </p>
<p> <strong> 1. Wrinkle reduction: </strong> <em> Medical News Today</em> says studies have shown pillows to compress the skin while sleeping, especially in people on their stomach or on their backs. Over time will cause wrinkles and other signs of aging. In the beginning, sleeping without a pillow can make you uncomfortable, but it has many benefits in the long run. Image: <em> napodpktor.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/6c0c66604d22a47cfd33.jpg" width="625" height="416"> <strong> 2. Prevent back pain: </strong> The shape and size of many pillows can lead to an unnatural sleeping position. If you are new to not using pillows, choose a thin, light product for spinal alignment. Image:<em> mattress express.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/2da325cf0e8de7d3be9c.jpg" width="625" height="417"> <strong> 3. Avoid neck pain:</strong> If you don&#8217;t use a pillow, your head will be in a natural position. This helps prevent damage to nerves and muscles, helping you to experience less pain. In addition, pillows that are too soft also disrupt blood circulation to the neck, causing discomfort. Image: <em> marylandpainandwellnesscenter.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/ef4be227c965203b7974.jpg" width="625" height="416"> <strong> 4. Prevent acne:</strong> Acne is the result of dirt and oil build up on the face of the face clog pores. During sleep, your face will often stick to your pillow. Because pillows can become a breeding ground for bacteria, the skin condition worsens. Therefore, you should wash all pillowcases and sheets regularly. Image: <em> skinclinics.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/941e9772bc30556e0c21.jpg" width="625" height="416"> <strong> 5. Skin is smoother: </strong> Your body needs to be hydrated to make your skin plump. However, cotton pillowcases can absorb the nutrients on your skin and make your skin less healthy. So, practice the habit of sleeping without using pillows to help smooth skin. Image:<em> into the gloss.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_17_119_38554796/8caa8ec6a5844cda1595.jpg" width="625" height="465"> <strong> 6. Reduce skin irritation: </strong> If you have sensitive, acne-prone skin, sleeping on cotton pillows may not be the best option. Too coarse material rubs on the skin causing irritation, aggravating existing skin conditions. Therefore, you should switch to silk fabric instead if you are new to not using pillows while sleeping. Image:<em> sesderma.</em> <em> <strong> Why are you prone to acne?</strong> </em> <em> Certain daily habits can cause breakouts, affecting your appearance.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10376</post-id>	</item>
	</channel>
</rss>