<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Javascript &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/javascript/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 04:13:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Users need to update Google Chrome 91 immediately</title>
		<link>https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 04:13:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sergei Glazunov]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</guid>

					<description><![CDATA[Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers. Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus Recently, a security researcher from the Project Zero team discovered a critical security vulnerability [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers.</strong><br />
<span id="more-24823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/606fb267bc25557b0c34.jpg" width="625" height="390"> </p>
<p> <em> Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus</em> Recently, a security researcher from the Project Zero team discovered a critical security vulnerability (CVE-2021-30551) in Google Chrome, affecting many users. Not much is known about this vulnerability, instead, it is only briefly described: &#8220;Confusion in V8&#8221;. This is a JavaScript engine, used quite commonly on Google Chrome and browsers using Chromium source code (including Microsoft Edge). In a blog post, Google confirmed that the CVE-2021-30551 vulnerability exists in the wild. To limit future attacks, Google Chrome users should update their browser immediately by going to Settings &#8211; Help &#8211; About Google Chrome (about Google Chrome). When the update to version 91.0.4472.101 is complete, simply press Relaunch to restart the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/2dbde3b5edf704a95de6.jpg" width="625" height="335"> <em> Update Google Chrome browser to the latest version. Photo: Tieu MINH</em> This is the sixth zero day vulnerability found on Google Chrome since the beginning of the year. The latest version of the browser also contains a total of 10 security patches, seven of which are listed as High threat and one is described as Critical. Sharing with BleepingComputer, Kaspersky warned that a new group of hackers calling themselves PuzzleMaker successfully hacked both Chrome and Windows this month, prompting Microsoft to issue an urgent upgrade notice for Windows users. In addition, Kaspersky also recommends that users update their browser and operating system to the latest version to limit future attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24823</post-id>	</item>
		<item>
		<title>Half a million Huawei smartphones are infected with the Joker malware</title>
		<link>https://en.spress.net/half-a-million-huawei-smartphones-are-infected-with-the-joker-malware/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 17 Apr 2021 15:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[All in One Messenger]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[C C]]></category>
		<category><![CDATA[Cover your eyes]]></category>
		<category><![CDATA[Du Lam]]></category>
		<category><![CDATA[Google Play Store]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[JOKER]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Or know]]></category>
		<category><![CDATA[poisoned]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Tatyana Shishkova]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/half-a-million-huawei-smartphones-are-infected-with-the-joker-malware/</guid>

					<description><![CDATA[More than 500,000 Huawei smartphone users have downloaded the Joker malicious app without even knowing it. Doctor Web researchers discovered 10 seemingly harmless apps on AppGallery &#8211; Huawei&#8217;s official app market &#8211; that contain codes that connect to malicious C&#038;C servers to take over additional configuration and components. These additional components bypass the user, automatically [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>More than 500,000 Huawei smartphone users have downloaded the Joker malicious app without even knowing it.</strong><br />
<span id="more-3883"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_107_38535687/9d6b57247d669438cd77.jpg" width="625" height="374"> </p>
<p> Doctor Web researchers discovered 10 seemingly harmless apps on AppGallery &#8211; Huawei&#8217;s official app market &#8211; that contain codes that connect to malicious C&#038;C servers to take over additional configuration and components. These additional components bypass the user, automatically signing up for the paid service. To cover the phone&#8217;s owner, they demanded access to the notification and then interfered with the SMS verification code sent by the paid service. According to experts, the malicious code will subscribe to up to 5 such services, although developers can change the limit at any time. The list of infected applications range from virtual keyboards, photography, launchers, texting to stickers, games. Most have the same developer, Shanxi Kuailaipai Network Technology. In total, 10 apps were downloaded by more than 538,000 Huawei users. Doctor Web reported to Huawei and the company removing them from AppGallery. However, downloaders still have to manually delete the device. Below is a list of software that need to be removed immediately: Super Keyboard, Happy Color, Fun Color, New 2021 Keyboard, Camera MX &#8211; Photo Video Camera, BeautyPlus Camera, Color RollingIcon, Funney Meme Emoji, Happy Tapping, All-in-One Messenger. Experts say that modules downloaded from the malicious AppGallery also appear in other apps on Google Play. Once activated, they contact the remote server to receive the configuration file, which contains the task list, the paid service website, and the JavaScript mimics the user&#8217;s actions. The Joker malware was born in 2017, continuously detected in apps on Google Play Store. In October 2019, Kaspersky malware analyst Tatyana Shishkova tweeted about more than 70 malicious applications on the Google market. According to Google, they have removed about 1,700 Joker malicious apps since 2017. <strong> Du Lam </strong> (According to BleepingComputer)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3883</post-id>	</item>
	</channel>
</rss>