<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Malicious software &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/malicious-software/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Tue, 15 Jun 2021 21:30:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Malicious apps on Android users need to remove urgently from their phones</title>
		<link>https://en.spress.net/malicious-apps-on-android-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 21:30:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Delicate]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Google Play Store]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Store]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/malicious-apps-on-android-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[This malicious application will turn the victim&#8217;s smartphone and tablet into an ad-playing engine in an extremely sophisticated way. Security software developer Kaspersky has recently issued a warning about a malicious application on the Google Play Store that is targeting fans of the Minecraft game. This malicious application is called Mods Minecraft. The app doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>This malicious application will turn the victim&#8217;s smartphone and tablet into an ad-playing engine in an extremely sophisticated way.</strong><br />
<span id="more-23013"></span> Security software developer Kaspersky has recently issued a warning about a malicious application on the Google Play Store that is targeting fans of the Minecraft game.</p>
<p> This malicious application is called Mods Minecraft. The app doesn&#8217;t function like an ad at all, instead it turns the victim&#8217;s smartphone and tablet into an ad-player in an extremely sophisticated way. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/b5b229052447cd199456.jpg" width="625" height="513"> <em> (Photo: Kaspersky)</em> Accordingly, after the first run, the application will hide its icons from the screen and continuously open the browser to display ads. The app can also play videos from YouTube, access the Google Play app store, and more. Security experts at Kaspersky found that the app opens the browser every two minutes, rendering the device essentially inoperable. use to be. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/ae9435233861d13f8870.jpg" width="625" height="410"> <em> (Photo: Kaspersky)</em> What&#8217;s especially worrisome is that it&#8217;s hard for users to know what&#8217;s going on with their devices, which apps are responsible for the trouble, and how to prevent it. The security experts at Kaspersky informed Google of their findings and the malicious app was quickly removed from the store. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/5924cc93c1d1288f71c0.jpg" width="625" height="350"> <em> Minecraft is one of the best-selling games in the world with about 180 million copies worldwide. (Photo: Mojang)</em> However, removing this app from Google&#8217;s app store does not mean the removal of all malware. In the past, developers of this type would simply upload new, slightly modified versions, using different names, from different developer accounts to further trick victims. An example can be mentioned is the VK Music Trojan. This app stole VK user accounts, but despite being reported, the app has survived on the Google Play app store for several years. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/7195e622eb60023e5b71.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Kaspersky ran a search for malicious Minecraft Mods-like apps &#8211; and found a few. In addition to the malicious application Mods Minecraft, a utility called File Recovery was also found to contain malware in version 1.1. However, that version has since been removed and version 1.1.1 of the app, available on Google Play, is safe.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23013</post-id>	</item>
		<item>
		<title>6 malicious Android apps users need to remove urgently from their phones</title>
		<link>https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:57:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Keyloggers]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virus removal]]></category>
		<guid isPermaLink="false">https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[In case your phone has 1 of the 6 applications below, quickly remove them immediately. Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware. (Artwork: Presse-citron) Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In case your phone has 1 of the 6 applications below, quickly remove them immediately.</strong><br />
<span id="more-21921"></span> Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/880527933cd1d58f8cc0.jpg" width="625" height="415"> <em> (Artwork: Presse-citron)</em> Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; steal their banking and other important personal information through tools like keyloggers. The analysis report from Bitdefender researchers said that Teabot malware can perform attacks through Android Accessibility Services, view private messages, steal banking information, steal authentication codes. of Google,&#8230; and even take full remote control of the victim&#8217;s devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/eb8fa8e1b7a35efd07b2.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Distributing malware directly from app stores would be difficult, so hackers use the method of impersonating top-rated apps distributed on third-party websites. . According to research by Bitdefender, fake Android apps include antivirus, media player, health, etc. To deceive users, the fake app&#8217;s name and logo will be copied. copy almost or exactly like the real application. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/732d887b9a3973672a28.jpg" width="625" height="468"> <em> (Artwork: Panda Security)</em> Here are 6 malicious apps impersonating famous apps to scam users. If you are using Android devices, please check all the applications on the device. In case your phone has 1 of the 6 applications below, quickly remove them immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/08f4f0a2e2e00bbe52f1.jpg" width="625" height="441"> <em> The main app icon (right) and the fake app (left) have some differences in the 5th and 6th apps. (Image: Bitdefender)</em> Bitdefender emphasizes that the campaign against these malicious applications is still active. For this reason, Android users need to be careful about downloading apps, especially apps from third parties, that aren&#8217;t part of the Google app market; Don&#8217;t click on strange links and always look carefully at the permission requests of Android apps.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21921</post-id>	</item>
		<item>
		<title>Apple just issued an important warning iPhone users need to know</title>
		<link>https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 11:23:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[ASN]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[I O]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPHONE IPAD]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[OTA]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Sean Wright]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Smooth]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</guid>

					<description><![CDATA[Users should update their iPhone software immediately, even if their device is running smoothly. On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious. This means that users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Users should update their iPhone software immediately, even if their device is running smoothly.</strong><br />
<span id="more-20023"></span> On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious.</p>
<p> This means that users should update their iPhone immediately, even if their device is running smoothly. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/db01fa42ed00045e5d11.gif" width="625" height="416"> <em> (Photo courtesy: Guardsquare)</em> Accordingly, iOS 14.6 contains patches for 43 security holes, with some of which are considered to need serious attention. Apple&#8217;s support document says the update addresses a number of security vulnerabilities that could allow attackers to remotely execute code on a device. In a sharing with Forbes, security expert Sean Wright said the security flaws &#8211; which have been resolved in the latest iOS update &#8211; are &#8220;pretty bad to get.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/c957fe14e95600085947.jpg" width="625" height="409"> <em> (Artwork: NewsBeezer)</em> While there is no indication that any of the security vulnerabilities Apple lists have been actively exploited, iPhone/iPad users should update their devices as soon as possible. Apple notes that some of the vulnerabilities were discovered by security researchers working for Trend Micro, a multinational cybersecurity company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/155321103652df0c8643.jpg" width="625" height="374"> <em> (Artwork: Getty Images/iStockphoto)</em> Some of the security and performance issues that have been fixed by the listed update include: &#8211; A memory corruption issue in the ASN decoder affecting the handling of manually generated certificates can lead to arbitrary code execution. &#8211; Audio problems related to the processing of audio files loaded with malware that can lead to arbitrary code execution. &#8211; ImageIO interferes with the processing of an image loaded with malware that can lead to arbitrary code execution. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/48fe77bd60ff89a1d0ee.jpg" width="625" height="416"> <em> (Artwork: PhoneArena)</em> The kernel allows a malicious application to execute arbitrary code with system kernel privileges. &#8211; The I/O pattern affects handling of a manually generated USD file that can lead to unexpected application termination or arbitrary code execution. &#8211; WebKit affects the processing of web content with malware installed that can lead to scripting on multiple sites. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/d074ed37fa75132b4a64.jpg" width="625" height="468"> <em> (Artwork: Rahul Chakraborty / Unsplash)</em> Currently, iOS 14-compatible iPhone/iPad users can download the iOS 14.6 and iPadOS 14.6 updates for free via the OTA protocol. To update to iOS 14.6, users need to access the app <strong> Setting</strong> => <strong> General settings</strong> => <strong> Software updates</strong> .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20023</post-id>	</item>
		<item>
		<title>Nearly 1 million customers of Canada Post are at risk of having their personal data exposed</title>
		<link>https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</link>
		
		<dc:creator><![CDATA[Hương Giang (P/v TTXVN tại Ottawa)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 13:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[Anticipation]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Customers]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Got]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Help them]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[parcel]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Post]]></category>
		<category><![CDATA[Postal]]></category>
		<category><![CDATA[Receiver]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Sender]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Supplier]]></category>
		<guid isPermaLink="false">https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</guid>

					<description><![CDATA[The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed. A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA A malware attack targeting Commport Communications, one of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed.</strong><br />
<span id="more-19552"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_324_38994277/1a5ceb88f3ca1a9443db.jpg" width="625" height="416"> </p>
<p> <em> A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA</em> A malware attack targeting Commport Communications, one of Canada Post&#8217;s providers, has affected 44 of Canada&#8217;s largest business customers, Canada Post, Canada&#8217;s national postal group, said. Canada Post across the country and nearly a million people are at risk of having their personal data exposed. Commport Communications operates in the field of electronic data exchange, management of shipping declaration data of large parcel delivery businesses. Commport Communications&#8217; systems have access to information such as the names and addresses of senders and recipients when large parcels are shipped. Canada Post said the cyberattack obtained information about delivery activity between July 2016 and March 2019. According to Canada Post, 97% of the information stolen was names and addresses. This attack did not have access to financial information. Canada Post is currently working closely with Commport Communications and has invited external cybersecurity experts to fully investigate and take appropriate action. Canada Post said it proactively notified affected business customers and provided the information and support needed to help them determine next steps. At the same time, the Privacy Commissioner&#8217;s Office was notified of the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19552</post-id>	</item>
		<item>
		<title>Apple CEO: &#8216;We don&#8217;t want to put users in danger&#8217;</title>
		<link>https://en.spress.net/apple-ceo-we-dont-want-to-put-users-in-danger/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Mon, 31 May 2021 08:09:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Antitrust]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Cardozo s Law]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[FORTNITE]]></category>
		<category><![CDATA[Gonzalez Rogers]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[put]]></category>
		<category><![CDATA[Sam Weinstein]]></category>
		<category><![CDATA[Syracuse University of Law]]></category>
		<category><![CDATA[Tim Cook]]></category>
		<category><![CDATA[To appear in court]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Yvonne Gonzalez Rogers]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-ceo-we-dont-want-to-put-users-in-danger/</guid>

					<description><![CDATA[Apple CEO said that if the iPhone supports 3rd party app stores, users can often face malware and cybercriminals. In a court appearance on May 21, Tim Cook explained why the App Store is the only app store on the iPhone. According to this leader, he never intended to experiment with opening 3rd-party app stores [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Apple CEO said that if the iPhone supports 3rd party app stores, users can often face malware and cybercriminals.</strong><br />
<span id="more-19489"></span> In a court appearance on May 21, Tim Cook explained why the App Store is the only app store on the iPhone.</p>
<p> According to this leader, he never intended to experiment with opening 3rd-party app stores for its devices, because that would push users closer to the risk of malware exposure. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_119_38993726/3175b221a4634d3d1472.jpg" width="625" height="415"> <em> Tim Cook appeared in court on May 21. Photo: Yahoo Finance. </em> The view of Apple CEO received approval from Professor Justin Cappos, working at <em> Tandon School of Engineering</em> , belonging to <em> New York University</em> . &#8220;Clearly it is not possible for users to arbitrarily install software from their own application store,&#8221; Professor Justin Cappos stated on the website. <em> Yahoo Finance</em> . &#8220;Even if it&#8217;s a familiar app, there&#8217;s still the potential for increased malware and phishing on the iPhone.&#8221; Of course, Apple&#8217;s blocking of 3rd party app stores on iPhones is not simply about protecting consumers. The company also collects a 30% fee on transactions made through the App Store. In other words, while Apple is right when it comes to consumer protection, the dominance of the App Store still gets it in trouble with antitrust regulation. <strong> Tim Cook&#8217;s stance</strong> In an antitrust lawsuit being considered by the court, Epic claims Apple abused the position of the App Store, forcing developers to use a payment system it managed and paying a 30% fee. From summer 2020, Epic kicks things off with a Fortnite update, adding the option to pay for in-game currency through its own channel at a cheaper price than the App Store. Apple responded by removing Fortnite from the app store and locking down Epic&#8217;s developer account. The game company quickly filed a lawsuit against Apple for monopoly behavior, demanding a reduction in transaction fees through the App Store or allowing 3rd party app stores to operate on the iPhone. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_119_38993726/f7c679926fd0868edfc1.jpg" width="625" height="416"> <em> CEO Epic appeared in court on May 20. Photo: Yahoo Finance. </em> The trial took place in May with many fierce arguments, and Judge Yvonne Gonzalez Rogers is expected to announce the ruling next week. Here, Epic argues that if a 3rd-party app store appeared on the iPhone, developers could reduce the price of the app because it wouldn&#8217;t cost Apple 30% of the fee. Present in court, Tim Cook defended its stance on not allowing external app stores to appear on the iPhone. By comparing the amount of malware on iOS with platforms that allow the installation of 3rd party applications &#8211; Cook asserts that the iPhone accounts for only 1-2% of malware infections, while this rate on Android, Windows up to 30-40%. &#8220;If you look at the malware on iOS compared to Android and Windows, it&#8217;s really insignificant.&#8221; <strong> The numbers are on Apple&#8217;s side</strong> Cook&#8217;s view is reinforced by <em> Report on smart device threats in 2020</em> published by Nokia. Accordingly, 26.64% of malware infections come from Android devices. This number is down from 47.15% in 2019. Nokia believes that security on Android has improved compared to before, in addition, hackers are gradually shifting attacks to IoT devices. Meanwhile, 38.92% of all malware infections originate from Windows PCs. The corresponding rate on Apple&#8217;s iPhone is only 1.72%. The rest belongs to other IoT devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_119_38993726/285ea50ab3485a160359.jpg" width="625" height="417"> <em> The rate of malware infection on iPhone is much lower than on other platforms. Photo: Yahoo Finance. </em> Why the difference between the 3 operating systems? Professor Cappos says there are several factors at play, including iOS being updated more frequently than Android and Windows. Operating system updates will patch bugs that hackers can exploit with malware, making devices harder to jailbreak. In addition, Android and Windows are two of the most used platforms in the world, which makes them attractive targets for cybercriminals. Both the App Store and Play Store have automated malware detection processes, but Google has trouble allowing users to access 3rd-party app stores. Most security experts recommend not downloading it. download applications from these places due to the risk of malicious code insertion. Meanwhile, Windows allows users to install apps through the Windows Store or download them from anywhere on the web. <strong> Can&#8217;t &#8220;Security Flag&#8221; protect Apple?</strong> Apple does not disclose revenue from the App Store, instead, it bundles it with Services. This business, which includes Apple TV+, Apple Music+, and iCloud, will bring in $53.7 billion in 2020, or 20 percent of Apple&#8217;s $274 billion in total revenue. That proves the App Store is generating a lot of money for the company. With huge profits and strict controls on the app store, Apple may face accusations of unfair competition. According to Professor Shubha Ghosh of <em> Syracuse University of Law</em> , Apple needs to demonstrate that this business is up to the level of security it offers. Sometimes in the eyes of Judge Gonzalez Rogers, the 30% commission per transaction and the security of the platform don&#8217;t go together. Even security may not be the judge&#8217;s concern. “Antitrust courts don&#8217;t care so much about safety – they care about competition,” says Professor Sam Weinstein of <em> Cardozo Law School</em> explain. <em> <strong> Why does Apple want to repair the iPhone itself?</strong> </em> <em> Apple wants to repair iPhones themselves instead of empowering 3rd parties or users.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19489</post-id>	</item>
		<item>
		<title>Lost my password because I opened an email attachment</title>
		<link>https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 27 May 2021 17:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Attachment]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Camouflage]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PDF]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Somethings like that]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[The same]]></category>
		<category><![CDATA[Trojans]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</guid>

					<description><![CDATA[Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you. Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers. The form of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you.</strong><br />
<span id="more-18631"></span> Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/1459f36ae6280f765639.jpg" width="625" height="351"> <em> The form of attack and distribution of malware via email is quite common. Photo: Yahoo</em> Recently, Microsoft&#8217;s security research team discovered a new attack via email. When the victim downloads and opens the attached PDF files, the Trojan will access the device and steal login information, passwords, etc. In addition, the malware also takes control of the system and disguises itself as fake ransomware. “Version 1.5 of the malware has quite a few changes compared to the previous version, but their functionality remains largely the same, including collecting browser passwords, running remote commands and PowerShell, remembering operations. keyboard operation… and some other features”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/c47f244c310ed850811f.jpg" width="625" height="534"> <em> Malicious PDF file attached to email. Photo: Microsoft</em> According to the report of <em> Threatpost</em> , malware is being distributed by attackers by email, users can identify their signs through messages like &#8220;Outgoing Payments&#8221;, &#8220;Accounts Payable Department&#8221; &#8230; Microsoft said that Microsoft 365 Defender software can detect and prevent malware from attacking computers based on machine learning.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18631</post-id>	</item>
		<item>
		<title>Is Colonial Pipeline covered by insurance?</title>
		<link>https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 27 May 2021 09:40:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CNA]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Evil Corp]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hades myth]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurance company]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[sensitive]]></category>
		<category><![CDATA[Steal]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</guid>

					<description><![CDATA[CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack. Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack.</strong><br />
<span id="more-18536"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_232_38971994/d799f8a1ede304bd5df2.jpg" width="625" height="312"> </p>
<p> Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The hackers then demanded a payment to unlock the files and promised not to leak the stolen data. In recent years, hackers have targeted victims with cyber insurance policies, and large volumes of sensitive consumer data make them more likely to pay ransoms, according to cybersecurity experts. According to the unnamed source, CNA paid the hackers about two weeks after a bunch of company data was stolen and CNA officials were locked out of its own network. CNA does not comment on the ransom, with a CNA spokesperson saying CNA followed all laws, regulations and guidelines, including OFAC&#8217;s 2020 ransomware guide, in handling the matter. CAN also shares attack intelligence and hackers&#8217; identities with the FBI and the Treasury Department&#8217;s Office of Foreign Assets Control because facilitating ransom payments to hackers can cause punishment risk. <strong> The largest ransom amount</strong> Ransomware attacks &#8211; and payments in particular &#8211; are rarely disclosed so it&#8217;s difficult to know what the largest ransom is. The $40 million payout is larger than any previously disclosed payments to hackers. The hackers attacking CNA used malware called Phoenix Locker, a variant of ransomware called &#8216;Hades.&#8217; According to cybersecurity experts, Hades was created by a Russian cybercrime organization called Evil Corp. Evil Corp. was sanctioned by the United States in 2019. However, identifying attacks can be difficult because hacking groups can share code or sell malware to each other. CNA, which provides cyber insurance, said its investigation concluded that the Phoenix hacker group was not on the US sanctions list. The disclosure of the payment is likely to draw outrage from lawmakers and regulators who are unhappy that US companies are paying large sums of money to criminal hackers who over the past year have targeted hospitals, drug manufacturers, police forces and other entities critical to public safety. The FBI discourages organizations from paying ransoms because it encourages additional attacks and does not guarantee data will be returned. Last year was a standout year for ransomware groups, with a task force made up of security experts and law enforcement agencies estimating that victims paid around $350 million in ransom last year, up 311% compared to 2019. The Task Force suggested 48 actions the Biden administration and the private sector could take to mitigate such attacks, including better regulation of money markets. digital currency used to make ransom payments. The report, prepared by the Institute for Security and Technology, was delivered to the White House days before the Colonial Pipeline Company was compromised in a ransomware attack that resulted in fuel shortages and long lines at stores. gas stations along the US East Coast Bloomberg reported that Colonial paid hackers nearly $5 million shortly after the attack. Colonial CEO Joseph Blount, in an interview with the Wall Street Journal published Wednesday, confirmed that the company paid the hackers &#8211; $4.4 million in ransom. According to two people familiar with the CNA attack, the company initially ignored the hacker&#8217;s request and attempted to recover the data without negotiating with the criminals. But within a week, the company decided to start negotiating with the hackers, who were demanding $60 million. Residents said the payment was made a week later. According to Barry Hensley, chief intelligence officer at cybersecurity firm Secureworks Corp. then the Phoenix Locker seems to be a variation of Hades based on the overlap of the code used in each. He said they have not yet identified which hackers used the Hades variant to attack CNA. Cybersecurity firm CrowdStrike Holdings Inc believes Hades was created by Evil Corp. to bypass US sanctions against the hacking group. In December 2019, the Treasury Department announced sanctions against 17 individuals and six entities associated with Evil Corp. At the time, the Treasury Department said Evil Corp used malware &#8220;to infect computers and collect login information from hundreds of banks and financial institutions in more than 40 countries, causing more than 100 million dollars of theft. “It is illegal for any U.S. company to knowingly pay a ransom to Evil Corp. According to Melissa Hathaway, President of Hathaway Global Strategies and a former cybersecurity adviser to Presidents George W. Bush and Barack Obama, demand for ransomware has grown exponentially over the past six months. Hathaway said the average hacker&#8217;s ransom demand is between $50 million and $70 million. Those claims are often negotiable, and companies often pay ransoms in the tens of millions of dollars, in part because cyber insurance policies cover some or all of the costs. Hathaway estimates that the average payout is between $10 and $15 million. <strong> Ngoc Linh </strong> &#8211; According to Insurance Journal</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18536</post-id>	</item>
		<item>
		<title>The largest oil pipeline network in the US was hacked</title>
		<link>https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</link>
		
		<dc:creator><![CDATA[Theo Reuters]]></dc:creator>
		<pubDate>Fri, 21 May 2021 16:25:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</guid>

					<description><![CDATA[Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware. &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware.</strong><br />
<span id="more-17026"></span> &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement.</p>
<p> The US has opened an investigation into this cyber attack. Ransomware is a type of malware designed to lock down a system by encrypting data and demanding a ransom from the victim to regain access. Colonial Pipeline asked a cybersecurity company to coordinate with federal law enforcement agencies to investigate this cyberattack. President Joe Biden was briefed on the incident. The White House said Washington will work to help the Colonial Pipeline resume the interrupted fuel supply. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_106_38780041/7c9da632bb70522e0b61.jpg" width="625" height="410"> <em> This is considered the largest cyber attack on the US energy system</em> Colonial Pipeline is providing nearly half of the fuel for the US east coast. This is considered one of the largest ransomware attacks ever recorded against US energy infrastructure. The shutdown of the largest fuel pipeline network in the United States will cause the price of this item and related products to spike. Colonial Pipeline transports 2.5 million barrels of gasoline and other fuels per day through 8,850 kilometers of pipeline connecting Gulf Coast refineries to the eastern and southern United States. The company also supplies fuel to several major US airports, including Hartsfield Jackson Airport in Atlanta, which has the world&#8217;s largest passenger traffic.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17026</post-id>	</item>
		<item>
		<title>Apple hid the fact that 128 million iPhone users were exposed to malicious code</title>
		<link>https://en.spress.net/apple-hid-the-fact-that-128-million-iphone-users-were-exposed-to-malicious-code/</link>
		
		<dc:creator><![CDATA[CTV Kiến An/VOV.VN (biên dịch) Theo 9to5Mac]]></dc:creator>
		<pubDate>Fri, 21 May 2021 02:18:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[Dale Bagwell]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[fact]]></category>
		<category><![CDATA[hid]]></category>
		<category><![CDATA[Hide]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Localization]]></category>
		<category><![CDATA[Mac App Store]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Matt Fischer]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Opposite]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-hid-the-fact-that-128-million-iphone-users-were-exposed-to-malicious-code/</guid>

					<description><![CDATA[A modified copy of Xcode appeared on the web in 2015 responsible for injecting malware into some iPhone and iPad apps, which were then uploaded to the App Store. Thanks to the lawsuit between Epic Games and Apple, internal Apple email content has revealed that more than 128 million iOS users have been affected by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A modified copy of Xcode appeared on the web in 2015 responsible for injecting malware into some iPhone and iPad apps, which were then uploaded to the App Store.</strong><br />
<span id="more-16757"></span> Thanks to the lawsuit between Epic Games and Apple, internal Apple email content has revealed that more than 128 million iOS users have been affected by malware called XcodeGhost.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_65_29141883/4f331b6d062fef71b63e.jpg" width="625" height="416"> This information was confirmed by the iTunes Customer Experience Manager at the time, Dale Bagwell, on Motherboard in an email that 128 million consumers downloaded more than 2,500 apps infected with malware that came from fake copies. Xcode&#8217;s appearance. In total, these 2,500 infected apps were downloaded more than 203 million times in the App Store. Another Apple recruiter mentioned that “China represents 55% of customers and 66% of downloads”, also referring to the malware “XcodeGhost”. According to multiple internal Apple emails, about 18 million affected users are based in the US. Notably, Apple has had many internal discussions about how to send warnings to affected developers and users because the number of customers potentially exposed to malicious code is quite high. Even so, App Store VP Matt Fischer notes that this will pose some challenges in terms of localization of the email&#8217;s language, since downloading these apps takes place in the App Store. all over the world. As a result, Apple failed to send warnings to users and developers. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_65_29141883/7dc22f9c32dedb8082cf.jpg" width="625" height="417"> Even popular apps like WeChat and Angry Birds 2, designed for the Chinese market, are on the affected list, the report said. As soon as the malware was identified, Apple asked developers to immediately recompile their apps with a genuine version of Xcode. Lookout explains that &#8220;developers are drawn to downloading this fake version of Xcode because it will download much faster in China than the official version of Xcode from Apple&#8217;s Mac App Store.&#8221; Following this incident, Apple increased the security of Xcode installation and malware scanning when submitting apps to the App Store. In testimony from one of the heads of the App Store at the trial of the lawsuit between Epic and Apple, this person said the iOS app review process is part of Apple&#8217;s charge for the App Store.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16757</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>Lost money unjustly because of fake Google Chrome app</title>
		<link>https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 14 May 2021 22:45:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[crooks]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Hundred thousand]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[unjustly]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</guid>

					<description><![CDATA[Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices. The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices.</strong><br />
<span id="more-14426"></span> The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan Smishing&#8221;.</p>
<p> <strong> How the fake Google Chrome app infiltrates the phone</strong> Specifically, the crook will initially send you an SMS and ask to pay a small fee to receive the parcel. When the user clicks on the attached link, the screen will display a message asking to update the Google Chrome browser (actually fake software) and pay 1-2 USD fee to receive the goods via credit card. use. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/f42897fc88be61e038af.jpg" width="625" height="427"> If you do, the crooks will instantly get your credit card information and take your money. In addition, the malware also uses the device to send about 2,000 phishing SMS messages per week to random phone numbers. According to the researchers, the malware&#8217;s propagation speed is relatively fast, able to target hundreds of thousands of users in a short time. <strong> How to limit?</strong> The researchers recommend that users absolutely do not give out credit card information to strangers. Also only update apps directly through Google Play or the App Store, do not click on suspicious links, even if they are sent by friends or relatives. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/dd86a852b7105e4e0701.jpg" width="625" height="328"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14426</post-id>	</item>
	</channel>
</rss>