<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Malignant software &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/malignant-software/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 13 May 2021 20:35:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>128 million iPhones became &#8220;zombies,&#8221; Apple chose to ignore</title>
		<link>https://en.spress.net/128-million-iphones-became-zombies-apple-chose-to-ignore/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 13 May 2021 20:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[ARSTECHNICA]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[chose]]></category>
		<category><![CDATA[Cupertino country]]></category>
		<category><![CDATA[Dale Bagwell]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[Greg Joswiak]]></category>
		<category><![CDATA[Hold on]]></category>
		<category><![CDATA[Ignore]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IOS 15]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 6s 6s Plus]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[Localization]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Who cares]]></category>
		<category><![CDATA[WIRED]]></category>
		<category><![CDATA[Zombie]]></category>
		<category><![CDATA[zombies]]></category>
		<guid isPermaLink="false">https://en.spress.net/128-million-iphones-became-zombies-apple-chose-to-ignore/</guid>

					<description><![CDATA[According to Wired, this is the biggest attack ever aimed at iOS, with more than 128 million iPhones affected, but Apple is less. In September 2015, Apple executives fell into a dilemma: &#8220;Should 128 million iPhone users be notified of the biggest iOS breach in history?&#8221; In the end, they chose to remain silent. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to Wired, this is the biggest attack ever aimed at iOS, with more than 128 million iPhones affected, but Apple is less.</strong><br />
<span id="more-13926"></span> In September 2015, Apple executives fell into a dilemma: &#8220;Should 128 million iPhone users be notified of the biggest iOS breach in history?&#8221; In the end, they chose to remain silent.</p>
<p> The first mass attack on Apple&#8217;s mobile platform came to light when researchers discovered 40 malicious apps that existed on the App Store. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_119_38815425/21e90dd41396fac8a387.jpg" width="625" height="416"> <em> Apple was silent about the biggest attack on the iOS platform. Photo: Getty Images. </em> When the scope of the investigation was expanded, this number was eventually determined to be 4,000. They contain malicious code that makes iPhone and iPad part of the botnet. Simply put, the iPhone infected with malicious code becomes the iPhone &#8220;zombie&#8221;, manipulated for many malicious purposes. <strong> Malware infiltrated 128 million iPhones</strong> This shocking information has just been revealed by Epic&#8217;s lawyers, a few days before the trial of the antitrust lawsuit between the game maker and Apple. Accordingly, on the afternoon of September 21, 2015, about a week after Apple launched iPhone 6s / 6s Plus, Apple leaders discovered 2,500 malicious applications on the App Store, which were downloaded by 128 million users, total plus 203 million visitors, of which 18 million users in the US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_119_38815425/daacf791e9d3008d59c2.jpg" width="625" height="377"> <em> Thousands of malware appeared on 128 million iPhones. Photo: Bankinfosecurity. </em> &#8220;Joz, Tom and Christine &#8211; the number of affected customers is very large, should we email all of them?&#8221;, Apple&#8217;s Senior Vice President of Global Marketing, Greg Joswiak team members by email. “If so, Dale Bagwell from the Customer Experience team will take care of it. It should be noted that it is difficult to translate emails into the local language, as the application is downloaded in many different countries around the world. About 10 hours later, Bagwell joined the discussion on this matter. Obviously localizing the content, especially the exact name of the application, is not easy. Finally, no emails are sent to the client. Apple quietly posted a simple Q&#038;A document, which generally lists the series of malicious codes appearing on the App Store and the 25 most downloaded names of these. Currently the post has also been deleted. <strong> Malware impersonates Apple&#8217;s development tools</strong> The biggest attack in iOS history came from developers writing apps using fake Xcode &#8211; Apple&#8217;s iOS and OS X software development tools. The version called XcodeGhost stealthily inserted malicious code alongside the normal functions of the application. Since then, the infected applications cause the victim&#8217;s iPhone to be controlled and controlled by the server, and provide a lot of information about the device, including name, identification code, network information, details in &#8221; IDfierForVendor ”… <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_119_38815425/be8594b88afa63a43aeb.jpg" width="625" height="378"> <em> XcodeGhost has embedded the malicious code in popular applications. Photo: Hackread. </em> In China, XcodeGhost promises to load faster than the Xcode toolkit provided by Apple. When developers use the fake version, they receive a warning from Gatekeeper, the macOS security feature requires the app to be verified by a reputable publisher. Eventually, however, thousands of apps developed from the fake toolkit still appeared on the App Store. <strong> Disappointing behavior of Apple</strong> According to the <em> Wired</em> The Cupertino giant has long made security and privacy a top priority on its devices. Therefore, they need to report directly to the users affected by this serious incident. Google has a bad reputation for being silent when users download malicious apps on Android or the Chrome browser, now it&#8217;s Apple&#8217;s turn. This is not the first malware scandal on the App Store that eventually falls silent. From 2013, page <em> ArsTechnica</em> found that the application &#8220;Jekyll&#8221; passed an Apple rating but ultimately contained malicious code. The leaders of Apple have forwarded back and forth, discussing a lot about the method of controlling and approving applications on the App Store. However, all are kept internally confidential without public notice to affected users. <em> <strong> IOS 15 build with many new features</strong> </em> <em> The new iOS build integrates quite a few features that users have been waiting for.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13926</post-id>	</item>
		<item>
		<title>For the first time, Apple stated the reason for rejecting nearly 1 million apps</title>
		<link>https://en.spress.net/for-the-first-time-apple-stated-the-reason-for-rejecting-nearly-1-million-apps/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 13 May 2021 07:50:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Approval]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Dock]]></category>
		<category><![CDATA[Du Lam]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[Erotic]]></category>
		<category><![CDATA[First]]></category>
		<category><![CDATA[Getty Images]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[Refuse]]></category>
		<category><![CDATA[rejecting]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Stated]]></category>
		<category><![CDATA[Submit]]></category>
		<category><![CDATA[Tim Cook]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[WWDC 2018]]></category>
		<guid isPermaLink="false">https://en.spress.net/for-the-first-time-apple-stated-the-reason-for-rejecting-nearly-1-million-apps/</guid>

					<description><![CDATA[Nearly 1 million apps won&#8217;t be able to get through Apple&#8217;s control doors to reach the App Store in 2020. CEO Tim Cook speaks at WWDC 2018 (Image: Getty Images) This is the first time Apple publish this data. It is a sign of &#8220;defective apple&#8221; becoming more transparent in the process of approving and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Nearly 1 million apps won&#8217;t be able to get through Apple&#8217;s control doors to reach the App Store in 2020.</strong><br />
<span id="more-13700"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_107_38813569/77011b550517ec49b506.jpg" width="625" height="351"> </p>
<p> CEO Tim Cook speaks at WWDC 2018 (Image: Getty Images) This is the first time <strong> Apple</strong> publish this data. It is a sign of &#8220;defective apple&#8221; becoming more transparent in the process of approving and rejecting iPhone applications under pressure from many countries. Thanks to the application review system, comparing with the App Store regulatory list, the company can keep iPhone users safe from fraud, malware or poor experience. Apple also published some notable figures for 2020. Accordingly, the manufacturer <strong> Iphone</strong> rejected nearly 1 million applications submitted for the first time; deny nearly 1 million application updates. 48,000 applications removed due to use of &#8220;hidden or unreported features&#8221;; 150,000 applications removed for spam or other application copying; 215,000 apps removed for collecting too much user data or violating privacy; 95,000 applications were removed due to phishing, usually they change to other types of applications such as gambling, porn. 470,000 accounts disabled from the developer program for phishing. Additionally, last month, Apple declined 3.2 million app downloads using an enterprise license. This is how large businesses often use to circumvent the App Store law to install internal apps on employees&#8217; iPhones. Currently, the lawsuit between Apple and Epic Games is taking place. Game maker Fortnite denounces the App Store as a &#8220;closed garden&#8221;, hurting developers, and Apple discriminates against many. Epic Games also confirmed that Apple&#8217;s process is not perfect, sometimes approving malware. Apple employees themselves have admitted their process is not good enough to prevent scams. At the trial, Apple said, combining 500 automated reviewers and testers to review nearly 5 million applications per year, from 2017 to 2019 (updates included), the rate from declined from 33% to 36%. The flaws are too small for the size of the App Store. Apple sees the App Store as a fundamental, irreplaceable part of its business. This is the only way for users to install software on the iPhone. Apple&#8217;s attorney argued that if users let users download apps from outside the App Store the way Android is doing, they would be at risk of security. Apple doesn&#8217;t want to be Android. <strong> Du Lam </strong> (According to CNBC)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13700</post-id>	</item>
		<item>
		<title>FlexXon introduces the X-PHY SSD with AI security</title>
		<link>https://en.spress.net/flexxon-introduces-the-x-phy-ssd-with-ai-security/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Mon, 10 May 2021 23:33:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aimed at]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CD driver]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Flash memory]]></category>
		<category><![CDATA[FlexXon]]></category>
		<category><![CDATA[Format]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Introduce]]></category>
		<category><![CDATA[introduces]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[NAND]]></category>
		<category><![CDATA[PCI Express]]></category>
		<category><![CDATA[Physical]]></category>
		<category><![CDATA[Protection mechanism]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Snake]]></category>
		<category><![CDATA[SSD]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[XPHY]]></category>
		<guid isPermaLink="false">https://en.spress.net/flexxon-introduces-the-x-phy-ssd-with-ai-security/</guid>

					<description><![CDATA[X-PHY SSD is equipped with intelligent AI security feature, which can protect itself by physical attacks aimed at hardware devices. FlexXon introduces the X-PHY SSD with AI security. Photo: Flexxon Flexxon is a security company based in Singapore, specializing in the design, manufacture and retail of industrial NAND flash memory and storage devices. Flexxon also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>X-PHY SSD is equipped with intelligent AI security feature, which can protect itself by physical attacks aimed at hardware devices.</strong><br />
<span id="more-13006"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_11_38783709/a098911b8c5965073c48.jpg" width="625" height="830"> </p>
<p> <em> FlexXon introduces the X-PHY SSD with AI security. Photo: Flexxon </em> Flexxon is a security company based in Singapore, specializing in the design, manufacture and retail of industrial NAND flash memory and storage devices. Flexxon also offers leading memory solutions ensuring the highest level of data security. A new product from Flexxon has been introduced as the world&#8217;s first AI solid state drive. New technology to protect data at the hardware level, SSD can protect from both remote and physical attacks. A wide range of features include temperature sensors to detect abnormal movements, detecting traditional threats like malware and viruses or tampering with drives or ransomware. However, Flexxon did not elaborate on the work of this intelligent protection mechanism but when something goes wrong, the X-PHY SSD will send an alert to the user by email and lock itself to prevent actions. vi is believed to affect the system. The user can then unlock the device through the dynamic authentication process. For customers with high security needs, data can be automatically deleted if the device falls into the wrong hands. It is very difficult to send emails about the status of the SSD when the PC is turned off and the operating system is not running, it is not clear how the X-PHY SSD will do this. The devices are manufactured in M.2 2280 and U.2 format and PCIe 3.0 x 4 (NVME 1.3) interface is used for connection. This series includes 512 GB and 1 TB capacities. This device is expected to be ordered and delivered to corporate customers in September this year, and by 2022 it can be mass produced for all customers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13006</post-id>	</item>
		<item>
		<title>The cyber attack stagnates the leading fuel pipeline in the United States</title>
		<link>https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</link>
		
		<dc:creator><![CDATA[PHẠM TRUNG (Theo Reuters, AP)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 05:31:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[leading]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[stagnates]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</guid>

					<description><![CDATA[Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP. Leading American fuel pipeline company Colonial shut down its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack.</strong><br />
<span id="more-12826"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_14_38780441/8745c7efdaad33f36abc.jpg" width="625" height="416"> </p>
<p> <em> The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP.</em> Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. Every day, the Colonial company ships 2.5 million barrels of gasoline, diesel, jet fuel and other products through a 850-kilometer pipeline connecting the eastern and southern coasts of the United States. The company has shut down systems to stop the threat after learning about the attack. According to sources, hackers are most likely a highly professional cybercrime group. And the malware used in the attack is ransomware. Ransomware is a type of malware designed to lock systems by encrypting data and taps money to regain access. This malware has become popular in the past 5 years. The Colonial Company has invited a third-party cybersecurity company to conduct an investigation and contacted law enforcement and other federal agencies to initiate an investigation. Colonial provided no further details or said how long their fuel lines would be closed. “Cyber ​​vulnerabilities have become a systemic issue,” said Ms. Algirde Pipikaite, Head of Network Strategies at the World Economic Forum&#8217;s Cyber ​​Security Center. Without measures to protect cybersecurity, attacks are occurring more often on industrial systems such as oil and gas pipelines or water treatment plants. In 2017, Colonial shut down its gas distillation and production lines during Hurricane Harvey that hit the Gulf Coast. That contributes to tight supply and price increases in gasoline in the US.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12826</post-id>	</item>
		<item>
		<title>The largest fuel pipeline system in the US was attacked by network, the damage has not been assessed</title>
		<link>https://en.spress.net/the-largest-fuel-pipeline-system-in-the-us-was-attacked-by-network-the-damage-has-not-been-assessed/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 09 May 2021 12:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[assessed]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[damage]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gulf of Texas]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipe]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Refined]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-largest-fuel-pipeline-system-in-the-us-was-attacked-by-network-the-damage-has-not-been-assessed/</guid>

					<description><![CDATA[Colonial Pipeline &#8211; America&#8217;s largest fuel pipeline operator, was forced to shut down its entire network after a cyberattack. Colonial Pipeline America&#8217;s largest fuel pipeline system was attacked by network, has not yet assessed the damage. (Source: Freightwaves) To deal with the incident, the company had to close the entire network. Colonial Pipeline said the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Colonial Pipeline &#8211; America&#8217;s largest fuel pipeline operator, was forced to shut down its entire network after a cyberattack.</strong><br />
<span id="more-12667"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_194_38776251/f4edd918c45a2d04744b.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline America&#8217;s largest fuel pipeline system was attacked by network, has not yet assessed the damage. (Source: Freightwaves)</em> To deal with the incident, the company had to close the entire network. Colonial Pipeline said the attack &#8220;suspended all pipeline operations and affected some of our IT systems&#8221;. Sources in cybersecurity revealed that the malware used in the Colonial Pipeline attack was ransomware &#8211; a type of malware designed to block systems with how to encrypt data and request a ransom payment to restore access. The Colonial transports gasoline, diesel, jet fuel and other refined products from the Gulf of Texas to the populous US East Coast via a 8,850 km pipeline, serving 50 million customers. Oil analyst Andy Lipow said that the impact of the attack on supply and fuel prices will depend on how long the pipeline is down. If the line stops working for a day or two, the impact will be minor. However, if the pipeline is forced to shut down for 5 or 6, shortages or price increases will occur, especially in the area stretching from Alabama to Washington DC. (According to AFP, Reuters)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12667</post-id>	</item>
		<item>
		<title>Cyber ​​weapons &#8211; Weapons of immeasurable danger</title>
		<link>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</link>
					<comments>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/#respond</comments>
		
		<dc:creator><![CDATA[CTV Lê Ngọc/VOV.VN (theo topwar.ru)]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 07:28:29 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[APCS]]></category>
		<category><![CDATA[Apple II]]></category>
		<category><![CDATA[BELL]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Computer worm]]></category>
		<category><![CDATA[Container ship]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Evergreen Group]]></category>
		<category><![CDATA[Gas]]></category>
		<category><![CDATA[immeasurable]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Robert Morris]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Stuxnet virus]]></category>
		<category><![CDATA[Suez Canal]]></category>
		<category><![CDATA[Tankers]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Weapons]]></category>
		<guid isPermaLink="false">https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</guid>

					<description><![CDATA[The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently. The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently.</strong><br />
<span id="more-976"></span> </p>
<p>The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, is already networked at one level or another. In the &#8220;smart home&#8221; with TVs, refrigerators, vacuum cleaners, washing machines, microwave ovens &#8230;, and even smart light bulbs are becoming common; On the street, there were the first cars with autonomous driving systems.</p>
<p>Such devices are expected to make people&#8217;s lives easier, but certainly these technologies will also be applied in other areas as well. While digital systems and services make the quality of human life much better, in theory all digital systems can be hacked &#8211; which is already in practice. positive.</p>
<p><strong>Computer virus</strong></p>
<p>Theoretical basis for the development of the &#8220;computer virus&#8221; was formed almost simultaneously with the emergence of the computer itself in the mid-20th century. In 1961, engineers Viktor Vysotsky, Doug McIlroy and Robert Morris of the Room Bell&#8217;s telephone experiment had developed programs that could make copies of themselves &#8211; the first viruses. They are created in the form of a game that engineers call &#8220;Darwin&#8221;, the purpose of which is to send bots to friends to see which will destroy more of the competitors&#8217; programs and create more copies of itself to fill someone else&#8217;s computer.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/984065cd4f8fa6d1ff9e.jpg" width="625" height="397"></p>
<p><em>Cyber ​​weapons are said to be equally complex and are weapons of mass destruction; Source: topwar.ru</em></p>
<p>In 1981, Virus 1,2,3 and Elk Cloner appeared on Apple II personal computers; a few years later, the first anti-virus programs appeared. The word &#8220;computer virus&#8221; in fact includes many types of malware: worms, hijackers (rootkits), spyware, zombies, adware, virus blocking (winlock), Trojan viruses (trojans) and their combination. If the first viruses are often written for entertainment, over time they begin to be &#8220;commercialized&#8221; &#8211; to steal personal and financial data, disrupt device operations, encrypt the data. for the purpose of blackmail &#8230;</p>
<p>With the advent of electronic money, computer viruses received a new function &#8211; bringing the user&#8217;s computer &#8220;as a slave&#8221; to mining cryptocurrency, forming a huge network of computers. botnet infection (before that, botnet also existed, such as to send spam mail or DDoS attack). Opportunities like this cannot help but make the military and intelligence agencies in general with missions &#8211; steal something, destroy something &#8230;, care.</p>
<p><strong>Computer virus &#8211; a strategic weapon</strong></p>
<p>On June 17, 2010, for the first time in history, the win32 / Stuxnet virus &#8211; a computer worm that infects not only computers running the Microsoft Windows operating system, but also industrial systems that control the processes. automatic production, detected. This worm can be used as a means of gathering unauthorized data (spying) and sabotaging automated process control systems (APCS) of industrial enterprises, power plants, boilers, etc.</p>
<p>According to cybersecurity experts, this virus is the most complex software product, developed by a professional team of dozens of experts. In terms of complexity, it can be compared to a Tomahawk cruise missile, and is designed for cyber operations. The Stuxnet virus has damaged some uranium enrichment centrifuges, slowing down Iran&#8217;s nuclear program. Intelligence agencies of Israel and the US are suspected of developing the Stuxnet virus.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/5397a01a8a5863063a49.jpg" width="625" height="391"></p>
<p><em>Industrial facilities, infrastructure, services &#8230; all can be targets of cyber weapons; Source: topwar.ru</em></p>
<p>Later, other computer viruses were discovered, with a degree of complexity similar to that of win32 / Stuxnet (most suspected of being an Israeli / US product), such as: Duqu, designed to collect confidential data in a confidential manner; Wiper (late April 2012), destroyed all information on some of the servers of one of the largest oil companies in Iran and completely paralyzed its work for a few days; Flame, a spy virus, is believed to be developed specifically for attacks on Iran&#8217;s computer infrastructure (can identify mobile devices with Bluetooth module, track location, stealing confidential information and eavesdropping on conversations); Gauss, aimed at stealing financial information: e-mail, passwords, bank account data, cookies, as well as system configuration data; Maadi (suspected of Iran) &#8211; can collect information, remotely change computer parameters, record audio and transmit it to remote users &#8230;</p>
<p><strong>Application</strong></p>
<p>In the Middle East, for example, the largest producer of liquid natural gas (LNG), has an interest that seriously conflicts with the interests of another country. The Middle East country has a network of oil and gas pipelines, LNG production lines and a fleet of Q-Flex and Q-Max tankers designed to transport LNG and has a military base of the third country. three are on its territory. An armed attack directly on a Middle Eastern country could do more harm than good. Then, the solution might be the use of cyber weapons.</p>
<p>Modern oil and container ships are becoming more and more automated; No less automation is used in LNG plants. Therefore, specialized malware is loaded into the control systems of the Q-Flex and Q-Max tankers, or their LPG storage systems, theoretically permissible at a certain time ( or on an external command, if there is a network connection) creates an artificial accident that completely or partially destroys selected tanks / tanks. It is very likely that flaws in the LNG production process lead to neutralization, including potentially destroying the plant.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/2c2cdda1f7e31ebd47f2.jpg" width="625" height="359"></p>
<p><em>Cyber ​​weapons can easily have the same effects as the recent Suez Canal clogging; Source: topwar.ru</em></p>
<p>An explosion of an LNG carrier due to an accident at the entrance to a port or the failure of the LNG storage device can not only result in damage to the vessel itself, but also damage to coastal infrastructure. The goals could therefore be: undermine the energy supplier&#8217;s reputation, with the possibility of consumers reorienting the natural gas market of another country; increasing prices for world energy sources, helping to generate more revenue for the national budget; undermining political activity and interfering in the internal affairs of other countries in the region, due to a decrease in the financial capacity of the country in question.</p>
<p>Depending on the economic damage inflicted, a complete shift in ruling elites could occur, as well as a limited conflict between that state and its neighbors, who may want to take advantage of neighboring countries&#8217; weaknesses to change the balance of power in the region. The crux of this activity is secrecy, so that there is no direct blame without clear evidence. The United States has repeatedly been accused of conducting hostile operations against even its most staunchest allies.</p>
<p>Another option for using cyber weapons has been suggested by a recent incident. A giant ship &#8211; an oil tanker or a container ship, passing through a narrow canal, suddenly the control system gives out a series of commands to dramatically change the direction and speed of movement, resulting in the ship spinning break and completely block the channel. It can even be flipped, making it extremely time-consuming and costly to rescue it. The Evergreen Group&#8217;s container ship blocking the Suez Canal shows how congestion of shipping arteries affects the global economy. It is especially effective if such incidents occur simultaneously on several channels.</p>
<p>Or most recently, Iran is accusing Israel of terrorizing its Natanz nuclear base network &#8230; In the absence of a clear trace of the culprit, it would be extremely difficult to establish &#8211; anyone can also be blamed for this. Therefore, the development of industrial-scale cyber weapons is considered to be a top priority. Information technology along with nanotechnology and biotechnology are the cornerstones of dominance in the 21st century, but the development of cyber weapons is much cheaper than the development of promising nano biotechnology. and conventional modern weapons ./.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">976</post-id>	</item>
		<item>
		<title>5 tips to help you stay safer when investing in cryptocurrencies</title>
		<link>https://en.spress.net/5-tips-to-help-you-stay-safer-when-investing-in-cryptocurrencies/</link>
					<comments>https://en.spress.net/5-tips-to-help-you-stay-safer-when-investing-in-cryptocurrencies/#respond</comments>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 06:19:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Bank of Bangladesh]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Boom]]></category>
		<category><![CDATA[Chris Connell]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Exchanges]]></category>
		<category><![CDATA[Gangs]]></category>
		<category><![CDATA[Invest]]></category>
		<category><![CDATA[investing]]></category>
		<category><![CDATA[investors]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Promising]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[safer]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[STATISTA]]></category>
		<category><![CDATA[stay]]></category>
		<category><![CDATA[Tips]]></category>
		<category><![CDATA[Virtual]]></category>
		<category><![CDATA[Virtual private network]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-tips-to-help-you-stay-safer-when-investing-in-cryptocurrencies/</guid>

					<description><![CDATA[Cryptocurrencies are booming again in Vietnam as investors see the coin&#8217;s promising potential. Meanwhile, the state and experts constantly warn of possible risks, including cybercrime. A global customer survey conducted by Statista shows that Vietnam has the second highest cryptocurrency usage rate in the world, after Nigeria. With millions of dollars traded every month, cryptocurrency [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Cryptocurrencies are booming again in Vietnam as investors see the coin&#8217;s promising potential. Meanwhile, the state and experts constantly warn of possible risks, including cybercrime.</strong><br />
<span id="more-877"></span> </p>
<p>A global customer survey conducted by Statista shows that Vietnam has the second highest cryptocurrency usage rate in the world, after Nigeria.</p>
<p>With millions of dollars traded every month, cryptocurrency exchanges are a good prey for cybercriminals. Fraudulent acts on electronic transactions include developer and investor information collection; attack with malware, phishing, malicious code, fake notification, navigate to fake website, DDoS &#8230; and steal electronic wallet security key.</p>
<p>A notorious cybercrime gang that targets cryptocurrencies is Lazarus and its members. Since 2019, Kaspersky researchers&#8217; investigations show that Lazarus is behind the recent attacks in Singapore.</p>
<p>BlueNoroff, &#8220;family member&#8221; Lazarus specializing in the financial attack, is also said to be carrying out cryptocurrency-related attacks in Southeast Asia under the name SnatchCrypto.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_331_38532523/3aa763344976a028f967.jpg" width="625" height="312"></p>
<p>The gang targeted banks, and was also accused of being involved in the theft of $ 81 million by Bangladeshi banks. Kaspersky researchers have been tracking SnatchCrypto since the end of 2019 and found that the guys behind the campaign have resumed operations with a similar strategy.</p>
<p>Chris Connell, Managing Director of Kaspersky Asia Pacific said: “In the near future there will be more new crypto investors across Southeast Asia as the bargains from different cryptocurrencies are undeniable, and Vietnam is one of the countries that are at the forefront of this transformation.</p>
<p>The development of cryptocurrencies is an integral part of digital transformation in the region and in Vietnam, so we encourage individuals who access these financial technologies to have a basic knowledge of security measures to keep our cryptocurrency safe ”.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_331_38532523/806bd4f8feba17e44eab.jpg" width="625" height="405"></p>
<p>Experts at Kaspersky share some basic ways to protect yourself against cybercriminals on cryptocurrency exchanges:</p>
<p><strong>&#8211; Transaction research: </strong>Before investing, learn about cryptocurrency exchanges. These platforms provide the means for buying and selling virtual currency units, but there are over 500 transactions to choose from. Do research, read feedback and talk to experienced investors before going any further.</p>
<p><strong>&#8211; Know how to keep your virtual currency: </strong>After purchasing cryptocurrency, you need to keep it. There are different types of wallets, each with different benefits, technical requirements and security. When trading, you should research your storage options before you invest.</p>
<p><strong>&#8211; Diversification of investment:</strong> Diversification is the key to any smart investing strategy, and so is when you invest in cryptocurrencies. Don&#8217;t put all your capital into Bitcoin just because it&#8217;s the only name you know. There are thousands of options, and it&#8217;s best to divide your investments by a few different currencies.</p>
<p><strong>&#8211; Prepare for instability: </strong>Cryptocurrency is a volatile market, be prepared for volatility. You will see amazing fluctuations in prices. If your investment ability or mental health cannot tolerate volatility, then cryptocurrencies may not be a wise investment.</p>
<p>Cryptocurrency is booming, but it&#8217;s still in its infancy. Investing in something new always presents challenges, so be prepared. If you are planning to invest, do your research carefully and invest carefully.</p>
<p><strong>&#8211; Always give security: </strong>Transacting using your home network is safer than using a public network, but you need the right security. For starters, it&#8217;s a good idea to change the default router password because the root password is usually the same for all routers of the same model, making your WiFi vulnerable to attack.</p>
<p>In any case, it is best to do all electronic transactions over an encrypted VPN channel, which will add an extra layer of security.</p>
<p>When choosing a VPN service, pay attention to the connection speed (depending on the number and quality of the server group of the provider).</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/5-tips-to-help-you-stay-safer-when-investing-in-cryptocurrencies/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">877</post-id>	</item>
	</channel>
</rss>