<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Password &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/password/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Sat, 19 Jun 2021 05:29:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>US searches for abandoned Soviet research stations in the Arctic</title>
		<link>https://en.spress.net/us-searches-for-abandoned-soviet-research-stations-in-the-arctic/</link>
		
		<dc:creator><![CDATA[Hoàng Phạm/VOV.VN (biên dịch) RBTH]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 05:29:14 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[abandoned]]></category>
		<category><![CDATA[Agent]]></category>
		<category><![CDATA[Arctic]]></category>
		<category><![CDATA[Arctic Ocean]]></category>
		<category><![CDATA[B 17]]></category>
		<category><![CDATA[balloon]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[floating]]></category>
		<category><![CDATA[Flowing frozen]]></category>
		<category><![CDATA[Get on the plane]]></category>
		<category><![CDATA[He li]]></category>
		<category><![CDATA[Hot air balloon]]></category>
		<category><![CDATA[iceberg]]></category>
		<category><![CDATA[James Smith]]></category>
		<category><![CDATA[landing]]></category>
		<category><![CDATA[North Pole]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Research]]></category>
		<category><![CDATA[searches]]></category>
		<category><![CDATA[Smith]]></category>
		<category><![CDATA[Soviet]]></category>
		<category><![CDATA[Soviet Union]]></category>
		<category><![CDATA[stations]]></category>
		<category><![CDATA[Uninhibited]]></category>
		<category><![CDATA[US Navy Department]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-searches-for-abandoned-soviet-research-stations-in-the-arctic/</guid>

					<description><![CDATA[These research stations were abandoned by the Soviet Union, which could disappear underwater at any time. But American agents have landed at research stations and are not afraid of this. On May 28, 1962, American agents parachuted from a B-17 bomber and landed at Severny Polyus-8 (North Pole-8, or NP-8), an abandoned Soviet research station [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>These research stations were abandoned by the Soviet Union, which could disappear underwater at any time. But American agents have landed at research stations and are not afraid of this.</strong><br />
<span id="more-25371"></span> On May 28, 1962, American agents parachuted from a B-17 bomber and landed at Severny Polyus-8 (North Pole-8, or NP-8), an abandoned Soviet research station on a military jet. Icebergs floating in the Arctic Ocean. This was the beginning of one of the CIA&#8217;s most &#8220;strange&#8221; operations, codenamed &#8220;Operation Coldfeet&#8221;.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_65_29352341/2db247044b46a218fb57.jpg" width="625" height="351"> <em> Soviet Arctic explorer at station NP-8. Photo: Sputnik</em> <strong> Searching for a Soviet research station</strong> The research station NP-8 was only used by Soviet Arctic explorers until the time the ice sheet began to split. At that time, the scientists could have been urgently evacuated and this abandoned research station continued to float in the ocean until it was destroyed. In the early 1960s, the CIA and the Office of Naval Research under the US Department of the Navy conducted a &#8220;hunt&#8221; for abandoned Soviet research stations. It is said that the Soviet Union installed American submarine sound detectors there. Initially, the target was station NP-9, detected by a reconnaissance aircraft in May 1961. However, the operation was delayed and the research station was located too far in the waters of the Arctic Ocean. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_65_29352341/244544f348b1a1eff8a0.jpg" width="625" height="424"> <em> Station NP-9. Photo: Sputnik</em> In the spring of 1962, about 970km from the Canadian Air Force base at Resolute Bay, another abandoned and floating research station &#8211; station NP-8 &#8211; was accidentally discovered. This is an opportunity America cannot afford to miss. <strong> Plan &#8220;Skyhook&#8221;</strong> Considering the fact that an icebreaker can&#8217;t make it through the dense ice in the area, a helicopter won&#8217;t be able to reach NP-8&#8217;s location and the plane&#8217;s landing on icebergs Floating is also too dangerous. So the US decided to drop the agents there by parachute. But the question then is how to bring those people back [máy bay]. In the end, the US decided to use the evacuation system that the CIA used in hostile lands, also known as the “Skyhook” – developed in the late 1950s. The plan required a balloon. Helium-inflated small, a 150-meter lift and a low-flying aircraft. When the balloon rises to the required height, agents &#8220;tethered&#8221; to the balloon by lifting ropes will wait on the ground. The approaching aircraft will use a special scraper or &#8220;horn&#8221; to pull the rope while releasing the balloon. The lifting rope is then automatically wound into the winch, lifting the agent onto the plane. <strong> What happened on the iceberg?</strong> Major James Smith, an experienced paratrooper and fluent Russian, and his colleague Captain Leonard A. LeSchack, an expert in submarine surveillance systems, had three days to review everything at the research station. . A few boxes of essential equipment were dropped onto the iceberg with the agents. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_09_65_29352341/ce20ad96a1d4488a11c5.jpg" width="625" height="414"> <em> American B-17 bomber. Photo: Uli Elch (CC BY-SA 4.0)</em> As the US predicted, the Soviet scientists left NP-8 station in a hurry without having time to bring all the equipment. Agents discovered more than 80 documents, collected debris from equipment left behind by the Soviet Union, took about 100 photos. By the time the plane returned to pick them up, the weather in the research station area had turned severely bad. Visibility is reduced and wind is very strong. “I was immediately in a situation that one would imagine was flying into space,” recalls Connie W. Seigrist, the pilot of the plane that arrived to pick up the agents. The &#8220;trophies&#8221; collected by the agents were easily loaded onto the plane using the Skyhook without any problems, but getting the agents on board was a difficult task. The wind caused LeSchack to be dragged nearly 100 meters until the agent tried to cling to a block of ice. Even after the plane picked up the lifting rope, LeSchack still spent up to 10 minutes &#8220;hanging&#8221; in the air in cold weather before boarding. After seeing what happened to his colleague, Smith released his balloon and held on to a Soviet tractor left beside the research station for as long as possible. In the end, Smith was lifted without any particular difficulty. “Enjoy your time. This is the first time I&#8217;ve been able to relax in about a week,&#8221; Smith joked to the pilots after being loaded onto the plane. As a result of Operation Coldfeet, the Americans discovered that the Soviet Union had made significant advances in the field of polar meteorology and polar oceanography. In addition, the US also obtained evidence that the Soviet Union used sonar equipment of US submarines in the Arctic. &#8220;Overall, the Soviet Union&#8217;s remarkable achievements in drifting stations show that they have a long experience in this field and that these research stations themselves are also very important to the Soviet government.&#8221; , the commander of the operation, Colonel John Cadwalader said.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25371</post-id>	</item>
		<item>
		<title>CIA campaign to hunt down Soviet iceberg stations in the Arctic</title>
		<link>https://en.spress.net/cia-campaign-to-hunt-down-soviet-iceberg-stations-in-the-arctic/</link>
		
		<dc:creator><![CDATA[Thu Hằng/Báo Tin tức (Theo RBTH)]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:50:14 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[Agent]]></category>
		<category><![CDATA[Arctic]]></category>
		<category><![CDATA[Arctic Ocean]]></category>
		<category><![CDATA[B 17]]></category>
		<category><![CDATA[balloon]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[CIA]]></category>
		<category><![CDATA[Explorer]]></category>
		<category><![CDATA[Flowing frozen]]></category>
		<category><![CDATA[He li]]></category>
		<category><![CDATA[Hot air balloon]]></category>
		<category><![CDATA[Hunt]]></category>
		<category><![CDATA[iceberg]]></category>
		<category><![CDATA[North Pole]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Pole]]></category>
		<category><![CDATA[Smith]]></category>
		<category><![CDATA[Sound wave]]></category>
		<category><![CDATA[Soviet]]></category>
		<category><![CDATA[Soviet Union]]></category>
		<category><![CDATA[Starting point]]></category>
		<category><![CDATA[stations]]></category>
		<category><![CDATA[Uninhibited]]></category>
		<category><![CDATA[US Navy Department]]></category>
		<guid isPermaLink="false">https://en.spress.net/cia-campaign-to-hunt-down-soviet-iceberg-stations-in-the-arctic/</guid>

					<description><![CDATA[Iceberg stations, abandoned by Soviet polar explorers, were once hunted by American intelligence. This was the starting point of one of the CIA&#8217;s most unusual operations, going down in history with the codename Operation Coldfeet. Soviet polar explorer at the NP-8 ice station. Photo: Sputnik On May 28, 1962, two Americans parachuted from the B-17 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Iceberg stations, abandoned by Soviet polar explorers, were once hunted by American intelligence. This was the starting point of one of the CIA&#8217;s most unusual operations, going down in history with the codename Operation Coldfeet.</strong><br />
<span id="more-24694"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_12_294_39157369/4817abc3a5814cdf1590.jpg" width="625" height="351"> </p>
<p> <em> Soviet polar explorer at the NP-8 ice station. Photo: Sputnik</em> On May 28, 1962, two Americans parachuted from the B-17 &#8220;Flying Fortress,&#8221; landing at Severny Polyus-8 (also known as North Pole-8, or NP-8), a research station destroyed abandoned Soviet Union is drifting on an iceberg in the Arctic Ocean. This was the starting point of one of the CIA&#8217;s most unusual operations, which went down in history with the codename Operation Coldfeet. <strong> Hunting for Soviet ice stations</strong> An iceberg station was only useful to Soviet polar explorers until the moment the iceberg on which it rested began to disintegrate. At that time, the scientists will be urgently evacuated and the abandoned station will continue to drift across the ocean until it is completely destroyed. In the early 1960s, the CIA and the US Department of Navy&#8217;s Office of Naval Research conducted a real manhunt for abandoned Soviet ice stations. It is believed that in those places are installed sonar detectors of US submarines. Initially, the CIA&#8217;s target was station NP-9, discovered by a reconnaissance plane in May 1961. However, this mission stalled and the ice station was pushed too far into the ocean. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_12_294_39157369/23fffd2bf3691a374378.jpg" width="625" height="351"> <em> A tow truck rescues a car mired in snow at a Soviet observation post on an iceberg in the Arctic. Photo: Getty Images</em> In the spring of 1962, about 970 km from Candian Air Force Base in Resolute Bay, another abandoned iceberg station, NP-8, was unexpectedly discovered. It is an opportunity not to be missed. However, American icebreakers could not make their way through the dense ice in the area, helicopters could not reach the location, and it was too dangerous for an aircraft to land on a disintegrating &#8220;buoy&#8221;. So the CIA decided to drop the agents by parachute. But the question then is how to bring them back. Ultimately, officials decided to use a system that specialized in evacuating CIA agents from hostile territory known as the &#8216;Skyhook&#8217; developed by Robert E. Fulton in the late 1950s. The system required a a bread-shaped, helium-filled balloon, a 150-meter extension cord and a low-altitude aircraft. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_12_294_39157369/d3c60f120150e80eb141.jpg" width="625" height="351"> <em> Lockheed P-2 Neptune reconnaissance aircraft. Photo: RBTH</em> When they needed to get out of the location, CIA agents would use helium cylinders to inflate their personal balloons, tie one end of the rope to it, and wrap the other end around them. The balloon will rise into the air, and the rescue plane will use special forks to reach for the rope, then release the balloon. The rope was then wound onto a winch and lifted the agents onto the plane. <strong> The rescue</strong> Major James Smith, an experienced paratrooper who is fluent in Russian, and his colleague, Lieutenant Leonard A. LeSchack, an expert in submarine surveillance systems, spent three days researching the NP-station- 8. They parachute down to the station with some necessary equipment boxes. As expected by the Americans, the Soviet scientists rushed to leave the NP-8 station without taking all the equipment with them. CIA agents unearthed more than 80 documents, collected fragments of equipment left behind by the Soviets, and took about a hundred pictures. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_12_294_39157369/7d24a6f0a8b241ec18a3.jpg" width="625" height="424"> <em> Soviet Arctic Station 9. Photo: Sputnik</em> By the time it was designated to evacuate, the weather at station NP-8 had deteriorated dramatically: Visibility had plummeted and icy winds were rushing in. Connie W. Seigrist, the pilot of the plane that rescued the agents, recalls: “I was immediately thrown into a situation that could have been imagined as if I was flying through space.” The aircraft collected the &#8220;trophies&#8221; using the &#8216;Skyhook&#8217; system without much difficulty, but with humans it was even more difficult. The wind dragged LeSchack nearly 100 meters above the ice as he waited for evacuation by trying to anchor himself to a block of ice. Even after the plane had picked up, LeSchack spent another 10 minutes dangling in the icy air before being hoisted onto the plane. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_12_294_39157369/e25a3b8e35ccdc9285dd.jpg" width="625" height="467"> <em> Major Smith (water drinker) on a B-17 on June 2, 1962; Lieutenant LeShack in the lower right corner. Photo: RBTH</em> After observing what happened to his colleague, Smith released his balloon and grabbed hold of an abandoned Soviet tractor. In the end, he was lifted without any particular difficulty. As a result of Operation Coldfeet, the Americans discovered that the Soviet Union had made significant advances in the study of polar meteorology and polar oceanography. In addition, they obtained evidence that the Russians were using sonar equipment to detect American submarines in the Arctic. &#8220;Overall, the Soviet Union&#8217;s remarkable achievements in iceberg stations reflect their long experience in this field and the great importance their government places on it,&#8221; said Operation Commander, Captain John Cadwalader noted.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24694</post-id>	</item>
		<item>
		<title>iPhone, iCloud of the dead will be like?</title>
		<link>https://en.spress.net/iphone-icloud-of-the-dead-will-be-like/</link>
		
		<dc:creator><![CDATA[Hải Triều]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 03:43:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Account holder]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Certified copy]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[Dead]]></category>
		<category><![CDATA[DEADMAN]]></category>
		<category><![CDATA[Depending]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Find a way]]></category>
		<category><![CDATA[Hide]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[Intervention]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[Relatives]]></category>
		<category><![CDATA[Rules]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/iphone-icloud-of-the-dead-will-be-like/</guid>

					<description><![CDATA[Access to the deceased&#8217;s iCloud and iPhone accounts depends on whether the loved ones seek legal intervention. Have you ever wondered what happens after your death? Will your family be able to open your iPhone if you never tell them the password? What happens to the iCloud account and the secrets kept there? According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Access to the deceased&#8217;s iCloud and iPhone accounts depends on whether the loved ones seek legal intervention.</strong><br />
<span id="more-23361"></span> Have you ever wondered what happens after your death? Will your family be able to open your iPhone if you never tell them the password? What happens to the iCloud account and the secrets kept there?</p>
<p> According to editor Doroteya Borisova of biên <em> PhoneArena</em> , how Apple handles the account depends on whether relatives seek legal intervention or not. In iCloud&#8217;s terms and conditions, Apple says that it can proactively delete iCloud accounts that have been inactive for a year or more, or have been discontinued by users. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/a6f63c7a3138d8668129.jpg" width="625" height="468"> <em> The data stored in the iPhone, iCloud of the deceased is a difficult problem to handle if the loved one does not have their password. Photo: iMore. </em> This provision indicates that Apple may, in its sole discretion, check whether an account has been discontinued before proceeding with the deletion of the account. However, this will be notified 30 days in advance via the user&#8217;s email. <strong> Who can access the iCloud of the deceased?</strong> iCloud is inherently where all of your iPhone&#8217;s information is stored, including backups, photos, videos, iMessages and texts, and purchase history for Apple services (including music and movies). You can assume that a deceased person&#8217;s Apple ID will be assigned to the closest family members, to recover the last stored memories. However, according to the legal terms that the user agreed to from the beginning, the loved one does not automatically access the account of the deceased. The clause also stipulates that if there is an intervention from the law, relatives can access the data of the deceased. The procedure to prove to Apple includes providing the name and Apple ID of the deceased person who is requesting access, proof of ownership of the Apple ID, and a court order. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/c5c1564d5b0fb251eb1e.jpg" width="625" height="345"> <em> Forgot password feature when logging into iCloud. Photo: lifewire.com </em> Plus, if you can access the deceased person&#8217;s iCloud-linked email account, legal troubles won&#8217;t be an issue. By using the &#8220;Forgot Password&#8221; feature when signing in to iCloud, you can easily change your account&#8217;s password with the account&#8217;s associated email. However, Borisova also noted that this practice may violate Apple&#8217;s terms of use, leading to the suspension or termination of the account if detected. Here&#8217;s what happened to user Jeff Fischer in 2020. Fischer said he was a relative of a deceased person. This person&#8217;s account still has 100 USD payable in iTunes. Fischer said he wants to recover the money and send it back to the account holder&#8217;s sister. “It took me a lot of phone calls and emails to Apple support to find an employee who knew these issues. I provide the death certificate and notarized copy of my legal status as the decedent&#8217;s representative. However, instead of transferring the money from one Apple ID to another, they insist on closing the account and then issuing a check for the remaining credit,&#8221; Fischer said. <strong> So what about the iPhone?</strong> If the deceased is the only individual with the iPhone&#8217;s password, access to the phone is not possible even though you are authorized to access their iCloud. Even the FBI does not have a special way to get the password on the iPhone. The only way is to have to set up iCloud on a separate phone or completely factory reset the iPhone of the deceased. However, this means that any information that has not been backed up on iCloud will be lost. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/9ea70c2b0169e837b178.jpg" width="625" height="411"> <em> Apple&#8217;s Legacy Contact feature in iOS 15 update later this year. Photo: PhoneArena. </em> From iOS 15, iCloud account holders can set up trusted contacts, allowing information to be passed on to these people if the account holder dies. Those on the trusted list can then request access to the deceased person&#8217;s account. They just need to provide a copy of the death certificate.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23361</post-id>	</item>
		<item>
		<title>Beware of fake link called &#8216;Coca-Cola Welfare Fund&#8217; on Facebook that makes you lose your account tài</title>
		<link>https://en.spress.net/beware-of-fake-link-called-coca-cola-welfare-fund-on-facebook-that-makes-you-lose-your-account-tai/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 07:50:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[beverage]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Bleach]]></category>
		<category><![CDATA[brand]]></category>
		<category><![CDATA[called]]></category>
		<category><![CDATA[Ceiling paint]]></category>
		<category><![CDATA[Coca cola]]></category>
		<category><![CDATA[CocaCola]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[fund]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[lose]]></category>
		<category><![CDATA[Marketing campaign]]></category>
		<category><![CDATA[MESSENGER]]></category>
		<category><![CDATA[On face]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Pretend]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Tai]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[welfare]]></category>
		<category><![CDATA[Welfare Fund]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-fake-link-called-coca-cola-welfare-fund-on-facebook-that-makes-you-lose-your-account-tai/</guid>

					<description><![CDATA[Recently, Facebook users stirred when there were many fake links of Coca-Cola beverage brand. Notably, when clicking on this link, the Facebook account is immediately &#8220;discolored&#8221;. Specifically, the road link Fake Coca-Cola beverage brand spread through Messenger on smartphone leading many Facebook users to believe that this is a new advertising campaign of this beverage [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, Facebook users stirred when there were many fake links of Coca-Cola beverage brand. Notably, when clicking on this link, the Facebook account is immediately &#8220;discolored&#8221;.</strong><br />
<span id="more-22322"></span> Specifically, the road <em> link</em> Fake Coca-Cola beverage brand spread through Messenger on <em> smartphone</em> leading many Facebook users to believe that this is a new advertising campaign of this beverage company. Therefore, users have <em> click </em> into the road<em> link</em> The above leads to many accounts being &#8220;discolored&#8221;.</p>
<p> Street <em> link </em> This fake is called &#8220;Coca-Cola Welfare Fund&#8221;. Furthermore, the user after clicking on <em> website </em> Above, provide personal information, link to Facebook will receive a gift worth 2 million VND from this &#8220;fake&#8221; brand. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_105_39086514/10e4d2ccc08e29d0709f.jpg" width="625" height="351"> Website pretending to be Coca-Cola. The web interface is designed similar to <em> website</em> mainstream Coca-Cola. However, after trying the login steps, the Facebook account will immediately be disabled <em> hacker</em> intrusion, the user loses control of his personal page. Accounts that are disabled <em> hacker</em> Intrusion will continue to send <em> spam links link</em> Go to your friends Facebook account and post continue the way <em> link</em> up <em> newsfeed </em> to attract the attention of those who are curious and want to receive the gift of 2 million VND. Roads <em> link</em> &#8220;poison&#8221; contains <em> virus</em> could get into the computer or <em> smartphone</em> personal data, stealing important user data such as passwords, pictures even ID numbers, CCCD and bank passwords and many other security information. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_105_39086514/f07f33572115c84b9104.jpg" width="625" height="351"> Coca-Cola denied any connection to this fake website. The Coca-Cola brand has confirmed that this brand currently does not have any Welfare Fund <em> link</em> on the whole is due <em> hacker </em> impersonate. Up to the present time, the road <em> link</em> This fake is still spreading extremely widely on the Facebook platform in Vietnam. Facebook users need to be wary of strange links, not linked by personal accounts and absolutely do not provide information on any website. <em> website</em> any suspicious signs. <strong> Ceiling paint</strong> According to News TGDD</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22322</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>Lost my password because I opened an email attachment</title>
		<link>https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 27 May 2021 17:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Attachment]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Camouflage]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PDF]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Somethings like that]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[The same]]></category>
		<category><![CDATA[Trojans]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</guid>

					<description><![CDATA[Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you. Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers. The form of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you.</strong><br />
<span id="more-18631"></span> Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/1459f36ae6280f765639.jpg" width="625" height="351"> <em> The form of attack and distribution of malware via email is quite common. Photo: Yahoo</em> Recently, Microsoft&#8217;s security research team discovered a new attack via email. When the victim downloads and opens the attached PDF files, the Trojan will access the device and steal login information, passwords, etc. In addition, the malware also takes control of the system and disguises itself as fake ransomware. “Version 1.5 of the malware has quite a few changes compared to the previous version, but their functionality remains largely the same, including collecting browser passwords, running remote commands and PowerShell, remembering operations. keyboard operation… and some other features”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/c47f244c310ed850811f.jpg" width="625" height="534"> <em> Malicious PDF file attached to email. Photo: Microsoft</em> According to the report of <em> Threatpost</em> , malware is being distributed by attackers by email, users can identify their signs through messages like &#8220;Outgoing Payments&#8221;, &#8220;Accounts Payable Department&#8221; &#8230; Microsoft said that Microsoft 365 Defender software can detect and prevent malware from attacking computers based on machine learning.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18631</post-id>	</item>
		<item>
		<title>Hackers in Vietnam are on the rise</title>
		<link>https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Wed, 26 May 2021 14:20:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Complicated developments]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Kong]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subset]]></category>
		<category><![CDATA[Traditional approach]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</guid>

					<description><![CDATA[In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230; Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230;</strong><br />
<span id="more-18353"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_3_38951174/fc0f0f191b5bf205ab4a.jpg" width="625" height="416"> </p>
<p> Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of remote working. This manifests itself in large-scale and increasingly complex attacks. Hackers perform an average of 50 million password attacks per day, 579 attacks per second. <strong> AGAINST MALWARE AND RAMSOMWARE WITH DEVELOPMENT</strong> Microsoft&#8217;s telemetry results released over the weekend showed that the prevalence of malware and ransomware infections in Asia-Pacific has been increasing over the past 18 months, stretching back to before the Covid-19 pandemic. -19 outbreak to date. Specifically, in Australia it is 23%; China is 80%; India 15%; Japan 16%; New Zealand 19%, Singapore 43%, Hong Kong 38%, South Korea 22%, Malaysia 2%, Philippines 15%, Taiwan 16%, Thailand 3% and Vietnam 7%. Among them, Indonesia alone has a 24% decrease in malware infection rate. The number of cyber attacks and the number of Vietnamese IP addresses in botnets increased in March 2021 due to hackers taking advantage of the increasing demand for Internet use by users as well as people&#8217;s interest in translation information. Covid-19. During the same period, the number of ransomware infections (a subset of malware) also increased by 453% in Australia; China (463%); India (100%); Japan (541%); New Zealand (825%); Singapore (296%), Hong Kong (179%), Indonesia (31%), South Korea (64%), Malaysia (72%), Philippines (70%), Taiwan (407%), Thailand (6%) ). This figure in Vietnam is recorded at 15%. In Vietnam, in March 2021 alone, the Information Security Administration recorded 491 incidents of cyber attacks on information systems, an increase of 8.15% compared to February 2021. In which, the number of Malware attacks is 180, while Phishing and Deface attacks are 164 and 147, respectively. In the first quarter of 2021, although compared to the same period in 2020, the number of cyberattacks causing problems on information systems decreased by 20%, but from the beginning of 2021 to now, the number of cyberattack incidents has decreased by 20%. is still in an uptrend. Experts believe that the reason for the increase in the number of cyberattacks and the number of Vietnamese IP addresses in botnets in March 2021 was because hackers took advantage of users&#8217; increasing demand for Internet use as well as the interest People&#8217;s attention to information about Covid-19 epidemic. Therefore, the number of Phishing and Malware attacks on systems has increased to cheat, destroy and steal information illegally&#8230; It can be seen that, in the context of complicated epidemic developments, when more and more organizations, businesses and individual users work remotely, work from home, they are creating an environment for bad guys to exploit vulnerabilities, Attacks, information theft, large-scale cyberattacks take place in Vietnam and around the world. <strong> ABOUT 3.5 MILLION SECURITY PROFESSIONALS IN 2021</strong> Experts say that even as more people begin returning to the office, hybrid work is forecast to remain the norm in the future. According to Forrester, as people gradually settle into a new working model after the pandemic, we will still see an increase in the proportion of employees working remotely compared to before the pandemic, at 300%. And the current Job Trends Index report shows that 53% of respondents in Asia plan to move to a new place because they can work remotely, compared to 46 percent globally. %. That change has been demanding an urgent need for new security solutions to meet the way of working, especially when the network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. Organizations and businesses need to take data and authentication as the center. While there are many other ways to secure these days, addressing identity, authentication, and information management issues is still critical. Experts have pointed out 4 main pillars to protect users against new work era cyber threats, including: identity protection, Zero Trust mindset, cloud application, and resource investment. security personnel. The network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. As recent attacks have shown, identity will be the &#8220;battlefield&#8221; for future attacks. Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal said that, in a world where identity is the new battleground, adopting a Zero Trust strategy has become a must for businesses. Karma. The hybrid workplace is virtually borderless, so it&#8217;s important to establish protective &#8220;barriers&#8221; around identities and devices. As part of his journey to building a Zero Trust mindset, the expert emphasized that “passwordless authentication will be the trend of the future and that transformation will be seen this year”. Besides the application of technology, experts also emphasize the special importance of people and skills in ensuring information security of each business organization. However, the lack of security professionals and the lack of diversity in security teams are two weaknesses that attackers will find to hit next year, the expert said. It is estimated that the information security industry will be short of about 3.5 million security professionals this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18353</post-id>	</item>
		<item>
		<title>Back to Ben Tieng, listen to the story of the &#8216;numberless train&#8217;</title>
		<link>https://en.spress.net/back-to-ben-tieng-listen-to-the-story-of-the-numberless-train/</link>
		
		<dc:creator><![CDATA[Hoàng Dương]]></dc:creator>
		<pubDate>Tue, 25 May 2021 15:00:08 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[125th Navy Brigade]]></category>
		<category><![CDATA[Ben]]></category>
		<category><![CDATA[C41]]></category>
		<category><![CDATA[Chief Machine]]></category>
		<category><![CDATA[Cotton Van Dial]]></category>
		<category><![CDATA[Do Son]]></category>
		<category><![CDATA[Hai Phong]]></category>
		<category><![CDATA[Ho Chi Minh Road on the sea]]></category>
		<category><![CDATA[Ho Dac Thanh]]></category>
		<category><![CDATA[HQ671]]></category>
		<category><![CDATA[K15]]></category>
		<category><![CDATA[K15 Do Son Wharf]]></category>
		<category><![CDATA[Leaning Wharf]]></category>
		<category><![CDATA[Listen]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[numberless]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phan Nhan]]></category>
		<category><![CDATA[Sailor]]></category>
		<category><![CDATA[Ship]]></category>
		<category><![CDATA[Story]]></category>
		<category><![CDATA[Tieng]]></category>
		<category><![CDATA[train]]></category>
		<category><![CDATA[Wharf K15]]></category>
		<guid isPermaLink="false">https://en.spress.net/back-to-ben-tieng-listen-to-the-story-of-the-numberless-train/</guid>

					<description><![CDATA[From the beach area 2, Do Son (Hai Phong), cross the slope to Van Hoa mountain, turn to the right to see a few concrete piles protruding from the sea surface, which is the vestige of the wharf codenamed K15, &#8216;kilometer 0&#8217; &#8216; of the Ho Chi Minh Road at sea. Veterans on unnumbered trains [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>From the beach area 2, Do Son (Hai Phong), cross the slope to Van Hoa mountain, turn to the right to see a few concrete piles protruding from the sea surface, which is the vestige of the wharf codenamed K15, &#8216;kilometer 0&#8217; &#8216; of the Ho Chi Minh Road at sea.</strong><br />
<span id="more-18140"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_02_20_38699117/10a6dba8faea13b44afb.jpg" width="625" height="463"> </p>
<p> Veterans on unnumbered trains return to visit old battlefields <strong> The road across the East Sea</strong> K15 wharf is located in the southwest, at the foot of Van Hoa mountain, the 9th mountain in the Nine Dragon mountain range. Surrounded on three sides by mountains and dense green pine forests, this place is calm, an ideal anchoring point for boats. K15 is a codename during the war, everyday people in Hai Phong call it with a simple name: Ben Tieng. In 1950, the French colonialists built a military dock here to gather and transport war vehicles such as guns, tanks, amphibious vehicles from ships with their mouths open at sea to assemble, that&#8217;s why they built a gentle pier from the shore to the water&#8217;s edge to facilitate transportation and people used to call it Ben Tieng. In the memory of Hoang Van Dao (86 years old), a veteran fisherman in Do Son, the place of Ben Nghieng is also the image of the last soldiers of the French colonialists who lost the battle at Dien Bien Phu wearing their backpacks. , crooked, leaning on the ship to return home On the way, they were scared and lost, meeting everyone bowing before disembarking. On October 23, 1961, in the face of the situation of the US imperialists promoting the strategy of &#8220;special war&#8221;, the Ministry of Defense issued Decision No. 97/QD, establishing 759 Brigade (the predecessor of the 125th Navy Brigade) to transporting weapons and equipment to the southern battlefield by sea. Since then, the legends of the numberless train continued, marking the birth of the strategic transport route across the East Sea. After a period of active preparation, at 10 pm on October 11, 1962, the first wooden ship carrying 30 tons of secret weapons departed from Do Son. The departing ship consisted of 13 sailors, all of whom were soldiers from the South gathered by soldier Le Van Mot as captain, soldier Bong Van Dia as a politician. On October 16, 1962, the ship Phuong Dong 1 successfully entered Vam Lung wharf (Ca Mau). Next, the Orient ships 2, 3, 4, respectively. Pointing to the remaining piers on Ben Tieng, Lieutenant Colonel Luu Dinh Lung, a son of Hai Phong, who once participated in transporting 10 unnumbered trains recounted: “In this area, on the decision decided to establish a unit with codename K15 on the level of a battalion. The chief and political officer is Captain Do Tieu. I don&#8217;t understand why K15 wharf has exactly 15 stakes installed by the Government, which is very coincidental.&#8221; <strong> Veteran&#8217;s memory</strong> Recalling the early days of the operation of the &#8220;Numbered Pier&#8221;, Lieutenant Colonel Luu Dinh Lung recalled: &#8220;During the war, secret work was a vital element, our ships carried the transport mission, not not fighting, so the element of ingenuity and top secret is put on top. Once, General Vo Nguyen Giap came to visit, but was stopped by his comrades at the guard post and refused to let him approach because they did not know the General&#8217;s face. The general was not angry but also welcomed the vigilance and secrecy of the soldiers.&#8221; “So far, success or not is also due to the work of keeping secrets. If you go out into the street, if you meet family or friends, you are not allowed to enter the wharf gate but have to go another way. After people have passed through, you can enter&#8230; When you go to the inner wharf (Southern front) as well. That&#8217;s it, don&#8217;t say that this guy is on this ship, that guy is on that ship, which ship&#8217;s officers and soldiers know are on that ship.&#8221; “Just like myself, I am here, the house is in this area, my family knows, if I want to go home, I have to go by car to Hai Phong. Then at the Opera House, walk down to Quan Ngua, from there by car, go home. At 9:00 pm, I went back to the unit and lied that the unit&#8217;s car picked me up, I would like to go home. Parents don&#8217;t know but actually walk from there to here 6km. Come out here, before entering, take off the army clothes, put on shorts and underwear to go in, the job of keeping secrets is extremely important &#8220;- Colonel Lung said. Colonel Luu Dinh Lung is nearly 80 years old this year. A few years ago he had a stroke, so his health somewhat declined, but the memories of the train without number were still imprinted in his mind. The most memorable was on November 5, 1965, after he returned to Do Son on train 642 to Vung Ro, ship 642 was awarded the Third Class Military Merit Medal by the State and was given a pack of cigarettes by Uncle Ho for each sailor. . On April 15, 1963, the first stake was driven down. But the more they close, the more they refuse because they encounter sandy and rocky terrain. Having to change machinery and equipment many times, workers continuously work 3 shifts, excluding day and night. On May 15, 1963, wharf K15 was completed and began to do its historic duty… Continuing the recollections of the train without number, chat with lieutenant Hoang Gia Hieu, who used to participate in transporting many weapons on the legendary ship number 641, twice honored with the title of hero. Currently, that ship is located in the museum of the Navy, which is a national historic site. Lieutenant Hoang Gia Hieu enlisted in the army in February 1964, and in April 1964 was assigned to a convoy to support the southern battlefield by sea. In August 1964, rookie Hoang Gia Hieu took the first trip aboard ship number 641 (also known as C41, now renamed HQ671) of Captain Ho Dac Thanh to Ca Mau. After that, he went on many more trips, including 3 successful trips to bring weapons to Vung Ro (Phu Yen). The story that he remembers most is the decision to blow up the ship 641 after many years of attachment and the image of his comrades sacrificing themselves to ensure the secret of the vital sea route. “Around 11 o&#8217;clock at night on November 27, 1966, our ship arrived at the pier. Running back and forth, from the gate of My A to Pho An (Quang Ngai), still no one came to greet him. Time was short, we decided to drop the goods, and at the same time send people ashore to make contact. At four o&#8217;clock in the morning, two-thirds of the cargo was released, then two enemy destroyers were discovered to hide and block the exit.&#8221; During 10 years (1962-1972) from K15 Do Son wharf, there were hundreds of unnumbered trains, successfully transporting 18,741 officers and soldiers and 44,000 tons of weapons, goods and timely aid to the army. Our people in the South, Zone 6, Zone 5&#8230; during the resistance war, greatly contributed to the glorious victory of the nation in the Southern front, reunifying the country. In the face of the situation of &#8220;thousands of pounds hanging by a hair&#8221;, the Sub-Committee urgently consulted and came up with a plan to blow up the ship to keep the location of the cargo a secret and not to let the ship fall into the hands of the enemy. “After the crew members had disembarked, Captain Thanh and chief engineer Phan Nhan destroyed the documents, timed the fuse for thirty minutes, and then swam to shore… Waited and waited and waited, but did not see the ship explode. From the shore, first mate Duong Van Loc and captain Tran Nhu, the two brothers worried that the ship would not explode and would fall into enemy hands, so they swam to the fire point. A while later, on the ship 641, a fire broke out, and Mr. Loc and Mr. Nhon died.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18140</post-id>	</item>
		<item>
		<title>How to limit the leak of activity history on Google</title>
		<link>https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Tue, 25 May 2021 02:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[Any]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Extra]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[leak]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[My Activity]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Query]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Song]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Verification]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</guid>

					<description><![CDATA[When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers. Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data. According to Google, if users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers.</strong><br />
<span id="more-18010"></span> Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data.</p>
<p> According to Google, if users turn on the Extra verification feature (additional verification), their personal data will be safer, especially on shared devices (work computers, tablets &#8230;). Note, this feature only applies to My Activity item. First, open a browser on your phone or computer and go to https://myactivity.google.com/myactivity, then log in with the corresponding Google account. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/8bdb46bf52fdbba3e2ec.jpg" width="625" height="477"> <em> The section that manages personal activities on Google. Photo: MINH HOANG</em> Next, click on the Manage My Activity Verifications link, and select Request Additional Verification &#8211; Save to finish. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/a8cf7cab68e981b7d8f8.jpg" width="625" height="475"> <em> Enable additional verification for better data protection. Photo: MINH HOANG</em> Once enabled, this feature will ask you to verify your identity before showing activity history. This essentially takes you to Google&#8217;s sign-in page, which then asks the user to enter the account password or connect using an Android device (if you&#8217;ve set it up before). Overall, this extra feature is quite useful on shared devices. However, if you feel uncomfortable with saving activity history, you can turn off unnecessary items or delete everything in the settings. To do this, go to https://myactivity.google.com/myactivity, log in with the respective account. There will be three sections here: Web &#038; App Activity, Location History, and YouTube Activity History. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/9549452d516fb831e17e.jpg" width="625" height="487"> <em> Delete all previously saved activity history. Photo: MINH HOANG</em> When you click on any item, you can temporarily disable that feature or delete all previously saved data through Activity Management. If you want Google to automatically delete data for each time period, users just need to select Delete automatically, then select the corresponding time period (more than 3 months, more than 18 months or more than 36 months) and follow the steps instructions until complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18010</post-id>	</item>
		<item>
		<title>Again the trick of tagging Facebook account robbers</title>
		<link>https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Mon, 17 May 2021 01:45:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Bandit]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phan Vinh]]></category>
		<category><![CDATA[Post it]]></category>
		<category><![CDATA[Robbers]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[Stranger]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[TAG]]></category>
		<category><![CDATA[tagging]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[Tricks]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[You underlined in the questionnaire]]></category>
		<guid isPermaLink="false">https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</guid>

					<description><![CDATA[If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object. After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam. According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object.</strong><br />
<span id="more-15208"></span> After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam.</p>
<p> According to Mr. Phan Vinh (Linh Nam, Hanoi), about a week ago, he was constantly tagged (marked) on posts on the social network Facebook. All of these posts have the same content related to an accident. In addition to information about the victim&#8217;s name, the article also includes a link for users to verify for themselves. “I know many people with the same name as the victim, the post is not full, so I can&#8217;t be sure who it is. Moreover, I didn&#8217;t know who the person tagged me, so I ignored those posts,&#8221; Vinh said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/0a1f661e785c9102c84d.jpg" width="625" height="416"> <em> Users need to be wary of being tagged in Facebook posts by strangers. Photo: Trong Dat</em> Vinh made a correct decision because if he clicked on the link, he would most likely be turned into a victim of scammers. This is not a new trick when many crooks intentionally create a fake website and trick users into accessing it. Once you click on the link attached to the article, you will be asked to log in (usually with a Facebook or Google account) to continue viewing the content. At this time, the bad guys will have their account passwords in hand to use them for impure purposes. In addition to the risk of losing the account, the victim also has the risk of revealing personal information, sensitive images, &#8230; Not only that, the bad guy can also cheat through the victim&#8217;s account Island borrow money from their friends. Usually, phishing posts have a familiar motif, with content that piqued the user&#8217;s curiosity. These posts are often accompanied by a link to another website. This is the first feature that users need to pay attention to. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/1e1573146d568408dd47.jpg" width="625" height="416"> <em> Bad guys often use links impersonating news agencies to trick users into accessing fake websites. Photo: Trong Dat</em> Users also need to be wary of being tagged by strange accounts. If you see a post tagged with a large number of users (usually 99 people), absolutely do not click on the link because it is definitely a scam content. In addition, if you accidentally visit a strange link, users should not log in to their Facebook, Google, bank accounts, etc. when they receive a request, no matter what website. In fact, bad guys often use a fake website with a realistic interface to steal information, especially passwords for Facebook accounts, banks, &#8230; Therefore, users should only log in. sensitive accounts when actively accessing the websites of those services themselves. To be more careful, with websites related to financial and banking services, users should star (bookmark) these websites on the bookmarks bar of the browser. When someone asks you to borrow money on Facebook, don&#8217;t trust it, call that person directly (or through another app) to verify this information. Only with such vigilance, can users escape the &#8220;claw&#8221; of online scammers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15208</post-id>	</item>
		<item>
		<title>Warning scams appropriating assets through bank messages</title>
		<link>https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 16 May 2021 23:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Appropriation of property]]></category>
		<category><![CDATA[assets]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[entice]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Financial institutions]]></category>
		<category><![CDATA[Hai Duong Police]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[Mobile subscription]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Telecommunications business]]></category>
		<category><![CDATA[Telecommunications network]]></category>
		<category><![CDATA[Through verification]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</guid>

					<description><![CDATA[Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages. Illustration. According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages.</strong><br />
<span id="more-15154"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_181_38817834/e4f90dfd13bffae1a3ae.jpg" width="625" height="398"> </p>
<p> <em> Illustration.</em> According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found that these fake messages did not come from the systems of financial institutions, banks and telecommunications businesses, but were distributed through transmitters. fake mobile signal. These are devices of foreign origin, which are illegally traded and used by objects for the purpose of carrying out attacks to spread spam messages to deceive users, especially users in remote areas. urban area. Fraudsters often use fake broadcast devices to send spam messages directly to the phone without going through the mobile telecommunications network. These messages are sent by objects that change source information in order to create trust and deceive users. The message content is often advertising, instructions or contains links to fake websites like official websites of financial institutions, banks to lure and steal users&#8217; information such as accounts, password, OTP code. Many users do not recognize the fake website, so they provide personal information to access the bank account such as entering the account name and password. After the user provides the information, the fake website will redirect to another website or notify the user to wait. The subject uses the user&#8217;s personal information to log in to the official website of financial institutions and banks to get the OTP authentication code (if necessary).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15154</post-id>	</item>
		<item>
		<title>The XcodeGhost malware spread to millions of iPhones</title>
		<link>https://en.spress.net/the-xcodeghost-malware-spread-to-millions-of-iphones/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 16:53:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Chinese]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[Juridical]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Millions]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Program]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[WeChat]]></category>
		<category><![CDATA[XcodeGhost]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-xcodeghost-malware-spread-to-millions-of-iphones/</guid>

					<description><![CDATA[The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users. According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected. The malware affected 128 million iPhone users. The XcodeGhost malware was spread by [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The information revealed around the legal confrontation between Epic Games and Apple surprised many iPhone users.</strong><br />
<span id="more-12934"></span> According to documents published in the Epic Games-Apple lawsuit, the malware attack took place in 2015 with about 128 million iPhone and iPad devices being infected.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_5_38782308/476e8edd939f7ac1238e.jpg" width="625" height="390"> <em> The malware affected 128 million iPhone users. </em> The XcodeGhost malware was spread by hackers through the hidden installation of a version of Xcode programming software, then sharing on forums for iOS developers. Some of these malicious applications at that time included many popular names such as WeChat, the Chinese version of Angry Birds 2. Statistics show that about 2500 applications were infected with malware and up to 203 million users who downloaded these anti-malware applications Security experts believe that the XcodeGhost malware can collect information such as infected application name, device model, network information and some other data. Later, Apple said it did not record the data associated with the user&#8217;s identity, or the iCloud login password was collected. After the problem was discovered, Apple asked developers to use the official version of Xcode to compile the app before re-releasing it on the App Store. According to the <em> 9to5mac</em> Apple also strengthens the security process when installing Xcode, checking the application&#8217;s malicious code before releasing it on the App Store after the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12934</post-id>	</item>
		<item>
		<title>BIDV launched the first international standard XR technology in Vietnam</title>
		<link>https://en.spress.net/bidv-launched-the-first-international-standard-xr-technology-in-vietnam/</link>
		
		<dc:creator><![CDATA[Phương Tú (Vietnam+)]]></dc:creator>
		<pubDate>Sat, 01 May 2021 15:50:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[B FREE]]></category>
		<category><![CDATA[BIDV]]></category>
		<category><![CDATA[BIDV SmartBanking]]></category>
		<category><![CDATA[Blue eyes]]></category>
		<category><![CDATA[Debit card]]></category>
		<category><![CDATA[E KYC]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Homogeneity]]></category>
		<category><![CDATA[international]]></category>
		<category><![CDATA[International standards]]></category>
		<category><![CDATA[Keyboard]]></category>
		<category><![CDATA[Launched]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[New generation]]></category>
		<category><![CDATA[OTT SMS]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Smart Keyboard]]></category>
		<category><![CDATA[Smart Watch]]></category>
		<category><![CDATA[Space travel]]></category>
		<category><![CDATA[Standard]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Truc Anh]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Web]]></category>
		<guid isPermaLink="false">https://en.spress.net/bidv-launched-the-first-international-standard-xr-technology-in-vietnam/</guid>

					<description><![CDATA[The new generation of BIDV SmartBanking application will have the same username and password on all 4 platforms: Web, mobile, smart watch and smart keyboard. Spectacular performance with international standard XR technology. (Photo: Vietnam +) The representative of BIDV said that for the first time in Vietnam, an application event XR technology (Extended virtual reality) [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The new generation of BIDV SmartBanking application will have the same username and password on all 4 platforms: Web, mobile, smart watch and smart keyboard.</strong><br />
<span id="more-10823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_293_38641045/1b857d055a47b319ea56.jpg" width="625" height="369"> </p>
<p> <em> Spectacular performance with international standard XR technology. (Photo: Vietnam +)</em> The representative of BIDV said that for the first time in Vietnam, an application event <strong> XR technology</strong> (Extended virtual reality) is performed to bring new and attractive experiences to customers of the next generation of BIDV SmartBanking will be officially released at 20:00 on April 26 on two platforms Fanpage, Youtube of BIDV and many other major fan pages. Inspired by the theme &#8220;Light up the dawn,&#8221; SmartBanking is visualized as a new technological Sun in the digital banking universe. Accompanying customers on this space travel are famous faces, having a great influence on Vietnamese youth recently such as: Rapper, Producer-Rhymastic; Travel Blogger-Khoai Lang Thang and actor Truc Anh &#8211; the &#8220;Dutch&#8221; muse in the movie <em> Blue eyes.</em> Characters together perform tasks with the help of prominent SmartBanking features such as: virtual assistant, e-KYC, personalization, B-Free service pack, Smart Keyboard, Smart Watch. These are also typical features that BIDV has researched and applied the most modern technologies in the market and integrated into the new generation SmartBanking, fulfilling the desire to &#8220;elevate the experience&#8221; of customers. on BIDV&#8217;s digital channel. Specifically, BIDV is the first and only bank that supports &#8220;personalization&#8221; of the customer experience by allowing changes to the avatar / wallpaper of the app, changing the B-Free service package and the delivery limit. translation on demand; <strong> Identify 1 username</strong> and 1 password on all 4 platforms: Web, mobile, smart watch and smart keyboard. All can be done right on the app <strong> BIDV SmartBanking</strong> new generation. Especially, right at the event, BIDV also launched a brand new B-Free service package with package fee from VND 0, many incentives and flexible options according to service packages for customers such as: 100% Free online remittance fee, free account management / maintenance service of BIDV SmartBanking, free notice of balance fluctuation by SMS / SMS, free of issue and annual fee for the first year of domestic debit card / card Platinum, refund of domestic debit card withdrawal fee at ATM &#8230; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_293_38641045/1df07f705832b16ce823.jpg" width="625" height="328"> <em> BIDV launches a B-Free service package with a package fee of 0 VND. (Photo: Vietnam +)</em> With BIDV, <strong> B-Free</strong> not only competing on fees but also optimizing the experience according to the needs of each customer, thereby clearly positioning their service packages in the market. This is a pioneering event in the demonstration of expanded virtual reality technology in Vietnam, as a &#8220;push&#8221; towards the Z gen generation &#8211; the young generation who is dynamic, loves experience, technology, and gadgets; at the same time attracting and encouraging the public to love and use modern digital banking services such as BIDV SmartBanking./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10823</post-id>	</item>
		<item>
		<title>Risk of leaking private images from poor quality camera equipment</title>
		<link>https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</link>
		
		<dc:creator><![CDATA[Vân Anh]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 16:08:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[Camera]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Drop]]></category>
		<category><![CDATA[Equipment]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Ha Toan]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[Leaking]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[ONVIF]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[poor]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[Rao]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Safety information]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Viettel Cyber Security]]></category>
		<category><![CDATA[VSEC]]></category>
		<guid isPermaLink="false">https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</guid>

					<description><![CDATA[In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private. Information and data from personal cameras become targets of hackers Recently, on social networks, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private.</strong><br />
<span id="more-10620"></span> <strong> Information and data from personal cameras become targets of hackers</strong> </p>
<p> Recently, on social networks, there has been a situation of buying and selling clips from camera accounts stolen by bad objects. Depending on the quality of the content, the associations that sell the 18+ clip will collect a fee from 100,000 to 250,000 VND per joining. Not only providing depraved content, some groups also share hacked camera access accounts for a package fee of about 3-4 million VND. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_107_38635585/fb80f843df01365f6f10.jpg" width="625" height="368"> The fact that cameras are installed everywhere, the number of cameras is constantly increasing, making data from the camera a source of information targeted by many objects. (Artwork: Internet) According to experts of the National Cyber ​​Security Monitoring Center (NCSC), the Information Security Department, the Ministry of Information and Communications, the sale of account information on social networks is not a new behavior, but it has exported. appeared long ago. However, in the past, normally subjects only sold bank accounts, social networks or accounts containing information such as email, phone number, identity card number &#8230; Nowadays, when cameras are installed everywhere, the number is constantly increasing, being a source of information targeted by many audiences, the camera account also becomes &#8220;hot goods&#8221; on the account trading pages. “This form of purchase is becoming more popular because the number of cameras is increasing. Victims who lost their camera account can be monitored by others through their own camera, ”said the NCSC representative. <strong> Many users accidentally revealed the camera system login information</strong> According to experts, there are many reasons for the widespread purchase and sale of clips and camera accounts on the network, in part due to regulations and sanctions against acts of buying, selling and distributing personal data. not enough deterrent. Commenting on the reason that the personal camera system is vulnerable to hacker attacks, both subjectively and objectively, NCSC&#8217;s representative said: “Subjective is because users accidentally reveal account login information. camera. And objectively, because users use poor quality camera equipment, do not ensure enough information security, leading to the device can be hacked by hackers, thereby getting the login account &#8220;. Having the same opinion with the representative of NCSC, a security expert for IoT devices at Viettel Cyber ​​Security, Ha Toan, emphasized: A fundamental reason that makes personal and household cameras easy. Hacker attacks are due to the user&#8217;s limited knowledge of using IoT devices or cameras. For example, do not change the default password of the device when it is put into use. According to Toan, another reason is that the camera device of the manufacturer does not have a protection mechanism such as verifying the integrity of the firmware running on the camera device, allowing hackers to buy camera equipment and insert backdoors. (back door &#8211; PV) and then sold to the market. &#8220;During the work, we also discovered many backdoors allowing remote access in cameras originating in China&#8221;, Viettel Cyber ​​Security expert added. Along with that, there are cameras that have vulnerabilities in firmware due to programming errors such as buffer overflow, hardcode login information, logic errors &#8230; allowing hackers to exploit to take control of the device. Camera account information can also be revealed because the installation staff deliberately fails to notify the password change during installation or notice the change but does not notice the change of the entire service as mentioned above also includes services RTSP, onVIF. <strong> Raise awareness of personal information protection, choose a reputable camera</strong> To overcome the widespread situation of buying and selling clips, camera accounts in particular as well as personal information and data, experts say that the Decree on personal data protection should be issued soon and come to life. This draft Decree has regulated heavy fines for violations of personal data protection regulations. &#8220;The more penalties for handling violations related to the purchase and sale of personal data will help increase deterrence and reduce the rate of violation&#8221;, expert of Vietnam Cyber ​​Security Joint Stock Company (VSEC) Vuong Trong Nhan stated his point of view. But experts also emphasized the limitation in the sense of protecting personal data of users as well as the organization providing services related to user data. Making recommendations to users, VSEC experts advise them to first increase their sense of self-protection by not using the camera manufacturer&#8217;s default password, setting a strong password and setting a Private network system is only for indoor security equipment, instead of sharing the same Wi-Fi network. According to representatives of NCSC, individuals and businesses when using cameras need to have strict regulations and decentralization when allowing users to access their camera systems, need to change passwords regularly to avoid in case the login information is known by many people, the risk of leaking is also higher. Emphasizing on the safety factor of the device, experts say that choosing to buy cameras manufactured from major brands, products that have been assessed for information security as well as choose a reputable installation unit. is an effective solution to help users avoid the risk of information insecurity. On the other hand, is it time for camera manufacturers to pay more attention to whether their equipment meets information security requirements?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10620</post-id>	</item>
		<item>
		<title>What documents can a chip-based citizen ID card replace?</title>
		<link>https://en.spress.net/what-documents-can-a-chip-based-citizen-id-card-replace/</link>
		
		<dc:creator><![CDATA[XM/Báo Tin tức]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 03:40:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[chipbased]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[Database management system]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital signatures]]></category>
		<category><![CDATA[Documents]]></category>
		<category><![CDATA[Driving license]]></category>
		<category><![CDATA[Health Insurance]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Install the chip]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Papers]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Procedure]]></category>
		<category><![CDATA[replace]]></category>
		<category><![CDATA[Social insurance]]></category>
		<category><![CDATA[To replace]]></category>
		<category><![CDATA[You read]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-documents-can-a-chip-based-citizen-id-card-replace/</guid>

					<description><![CDATA[Readers ask: What papers can a citizen&#8217;s identity card (CCCD) replace in current administrative transactions? Most of the people are satisfied with the simple procedure and do not take much time. In this regard, the News newspaper provided the following information: According to the web portal of the Ministry of Public Security, compared to a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Readers ask: What papers can a citizen&#8217;s identity card (CCCD) replace in current administrative transactions?</strong><br />
<span id="more-8809"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_294_38597257/1e5a8b48bb0a52540b1b.jpg" width="625" height="373"> </p>
<p> <em> Most of the people are satisfied with the simple procedure and do not take much time.</em> <em> <strong> In this regard, the News newspaper provided the following information:</strong> </em> According to the web portal of the Ministry of Public Security, compared to a bar code Citizen Identification Card (CCCD), an electronic chip with CCCD can integrate more information about health insurance and social insurance. driver… CCCD card with electronic chip has high security, large storage capacity, allows integration of many accompanying applications such as: Digital signature application, biometric application, one-time password application &#8230; can widely used and connected for public and private services. Next time, when the CCCD card has electronic chip with full integration of information, then the people going to do the transactions and procedures will not have to carry many papers but only need to use the CCCD card with the chip. perform transactions. In addition, the integration of chips on the CCCD gives flexibility when it is necessary to add or modify information on the card after being issued by the police. Data on the chip can be accessed immediately without being dependent on the network connection through devices that allow reading information on the chip, making identity authentication instant, minimizing. multi-work forging identity. According to the plan, the Ministry of Public Security will set a target to grant 50 million new identity cards before July 1, 2021. This is the chance that from July 2021, the national database system of the population will be completed to connect with the project of citizenship identification with chip. Theoretically, when completing the data system on the population, the CCCD card with electronic chip can integrate more information about health insurance, social insurance, driver&#8217;s license &#8230; This is the basis Simplify administrative procedures when integrating information into a CCCD card.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8809</post-id>	</item>
		<item>
		<title>Warning: Android and iOS users need to immediately change the password for this app!</title>
		<link>https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 02:49:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[License plate]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Public sale]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</guid>

					<description><![CDATA[If you are already using this app, quickly change your password immediately. WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application. On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If you are already using this app, quickly change your password immediately.</strong><br />
<span id="more-8140"></span> WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application.</p>
<p> On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked data, including the application user&#8217;s email address, phone number, license plate number, customer birth date, and email address. and password. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5d49ebf6ceb427ea7ea5.jpg" width="625" height="416"> <em> (Photo: Seacoast Online)</em> Information about the data breach was first discovered by the threat intelligence firm Gemini Advisory based in New York City (USA). “Gemini Advisory shared an image showing that my personal data was publicly available on a crime forum, including my ParkMobile account information in screenshots, along with information about the data. stolen. The data contains email addresses and phone numbers, as well as license plates for four different vehicles that I have used in the past 10 years, ”said cybersecurity expert Brian Krebs. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5811e8aecdec24b27dfd.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> On March 26, ParkMobile notified users that they had discovered &#8220;a cybersecurity incident related to a vulnerability in the third party software we use.&#8221; &#8220;We immediately launched an investigation with the assistance of a leading cybersecurity company to resolve the incident. We have also notified the appropriate law enforcement authorities. The investigation is still ongoing and we cannot provide details at this time, &#8220;said ParkMobile. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/a0351d8a38c8d19688d9.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> According to ParkMobile, no user&#8217;s credit card information was stolen. “Our investigation indicated that no sensitive data or credit card information that we encrypted, was affected. We will continue to maintain the security and monitor our systems closely, ”the statement said. According to cybersecurity expert Brian Krebs, if you are already using ParkMobile, quickly change your password. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/221a9ea5bbe752b90bf6.jpg" width="625" height="416"> <em> (Artwork: Shutterstock)</em> In the event that this password is used by you with other accounts as well, you should change everything to limit the likelihood of an attack, although it may take a while to complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8140</post-id>	</item>
		<item>
		<title>Quietly listening to the April trumpet</title>
		<link>https://en.spress.net/quietly-listening-to-the-april-trumpet/</link>
		
		<dc:creator><![CDATA[Nguyễn Văn Chiến]]></dc:creator>
		<pubDate>Wed, 21 Apr 2021 10:00:20 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[April]]></category>
		<category><![CDATA[BELL]]></category>
		<category><![CDATA[Dear]]></category>
		<category><![CDATA[Each degree]]></category>
		<category><![CDATA[Elegant]]></category>
		<category><![CDATA[Flavor]]></category>
		<category><![CDATA[flower]]></category>
		<category><![CDATA[Flower village]]></category>
		<category><![CDATA[flowers]]></category>
		<category><![CDATA[Gloat]]></category>
		<category><![CDATA[Icon]]></category>
		<category><![CDATA[Like that]]></category>
		<category><![CDATA[Lily]]></category>
		<category><![CDATA[Listen quietly]]></category>
		<category><![CDATA[listening]]></category>
		<category><![CDATA[moment]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Pleasure]]></category>
		<category><![CDATA[Pure]]></category>
		<category><![CDATA[Quietly]]></category>
		<category><![CDATA[trumpet]]></category>
		<category><![CDATA[Whisper]]></category>
		<category><![CDATA[White]]></category>
		<guid isPermaLink="false">https://en.spress.net/quietly-listening-to-the-april-trumpet/</guid>

					<description><![CDATA[Lilies never come to people in the street as an elegant pleasure. As a bond, my childhood grew up in the flower village, where every April, the whole village grew lilies, leaving an immense space filled with pristine flavors. You cannot imagine how peaceful it is to walk in the middle of a field of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Lilies never come to people in the street as an elegant pleasure.</strong><br />
<span id="more-5584"></span> As a bond, my childhood grew up in the flower village, where every April, the whole village grew lilies, leaving an immense space filled with pristine flavors. You cannot imagine how peaceful it is to walk in the middle of a field of flowers. That moment, that feeling that many times in my life every April, I miss my hometown so hungry to go back.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_11_15_38491114/3e28181e305cd902804d.jpg" width="625" height="468"> Lilies, a dear flower from name to shape and color. The flowers like a lovely little speaker are emitting clear and sweet sounds in the hustle and bustle of life. In the mantras of flowers, lilies carry many meaningful messages. As a delicate gift, lilies replace good wishes, happiness, joy and convenience in work as well as in life. In addition, the pure beauty, graceful and background of lilies make them seen as symbols of virtue, purity. The trumpet is also a flower symbolizing love, fidelity and tolerance and nobility. My mother is like an April trumpet. Mother came back to live with her father for more than thirty years. The path of love has been difficult and challenging, but in the end they still love each other, fully happy. The moment of changing the April season, a beautiful melody inside me. Curiously, at that time my heart was like being immersed in the lovely lilies and quietly heard the flowers whisper &#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5584</post-id>	</item>
	</channel>
</rss>