<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Security hole &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/security-hole/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 04:13:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Users need to update Google Chrome 91 immediately</title>
		<link>https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 04:13:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sergei Glazunov]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</guid>

					<description><![CDATA[Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers. Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus Recently, a security researcher from the Project Zero team discovered a critical security vulnerability [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers.</strong><br />
<span id="more-24823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/606fb267bc25557b0c34.jpg" width="625" height="390"> </p>
<p> <em> Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus</em> Recently, a security researcher from the Project Zero team discovered a critical security vulnerability (CVE-2021-30551) in Google Chrome, affecting many users. Not much is known about this vulnerability, instead, it is only briefly described: &#8220;Confusion in V8&#8221;. This is a JavaScript engine, used quite commonly on Google Chrome and browsers using Chromium source code (including Microsoft Edge). In a blog post, Google confirmed that the CVE-2021-30551 vulnerability exists in the wild. To limit future attacks, Google Chrome users should update their browser immediately by going to Settings &#8211; Help &#8211; About Google Chrome (about Google Chrome). When the update to version 91.0.4472.101 is complete, simply press Relaunch to restart the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/2dbde3b5edf704a95de6.jpg" width="625" height="335"> <em> Update Google Chrome browser to the latest version. Photo: Tieu MINH</em> This is the sixth zero day vulnerability found on Google Chrome since the beginning of the year. The latest version of the browser also contains a total of 10 security patches, seven of which are listed as High threat and one is described as Critical. Sharing with BleepingComputer, Kaspersky warned that a new group of hackers calling themselves PuzzleMaker successfully hacked both Chrome and Windows this month, prompting Microsoft to issue an urgent upgrade notice for Windows users. In addition, Kaspersky also recommends that users update their browser and operating system to the latest version to limit future attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24823</post-id>	</item>
		<item>
		<title>Unpatched vulnerability in Samsung phones allows hackers to read messages</title>
		<link>https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:51:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy S10]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Read]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[TECHCRUNCH ONLY]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[Unpatched]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</guid>

					<description><![CDATA[Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages. Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages. Not stopping there, things are even more dangerous when two other vulnerabilities [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages.</strong><br />
<span id="more-24695"></span> Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/8314b223bc61553f0c70.jpg" width="625" height="417"> Not stopping there, things are even more dangerous when two other vulnerabilities can be exploited by hackers to manipulate arbitrary files with higher permissions. What makes these even scarier is that they can be exploited without any user interaction. Samsung is aware of these security flaws and it may take the company about 2 months to fix. For now, the best defense is to make sure your Samsung phone is up to date with the latest firmware. Toshin said he has found more than a dozen vulnerabilities in Samsung devices since the start of the year, with many of these vulnerabilities already fixed. One of the bugs lies in apps and components like the Secure Folder app and the Knox security software that come pre-installed on Samsung devices. Tohsin told TechCrunch that these may have given attackers access to sensitive user data. Among +Samsung devices, the Galaxy S10+ is verified as affected. Another vulnerability resulted in the deletion of all previously downloaded apps once device admin rights were granted to a newly installed app. Additionally, a vulnerability in the Settings app could grant read/write access to files with system user-level privileges. A security flaw that was resolved in February could have given hackers access to users&#8217; SMS/MMS messages and call details. Toshin also warned Samsung about issues that may have helped bad guys get the SD card content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/bf9499a397e17ebf27f0.jpg" width="625" height="416"> While Samsung says the vulnerability affects &#8220;certain&#8221; Galaxy devices, the company appears to be downplaying the scope of the incident. “No issues have been reported globally and users should rest assured that their sensitive information is not at risk. We have addressed the potential vulnerability by developing and releasing security patches through a software update in April and May 2021 as soon as we identify the issue.” Korean company stated. (According to VOV, PhoneArena)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24695</post-id>	</item>
		<item>
		<title>iOS 14.6 causes iPhone to overheat, severely draining battery: Here&#8217;s how to fix it</title>
		<link>https://en.spress.net/ios-14-6-causes-iphone-to-overheat-severely-draining-battery-heres-how-to-fix-it/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 23:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[battery]]></category>
		<category><![CDATA[Complain]]></category>
		<category><![CDATA[draining]]></category>
		<category><![CDATA[Exceed]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Forum]]></category>
		<category><![CDATA[Fraudster]]></category>
		<category><![CDATA[Hao]]></category>
		<category><![CDATA[Heres]]></category>
		<category><![CDATA[hot]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 12 Pro Max]]></category>
		<category><![CDATA[IPHONE IPAD]]></category>
		<category><![CDATA[Overcome]]></category>
		<category><![CDATA[overheat]]></category>
		<category><![CDATA[PODCAST]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Serious]]></category>
		<category><![CDATA[Severely]]></category>
		<category><![CDATA[The battery]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[Too hot]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Zdnet]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-14-6-causes-iphone-to-overheat-severely-draining-battery-heres-how-to-fix-it/</guid>

					<description><![CDATA[On the Apple support forum, some users have fixed the battery drain issue on their iPhone after updating to iOS 14.6. In the past week, Apple has officially released iOS 14.6 and iPadOS 14.6 updates for iPhone / iPad users. This update not only brings new features, but also fixes a series of security bugs [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the Apple support forum, some users have fixed the battery drain issue on their iPhone after updating to iOS 14.6.</strong><br />
<span id="more-20943"></span> In the past week, Apple has officially released iOS 14.6 and iPadOS 14.6 updates for iPhone / iPad users.</p>
<p> This update not only brings new features, but also fixes a series of security bugs on iPhone to prevent hackers from taking over the device. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_329_39051206/edcf4e6e5f2cb672ef3d.jpg" width="625" height="350"> <em> Many iPhone users have complained about battery drain and overheating issues after updating to iOS 14.6. (Photo: GearCoupon)</em> However, only a short time after using it, many iPhone users have complained about battery drain and overheating problems after updating to iOS 14.6. &#8220;After stopping charging, the battery life on my iPhone 12 Pro Max quickly dropped from 100% to 35% in a period of 4 hours. In addition, the iPhone 12 Pro Max also got hotter, so much so that I felt I see it when I have my phone in my pocket,” said one user on the iPhone in Canada forum. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_329_39051206/442fe08ef1cc189241dd.jpg" width="625" height="350"> <em> (Photo: NewsBeezer)</em> Another person also said that the iPhone must be plugged in continuously after updating to the recently released iOS 14.6 version. Besides excessive battery drain, users also reported overheating issues even when the iPhone was in standby mode for several hours. Many people are also worried that poor battery performance can reduce the health of their iPhone battery. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_329_39051206/b8cd04601122f87ca133.jpg" width="625" height="393"> <em> (Photo: OS X Daily)</em> According to ZDNET, battery life drops after each update is a common occurrence, because the iPhone has to perform some important management tasks, so the first days after installation will appear this situation. . However, if this situation persists, it is possible that the iPhone or the software has encountered a problem. On the Apple support forum, some users have fixed the battery drain issue on their iPhone by deleting the Podcasts app. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_329_39051206/a97106d01792fecca783.jpg" width="625" height="400"> <em> Some users have fixed the battery drain issue on their iPhone by deleting the Podcasts app. (Photo: Primakov / Shutterstock)</em> Accordingly, after accessing<strong> Setting </strong> > <strong> The battery</strong> and looked at the Battery Usage statistics by app, these people found Podcasts to be the culprit that drains a lot of battery on iPhone. After deleting this app, the battery life has improved markedly. If the battery life on your iPhone is experiencing the same problem after updating to iOS 14.6, try the above method to see if the battery life on your iPhone has improved or not.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20943</post-id>	</item>
		<item>
		<title>4 recommendations to limit risks from ransomware</title>
		<link>https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 17:16:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Backup]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[FTP]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[recommendation]]></category>
		<category><![CDATA[Recommendations]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Right from the start]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[Scanning]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://en.spress.net/4-recommendations-to-limit-risks-from-ransomware/</guid>

					<description><![CDATA[Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats. Appropriate measures should be taken to limit the risk from ransomware. Illustration. With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Ransomware is a common form of cyber attack, appearing in many fields. Understanding how it works will help your organization protect against future threats.</strong><br />
<span id="more-20877"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/fcc826223760de3e8771.jpg" width="625" height="351"> </p>
<p> <em> Appropriate measures should be taken to limit the risk from ransomware. Illustration. </em> With this form of attack, hackers often use tricks to fake websites, extract data of agencies and organizations and demand ransom. Cybercriminals carry out cyberattacks according to a concise strategy that is applicable to many industries. An analysis of recent experts shows that, in 2020 alone, the amount of damage related to ransomware attacks has reached billions of dollars. More dangerously, this behavior also targets the government&#8217;s information technology systems, causing serious impact. To protect critical data from attacks, government IT systems need to ensure external layers of security, while having the added responsibility of maintaining the infrastructure if an intrusion occurs. offense. According to studies, despite the development and expansion of the scope, the attacker&#8217;s methods still have similarities. Most hackers will illegally exploit the lowest-level vulnerabilities first, through some common and easy-to-implement method. Therefore, experts recommend to prevent ransomware from this initial step through some of the following methods. <strong> 1. Secure remote access</strong> Remote access is a familiar method often used by attackers, especially through unpatched vulnerabilities of information systems. Accordingly, hackers are constantly scanning the internet, looking for ways to exploit these vulnerabilities to perform attacks. To combat vulnerability scanning, organizations should prioritize patching vulnerabilities first. Along with that, to protect the system, experts recommend that organizations identify remote access systems to their systems by looking up IP addresses. If an attack is suspected, users should block public access to remote desktop protocol services (iRemoteDesktop &#8211; RDP), a secure shell that encrypts transmission data (Secure Socket Shell &#8211; SSH) ) and file transfer protocol (File Transfer Protocol &#8211; FTP). Agencies and organizations need to ensure that systems for remote access such as firewalls, VPN gateways, and email gateways are regularly patched, perform scanning for security holes, and deploy multi-factor authentication. Multi-factor Authentication (MFA) for accounts that are authorized for remote access. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_309_39044821/6d7e059ab8d9518708c8.jpg" width="625" height="499"> Hackers take advantage of security holes to attack the network. Illustration. <strong> 2. Email security</strong> Many ransomware incidents can start with an email sent to a user. This attack method is gradually becoming popular for hackers to perform blackmail. Experts say it&#8217;s safer to prevent unsolicited emails in the first place. The email security system acts as a &#8220;fence&#8221; to protect the strange messages from the internet and private mailboxes in the intranet system. To avoid email threats, users need to make sure email messages are scanned through a filtering system, and check attachments and links for advanced threats. In addition, account holders should audit or block password-protected documents as hackers often use this method to bypass email data scanning. <strong> 3. Keep data backups safe </strong> The third most common method for ransomware is to identify the target, encrypt the data, and then completely delete the backups. In addition to the data on the network and the data being used directly, the hacker will search all backups and encrypt them, disabling the data to increase the possibility of ransom from the victim. The victim then has a high probability of paying to buy back these encrypted data. Therefore, individuals, agencies and organizations should have backup plans to ensure the safety of all data. <strong> 4. Implement a 3-2-1 . Backup Strategy</strong> Without the right protections, backups, and archiving, concurrent copies on the same network are vulnerable to hackers. To avoid network-wide attacks, experts have come up with a safe backup measure for users&#8217; data systems. For all important files, users should store 3 copies, including 1 primary backup for daily use and 2 backup copies. In it, the files will be saved on 2 different media environments to reduce the possibility of mass attacks. These copies must be in place so that data can be accessed and restored easily and quickly in the event of a failure. At the same time, users should save 1 copy outside the work network or home network, in case of force majeure situations due to natural disasters, unexpected disasters.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20877</post-id>	</item>
		<item>
		<title>Apple just issued an important warning iPhone users need to know</title>
		<link>https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 11:23:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[ASN]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[I O]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPHONE IPAD]]></category>
		<category><![CDATA[issued]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Optional]]></category>
		<category><![CDATA[OTA]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[Sean Wright]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Smooth]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Trend Micro]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-just-issued-an-important-warning-iphone-users-need-to-know-2/</guid>

					<description><![CDATA[Users should update their iPhone software immediately, even if their device is running smoothly. On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious. This means that users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Users should update their iPhone software immediately, even if their device is running smoothly.</strong><br />
<span id="more-20023"></span> On the morning of May 25 (Vietnam time), Apple released iOS 14.6, a &#8220;small but powerful&#8221; update with fixing many bugs that affect the user experience, and patching a series of vulnerabilities. Security is rated as serious.</p>
<p> This means that users should update their iPhone immediately, even if their device is running smoothly. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/db01fa42ed00045e5d11.gif" width="625" height="416"> <em> (Photo courtesy: Guardsquare)</em> Accordingly, iOS 14.6 contains patches for 43 security holes, with some of which are considered to need serious attention. Apple&#8217;s support document says the update addresses a number of security vulnerabilities that could allow attackers to remotely execute code on a device. In a sharing with Forbes, security expert Sean Wright said the security flaws &#8211; which have been resolved in the latest iOS update &#8211; are &#8220;pretty bad to get.&#8221; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/c957fe14e95600085947.jpg" width="625" height="409"> <em> (Artwork: NewsBeezer)</em> While there is no indication that any of the security vulnerabilities Apple lists have been actively exploited, iPhone/iPad users should update their devices as soon as possible. Apple notes that some of the vulnerabilities were discovered by security researchers working for Trend Micro, a multinational cybersecurity company. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/155321103652df0c8643.jpg" width="625" height="374"> <em> (Artwork: Getty Images/iStockphoto)</em> Some of the security and performance issues that have been fixed by the listed update include: &#8211; A memory corruption issue in the ASN decoder affecting the handling of manually generated certificates can lead to arbitrary code execution. &#8211; Audio problems related to the processing of audio files loaded with malware that can lead to arbitrary code execution. &#8211; ImageIO interferes with the processing of an image loaded with malware that can lead to arbitrary code execution. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/48fe77bd60ff89a1d0ee.jpg" width="625" height="416"> <em> (Artwork: PhoneArena)</em> The kernel allows a malicious application to execute arbitrary code with system kernel privileges. &#8211; The I/O pattern affects handling of a manually generated USD file that can lead to unexpected application termination or arbitrary code execution. &#8211; WebKit affects the processing of web content with malware installed that can lead to scripting on multiple sites. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_30_329_39016450/d074ed37fa75132b4a64.jpg" width="625" height="468"> <em> (Artwork: Rahul Chakraborty / Unsplash)</em> Currently, iOS 14-compatible iPhone/iPad users can download the iOS 14.6 and iPadOS 14.6 updates for free via the OTA protocol. To update to iOS 14.6, users need to access the app <strong> Setting</strong> => <strong> General settings</strong> => <strong> Software updates</strong> .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20023</post-id>	</item>
		<item>
		<title>Here&#8217;s why iPhone users should update to iOS 14.6 right after it&#8217;s released</title>
		<link>https://en.spress.net/heres-why-iphone-users-should-update-to-ios-14-6-right-after-its-released/</link>
		
		<dc:creator><![CDATA[Hiệp Phan]]></dc:creator>
		<pubDate>Mon, 24 May 2021 22:03:17 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Beta]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Heres]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[IOS 14 5 1]]></category>
		<category><![CDATA[iOS 14 6]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPhone 11]]></category>
		<category><![CDATA[IPhone 12]]></category>
		<category><![CDATA[IPhone Xr]]></category>
		<category><![CDATA[Loss]]></category>
		<category><![CDATA[Nick Ackerman]]></category>
		<category><![CDATA[Note]]></category>
		<category><![CDATA[patch]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[YouTuber]]></category>
		<guid isPermaLink="false">https://en.spress.net/heres-why-iphone-users-should-update-to-ios-14-6-right-after-its-released/</guid>

					<description><![CDATA[The official iOS 14.6 version will be available to the community soon, Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers. On May 4, Apple released the iOS 14.5.1 update to fix a serious security issue in the iOS 14.5 update. According to Apple&#8217;s release notes, the update provides [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The official iOS 14.6 version will be available to the community soon, Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers.</strong><br />
<span id="more-17956"></span> On May 4, Apple released the iOS 14.5.1 update to fix a serious security issue in the iOS 14.5 update.</p>
<p> According to Apple&#8217;s release notes, the update provides an important security patch, which fixes two major vulnerabilities in the WebKit suite of applications that could allow hackers to penetrate users&#8217; iPhones. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/c6f2ef60fb22127c4b33.jpg" width="625" height="416"> <em> iPhone battery life and overall device performance have taken a big hit since installing iOS 14.5. (Photo: TechnoSports)</em> Apple recommends that users immediately update to iOS 14.5.1 as soon as possible. However, Apple seems to have rushed to roll out this update to fix those problems early, which leads to some new problems. Some users have reported that iPhone battery life and overall device performance have degraded significantly since installing iOS 14.5. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/e11dd6a9c9eb20b579fa.jpg" width="625" height="350"> <em> (Photo: Internet)</em> In a video posted on YouTube on May 5, YouTuber Nick Ackerman showed this problem. In a speed test between iPhone XR, iPhone 11 and iPhone 12, YouTuber Nick Ackerman found that iOS 14.5.1 reduced the performance of iPhone 12 and 11 by 60% through the test posted on YouTube. In the benchmark test using the 3DMark application, the iPhone 12 and iPhone 11 both performed worse than the iPhone XR &#8211; an iPhone model that was released in 2018. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/ca5dfecfea8d03d35a9c.jpg" width="625" height="350"> <em> (Photo: Nick Ackerman / YouTube)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/ad229bb08ff266ac3fe3.jpg" width="625" height="350"> <em> (Photo: Nick Ackerman / YouTube)</em> In the Geekbench battery life test performed by iAppleBytes, the iPhone 11 running iOS 14.5.1 gave about 5.5 hours of battery life, down from 6 hours for the iPhone 11 running iOS 14.5 in same test. This puts users between two difficult choices, because if they choose to stay in iOS 14.5, users will be at risk of being hacked into their iPhone through a security hole. Meanwhile, if updating to iOS 14.5.1, users will be forced to accept many errors that arise after updating. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_329_38941032/b7e384719033796d2022.jpg" width="625" height="625"> <em> (Photo: AR7 / Twitter)</em> Luckily iOS 14.6 will bring a fix for this performance issue. The upcoming update is currently in beta, and as of now, the iOS 14.6 beta shows that the update won&#8217;t affect the device&#8217;s battery life. The official iOS 14.6 version will be rolling out to the community soon as Apple has now made beta versions of iOS 14.7 and iPadOS 14.7 available to developers. Therefore, users should be aware of this important update in the coming days.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17956</post-id>	</item>
		<item>
		<title>How to fix slow Touch ID error on old iPhone</title>
		<link>https://en.spress.net/how-to-fix-slow-touch-id-error-on-old-iphone/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Sat, 22 May 2021 22:56:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Face ID]]></category>
		<category><![CDATA[Feedback]]></category>
		<category><![CDATA[Fix]]></category>
		<category><![CDATA[Fixes]]></category>
		<category><![CDATA[General]]></category>
		<category><![CDATA[Home]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[IOS 14 5 1]]></category>
		<category><![CDATA[iOS 14 6]]></category>
		<category><![CDATA[IPADOS]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhone X]]></category>
		<category><![CDATA[Mail]]></category>
		<category><![CDATA[Qihoo 360]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Slow]]></category>
		<category><![CDATA[Software Update]]></category>
		<category><![CDATA[Touch]]></category>
		<category><![CDATA[Touch ID]]></category>
		<category><![CDATA[unlock]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-fix-slow-touch-id-error-on-old-iphone/</guid>

					<description><![CDATA[While Face ID has become a popular authentication method, Touch ID still exists on many older iPhone models. What to do when Touch ID on iPhone is slow to respond? Starting with the iPhone X version, Apple removed the physical Home button (including Touch ID) and replaced it with Face ID (a method of unlocking [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>While Face ID has become a popular authentication method, Touch ID still exists on many older iPhone models. What to do when Touch ID on iPhone is slow to respond?</strong><br />
<span id="more-17465"></span> Starting with the iPhone X version, Apple removed the physical Home button (including Touch ID) and replaced it with Face ID (a method of unlocking the device with your face). However, there are still quite a few people who still use older iPhone models and use Touch ID (fingerprint) to unlock the device.</p>
<p> As reported by some old iPhone users (who are using iOS 14 &#8211; 14.5 versions), Touch ID has been responding quite slowly lately. Specifically, when you put your hand on the physical Home button, the device still unlocks the screen but everything will be a bit jerky, this problem usually happens for about 10 seconds, then everything will return to normal. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_331_38929621/774f60777b35926bcb24.jpg" width="625" height="391"> However, starting with iOS 14.5.1 (as well as iOS 14.6. beta), Apple has fixed the Touch ID bug, and unlocking iPhone with fingerprint will no longer be jerky. The strange thing here is that Apple let this issue happen from iOS 14 to iOS 14.5, then quietly fixed it without giving any notice. To update iOS 14.5.1, go to Settings &#8211; General &#8211; Software update &#8211; Download &#038; Install (download and install). Note, the size of the update will vary depending on the device you are using. To minimize possible risks, users should back up all data through iTunes or iCloud before performing the update. Besides, the iOS 14.5.1 update also helps to fix two serious security vulnerabilities in WebKit, affecting Safari, Mail browsers, and all web content on iOS, iPadOS, even the App Store. . Apple does not provide information on who is using the vulnerability or being targeted for an exploit. The company said the security vulnerability CVE-2021-30665 was discovered by security researchers of Qihoo 360 based in China, while the other vulnerability was found by an unknown source.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17465</post-id>	</item>
		<item>
		<title>New &#8216;Ghost&#8217; in Intel and AMD CPUs</title>
		<link>https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</link>
		
		<dc:creator><![CDATA[HOÀNG THY (Theo Thehackernews)]]></dc:creator>
		<pubDate>Sun, 16 May 2021 18:11:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[CPUs]]></category>
		<category><![CDATA[Cushion]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[Equidistant]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[ghost]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Intel CPU]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[path]]></category>
		<category><![CDATA[Processor]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[San Diego]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[SPECTER]]></category>
		<category><![CDATA[The spectre]]></category>
		<category><![CDATA[University of California]]></category>
		<guid isPermaLink="false">https://en.spress.net/new-ghost-in-intel-and-amd-cpus/</guid>

					<description><![CDATA[When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time. The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO Indeed, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When Specter (a class of critical vulnerabilities affecting modern microprocessors) was publicly disclosed in January 2018, researchers said, it wasn&#8217;t easy to fix and would haunt us for years to come. a long time.</strong><br />
<span id="more-15060"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_418_38819288/08f0b3e5ada744f91db6.jpg" width="625" height="351"> </p>
<p> <em> The security hole exists for more than 3 years, but Intel has not been able to fix it. Photo: CIO</em> Indeed, 3 years have passed, and there is still no end to the vulnerability. Meanwhile, experts from the University of Virginia and the University of California, San Diego, have discovered a new attack method that bypasses all current Specter protections built into the chip. This attack method has the potential to put almost any system &#8211; desktops, laptops, cloud servers and smartphones &#8211; once again at risk. Revealing Specter ushered in a wave of more powerful attacks, allowing malicious code to directly read passwords, encryption keys, and other valuable information from the computer&#8217;s kernel memory. Although chip manufacturers such as Intel, ARM and AMD already know this and combine defenses to reduce the threat from vulnerabilities, the methods have not yielded the desired effect. A Specter attack is capable of tricking the processor into executing instructions along a wrong path, the researchers say. Even though the processor recovers and completes its task correctly, hackers can still access confidential data while the processor goes in the wrong direction. The new attack method exploits what is called a micro-operator buffer (called micro-ops), an on-chip component that breaks machine instructions into simpler instructions and speeds up computation, like a secondary channel to reveal confidential information. Micro-op cache is built into Intel processors, manufactured since 2011. According to researchers at the University of Virginia, Intel&#8217;s defense proposal against Specter (called LFENCE) is to place sensitive code in a waiting area until security checks are done and only then the code Only sensitive is allowed to execute. However, research has shown how attackers can steal information through micro-op caching and use it as a secret channel. Although exploiting the Specter vulnerability is very difficult, the researchers say that with computers with a lot of sensitive data, hackers do not mind the difficulty. To protect the system from the new attack, the researchers propose to clear the micro-ops cache. This is a technical solution that comes at the expense of performance benefits. According to the researchers, micro-op caching has some dangerous effects. First, it ignores all caching reduction techniques such as side channels. Second, attacks in this zone go undetected like an existing attack or malware. Third, because the micro-op cache is at the front of the path, prior to execution, Intel&#8217;s Specter protections or recommendations to limit cache updates are still compromised. public.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15060</post-id>	</item>
		<item>
		<title>Beware of technology trends</title>
		<link>https://en.spress.net/beware-of-technology-trends/</link>
		
		<dc:creator><![CDATA[TẤN BA]]></dc:creator>
		<pubDate>Fri, 14 May 2021 18:05:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Remote Control]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smarthome]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Webcam]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-technology-trends/</guid>

					<description><![CDATA[Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys. Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys.</strong><br />
<span id="more-14322"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_17_38824516/32fb83389c7a75242c6b.jpg" width="625" height="408"> </p>
<p> Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the router&#8217;s firmware and always use a complex password for the wifi router. If the router manufacturer does not provide new firmware, users should consider replacing it. Just like not checking your bank account from public wifi, homeowners should avoid accessing smarthome from an open wifi network, but if you need to remotely access your home, use a private network. Using a separate wifi for smart home systems is necessary because sharing a wifi system has many potential safety risks. Smarthome prioritizes the system to be able to self-alert to abnormal intrusion to ensure safety, so users should use devices with automatic alarm setting feature. When there is an unusual intrusion, a notification will be sent to the homeowner&#8217;s phone immediately. In smarthome, not only home lock, smart home control applications need abnormal login warning feature, this helps homeowners recognize the risk of network attack to implement instant protection options. then. In a smart home, if there is a smart speaker with a screen or camera, users should consider turning off or covering the camera when there is no need to use it. This is similar to the fact that many people have a habit of covering the webcam on their laptop to avoid unfortunate images being recorded. Smart devices of unknown origin are at risk of being installed with spyware, which is easy to lose control and have data stolen. To be safe, it is recommended to use equipment from reputable companies, need to check the company history, product support period. From this information, a decision can be made whether to buy the product or not. And more specifically, it is very important to check the owner of the servers that will contain his home&#8217;s information because most smarthome devices used in the home communicate with servers in the cloud. In the process of studying the operation of the smart home control system, security experts have discovered serious security holes. Security flaws in the cloud infrastructure and remote code execution, causing a third party to acquire the &#8220;super user&#8221; right to access and control the smart home system. Immediately, the above findings were shared with smart home providers to immediately address these dangerous security holes. With a smart home, each device inserted into the smarthome can also be a point for network attackers to take advantage of, intrude on the home system &#8230;, so smart home security is very necessary for those who want Design your own smart home.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14322</post-id>	</item>
		<item>
		<title>IOS users should immediately turn off AirDrop</title>
		<link>https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</link>
		
		<dc:creator><![CDATA[Nguyễn Hiếu]]></dc:creator>
		<pubDate>Thu, 06 May 2021 07:45:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Hashing]]></category>
		<category><![CDATA[Ignored]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[MASHABLE]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[USB C]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/ios-users-should-immediately-turn-off-airdrop/</guid>

					<description><![CDATA[User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch. According to the Mashable The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>User&#8217;s phone number and email may be exposed because of security flaws in AirDrop. You should only turn it on when you need to transfer files and off by default to wait for the patch.</strong><br />
<span id="more-11904"></span> According to the <em> Mashable</em> The Mobile Network Security Laboratory (SEEMOO) and the Crypto and Privacy Engineering Group (ENCRYPTO), at the Technical University of Darmstadt, have warned Apple about this dangerous vulnerability since May. 2019 but the company still ignored it. About 1.5 billion devices are still unpatched.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/6f599621b063593d0072.jpg" width="625" height="351"> <em> Hackers can obtain sensitive user&#8217;s information through the vulnerability in AirDrop. Photo: TU Darmstadt. </em> &#8220;An attacker could obtain a user&#8217;s phone number and email through AirDrop,&#8221; the team said. &#8220;They just need to use a device with Wi-Fi capable, reach the target at close range to start the mining process by opening the sharing feature on iOS or macOS device.&#8221; According to the <em> 9to5mac</em> There are two steps in the mechanism of AirDrop action leading to this critical vulnerability. First, in order to provide users with the option &#8220;Contacts Only&#8221; in the AirDrop sharing feature, Apple devices silently collect information on devices within the connection range. To see if the &#8220;other party&#8221; is in the contacts list, AirDrop uses a mutual authentication mechanism, comparing the user&#8217;s phone number and email address with the entries in the address book. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622802/07bce1c4c7862ed87797.jpg" width="625" height="351"> <em> The device authentication step in the directory can be exploited to get information. Photo: Monica Chin. </em> In the next step, data is exchanged for both parties. Despite encryption, Apple uses a relatively weak hashing mechanism. Security experts can decompile the hash using a simple technique like a brute-force attack. The team addressed the AirDrop vulnerability with a more secure approach, they named PrivateDrop. However, Apple did not move after being warned of the risk of personal information leaks and privacy breaches. In the immediate future, experts from the Technical University of Darmstadt advise users to protect themselves by disabling AirDrop discovery in the system settings and not opening the share menu. The detailed results of the study will be presented at the USENIX security Symposium taking place in August. <em> <strong> Why does iPhone not have USB-C port?</strong> </em> <em> In the past 5 years, USB-C has become the suitable connector for a wide variety of devices such as Android phones, laptops and tablets. However, Apple still doesn&#8217;t make iPhones with USB-C ports.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11904</post-id>	</item>
		<item>
		<title>Risk of leaking private images from poor quality camera equipment</title>
		<link>https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</link>
		
		<dc:creator><![CDATA[Vân Anh]]></dc:creator>
		<pubDate>Fri, 30 Apr 2021 16:08:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[Camera]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Drop]]></category>
		<category><![CDATA[Equipment]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Ha Toan]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[images]]></category>
		<category><![CDATA[Leaking]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[NCSC]]></category>
		<category><![CDATA[ONVIF]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[poor]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[quality]]></category>
		<category><![CDATA[Rao]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Safety information]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Viettel Cyber Security]]></category>
		<category><![CDATA[VSEC]]></category>
		<guid isPermaLink="false">https://en.spress.net/risk-of-leaking-private-images-from-poor-quality-camera-equipment/</guid>

					<description><![CDATA[In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private. Information and data from personal cameras become targets of hackers Recently, on social networks, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In addition to the reason of users&#8217; limited awareness of information security, the use of poor quality cameras, and the existence of security holes are also the reasons why many people are exposed, leaked, or even sold their own images. private.</strong><br />
<span id="more-10620"></span> <strong> Information and data from personal cameras become targets of hackers</strong> </p>
<p> Recently, on social networks, there has been a situation of buying and selling clips from camera accounts stolen by bad objects. Depending on the quality of the content, the associations that sell the 18+ clip will collect a fee from 100,000 to 250,000 VND per joining. Not only providing depraved content, some groups also share hacked camera access accounts for a package fee of about 3-4 million VND. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_107_38635585/fb80f843df01365f6f10.jpg" width="625" height="368"> The fact that cameras are installed everywhere, the number of cameras is constantly increasing, making data from the camera a source of information targeted by many objects. (Artwork: Internet) According to experts of the National Cyber ​​Security Monitoring Center (NCSC), the Information Security Department, the Ministry of Information and Communications, the sale of account information on social networks is not a new behavior, but it has exported. appeared long ago. However, in the past, normally subjects only sold bank accounts, social networks or accounts containing information such as email, phone number, identity card number &#8230; Nowadays, when cameras are installed everywhere, the number is constantly increasing, being a source of information targeted by many audiences, the camera account also becomes &#8220;hot goods&#8221; on the account trading pages. “This form of purchase is becoming more popular because the number of cameras is increasing. Victims who lost their camera account can be monitored by others through their own camera, ”said the NCSC representative. <strong> Many users accidentally revealed the camera system login information</strong> According to experts, there are many reasons for the widespread purchase and sale of clips and camera accounts on the network, in part due to regulations and sanctions against acts of buying, selling and distributing personal data. not enough deterrent. Commenting on the reason that the personal camera system is vulnerable to hacker attacks, both subjectively and objectively, NCSC&#8217;s representative said: “Subjective is because users accidentally reveal account login information. camera. And objectively, because users use poor quality camera equipment, do not ensure enough information security, leading to the device can be hacked by hackers, thereby getting the login account &#8220;. Having the same opinion with the representative of NCSC, a security expert for IoT devices at Viettel Cyber ​​Security, Ha Toan, emphasized: A fundamental reason that makes personal and household cameras easy. Hacker attacks are due to the user&#8217;s limited knowledge of using IoT devices or cameras. For example, do not change the default password of the device when it is put into use. According to Toan, another reason is that the camera device of the manufacturer does not have a protection mechanism such as verifying the integrity of the firmware running on the camera device, allowing hackers to buy camera equipment and insert backdoors. (back door &#8211; PV) and then sold to the market. &#8220;During the work, we also discovered many backdoors allowing remote access in cameras originating in China&#8221;, Viettel Cyber ​​Security expert added. Along with that, there are cameras that have vulnerabilities in firmware due to programming errors such as buffer overflow, hardcode login information, logic errors &#8230; allowing hackers to exploit to take control of the device. Camera account information can also be revealed because the installation staff deliberately fails to notify the password change during installation or notice the change but does not notice the change of the entire service as mentioned above also includes services RTSP, onVIF. <strong> Raise awareness of personal information protection, choose a reputable camera</strong> To overcome the widespread situation of buying and selling clips, camera accounts in particular as well as personal information and data, experts say that the Decree on personal data protection should be issued soon and come to life. This draft Decree has regulated heavy fines for violations of personal data protection regulations. &#8220;The more penalties for handling violations related to the purchase and sale of personal data will help increase deterrence and reduce the rate of violation&#8221;, expert of Vietnam Cyber ​​Security Joint Stock Company (VSEC) Vuong Trong Nhan stated his point of view. But experts also emphasized the limitation in the sense of protecting personal data of users as well as the organization providing services related to user data. Making recommendations to users, VSEC experts advise them to first increase their sense of self-protection by not using the camera manufacturer&#8217;s default password, setting a strong password and setting a Private network system is only for indoor security equipment, instead of sharing the same Wi-Fi network. According to representatives of NCSC, individuals and businesses when using cameras need to have strict regulations and decentralization when allowing users to access their camera systems, need to change passwords regularly to avoid in case the login information is known by many people, the risk of leaking is also higher. Emphasizing on the safety factor of the device, experts say that choosing to buy cameras manufactured from major brands, products that have been assessed for information security as well as choose a reputable installation unit. is an effective solution to help users avoid the risk of information insecurity. On the other hand, is it time for camera manufacturers to pay more attention to whether their equipment meets information security requirements?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10620</post-id>	</item>
	</channel>
</rss>