<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Security &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Tue, 22 Jun 2021 00:10:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Two weeks after Zhengjuhu was investigated, the former &#8220;deputy&#8221; followed him and was a leader of the Public Security Bureau for many years.</title>
		<link>https://en.spress.net/two-weeks-after-zhengjuhu-was-investigated-the-former-deputy-followed-him-and-was-a-leader-of-the-public-security-bureau-for-many-years/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 22 Jun 2021 00:10:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Bureau]]></category>
		<category><![CDATA[Deputy]]></category>
		<category><![CDATA[investigated]]></category>
		<category><![CDATA[Leader]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[weeks]]></category>
		<category><![CDATA[Years]]></category>
		<category><![CDATA[Zhengjuhu]]></category>
		<guid isPermaLink="false">https://en.spress.net/two-weeks-after-zhengjuhu-was-investigated-the-former-deputy-followed-him-and-was-a-leader-of-the-public-security-bureau-for-many-years/</guid>

					<description><![CDATA[On June 15th, according to the Heilongjiang Provincial Commission for Discipline Inspection, He Jianmin, deputy secretary of the Heilongjiang Provincial Party Committee&#8217;s Political and Legal Committee and a first-level inspector, is suspected of serious violations of discipline and law, and is currently undergoing disciplinary review and supervision and investigation. He Jianmin, 58 years old this [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On June 15th, according to the Heilongjiang Provincial Commission for Discipline Inspection, He Jianmin, deputy secretary of the Heilongjiang Provincial Party Committee&#8217;s Political and Legal Committee and a first-level inspector, is suspected of serious violations of discipline and law, and is currently undergoing disciplinary review and supervision and investigation.</strong></p>
<p><span id="more-26475"></span> He Jianmin, 58 years old this year, had served as the deputy captain and captain of the traffic police corps of the Heilongjiang Provincial Public Security Department, and the deputy director of the Provincial Public Security Department. He began to serve as the deputy secretary of the Heilongjiang Provincial Party Committee Political and Legal Committee in November 2018 and has been dismissed so far.</p>
<p>Two weeks ago, his former boss, Gan Rongkun, who was a member of the Standing Committee of the Heilongjiang Provincial Party Committee and Secretary of the Political and Legal Committee, fell from his post as a member of the Standing Committee of the Henan Provincial Party Committee and the Secretary of the Political and Legal Committee.</p>
<p><img fifu-featured="1" decoding="async" src="https://p2.itc.cn/q_70/images03/20210615/e9edb118fa844685b91a37a475457d18.jpeg"></p>
<p>He Jianmin.Data map</p>
<p><strong> Served in a leading position in the Provincial Public Security Department for 17 years </strong></p>
<p>He Jianmin, born in November 1963 in Bei&#8217;an, Heilongjiang, joined the workforce in August 1984 and joined the Communist Party of China in December 1986. He graduated from Heilongjiang Provincial Party School with a major in economics and management and has a postgraduate degree.</p>
<p>In August 1984, after graduating from the Heilongjiang Provincial People&#8217;s Police School with a major in public security, He Jianmin joined the No. 5 Department of the Provincial Public Security Department and worked as a scout for 6 years.</p>
<p>In August 1990, He Jianmin was transferred to the Political Research Office of the Provincial Party Committee, where he worked for 9 years, from a general researcher to the deputy director of the Office of the Political Research Office.</p>
<p>In October 1999, He Jianmin was transferred to the Provincial Commission for Discipline Inspection, deputy division-level inspector, and one year later he was promoted to Deputy Director of the General Office of the Provincial Commission for Discipline Inspection.</p>
<p>In December 2001, He Jianmin entered the Heilongjiang Provincial Public Security Department as a member of the Party Committee and Deputy Captain of the Traffic Police Corps. Nearly 9 years later, he was promoted to a member of the Provincial Public Security Department’s Party Committee, Secretary of the Party Committee and Captain of the Traffic Police Corps. After serving as the head of the Traffic Police Corps for 6 years, in October 2016, He Jianmin was promoted to member of the Party Committee and Deputy Director of the Provincial Public Security Department.</p>
<p>In November 2018, He Jianmin was transferred to the deputy secretary of the Political and Legal Committee of the Heilongjiang Provincial Party Committee, and he was promoted to the department level until his sack.</p>
<p>Two months ago, on April 13 and 14 this year, He Jianmin went to Daqing for investigation as the deputy secretary of the Provincial Party Committee Political and Legal Committee, the deputy director of the Provincial Political and Legal Team Education Rectification Leading Group Office, and the leader of the second research team. The research team came successively. The Daqing City Education Reorganization Office, the High-tech District Court, the Sartu District Procuratorate, the Municipal Justice Bureau and the Municipal Public Security Bureau understand the development of the education and rectification of the Daqing Municipal Law Team. He Jianmin pointed out that we must use the most resolute attitude, strict discipline, and the most powerful measures to advance the education and rectification work in a precise and targeted manner, and resolutely fight to win this sword inward and upright discipline. Tackling tough battles provides a strong guarantee for faithfully fulfilling the mission and tasks of the new era.</p>
<p> <img decoding="async" src="https://p7.itc.cn/q_70/images03/20210615/63981c4812e34511956f76ac6dce5c32.jpeg"></p>
<p>Gan Rongkun.Data map</p>
<p><strong> The original boss went down two weeks ago</strong></p>
<p>Two weeks ago, He Jianmin&#8217;s former boss, Gan Rongkun, who was a member of the Standing Committee of the Heilongjiang Provincial Party Committee and Secretary of the Political and Legal Committee, fell from the horse.</p>
<p>In July 2016, Gan Rongkun served as a member of the Standing Committee of the Heilongjiang Provincial Party Committee across the province, and in November of the same year as the Secretary of the Provincial Political and Legal Committee. At that time, He Jianmin had just been appointed as a member of the Party Committee and Deputy Director of the Provincial Public Security Department. Two years later, He Jianmin was promoted to the deputy secretary of the Political and Legal Committee of the Provincial Party Committee and became Gan Rongkun&#8217;s deputy.</p>
<p>During this period, a &#8220;sweeping black storm&#8221; broke out in Hulan District under the jurisdiction of Harbin City.</p>
<p>China Discipline Inspection and Supervision magazine mentioned that Hulan District has been in the “eye of the storm” since the 14th Central Anti-criminal and Evil Supervision Team entered Heilongjiang Province on June 5, 2019. In less than a month, Zhu Hui, the former secretary of the Hulan District Party Committee, Yu Chuanyong, the former mayor of the district government, and Sun Shaowen, the former chairman of the District Political Consultative Conference, have been dismissed successively.</p>
<p>In July 2019, Ren Ruichen, member of the Standing Committee of the Harbin Municipal Party Committee and Secretary of the Political and Legal Committee, was investigated on suspicion of serious violations of discipline and law. Two months later, in September 2019, Gan Rongkun left Heilongjiang and was transferred to the Standing Committee of the Henan Provincial Party Committee and Secretary of the Political and Legal Committee. Having served in Henan for less than two years, Gan Rongkun was dismissed from office on June 1 this year.</p>
<p>On the evening of June 2, according to the website of the State Supervision Commission of the Central Commission for Discipline Inspection, Gao Weili, the former first-level inspector of the Heilongjiang Provincial Commission for Discipline Inspection and the former inspector general of the Jiamusi City People’s Procuratorate, took the initiative to submit the case and is currently undergoing disciplinary review and supervision and investigation. . According to Caijing, Gao Weili may be investigated for his involvement in the Gan Rongkun case.</p>
<p>Now that He Jianmin is under investigation, whether he is involved in the Gan Rongkun case is awaiting review and investigation.</p>
<p>Resume of He Jianmin</p>
<p>He Jianmin, male, Han nationality, was born in November 1963 in Bei&#8217;an, Heilongjiang. He started working in August 1984 and joined the Communist Party of China in December 1986. He graduated from the Party School of Heilongjiang Provincial Party Committee with a major in economics and management and has a postgraduate degree.</p>
<p>1982.10—1984.08 Public security major at Provincial People’s Police School</p>
<p>1984.08—1990.08 Scout from the 5th Division of the Provincial Public Security Department (during the period: 1987.03—1990.07 Chinese major at the Chinese People’s Police University, on-the-job college study)</p>
<p>1990.08-1991.12 Researcher of the Political Group of the Political Research Office of the Provincial Party Committee</p>
<p>1991.12—1994.03 Deputy Section-level Researcher of the Political Group of the Political Research Office of the Provincial Party Committee</p>
<p>1994.03-1996.04 Full-time researcher of the Comprehensive Group of the Political Research Office of the Provincial Party Committee</p>
<p>1996.04-1999.10 Deputy Director of the Office of the Political Research Office of the Provincial Party Committee (1994.04-1996.12 Heilongjiang Provincial Party School Economic Management major in-service graduate study)</p>
<p>1999.10-2000.11 Provincial Commission for Discipline Inspection Deputy Division Level Inspection Supervisor</p>
<p>2000.11—2001.12 Deputy Director of the General Office of the Provincial Commission for Discipline Inspection</p>
<p>2001.12—2010.06 Member of the Party Committee and Deputy Captain of the Traffic Police Corps of the Provincial Public Security Department</p>
<p>2010.06-2016.10 Member of the Party Committee of the Provincial Public Security Department, Secretary of the Party Committee and Captain of the Traffic Police Corps</p>
<p>2016.10-2018.11 Member of the Party Committee and Deputy Director of the Provincial Public Security Department</p>
<p>2018.11—2019.06 Deputy Secretary of the Political and Legal Committee of the Provincial Party Committee (Department-level)</p>
<p>2019.06 to the present, Deputy Secretary of the Political and Legal Committee of the Provincial Party Committee and First-level Inspector</p>
<p>Text: Liang Jianzhong</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26475</post-id>	</item>
		<item>
		<title>Digital consumer protection Security gaps in health apps In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</title>
		<link>https://en.spress.net/digital-consumer-protection-security-gaps-in-health-apps-in-the-corona-pandemic-health-apps-have-gained-many-users-for-some-however-there-is-a-lack-of-data-protection-this-was-the-result-of-a-stu/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 21 Jun 2021 16:35:10 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[As the]]></category>
		<category><![CDATA[BSI]]></category>
		<category><![CDATA[Consumer]]></category>
		<category><![CDATA[Corona]]></category>
		<category><![CDATA[Corona pandemic]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Federal]]></category>
		<category><![CDATA[gained]]></category>
		<category><![CDATA[gaps]]></category>
		<category><![CDATA[German]]></category>
		<category><![CDATA[Germany]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[lack]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[result]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Study]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/?p=26336</guid>

					<description><![CDATA[Digital consumer protection Vulnerabilities in health apps As of: 16.06.2021 1:53 p.m. In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security. The Federal Office for Information Security (BSI) found numerous [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="ts-image" src="https://www.tagesschau.de/multimedia/bilder/smartphone-137https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" srcset="https://www.tagesschau.de/https://www.tagesschau.de/~_v-videowebm.jpg" alt="Man holds smartphone in his hands | AP" title="Man holds smartphone in his hands | AP"></p>
<h1> Digital consumer protection Vulnerabilities in health apps </h1>
<p>As of: 16.06.2021 1:53 p.m. </p>
<p> <strong> In the corona pandemic, health apps have gained many users. For some, however, there is a lack of data protection. This was the result of a study by the Federal Office for Information Security.</strong> The Federal Office for Information Security (BSI) found numerous security gaps in an investigation of health apps. According to a BSI report, six out of seven thoroughly tested apps transmitted passwords in clear text to authentication services. None of the apps fully met the security requirements of the BSI guidelines for health apps. The BSI did not provide the names of the apps examined.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAxXGMQ7DIAwAwL-wg5s1b_HiUiu2QijCJgxV_p5mOOl-YYQ1iHuzFQFhzpmcNjbLQiN9GEHryea6keuJ8O6xcxbufwimT4XVrQzOO8fCvVJrkap_a1xeSxI_SrhuBAjeLGkAAAA." target="_blank" rel="nofollow noopener"> <img fifu-featured="1" decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/lernapp-anton-101~_v-klein1x1.jpg" alt="" title=""Anton" is displayed on a tablet. ' title = 'The start screen of the learning app "Anton" is displayed on a tablet. '> <strong> Exclusive</strong> 03/10/2021</p>
<p>Learning app &#8220;Anton&#8221; Massive security breach with school app Outsiders could have read out data or pretended to be teachers.</p>
<p></a></p>
<h2> Personal data is not adequately protected</h2>
<p>&#8220;From the point of view of technical IT security, this result must at least be rated as critical, especially in view of the fact that a significant proportion of the apps process sensitive and particularly sensitive data&#8221;, criticized the office for taking care of the data security of the federal government. &#8220;Because, according to the findings of the study, this does not adequately protect user data against attacks.&#8221; The BSI checked the health apps as part of the first report on digital consumer protection 2020, which, due to the corona pandemic, focused on digital health offers.</p>
<p><a   class="teaser-absatz__link" href="https://en.spress.net/wp-content/plugins/wp-optimize-by-xtraffic/redirect/?gzv=H4sIAAAAAAACAw3KMQ6AIAwAwL-wQ2X1LV0aaQoJVgNFEo1_15vvccOtLpudfUVAmHMGI-Het0wjJEYoWkkTQipSjCr7i1s_mgwV_0e22-eixk3a0OTjEkO2vbr3A6XQ2a1cAAAA" target="_blank" rel="nofollow noopener"> <img decoding="async" class="ts-image js-image" src="https://www.tagesschau.de/multimedia/bilder/vivy-app-101~_v-klein1x1.jpg" alt="Vivy health app on smartphone | dpa" title="Vivy health app on smartphone | dpa"> <strong> background</strong> 07/11/2019</p>
<p>Digital Supply Act What changes for patients The Bundestag passed Minister Spahn&#8217;s Digital Supply Act.</p>
<p></a></p>
<h2> damage &#8220;first of all manageable&#8221;</h2>
<p>The BSI expert Nicolas Stöcker described the danger for users of the criticized apps when exploiting the identified loopholes as &#8220;first of all manageable&#8221;. If an attack took place, it would initially only affect a single person. &#8220;It would be worse if the backend, where the data is kept, were also insecure.&#8221; The authority has a corresponding further investigation for the future &#8220;on the screen&#8221;, says Stocker. However, BSI President Arne Schönbohm warned that the deficiencies found were also dangerous: &#8220;Every gap that is there, every weak point that is there has somehow been exploited at some point.&#8221; They are currently working with the app providers to close the gaps. &#8220;If we see that this is not fixed, then we reserve the right to issue a corresponding product warning&#8221;said Schönbohm.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">26336</post-id>	</item>
		<item>
		<title>Li Zhiying’s case of endangering national security is detained until July 27</title>
		<link>https://en.spress.net/li-zhiyings-case-of-endangering-national-security-is-detained-until-july-27/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 18:21:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[detained]]></category>
		<category><![CDATA[endangering]]></category>
		<category><![CDATA[July]]></category>
		<category><![CDATA[National]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Zhiyings]]></category>
		<guid isPermaLink="false">https://en.spress.net/li-zhiyings-case-of-endangering-national-security-is-detained-until-july-27/</guid>

					<description><![CDATA[According to Hong Kong Ta Kung Pao’s news on June 15, Li Zhiying, the founder of Hong Kong One Media, who was previously sentenced to 20 months in prison for multiple illegal assembly cases and is currently serving his sentence in Stanley Prison, has been suspected of opposing Hong Kong’s national security law in another [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>According to Hong Kong Ta Kung Pao’s news on June 15, Li Zhiying, the founder of Hong Kong One Media, who was previously sentenced to 20 months in prison for multiple illegal assembly cases and is currently serving his sentence in Stanley Prison, has been suspected of opposing Hong Kong’s national security law in another case. On the afternoon of the 15th, he was escorted by a prison vehicle to the court to appear in court.The case was handled by the judge designated by the National Security Law and Chief Magistrate Su Huide, and then<strong> Su Huide decided to adjourn the case to July 27</strong> <strong> , In order to carry out the procedures of delivery to the High Court.</strong> At the same time, Li Zhiying did not apply for bail and continued to be in prison during the waiting period.</p>
<p><img decoding="async" src="https://p0.itc.cn/q_70/images03/20210615/aa1e34f82fa24784bcbdaa2d665df1bf.jpeg" width="530"></p>
<p>Data map of Li Zhiying being detained in a prison car</p>
<p>Li Zhiying was charged with three counts in this case.Among them, charged with<strong> Collusion with foreign countries or foreign forces to endanger national security</strong> , Means that it requests foreign or overseas institutions, organizations, and personnel to impose sanctions, blockades or other hostile acts against the People’s Republic of China or the Hong Kong Special Administrative Region during the period from July 1 to December 1, 2020.</p>
<p>Accused<strong> Crime of conspiring to collude with foreign countries or foreign forces to endanger national security</strong> According to Li Zhiying, between July 1, 2020 and February 15, 2021, in Hong Kong, he conspired with Chen Zihua, Mark Herman Simon, Li Yuxuan, Liu Zudi and others to request foreign or overseas institutions, organizations, and personnel to implement Sanctions and blockades of Hong Kong Special Administrative Region or Mainland China.</p>
<p>And charged<strong> The crime of conspiracy to commit one or a series of acts that tend to obstruct justice</strong> It is alleged that Li Zhiying conspired with Li Yuxuan, Chen Zihua and others in Hong Kong between July 2020 and August 23, 2020 with intent to obstruct justice, that is, assisted him to leave Hong Kong after Li Yuxuan was arrested. Prior to this, the case of Li and Chen will be handed over to the High Court for trial, and Su Huide has decided to adjourn the case again, and the case will be retrial on July 7.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25978</post-id>	</item>
		<item>
		<title>Vietnamese people can use Mobile ID mobile authentication</title>
		<link>https://en.spress.net/vietnamese-people-can-use-mobile-id-mobile-authentication/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 20 Jun 2021 00:31:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accuracy]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Delegate]]></category>
		<category><![CDATA[Facebook Messenger]]></category>
		<category><![CDATA[GBG]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Method]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[NIST]]></category>
		<category><![CDATA[Online Trading]]></category>
		<category><![CDATA[OTT]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[SMS OTP]]></category>
		<category><![CDATA[subscribers]]></category>
		<category><![CDATA[VIBER]]></category>
		<category><![CDATA[Vietnam Mobile]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<category><![CDATA[Vietnamese people]]></category>
		<guid isPermaLink="false">https://en.spress.net/vietnamese-people-can-use-mobile-id-mobile-authentication/</guid>

					<description><![CDATA[Mobile ID (Mobile ID) can eliminate the potential risks of legacy authentication methods. Mobile ID solution of Vietnammobile Vietnamobile and IPification have just announced the launch of Mobile ID service in Vietnam – The ultimate authentication solution for smartphone transactions for Vietnamobile subscribers. Instead of traditional authentication steps that still contain many risks such as [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Mobile ID (Mobile ID) can eliminate the potential risks of legacy authentication methods.</strong><br />
<span id="more-25698"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_107_39183421/69d6afa5a0e749b910f6.jpg" width="625" height="355"> </p>
<p> Mobile ID solution of Vietnammobile Vietnamobile and IPification have just announced the launch of Mobile ID service in Vietnam – The ultimate authentication solution for smartphone transactions for Vietnamobile subscribers. Instead of traditional authentication steps that still contain many risks such as providing phone numbers and SMS OTP authentication, users only need to authorize Vietnamobile to authenticate the device&#8217;s ID; Transactions on mobile phones will be automatically verified and secured by Vietnamobile. According to information, the service will soon be integrated for Vietnamobile users. According to the US National Institute of Standards and Technology (NIST), SMS authentication is not secure enough. Hackers can hack to transfer SMS messages to phone numbers that do not belong to the owner. These tricks are so sophisticated that you won&#8217;t even know your messages have been stolen. NIST also warns that phone numbers registered on applications such as Facebook Messenger, Viber are likely to be hacked and reveal the verification code on SMS. An alternative solution is to use 2-layer security or use a security code from a token device. However, this method is quite complicated and causes interruptions in transactions, so most users find it very annoying. The Mobile ID service uses the technology of IPification. This is predicted to be the foundation for mobile authentication now and in the future. Mobile ID enables the authentication of compatible mobile users by verifying the device, SIM and phone number via IP address, intended to prevent fraud in mobile registration and transaction approval. Mobile ID service requires no additional settings, no need to enter a password, and does not require any action from the user. A representative of Vietnamobile said, “The number of Vietnamobile subscribers for online transactions has grown rapidly. In light of this trend, we look forward to providing our subscribers with a safe and convenient online trading platform.” Vietnamobile&#8217;s Mobile ID security solution was born to meet the mobile reality when all online activities and transactions of customers are done on smartphones. &#8220;We want our customers to be able to enjoy the best solution in terms of security, identity authentication, payment, login,&#8221; he said. Mr. Stefan Kostic, CEO of IPification shared. “As the number of online user activities globally is skyrocketing, we will provide the most secure, yet seamless authentication and transaction validation solution for Vietnamobile users.” MobiIPification Pification solution is trusted by leading telecommunications, technology, payment and OTT companies such as Microsoft, GBG, DataZoo, 3HongKong, Axiata Digital. Currently, IPification&#8217;s solution has reached more than 550 million devices in 18 markets globally. PV</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25698</post-id>	</item>
		<item>
		<title>The Ministry of Public Security is investigating the attack group VOV</title>
		<link>https://en.spress.net/the-ministry-of-public-security-is-investigating-the-attack-group-vov/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 17:00:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[cms]]></category>
		<category><![CDATA[Conduct investigations]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[Cursing]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Google maps]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[High technology]]></category>
		<category><![CDATA[insults]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[Major]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Phuong Hang]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Vietnames Broadcast]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV TV Channel]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV1]]></category>
		<category><![CDATA[VOV2]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-ministry-of-public-security-is-investigating-the-attack-group-vov/</guid>

					<description><![CDATA[The Department of Cybersecurity and High-Tech Crime Prevention and Control (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers who attacked VOV electronic newspaper. In the past few days, all social networking platforms of VOV Electronic Newspaper on Google and Facebook have been spammed, threatened, insulted, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Department of Cybersecurity and High-Tech Crime Prevention and Control (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers who attacked VOV electronic newspaper.</strong><br />
<span id="more-25580"></span> In the past few days, all social networking platforms of VOV Electronic Newspaper on Google and Facebook have been spammed, threatened, insulted, called for boycott, etc. The subjects used many different accounts to comment. malice, cursing, rating VOV 1* (1 star) on Google Map.</p>
<p> After that, other fanpages of VOV1, VOV2, VOV TV channel… also received hundreds of similar comments consecutively. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_114_39182547/2041423f4d7da423fd6c.jpg" width="625" height="351"> <em> Subjects used many different accounts to &#8220;review&#8221; on Google Maps to reduce the reputation of Radio Voice of Vietnam. Photo: VOV</em> According to VOV, the reporters who made this series of articles were also subjected to a series of strange nicks sending abusive, insulting and threatening messages. Not stopping there, the target group also searched for the phone number and social network of the VOV.VN reporter&#8217;s wife or husband to terrorize them in the form of messages. On the morning of June 13, on a fanpage called &#8220;Steel Fan Sister Hang&#8221; posted the entire so-called &#8220;how&#8221; to hack the content management software (CMS) of VOV Electronic Newspaper. “From the morning of June 13, accessing the VOV.VN address was very difficult and intermittent. At 13:00 on the same day, VOV&#8217;s electronic newspaper was hacked, making it impossible for readers to access it for many hours after that,&#8221; VOV said. VOV Electronic Newspaper has also contacted functional units of the Ministry of Public Security and the Ministry of Information and Communications to coordinate in solving and handling the violations of extremists when deliberately attacking the technical platforms of a company. national media. Previously, on June 12, 2021, VOV Electronic Newspaper published articles: &#8220;I can&#8217;t give myself the right to insult anyone online&#8221; and &#8220;Mrs Phuong Hang with deviant livestreams: It&#8217;s time to take action. strict reason&#8221; Talking to the press, the Department of Cybersecurity and High-Tech Crime Prevention (A05) &#8211; Ministry of Public Security said that professional units are investigating and clarifying the group of attackers. VOV electronics. The Department of Cybersecurity and High-Tech Crime Prevention (A05) said that it had previously received a dispatch from VOV and understood this issue. Currently, professional units are investigating and clarifying. A05 affirmed that this is the responsibility of the unit and investigated and clarified this issue.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25580</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on Voice of Vietnam Online Newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</link>
		
		<dc:creator><![CDATA[Ninh Cơ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 12:27:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Negativity]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Voice]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV VN Electronic Newspaper]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</guid>

					<description><![CDATA[To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. . On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief Online newspaper Voice of Vietnam [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. .</strong><br />
<span id="more-25501"></span> On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief <strong> Online newspaper Voice of Vietnam</strong> (<strong> Vov</strong> .vn), said it had sent an official letter requesting the Ministry of Public Security to investigate and clarify cyber attacks against the Vov.vn website and its social networking platform.</p>
<p> At noon on the same day, discuss with Newspaper <em> Workers,</em> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (A05 &#8211; Ministry of Public Security) said that the unit has received an official dispatch from the Voice of Vietnam Electronic Newspaper. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_15_39179349/2c801c011343fa1da352.jpg" width="625" height="416"> <em> Website VOV Newspaper is not accessible at the time &#8211; Photo: Screenshot</em> Like Newspaper <em> Laborer </em> It was reported that from the evening of June 12, the access to Vov.vn electronic newspaper had difficulties, the transmission line was slow. By 12 o&#8217;clock on June 13, readers could not access the Vov.vn link at all. According to the technical department of the Voice of Vietnam Electronic Newspaper, this is the result of a denial of service (DDoS) attack that overflows the bandwidth, making access to the newspaper crippled. At the same time, the fanpage of this newspaper also received tens of thousands of negative and offensive comments. The agency has been in contact with Google and Facebook to handle the related issues. A representative of the Voice of Vietnam Electronic Newspaper also said that the attack on the newspaper affected the operation of the editorial office, affecting readers&#8217; access to information. The Voice of Vietnam has sent a dispatch to the relevant authorities to request a settlement, in which it is requested that the Ministry of Public Security search for the perpetrators of the online newspaper attack. Online newspaper Voice of Vietnam (Vov.vn) has had many technical solutions to fix the problem and access normally from the evening of June 13.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25501</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on VOV online newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Lam]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 03:49:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Overload]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Rescue]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[VNCERT]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</guid>

					<description><![CDATA[Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate. On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate.</strong><br />
<span id="more-25338"></span> On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry of Public Security to investigate and clarify cyber attacks targeting the VOV website and the platform. the agency&#8217;s social media platform.</p>
<p> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) also confirmed that he had received an official letter from VOV. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. In addition, the Cyber ​​Emergency Response Center (VNCERT) and network operators also participate in supporting and solving problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39178611/9961ece8e3aa0af453bb.jpg" width="625" height="416"> <em> At the time of the cyber attack, readers could not access the website of VOV newspaper. Photo: VOV.</em> Exchange with <em> Zing</em> , a representative of VOV&#8217;s technical department said that cyberattacks on the agency&#8217;s resource system began on June 12. At about 13:00 on June 13, the bandwidth system was overloaded, suspected of being attacked by a denial of service (DDoS). On the morning of June 14, the administrator continued to record a new attack that caused the bandwidth of the system and the website to be overloaded. This is the first time this newspaper has been attacked by DDoS. In addition to the above attacks, the VOV side also believes that the person behind the attacks also discredits the stars of the VOV electronic newspaper on Google or repeatedly makes offensive and threatening comments on the newspaper&#8217;s fanpage. The VOV side is reviewing and detecting malicious code in the system, and at the same time limiting the consequences of cyberattacks, calculating damage to coordinate with authorities to solve.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25338</post-id>	</item>
		<item>
		<title>Chrome OS cycle shortened to once every 4 weeks</title>
		<link>https://en.spress.net/chrome-os-cycle-shortened-to-once-every-4-weeks/</link>
		
		<dc:creator><![CDATA[Thanh Thư]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 02:59:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Adjusted]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Chrome OS]]></category>
		<category><![CDATA[Chromium]]></category>
		<category><![CDATA[cycle]]></category>
		<category><![CDATA[Decade]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Improve]]></category>
		<category><![CDATA[M95]]></category>
		<category><![CDATA[Milestones]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[schedule]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Shorten]]></category>
		<category><![CDATA[Shorten the time]]></category>
		<category><![CDATA[shortened]]></category>
		<category><![CDATA[Skip]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[weeks]]></category>
		<guid isPermaLink="false">https://en.spress.net/chrome-os-cycle-shortened-to-once-every-4-weeks/</guid>

					<description><![CDATA[Google is gradually adjusting the release schedule of new updates for ChromeOS, with a 4-week cycle and will start with the latest version of Chrome 94 later this year. The new innovation will bring secure, stable, and simple experiences to those who use Chromebooks. Chrome OS will be updated more often once a month, just [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Google is gradually adjusting the release schedule of new updates for ChromeOS, with a 4-week cycle and will start with the latest version of Chrome 94 later this year.</strong><br />
<span id="more-25320"></span> The new innovation will bring secure, stable, and simple experiences to those who use Chromebooks. Chrome OS will be updated more often once a month, just like Google did with the Chrome browser.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_541_39178386/6d9fcf10c052290c7043.jpg" width="625" height="625"> <em> Chrome OS&#8217;s cycle is shortened to once every four weeks.</em> Previously, Google usually released updates for Chrome browser with a 6-week cycle. However, in March 2021, Google announced about shortening the update time to improve gaps and patch bugs. For more than a decade, every six weeks, Chrome has hit a new milestone, bringing security, stability, speed, and simplicity to users and the web. In addition, Google&#8217;s shortening time is also to match the cycle of other competitors, like FireFox, which shortened the time to release new updates by month starting last year. Due to this schedule, Google will actually skip one of the scheduled Chrome OS updates. Accordingly, Google will switch directly from version M94 to M96, skipping M95. The new schedule does not apply to enterprise and educational systems. These systems will have an update schedule once every six months. Google promises to have more details on this soon.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25320</post-id>	</item>
		<item>
		<title>Large-scale cyber attack &#8211; a new trend of hackers</title>
		<link>https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</link>
		
		<dc:creator><![CDATA[DUY QUANG]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:06:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ferry Terminal]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Government agencies]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Interrupt]]></category>
		<category><![CDATA[JBS SA]]></category>
		<category><![CDATA[largescale]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[nation]]></category>
		<category><![CDATA[Non governmental organizations]]></category>
		<category><![CDATA[Petroleum pipeline]]></category>
		<category><![CDATA[president]]></category>
		<category><![CDATA[Rare]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State of Massachusetts]]></category>
		<category><![CDATA[suffered]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[Trend]]></category>
		<guid isPermaLink="false">https://en.spress.net/large-scale-cyber-attack-a-new-trend-of-hackers/</guid>

					<description><![CDATA[In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers. Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters) In an age where [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent months, the world has witnessed a sharp increase in cyber attacks, causing heavy damage as well as disrupting essential services. Performing large-scale cyber attacks has gradually become a new trend for hackers.</strong><br />
<span id="more-24847"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_194_39169587/fc73c274cc3625687c27.jpg" width="625" height="427"> </p>
<p> <em> Since the beginning of 2021, the world has experienced a series of large-scale cyber attacks. (Source: Reuters)</em> In an age where technology is creeping into every aspect of life, the term cyberattack is not new. Many people think simply that a cyber attack is an attempt by a hacker to steal data or money by infiltrating a computer network, databases, network infrastructure, websites, and devices. individual or organization. But now, hackers have found a way to make a lot of money illegally by attacking physical infrastructure targets, disrupting essential services, affecting not only to a person, a company that can spread to an entire city, even a country. <strong> Cyberattacks on the rise</strong> Over the past time, the US has continuously suffered from ransomware attacks targeting large companies, non-governmental organizations and government agencies. Most recently, on June 2, a ferry terminal operator service in the US state of Massachusetts became the target of a cyber attack, partially disrupting the ferry service payment system. Previously, hackers attacked the world&#8217;s leading meat processing group JBS SA, a branch in the US. In early May, the largest US oil pipeline operator Colonial Pipeline was also attacked by ransomware and forced to shut down some systems, disrupting supplies and pushing gasoline prices to record highs. green. Not only the US, the targets of hackers are very diverse. According to data from cybersecurity company BlackFog, from the beginning of 2021 to the present, US organizations and businesses have suffered 52 ransomware attacks, three times higher than the second-ranked country, the UK (16 (16). competition), followed by France (7), Canada (7), Australia (4), the Netherlands (4) and India (3). The rest of the world suffered only 39 attacks by hackers. <strong> Danger wave</strong> According to CNN, hacker groups have found that attacking critical service infrastructure can easily make them more money, in less time. These types of attacks have the potential to cause chaos in life, which can lead to product scarcity, push prices higher&#8230; The bigger the disruption, the quicker the hacked companies pay the hacker to fix the problem soon. The US Cybersecurity and Infrastructure Agency (CISA) has listed 16 industries as critical infrastructure sectors, including energy, healthcare, financial services, water, etc. Attacks, disruption of these industries can have a dramatic impact, undermining the US economy and security. More dangerously, most companies in this industry do not consider themselves technology-focused companies, leaving the operating system defenseless against increasingly sophisticated attacks by hackers. In addition, it is no coincidence that cyber attacks have increased sharply in the context of the raging Covid-19 pandemic. Millions of people move to remote work, including employees with access to critical infrastructure, while ransomware is deployed simply by enticing victims to click a link in an email. . Eric Cole, a former cybersecurity official under President Barack Obama, said that in order to promote automation, the internal networks of critical infrastructures are now networked and make the risk more risky. higher attack. In particular, hospital systems and healthcare providers are often targeted because they are busy dealing with Covid-19 and have little time to update their defenses. In response to this new wave of danger, on June 3, the White House sent an open letter, asking essential service companies to &#8220;consider ransomware as a threat to our core business.&#8221; themselves, rather than simply risk data theft.” US Commerce Secretary Gina Raimondo on June 6 asked the private sector of the country to be vigilant against the increasing wave of cyber attacks, and said that the threat is always present and even present. may become more severe. In order to protect your safety as well as your wallet, according to <em> CNN</em> , not only the US, companies, organizations and agencies also need to quickly close potential vulnerabilities in the system, update software and ensure that the most important functions are &#8220;immune&#8221; from damage. network attacks. Individuals also need to be cautious and alert before clicking on any link on the internet.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24847</post-id>	</item>
		<item>
		<title>Users need to update Google Chrome 91 immediately</title>
		<link>https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 04:13:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[About Google Chrome]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[critical]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Help]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sergei Glazunov]]></category>
		<category><![CDATA[Source code]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Zero]]></category>
		<guid isPermaLink="false">https://en.spress.net/users-need-to-update-google-chrome-91-immediately/</guid>

					<description><![CDATA[Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers. Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus Recently, a security researcher from the Project Zero team discovered a critical security vulnerability [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Sergei Glazunov discovered a serious vulnerability in Google Chrome, which is currently being actively exploited by hackers to penetrate computers.</strong><br />
<span id="more-24823"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/606fb267bc25557b0c34.jpg" width="625" height="390"> </p>
<p> <em> Google Chrome is one of the most popular browsers today with more than 2 billion users. Photo: EarnGurus</em> Recently, a security researcher from the Project Zero team discovered a critical security vulnerability (CVE-2021-30551) in Google Chrome, affecting many users. Not much is known about this vulnerability, instead, it is only briefly described: &#8220;Confusion in V8&#8221;. This is a JavaScript engine, used quite commonly on Google Chrome and browsers using Chromium source code (including Microsoft Edge). In a blog post, Google confirmed that the CVE-2021-30551 vulnerability exists in the wild. To limit future attacks, Google Chrome users should update their browser immediately by going to Settings &#8211; Help &#8211; About Google Chrome (about Google Chrome). When the update to version 91.0.4472.101 is complete, simply press Relaunch to restart the browser. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_331_39169257/2dbde3b5edf704a95de6.jpg" width="625" height="335"> <em> Update Google Chrome browser to the latest version. Photo: Tieu MINH</em> This is the sixth zero day vulnerability found on Google Chrome since the beginning of the year. The latest version of the browser also contains a total of 10 security patches, seven of which are listed as High threat and one is described as Critical. Sharing with BleepingComputer, Kaspersky warned that a new group of hackers calling themselves PuzzleMaker successfully hacked both Chrome and Windows this month, prompting Microsoft to issue an urgent upgrade notice for Windows users. In addition, Kaspersky also recommends that users update their browser and operating system to the latest version to limit future attacks.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24823</post-id>	</item>
		<item>
		<title>Unpatched vulnerability in Samsung phones allows hackers to read messages</title>
		<link>https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:51:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy S10]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Read]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[TECHCRUNCH ONLY]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[Unpatched]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</guid>

					<description><![CDATA[Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages. Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages. Not stopping there, things are even more dangerous when two other vulnerabilities [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages.</strong><br />
<span id="more-24695"></span> Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/8314b223bc61553f0c70.jpg" width="625" height="417"> Not stopping there, things are even more dangerous when two other vulnerabilities can be exploited by hackers to manipulate arbitrary files with higher permissions. What makes these even scarier is that they can be exploited without any user interaction. Samsung is aware of these security flaws and it may take the company about 2 months to fix. For now, the best defense is to make sure your Samsung phone is up to date with the latest firmware. Toshin said he has found more than a dozen vulnerabilities in Samsung devices since the start of the year, with many of these vulnerabilities already fixed. One of the bugs lies in apps and components like the Secure Folder app and the Knox security software that come pre-installed on Samsung devices. Tohsin told TechCrunch that these may have given attackers access to sensitive user data. Among +Samsung devices, the Galaxy S10+ is verified as affected. Another vulnerability resulted in the deletion of all previously downloaded apps once device admin rights were granted to a newly installed app. Additionally, a vulnerability in the Settings app could grant read/write access to files with system user-level privileges. A security flaw that was resolved in February could have given hackers access to users&#8217; SMS/MMS messages and call details. Toshin also warned Samsung about issues that may have helped bad guys get the SD card content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/bf9499a397e17ebf27f0.jpg" width="625" height="416"> While Samsung says the vulnerability affects &#8220;certain&#8221; Galaxy devices, the company appears to be downplaying the scope of the incident. “No issues have been reported globally and users should rest assured that their sensitive information is not at risk. We have addressed the potential vulnerability by developing and releasing security patches through a software update in April and May 2021 as soon as we identify the issue.” Korean company stated. (According to VOV, PhoneArena)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24695</post-id>	</item>
		<item>
		<title>Turns out this is why Apple&#8217;s iPhones are so secure</title>
		<link>https://en.spress.net/turns-out-this-is-why-apples-iphones-are-so-secure/</link>
		
		<dc:creator><![CDATA[Thái Sơn - CTV]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 22:58:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Park]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Craig Federighi]]></category>
		<category><![CDATA[Experiment]]></category>
		<category><![CDATA[Extreme]]></category>
		<category><![CDATA[Hard]]></category>
		<category><![CDATA[Headquarters]]></category>
		<category><![CDATA[Inaccuracies]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[Laboratory]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Secret facility]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The Independent]]></category>
		<category><![CDATA[turns]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/turns-out-this-is-why-apples-iphones-are-so-secure/</guid>

					<description><![CDATA[It is no coincidence that the iPhone has such good security capabilities. Apple&#8217;s importance in ensuring the security and privacy of its users is demonstrated by the fact that the company puts the chips and other components of the iPhone through a series of rigorous tests to ensure they are not susceptible to damage. attack. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>It is no coincidence that the iPhone has such good security capabilities.</strong><br />
<span id="more-24671"></span> Apple&#8217;s importance in ensuring the security and privacy of its users is demonstrated by the fact that the company puts the chips and other components of the iPhone through a series of rigorous tests to ensure they are not susceptible to damage. attack.</p>
<p> These tests are being conducted at a secret facility near Apple&#8217;s Apple Park headquarters, according to The Independent. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/dcf53cc23280dbde8291.jpg" width="625" height="326"> <em> Photo: DigitalTrends</em> “The purpose for the chips being tested is to see if they underperform in extreme situations – and if so, to make sure they only happen in the lab and not in the wild. the phone is in the hands of the user,” said The Independent. “Any of these inaccuracies can be a weakness for the device. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/44ff3d6da42e4d70143f.jpg" width="625" height="390"> <em> Photo: Business Insider</em> The Independent added that it is rare for a normal phone device to have to pass such extreme tests as it has to go from -40 degrees Celsius to 110 degrees Celsius. But the concern is real because if the chips lack security in such situations, bad guys can take advantage and the data stored inside can be stolen,&#8221; said The Independent. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/62c4976d342edd70843f.jpg" width="625" height="416"> <em> Photo: Business Insider</em> The site was obtained in an interview with Craig Federighi, Apple&#8217;s senior vice president of software engineering.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24671</post-id>	</item>
		<item>
		<title>Working together for a safer cyberspace</title>
		<link>https://en.spress.net/working-together-for-a-safer-cyberspace/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 10:35:14 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[3GPP]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Alternate]]></category>
		<category><![CDATA[Bao Transparency Center]]></category>
		<category><![CDATA[Co operate]]></category>
		<category><![CDATA[cyberspace]]></category>
		<category><![CDATA[Dongguan]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[Grand Opening]]></category>
		<category><![CDATA[GSMA]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Management agency]]></category>
		<category><![CDATA[NESAS]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[safer]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Space]]></category>
		<category><![CDATA[Supplier]]></category>
		<category><![CDATA[Together]]></category>
		<category><![CDATA[Very happy]]></category>
		<category><![CDATA[working]]></category>
		<guid isPermaLink="false">https://en.spress.net/working-together-for-a-safer-cyberspace/</guid>

					<description><![CDATA[Welcome to our Global Cybersecurity and Privacy Protection Transparency Center Grand Opening. And thank you for joining us today. This is the seventh Transparency Center that we have built and we are delighted to have this opportunity to share with you what we have been working on. Global Privacy and Transparency Center in Dongguan &#8211; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Welcome to our Global Cybersecurity and Privacy Protection Transparency Center Grand Opening. And thank you for joining us today. This is the seventh Transparency Center that we have built and we are delighted to have this opportunity to share with you what we have been working on.</strong><br />
<span id="more-23695"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_280_39142146/daeaf368fe2a17744e3b.jpg" width="625" height="416"> </p>
<p> <em> Global Privacy and Transparency Center in Dongguan &#8211; China</em> <strong> Challenge</strong> While we are increasing digitalization around the world, cybersecurity is becoming more important than ever. From the news, we&#8217;ve seen an increasing number of cyberattacks on critical infrastructure, such as energy, healthcare, and transportation. These attacks have affected the lives of millions of people around the world. According to Cybersecurity Ventures, in 2021, losses from cybercrime could reach $6 trillion. This is more than the third largest economy in the world. Meanwhile, as a result of the pandemic, people are spending more time online than ever before. And I&#8217;m sure many of us will continue to work remotely, even after the pandemic. This is the new normal. And it&#8217;s more important than ever to ensure a safe and secure cyberspace. <strong> Global progress: An opportunity for improvement</strong> On a global scale, with cyber attacks on the rise, all industries are taking cybersecurity more seriously. In the public sector, new laws, regulations and standards are being applied regularly. In the past two years alone, more than 180 cybersecurity laws have been passed in 151 countries. This is amazing progress. In the telecommunications sector, industry organizations such as GSMA and 3GPP have been working closely with industry stakeholders to promote the NESAS Security Specifications and independent certifications. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_280_39142146/ed06cc84c1c6289871d7.jpg" width="625" height="416"> <em> Mr. Ken-Hu rotating chairman of Huawei</em> These frameworks are already widely accepted in the industry and we are confident that they will play an important role in the development and verification of secure networks. However, we still have a lot of work to do. Cybersecurity is a complex, increasingly challenging challenge that requires close cooperation and information sharing. We still lack a coordinated, standards-based approach across the industry, especially when it comes to governance, technical capabilities, certification, and collaboration. Unfortunately, in some places there is still a misconception that the country of origin of the product affects the security of equipment and network technology. This view is simply wrong. That perspective does not address the real challenges and prevents us from forming a unified approach. <strong> Our Cybersecurity Experience</strong> At Huawei, cybersecurity is our top priority. We share this responsibility with our customers to ensure that the equipment they are using is safe and secure. We are proud of what we have achieved. Over the past 30 years, we have served more than three billion people around the world. We support the stable operation of more than 1,500 service provider networks in more than 170 countries. And we&#8217;ve maintained a solid track record in cybersecurity over the years. This is the result of continued investment in cybersecurity management experience. We currently have more than 3,000 cybersecurity R&#038;D employees, with 5% of our R&#038;D spending focused on the security of our products. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_280_39142146/5b6144e349a1a0fff9b0.jpg" width="625" height="351"> <strong> Generic Methods and Trust Building</strong> Of course, our cybersecurity systems were not developed in a vacuum. They are also the result of regular engagement, joint research and joint innovation with our customers, partners, regulators and standards organizations around the world. That&#8217;s what this Cybersecurity Transparency Center is all about. Two years ago we opened a similar Center in Brussels. At the time, I said about our ABC principle for security at Huawei: &#8220;Trust no one. Trust no one. Check everything.&#8221; My point is that trust and distrust should both be based on facts, not feelings, not speculation and not baseless rumors. We believe that data should be verifiable and that verification should be based on standards. Because this is our guiding principle, we have established 6 Cybersecurity and Transparency Centers over the past 10 years in Europe, the Middle East and North America. This center in Dongguan will serve three main functions: To exhibit solutions and share experiences. To facilitate communication and joint innovation. Provides a platform for security testing and verification. This hub is designed to support stakeholders from around the world. The Center has the best tools, testing environments and experts available to our partners, customers and industry colleagues. Here you can understand and test our products. And together, we can work more closely on security, verification and innovation standards. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_280_39142146/44ed5e6f532dba73e33c.jpg" width="625" height="351"> <strong> 3 points of view to conclude</strong> Before concluding my speech, I would like to take this opportunity to share my three quick views. The first thing is that we need to build capacity together. Cybersecurity threats are complex, diverse, and evolving. No organization can handle it all. From governance, standards and technology, to verification, we need to work together, combine strengths and build our collective capabilities. We also need to share knowledge, like the Security Fundamentals we&#8217;re releasing today and the 5G Network Security Knowledge Base deployed by the GSMA. The more knowledge and best practices we share, the more we can effectively enhance cybersecurity as a community. And finally, we need to form stronger alliances. That means governments, standards bodies and technology vendors need to work more closely together to develop a unified understanding of cybersecurity challenges. This must be an international effort. We need to set common goals, align responsibilities, and work together to build a trusted digital environment that meets the challenges of today and tomorrow. Once again, thank you for joining us today and thank you all for joining us online.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23695</post-id>	</item>
		<item>
		<title>Ministry of Industry and Information Technology promotes 5G security work 360 experts warn that 5G construction cannot be &#8220;naked&#8221;</title>
		<link>https://en.spress.net/ministry-of-industry-and-information-technology-promotes-5g-security-work-360-experts-warn-that-5g-construction-cannot-be-naked/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 05:04:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[construction]]></category>
		<category><![CDATA[Experts]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[naked]]></category>
		<category><![CDATA[promotes]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[warn]]></category>
		<category><![CDATA[Work]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-industry-and-information-technology-promotes-5g-security-work-360-experts-warn-that-5g-construction-cannot-be-naked/</guid>

					<description><![CDATA[Recently, the Ministry of Industry and Information Technology held a national video and telephone conference in Beijing to deploy and promote 5G security work. The meeting pointed out that the current pace of my country&#8217;s 5G network construction is accelerating, and nearly 850,000 5G base stations have been built, forming the world&#8217;s largest 5G independent [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, the Ministry of Industry and Information Technology held a national video and telephone conference in Beijing to deploy and promote 5G security work. The meeting pointed out that the current pace of my country&#8217;s 5G network construction is accelerating, and nearly 850,000 5G base stations have been built, forming the world&#8217;s largest 5G independent networking network, and 5G industry application innovation cases have exceeded 10,000. 360 security experts said that 5G will become a revolutionary technology that will change the future and a key infrastructure in the era of the Internet of Everything. It will have a major impact on personal security, government and enterprise security, and even national security. However, while 5G is developing, it is necessary to do a good job in network security at the same time. &#8220;Foundation engineering&#8221;, otherwise, &#8220;5G&#8221; construction is actually &#8220;streaking&#8221;.</strong></p>
<p><span id="more-23435"></span> <img fifu-featured="1" decoding="async" src="https://p5.itc.cn/images01/20210615/f165ad47f8374c578324f2163215fbaa.png" max-width="600"></p>
<p>The meeting also emphasized the importance of having a deep understanding of the importance of doing a good job in 5G security, effectively grasping the characteristics of the stage, innovation, and complexity of 5G development and evolution, planning and collaborative innovation as a whole, and integrating security concepts and measures throughout 5G. Plan all aspects of the entire process of construction and integration of applications to achieve synchronization of 5G development and security.</p>
<p>The reason why 5G security is so important is that, on the one hand, the value brought by 5G is not simply to allow consumers to watch videos faster on mobile phones, but to create for the age of the industrial Internet and the Internet of Things. &#8220;In the future, a large number of scenarios will be transferred to 5G, and more critical infrastructure and important applications will also be built on 5G.&#8221; 360 security experts said.</p>
<p>On the other hand, 5G accelerates the interconnection of all things, opening up the virtual world and the physical world, so that attacks that were only in the virtual world in the past can turn cyber attacks into harm to the physical world through the Internet of Things, leading to social shutdowns, factory shutdowns, and large-scale Area power outages, this hazard far exceeds the intrusion of viruses and Trojan horses today.</p>
<p>&#8220;When tens of billions or even hundreds of billions of IoT devices are connected via 5G, we must consider how to ensure their security.&#8221; 360 security experts said. He pointed out that 5G specifically faces six cyber security challenges. First, the core network modules of 5G are more complex, and there will be more security issues when building private networks in conjunction with MEC; second, low-latency services expand the attack surface; third, large-connection services make 5G a high level of hacker attacks. Value goals; fourth, network slicing technology makes the network boundary blurred; fifth, the problem of pseudo base stations still exists; sixth, higher requirements for the protection of user location privacy.</p>
<p>Therefore, escorting 5G security is imminent. It is reported that 360 has discovered and assisted in repairing the world&#8217;s first 4G network protocol vulnerability, which allows attackers to hijack text messages and voice calls from any 4G terminal. This work makes 360 the first security team to enter the Global System for Mobile Communications Association (GSMA) Mobile Security Hall of Fame.</p>
<p>In the direction of 5G security, 360 conducts research from four aspects: terminal layer, network layer, edge layer, and platform application layer, and proposes corresponding security deployment plans. In 2020, 360 participated in the establishment of the power 5G application security management technology project in cooperation with the Electric Power Research Institute, and conducted in-depth research based on the key technologies of 5G regulatory business security protection.</p>
<p>At present, 360 has built a 5G open source platform to realize NSA&#8217;s terminal access and business data transmission. The follow-up will rely on the boofuzz ​​fuzzing test framework for protocol conformance testing. After automatically sending a mutation message each time, for different monitoring APIs, the current device status can be observed in real time through the protocol monitoring window to determine whether the device is abnormal. The tool can be deployed in private networks such as corporate campuses to cooperate with multi-network and multi-standard drive test systems to discover device 5G module protocol vulnerabilities.</p>
<p>Disclaimer: This article is for reference only and does not constitute investment advice.</p>
<p>advertising</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23435</post-id>	</item>
		<item>
		<title>Continue to complete the project to ensure national water security</title>
		<link>https://en.spress.net/continue-to-complete-the-project-to-ensure-national-water-security/</link>
		
		<dc:creator><![CDATA[Diệu Thúy (TTXVN)]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 17:55:07 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[BOO Phu Ninh]]></category>
		<category><![CDATA[Chair]]></category>
		<category><![CDATA[Clean water]]></category>
		<category><![CDATA[Complete]]></category>
		<category><![CDATA[Continue]]></category>
		<category><![CDATA[Deputy]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[Guaranteed]]></category>
		<category><![CDATA[Lack of water]]></category>
		<category><![CDATA[Le Cong Thanh]]></category>
		<category><![CDATA[Meeting]]></category>
		<category><![CDATA[Ministry of Natural Resources and Environment]]></category>
		<category><![CDATA[National]]></category>
		<category><![CDATA[Objective reasons]]></category>
		<category><![CDATA[Project]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Scheme]]></category>
		<category><![CDATA[Science Committee]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology and Environment]]></category>
		<category><![CDATA[Tran Hong Ha]]></category>
		<category><![CDATA[Tran Vinh]]></category>
		<category><![CDATA[water]]></category>
		<category><![CDATA[Water source]]></category>
		<category><![CDATA[World bank]]></category>
		<guid isPermaLink="false">https://en.spress.net/continue-to-complete-the-project-to-ensure-national-water-security/</guid>

					<description><![CDATA[On June 15, in Hanoi, Minister of Natural Resources and Environment Tran Hong Ha and Deputy Minister of Natural Resources and Environment Le Cong Thanh chaired an online meeting on the situation of building a security scheme. national water source. Overview of BOO Phu Ninh clean water plant (phase 1A). Illustration: Tran Tinh/VNA Speaking at [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On June 15, in Hanoi, Minister of Natural Resources and Environment Tran Hong Ha and Deputy Minister of Natural Resources and Environment Le Cong Thanh chaired an online meeting on the situation of building a security scheme. national water source.</strong><br />
<span id="more-22797"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_294_39197148/beaceb730f35e66bbf24.jpg" width="625" height="351"> </p>
<p> <em> Overview of BOO Phu Ninh clean water plant (phase 1A). Illustration: Tran Tinh/VNA</em> Speaking at the meeting, Minister Tran Hong Ha emphasized that developing a scheme to ensure national water security is a very important task to describe the overall picture of Vietnam&#8217;s water resources. Accordingly, the development of the Scheme should point out the objective and subjective reasons; at the same time, assessing the shortcomings, challenges and forecasting problems of water resources in the future; from there, set out views, goals, guidelines, major policies, solutions to solve water resource problems. Reporting at the meeting, Director of the Department of Water Resources Management Chau Tran Vinh said that, performing the assigned tasks, the Department has coordinated with units in the field of water resources of the Ministry of Natural Resources and Environment to build The content of the Scheme is built on the basis of the monitoring report of the National Assembly&#8217;s Committee on Science, Technology and Environment, the water governance assessment report of the World Bank (WB) and other contents. Water resources have been summarized and reviewed by the Department in recent years. Accordingly, the specific goal of the Project to 2030 is to minimize dependence and optimize the benefits brought by water from inter-national water sources; proactively regulate water, prevent and respond to incidents of pollution, degradation, depletion of water sources, drought, water shortage, and saltwater intrusion; effectively and sustainably overcome the situation of drought and water shortage in the dry season in the South Central region, the Central Highlands, the Mekong River Delta, remote areas and islands&#8230; In addition, it is necessary to improve access to clean and safe water sources for people and water-using industries; basically control 90% of water exploitation and use activities, ensure economical, efficient, sustainable, safe, fair and reasonable use, associated with protection and development of water resources and environment environment and adaptation to climate change; controlling over 90% of discharges into water sources that play an important role in supplying treated water up to environmental standards; improve and restore seriously polluted and degraded water sources; conservation and sustainable development of important wetland ecosystems. At the same time, it is necessary to improve the provision of water supply services in urban and rural areas, raising the rate of using clean water and hygienic water of urban residents to about 95-100%, and about 93-95 in rural areas. %; ensure food security through efficient operation of irrigation works in the context of climate change&#8230; Representatives of the units said that in order to continue completing the National Water Security Assurance Scheme, it is necessary to add groups of implementation solutions that create a breakthrough in the management of water resources of the Ministry of Finance. environment and resources in the next 5 years such as: promoting digital transformation, building an online water resource database, building a common index on integrated water resources management, digitizing management data Water quality, quantity of water as the basis for regulation and allocation of water resources&#8230; Concluding the meeting, Deputy Minister Le Cong Thanh requested the Water Resources Management Department to absorb the comments, continue to review and add contents to the Scheme accordingly. Deputy Minister Le Cong Thanh emphasized that the development of the National Water Security Assurance Scheme is to identify the risks of water security and the problems, tasks and solutions to solve fundamental problems. version of national water security. Accordingly, by 2030, Vietnam needs to focus resources on implementing tasks and solutions to fulfill the set goals as soon as possible, ensuring national water security in association with sustainable development. economic, social, and environmental.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22797</post-id>	</item>
		<item>
		<title>35% of adults &#8216;argued&#8217; with family members about updating devices</title>
		<link>https://en.spress.net/35-of-adults-argued-with-family-members-about-updating-devices/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 00:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Adults]]></category>
		<category><![CDATA[Angry]]></category>
		<category><![CDATA[Answer the interview]]></category>
		<category><![CDATA[argued]]></category>
		<category><![CDATA[Argumentative]]></category>
		<category><![CDATA[attitude]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[devices]]></category>
		<category><![CDATA[Elderly]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[Head of department]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Keep contact]]></category>
		<category><![CDATA[Marina Titova]]></category>
		<category><![CDATA[Member]]></category>
		<category><![CDATA[members]]></category>
		<category><![CDATA[Reliable]]></category>
		<category><![CDATA[Reluctantly]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[updating]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/35-of-adults-argued-with-family-members-about-updating-devices/</guid>

					<description><![CDATA[A global survey conducted by Kaspersky to understand users&#8217; attitudes towards updating devices has found that the activity has become a household chore. According to the study, more than half of the married subjects (62%) interviewed said that children and elderly in the family need help in updating their devices. Additionally, updating can affect family [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A global survey conducted by Kaspersky to understand users&#8217; attitudes towards updating devices has found that the activity has become a household chore.</strong><br />
<span id="more-21681"></span> According to the study, more than half of the married subjects (62%) interviewed said that children and elderly in the family need help in updating their devices. Additionally, updating can affect family relationships, with 35% of survey respondents admitting to having a dispute with a family member about updating a device.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_280_39074257/6b4d5ce2b0a159ff00b0.jpg" width="625" height="410"> The device has long been popular among people of all ages. Around the world, children use devices to view content and play games, adults use devices to stay in touch with friends and family. However, it&#8217;s important to keep every device up to date in a timely manner to maintain a high level of reliable security and high performance. It&#8217;s no surprise that family members argue about their lack of interest or reluctance to make regular updates, as 34% of adults surveyed feel that installing updates makes them uncomfortable. and uncomfortable. The survey also found that, regardless of whether they live alone or with family, 77% of adults often manually install updates on devices at home. Cases in which individuals are responsible for their own devices are less common (12%). At the same time, according to those surveyed, spouses (7%) and children (4%) rarely update their devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_280_39074257/476b7ac6688481dad895.jpg" width="625" height="360"> Marina Titova, Head of Consumer Product Marketing at Kaspersky, commented: “As nearly all members of modern households use technological devices, installing updates has become a reality. becoming a household chore. Research results show that practically all family members are involved in this updating process to some extent. More than a third (35%) of respondents said that they even argue with family members about the importance of updates, which may indicate that users take it very seriously. value the online safety of yourself and your loved ones. Timely installation of updates not only allows access to new functions and interfaces, but also maintains a high level of device security. Updating this device will keep the personal data of all family members safe, as well as ensure all devices operate quickly and optimally.”</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21681</post-id>	</item>
		<item>
		<title>LG allows free use of open source software management tools</title>
		<link>https://en.spress.net/lg-allows-free-use-of-open-source-software-management-tools/</link>
		
		<dc:creator><![CDATA[Trà My (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 13:05:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Allow]]></category>
		<category><![CDATA[Compliance]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Free]]></category>
		<category><![CDATA[Is is]]></category>
		<category><![CDATA[LG]]></category>
		<category><![CDATA[LG Electronics Inc]]></category>
		<category><![CDATA[License]]></category>
		<category><![CDATA[Licensing]]></category>
		<category><![CDATA[Linux Foundation]]></category>
		<category><![CDATA[Manage]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[open]]></category>
		<category><![CDATA[Open source]]></category>
		<category><![CDATA[Open source software]]></category>
		<category><![CDATA[Procedure]]></category>
		<category><![CDATA[Programmer]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[tools]]></category>
		<guid isPermaLink="false">https://en.spress.net/lg-allows-free-use-of-open-source-software-management-tools/</guid>

					<description><![CDATA[FOSSLight is an open source compliance auditing system, with the ability to analyze a developer&#8217;s software for compliance with licensing conditions and meeting security requirements. (Source: ashtonhawks.com) LG Electronics Inc. The company said on June 3 that its FOSSLight system, an open source software management tool, is ready to &#8220;serve&#8221; external developers as the Korean [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>FOSSLight is an open source compliance auditing system, with the ability to analyze a developer&#8217;s software for compliance with licensing conditions and meeting security requirements.</strong><br />
<span id="more-21296"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_293_39062771/f958f073e131086f5120.jpg" width="625" height="400"> </p>
<p> <em> (Source: ashtonhawks.com)</em> LG Electronics Inc. The company said on June 3 that its FOSSLight system, an open source software management tool, is ready to &#8220;serve&#8221; external developers as the Korean technology giant strengthens its presence in the community <strong> software</strong> . LG said <strong> system</strong> FOSSLight, which has been used by the company since 2014, can now be downloaded for free on its website. This open source software allows programmers to freely use or edit according to their work needs. However, developers must comply with the license regulations for each open source code. LG&#8217;s FOSSLight is an open source compliance audit system, with the ability to analyze a developer&#8217;s software for compliance with licensing conditions and meeting security requirements. LG hopes this new move can strengthen FOSSLight&#8217;s global presence and improve the system&#8217;s stability by receiving mixed feedback from outside developers. This is also part of LG&#8217;s commitment to expanding cooperation and partnerships with others to accelerate digital transformation. LG has worked to establish a license management system <strong> Source code</strong> firmly open to professionals since 2007. LG is also the first Korean company to be recognized by the Linux Foundation&#8217;s OpenChain project. OpenChain is a project that helps define key recommended processes to make compliance with open source licenses simpler and more consistent.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21296</post-id>	</item>
		<item>
		<title>Hieu PC set up a free support group for secure Facebook users and retrieved locked accounts, anyone who is often &#8216;discolored&#8217; must enter immediately!</title>
		<link>https://en.spress.net/hieu-pc-set-up-a-free-support-group-for-secure-facebook-users-and-retrieved-locked-accounts-anyone-who-is-often-discolored-must-enter-immediately/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 07 Jun 2021 03:13:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[accounts]]></category>
		<category><![CDATA[Bleach]]></category>
		<category><![CDATA[board]]></category>
		<category><![CDATA[Censorship]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Contribute]]></category>
		<category><![CDATA[discolored]]></category>
		<category><![CDATA[Enter]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Formed]]></category>
		<category><![CDATA[Free]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Hieu]]></category>
		<category><![CDATA[Hieu PC]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[locked]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Ngo Minh Hieu]]></category>
		<category><![CDATA[Open the flag]]></category>
		<category><![CDATA[problem]]></category>
		<category><![CDATA[Recover]]></category>
		<category><![CDATA[retrieved]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[Support]]></category>
		<category><![CDATA[Thick]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/hieu-pc-set-up-a-free-support-group-for-secure-facebook-users-and-retrieved-locked-accounts-anyone-who-is-often-discolored-must-enter-immediately/</guid>

					<description><![CDATA[Hieu PC&#8217;s Facebook support group is being interested by the online community. Hieu PC &#8211; real name Ngo Minh Hieu has become a familiar name to the online community recently. Although he has not been back to Vietnam for a long time, he has been contributing to the network security system with the Anti-Phishing website. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hieu PC&#8217;s Facebook support group is being interested by the online community.</strong><br />
<span id="more-21198"></span> Hieu PC &#8211; real name Ngo Minh Hieu has become a familiar name to the online community recently. Although he has not been back to Vietnam for a long time, he has been contributing to the network security system with the Anti-Phishing website.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_101_39057230/c787f4f0e5b20cec55a3.jpg" width="625" height="391"> And recently, he also made Facebook users happy like opening the flag in their stomach when together with friends, he formed a group called &#8220;7onez &#8211; Free support&#8221; to support problems about Facebook and other social networks. . For the purpose of serving the community&#8217;s interests, the group will have members who are experienced in Facebook security, and support to recover accounts when locked, especially problems/questions will be supported free of charge. online fees. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_101_39057230/122271466004895ad015.jpg" width="625" height="705"> <em> Hieu PC&#8217;s personal Facebook post Facebook</em> Although just established, the group has attracted nearly 6K people, with the introduction &#8220;This is a small group of 7onez used to help you improve your security and recover your Facebook, Gmail, Instagram accounts&#8230; Free of charge. Supporters will be those who are censored and selected by the 7onez administration.&#8221; So if you have problems with account security or your account is locked, just post or inbox will be answered by everyone, support to get back quite quickly and especially can avoid scam cases. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_101_39057230/c433f044e10608585117.jpg" width="625" height="303"> <em> Free support group</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21198</post-id>	</item>
		<item>
		<title>UC Browser secretly collects browsing data of iPhone users</title>
		<link>https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 08:07:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[collects]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Gabi Cirlig]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[secretly]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Surfing the web]]></category>
		<category><![CDATA[UC Browser]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</guid>

					<description><![CDATA[Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China. The collected data even includes IP addresses, which can be used to track the approximate location of the user. UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China.</strong><br />
<span id="more-21025"></span> The collected data even includes IP addresses, which can be used to track the approximate location of the user.</p>
<p> UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). This is one of the most popular mobile browsers in Asia, with over 500 million downloads on Google Play alone. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_331_39051919/1e841e3a0f78e626bf69.jpg" width="625" height="352"> According to security researcher Gabi Cirlig, UC Browser silently sent iPhone users&#8217; browsing data (even with incognito mode enabled) to UCWeb servers (registered in China, but located in the US). ). This is in stark contrast to the company&#8217;s previous statement, which does not record a user&#8217;s &#8220;browsing and search history&#8221; when incognito mode is activated. More worryingly, UC Browser also collects IDs (unique identifiers) to track users across various websites. The collection of user data happens on both Android and iOS versions, not sure what UCWeb is doing with all this information? Interested readers can watch the video at: “This kind of tracking is done on purpose,” Cirlig told Forbes. When compared with Google Chrome browser and some other popular browsers, he found there is no browser like UC Browser. UC Browser just rolled out a new update last week, but the company never mentioned monitoring users&#8217; browsing activity. Currently the English version of UC Browser has been removed from the App Store, but the Chinese version still exists, and unlike the English version, it does not send data back to the UCWeb server. Earlier in 2019, the UC Browser version for Android also violated Google Play&#8217;s policies.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21025</post-id>	</item>
		<item>
		<title>Don&#8217;t play with customer data</title>
		<link>https://en.spress.net/dont-play-with-customer-data/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 03 Jun 2021 01:10:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Debt]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Incident]]></category>
		<category><![CDATA[Information system]]></category>
		<category><![CDATA[Institutions]]></category>
		<category><![CDATA[Joke]]></category>
		<category><![CDATA[KYC]]></category>
		<category><![CDATA[mind]]></category>
		<category><![CDATA[Operational]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[play]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/dont-play-with-customer-data/</guid>

					<description><![CDATA[Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Data is an extremely valuable economic resource, many businesses and fields depend on it. In the banking sector (NH), customer data is many times more important, because it is not only basic personal information, but also the status of customers&#8217; assets, balances, and cash flows. . Security so that customer data is not exposed (breach) is one of the top concerns of these financial institutions, so banks have to invest a lot of effort and money.</strong><br />
<span id="more-20177"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/cbfbeec36e8087dede91.jpg" width="625" height="886"> </p>
<p> <strong> A wake-up call about SMALL governance</strong> Recently, on social networks in Vietnam, a computer screen shot of a famous artist&#8217;s NH account statement related to the incident has attracted a lot of public opinion. Although NH has admitted that its employees spread the word, this is a wake-up call for those working in the banking sector, as well as the leaders of these organizations. In the era of information technology, customer data security can be said to be the most important for banks. Previously, the prestige of the banks was in the solidity of the safes, which were dug deep in the tunnels, through many layers of thick steel doors, resistant to fire and explosion and even earthquakes. Today it is the NH&#8217;s security system. Because most assets and liabilities are stored in the form of numbers, lines of data. The disclosure of customer data is often considered an accident of the security system, due to unintentional human error, or due to an external attack. But security risks do not only come from information technology systems. There are three places where security risks arise, that is from a governance perspective in relation to processes, monitoring, information systems, and operations. The above incident shows an error in the operation of the staff, related to the management of the bank. Normally, when signing a work contract, in the contract terms, of course, there must be things that employees must not do, not to mention the business ethics of the industry. And so this is not entirely the fault of the staff, NH is also responsible for regular training, as well as supervision. The consequences of customer data being disclosed are serious on several levels. For example, the bank must be responsible for the damages incurred because the customer account is attacked individually, or the entire information system of the bank is the prey of hackers. Equally important damage is the reputation of NH. As a customer, no one wants to send money or do business with NH but &#8220;house&#8221; is loose. The more important partners are not. <strong> NH is also confused</strong> Customer data in banks is the survival of banks. Security is the new generation of &#8220;safes&#8221;, and the prestige lies in the system, as well as the consciousness and skills of the key holders. In the matter of customer data, banks also have a big confusion between needing a lot of customer data (KYC), security and customer privacy (privacy). Banks themselves also need a lot of KYC, not only to manage risks, but also to develop services to provide to customers, especially cross-selling and value-added services. State regulatory agencies also require banks to perform KYC, mainly for the purpose of anti-money laundering and illegal activities. But when customer data increases, integration from many sources, many systems with heterogeneous standards or formats, is a huge challenge for NH&#8217;s information system. Because the more sources, the more &#8220;entrances&#8221; there are more exposed points, many places can be hacked. The collection of customer data is also met with a certain reaction from them because of privacy. In many developed countries, such as Europe with the General Data Protection Regulation 2016/679 aka GDPR, there is a huge shift from service providers in general and the sector. NH in particular. There are data, currently NH wants to collect the consent of customers. In short, customer data in banks is the survival of banks. The security is a new generation &#8220;safe&#8221; form, and the prestige lies in the system, as well as the consciousness and skills of the key holders. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_31_318_39021011/e43dcc34db7632286b67.jpg" width="625" height="468"> <strong> Domestic banks need to pay attention</strong> In terms of customer data security risks, domestic banks compete with each other in technology and there is almost no big difference between banks in the same group, for example, large banks have enough resources to Get the best system. Even later banks have an advantage because technology costs decrease over time. The problem for data security, therefore, mainly lies in the management system of the bank, as well as in the daily operation. In administration, besides processes and monitoring systems, leaders&#8217; awareness of security issues is extremely important. Not only investing properly for the information technology system, leaders must always closely monitor this issue, considering this as their important task. Therefore, there is a need for consistent direction and coordination between the banks&#8217; departments, considering this as the core activity of the bank. In the course of daily operations, it is the awareness and skills of the employees. Periodic and continuous training is absolutely necessary for all employees, especially functions and positions of authority. If the employee is aware of the seriousness of the disclosure of the customer&#8217;s account, no employee would dare to act so impulsively, not to mention, besides internal handling, it may also be involved in legal regulations .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20177</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>VietinBank is free to notify credit card transaction fluctuations</title>
		<link>https://en.spress.net/vietinbank-is-free-to-notify-credit-card-transaction-fluctuations-2/</link>
		
		<dc:creator><![CDATA[Minh Vượng (Vietnam+)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 10:55:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Characters]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[fluctuations]]></category>
		<category><![CDATA[Free]]></category>
		<category><![CDATA[Illustration]]></category>
		<category><![CDATA[Industrial and Commercial Bank of Vietnam]]></category>
		<category><![CDATA[inland]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[Notification]]></category>
		<category><![CDATA[notify]]></category>
		<category><![CDATA[OTT]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Transaction]]></category>
		<category><![CDATA[Utilities]]></category>
		<category><![CDATA[VietinBank]]></category>
		<category><![CDATA[VietinBank iPay Mobile]]></category>
		<category><![CDATA[Volatility]]></category>
		<guid isPermaLink="false">https://en.spress.net/vietinbank-is-free-to-notify-credit-card-transaction-fluctuations-2/</guid>

					<description><![CDATA[From June 1, VietinBank will free and switch transaction notification channels from SMS to OTT messages on VietinBank iPay Mobile application for all credit card customers. Illustration. (Photo: Vietnam+) With the goal of improving efficiency, bringing more conveniences and incentives to customers when using products and services, Joint Stock Commercial Bank for Industry and Trade [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>From June 1, VietinBank will free and switch transaction notification channels from SMS to OTT messages on VietinBank iPay Mobile application for all credit card customers.</strong><br />
<span id="more-19524"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_293_38994035/ccf49e9e53ddba83e3cc.jpg" width="625" height="468"> </p>
<p> <em> Illustration. (Photo: Vietnam+)</em> With the goal of improving efficiency, bringing more conveniences and incentives to customers when using products and services, Joint Stock Commercial Bank for Industry and Trade of Vietnam (VietinBank) deploys free notification of transaction fluctuations translation for owner <strong> credit</strong> (international and domestic). Accordingly, from June 1, VietinBank will free and change the transaction notification channel from SMS to OTT message channel on VietinBank iPay Mobile application for all credit card and current customers. using VietinBank&#8217;s digital banking services. OTT messages on VietinBank iPay Mobile application help customers receive transaction notifications 24/24 even while working or traveling abroad, just need to have an Internet connection with the device that has installed the application. In addition, OTT news with no character limit with clear and complete message content will help customers manage their accounts in the best way. VietinBank hopes that the form of notification of transaction fluctuations via OTT messages directly on <strong> VietinBank iPay Mobile</strong> will help customers have a safe and secure experience for customers when using VietinBank&#8217;s products and services. For customers who have not installed VietinBank iPay Mobile application, VietinBank will continue to send SMS messages and provide free services to customers./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19524</post-id>	</item>
		<item>
		<title>MB transferred the agency to investigate the perpetrators of the release of the artist Hoai Linh&#8217;s account statements</title>
		<link>https://en.spress.net/mb-transferred-the-agency-to-investigate-the-perpetrators-of-the-release-of-the-artist-hoai-linhs-account-statements/</link>
		
		<dc:creator><![CDATA[Phúc Lâm -]]></dc:creator>
		<pubDate>Sun, 30 May 2021 15:55:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Culprit]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[lot]]></category>
		<category><![CDATA[MB Bank]]></category>
		<category><![CDATA[Overhead]]></category>
		<category><![CDATA[perpetrators]]></category>
		<category><![CDATA[Press Release]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[statements]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[transferred]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-transferred-the-agency-to-investigate-the-perpetrators-of-the-release-of-the-artist-hoai-linhs-account-statements/</guid>

					<description><![CDATA[On the evening of May 27, MB released a press release saying that the culprit was an MB employee who leaked customer information, seriously violating the bank&#8217;s regulations&#8230; &#8220;After information was spread online about the image of artist Hoai Linh&#8217;s account statement, the Bank checked and verified the incident and discovered that an employee intentionally [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the evening of May 27, MB released a press release saying that the culprit was an MB employee who leaked customer information, seriously violating the bank&#8217;s regulations&#8230;</strong><br />
<span id="more-19315"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_3_38990010/ca32264e300cd952801d.jpg" width="625" height="390"> </p>
<p> &#8220;After information was spread online about the image of artist Hoai Linh&#8217;s account statement, the Bank checked and verified the incident and discovered that an employee intentionally copied the screen and leaked it. Currently, MB has suspended this person&#8217;s work and will take disciplinary action at the highest level; at the same time, transfer the entire case file to the investigating agency for handling in accordance with the law.&#8221; , the statement said. MB Bank also confirmed that the disclosure of information on the air was caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. Because this system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with hundreds of millions of safe transactions. The MB representative also said that in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information throughout the system. The Bank will take appropriate disciplinary measures for all individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with legal regulations, industry and MB. It is known that a week ago, on social networks, a &#8220;controversial&#8221; case appeared, artist Hoai Linh was more than 6 months late paying over 14 billion VND in relief money for flood victims in the Central region, transferred by benefactors. come. Just a few days later, the online community released photos of dozens of statements showing the transactions of comedian Hoai Linh&#8217;s account opened at MB bank. Immediately, a wave of protests against MB&#8217;s disclosure/passage of confidential customer account information. After about 3 days of actively researching, until today, May 27, MB has an official feedback.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19315</post-id>	</item>
		<item>
		<title>MB transferred the profile of the person who leaked Hoai Linh&#8217;s account information to the investigating agency</title>
		<link>https://en.spress.net/mb-transferred-the-profile-of-the-person-who-leaked-hoai-linhs-account-information-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[Thanh Lịch]]></dc:creator>
		<pubDate>Sun, 30 May 2021 15:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Again]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[person]]></category>
		<category><![CDATA[Profile]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Smart eKYC]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[transferred]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-transferred-the-profile-of-the-person-who-leaked-hoai-linhs-account-information-to-the-investigating-agency/</guid>

					<description><![CDATA[Military Bank (MB) has just released a statement saying that, having discovered an individual working at this bank to leak customer information, this individual has been suspended from work and transferred to the Bank. investigation agency. It is known that in the past few days, public opinion has been constantly interested in information reflecting the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Military Bank (MB) has just released a statement saying that, having discovered an individual working at this bank to leak customer information, this individual has been suspended from work and transferred to the Bank. investigation agency.</strong><br />
<span id="more-19304"></span> It is known that in the past few days, public opinion has been constantly interested in information reflecting the fact that artist Hoai Linh is holding more than 13 billion VND for charity in the past several months and the spread of information. about this artist&#8217;s MB account transaction on social networks.</p>
<p> After the investigation process, the Military Bank (MB) said that MB discovered an individual working at this bank to leak customer information, this individual had seriously violated the regulations of the Bank. Bank. MB&#8217;s announcement emphasized that, in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. <em> MB transferred the profile of the person who leaked Hoai Linh&#8217;s account information to the investigating agency</em> At the same time, there will be appropriate disciplinary measures for individuals who disclose/leave information, fail to comply with professional ethics regulations, and do not comply with Laws and regulations of the bank. Currently, MB has suspended the work of the above violator and will organize disciplinary action with the highest form of the violator, and at the same time, the bank has transferred the file to the investigation agency for handling. MB confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. Because the bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_359_38989872/af23b441a2034b5d1212.jpg" width="625" height="357"> MB&#8217;s representative also emphasized that transaction information at MB is protected by 3 layers of fences, including: First, the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). Along with that, &#8220;In order not to let similar incidents happen again, in order to secure information and transaction data of customers, MB has also reviewed the working processes, strictly decentralized and tightened more work discipline&#8221; &#8211; MB representative confirmed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19304</post-id>	</item>
		<item>
		<title>MB staff revealed the account of artist Hoai Linh was disciplined, the bank sent the file to the investigating agency</title>
		<link>https://en.spress.net/mb-staff-revealed-the-account-of-artist-hoai-linh-was-disciplined-the-bank-sent-the-file-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[PV]]></dc:creator>
		<pubDate>Sun, 30 May 2021 14:10:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[disciplined]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[Linh]]></category>
		<category><![CDATA[Revealed]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Smart eKYC]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<guid isPermaLink="false">https://en.spress.net/mb-staff-revealed-the-account-of-artist-hoai-linh-was-disciplined-the-bank-sent-the-file-to-the-investigating-agency/</guid>

					<description><![CDATA[On the evening of May 27, 2021, Military Commercial Joint Stock Bank informed that artist Hoai Linh&#8217;s account statement was posted on social networks a few days ago, and is said to have been posted by &#8220;Bank staff&#8221;. Accordingly, MB has found the person who caused the violation and conducted strict disciplinary action and sent [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the evening of May 27, 2021, Military Commercial Joint Stock Bank informed that artist Hoai Linh&#8217;s account statement was posted on social networks a few days ago, and is said to have been posted by &#8220;Bank staff&#8221;. Accordingly, MB has found the person who caused the violation and conducted strict disciplinary action and sent the file to the investigation agency.</strong><br />
<span id="more-19296"></span> Specifically, the Bank checked, and verified the above incident, discovered an individual working at the bank to leak customer information, this individual had seriously violated the Bank&#8217;s regulations.</p>
<p> In the spirit of respecting the law, the Bank commits to take strict measures to ensure absolute compliance with the provisions of the law on protecting customer information; take appropriate disciplinary measures for individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with the provisions of law, regulations of the bank. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_35_38989732/9ee5b086a6c44f9a16d5.jpg" width="625" height="416"> Specifically, the Bank has suspended the work of individual violators and will organize disciplinary action with the highest form of violators, and at the same time transfer the file to the investigating agency for handling. Information to the press, MB confirmed that the disclosure of information was not due to a breakdown in the bank&#8217;s information technology (IT) system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. Transaction information is protected by 3 layers of fences including: The first is the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). “In order not to let similar incidents happen again, in order to secure the information and transaction data of our customers, we have also reviewed the working processes, strictly decentralized and tightened the working discipline. more work”- MB emphasized.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19296</post-id>	</item>
		<item>
		<title>Hoai Linh account information leaked: MB handled employees with serious violations</title>
		<link>https://en.spress.net/hoai-linh-account-information-leaked-mb-handled-employees-with-serious-violations/</link>
		
		<dc:creator><![CDATA[Anh Tuấn]]></dc:creator>
		<pubDate>Sun, 30 May 2021 11:32:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[employees]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[handled]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linh]]></category>
		<category><![CDATA[MB Bank]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Serious violation]]></category>
		<category><![CDATA[Staff]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[Violations]]></category>
		<category><![CDATA[Vo Nguyen Hoai Linh]]></category>
		<guid isPermaLink="false">https://en.spress.net/hoai-linh-account-information-leaked-mb-handled-employees-with-serious-violations/</guid>

					<description><![CDATA[Regarding the leaked account statement of artist Hoai Linh, MB Bank discovered an individual working at the Bank to reveal customer information. MB has suspended the work of the violator&#8230; In the past few days, the incident has spread on the social network of the artist Hoai Linh&#8217;s account transaction statement (full name is Vo [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Regarding the leaked account statement of artist Hoai Linh, MB Bank discovered an individual working at the Bank to reveal customer information. MB has suspended the work of the violator&#8230;</strong><br />
<span id="more-19272"></span> In the past few days, the incident has spread on the social network of the artist Hoai Linh&#8217;s account transaction statement (full name is Vo Nguyen Hoai Linh) in charity work, attracting public attention. This incident is said to be posted by an employee of Military Bank (MB).</p>
<p> Regarding this incident, MB Bank said that after receiving information from public opinion that the artist Hoai Linh&#8217;s account was spread on the social network that was supposed to be opened at MB, the Bank checked and verify the facts. And MB has discovered an individual working at the Bank to leak customer information. This individual has seriously violated the Bank&#8217;s regulations. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_23_38989670/db9280f296b07fee26a1.jpg" width="625" height="398"> In the spirit of respecting the law, MB is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. The Bank will take appropriate disciplinary measures for individuals who disclose/leave information, fail to comply with professional ethics regulations, and do not comply with laws and regulations of the bank. Regarding MB&#8217;s handling method for violators, the Bank has suspended the violators&#8217; work and will organize disciplinary action with the highest form of violators, and the bank has transferred the files to the violators. to the investigating agency for handling. In addition, the Bank confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the App MB product, transaction information is protected by three layers of fences, including: The first is the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; the second is an encryption layer that protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; third, the ultimate protective barrier is built on each feature that Ebank offers&#8230; In order not to let similar incidents happen again, in order to secure information and transaction data of customers, MB&#8217;s representative said that the Bank has reviewed the working processes, strictly decentralized and tightened stricter work discipline.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19272</post-id>	</item>
		<item>
		<title>Find out who leaked Hoai Linh&#8217;s account information, send the file to the investigating agency</title>
		<link>https://en.spress.net/find-out-who-leaked-hoai-linhs-account-information-send-the-file-to-the-investigating-agency/</link>
		
		<dc:creator><![CDATA[Nha Trang]]></dc:creator>
		<pubDate>Sun, 30 May 2021 08:48:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[AGENCY]]></category>
		<category><![CDATA[App MB]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[Digital OTP]]></category>
		<category><![CDATA[Disciplinary enforcement]]></category>
		<category><![CDATA[Discipline]]></category>
		<category><![CDATA[Dynamic Key]]></category>
		<category><![CDATA[EMB]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Find]]></category>
		<category><![CDATA[Find out]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hoai]]></category>
		<category><![CDATA[Hoai Linh]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[investigating]]></category>
		<category><![CDATA[investigative agency]]></category>
		<category><![CDATA[leaked]]></category>
		<category><![CDATA[Linhs]]></category>
		<category><![CDATA[Military joint stock commercial bank]]></category>
		<category><![CDATA[Revealing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Send]]></category>
		<category><![CDATA[Suspended]]></category>
		<category><![CDATA[Tallest]]></category>
		<guid isPermaLink="false">https://en.spress.net/find-out-who-leaked-hoai-linhs-account-information-send-the-file-to-the-investigating-agency/</guid>

					<description><![CDATA[Regarding the case that artist Hoai Linh &#8216;om&#8217; more than 13 billion dollars for charity from floods in the Central region for more than 6 months and the disclosure of the artist&#8217;s MB account transaction information, the Military Bank (MB) MB has checked, and verified the above incident, discovered an individual working at the bank [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Regarding the case that artist Hoai Linh &#8216;om&#8217; more than 13 billion dollars for charity from floods in the Central region for more than 6 months and the disclosure of the artist&#8217;s MB account transaction information, the Military Bank (MB) MB has checked, and verified the above incident, discovered an individual working at the bank to leak customer information, this individual has seriously violated the bank&#8217;s regulations.</strong><br />
<span id="more-19244"></span> MB&#8217;s announcement emphasized that, in the spirit of respecting the law, the Bank is committed to taking strict measures to ensure absolute compliance with the provisions of the law on protecting customer information. The Bank will take appropriate disciplinary measures for individuals who disclose/leave information, do not comply with professional ethics regulations, do not comply with the Laws and Regulations of the bank.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_11_38989276/e78b54434201ab5ff210.jpg" width="625" height="445"> <em> MB confirmed that this information disclosure was not caused by a breakdown in the bank&#8217;s IT system or a hacker attack</em> The Bank&#8217;s handling method for violators: The Bank has suspended the violator&#8217;s work and will organize disciplinary action with the highest form of violators, and the bank has transferred the file to to the investigating agency for handling. MB confirmed that the above information disclosure was not caused by a breakdown in the bank&#8217;s information technology system or a hacker attack. The bank&#8217;s IT system is built on the most advanced technology and security platforms in the world today, the bank&#8217;s online transaction rate reaches 90% with 100 million safe transactions. For example, for the APP MB product, the bank has brought financial experiences beyond expectations to customers. Transaction information is protected by 3 layers of fences including: First, the eMB application protection system with the feature of refusing to install with unsafe devices; anti-decompile and lock protect sensitive data; The second layer of encryption protects when the application transmits information to the service server at the bank, ensuring data integrity and inviolability; The final barrier of protection is built on each feature provided by Ebank (when applying Smart eKYC technology to identify customers, additional AI is used for face and voice authentication; using Generation Digital OTP. 3.0 with the addition of Dynamic Key security technology being used by the Singapore government&#8230;). &#8220;In order not to let similar incidents happen again, in order to secure the information and transaction data of our customers, we have also reviewed the working processes, strictly decentralized, and tightened the working discipline. more work&#8221; &#8211; MB representative confirmed.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19244</post-id>	</item>
		<item>
		<title>US issues new security guidelines after Colonial Pipeline attack</title>
		<link>https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</link>
		
		<dc:creator><![CDATA[Minh Châu (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Sun, 30 May 2021 03:28:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alejandro Mayorkas]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Cisa]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Department of Cybersecurity]]></category>
		<category><![CDATA[Department of Transportation Security]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Guidelines]]></category>
		<category><![CDATA[issues]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Show]]></category>
		<category><![CDATA[State of Maryland]]></category>
		<category><![CDATA[TANK]]></category>
		<category><![CDATA[The gas station]]></category>
		<category><![CDATA[TSA]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-issues-new-security-guidelines-after-colonial-pipeline-attack/</guid>

					<description><![CDATA[The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA) US Department of Homeland Security (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system.</strong><br />
<span id="more-19182"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_293_38989113/b5ac52c9448badd5f49a.jpg" width="625" height="415"> </p>
<p> <em> Colonial Pipeline Company&#8217;s fuel tanks in Baltimore, Maryland, USA. (Photo: AFP/VNA)</em> <strong> US Department of Homeland Security</strong> (DHS) on May 27 issued new security guidance for owners and operators of fuel pipelines. This move follows a cyber attack on the company&#8217;s fuel pipeline system <strong> Colonial Pipeline</strong> , leading to gas supply disruptions on the US East Coast this month. Homeland Security Secretary Alejandro Mayorkas said: &#8220;The recent malware attack on a major fuel pipeline shows that the cybersecurity of pipeline systems is a critical factor. pivotal to the homeland security of the United States.” Under DHS, owners and operators of <strong> fuel pipeline</strong> Key players will be required to immediately report confirmed and probable cyber-attacks to the Department of Cybersecurity and Infrastructure Security under their respective jurisdictions. <strong> DHS</strong> (CISA), and appoint a cybersecurity coordinator available 24 hours a day and 7 days a week. The issuance of the new guidance also requires fuel pipeline owners and operators to review current cybersecurity measures to detect any vulnerabilities, as well as remedial actions if necessary. there is a risk of a cyber attack. They must notify this result to the Transportation Security Administration (TSA), a unit of DHA, and CISA within 30 days. The DHS statement said TSA is considering additional mandatory measures to enhance cybersecurity to protect the US fuel system. Previously, on May 7, Colonial Pipeline announced that it was attacked by ransomware and forced to close some systems. This incident caused a large-scale supply disruption, causing thousands of gas stations on the US East Coast to fall into shortages and gasoline prices to the highest level since 2017. The US government has issued an order. state of emergency in 17 states and Washington, D.C. After more than 1 week of being affected, the Colonial Pipeline oil pipeline has returned to normal operation. Colonial Pipeline has publicly confirmed paying a ransom to restore computer networks. Meanwhile, the US Federal Bureau of Investigation (FBI) identified DarkSide as the hacker group behind the attack.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19182</post-id>	</item>
		<item>
		<title>Hackers in Vietnam are on the rise</title>
		<link>https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Wed, 26 May 2021 14:20:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Complicated developments]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Kong]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subset]]></category>
		<category><![CDATA[Traditional approach]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</guid>

					<description><![CDATA[In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230; Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230;</strong><br />
<span id="more-18353"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_3_38951174/fc0f0f191b5bf205ab4a.jpg" width="625" height="416"> </p>
<p> Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of remote working. This manifests itself in large-scale and increasingly complex attacks. Hackers perform an average of 50 million password attacks per day, 579 attacks per second. <strong> AGAINST MALWARE AND RAMSOMWARE WITH DEVELOPMENT</strong> Microsoft&#8217;s telemetry results released over the weekend showed that the prevalence of malware and ransomware infections in Asia-Pacific has been increasing over the past 18 months, stretching back to before the Covid-19 pandemic. -19 outbreak to date. Specifically, in Australia it is 23%; China is 80%; India 15%; Japan 16%; New Zealand 19%, Singapore 43%, Hong Kong 38%, South Korea 22%, Malaysia 2%, Philippines 15%, Taiwan 16%, Thailand 3% and Vietnam 7%. Among them, Indonesia alone has a 24% decrease in malware infection rate. The number of cyber attacks and the number of Vietnamese IP addresses in botnets increased in March 2021 due to hackers taking advantage of the increasing demand for Internet use by users as well as people&#8217;s interest in translation information. Covid-19. During the same period, the number of ransomware infections (a subset of malware) also increased by 453% in Australia; China (463%); India (100%); Japan (541%); New Zealand (825%); Singapore (296%), Hong Kong (179%), Indonesia (31%), South Korea (64%), Malaysia (72%), Philippines (70%), Taiwan (407%), Thailand (6%) ). This figure in Vietnam is recorded at 15%. In Vietnam, in March 2021 alone, the Information Security Administration recorded 491 incidents of cyber attacks on information systems, an increase of 8.15% compared to February 2021. In which, the number of Malware attacks is 180, while Phishing and Deface attacks are 164 and 147, respectively. In the first quarter of 2021, although compared to the same period in 2020, the number of cyberattacks causing problems on information systems decreased by 20%, but from the beginning of 2021 to now, the number of cyberattack incidents has decreased by 20%. is still in an uptrend. Experts believe that the reason for the increase in the number of cyberattacks and the number of Vietnamese IP addresses in botnets in March 2021 was because hackers took advantage of users&#8217; increasing demand for Internet use as well as the interest People&#8217;s attention to information about Covid-19 epidemic. Therefore, the number of Phishing and Malware attacks on systems has increased to cheat, destroy and steal information illegally&#8230; It can be seen that, in the context of complicated epidemic developments, when more and more organizations, businesses and individual users work remotely, work from home, they are creating an environment for bad guys to exploit vulnerabilities, Attacks, information theft, large-scale cyberattacks take place in Vietnam and around the world. <strong> ABOUT 3.5 MILLION SECURITY PROFESSIONALS IN 2021</strong> Experts say that even as more people begin returning to the office, hybrid work is forecast to remain the norm in the future. According to Forrester, as people gradually settle into a new working model after the pandemic, we will still see an increase in the proportion of employees working remotely compared to before the pandemic, at 300%. And the current Job Trends Index report shows that 53% of respondents in Asia plan to move to a new place because they can work remotely, compared to 46 percent globally. %. That change has been demanding an urgent need for new security solutions to meet the way of working, especially when the network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. Organizations and businesses need to take data and authentication as the center. While there are many other ways to secure these days, addressing identity, authentication, and information management issues is still critical. Experts have pointed out 4 main pillars to protect users against new work era cyber threats, including: identity protection, Zero Trust mindset, cloud application, and resource investment. security personnel. The network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. As recent attacks have shown, identity will be the &#8220;battlefield&#8221; for future attacks. Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal said that, in a world where identity is the new battleground, adopting a Zero Trust strategy has become a must for businesses. Karma. The hybrid workplace is virtually borderless, so it&#8217;s important to establish protective &#8220;barriers&#8221; around identities and devices. As part of his journey to building a Zero Trust mindset, the expert emphasized that “passwordless authentication will be the trend of the future and that transformation will be seen this year”. Besides the application of technology, experts also emphasize the special importance of people and skills in ensuring information security of each business organization. However, the lack of security professionals and the lack of diversity in security teams are two weaknesses that attackers will find to hit next year, the expert said. It is estimated that the information security industry will be short of about 3.5 million security professionals this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18353</post-id>	</item>
		<item>
		<title>Apple CEO has to appear in court for the first time</title>
		<link>https://en.spress.net/apple-ceo-has-to-appear-in-court-for-the-first-time/</link>
		
		<dc:creator><![CDATA[Ngọc Khánh]]></dc:creator>
		<pubDate>Sat, 22 May 2021 02:25:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advocate]]></category>
		<category><![CDATA[Antitrust]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[CEO]]></category>
		<category><![CDATA[Commission]]></category>
		<category><![CDATA[court]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[Epic Company]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[FORTNITE]]></category>
		<category><![CDATA[Friedrich Schiller]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Litigation]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[MACOS]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tim Cook]]></category>
		<category><![CDATA[Tim Sweeney]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[To appear in court]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-ceo-has-to-appear-in-court-for-the-first-time/</guid>

					<description><![CDATA[Tim Cook once had to answer questions from Congress about Apple&#8217;s market power, and now he faces litigation related to that issue in court. The iPhone maker&#8217;s CEO is due to appear on Friday morning as the company&#8217;s high-profile antitrust trial with Epic Games draws to a close. At the center of this long-running lawsuit [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Tim Cook once had to answer questions from Congress about Apple&#8217;s market power, and now he faces litigation related to that issue in court.</strong><br />
<span id="more-17210"></span> The iPhone maker&#8217;s CEO is due to appear on Friday morning as the company&#8217;s high-profile antitrust trial with Epic Games draws to a close.</p>
<p> At the center of this long-running lawsuit is Fortnite, a popular video game produced by Epic that was removed from Apple&#8217;s App Store last summer for violating Apple&#8217;s rules on technical billing. due to have arbitrarily established a payment system of their own. Apple takes 30% of the value of in-app purchases on iOS devices and does not allow the use of alternative payment systems. Fortnite&#8217;s removal from the App Store prompted Epic to file a lawsuit against Apple. <strong> Squeeze the developer</strong> Epic accuses Apple of having monopolistic control over the &#8220;ecosystem&#8221; of the iOS operating system, with app makers forced to abide by its strict restrictions if they want access to hundreds of thousands of users. million iPhone and iPad users, Apple also countered that there are several other places where users can buy apps and their commissions help the company make its devices better and more secure. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_21_119_38922528/64c9e9a1f2e31bbd42f2.jpg" width="625" height="375"> <em> The CEO has his first court appearance since taking power at Apple. Photo: Getty. </em> Several executives from both sides also testified, including Craig Federighi, Apple&#8217;s senior vice president of software engineering, and Phil Schiller, Apple&#8217;s former chief marketing officer, now serving as Apple&#8217;s senior vice president of software engineering. new role as Apple Fellow. Both were subpoenaed by the court earlier this week. Epic Games CEO Tim Sweeney is the first witness in the nearly three-week trial and is expected to end on Monday. Tim Cook and Apple are facing many dangers, not only this cult lawsuit. Cook&#8217;s testimony on Friday is likely to spark a battle against the growing antitrust pressure it is facing. Other &#8220;Frenemy&#8221; (meaning both friends and enemies) like Spotify and Match Group, the owner of Tinder, have all accused Apple of anti-competitive behavior. Even legal authorities in some countries including the US and UK have launched investigations into Apple&#8217;s regulations. Despite numerous defenses before Congress and numerous public appearances and interviews, Mr Cook appears to be preparing for his day in court. According to a report from <em> Wall Street Journal</em> , he spent many hours mock interrogation with former prosecutors to simulate what he might face during the trial. “The scary thing for Epic is that Tim Cook is such a compelling witness,” said Herbert Hovenkap, professor of legal studies and business ethics at the Wharton School of Business at the University of Pennsylvania. He&#8217;s doing what he&#8217;s been paid to do, which is bringing Apple&#8217;s lawsuit to the public.&#8221; According to the list of witnesses presented to the court, Mr. Cook will speak about “Corporate Values; Apple&#8217;s business operations and the development and launch of the App Store; the competition that Apple faces.” An Apple representative said Mr. Cook is likely to share more from his personal perspective on security and privacy issues &#8211; issues he has often criticized companies in the past &#8211; and the importance of them to Apple&#8217;s product philosophy. <strong> Roses come with quality</strong> Mr. Cook is expected to synthesize and strengthen the arguments that other Apple lawyers, experts and executives have made during the trial &#8211; that the iPhone&#8217;s App Store is not a proprietary trademark. The company argues that the 30% commission it receives through in-app purchases is not an illegal gain, but rather to make Apple devices better, more secure like their strict management of applications on Apple devices. In his testimony, Schiller highlighted the amount of money Apple has spent on research and development — an estimated $100 billion over the past 15 years — to make product improvements that developers are benefiting from. it. He also sought to counter Epic&#8217;s efforts to accuse Apple of being a monopolist. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_21_119_38922528/1c9890f08bb262ec3ba3.jpg" width="625" height="416"> <em> The lawsuit between Apple and Epic will determine the future of the relationship between app developers and Apple. Photo: Cnet. </em> Epic Games company says Apple is forcing developers to play by its draconian rules such as only using the App Store and means of paying for in-app purchases if it wants to gain access to a market of more than a billion dollars. iPhone and iPad users. (Michael Schmid, Apple&#8217;s head of game business development for the App Store, revealed during the trial that Apple made more than $100 million in commissions from Fortnite.) Schiller also listed a range of Apple competitors: Google, Samsung, Motorola, Huawei and even game consoles like Sony&#8217;s PlayStation, Microsoft&#8217;s Xbox and Nintendo&#8217;s Switch. Apple claims that many of these companies also take 30% commissions and have similar restrictions on outside apps. &#8220;There are still a lot of other competitors in the distribution of applications, not just Apple,&#8221; he added. Federighi, the company&#8217;s chief software officer, further emphasized the importance of Apple&#8217;s security measures for the iOS operating system on its mobile devices. He even heavily criticized the company&#8217;s MacOS computer operating system during the trial. Unlike iPhones, Macbook laptops allow the use and download of applications from outside, a process known as &#8220;side-loading&#8221;. Epic has repeatedly pointed out and called on Apple to emulate this approach with its mobile devices. However, Apple&#8217;s lawyers and executives argue that the iPhone needs to be more secure because the risk of the device being exposed to security holes and exploitation is great, especially when smartphones are used. often contain more sensitive personal data of users than other devices such as computers, laptops&#8230; “If you take Mac security techniques and apply them to the iOS ecosystem, with so many devices and value for it, things are going to be a lot worse than they already are. on Mac,” said Mr. Federighi. “We now have a bunch of malware on Mac, which is much worse than iOS. It&#8217;s not acceptable!&#8221;. Florian Ederer, an economics professor at the Yale School of Management, thinks Cook will stick to his earlier arguments. &#8220;It is very difficult to get any new information or arguments from this CEO&#8217;s testimony that have not yet been brought to the attention of the judge,&#8221; he said. “Basically, having Cook in court is Apple&#8217;s best move to show the judge that they are taking this matter completely seriously. If there is any other purpose, perhaps it is the respect of Cook in particular and Apple in general for this lengthy litigation process,&#8221; Ederer added.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17210</post-id>	</item>
		<item>
		<title>WhatsApp will block users if they don&#8217;t accept the new terms after May 15</title>
		<link>https://en.spress.net/whatsapp-will-block-users-if-they-dont-accept-the-new-terms-after-may-15/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Fri, 21 May 2021 19:00:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[accept]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[block]]></category>
		<category><![CDATA[Block out]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[call]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Isp]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[MESSENGER]]></category>
		<category><![CDATA[Mobile network]]></category>
		<category><![CDATA[policy]]></category>
		<category><![CDATA[Rules]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Terms]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[WHATSAPP]]></category>
		<guid isPermaLink="false">https://en.spress.net/whatsapp-will-block-users-if-they-dont-accept-the-new-terms-after-may-15/</guid>

					<description><![CDATA[After May 15, WhatsApp accounts that do not accept the new updated terms and policies will limit sending messages, calling or some other services. WhatsApp&#8217;s latest announcement about its new privacy policy, through which for accounts that do not agree to the new updated terms, WhatsApp will send continuous notifications to ask users to accept. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After May 15, WhatsApp accounts that do not accept the new updated terms and policies will limit sending messages, calling or some other services.</strong><br />
<span id="more-17074"></span> WhatsApp&#8217;s latest announcement about its new privacy policy, through which for accounts that do not agree to the new updated terms, WhatsApp will send continuous notifications to ask users to accept.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_08_11_38775650/9ff5c608db4a32146b5b.jpg" width="625" height="369"> <em> WhatsApp will block users who do not accept the new terms after May 15. Photo: WhatsApp</em> After May 15, people who bypass WhatsApp&#8217;s new privacy rules will result in that account being restricted from accessing the app and eventually not being able to view the list of chats and calls. voice or video. After a few weeks, that user will be blocked from all resources including sending messages, but the account has not been removed from the system. Within 120 days of receiving the notification and the user stops logging in, that account will be deleted, all data will still be available if the user syncs with Messenger. WhatsApp updated its new policy earlier this year, all users were informed that the service would share data with other Facebook companies. Many users just want their data shared as little as possible, as some reports suggest that WhatsApp is collecting and sharing data related to location, IP address, phone model, operating system, etc. Your operating system, browser, mobile network, ISP, or even information about how you&#8217;re texting, calling, groups you&#8217;re in, status, profile picture, or the last time the user was online. To use the application, users must accept the new WhatsApp terms. However, the 27 European countries will not be affected by this new policy thanks to a privacy law known as GDPA and users will not have their personal data shared with another 3rd party.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17074</post-id>	</item>
		<item>
		<title>E-waste recycling plays an important role in European security</title>
		<link>https://en.spress.net/e-waste-recycling-plays-an-important-role-in-european-security/</link>
		
		<dc:creator><![CDATA[H.Thủy (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Wed, 19 May 2021 18:20:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[BORON]]></category>
		<category><![CDATA[Cathode rays]]></category>
		<category><![CDATA[Cobalt]]></category>
		<category><![CDATA[Consumption]]></category>
		<category><![CDATA[Electric Car]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Ewaste]]></category>
		<category><![CDATA[Fluorescent]]></category>
		<category><![CDATA[important]]></category>
		<category><![CDATA[materials]]></category>
		<category><![CDATA[Play a role]]></category>
		<category><![CDATA[plays]]></category>
		<category><![CDATA[Printed Circuits]]></category>
		<category><![CDATA[Recycling]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[role]]></category>
		<category><![CDATA[Scrap]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Trash]]></category>
		<category><![CDATA[Turbine]]></category>
		<guid isPermaLink="false">https://en.spress.net/e-waste-recycling-plays-an-important-role-in-european-security/</guid>

					<description><![CDATA[Crucial raw materials in many electronics can be recycled and reused, helping to protect the supply of materials for Europe&#8217;s defense and consumer industries. The report calls for the development of legal requirements for the recycling and reuse of critical raw materials. (Source: voanews.com) A report by European Union The (EU)-backed study says the recovery [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Crucial raw materials in many electronics can be recycled and reused, helping to protect the supply of materials for Europe&#8217;s defense and consumer industries.</strong><br />
<span id="more-16251"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_293_38801083/fbce5b0c454eac10f55f.jpg" width="625" height="350"> </p>
<p> <em> The report calls for the development of legal requirements for the recycling and reuse of critical raw materials. (Source: voanews.com)</em> A report by <strong> European Union</strong> The (EU)-backed study says the recovery of rare materials from e-waste is a security requirement for Europe and should be legislated. According to the EU-funded CEWASTE report, critical raw materials – including gold, silver and cobalt in many electronics – can be recycled and reused. This will protect <strong> raw material supply</strong> for consumer electronics, even Europe&#8217;s defense industry. Even these rare materials are essential for wind turbines and electric cars. They therefore play an important role in helping countries meet climate protection goals and ensure competitiveness in manufacturing. However, the report notes that while supplies of these essential materials are vulnerable to geopolitical fluctuations, Europe is still too dependent on foreign supplies with recycling rates &#8220;close to equals 0.&#8221; According to the report, the low and volatile prices of many of these raw materials make recycling them often seen as too costly for businesses. The report calls for the development of regulatory requirements for the recycling and reuse of critical raw materials, financial incentives to support the industry, and increased control over the amount of e-waste that is exported. leave the EU. The report highlights some types of e-waste that have large enough raw materials to be recovered. These include printed circuit board materials from discarded electrical equipment; batteries from e-waste and scrap cars; iron boron neodymium magnets from hard drives and motors of electric bicycles, scooters and scrap cars; and fluorescent powder from cathode ray tubes and lamps in television sets and displays. CEWASTE says these materials are often present in very small quantities in individual categories, so they are often overlooked. For example, the report estimates that by 2025, the waste of fluorescent lamps in Europe will contain 92 tons of critical raw materials, while printed circuit boards in <strong> electronic waste</strong> of this area can hold up to 41 tons of silver and 10 tons of gold. The report states that the amount of the above material will be equivalent to that used to produce new items. A United Nations (UN) report shows that the world generated more than 50 million tons of e-waste in 2019. Much of this ended up in landfills and scrap yards. With an estimated 17% of electronic products being recycled, the UN says more than $55 billion worth of materials are wasted each year as the world has to extract more materials to make products. new./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16251</post-id>	</item>
		<item>
		<title>E-waste recycling &#8211; an urgent security issue for Europe</title>
		<link>https://en.spress.net/e-waste-recycling-an-urgent-security-issue-for-europe/</link>
		
		<dc:creator><![CDATA[Phương Oanh (TTXVN)]]></dc:creator>
		<pubDate>Wed, 19 May 2021 10:40:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[BORON]]></category>
		<category><![CDATA[Cathode rays]]></category>
		<category><![CDATA[Cobalt]]></category>
		<category><![CDATA[Consumption]]></category>
		<category><![CDATA[Defense industry]]></category>
		<category><![CDATA[Electric Car]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Europe]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Ewaste]]></category>
		<category><![CDATA[Fluorescent]]></category>
		<category><![CDATA[Industry]]></category>
		<category><![CDATA[issue]]></category>
		<category><![CDATA[Play a role]]></category>
		<category><![CDATA[Printed Circuits]]></category>
		<category><![CDATA[Recycling]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Scrap]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Trash]]></category>
		<category><![CDATA[Turbine]]></category>
		<category><![CDATA[Urgent]]></category>
		<guid isPermaLink="false">https://en.spress.net/e-waste-recycling-an-urgent-security-issue-for-europe/</guid>

					<description><![CDATA[In recent years, e-waste has become the world&#8217;s fastest growing household waste stream, mainly due to the increasing consumption rate of electrical and electronic equipment, while the life cycle of electronic devices is increasing. getting shorter and shorter. A recently published report shows that the recycling and recovery of precious elements from e-waste is considered [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In recent years, e-waste has become the world&#8217;s fastest growing household waste stream, mainly due to the increasing consumption rate of electrical and electronic equipment, while the life cycle of electronic devices is increasing. getting shorter and shorter.</strong><br />
<span id="more-16129"></span> A recently published report shows that the recycling and recovery of precious elements from e-waste is considered an urgent security issue that needs to be enacted into law in Europe.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_294_38802153/234e26365876b128e867.jpg" width="625" height="416"> <em> Workers work at an e-waste collection center in Ploufragan, western France. Photo: AFP/VNA</em> According to the European Union (EU) funded CEWASTE e-waste report, circuit boards, magnets in drives and electric vehicles, batteries and fluorescent lamps are among the items containing important raw materials. , including gold, silver and cobalt, can be recycled and reused. However, these rare materials often make up a very small percentage of each item thrown away, making them often overlooked. For example, the report estimates that by 2025, discarded fluorescent lamps in Europe will contain 92 tonnes of vital raw materials. Printed circuit boards in the region&#8217;s e-waste could contain up to 41 tons of silver and 10 tons of gold by 2025. Meanwhile, Europe&#8217;s supply chains have become &#8220;too vulnerable&#8221;, especially is the defense industry, as noted by Mr. Pascal Leroy &#8211; one of the authors of the report. The production of items in Europe, from computer systems to drones, is largely dependent on external supplies. As a result, the report highlights that recycling e-waste will help protect vital supplies for consumer electronics and even the European defense industry. In addition, with the materials needed to make wind turbines and electric cars, items that are discarded if recycled also play an important role in meeting climate change and environmental goals. improve the competitiveness of the manufacturing industry. The report also highlights some types of e-waste that are said to have sufficient raw materials to be recycled and recovered. These include printed circuit board materials obtained from discarded electronic equipment; batteries from e-waste and scrap cars; neodymium iron boron magnets from the hard drives and motors of electric bicycles and scooters, and fluorescent powder from lamps and cathode ray tubes found in televisions and television screens. The researchers found that many raw materials have low value and are volatile, meaning that recycling them is considered too expensive for businesses. The report therefore calls for legislation on the recycling and reuse of critical raw materials, financing to support the recycling industry, and better control of shipments of waste. e-waste is transported out of the EU. According to the &#8220;Global Electronic Waste Monitoring 2020&#8221; report published by the United Nations (UN) in July last year, in 2019, there were a total of 53.6 million tons of e-waste worldwide. , up 21% from 5 years ago. In which, Asia is the largest producer with about 24.9 million tons, followed by the Americas 13.1 million tons and Europe 12 million tons. Meanwhile, the amount of e-waste in Africa and Oceania is 2.9 and 0.7 million tons, respectively. Of the more than 53 million tons of e-waste generated, only 17% of the waste is recycled, with the rest going to landfills, incineration or simply not being treated. This means that an amount of rare materials such as gold, silver &#8230; worth up to 55 billion USD &#8220;presents&#8221; in e-waste that has been thrown away or burned instead of being collected for treatment. and reuse. Meanwhile, the exploitation of raw materials has been promoted in many countries to create new products, causing environmental concerns.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16129</post-id>	</item>
		<item>
		<title>The Ministry of Public Security has collected 43 million dossiers of citizen identification with chips</title>
		<link>https://en.spress.net/the-ministry-of-public-security-has-collected-43-million-dossiers-of-citizen-identification-with-chips-2/</link>
		
		<dc:creator><![CDATA[Đoàn Bổng]]></dc:creator>
		<pubDate>Wed, 19 May 2021 01:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Administrative procedures]]></category>
		<category><![CDATA[Chip mount]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[collected]]></category>
		<category><![CDATA[Colonel]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[Database management system]]></category>
		<category><![CDATA[dossiers]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Government Cipher Department]]></category>
		<category><![CDATA[ID]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Law on Citizenship Identification]]></category>
		<category><![CDATA[Look for information]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Network equipment]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Receive]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Simplify]]></category>
		<category><![CDATA[Social Order]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-ministry-of-public-security-has-collected-43-million-dossiers-of-citizen-identification-with-chips-2/</guid>

					<description><![CDATA[A representative of the Police Department for Administrative Management and Social Order (C06) of the Ministry of Public Security said that currently, local police have collected 43 million dossiers of citizen identification with chips for people. Regarding the implementation of the issuance of citizen identification cards (CCCD) with chips deployed by the Ministry of Public [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A representative of the Police Department for Administrative Management and Social Order (C06) of the Ministry of Public Security said that currently, local police have collected 43 million dossiers of citizen identification with chips for people.</strong><br />
<span id="more-15975"></span> Regarding the implementation of the issuance of citizen identification cards (CCCD) with chips deployed by the Ministry of Public Security, Colonel Phung Duc Thang, Deputy Director of C06 Department today (May 11), said that local police forces All over the country have collected records and issued 43 million CCCD with chip.</p>
<p> &#8220;According to the set goal of completing 50 million CCCD jobs before July 1, up to now, the progress of identity issuance has been ensured and the police forces of the provinces continue to make efforts to fulfill the set target. &#8220;, Colonel Thang said. The Deputy Director of C06 Department said that the issuance of CCCD with chip is part of the project to build a unified CCCD database nationwide, to collect and manage CCCD registration data automatically on public infrastructure. Information technology helps to store, retrieve, share and search information quickly and conveniently. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_23_38804690/4fa2ce19d05b3905604a.jpg" width="625" height="416"> <em> Soc Son district police force issued CCCD to attach chips to people</em> When the above project is put into operation, it will improve the efficiency of state management of CCCD, create favorable conditions for citizens while carrying out administrative procedures and civil transactions. The success of the project contributes to building e-Government, creating a breakthrough in socio-economic development of the whole country. In particular, this project contributes to effectively serving the fight against crime. &#8220;Provincial police across the country are working very responsibly to issue CCCD with chip, it is expected that on July 1, the system will be put into use, officially connected and shared with ministries and sectors to serve the needs of the public. handle administrative procedures,&#8221; said Colonel Thang. Previously, on February 25, the Ministry of Public Security officially pressed the button to open the national database system on population and production system, issue and manage citizen identification. Speaking at the ceremony, General To Lam, Minister of Public Security, emphasized that the national database system on population and the production system, granting and managing citizen identification is implemented in accordance with the Law on Basic Law. citizen fees, the overall scheme to simplify administrative procedures, citizenship papers and databases related to population management in the period 2013 &#8211; 2020. Regarding the implementation of the above two projects, the Ministry of Public Security said that it has worked closely with the Government Office, the Ministry of Information and Communications, the Government Cipher Committee, the Vietnam Posts and Telecommunications Group (the technology leader for the national database system on population) and other related units. The detailed design of the two systems was approved with the general principle of ensuring modernity, synchronization, high security and avoiding waste; design the citizen identification system according to the inheritance model to ensure maximum use of the national population database system, review and utilize the common infrastructure, network equipment, security, transmission infrastructure of the Ministry of Public Security&#8230; Regarding the collection, updating and editing of citizen information, after a period of implementation, up to now, the collection of population information has been basically completed nationwide, implementing many solutions to ensure information security. population accurately, regularly updated according to the principle of &#8220;right, enough, clean, live&#8221;. When the two systems come into operation, they will be the focal point for providing information about citizens, helping people, businesses and organizations to simplify and reduce administrative procedures. It is estimated that the annual cost savings of people and businesses when integrating and performing eight administrative procedures on the national public service portal is up to nearly 5,000 billion VND/year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15975</post-id>	</item>
		<item>
		<title>Alibaba&#8217;s rival, e-commerce giant JD officially enters the electric vehicle market</title>
		<link>https://en.spress.net/alibabas-rival-e-commerce-giant-jd-officially-enters-the-electric-vehicle-market/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 17 May 2021 22:14:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[Alibabas]]></category>
		<category><![CDATA[Automotive industry]]></category>
		<category><![CDATA[B2C]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Electric]]></category>
		<category><![CDATA[Electric Car]]></category>
		<category><![CDATA[Electrification]]></category>
		<category><![CDATA[Enters]]></category>
		<category><![CDATA[Fever]]></category>
		<category><![CDATA[giant]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[market]]></category>
		<category><![CDATA[officially]]></category>
		<category><![CDATA[Penetrate in]]></category>
		<category><![CDATA[rival]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Series EASY]]></category>
		<category><![CDATA[Tram]]></category>
		<category><![CDATA[Vehicle]]></category>
		<category><![CDATA[Volkswagen]]></category>
		<guid isPermaLink="false">https://en.spress.net/alibabas-rival-e-commerce-giant-jd-officially-enters-the-electric-vehicle-market/</guid>

					<description><![CDATA[JD officially signed with Enovate, becoming the latest Chinese Internet company to join the smart electrification craze that is changing the auto industry day by day. Chinese e-commerce giant JD will install integrated payment and voice recognition tools into electric vehicle startup Enovate, aiming to break into the already fiercely competitive electric vehicle market. This [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>JD officially signed with Enovate, becoming the latest Chinese Internet company to join the smart electrification craze that is changing the auto industry day by day.</strong><br />
<span id="more-15627"></span> Chinese e-commerce giant JD will install integrated payment and voice recognition tools into electric vehicle startup Enovate, aiming to break into the already fiercely competitive electric vehicle market.</p>
<p> This is part of the agreement the two signed last Friday. The deal will see JD become the latest Chinese Internet company to join the smart electrification craze that is transforming the auto industry day by day. Enovate said both sides will also work on digital marketing to get the startup up and running as soon as possible. &#8220;We will share resources in a number of different aspects, from branding and products to users and channels of distribution and consumption,&#8221; said Yu Songyao, senior executive at Enovate. . <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_365_38812435/36a2dbe2c5a02cfe75b1.jpg" width="625" height="416"> <em> A new energy Enovate sedan attracts the attention of visitors at the Guangzhou auto show.</em> JD, also known as Jingdong and formerly 360buy, is a Chinese e-commerce company headquartered in Beijing. The company is one of two giant B2C retailers in China by transaction volume and revenue, a member of Fortune Global 500. In other words, JD is the 2nd largest e-commerce company in China, just behind Alibaba. Forging partnerships with big internet companies is crucial, analysts say, as the chance to stand out is slimmer for lesser-known startups. Early adopters like Tesla and Nio are gaining ground, traditional carmakers including Volkswagen are also launching their own electric cars, so the door for latecomers is closing. quickly, must really try and be quick. Statistics show that Nio sold 20,060 vehicles in the first three months of this year, up 422.7 percent year-on-year. Volkswagen said it expects to sell 100,000 electric vehicles in China this year. Late last month, Nezha, another little-known electric car startup, announced a partnership with Chinese internet security company Qihoo 360. The company will become the second largest shareholder as it leads Nezha&#8217;s 3 billion yuan ($467 million) Series D fundraising effort. According to analysts, Internet security is becoming an essential issue as vehicles get smarter and 360 Security is seeking this investment to open up a platform for its products. on smart cars. Nezha CEO Zhang Yong said Qihoo 360 will provide the startup with technical help and facilitate financing for the company. &#8220;For us, the top task now is survival,&#8221; Zhang said. Founded in 2014, Nezha has sold more than 35,000 vehicles across its two car models. The company&#8217;s sales in the first quarter of 2021 increased fivefold, to more than 7,400 vehicles. <strong> Optional</strong> Toyota &#8220;knock down&#8221; Hyundai from the top position in the electric vehicle market</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15627</post-id>	</item>
		<item>
		<title>Need ready technical infrastructure, human resources and focus on security</title>
		<link>https://en.spress.net/need-ready-technical-infrastructure-human-resources-and-focus-on-security/</link>
		
		<dc:creator><![CDATA[Theo Vũ My/qdnd.vn]]></dc:creator>
		<pubDate>Sun, 16 May 2021 20:50:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[approved]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Deployment]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Goods]]></category>
		<category><![CDATA[human]]></category>
		<category><![CDATA[Human Resources]]></category>
		<category><![CDATA[infrastructure]]></category>
		<category><![CDATA[Licensing]]></category>
		<category><![CDATA[Load]]></category>
		<category><![CDATA[Military Telecom Corporation]]></category>
		<category><![CDATA[Mobifone]]></category>
		<category><![CDATA[Mobile Money]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pilot]]></category>
		<category><![CDATA[ready]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[technical]]></category>
		<category><![CDATA[Telecommunication]]></category>
		<category><![CDATA[Telecommunications business]]></category>
		<category><![CDATA[The bank of Viet Nam]]></category>
		<category><![CDATA[Valuable]]></category>
		<guid isPermaLink="false">https://en.spress.net/need-ready-technical-infrastructure-human-resources-and-focus-on-security/</guid>

					<description><![CDATA[Telecommunications enterprises (DNVTs) that are eligible to pilot the Mobile Money service (using telecommunications accounts to pay for goods of small value) such as: Military Industry-Telecommunications Group (Viettel), Viettel Group The Vietnam Posts and Telecommunications Group (VNPT) and MobiFone Telecommunications Corporation have sent a dossier requesting the pilot service to the State Bank of Vietnam [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Telecommunications enterprises (DNVTs) that are eligible to pilot the Mobile Money service (using telecommunications accounts to pay for goods of small value) such as: Military Industry-Telecommunications Group (Viettel), Viettel Group The Vietnam Posts and Telecommunications Group (VNPT) and MobiFone Telecommunications Corporation have sent a dossier requesting the pilot service to the State Bank of Vietnam for consideration and appraisal.</strong><br />
<span id="more-15110"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_241_38820344/d4e8d107ce45271b7e54.jpg" width="625" height="460"> </p>
<p> <em> Illustration. Source: Internet.</em> Implementing an effective Mobile Money pilot requires readiness in terms of technical infrastructure, technology, human resources, finance and moreover, the security issue cannot be taken lightly. <strong> Ready to &#8220;enter&#8221; Mobile Money</strong> Mobile Money service helps people, especially in remote and isolated areas, have more means of non-cash payment, especially for small expenditures under 100,000 VND. People will be able to withdraw and top up money at telecommunications transaction points or business transaction points authorized by DNVT as a legal entity. Sharing about Viettel&#8217;s preparation to deploy Mobile Money service, Deputy General Director of Viettel Digital Services Corporation, Major Truong Quang Viet said: &#8220;Viettel has successfully tested Mobile Money for 40,000 customers. internally, ready to provide services to 100% of Viettel customers In addition, we have a set of knowledge ready to train for Mobile Money transaction points, so as soon as it is approved by the authorities , all transaction or payment acceptance points of Viettel have a certain understanding of Mobile Money to support users.Besides, Viettel also prepares a 24/7 customer care system for advice and answers. all customer inquiries. Preparing to enter a completely new field, Deputy General Director of MobiFone Telecommunications Corporation Bui Son Nam informed: MobiFone established MobiFone Digital Service Center and prepared the entire technical infrastructure to ensure deploy Mobile Money as soon as the Government allows. Commenting on the advantages of operators when implementing Mobile Money, Deputy Director of the Department of Telecommunication (Ministry of Information and Communications) Tran Duy Hai said: &#8220;Thanks to taking advantage of the telecommunications network infrastructure and transaction points on the Internet. Nationwide, DNVT has many advantages when deploying this service, however, the implementation process also faces certain difficulties such as: Changing user habits or DNVT previously only stopped at deploying e-wallets, now the network will be expanded and deployed to remote areas, accompanied by requirements for risk prevention and control, ensuring the safety of money in the account, and anti-money laundering &#8230; &#8220;. <strong> Security comes from both sides</strong> As a non-cash payment activity, one of the biggest concerns of users when using Mobile Money is information security and safety. Regarding this issue, according to Deputy Director Tran Duy Hai: In the Prime Minister&#8217;s decision to allow pilot service, the pilot enterprise must have a system that meets the requirements of ensuring system safety. Level 3 information in accordance with current law. In addition, there must be a system to store the arising Mobile Money transaction history; at the same time, there must be a backup copy of archival information in service of inspection, examination and information provision upon request from competent state management agencies. For accounting documents, enterprises conducting the pilot must store them in accordance with the provisions of the Law on Accounting,&#8230; From the point of view of a cybersecurity expert, Deputy Chief Technology Officer of Vietnam Cybersecurity Technology Joint Stock Company Ngo Quoc Vinh also gave warnings about security when people in remote areas approach Mobile. Money. The reason is that people in this area do not have knowledge about network security as well as have no conditions to equip measures to protect equipment or personal data. Cybercriminals will take advantage of that and be well-prepared to target financial theft. Specifically, making the most of fake websites, messages, and information to reach users. Mr. Ngo Quoc Vinh also said that in order to be licensed, service providers must comply with and equip a series of security architectural solutions at the request of the State. Therefore, what businesses need to do is to continuously strictly maintain the state of the system to ensure information security to the highest level. At the same time, continuously improve the security level for users&#8217; terminals when using the service. Meanwhile, users themselves must raise awareness that digital assets are targets for cybercriminals to exploit personal data and steal assets. Users need to follow instructions and directions from authorities in the field of information security. When they comply with that regulation and raise their awareness, the ability to prevent and combat risks will increase. Major Truong Quang Viet said: Viettel has experience in deploying telecommunications services to 70 million users, deploying e-wallets in 6 markets around the world. ViettelPay digital ecosystem is the infrastructure for Viettel to deploy Mobile Money. ViettelPay has ensured that security related regulations meet the world&#8217;s leading standards. Besides, Viettel has a network security company that protects users from attacks on the system or stealing accounts. Referring to measures to prevent money laundering, Viettel&#8217;s representative said that this enterprise applies big data technology and artificial intelligence to ensure the detection of all unusual transactions. Responding to users&#8217; concerns when the Mobile Money service only transfers within one provider, Deputy Director Tran Duy Hai explained: &#8220;Mobile Money accounts can only pay with internal accounts in telecommunications carriers. registration, there is no cross-linking between carriers to help limit risks that may arise during the testing process.After a period of implementation of technical solutions along with evaluation of the results of the test implementation process. point, internetwork can be suggested&#8221;.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15110</post-id>	</item>
		<item>
		<title>Ensuring the security of the southernmost tourist land of Phu Yen</title>
		<link>https://en.spress.net/ensuring-the-security-of-the-southernmost-tourist-land-of-phu-yen/</link>
		
		<dc:creator><![CDATA[Phan Thế Hữu Toàn]]></dc:creator>
		<pubDate>Fri, 14 May 2021 20:22:13 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[Bai Chua]]></category>
		<category><![CDATA[Ca Pass]]></category>
		<category><![CDATA[Contemplate]]></category>
		<category><![CDATA[Dai Lanh Mountain]]></category>
		<category><![CDATA[Dien Cape Lighthouse]]></category>
		<category><![CDATA[Electric Cape]]></category>
		<category><![CDATA[ensuring]]></category>
		<category><![CDATA[Historical sites]]></category>
		<category><![CDATA[Ho Dac Thanh]]></category>
		<category><![CDATA[Hoa Tam]]></category>
		<category><![CDATA[Ice Beer]]></category>
		<category><![CDATA[K60]]></category>
		<category><![CDATA[land]]></category>
		<category><![CDATA[Le Van Them]]></category>
		<category><![CDATA[Phu]]></category>
		<category><![CDATA[Phu Yen]]></category>
		<category><![CDATA[Scenic spots]]></category>
		<category><![CDATA[Seals]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Southern Phu Yen]]></category>
		<category><![CDATA[southernmost]]></category>
		<category><![CDATA[Stone Mountain]]></category>
		<category><![CDATA[Thach Bi Son]]></category>
		<category><![CDATA[tourist]]></category>
		<category><![CDATA[Vung Ro Bay]]></category>
		<category><![CDATA[Vung Ro Wharf]]></category>
		<category><![CDATA[Yen]]></category>
		<guid isPermaLink="false">https://en.spress.net/ensuring-the-security-of-the-southernmost-tourist-land-of-phu-yen/</guid>

					<description><![CDATA[The active efforts of the Dong Hoa Town Police to ensure the stability of information security and tourism security have contributed to attracting domestic and foreign tourists to visit and enjoy 3 historical sites and national landscapes in the place. This increases every year. For many years, Dong Hoa town police have always actively coordinated [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The active efforts of the Dong Hoa Town Police to ensure the stability of information security and tourism security have contributed to attracting domestic and foreign tourists to visit and enjoy 3 historical sites and national landscapes in the place. This increases every year.</strong><br />
<span id="more-14378"></span> For many years, Dong Hoa town police have always actively coordinated with functional agencies and local authorities to create an attractive, friendly and safe destination for tourists at 3 historical sites and national scenic spots. Da Bia mountain in Dai Lanh mountain range, Vung Ro digital ship historical relic site in Vung Ro bay and Mui Dien national scenic spot, where this is a tourist area to explore spectacular scenery, bold nature associated with unique legends, attracting domestic and foreign tourists.</p>
<p> Passing the Ca pass on the trans-Vietnam traffic artery connecting the two provinces of Phu Yen &#8211; Khanh Hoa with the majestic landscape by winding roads on the back of the Truong Son mountain range, reaching out to the sea. Looking up at the top of the mountain, visitors can see Da Bia, also known as Thach Bi Son &#8211; a national scenic spot located at an altitude of 706m above sea level. There is a giant stone block, 76m high, towering up to the sky. Legend has it that 550 years ago, during the journey to the South, King Le Thanh Tong sent soldiers to engrave letters on Da Bia in the spring of Tan Mao &#8211; 1471. When passing the Ca pass in the middle of the 19th century, the Nguyen Dynasty mandarin Phan Thanh Gian looked on. On the stone stele in memory of King Le Thanh Tong, he wrote a poem in Chinese, which was translated: &#8220;<em> The first piece of rock is erected / The floor is lofty in one direction / Splitting the bank with the Han column / Chasing the enemy to stay on the road / The letter of the cloud is lucid / The god uses the mirror / Touching the stele of the person who is gone / The traveler feels pity</em> &#8220;. In order to exploit the potential of cultural tourism of the sacred mountain, the road of more than 200 steps to Da Bia, weaving through the forest, has been built since 2000 and has attracted many groups of tourists and sports climbing. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_5_38579541/98c4ec81c8c3219d78d2.jpg" width="625" height="376"> <em> Police of Dong Hoa town cooperated with Hoa Hiep Nam Border Guard Station to patrol to ensure security and order at Mui Dien national scenic spot.</em> East of Da Bia is the Mui Dien lighthouse built by the French in 1890 and is one of the two points on the mainland of Vietnam to welcome the earliest dawn. From the top of Ca Pass, looking down is the emerald green Vung Ro bay. During the war, that place used to be the destination of 3 unnumbered trains transporting weapons to the South Central Coast &#8211; Central Highlands battlefield, commanded by Captain Ho Dac Thanh and awarded the title Hero of the Armed Forces. People&#8217;s page 2011. On the night of February 15, 1965, the fourth unnumbered train commanded by Captain Le Van Them transported 63 tons of weapons to Vung Ro wharf. After unloading all weapons ashore, the ship was about to leave the wharf when there was a technical problem, when the repair was completed, the sky was clear, so it had to spread a net, covering the hull with forest leaves to form a &#8220;mountain&#8221;. Bai Chua. By chance, enemy aircraft discovered the &#8220;mountain&#8221; different from the previous aerial photos, so they mobilized planes to shoot rockets and missiles, causing the camouflage leaf to burn, and ship 143 to appear. The local K60 company and the crew on board the unnumbered ship detonated explosives and sank the ship, creating a &#8220;historic event in Vung Ro&#8221;. In order to proactively ensure security and contribute to socio-economic development, Dong Hoa town police not only strengthen regular police in Hoa Xuan Nam and Hoa Tam communes, but also select and propose to appoint The Chief and Deputy of the Commune Police are dynamic officers who have held positions in professional teams, have a lot of experience and a high sense of responsibility. On the other hand, professional teams of Dong Hoa Town Public Security regularly follow the grassroots area, coordinate with the police of two communes of Hoa Xuan Nam, Hoa Tam and Vung Ro Border Gate Border Guard Station and Hoa Hiep Nam Border Guard Station. , implemented a plan to patrol, protect border security and sovereignty, combined with advising the Party committees and local authorities to firmly build the All people movement to protect national security, so for more than a year this area has not been a felony occurs; Tourists visit and explore national monuments and landscapes to ensure security &#8211; safety. Besides, each year, Hoa Xuan Nam Commune Police also coordinate with Vung Ro Border Gate Border Guard Station and other functional agencies to ensure the security and safety of cargo transport and liquefied gas transshipment at Vung Ro port. ; at the same time guiding, inspecting and supporting hundreds of fishing boats of fishermen and dozens of domestic and foreign shipping vessels anchoring to avoid storms; contributing to the safety of road tunnels and Ca Pass railway tunnels on the lifeblood of trans-Vietnam traffic&#8230; Mr. Nguyen Van Tinh, Deputy Secretary of the District Party Committee, Vice Chairman in charge of the People&#8217;s Committee of Dong Hoa Town shared: &#8220;The active efforts of the Dong Hoa Town Police have contributed to the stability of information security and tourism security. attracting domestic and foreign tourists to visit and enjoy 3 historical sites and national scenic spots in this place increasing every year. One more thing worth noting is that local people not only change their thinking about economic development associated with ecotourism services, but also raise awareness of security protection, protection of historical relics and national landscapes. Therefore, the southernmost land of Phu Yen has been moving well, developing the forest-sea economy associated with the tourism economy &#8230; &#8220;.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14378</post-id>	</item>
		<item>
		<title>Beware of technology trends</title>
		<link>https://en.spress.net/beware-of-technology-trends/</link>
		
		<dc:creator><![CDATA[TẤN BA]]></dc:creator>
		<pubDate>Fri, 14 May 2021 18:05:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Remote Control]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smarthome]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Webcam]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-technology-trends/</guid>

					<description><![CDATA[Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys. Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys.</strong><br />
<span id="more-14322"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_17_38824516/32fb83389c7a75242c6b.jpg" width="625" height="408"> </p>
<p> Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the router&#8217;s firmware and always use a complex password for the wifi router. If the router manufacturer does not provide new firmware, users should consider replacing it. Just like not checking your bank account from public wifi, homeowners should avoid accessing smarthome from an open wifi network, but if you need to remotely access your home, use a private network. Using a separate wifi for smart home systems is necessary because sharing a wifi system has many potential safety risks. Smarthome prioritizes the system to be able to self-alert to abnormal intrusion to ensure safety, so users should use devices with automatic alarm setting feature. When there is an unusual intrusion, a notification will be sent to the homeowner&#8217;s phone immediately. In smarthome, not only home lock, smart home control applications need abnormal login warning feature, this helps homeowners recognize the risk of network attack to implement instant protection options. then. In a smart home, if there is a smart speaker with a screen or camera, users should consider turning off or covering the camera when there is no need to use it. This is similar to the fact that many people have a habit of covering the webcam on their laptop to avoid unfortunate images being recorded. Smart devices of unknown origin are at risk of being installed with spyware, which is easy to lose control and have data stolen. To be safe, it is recommended to use equipment from reputable companies, need to check the company history, product support period. From this information, a decision can be made whether to buy the product or not. And more specifically, it is very important to check the owner of the servers that will contain his home&#8217;s information because most smarthome devices used in the home communicate with servers in the cloud. In the process of studying the operation of the smart home control system, security experts have discovered serious security holes. Security flaws in the cloud infrastructure and remote code execution, causing a third party to acquire the &#8220;super user&#8221; right to access and control the smart home system. Immediately, the above findings were shared with smart home providers to immediately address these dangerous security holes. With a smart home, each device inserted into the smarthome can also be a point for network attackers to take advantage of, intrude on the home system &#8230;, so smart home security is very necessary for those who want Design your own smart home.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14322</post-id>	</item>
		<item>
		<title>Hacked AirTags can lead users to malicious websites</title>
		<link>https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</link>
		
		<dc:creator><![CDATA[Thục Anh (TH)]]></dc:creator>
		<pubDate>Thu, 13 May 2021 13:19:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[AirTags]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Jailbreak]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost Mode]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Microcontrollers]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Thomas Roth]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Use]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Video sharing]]></category>
		<category><![CDATA[Wallet]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</guid>

					<description><![CDATA[A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device. Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230; With Lost Mode enabled, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device.</strong><br />
<span id="more-13793"></span> Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230;</p>
<p> With Lost Mode enabled, AirTag will send out a signal to one of the billions of Apple devices around the globe, then send a notification about the user&#8217;s iPhone to they visit Apple&#8217;s location site (found.apple.com) so that users know the AirTag&#8217;s location. Researcher Thomas Roth recently shared a video of his work on AirTag&#8217;s performance and progress. Specifically, when the owner of AirTag turns on the loss of device notification, if an iPhone is near, the iPhone will be prompted to visit the page &#8220;found.apple.com&#8221;. However, with the affected AirTag, the iPhone displayed the researcher&#8217;s website. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_236_38813981/c3d01e8300c1e99fb0d0.jpg" width="625" height="351"> <em> AirTag is a newly launched accessory from Apple</em> Thomas Roth said he hacked into AirTag&#8217;s microcontroller, then &#8220;flashed&#8221; the component again to modify the device&#8217;s performance. It took hours to run and caused two AirTags to fail, before succeeding. However, to perform the hack shown by Thomas Roth is not easy, as hackers need to intervene directly in the AirTag without the user&#8217;s discovery. But this is proof that AirTag has been hacked and can intervene, similar to the form of &#8220;jailbreak&#8221; on the iPhone, which means that a device as compact as AirTag also poses a potential security risk. security, requires Apple to have solutions to enhance security on its device.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13793</post-id>	</item>
		<item>
		<title>Apple tells the rest of the world how secure and transparent the App Store is</title>
		<link>https://en.spress.net/apple-tells-the-rest-of-the-world-how-secure-and-transparent-the-app-store-is/</link>
		
		<dc:creator><![CDATA[Theo Sina Technology]]></dc:creator>
		<pubDate>Thu, 13 May 2021 08:33:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Ecosystem]]></category>
		<category><![CDATA[EPIC]]></category>
		<category><![CDATA[Epic Games]]></category>
		<category><![CDATA[FORTNITE]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Legislator]]></category>
		<category><![CDATA[rest]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Store]]></category>
		<category><![CDATA[Submit]]></category>
		<category><![CDATA[tells]]></category>
		<category><![CDATA[The rest]]></category>
		<category><![CDATA[transparent]]></category>
		<category><![CDATA[World]]></category>
		<guid isPermaLink="false">https://en.spress.net/apple-tells-the-rest-of-the-world-how-secure-and-transparent-the-app-store-is/</guid>

					<description><![CDATA[The announcement is Apple&#8217;s latest counterattack in response to exclusive claims, including the lawsuit from Epic Games and the attention of lawmakers. Photo: Sina Technology According to CNBC, Apple today released a report on its App Store-related data, mainly describing the work the App Store has done in the direction of security and fraud prevention [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The announcement is Apple&#8217;s latest counterattack in response to exclusive claims, including the lawsuit from Epic Games and the attention of lawmakers.</strong><br />
<span id="more-13713"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38813425/240aa55fbb1d52430b0c.jpg" width="625" height="312"> </p>
<p> <em> Photo: Sina Technology </em> According to CNBC, Apple today released a report on its App Store-related data, mainly describing the work the App Store has done in the direction of security and fraud prevention over the past year, and published a lot of related data. This is the first time Apple publishes such data, in this report, Apple does not point out what they bring to developers and users, but what they refuse to ensure safety and experience. App Store experience. <strong> Denied 1 million applications</strong> Since its inception in 2008, the Apple App Store has become the world&#8217;s largest distribution channel and app download platform. According to official data, up to now, there are a total of 1.8 million apps distributed on the app store in 175 different countries and regions around the world. In addition to the quantity, quality and safety of the App Store are also important reasons for many to choose, and even the reason why users switch from Android to iPhone. But the average user rarely thinks behind millions of apps is Apple&#8217;s attempt to secure apps on the platform. In fact, security threats have existed since the App Store was launched in 2008, and are becoming more sophisticated as the App Store has grown. Of course, Apple is also working to raise and improve its own security standards. In order for high-quality apps to be listed on the App Store and for developers and users to have the best experience, behind that is the efforts of the Apple App Store review team, including machines (the program AI detects), but Apple believes humans are the last line of defense. On the one hand, the review team develops relevant guidelines and is constantly updating to measure if an app meets Apple&#8217;s security standards at launch. On the other hand, many developers have encountered the case of having to submit apps multiple times before they hit the shelves, behind this being the tight scrutiny of Apple&#8217;s review team. The reason may be because their application is incomplete / not good enough or not satisfied Apple with the security requirements. In 2020, Apple&#8217;s app review team supported 180,000 new developers to bring their work to the App Store for the first time; However, due to the stringent app store rating criteria, many applications were rejected. According to Apple&#8217;s disclosure, they rejected 1 million new apps and 1 million app update requests last year. Let&#8217;s take a closer look at the apps that were denied on the list, partly because of a breach; There were also 215,000 applications rejected for asking for too much user data on mobile phones; 48,000 apps were rejected because they contained hidden functions, 150,000 apps were rated as spam or otherwise copied apps. All will affect the quality of the apps in the App Store in varying degrees, thereby affecting the user experience. These numbers represent Apple&#8217;s ambition to pursue its own high-quality app store and ecosystem, and is also the reason why many Android users &#8220;admire&#8221; the iOS ecosystem as mentioned above. . <strong> &#8220;Stone&#8221; 470,000 toxic developers</strong> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38813425/e6b97cec62ae8bf0d2bf.jpg" width="625" height="351"> Apple CEO Tim Cook speaks at the Apple Worldwide Developers Conference (WWDC) at the San Jose Convention Center in 2018. In addition to denying apps, Apple sometimes punishes developers for violating the rules. For example, some developers intentionally change application functionality after passing a review or even engaging in criminals / crimes. The most common are gambling-related apps, illegal lending, and pornography; there are even apps for drug trafficking, sex chat, and more. According to Apple data, by 2020, about 95,000 apps will be removed from the App Store due to fraud and fraud. If a developer&#8217;s violation is severe or recurring, their account will be permanently closed. In 2020, Apple terminated 470,000 developer accounts because of the risk of fraud. In the past month alone, Apple blocked more than 3.2 million app installs through the Apple Developer Enterprise Program. The original purpose of this project was to allow large organizations like companies and businesses to develop apps for internal use only, not open to the public. But some people use this approach to &#8220;bypass&#8221; the internal application review and abuse process. Of course, no matter how tight the controls are, it&#8217;s inevitable that there are up to 1.8 million apps on the App Store. Apple has also opened up a feedback mechanism, users or developers can choose to &#8220;report a problem&#8221; function in the App Store or call Apple support. <strong> Stop $ 1.5 billion in fraud suspected transactions</strong> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38813425/fae86cbd72ff9ba1c2ee.jpg" width="625" height="327"> Problem <em> security of</em> Android is often compared with <em> Apple.</em> Since the Apple ID is tied to the payment account and is the &#8220;key&#8221; of the Apple ecosystem, it is also very easy to become a target for criminals. As a result, Apple is building more secure payment technologies, such as Apple Pay and StoreKit. Currently, more than 900,000 apps in the App Store are using these technologies to sell goods and services. For example, credit card information in Apple Pay won&#8217;t be shared with the merchant (and the merchant won&#8217;t see it), which eliminates risk factors in the checkout process. However, criminals can also use the App Store to purchase goods and services for money laundering or other improper purposes. According to official data, by 2020, Apple prevented more than 3 million stolen credit cards from being used to purchase goods or services through technical means + manual review. In addition, they block more than $ 1.5 billion in &#8220;potentially fraudulent transactions&#8221;. The revelation comes amid Epic Games&#8217; antitrust lawsuit against Apple and focuses on the App Store failures. The Fortnite maker is looking to force Apple to remove 30% of the commission on in-app purchases. Epic lawyers have argued that Apple&#8217;s App Store is too &#8220;wall-bound,&#8221; hindering app makers from competing, and that Apple&#8217;s rules are unevenly applied to different developers. . The lawsuit filed by Epic Games calls for changes to the existing app review process and the use of other in-app payment systems. Epic also says Apple&#8217;s process is unfair, sometimes approving malware in the store. Apple employees argued in court that the number of errors it made was very small given the size of the App Store. Apple also strongly denies the abuse of market power, saying that the lawsuit Epic filed with is an &#8220;attack&#8221; on a business model that benefits developers as well as consumers. Apple has protected the App Store as an essential part of its business. Last week, an Apple lawyer argued that allowing users to install software from outside the App Store, like Android, creates a security risk and that Apple doesn&#8217;t want to be Android.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13713</post-id>	</item>
		<item>
		<title>What information should not be shared on social networks?</title>
		<link>https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</link>
		
		<dc:creator><![CDATA[Khánh Linh]]></dc:creator>
		<pubDate>Wed, 12 May 2021 21:26:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Baby boomers]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[networks]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Potential]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Root]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[social]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[Take advantage]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-information-should-not-be-shared-on-social-networks/</guid>

					<description><![CDATA[The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users. Users need to be cautious before providing personal information on social networks. According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The more information you share, the easier it is for cybercriminals to collect data. This poses the risk of network attacks targeting the privacy of users.</strong><br />
<span id="more-13505"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/94598b8877cb9e95c7da.jpg" width="625" height="351"> </p>
<p> <em> Users need to be cautious before providing personal information on social networks. </em> According to Kaspersky&#8217;s &#8220;Building our place in the digital reputation economy&#8221;, social media users in Southeast Asia have become more aware of online risks. Netizens in Southeast Asia do not want to share identity information, family directly, where they live and work on their personal pages. Up to 76% of survey participants do not want to upload financial information online. This percentage is highest among Baby Boomers (people born two decades after World War II), accounting for 85%. Gen Z &#8211; the youngest generation &#8211; is the group with the lowest rate at 68%. Judging by the current tendency of young people to be more open to sharing information on cyberspace, Kaspersky believes that this is the main driver of the development of electronic payments in the region. However, this also poses a risk when young users do not pay much attention to information security. To best ensure privacy on social networks, especially financial information and personal data, Kaspersky has made a number of recommendations to users. The first is not to publish travel information, not to disclose too much personal information such as date of birth or workplace in the profile section. You should also not post your home address or phone number on any public forum. Second, you should check automatic positioning settings in posts, don&#8217;t share location publicly if it&#8217;s not absolutely necessary. Third, you should not participate in the quiz that appears on social networks. Usually, these games silently extract personal information with simple questions. That is the information commonly used in security questions. If you provide too much, hackers can use them to break into online accounts. Fourth, be wary of the contest or winning information, because they pose the risk of disguising fraud. If you share it on social media, you could inadvertently spread malicious code or pave the way for the disclosure of sensitive data. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_309_38809575/dbeeadffb1bd58e301ac.jpg" width="625" height="474"> Hackers can take advantage of security holes on mobile devices to steal information. Artwork: BS <strong> Raise awareness about mobile device security</strong> According to a Kaspersky report, 71% of survey respondents in Southeast Asia use passwords to protect their mobile devices. However, just over half of them check and change privacy settings regularly and have internet security software installed on their devices. In order to keep financial information and personal data on your device safe, you need to take note of the following recommendations. Specifically, the most basic security method is to lock your phone with a password that is difficult to guess and update the system regularly. You absolutely do not jailbreak or root your phone. This can pave the way for hackers to enter the system and install malicious code. You should only use licensed and verified apps and games on reputable app stores. An application capable of remotely erasing data is also recommended, making it easy to erase information in case your phone is stolen.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13505</post-id>	</item>
		<item>
		<title>FlexXon introduces the X-PHY SSD with AI security</title>
		<link>https://en.spress.net/flexxon-introduces-the-x-phy-ssd-with-ai-security/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Mon, 10 May 2021 23:33:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aimed at]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CD driver]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Flash memory]]></category>
		<category><![CDATA[FlexXon]]></category>
		<category><![CDATA[Format]]></category>
		<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Introduce]]></category>
		<category><![CDATA[introduces]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[NAND]]></category>
		<category><![CDATA[PCI Express]]></category>
		<category><![CDATA[Physical]]></category>
		<category><![CDATA[Protection mechanism]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Snake]]></category>
		<category><![CDATA[SSD]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[XPHY]]></category>
		<guid isPermaLink="false">https://en.spress.net/flexxon-introduces-the-x-phy-ssd-with-ai-security/</guid>

					<description><![CDATA[X-PHY SSD is equipped with intelligent AI security feature, which can protect itself by physical attacks aimed at hardware devices. FlexXon introduces the X-PHY SSD with AI security. Photo: Flexxon Flexxon is a security company based in Singapore, specializing in the design, manufacture and retail of industrial NAND flash memory and storage devices. Flexxon also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>X-PHY SSD is equipped with intelligent AI security feature, which can protect itself by physical attacks aimed at hardware devices.</strong><br />
<span id="more-13006"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_11_38783709/a098911b8c5965073c48.jpg" width="625" height="830"> </p>
<p> <em> FlexXon introduces the X-PHY SSD with AI security. Photo: Flexxon </em> Flexxon is a security company based in Singapore, specializing in the design, manufacture and retail of industrial NAND flash memory and storage devices. Flexxon also offers leading memory solutions ensuring the highest level of data security. A new product from Flexxon has been introduced as the world&#8217;s first AI solid state drive. New technology to protect data at the hardware level, SSD can protect from both remote and physical attacks. A wide range of features include temperature sensors to detect abnormal movements, detecting traditional threats like malware and viruses or tampering with drives or ransomware. However, Flexxon did not elaborate on the work of this intelligent protection mechanism but when something goes wrong, the X-PHY SSD will send an alert to the user by email and lock itself to prevent actions. vi is believed to affect the system. The user can then unlock the device through the dynamic authentication process. For customers with high security needs, data can be automatically deleted if the device falls into the wrong hands. It is very difficult to send emails about the status of the SSD when the PC is turned off and the operating system is not running, it is not clear how the X-PHY SSD will do this. The devices are manufactured in M.2 2280 and U.2 format and PCIe 3.0 x 4 (NVME 1.3) interface is used for connection. This series includes 512 GB and 1 TB capacities. This device is expected to be ordered and delivered to corporate customers in September this year, and by 2022 it can be mass produced for all customers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13006</post-id>	</item>
		<item>
		<title>State Treasury: Strictly manage digital certificates to ensure safety in electronic transactions</title>
		<link>https://en.spress.net/state-treasury-strictly-manage-digital-certificates-to-ensure-safety-in-electronic-transactions/</link>
		
		<dc:creator><![CDATA[Vân Hà]]></dc:creator>
		<pubDate>Thu, 06 May 2021 22:41:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Administrative reform]]></category>
		<category><![CDATA[certificates]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[ensure]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[License]]></category>
		<category><![CDATA[Manage]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Promote]]></category>
		<category><![CDATA[Range]]></category>
		<category><![CDATA[Revolution]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State budget]]></category>
		<category><![CDATA[State Treasury]]></category>
		<category><![CDATA[Strictly]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[transactions]]></category>
		<category><![CDATA[transparent]]></category>
		<category><![CDATA[Treasury]]></category>
		<category><![CDATA[Unit]]></category>
		<category><![CDATA[Utilities]]></category>
		<category><![CDATA[Withdrawal]]></category>
		<guid isPermaLink="false">https://en.spress.net/state-treasury-strictly-manage-digital-certificates-to-ensure-safety-in-electronic-transactions/</guid>

					<description><![CDATA[Becoming an electronic treasury has helped modern and convenient budget fund management. However, there is also a risk of insecurity when digital certificates, digital signatures, online public service program accounts of budget spending units are exposed. State treasury officer in Nam Sach &#8211; Hai Duong is in control of the budget capital payment documents To [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Becoming an electronic treasury has helped modern and convenient budget fund management. However, there is also a risk of insecurity when digital certificates, digital signatures, online public service program accounts of budget spending units are exposed.</strong><br />
<span id="more-12044"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_578_38617233/511949a26fe086bedff1.jpg" width="625" height="416"> </p>
<p> <em> State treasury officer in Nam Sach &#8211; Hai Duong is in control of the budget capital payment documents</em> To prevent this situation and to avoid state budget loss, the State Treasury is promoting the management of digital certificates in electronic transactions. <strong> Strictly obey the management of digital certificates</strong> Implement reform of administrative procedures in the field of State Treasury (State Treasury) in accordance with the direction of the Government and the Ministry of Finance, in addition to focusing on implementing Decree 11/2020 / ND-CP of Government regulations on administrative procedures in the field of the State Treasury and the State Treasury have promoted the application of information technology in transactions with budget spending units (SDNS) by online public services (public services). Up to now, the State Treasury&#8217;s payment service system has completed connecting 100% of the SDNS units that are required to conduct transactions via telecom service. This has created many advantages for the management units and SDNS because transactions are done quickly, transparently, safely, economically and efficiently. In the coming time, the State Treasury will soon improve many functions and utilities on public service, both creating more favorable conditions for management units and SDNS, and moving towards digitizing treasury in all professional activities. However, in the period of the 4.0 technology revolution which is strongly developing, besides the outstanding advantages, there are still many potential risks and high risks such as information &#8220;hacking&#8221; if the security is not guaranteed. said. Moreover, the risk often occurs when SDNS units do not strictly manage digital certificates, digital signatures, CFS program accounts. For example, many account holders (usually the heads of the SDNS unit), because of work, do not have time, so they always deliver pin codes, digital certificates, digital signatures to the chief accountant or representative ( authorization is not allowed). Notably, many account holders who are not familiar with computers should hand over all digital certificates and pin codes to others in contravention of regulations, or ask someone else to use their digital certificates to sign them for payment transactions in financial activities. In addition, there are also cases where, subjectively, account holders disclose information about their pin codes, fail to maintain digital certificates in accordance with regulations, especially regularly install and plug digital certificates on their personal computers. exiting the public service service program after finishing the job &#8230; Taking advantage of this loophole, bad objects have conditions to try to misappropriate the fund, causing loss of money from the state budget. Synthesizing from reality over many years, there have been many cases of money and state property loss of management units and SDNS from the authorization and authorization of the use of digital certificates, digital signatures and passwords. not in accordance with the law in electronic transactions. In order to prevent risks in the management of state budget funds, the State Treasury sent an official dispatch to the local State Treasury units to request the management units and SDNS to fulfill their assigned tasks and functions. and work position. At the same time, thoroughly grasp the contingent of cadres, civil servants and public employees who are specialized in the State budget accounting to perform their functions and powers, strictly comply with the accounting process and budget expenditure from the state budget. In addition, the State Treasury also requires heads of SDNS units to pay attention and carefully consider the process of comparing and confirming monthly account balances with the State Treasury. If detecting the unreasonability, it is necessary to promptly contact the State Treasury where the transaction is conducted for specific consideration. At the same time, the account holders must be fully responsible for the information registered for transactions on the cash register system of the State Treasury, especially the information about email notification received from the treasury. <strong> The whole state treasury system took part</strong> Determined to build a healthy, transparent, economical, efficient national finance, especially, not letting the state budget be lost, the entire State Treasury system has joined the &#8220;risk warning&#8221;. Ms. Tran Thi Khanh Trinh, Head of State Accounting Department, Ninh Thuan State Treasury, said that the IT service level 4 has been deployed to 100% of compulsory SDNS units in the area. With 757 units of SDNS and payment vouchers per month of over 10,000 transactions, the peak month of nearly 20,000 transactions has contributed to strong administrative reform, creating favorable conditions for SDNS unit, reducing travel time. and reduce operating costs for entities in transactions with the Treasury. However, along with the advantages, the risk of risks also increases. Therefore, Ninh Thuan State Treasury has sent an official dispatch on strengthening the management of digital certificates in transactions with the State Treasury to send to SDNS units and investors. In this dispatch, Ninh Thuan State Treasury has recommended heads of SDNS units to manage and use digital signatures, digital certificates, and the issued CFS program account to transact and send documents of state budget expenditure control via the system. The State Treasury&#8217;s payment services ensure strict compliance with current regulations. Heads of SDNS units, investors absolutely do not let their digital signature handover, digital certificates, or CFS program accounts be issued to others for management, revealing information about digital certificates. and login accounts (login codes and passwords) of the members of the unit on the cash register system of the State Treasury. SDNS units, investors are fully responsible for the information registered for transactions on the State Treasury&#8217;s transaction service system (especially the information about email notification received from the system). The State Treasury&#8217;s public service services are also highly appreciated by the SDNS units in Quang Nam when simplifying administrative procedures towards reducing documents, reducing paperwork, reducing the focal point of document delivery and receipt, and reducing direct transactions with customers &#8230; However, according to the report at Quang Nam State Treasury, during the implementation process, a few SDNS participating units are still subjective, not strictly complying with regulations on electronic transactions in financial activities. easy to lead to violations of the management and use of the state budget. Accordingly, Quang Nam State Treasury also recommends SDNS units to strictly comply with regulations on electronic transactions in financial activities. In particular, in order to make transactions through telecom services smoothly, reduce congestion, cause insecurity in transactions, Quang Nam State Treasury has asked SDNS units to subscribe to large-capacity packages; equipped with high-configuration computers and had to exit the application when no longer participating in digitally signing on electronic vouchers in financial activities. With recommendations given to SDNS units, the State Treasury is calling on individuals and organizations to work together to make the management of the state budget fund more transparent, safe and efficient. This is also the desire of the State Treasury to strictly comply with the process and regulations on electronic transactions with the State Treasury via public service providers. <strong> Deploying risk warning application on a large scale</strong> Since August 2019, the State Treasury (State Treasury) has deployed a large scale application of risk warning. The application has provided an additional online information channel via mobile devices to inform customers about: The fluctuation of the account balance of the budget user unit at the State Treasury; processing and delivery status of dossiers, vouchers of payment requests, cash withdrawal papers of budget using units in the course of transactions with the State Treasury. At the same time, adding the process of direct delivery and receipt of documents &#8211; this is a function that is closely linked to the online public service system, assisting the treasury officer to print the instruction sheet for completing the application. records, records receipt and results delivery appointment for applications submitted directly at the headquarters of the State Treasury unit.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12044</post-id>	</item>
		<item>
		<title>K-Group signed a cooperation agreement with NIIT to train high-quality information technology human resources</title>
		<link>https://en.spress.net/k-group-signed-a-cooperation-agreement-with-niit-to-train-high-quality-information-technology-human-resources/</link>
		
		<dc:creator><![CDATA[TẤN TUẤN]]></dc:creator>
		<pubDate>Mon, 03 May 2021 02:41:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Agreement]]></category>
		<category><![CDATA[AI artificial intelligence]]></category>
		<category><![CDATA[AND]]></category>
		<category><![CDATA[Architecture]]></category>
		<category><![CDATA[Blockchain Developer]]></category>
		<category><![CDATA[Cooperation]]></category>
		<category><![CDATA[core]]></category>
		<category><![CDATA[Course]]></category>
		<category><![CDATA[Data Analysis]]></category>
		<category><![CDATA[Data Analytics]]></category>
		<category><![CDATA[Educate]]></category>
		<category><![CDATA[Everything connected]]></category>
		<category><![CDATA[High quality]]></category>
		<category><![CDATA[highquality]]></category>
		<category><![CDATA[human]]></category>
		<category><![CDATA[Human Resources]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Information Technology]]></category>
		<category><![CDATA[Iodine]]></category>
		<category><![CDATA[KGroup]]></category>
		<category><![CDATA[Natural Language Processing]]></category>
		<category><![CDATA[Niit]]></category>
		<category><![CDATA[personnel]]></category>
		<category><![CDATA[Resources]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Signed]]></category>
		<category><![CDATA[Strategic partnership]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[train]]></category>
		<guid isPermaLink="false">https://en.spress.net/k-group-signed-a-cooperation-agreement-with-niit-to-train-high-quality-information-technology-human-resources/</guid>

					<description><![CDATA[As a long-term strategic partner, K-Group and NIIT will train industry groups such as: Data Analytics, Artificial Intelligence (AI), Things Connect (IoT), Blockchain to meeting high-quality human resources in Vietnam. Currently, in Vietnamese enterprises, there is a serious shortage of information technology (IT) human resources. According to a recent survey, in 2019, Vietnam lacks 90,000 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>As a long-term strategic partner, K-Group and NIIT will train industry groups such as: Data Analytics, Artificial Intelligence (AI), Things Connect (IoT), Blockchain to meeting high-quality human resources in Vietnam.</strong><br />
<span id="more-11197"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_17_38639093/af4a72f055b2bcece5a3.jpg" width="625" height="351"> </p>
<p> Currently, in Vietnamese enterprises, there is a serious shortage of information technology (IT) human resources. According to a recent survey, in 2019, Vietnam lacks 90,000 IT personnel, by 2020 this number has increased to more than 400,000 and is estimated to fall to around 500,000 people by 2021. Meanwhile, the whole country currently has about 235 universities, 153 IT training schools, every year about 50,000 IT students graduate, of which only 30% can work immediately, 70% have to train additionally. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_17_38639093/d34811f236b0dfee86a1.jpg" width="625" height="416"> Realizing that the market demand for this workforce is huge, while the supply is increasingly limited, K-Group has signed a contract with NIIT, the world&#8217;s leading IT Institute in training and providing public solutions. technology, in order to bring job opportunities as well as personal development to young people and students nationwide in the digital age. In this partnership strategy, K-Group, together with its ecosystem, will coordinate with NIIT to organize courses including: Data Analysis (Data Analytics), details such as: Data Analysis in Excel, Statistics for Analytics, Programming in R, &#8230; with Professional Diploma in Data Analytics certification. Internet of Things (Internet of Things) includes the following contents: The IoT Story, IoT Architecture and Core IoT, IoT Security, &#8230; with 50 hours of study time with IoT Developer certification. Artificial Intelligence (Artificial Intelligence): Classification and Regression Using Supervised Learning, Logic Programing, Natural Language Processing, &#8230; with 50 hours of study time and Artificial Intelligence Programmer certification. Blockchain: Blockchain 101, Decentralization, Symmetric Cryptography &#8230; with 50-hour study time and Blockchain Developer certification. Mr. Pavitra &#8211; Representative of NIIT (India) commented: “NIIT and K-Group both have strengths that can support each other in order to create the best conditions for the development of human resources in the technology industry in Vietnam. . At the same time, this is an important milestone to help us get closer to a large number of students through advanced technologies such as: AI, Blockchain, IoT &#8230; and internationally valuable certificates that NIIT provided. This contributes to opening up many opportunities for us to replicate the scale of our training, continuing our mission when entering the digital era in a new era &#8220;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_17_38639093/39e0f65ad11838466109.jpg" width="625" height="416"> As planned, in this May, K-Group and NIIT will organize the first course for students with many preferential policies. Providing students with new experiences and a dynamic learning environment at K-Group. In which, the standard of NIIT&#8217;s standardized teaching methods, textbooks and exercises system will be given priority. On this occasion, K-Group and NIIT have a discount of 25% for students when registering before May 10, 2021.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11197</post-id>	</item>
		<item>
		<title>Apple&#8217;s AirDrop feature isn&#8217;t safe</title>
		<link>https://en.spress.net/apples-airdrop-feature-isnt-safe/</link>
		
		<dc:creator><![CDATA[B.Châu (t/h)]]></dc:creator>
		<pubDate>Sun, 02 May 2021 23:45:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AirDrop]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[Breaking down]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[isnt]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[OS X Yosemite]]></category>
		<category><![CDATA[Patches]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Phonebook]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technical University of Darmstadt]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Windows Phone]]></category>
		<guid isPermaLink="false">https://en.spress.net/apples-airdrop-feature-isnt-safe/</guid>

					<description><![CDATA[Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature. Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature. AirDrop is very useful for Apple ecosystem users but is being warned of being insecure. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Security experts warn that users of Apple iPhone, iPad or Macbook may leak personal information due to vulnerabilities in the AirDrop feature.</strong><br />
<span id="more-11163"></span> Privacy warning is issued by experts at Technical University of Darmstadt (Germany) regarding Apple&#8217;s AirDrop data transmission feature.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_5_38638799/a5daa9648e2667783e37.jpg" width="625" height="417"> <em> AirDrop is very useful for Apple ecosystem users but is being warned of being insecure.</em> Experts said, AirDrop allows users to share files with Apple devices in contacts. During the process of verifying the connection between devices, AirDrop uses a &#8220;mutual authentication mechanism&#8221; to compare the user&#8217;s phone number and email with the entries in the other device&#8217;s phonebook. Basically, data exchanged via AirDrop is encrypted by Apple, but this security mechanism is assessed by experts as relatively weak. In fact, Apple just scrambles the phone numbers and email addresses exchanged in the process of transmitting through AirDrop. This security mechanism can be easily circumvented using simple techniques like brute-force attacks. Also according to security experts at Technical University of Darmstadt (Germany), the above vulnerability was discovered in May 2019 and has been notified to Apple, but Apple still has no specific patch. to fix the problem. Airdrop is a feature that comes pre-installed on iPhone, iPad or Mac (depending on the version of the operating system). Helps iOS, Mac devices connect together and can easily share files wirelessly with each other very quickly without affecting the quality of the file. Airdrop has been integrated on iPhone, iPod, iPad devices using iOS 7 or higher. Macbook from 2012 with OS X Yosemite (10.0) higher (except Mac Pro mid-2012). In addition, AirDrop cannot be used with other operating systems (Android phones, Windows Phone phones &#8230;).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11163</post-id>	</item>
		<item>
		<title>More than half of Australian businesses were attacked by hackers</title>
		<link>https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Sun, 02 May 2021 12:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[As usual]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[It is illegal]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Useful]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</guid>

					<description><![CDATA[A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers. A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers.</strong><br />
<span id="more-11035"></span> A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. years earlier. This fact happened when in the last year, because of the Covid-19 translation, many companies switched to working online</p>
<p> Experts say that in each attack, typically hackers will attack networks or systems, steal personal or sensitive information and then demand ransom to return or unlock them. that information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_65_38643050/39d0b9be9efc77a22eed.jpg" width="625" height="346"> Although experts say that companies should not pay a ransom to hackers because this action helps to foster legal violations, according to Mimecast statistics, 54% of the companies have paid the ransom. Of these, 76% of the companies got their data back, while 24% couldn&#8217;t get it back. Prior to this report, since last year, many entities including major Australian companies have reported being attacked by hackers. The recent victim is Nine Network Television, which makes some programs unable to broadcast as usual. Previously, the Australian National Assembly&#8217;s computer network was also attacked a number of times. In response to this situation, Australia&#8217;s Cybersecurity Center issued recommendations and procedures to instruct entities on how to secure cyber security. At the same time, experts believe that regular software updates as well as the use of multi-factor authentication are also useful measures for security in a cyberspace environment./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11035</post-id>	</item>
		<item>
		<title>Burst! Tesla disclosed the data 1 minute before the accident, and the security of the super factory was upgraded, &#8220;only stricter&#8221;! The production capacity is still running wildly, and the construction of the suspected land has begun! Is the opportunity for domestic cars coming?</title>
		<link>https://en.spress.net/burst-tesla-disclosed-the-data-1-minute-before-the-accident-and-the-security-of-the-super-factory-was-upgraded-only-stricter-the-production-capacity-is-still-running-wildly-and-the-construction/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 14:33:18 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[accident]]></category>
		<category><![CDATA[begun]]></category>
		<category><![CDATA[burst]]></category>
		<category><![CDATA[capacity]]></category>
		<category><![CDATA[cars]]></category>
		<category><![CDATA[coming]]></category>
		<category><![CDATA[construction]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[disclosed]]></category>
		<category><![CDATA[Domestic]]></category>
		<category><![CDATA[Factory]]></category>
		<category><![CDATA[land]]></category>
		<category><![CDATA[minute]]></category>
		<category><![CDATA[Opportunity]]></category>
		<category><![CDATA[production]]></category>
		<category><![CDATA[Running]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[stricter]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[Suspected]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[upgraded]]></category>
		<category><![CDATA[wildly]]></category>
		<guid isPermaLink="false">https://en.spress.net/burst-tesla-disclosed-the-data-1-minute-before-the-accident-and-the-security-of-the-super-factory-was-upgraded-only-stricter-the-production-capacity-is-still-running-wildly-and-the-construction/</guid>

					<description><![CDATA[Tesla owners&#8217; rights protection incidents at the Shanghai Auto Show continued to ferment. On the evening of April 21, the General Administration of Market Supervision issued a document stating that it had instructed the market supervision and management departments of Henan Province, Shanghai and other places to safeguard the legitimate rights and interests of consumers [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><img fifu-featured="1" decoding="async" src="https://p7.itc.cn/q_70/images03/20210422/9e00d4149165474292356509c6ca74fa.png"></p>
<p>Tesla owners&#8217; rights protection incidents at the Shanghai Auto Show continued to ferment. On the evening of April 21, the General Administration of Market Supervision issued a document stating that it had instructed the market supervision and management departments of Henan Province, Shanghai and other places to safeguard the legitimate rights and interests of consumers in accordance with the law. At the same time, it is emphasized that enterprises must earnestly fulfill their main responsibility for quality and safety, and provide consumers with high-quality and safe products and services.</p>
<p>The China Consumers Association issued a response stating that the primary prerequisite for business operations is to respect consumers, and enterprises should implement product quality responsibilities in accordance with the law, and take effective measures to protect consumers&#8217; safety rights. Tesla also spoke again, urging to appoint a third-party testing and appraisal agency to conduct appraisal and restore the truth.</p>
<p>According to the latest news, Tesla has provided relevant data.</p>
<p>At the same time, the China Market Supervision News, which is in charge of the State Administration of Market Supervision and Administration, disclosed the data one minute before the vehicle accident and made a text explanation.</p>
<p><strong> The full text of this text description is as follows:</strong></p>
<p>When the driver stepped on the brake pedal for the last time, the data showed that the speed of the vehicle was 118.5 kilometers per hour. Within 2.7 seconds after the driver stepped on the brake pedal, the maximum brake master cylinder pressure was only 45.9 bar. After that, the driver increased the stepping on the brake pedal, and the brake master cylinder pressure reached 92.7 bar. The front collision warning and automatic emergency braking function were activated (the maximum brake master cylinder pressure reached 140.7bar) and played a role, reducing the amplitude of the collision. 1.8 seconds after the ABS was applied, the system recorded the occurrence of the collision. After the driver stepped on the brake pedal, the vehicle speed continued to decrease, and before the collision, the vehicle speed was reduced to 48.5 kilometers per hour.</p>
<p><img decoding="async" src="https://p0.itc.cn/q_70/images03/20210422/2cac2722649e40eabce57d415144a5c1.png"> </p>
<p> Source: China Market Supervision News</p>
<p>In summary, the vehicle is running at a higher speed, and the driver starts to depress the brake pedal with a lighter force. After that, the automatic emergency braking function is activated and has a function, which improves the braking force and reduces the impact of the collision. The driving system is normally involved in the work and reduces the speed of the car.</p>
<p>In addition, with regard to the condition of the vehicle 30 minutes before the accident, Tesla stated this: In the 30 minutes before the accident, the driver drove the vehicle normally and had more than 40 records of depressing the brake pedal. At the same time, the vehicle has repeatedly stopped at more than 100 kilometers per hour and multiple times.</p>
<p>In fact, Tesla, which is caught in the turmoil of rights defense, is also facing pressure to acquire land and expand. Recently, an industrial land mark located in the Lingang Heavy Equipment Industrial Zone of the Shanghai Free Trade Zone, which is adjacent to the Tesla Super Factory in Shanghai, has been interpreted by the market as a new site for Tesla&#8217;s expansion.</p>
<p>A reporter from Securities Times·e Company recently visited Tesla&#8217;s Shanghai Super Factory. The security in the factory area has been upgraded, and trucks loaded with domestic Tesla have driven out of the factory without interruption. Construction has begun on the suspected landmark plot near the super factory.</p>
<p>“Recent rights protection incidents at the Tesla Auto Show objectively have an impact on the corporate investment image. Even the subsequent expansion and expansion of production, it is necessary to pay attention to the impact of public opinion.” A Shanghai auto industry person told reporters that if It is Tesla who has taken the landmark, indicating that corporate funds and strategies may be under pressure to achieve such goals, or that it has no intention of expanding in the short term. However, it is expected that there will be various land acquisition actions in the future. The rights protection turmoil has not ceased for the time being, and the prospects of the stale land are still unclear. Whether Tesla can continue to stabilize the Chinese market deserves attention.</p>
<p><strong> There are multiple security personnel at the entrance of the factory</strong></p>
<p>A large area of ​​white exterior walls and red arched doors are located in front of the Tesla Super Factory in the Lingang New Area of ​​Shanghai Free Trade Zone. Private cars and employees have entered the factory one after another. The road at the entrance of the factory is empty, and the construction scene of the previous roar of forklifts is no longer visible.</p>
<p><img decoding="async" src="https://p3.itc.cn/q_70/images03/20210422/ccf50c3ed247464e8fdada699a1e3dfc.png"></p>
<p>On the afternoon of April 21, a reporter from the Securities Times·e Company saw at the exit of the super factory that many transport vehicles were fully loaded with domestic Tesla and were leaving the factory without interruption. In the open space outside the factory, there are hundreds of new cars that have just left the production line. &#8220;The first and second phases of the factory are basically completed, and the production capacity is expanding rapidly. We are now in a three-shift all-weather mode, and people are required 24 hours a day, and we are still hiring people.&#8221; A Tesi who came out of the factory Pull employees told reporters. Regarding the current rights protection incident at the Tesla Motor Show, the employee said: &#8220;It will definitely affect us, but we don&#8217;t have much to say about it.&#8221;</p>
<p><img decoding="async" src="https://p1.itc.cn/q_70/images03/20210422/ce5ff5bc434643dab4139ee6043bc19c.png"></p>
<p>The degree of Tesla&#8217;s attention is positively correlated with the strict degree of security at the Shanghai Gigafactory. The reporter noticed that two security posts were arranged at the entrances of the first and second phases of the factory. At least 3 staff members wearing red hats and fluorescent green vests are on duty at each entrance. On both sides of the road far away from the door, there are staff from time to time patrolling. Whenever a visitor approaches the factory door, the staff will take the initiative to ask or intercept. &#8220;Security will only be stricter during this time.&#8221; A security officer said, and told reporters that photographing is prohibited at the entrance of the factory.</p>
<p>In addition, the reporter noticed that there are still cranes under construction near the second phase of the Tesla Gigafactory, and the steel structure on the roof of the plant has been basically completed. &#8220;This may be the third phase, or the 2.5 phase, and some workshops will be built to meet production needs.&#8221; A worker told reporters.</p>
<p><img decoding="async" src="https://p1.itc.cn/q_70/images03/20210422/5663a178ea554b96b3889465a3021e1d.png"></p>
<p>According to Tesla’s previous EIA information report, the company currently has 4 projects in Shanghai, namely the Tesla Gigafactory Plant Project, the Gigafactory (Phase 1) Phase 1 Project, and the Phase 1-Parts Production Process Improvement Project. , The new model launches the project in advance. Among them, the first phase of the Super Factory (Phase I) project is constructed in phases, divided into two phases, A and B. At present, Phase A has been built and Phase B is under construction.</p>
<p><img decoding="async" src="https://p0.itc.cn/q_70/images03/20210422/2e3be10ad1644177ba69130d70d48da9.png"></p>
<p>As the production capacity of Tesla&#8217;s Shanghai Gigafactory continues to increase, the delivery of Tesla&#8217;s electric vehicles has also increased. According to Tesla&#8217;s 2020 financial report, a total of 499,500 vehicles were delivered throughout the year, which is only one step away from the 500,000 vehicles goal set by Tesla CEO Elon Musk. In the financial report, Tesla revealed that the annual production capacity of the Shanghai Super Factory Model 3 is capable of maintaining more than 250,000 vehicles. Model Y production has started at the end of 2020. It is currently in full production and is expected to have an annual production capacity of 200,000 vehicles.</p>
<p><strong> Road construction has begun on suspected land</strong></p>
<p>When the Shanghai Super Factory was operating at full capacity, Tesla reported the news of expanding the factory. In early March of this year, the official website of Shanghai Land Market issued an announcement on the transfer of state-owned construction land use rights, stating that it would sell a piece of industrial land in Lingang Heavy Equipment Industrial Zone with a total area of ​​about 461,000 square meters. The permitted industry type of the plot is the manufacture of new energy vehicles, and it is adjacent to the second phase of Tesla&#8217;s Shanghai Gigafactory. It is speculated that it is a new site for Tesla&#8217;s expansion.</p>
<p>However, the reporter found that the current transaction status of the plot is &#8220;flow mark&#8221;. On March 30, the official website of the Shanghai Land Market showed that the industrial land located in the Lingang Heavy Equipment Industrial Zone was not won by the sole bidder. The official website of the Shanghai Land Market did not disclose which car company the bidding applicant was. A reporter from the Securities Times·e Company asked the relevant person in charge of Tesla for verification on this matter, and no response was received as of the time of publication.</p>
<p><img decoding="async" src="https://p6.itc.cn/q_70/images03/20210422/62a3e1eff680469eb173dbd6f2b03ea1.png"></p>
<p><img decoding="async" src="https://p0.itc.cn/q_70/images03/20210422/b60d4bf46b344e79a1afb971fd85a2d6.png"></p>
<p>On the afternoon of April 21, the reporter went to this industrial land in Nicheng Town, Pudong New District. According to the data, the industrial land extends to the N01-04 plot in the east, Canghai Road in the south, N01-03B plot in the west, and Wanshui Road in the north. The land that is not visible at a glance is still in a barren state, and several bulldozers, road rollers and cranes are working in turn, and the dust is flying. &#8220;Here is to build a road. We are already piling here.&#8221; A construction worker told reporters. &#8220;We had a meeting with people from Tesla, saying that the road was first repaired, and we don&#8217;t know what the other land is going to do.&#8221; A staff member who came to inspect the construction site told reporters .</p>
<p>&#8220;Industrial land itself is not expensive, and the premium rate for general transactions is within 5%, so there are relatively few cases of lost bids or lost auctions.&#8221; Yan Yuejin, research director of the Think Tank Center of E-House Research Institute, said in an interview with a reporter from the Securities Times·e Company If there is a failure to bid, it may indicate that the low price is too high, or the company initially intends to acquire land, but because of the low expectations of subsequent input and output, it chooses to give up. &#8220;Follow-up may have to make adjustments in land prices and other aspects, especially the need to actively inquire about the willingness of relevant companies to acquire land.&#8221; Yan Yuejin said.</p>
<p><strong> Why did the land with a starting price of over 500 million yuan fail the bid?</strong></p>
<p>The reporter consulted the transfer information of the plot, and the seller was the Management Committee of the Lingang New Area of ​​China (Shanghai) Pilot Free Trade Zone. The total area of ​​the plot is 461142.4 square meters and the period is 50 years. The starting price is 518.79 million yuan, and the price is increased. The margin is 5 million yuan.</p>
<p>&#8220;Similar plots are close to Tesla&#8217;s existing plant. Logically speaking, Tesla will usually get the land. If other new energy vehicles get land in the surrounding area, it doesn&#8217;t seem to make sense.&#8221; A person in the auto industry told reporters. It can be understood that Tesla has re-adjusted the mode of strategic expansion in the current special period, in other words, eased the acquisition of land.</p>
<p>From the perspective of industrial land, Yan Yuejin believes that the land needs to meet the requirements of local governments for investment promotion and industrial planning. If similar requirements are not met, land transactions may also face pressure.</p>
<p>One detail that can be paid attention to is that the land project requires a total fixed asset investment of no less than 6.88 billion yuan, an investment intensity of no less than 14,925 yuan per square meter, and a full-scale sales income of no less than 5 years after the land is handed over. 75 billion yuan per year, and the total tax revenue for reaching production is no less than 2 billion yuan per year. With reference to Tesla&#8217;s revenue in China in 2020 reaching US$6.662 billion (approximately RMB 43 billion), there is still a gap between its annual sales revenue of 75 billion yuan.</p>
<p>In addition, when building the Shanghai Super Factory, Tesla also disclosed that the company signed a 50-year land lease agreement with the Shanghai local government. If the payment is not made on time, the land must be returned to the Shanghai government. Tesla needs to complete an investment of 14.08 billion yuan (approximately US$2 billion) in the Shanghai factory in the next five years. At the same time, starting from the end of 2023, Tesla&#8217;s Shanghai plant must pay 2.23 billion yuan (approximately US$323 million) in taxes each year.</p>
<p>&#8220;The flow standard can be seen from two aspects. One is whether the Shanghai government’s policy on Tesla has changed. Two years ago, the conditions given for the introduction of Tesla were very favorable. Tesla’s sales and profit margins in China They are all very good, so if the second land project is given to Tesla, the conditions may not be as favorable as before.&#8221; Zhang Xiang, an auto industry analyst, told reporters that, on the other hand, other car companies are not excluded. Want to bid. Due to Tesla&#8217;s entry into Lingang, related suppliers have also been attracted to form a new energy automobile industry chain. The industry environment is relatively mature, and other companies participate in bidding, and the price of bids has also risen.</p>
<p><strong> Tesla&#8217;s &#8220;attack&#8221; under the rush of production capacity</strong></p>
<p>Behind the rights protection incidents and the land flow mark, Tesla, which has been advancing all the way, seems to have gradually faded. In July 2018, the official announcement announced that the Tesla Gigafactory, which plans to produce 500,000 pure electric vehicles per year, will be located in the Lingang area of ​​Shanghai.</p>
<p>In January 2019, Tesla&#8217;s first overseas factory officially started construction in Shanghai, with a planned production capacity of 250,000 vehicles in the first phase, with a total production capacity of up to 500,000 vehicles, and a total project investment of 50 billion yuan.</p>
<p>With the completion of the Tesla Super Factory in Shanghai, the domestically produced Model 3 and Model Y ushered in a rapid increase in production capacity, and repeated price cuts have also catalyzed the peak sales of Tesla&#8217;s domestically produced electric vehicles. In addition, this year, Tesla&#8217;s Shanghai Super Charging Pile Factory has been completed and put into production, with an initial planned annual production capacity of 10,000 V3 Super Charging Pile. Tesla&#8217;s layout in the Chinese market continues to deepen.</p>
<p>&#8220;We produce cars. In the long run, China will become our largest market and the place where we produce the most vehicles and have the most customers.&#8221; Musk said frankly in a recent interview with the media. In 2020, Tesla&#8217;s revenue in China was US$6.662 billion, a year-on-year increase of 123.6%, accounting for 21% of total revenue. In 2018 and 2019, Tesla&#8217;s revenue in China was US$1.757 billion and US$2.979 billion, accounting for 8.19% and 12.12%, respectively.</p>
<p>In terms of sales volume, Tesla delivered 185,000 vehicles worldwide in the first quarter, of which, Tesla sold 69,280 vehicles in China in the first quarter. Judging from the existing sales data, Tesla still occupies the top position of the Chinese market share. In terms of stock price, Tesla went from 80 US dollars in early 2020 to 800 US dollars in early 2021. Its share price has doubled tenfold in one year, and its market value has led global auto companies.</p>
<p>However, the ensuing problem is that Tesla has frequent safety accidents. The &#8220;brake failure&#8221; rights protection incident at the Shanghai Auto Show is not an isolated case. According to media statistics, since 2020, different media have exposed more than dozens of brake failures and spontaneous charging problems of related car companies&#8217; products, which occurred in Beijing, China. Shanghai, Hangzhou, Guangzhou, Shenzhen, Nanchang and many other places. In addition, similar accidents have occurred in Europe and the United States. Musk himself does not shy away from talking about Tesla&#8217;s quality problems. He once said that Tesla&#8217;s quality will be worse than the stable period during production acceleration, and it will be difficult to achieve perfection if the output is to rise linearly.</p>
<p>&#8220;The Tesla auto show rights protection incident reflects Tesla&#8217;s quality control problems in a larger sense. The brake failure is directly related to its autopilot system, which involves the car&#8217;s hardware and software. There is a trial for new things. The process of error, for Tesla, is that it did not try out all the errors of the autopilot system and hurried mass production and commercialization. The mistakes made in the development of a technological product may be tolerated, but the mistakes made in the development of automotive products This kind of error can lead to traffic accidents and even loss of life.&#8221; An auto industry analyst told reporters.</p>
<p><strong> The domestic new energy vehicle market is expected to flourish</strong></p>
<p>When Tesla is plagued by negative public opinion, it is also facing heavy grips from new car manufacturers, luxury car brands and even intelligent solution suppliers.</p>
<p>Take this year&#8217;s Shanghai Auto Show as an example, players from all walks of life will firmly occupy the outlets of new energy vehicles. BYD released the new e-platform 3.0, a pure electric car codenamed EA1 and the X Dream concept car; Geely Automobile exhibited the luxury safari pure electric coupe Krypton001; SAIC Motor launched high-end intelligent pure electric vehicles Zhiji L7, LS, etc. Among the newly unveiled electric models, the battery life of more than 400km has become standard, and some high-end electric vehicles can reach a range of more than 600km, and the electric performance such as fast charging and acceleration has also continued to evolve.</p>
<p>New car manufacturers such as Xiaopeng and Weilai brought new models to their debut. Overseas brands also released SUV models taking into account the preference and demand of the Chinese market. In addition to the release of new vehicles by automakers, intelligent solution providers such as Huawei and Baidu have brought related software and hardware products such as autonomous driving and intelligent electric vehicles. The arena of the new energy vehicle market is more diverse.</p>
<p>The sales data in March this year showed that the new forces in domestic car-making have picked up. Huabao Securities analysis pointed out that Weilai Automobile delivered 7,257 new cars in March, and its sales performance was relatively stable when orders continued to be fully produced, with a month-on-month increase of 30.1%; Xiaopeng and Ideal both returned to growth in March. The month-on-month growth both exceeded 100%. Although this year&#8217;s electric layout of traditional car companies and Tesla&#8217;s price cut competition, new car manufacturers still remain sufficiently competitive. In addition, the giants of traditional car companies have also accelerated their deployment in the field of new energy. The market is expected to form a diversified development trend of new car manufacturers and traditional car companies.</p>
<p>&#8220;There are more and more new models built by the same industry, and Tesla may be threatened.&#8221; Zhang Xiang, an automotive analyst, told reporters for example. Many years ago, Tesla could run 400 kilometers on a single charge, while other domestic cars could only run. 100 kilometers, but now, some new car-building forces can run more than 700 kilometers on a single charge, which has exceeded Tesla&#8217;s cruising range. &#8220;When competing with peers, Tesla has shown fewer and fewer advantages. This is a challenge to Tesla.&#8221;</p>
<p><strong> [Reporter&#8217;s Observation]Will Tesla&#8217;s development strategy in China change?</strong></p>
<p>The haze of the rights protection storm has not dissipated, and Tesla has other problems that need to be answered. In Tesla&#8217;s in-depth deployment of the Chinese market, and when lowering prices and increasing volume, other electric vehicle brands have different development strategies, and the momentum cannot be underestimated.</p>
<p>The CITIC Securities Research Report pointed out that the &#8220;individualized&#8221; design and positioning trend of self-owned brand new cars is clear. It is expected that the core competitiveness of auto companies will shift from &#8220;cost control&#8221; to precise positioning and precise marketing in the future. New car-making forces are expected to seize the opportunity and gain a higher share in the wave of &#8220;intelligence&#8221; of electric vehicles, relying on faster response and more accurate market understanding. The electrification transformation of joint ventures/overseas brands will further provide new supply for the domestic new energy vehicle market and open up the industry space.</p>
<p>In addition, on the one hand, intelligent solution providers can help automakers optimize the driving experience of their products through technologies such as autonomous driving and smart cockpits; on the other hand, they can penetrate into electric components such as electric drives, thermal management, and BMS, and improve through digitalization. Efficiency and cost reduction will help automakers build &#8220;good cars.&#8221;</p>
<p>&#8220;At that time, the introduction of Tesla played an important role in driving all aspects of the domestic new energy automobile industry chain. In the long run, we support the development of advanced technologies and enterprises with demonstration effects in the country. In the short term, the enterprises have inappropriate Cui Dongshu, secretary-general of the National Travel Association, said in an interview with a reporter from Securities Times and e Company.</p>
<p>More than two years ago, Shanghai introduced Tesla, and the Tesla Shanghai Super Factory was built, completed and mass-produced domestic Tesla cars at an unprecedented speed. Two years later, the new energy vehicle market is already unique, but Tesla &#8220;stalls&#8221; due to multiple quality and safety accidents. Will Tesla, which is eager to occupy the Chinese market, change its development strategy in China?</p>
<p>&#8220;As the world&#8217;s largest automobile market and one of the countries with the fastest penetration of new energy in the world, China should be a strategic market for Tesla. Tesla needs to continue to increase its efforts in the Chinese market. Tesla&#8217;s challenge lies in China&#8217;s domestic market. The rise of new power brands and the dimensionality reduction attacks of potential competitors, such as the addition of smart players such as Apple and Xiaomi, will pose a greater threat to Tesla.&#8221; Liu Kun, China partner of Reese Strategic Positioning Consulting, told reporters that Musk’s The strategic intent is to subvert fuel vehicles, so Tesla will continue to expand the mass price market. This also brings another problem. Downward extension will dilute and obscure Tesla’s high-end perception, and Tesla may no longer represent high-end For electric vehicles, the high-end market also has a strategic opportunity to establish another purer high-end electric vehicle brand.</p>
<p>Time is changing, the conflict of rights protection has not ceased for the time being, and the prospect of stale land is unknown. Can Tesla continue to stabilize the Chinese market? Will Tesla&#8217;s expansion in China be delayed, and whose land will be sold to the market? Securities Times·e company reporters will continue to pay attention.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9436</post-id>	</item>
		<item>
		<title>Blocking tens of thousands of subscribers from spreading spam calls</title>
		<link>https://en.spress.net/blocking-tens-of-thousands-of-subscribers-from-spreading-spam-calls/</link>
		
		<dc:creator><![CDATA[Hà Linh]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 13:07:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Activated]]></category>
		<category><![CDATA[Block out]]></category>
		<category><![CDATA[blocking]]></category>
		<category><![CDATA[call]]></category>
		<category><![CDATA[calls]]></category>
		<category><![CDATA[Consumers]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[Garbage]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Promote]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Sim]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[spam]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Spreading]]></category>
		<category><![CDATA[Subscriber]]></category>
		<category><![CDATA[subscribers]]></category>
		<category><![CDATA[Telecommunication]]></category>
		<category><![CDATA[Telecommunications agency]]></category>
		<category><![CDATA[tens]]></category>
		<category><![CDATA[thousands]]></category>
		<category><![CDATA[Trouble]]></category>
		<guid isPermaLink="false">https://en.spress.net/blocking-tens-of-thousands-of-subscribers-from-spreading-spam-calls/</guid>

					<description><![CDATA[According to the Telecommunications Department (Ministry of Information and Communications), in March 2021, carriers blocked more than 17,000 subscribers from spreading spam calls, double the previous February. Spam calls have plummeted The Telecommunications Department said that 17,276 subscribers who distributed spam calls were handled in March 2021. This is 2.3 times the figure recorded in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the Telecommunications Department (Ministry of Information and Communications), in March 2021, carriers blocked more than 17,000 subscribers from spreading spam calls, double the previous February.</strong><br />
<span id="more-9004"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_106_38600710/03d94fab6ae983b7daf8.jpg" width="625" height="352"> </p>
<p> <em> Spam calls have plummeted </em> The Telecommunications Department said that 17,276 subscribers who distributed spam calls were handled in March 2021. This is 2.3 times the figure recorded in February of this year. Thus, since the operators started the &#8220;campaign&#8221; to clean up telecommunications trash (July 2020), 128,970 subscribers spreading spam calls have been successfully filtered. In particular, only in the first quarter of 2021, there were more than 39,000 subscribers distributing spam calls handled by the operators, showing the determination of the Ministry of Information and Communications and carriers in blocking calls. junk consumer harassment. Before that, in the last 6 months of 2020, on average, each month, operators successfully blocked about 15,000 subscribers from spreading spam calls. According to the majority of consumers, over the past time, spam calls have decreased sharply. However, many advertising calls and service introduction still arise but are done more sophisticatedly. Ms. Bui Hang (Thanh Xuan &#8211; Hanoi) said: “For a long time there have been no spam calls to my phone, but since the day I applied for stock account registration, advertising calls appear thick. Special, 2-3 days. There was a conversation I had, the other end said that I knew I had submitted the application, but it was a stock trading profile in the domestic market. That employee invited me to join international stocks for more benefits. Why do they know my information so well? &#8220;. According to the reflection of Mr. Le Manh Dung (Long Bien-Hanoi), recently, this customer is often tapped. When calling back, there are also introductory content, advertising services. According to the Telecommunications Department, next time, the Department will continue to promote measures to manage and handle violations related to telecommunications waste (spam sim, spam calls, spam messages); At the same time, there are solutions to prevent fake phone calls, prevent the sale of pre-activated sims &#8230; contributing to ensuring security and order.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9004</post-id>	</item>
		<item>
		<title>UN Security Council calls for an end to the political crisis in Somalia</title>
		<link>https://en.spress.net/un-security-council-calls-for-an-end-to-the-political-crisis-in-somalia/</link>
		
		<dc:creator><![CDATA[Lê Thanh Tùng (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 22:19:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Announcement]]></category>
		<category><![CDATA[Calling]]></category>
		<category><![CDATA[calls]]></category>
		<category><![CDATA[Cling to]]></category>
		<category><![CDATA[concerns]]></category>
		<category><![CDATA[Council]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Deadlock]]></category>
		<category><![CDATA[Divergent]]></category>
		<category><![CDATA[Doubt]]></category>
		<category><![CDATA[Draft]]></category>
		<category><![CDATA[End]]></category>
		<category><![CDATA[Mogadishu]]></category>
		<category><![CDATA[Mohamed Abdullahi Mohamed]]></category>
		<category><![CDATA[Opposition parties]]></category>
		<category><![CDATA[Parties]]></category>
		<category><![CDATA[political]]></category>
		<category><![CDATA[Political crisis]]></category>
		<category><![CDATA[Reserve]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security Council]]></category>
		<category><![CDATA[Semi autonomous]]></category>
		<category><![CDATA[Somalia]]></category>
		<category><![CDATA[Somalia government]]></category>
		<category><![CDATA[The political]]></category>
		<category><![CDATA[Vote]]></category>
		<guid isPermaLink="false">https://en.spress.net/un-security-council-calls-for-an-end-to-the-political-crisis-in-somalia/</guid>

					<description><![CDATA[Security Council members all expressed concern about the continued political stalemate here and disagreements among leaders of this country over the issue of electoral patterns. Somali Government soldiers patrol the streets of Mogadishu. (Photo: AFP / VNA) Security Council United Nations On April 23, (UN Security Council) passed a statement calling on factions in Somalia [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Security Council members all expressed concern about the continued political stalemate here and disagreements among leaders of this country over the issue of electoral patterns.</strong><br />
<span id="more-8691"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_293_38622271/38c13fa219e0f0bea9f1.jpg" width="625" height="382"> </p>
<p> <em> Somali Government soldiers patrol the streets of Mogadishu. (Photo: AFP / VNA)</em> Security Council <strong> United Nations</strong> On April 23, (UN Security Council) passed a statement calling on factions in Somalia to end the violence and immediately return to dialogue in the spirit of considering this as an urgent matter and not setting conditions. This move shows that the Security Council is very concerned about the crisis situation in Somalia. In the release released, members <strong> Security Council</strong> All expressed concern about the continued political stalemate here and disagreement among leaders of this country over the issue of electoral patterns. Before that, on March 31st, after the emergency meeting, the Security Council was <strong> call upon</strong> Somali government please resolve the issues related to the electoral process. The legitimate administration of President Mohamed Abdullahi Mohamed, more commonly known as Farmajo, has caused controversy since February when his term ended with a new presidential election still not being conducted. By early April, a bill to extend his presidency by two years was introduced, bypassing the Senate after it was passed by the House of Representatives. Government opposition parties have voiced their opposition because it is an unconstitutional act to cling to power and the bill itself has been criticized by the international community. Somalia&#8217;s president and leaders of the five semi-autonomous states in the country last September reached an agreement that paved the way for presidential and parliamentary elections in late 2020 and early 2021 but This plan was broken by controversy surrounding the voting process and since then many rounds of negotiations have not been held to resolve this deadlock issue.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8691</post-id>	</item>
		<item>
		<title>The TTCP concludes many violations as reflected by the Ho Chi Minh City Public Security Newspaper</title>
		<link>https://en.spress.net/the-ttcp-concludes-many-violations-as-reflected-by-the-ho-chi-minh-city-public-security-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Quân]]></dc:creator>
		<pubDate>Sat, 24 Apr 2021 16:05:09 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Charity house]]></category>
		<category><![CDATA[Chi]]></category>
		<category><![CDATA[Chief Inspector]]></category>
		<category><![CDATA[City]]></category>
		<category><![CDATA[concludes]]></category>
		<category><![CDATA[Dang Van Cu]]></category>
		<category><![CDATA[Do Sinh]]></category>
		<category><![CDATA[Do Thi Yen]]></category>
		<category><![CDATA[Ground level]]></category>
		<category><![CDATA[Ho Chi Minh]]></category>
		<category><![CDATA[Ho Chi Minh City]]></category>
		<category><![CDATA[Lang Xa Con Village]]></category>
		<category><![CDATA[Minh]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Pham Tu]]></category>
		<category><![CDATA[Pham Van Loc]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Reflect]]></category>
		<category><![CDATA[reflected]]></category>
		<category><![CDATA[Report to the police of Ho Chi Minh City]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Thanh Toan]]></category>
		<category><![CDATA[Thuy Thanh]]></category>
		<category><![CDATA[Thuy Thanh Commune People s Committee]]></category>
		<category><![CDATA[Tran Duy Thanh]]></category>
		<category><![CDATA[Tran Song]]></category>
		<category><![CDATA[Tran Thi Ngoc Ha]]></category>
		<category><![CDATA[TTCP]]></category>
		<category><![CDATA[TX Huong Thuy]]></category>
		<category><![CDATA[Violations]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-ttcp-concludes-many-violations-as-reflected-by-the-ho-chi-minh-city-public-security-newspaper/</guid>

					<description><![CDATA[Many land violations in Huong Thuy Town (Thua Thien Hue) and the personal Deputy Chief Inspector of the Town People&#8217;s Committee Huong Thuy that the Ho Chi Minh City Police Newspaper has reflected, has recently been the Government Inspector (TTCP) clarify and recommend handling. Ho Chi Minh City Police Newspaper on September 23, 2019 published: [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Many land violations in Huong Thuy Town (Thua Thien Hue) and the personal Deputy Chief Inspector of the Town People&#8217;s Committee Huong Thuy that the Ho Chi Minh City Police Newspaper has reflected, has recently been the Government Inspector (TTCP) clarify and recommend handling.</strong><br />
<span id="more-7810"></span> Ho Chi Minh City Police Newspaper on September 23, 2019 published: &#8220;Deputy Chief Inspector of the Town People&#8217;s Committee, Huong Thuy is accused of having many violations&#8221;, Mr. Pham Tu &#8211; Deputy Chief Inspector of the Town, Huong Thuy from 2010 to now, Chairman of People&#8217;s Committee of Thuy Thanh commune (period 2004–2010) “acquires” land; lease or transfer land without auction to many acquaintances; bring citizens&#8217; documents to transact, transfer against regulations &#8230;</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_62_38622301/6f2e474d610f8851d11e.jpg" width="625" height="311"> <em> Reporter worked with Mr. Nguyen Quang Uyen &#8211; Head of Thanh Tuyen village (Thuy Thanh commune) on one of Mr. Tu&#8217;s violations.</em> Specifically, in 2009, Mr. Tu advised the District People&#8217;s Committee (now the town) Huong Thuy to grant land and build gratitude houses for Mrs. Do Thi Yen (living in Lang Xa Con village) on a land plot of 263m2. In fact, papers and real estate stand under the names of Mrs. Mang and Mr. Thanh; Yen does not live. Ms. Mang cut out for Mr. Tu, the land plot of 60 square meters. This land streak is located next to the land plot of 150m2 of frontage and house of Mr. Tu. In 2010, Mr. Tu &#8220;took&#8221; the planning information of 10 plots of land, assigned the commune People&#8217;s Committee to auction, arranged his relatives to buy: Pham Dan (his brother, living in Ho Chi Minh City); Tran Thi Ngoc Ha (Mr. Dan&#8217;s wife); Pham Van Loc (biological brother); Tran Thi Thanh Thuy (sister-in-law); Truong Van Tuan (her biological son); allocating 243m2 of land to Mr. Tran Duy Thanh. Mr. Dan, Ms. Ha living in Ho Chi Minh City, Mr. Tuan (living in Phu Xuan commune, Phu Vang district) &#8230; did not have a local household registration book, did not know that he won the land auction. Mr. Tu made his own record of winning the auction (at floor price), signed and paid all the above land lots. After the land was issued the red book, Mr. Tu sold it all to others. While people have the need to buy land for living, they are not approved. Many Party secretaries, village chiefs, retired officials and people reflect and denounce Mr. Tu&#8217;s mistakes. Taking advantage of legal loopholes and fear of people who do not have a red book, Mr. Tu has granted land for the wrong purpose, wrong planning for Ms. Ngo Thi Quy; buy cheap land from Mr. Tran Song and Mrs. Queo &#8230; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_62_38622301/1a324e516813814dd802.jpg" width="625" height="712"> <em> A house and land on Hoang Quoc Viet street frontage of Mr. Pham Tu after being transferred from Mr. Song and a part of land from the provision of land, building a house of gratitude for Mrs. Yen. </em> <strong> Will discipline, recover lost money</strong> After the newspaper was published, the Chairman of the Provincial People&#8217;s Committee directed the local authorities and functional agencies to inspect and handle. Thi Party Committee, People&#8217;s Committee of Huong Thuy town established an interdisciplinary inspection team. And so far, the TTCP concludes many wrong contents of Mr. Tu and the locality. The inspection conclusion on March 4, 2021 of the TTCP has many contents that the Ho Chi Minh City Police Newspaper reflects. Specifically, there are 2 mistakes in the allocation of land for 263m2 and the building of gratitude houses for Mrs. Do Thi Yen. Ms. Yen is the son of martyr Do Sinh, has a household registration in Thuy Phuong commune, and is assigned land by the People&#8217;s Committee of Huong Thuy Town according to Decision 905 / QD-UBND dated October 13, 2010. But before that, on August 4, 2009, the People&#8217;s Committee of Thuy Thanh commune had a record of temporary handover of land to build gratitude houses and a record dated October 5, 2010 on handing over houses of gratitude combined with residential land to Mrs. Yen. The allocation of this land by the People&#8217;s Committee of Huong Thuy is legalizing the improper land allocation of the former CPC. On the other hand, before the land allocation, the TX People&#8217;s Committee did not determine whether Mrs. Yen was the subject of land allocation. The current house is 2 floors, frontage Hoang Quoc Viet street (main road connecting Hue city to Thuy Thanh commune), convenient location. Meanwhile, Ms. Yen does not live in the house above. Currently, the house is used by Mr. Thanh and Mrs. Mang. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_62_38622301/ad42fc21da63333d6a72.jpg" width="625" height="334"> <em> Mr. Phan Chi Huan (left) &#8211; Secretary of Thanh Tuyen hamlet and Mr. Dang Van Cu &#8211; Head of Thanh Toan village, frustratedly reflect on the mistakes of Mr. Pham Tu.</em> Ms. Mang is the aunt of Mr. Pham Tu &#8211; former Chairman of the People&#8217;s Committee of Thuy Thanh commune who previously assigned land in contravention of regulations to Mrs. Yen. The local government did not fully implement the prescribed process and procedures. The People&#8217;s Committee of Huong Thuy town has not followed the order, showing signs of legalizing the incorrect land allocation by the CPC. TTCP also concluded: to hand over 243m2 of residential land to Mr. Tran Duy Thanh (Thanh Thuy Chanh village) without auction. Leasing Mr. Ngo Tam Buu to rent 56 square meters in the residential area of ​​cluster 6 (Thanh Toan village) for business, but Mr. Buu building a permanent house to live in is contrary to the land lease contract. This land allocation is not for the right purpose and in land use planning. Granting a red book to Ms. Ngo Thi Queo with 542.3m2 of rice land in Lang Xa Con village is not the right origin, land use purpose, in violation of Article 11 of the 2013 Land Law. It is allowed to convert 7 households with land from the old brick kiln to the planning area of ​​group 9, Phu Bai ward (Huong Thuy town), causing a loss of the state budget of more than 1.1 billion VND, so it needs to be recovered. The aforementioned violations are the responsibility of the Chairman of the Town People&#8217;s Committee Huong Thuy, the Division of Natural Resources and Environment, the Office of Land Use Rights Registration, the Chairman of the People&#8217;s Committee of Thuy Thanh Commune and the Chairman of the People&#8217;s Committee of Phu Bai Ward, period 2004 –2010.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7810</post-id>	</item>
	</channel>
</rss>