<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Server &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/server/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 09 Jun 2021 23:02:08 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>South Korea warns of increased malware attacks</title>
		<link>https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</link>
		
		<dc:creator><![CDATA[Phương Oanh (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:02:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[adjacent]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[South]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[warns]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</guid>

					<description><![CDATA[According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. (Artwork. Source: bitcoinexchangeguide.com) Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year.</strong><br />
<span id="more-21907"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_293_39085748/2281fbd0e99200cc5983.jpg" width="625" height="417"> </p>
<p> <em> (Artwork. Source: bitcoinexchangeguide.com)</em> Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase in online shopping activities. . On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Malware attacks <strong> blackmail</strong> was aimed at various businesses in Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local fashion and retail group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Mr. Kim Seung-joo, Professor of Cyber ​​Security at University <strong> Korea</strong> , commented that as companies are forced to choose to increase their reliance on remote work during the pandemic, cyber attacks <strong> malicious code</strong> Blackmail has become a bigger threat because they can paralyze the entire working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. He urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks in the near future, last month, the Korean Ministry of Information and Communications Technology set up a 24-hour monitoring group to support hacked companies. . The government is now providing assistance to affected companies in system recovery.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21907</post-id>	</item>
		<item>
		<title>Covid-19: Explosion of ransomware attacks in Korea</title>
		<link>https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 21:12:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Explosion]]></category>
		<category><![CDATA[Go to work]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Urging]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</guid>

					<description><![CDATA[Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea. The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap) On June 3, a large plastic surgery hospital in the south of Seoul announced on its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea.</strong><br />
<span id="more-21891"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_194_39085601/2ef7a1a1b3e35abd03f2.jpg" width="625" height="424"> </p>
<p> <em> The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap)</em> On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Ransomware attacks have targeted various businesses in South Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local retail and fashion group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Kim Seung-joo, a professor of cybersecurity at Korea University, said that in the context of companies being forced to choose to increase their reliance on remote working during the pandemic, ransomware attacks Money has become a bigger threat because they can paralyze the whole working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. Kim Seung-joo urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks, last month, South Korea&#8217;s Ministry of Information and Communications Technology set up a 24-hour monitoring team to assist hacked companies. The government is now providing assistance to affected companies in system recovery. (according to Yonhap)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21891</post-id>	</item>
		<item>
		<title>The US raised the level of investigation into the crime of extortion hackers to the level of &#8216;terrorists&#8217;</title>
		<link>https://en.spress.net/the-us-raised-the-level-of-investigation-into-the-crime-of-extortion-hackers-to-the-level-of-terrorists/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 08 Jun 2021 11:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[DOJ]]></category>
		<category><![CDATA[Establish]]></category>
		<category><![CDATA[extortion]]></category>
		<category><![CDATA[Guidelines]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[investigation]]></category>
		<category><![CDATA[John Carlin]]></category>
		<category><![CDATA[level]]></category>
		<category><![CDATA[Level up]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[raised]]></category>
		<category><![CDATA[Report]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Terrorism]]></category>
		<category><![CDATA[Terrorists]]></category>
		<category><![CDATA[Threats]]></category>
		<category><![CDATA[US Department of Justice]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-us-raised-the-level-of-investigation-into-the-crime-of-extortion-hackers-to-the-level-of-terrorists/</guid>

					<description><![CDATA[The US Department of Justice has raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases. Associated Reuters Citing a senior US official on June 3, the US Justice Department had raised the level of investigation into ransomware attacks to the same level of priority as investigating [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The US Department of Justice has raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases.</strong><br />
<span id="more-21521"></span> Associated <em> Reuters </em> Citing a senior US official on June 3, the US Justice Department had raised the level of investigation into ransomware attacks to the same level of priority as investigating &#8220;terrorism&#8221; cases.</p>
<p> The move comes after the attack on the US oil and gas shipping company Colonial Pipeline and the growing damage caused by cybercriminals. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_114_39072829/49c50b18195af004a94b.jpg" width="625" height="432"> <em> The US raised the level of investigation into the crime of extortion hackers to the level of &#8216;terrorists&#8217;. Photo: REUTERS</em> In an internal guideline document sent to law offices across the United States on June 3, the US Department of Justice directed that investigations into ransomware should be coordinated with the central government, specifically: A new task force was established in Washington. &#8220;This will be a specialized process to ensure we can track all cases of extortion hackers regardless of where they happen in the US, so we can capture the connection between subjects and proceed to break the whole link,&#8221; said Deputy Attorney General John Carlin. Previously, in May, the largest US oil pipeline system, the Colonial Pipeline, was crippled by hackers. Colonial Pipeline has decided to pay hackers who have compromised their systems nearly $5 million to regain access. According to the <em> Reuters</em> , the DOJ&#8217;s guidance document specifically mentions the Colonial attack as an example of &#8220;the growing threat posed by cybercriminals and digital ransomware to the nation.&#8221; . &#8220;To ensure we can uncover connections between incidents and investigations across the country and globally, and to paint a big picture of national security and economic threats, The economy we face, we must strengthen and focus our internal monitoring,&#8221; the guidance document states. <em> Reuters </em> Citing US officials, the decision to include ransomware attacks in a special process by the Department of Justice shows that the issue is being prioritized. &#8220;We&#8217;ve used this model in the past for counterterrorism, but never with ransomware,&#8221; said Carlin, adding that the process typically applies to cases involving direct national security. In practice, this means that investigators at US attorneys&#8217; offices dealing with ransomware cases will have to share both up-to-date case details and technical information with officials in Washington. The guidelines also require offices to review and report other investigations related to the large-scale cybercrime ecology. According to the guidelines, the list of investigations currently required to be reported to the central government includes: anti-virus services, illegal online forums or marketplaces, cryptocurrency exchanges, cybercriminal server services, botnets, and online money laundering services. “We would like to emphasize that prosecutors and criminal investigators need to report and conduct monitoring of cryptocurrency exchanges, illegal online forums or marketplaces for trading hacking tools. , as well as tracking botnets that serve a variety of purposes,” said Carlin. According to Mark Califano, a former US attorney and cybercrime expert, raising the level of investigation could allow the US Justice Department to &#8220;deploy resources more effectively&#8221; and &#8220;identify common exploits&#8221; variables&#8221; used by cybercriminals.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21521</post-id>	</item>
		<item>
		<title>UC Browser secretly collects browsing data of iPhone users</title>
		<link>https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 08:07:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alibaba]]></category>
		<category><![CDATA[App store]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[browsing]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[collects]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Gabi Cirlig]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[secret]]></category>
		<category><![CDATA[secretly]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Surfing the web]]></category>
		<category><![CDATA[UC Browser]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<guid isPermaLink="false">https://en.spress.net/uc-browser-secretly-collects-browsing-data-of-iphone-users/</guid>

					<description><![CDATA[Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China. The collected data even includes IP addresses, which can be used to track the approximate location of the user. UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, security researcher Gabi Cirlig discovered that UC Browser (a fairly popular mobile browser) was secretly sending iPhone users&#8217; browsing data to servers in China.</strong><br />
<span id="more-21025"></span> The collected data even includes IP addresses, which can be used to track the approximate location of the user.</p>
<p> UC Browser is developed by UCWeb, a subsidiary of Alibaba (China). This is one of the most popular mobile browsers in Asia, with over 500 million downloads on Google Play alone. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_331_39051919/1e841e3a0f78e626bf69.jpg" width="625" height="352"> According to security researcher Gabi Cirlig, UC Browser silently sent iPhone users&#8217; browsing data (even with incognito mode enabled) to UCWeb servers (registered in China, but located in the US). ). This is in stark contrast to the company&#8217;s previous statement, which does not record a user&#8217;s &#8220;browsing and search history&#8221; when incognito mode is activated. More worryingly, UC Browser also collects IDs (unique identifiers) to track users across various websites. The collection of user data happens on both Android and iOS versions, not sure what UCWeb is doing with all this information? Interested readers can watch the video at: “This kind of tracking is done on purpose,” Cirlig told Forbes. When compared with Google Chrome browser and some other popular browsers, he found there is no browser like UC Browser. UC Browser just rolled out a new update last week, but the company never mentioned monitoring users&#8217; browsing activity. Currently the English version of UC Browser has been removed from the App Store, but the Chinese version still exists, and unlike the English version, it does not send data back to the UCWeb server. Earlier in 2019, the UC Browser version for Android also violated Google Play&#8217;s policies.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21025</post-id>	</item>
		<item>
		<title>Korean technology companies strengthen cooperation in the semiconductor field</title>
		<link>https://en.spress.net/korean-technology-companies-strengthen-cooperation-in-the-semiconductor-field/</link>
		
		<dc:creator><![CDATA[Khánh Ly (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 18:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Co operate]]></category>
		<category><![CDATA[COMPANIES]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[complex]]></category>
		<category><![CDATA[Cooperation]]></category>
		<category><![CDATA[data center]]></category>
		<category><![CDATA[Electronics Research Institute]]></category>
		<category><![CDATA[Establish]]></category>
		<category><![CDATA[Field]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korean]]></category>
		<category><![CDATA[Korean media]]></category>
		<category><![CDATA[Manufacturing]]></category>
		<category><![CDATA[Semiconductor]]></category>
		<category><![CDATA[Seoul]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[shortage]]></category>
		<category><![CDATA[SK Telecom]]></category>
		<category><![CDATA[small]]></category>
		<category><![CDATA[southern]]></category>
		<category><![CDATA[strengthen]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://en.spress.net/korean-technology-companies-strengthen-cooperation-in-the-semiconductor-field/</guid>

					<description><![CDATA[The companies will also collaborate on chip development, as well as pursue plans to establish a semiconductor test environment at an AI industry complex in Gwangju, 329 kilometers south of Seoul. Illustration (Source: Chinadaily) South Korea&#8217;s Ministry of Science and Information Technology and Communications said on June 1 that many cloud data center operators have [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The companies will also collaborate on chip development, as well as pursue plans to establish a semiconductor test environment at an AI industry complex in Gwangju, 329 kilometers south of Seoul.</strong><br />
<span id="more-20665"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_01_293_39043293/8ccb8ecb9e8977d72e98.jpg" width="625" height="400"> </p>
<p> <em> Illustration (Source: Chinadaily)</em> South Korea&#8217;s Ministry of Science and Information Technology and Communications said on June 1 that many cloud data center operators have cooperated with companies specializing in chips used in Korean servers to meet the respond to the increase in demand for semiconductor products and respond to uncertainties in the global supply chain. The ministry said five data center companies, Naver Cloud, Douzone Bizon, Kakao Enterprise, NHN and KT, along with the Artificial Intelligence Industry Cluster Agency, signed a memorandum of understanding with Korean server chip companies SK Telecom, Rebellions, FuriosaAI, and Korea Electronics and Telecommunications Research Institute to expand the use of products <strong> Semiconductor</strong> domestically produced artificial intelligence (AI) in data centers. Demand for AI semiconductor products from data center operators has been increasing in recent times. These companies need chips to process large volumes of data efficiently. Ministry of Science and <strong> Technology</strong> Information &#8211; Korean media predicts that the global server AI chip market will grow from $3.5 billion in 2020 to $34.7 billion in 2030. Under the aforementioned agreement, the companies will also cooperate on chip development, as well as pursue plans to establish a semiconductor test environment at an AI industry complex in Gwangju, 329 kilometers south of Seoul. The ministry said it would support the cooperation plan of the <strong> company</strong> and hope that this agreement will boost the semiconductor industry of <strong> Korea</strong> in the context of a recent global supply shortage.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20665</post-id>	</item>
		<item>
		<title>Dell announces record revenue of $24.5 billion in the first quarter quý</title>
		<link>https://en.spress.net/dell-announces-record-revenue-of-24-5-billion-in-the-first-quarter-quy/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 23:56:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[ALIENWARE]]></category>
		<category><![CDATA[Announced]]></category>
		<category><![CDATA[announces]]></category>
		<category><![CDATA[billion]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Dell]]></category>
		<category><![CDATA[Dell Technologies]]></category>
		<category><![CDATA[GAAP]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[Jeff Clarke]]></category>
		<category><![CDATA[Laptop]]></category>
		<category><![CDATA[Merge]]></category>
		<category><![CDATA[Numbers]]></category>
		<category><![CDATA[Personal computer]]></category>
		<category><![CDATA[quarter]]></category>
		<category><![CDATA[Quy]]></category>
		<category><![CDATA[Ratio]]></category>
		<category><![CDATA[Record]]></category>
		<category><![CDATA[Revenue]]></category>
		<category><![CDATA[Semiconductors]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[The order]]></category>
		<category><![CDATA[VMWARE]]></category>
		<guid isPermaLink="false">https://en.spress.net/dell-announces-record-revenue-of-24-5-billion-in-the-first-quarter-quy/</guid>

					<description><![CDATA[Dell Technologies just posted a record $24.5 billion in revenue for its first fiscal quarter, driven by strong growth in its personal devices business for work and distance education globally. Dell Technologies is known as a technology giant that provides infrastructure, PC and other solutions to customers. Dell posted record revenue of $24.5 billion in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Dell Technologies just posted a record $24.5 billion in revenue for its first fiscal quarter, driven by strong growth in its personal devices business for work and distance education globally.</strong><br />
<span id="more-19899"></span> Dell Technologies is known as a technology giant that provides infrastructure, PC and other solutions to customers.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_11_39010103/cc47d4c9c38b2ad5739a.jpg" width="625" height="407"> <em> Dell posted record revenue of $24.5 billion in the first quarter. Photo: Dell</em> According to the latest report, the company achieved sales of $24.5 billion, up 12% year-on-year. This figure is higher than the forecast of financial analysts of 23.4 billion USD. Product revenue was $18 billion, up 12%, service revenue was $6.5 billion, up 10%. In that, non-GAAP earnings of $2.13 per share, higher than the prediction of $1.61. On that basis, Dell earned $1.13 per share, operating income of $1.4 billion, up 96%. Gross margin was unchanged from a year ago, at 31%. Dell said cash flow from operations over the past 12 months hit a record $14.4 billion. In revenue from its businesses, Dell recorded a 20% increase in the PC business of $13.3 billion, while orders for Alienware gaming laptops increased by 76%. Group operating income was $1.1 billion, up 84%, consumer revenue grew 42%, commercial customer revenue grew 14%. Infrastructure Solutions had $7.9 billion in revenue, up 5%. Server and network revenue was $4.1 billion, up 9%, while storage revenue was $3.8 billion. The VMware business brought in total revenue of $2.99 ​​billion, up 9% year over year. Dell and VMware will continue their strategic relationship as Dell transferred 81% of shares to Dell Technologies shareholders last month in the fourth quarter of 2021. Jeff Clarke, CEO of Dell, said there has been a significant acceleration in digital transformation globally, and it shows in Dell&#8217;s business numbers. Technology has become increasingly central to the global economy and society. Dell sees opportunities ahead and for the future using the data Dell is creating. However, the Covid-19 pandemic is a problem that affects the global supply chain of Dell and other technology companies, causing difficulties for the information technology industry today. Shortages of semiconductors, supply for displays, memory, and graphics chips are also the reasons why orders like PCs are affected this year and into the next.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19899</post-id>	</item>
		<item>
		<title>How to limit the leak of activity history on Google</title>
		<link>https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Tue, 25 May 2021 02:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[Any]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Extra]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[leak]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[My Activity]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Query]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Song]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Verification]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</guid>

					<description><![CDATA[When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers. Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data. According to Google, if users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers.</strong><br />
<span id="more-18010"></span> Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data.</p>
<p> According to Google, if users turn on the Extra verification feature (additional verification), their personal data will be safer, especially on shared devices (work computers, tablets &#8230;). Note, this feature only applies to My Activity item. First, open a browser on your phone or computer and go to https://myactivity.google.com/myactivity, then log in with the corresponding Google account. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/8bdb46bf52fdbba3e2ec.jpg" width="625" height="477"> <em> The section that manages personal activities on Google. Photo: MINH HOANG</em> Next, click on the Manage My Activity Verifications link, and select Request Additional Verification &#8211; Save to finish. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/a8cf7cab68e981b7d8f8.jpg" width="625" height="475"> <em> Enable additional verification for better data protection. Photo: MINH HOANG</em> Once enabled, this feature will ask you to verify your identity before showing activity history. This essentially takes you to Google&#8217;s sign-in page, which then asks the user to enter the account password or connect using an Android device (if you&#8217;ve set it up before). Overall, this extra feature is quite useful on shared devices. However, if you feel uncomfortable with saving activity history, you can turn off unnecessary items or delete everything in the settings. To do this, go to https://myactivity.google.com/myactivity, log in with the respective account. There will be three sections here: Web &#038; App Activity, Location History, and YouTube Activity History. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/9549452d516fb831e17e.jpg" width="625" height="487"> <em> Delete all previously saved activity history. Photo: MINH HOANG</em> When you click on any item, you can temporarily disable that feature or delete all previously saved data through Activity Management. If you want Google to automatically delete data for each time period, users just need to select Delete automatically, then select the corresponding time period (more than 3 months, more than 18 months or more than 36 months) and follow the steps instructions until complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18010</post-id>	</item>
		<item>
		<title>AMD records 8.9% growth in the first quarter of 2021, the highest in 15 years</title>
		<link>https://en.spress.net/amd-records-8-9-growth-in-the-first-quarter-of-2021-the-highest-in-15-years/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Thu, 20 May 2021 10:40:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[AMD]]></category>
		<category><![CDATA[AMD Ryzen 5000]]></category>
		<category><![CDATA[arm]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Cpu]]></category>
		<category><![CDATA[Desktop]]></category>
		<category><![CDATA[F 2]]></category>
		<category><![CDATA[Growth]]></category>
		<category><![CDATA[highest]]></category>
		<category><![CDATA[Intel]]></category>
		<category><![CDATA[Leader]]></category>
		<category><![CDATA[Microprocessor]]></category>
		<category><![CDATA[NVIDIA]]></category>
		<category><![CDATA[Processor]]></category>
		<category><![CDATA[quarter]]></category>
		<category><![CDATA[Record]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[Rocket Lake]]></category>
		<category><![CDATA[Semiconductor]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Super computer]]></category>
		<category><![CDATA[Tallest]]></category>
		<category><![CDATA[X86]]></category>
		<category><![CDATA[Years]]></category>
		<category><![CDATA[Zen Buddhism]]></category>
		<guid isPermaLink="false">https://en.spress.net/amd-records-8-9-growth-in-the-first-quarter-of-2021-the-highest-in-15-years/</guid>

					<description><![CDATA[In the first quarter of 2021, recording the fastest growth compared to Intel in the server CPU market with EPYC processors, this increase is reported to be AMD&#8217;s highest since 2006. According to a report from Mercury Research, an independent research and insights company for the PC-related semiconductor and components market, AMD&#8217;s x86 CPU market [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the first quarter of 2021, recording the fastest growth compared to Intel in the server CPU market with EPYC processors, this increase is reported to be AMD&#8217;s highest since 2006.</strong><br />
<span id="more-16547"></span> According to a report from Mercury Research, an independent research and insights company for the PC-related semiconductor and components market, AMD&#8217;s x86 CPU market share increased to 8.9% in the first quarter. For the first time of 2021, this number represents strong growth compared to leading chipmaker Intel.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_11_38794501/c35627513a13d34d8a02.jpg" width="625" height="350"> <em> AMD recorded 8.9% growth in the first quarter of 2021, the highest in 15 years</em> In 2020 and into the first quarter of 2021, AMD has focused on high-end desktop CPUs and EPYC chips for servers. The first quarter of the year recorded a record increase of 41% over the same period last year, which is the highest number for the CPU market in 25 years. AMD&#8217;s biggest growth most recently came in 2006, when the chipmaker saw its server CPU market share increase from about 5-7% to about 22% in just 18 months with the 64-bit Opteron processor. bits. Then, Intel overtook AMD to let Intel regain its leadership in technology and hold it for 10 years. AMD has launched EPYC Milan and it is used for data centers and supercomputers. Consistent growth in the first quarter will propel AMD further in its goal of becoming a leader in the server CPU segment. The choice of EPYC chip has proven that AMD&#8217;s direction is appropriate in recent times. One question is what the growth of ARM architecture means for ARM and Intel in the near future, while Nvidia, Microsoft and others are gradually moving to produce ARM-based CPUs. As for Intel, most recently launched Rocket Lake processors and they compete directly with AMD Ryzen 5000. However, Intel&#8217;s chips are more commonly found in retail stores at very affordable prices. competition while AMD&#8217;s chips are still rare on store shelves. AMD still has a strong portfolio of next-gen EPYC CPUs such as the 4th Gen EPYC Genoa chips that are expected to be announced next year and will feature the all-new Zen 4 core architecture and a host of other features to addresses Intel Sapphire Rapids &amp; Granite Rapids Xeon CPUs.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16547</post-id>	</item>
		<item>
		<title>Internet Computer virtual currency reached $ 45 billion market capitalization after one day of launch</title>
		<link>https://en.spress.net/internet-computer-virtual-currency-reached-45-billion-market-capitalization-after-one-day-of-launch/</link>
		
		<dc:creator><![CDATA[Đức Anh -]]></dc:creator>
		<pubDate>Mon, 17 May 2021 19:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Amazon]]></category>
		<category><![CDATA[Binance coin]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Bloomberg]]></category>
		<category><![CDATA[Capitalization]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Ether]]></category>
		<category><![CDATA[fantasy]]></category>
		<category><![CDATA[founder]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Saturday Night Live]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Top 10]]></category>
		<category><![CDATA[Transaction value]]></category>
		<guid isPermaLink="false">https://en.spress.net/internet-computer-virtual-currency-reached-45-billion-market-capitalization-after-one-day-of-launch/</guid>

					<description><![CDATA[Currently, Internet Computer is one of the 10 largest virtual currencies by market capitalization&#8230; Internet Computer coin traded at 370.3 USD &#8211; Photo: Bloomberg Just launched on May 10, virtual currency called Internet Computer has immediately entered the top 10 largest virtual currencies in the world with a market capitalization of about 45 billion USD, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Currently, Internet Computer is one of the 10 largest virtual currencies by market capitalization&#8230;</strong><br />
<span id="more-15581"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_3_38812038/ffb995fc8bbe62e03baf.jpg" width="625" height="416"> </p>
<p> Internet Computer coin traded at 370.3 USD &#8211; Photo: Bloomberg Just launched on May 10, virtual currency called Internet Computer has immediately entered the top 10 largest virtual currencies in the world with a market capitalization of about 45 billion USD, according to the ranking on CoinMarketCap.com. Internet Computer was created to help anyone &#8211; from software developers to content creators &#8211; upload whatever they want to the internet without having to go through tech giants like Amazon. , Facebook or through servers, commercial cloud services. According to Dominic Williams, founder of the Internet Computer project, this virtual currency helps users avoid closed ecosystems of businesses and reduce costs. Users can build their own social networks as well as many other services to compete with giant internet companies. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_3_38812038/88f7ecb2f2f01bae42e1.jpg" width="625" height="416"> Internet Computer coin price movement after one day of launch &#8211; Source: Coinmarketcap.com The Internet Computer&#8217;s network uses smart contracts or task execution software to compete with larger cryptocurrencies like Ether (currently the second largest cryptocurrency by market capitalization). Internet Computer is also &#8220;shaking hands&#8221; with many other cryptocurrencies and related networks &#8211; such as Polkadot, Binance Coin &#8211; to bypass Ether. The Internet Computer coin was born in the context of virtual currencies from Bitcoin to Dogecoin being mentioned everywhere, at dinners to Saturday Night Live on national television in the US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_3_38812038/b763d526cb64223a7b75.jpg" width="625" height="369"> Top 10 largest cryptocurrency market capitalization, updated price at 9:00 am on May 12 (Vietnam time) &#8211; Source: Coinmarketcap.com Dong Internet Computer traded at 370.3 USD at 9:00 am on May 12 (Vietnam time), up more than 1% compared to the previous 24 hours. This virtual currency transaction value reached 1.5 billion USD, an increase of nearly 90% in 24 hours. The market capitalization of the entire cryptocurrency market is now $2,480 billion, up from less than $1 trillion earlier this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15581</post-id>	</item>
		<item>
		<title>Beware of technology trends</title>
		<link>https://en.spress.net/beware-of-technology-trends/</link>
		
		<dc:creator><![CDATA[TẤN BA]]></dc:creator>
		<pubDate>Fri, 14 May 2021 18:05:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Remote Control]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smarthome]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Webcam]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-technology-trends/</guid>

					<description><![CDATA[Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys. Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys.</strong><br />
<span id="more-14322"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_17_38824516/32fb83389c7a75242c6b.jpg" width="625" height="408"> </p>
<p> Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the router&#8217;s firmware and always use a complex password for the wifi router. If the router manufacturer does not provide new firmware, users should consider replacing it. Just like not checking your bank account from public wifi, homeowners should avoid accessing smarthome from an open wifi network, but if you need to remotely access your home, use a private network. Using a separate wifi for smart home systems is necessary because sharing a wifi system has many potential safety risks. Smarthome prioritizes the system to be able to self-alert to abnormal intrusion to ensure safety, so users should use devices with automatic alarm setting feature. When there is an unusual intrusion, a notification will be sent to the homeowner&#8217;s phone immediately. In smarthome, not only home lock, smart home control applications need abnormal login warning feature, this helps homeowners recognize the risk of network attack to implement instant protection options. then. In a smart home, if there is a smart speaker with a screen or camera, users should consider turning off or covering the camera when there is no need to use it. This is similar to the fact that many people have a habit of covering the webcam on their laptop to avoid unfortunate images being recorded. Smart devices of unknown origin are at risk of being installed with spyware, which is easy to lose control and have data stolen. To be safe, it is recommended to use equipment from reputable companies, need to check the company history, product support period. From this information, a decision can be made whether to buy the product or not. And more specifically, it is very important to check the owner of the servers that will contain his home&#8217;s information because most smarthome devices used in the home communicate with servers in the cloud. In the process of studying the operation of the smart home control system, security experts have discovered serious security holes. Security flaws in the cloud infrastructure and remote code execution, causing a third party to acquire the &#8220;super user&#8221; right to access and control the smart home system. Immediately, the above findings were shared with smart home providers to immediately address these dangerous security holes. With a smart home, each device inserted into the smarthome can also be a point for network attackers to take advantage of, intrude on the home system &#8230;, so smart home security is very necessary for those who want Design your own smart home.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14322</post-id>	</item>
		<item>
		<title>Never open this Story on Instagram if you don&#8217;t want your iPhone, Android phone paralyzed</title>
		<link>https://en.spress.net/never-open-this-story-on-instagram-if-you-dont-want-your-iphone-android-phone-paralyzed/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Tue, 11 May 2021 21:04:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Arun Maini]]></category>
		<category><![CDATA[Do not want]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[Grey]]></category>
		<category><![CDATA[Hang]]></category>
		<category><![CDATA[HTTP Proxy]]></category>
		<category><![CDATA[INSTAGRAM]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[open]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[paralyzed]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[SAOSTAR]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Showing up]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Story]]></category>
		<category><![CDATA[upload]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/never-open-this-story-on-instagram-if-you-dont-want-your-iphone-android-phone-paralyzed/</guid>

					<description><![CDATA[Saostar &#8211; Any iPhone model and even old Android smartphones will be paralyzed as soon as you click on this Story on Instagram. Toxic messages and images that can paralyze smartphones have been no stranger to both iPhone and Android users in the past few years. This error has affected Apple&#8217;s iMessage messaging platform and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Saostar &#8211; Any iPhone model and even old Android smartphones will be paralyzed as soon as you click on this Story on Instagram.</strong><br />
<span id="more-13197"></span> Toxic messages and images that can paralyze smartphones have been no stranger to both iPhone and Android users in the past few years.</p>
<p> This error has affected Apple&#8217;s iMessage messaging platform and social network What&#8217;sApp. Recently, a similar error has appeared on the social network Instagram, which can cause any iPhone model or even old Android smartphone models to be paralyzed when clicking a special Story. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_329_38790933/8af08edf939d7ac3238c.jpg" width="625" height="351"> <em> This Story may cause iPhone and Android models to freeze immediately after being clicked. (Photo: Mrwhosetheboss / YouTube)</em> Accordingly, Story can cause iPhone and Android models to freeze immediately after clicking posted by an Instagram user called &#8220;pgtalal&#8221;. When the user clicks to view this Story, it will show up on a gray screen with random Arab words on it, immediately the smartphone will also freeze and cannot perform any task. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_329_38790933/fc42e06dfd2f14714d3e.jpg" width="625" height="312"> <em> (Photo: Mrwhosetheboss / YouTube)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_329_38790933/cb9dd1b2ccf025ae7ce1.jpg" width="625" height="312"> <em> (Photo: Mrwhosetheboss / YouTube)</em> At this point, the user can only restart the device for the device to work again. Arun Maini from Mrwhosetheboss went into the analysis of this particular Story of &#8220;pgtalal&#8221;, discovering that the user named &#8220;pgtalal&#8221; created the Story with two extremely large stickers inside, up to tens of millions of inches without What photo sharing platforms can support. That&#8217;s why older iPhone models as well as Android crashes. Oddly, though, the high-end Android models can still function properly after watching this Story. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_329_38790933/0115173a0a78e326ba69.jpg" width="625" height="312"> <em> High-end Android models can still function normally after watching this Story. (Photo: Mrwhosetheboss / YouTube)</em> Although Instagram does not allow users to post stories with giant stickers, but users &#8220;pgtalal&#8221; did some tricks with HTTP Proxy. This allows him to post giant stickers on Instagram&#8217;s servers. Because the sticker is very large, the iPhone and the majority of Android smartphones do not show this sticker, thereby causing the device to hang.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13197</post-id>	</item>
		<item>
		<title>Original Yang Ying&#8217;s latest airport private server, a yellow denim skirt, handsome and bright, 31-year-old girl still feels good</title>
		<link>https://en.spress.net/original-yang-yings-latest-airport-private-server-a-yellow-denim-skirt-handsome-and-bright-31-year-old-girl-still-feels-good/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 24 Apr 2021 01:59:03 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[31yearold]]></category>
		<category><![CDATA[airport]]></category>
		<category><![CDATA[Bright]]></category>
		<category><![CDATA[denim]]></category>
		<category><![CDATA[feels]]></category>
		<category><![CDATA[Girl]]></category>
		<category><![CDATA[good]]></category>
		<category><![CDATA[Handsome]]></category>
		<category><![CDATA[latest]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[skirt]]></category>
		<category><![CDATA[Yang]]></category>
		<category><![CDATA[Yellow]]></category>
		<category><![CDATA[Yings]]></category>
		<guid isPermaLink="false">https://en.spress.net/original-yang-yings-latest-airport-private-server-a-yellow-denim-skirt-handsome-and-bright-31-year-old-girl-still-feels-good/</guid>

					<description><![CDATA[Yang Ying is a dressing template for many young girls. She has good looks and good clothes. She has always been in her teenage years, and having children has not affected her beauty in the slightest. She is considered a top-class person who married and had children very early, and announced her marriage when she [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Yang Ying is a dressing template for many young girls. She has good looks and good clothes. She has always been in her teenage years, and having children has not affected her beauty in the slightest. She is considered a top-class person who married and had children very early, and announced her marriage when she was the hottest, but her career had no effect at that time, because she had just participated in &#8220;Running Man&#8221; and announced her relationship with Huang Xiaoming. In just a few years, she has been able to compare with Yang Mi, Liu Shishi and others. She has gained a lot of face powder, and Yang Ying&#8217;s face value is really the ceiling of internal entertainment.</strong></p>
<p><span id="more-7305"></span> <img decoding="async" src="https://p6.itc.cn/images01/20210422/fff17428a8d041c2bcc6f4845cab9cd3.jpeg" max-width="600"></p>
<p>In addition, the figure has been maintained very well. She still takes the girly route, especially in private. The airport clothes are all dressed between 20-30 years old. Recently, Yang Ying has rarely appeared at the airport. It has been a long time since the last airport show. This time she wore a yellow denim jacket and skirt with small white shoes, fresh and handsome. Yellow drives away the small heat of early summer in a second, and is full of brightness. At this time, many fashionable elites have put on a variety of colored items. Yellow is the most unforgettable color.</p>
<p><img decoding="async" src="https://p7.itc.cn/images01/20210422/34ae99284ded42cd99efe113b7508ed8.jpeg" max-width="600"></p>
<p>Yang Ying&#8217;s goose yellow is not so eye-catching, fresh and soft. The denim jacket and the denim half skirt give her a girlish atmosphere. Denim skirts are more feminine than jeans. Denim jackets and denim skirts are all solid colors, basically no other colors are added, and they look very simple. Yellow itself is already very colorful. No other colors are needed. It is simple and high-end. The denim jacket has both a zipper design, a vertical row of concealed buttons, and a symmetrical tooling pocket. There are many small designs.</p>
<p><img decoding="async" src="https://p9.itc.cn/images01/20210422/0aeb5f70f18545cbb2c2612a95a2c4ed.jpeg" max-width="600"> </p>
<p> Inside the denim jacket is a white T-shirt. The combination of light yellow and white is fresher and brighter than matching black. The T-shirt is also pure white, and the shape follows the ultimate simplicity. The T-shirt is pierced into the denim skirt to create the best proportions. The denim skirt has a simpler design, with the simplest silver buttons, echoing the concealed buttons on the top. Both tops and skirts are of the more self-cultivating styles, especially tops, which are short styles. Such suits can also be worn by small people and are fashionable and versatile.</p>
<p><img decoding="async" src="https://p0.itc.cn/images01/20210422/0c15c3292f4645e19c94a97ba00f7ee8.jpeg" max-width="600"></p>
<p>The short skirt reveals beautiful legs to the greatest extent. Yang Ying’s legs are slender and slender. The white shoes on her feet are not the same in general style. The soles are thicker and look like ultra-short Martin boots. They are cooler than ordinary white shoes. . Yang Ying&#8217;s crotch is not very good-looking, this time the shape perfectly covers the crotch, the T-shirt and short skirt wear a loose feeling, not close to the waist and crotch. Apple-shaped girls are very suitable to wear this way, without deliberately highlighting the waistline, straight skirts are very good to modify the figure, hidden meat can lengthen the figure.</p>
<p><img decoding="async" src="https://p2.itc.cn/images01/20210422/4e8470a52140407dbca29eed9e9472dd.jpeg" max-width="600"></p>
<p>Wearing a black baseball cap on her head, Yang Ying likes baseball caps privately. Masks and hats cover her small face. The simple white letters break the monotony of the hat. The letter baseball caps will never go out of style. Hair is soft and natural. During this period, black long straight hair is all the rage in domestic entertainment. This kind of hairstyle is pure and neat, returning to the feeling of first love in a second. The yellow denim suit comes from the brand Alberta Ferretti. Although it is a suit, it can also be worn separately. It must have a different feel. The shoes are from Dior.</p>
<p><img decoding="async" src="https://p6.itc.cn/images01/20210422/e27631cb47a140ce9bf1d969f334fa7f.jpeg" max-width="600"></p>
<p>The 31-year-old Yang Ying is still so girly. This body shape shows a full of pure vitality. Wearing a round neck can not block the slender neck. The head-to-body ratio and body ratio are very superior. She deserves to be a female star. From the side angle, I saw the red heart on the white shoes, and there was a surprise. Appropriate red embellishment always makes people&#8217;s eyes bright. Looking down on the screen of the mobile phone, people who don&#8217;t know will completely think that she is an 18-year-old young girl, and Yang Ying is in a good state.</p>
<p><img decoding="async" src="https://p9.itc.cn/images01/20210422/5bea426a8dde400d81b9cec8ab1c4190.jpeg" max-width="600"></p>
<p>Denim items are classic and timeless, especially denim skirts are liked by many urban girls. If you want to wear a novel look, colorful denim skirts are the first choice. In addition to the yellow line, Yang Ying&#8217;s pink denim skirt is also impressive. It is no longer a miniskirt, but a knee-length skirt, but with diagonal slits and cleverly exposed legs. In addition to the split ends, the waistband is also very unique and irregular in design. These two points make the denim skirt different from the general style in an instant, and the small personality is just right.</p>
<p><img decoding="async" src="https://p6.itc.cn/images01/20210422/27146c58d092485a937aeb58243e4a6d.jpeg" max-width="600"></p>
<p>Paired with white T-shirt and white shoes, it is full of freshness. The color denim skirt is matched with white single product, and the freshness is doubled. There is a small flower on the T-shirt, which is simple and chic. The hats and white shoes on the head have pink patterns. This color echoes the real high-end. As the top stream of the post-85s, Yang Ying has been rumored that resources have dropped a lot during this period, but there will be no significant short-term. The change depends on whether the follow-up can counterattack by word of mouth?</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7305</post-id>	</item>
		<item>
		<title>Half a million Huawei smartphones are infected with the Joker malware</title>
		<link>https://en.spress.net/half-a-million-huawei-smartphones-are-infected-with-the-joker-malware/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sat, 17 Apr 2021 15:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[All in One Messenger]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[C C]]></category>
		<category><![CDATA[Cover your eyes]]></category>
		<category><![CDATA[Du Lam]]></category>
		<category><![CDATA[Google Play Store]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[infected]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[Javascript]]></category>
		<category><![CDATA[JOKER]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Or know]]></category>
		<category><![CDATA[poisoned]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Tatyana Shishkova]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/half-a-million-huawei-smartphones-are-infected-with-the-joker-malware/</guid>

					<description><![CDATA[More than 500,000 Huawei smartphone users have downloaded the Joker malicious app without even knowing it. Doctor Web researchers discovered 10 seemingly harmless apps on AppGallery &#8211; Huawei&#8217;s official app market &#8211; that contain codes that connect to malicious C&#038;C servers to take over additional configuration and components. These additional components bypass the user, automatically [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>More than 500,000 Huawei smartphone users have downloaded the Joker malicious app without even knowing it.</strong><br />
<span id="more-3883"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_107_38535687/9d6b57247d669438cd77.jpg" width="625" height="374"> </p>
<p> Doctor Web researchers discovered 10 seemingly harmless apps on AppGallery &#8211; Huawei&#8217;s official app market &#8211; that contain codes that connect to malicious C&#038;C servers to take over additional configuration and components. These additional components bypass the user, automatically signing up for the paid service. To cover the phone&#8217;s owner, they demanded access to the notification and then interfered with the SMS verification code sent by the paid service. According to experts, the malicious code will subscribe to up to 5 such services, although developers can change the limit at any time. The list of infected applications range from virtual keyboards, photography, launchers, texting to stickers, games. Most have the same developer, Shanxi Kuailaipai Network Technology. In total, 10 apps were downloaded by more than 538,000 Huawei users. Doctor Web reported to Huawei and the company removing them from AppGallery. However, downloaders still have to manually delete the device. Below is a list of software that need to be removed immediately: Super Keyboard, Happy Color, Fun Color, New 2021 Keyboard, Camera MX &#8211; Photo Video Camera, BeautyPlus Camera, Color RollingIcon, Funney Meme Emoji, Happy Tapping, All-in-One Messenger. Experts say that modules downloaded from the malicious AppGallery also appear in other apps on Google Play. Once activated, they contact the remote server to receive the configuration file, which contains the task list, the paid service website, and the JavaScript mimics the user&#8217;s actions. The Joker malware was born in 2017, continuously detected in apps on Google Play Store. In October 2019, Kaspersky malware analyst Tatyana Shishkova tweeted about more than 70 malicious applications on the Google market. According to Google, they have removed about 1,700 Joker malicious apps since 2017. <strong> Du Lam </strong> (According to BleepingComputer)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3883</post-id>	</item>
	</channel>
</rss>