<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Steal &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/steal/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Fri, 18 Jun 2021 02:30:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Ford launches anti-theft technology with phone alarms</title>
		<link>https://en.spress.net/ford-launches-anti-theft-technology-with-phone-alarms/</link>
		
		<dc:creator><![CDATA[Lam Anh]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 02:30:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alarm]]></category>
		<category><![CDATA[alarms]]></category>
		<category><![CDATA[Anti theft]]></category>
		<category><![CDATA[antitheft]]></category>
		<category><![CDATA[Car owner]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Dissolve]]></category>
		<category><![CDATA[Eyesight]]></category>
		<category><![CDATA[Ford]]></category>
		<category><![CDATA[Ford Pass]]></category>
		<category><![CDATA[Key]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[Overnight]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Start the engine]]></category>
		<category><![CDATA[START UP]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[SYNC]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Vehicle]]></category>
		<category><![CDATA[Very difficult]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/ford-launches-anti-theft-technology-with-phone-alarms/</guid>

					<description><![CDATA[Ford vehicles will send you an alert to your smartphone if your car is stolen, or someone tries to start it illegally. SecuriAlert will send a notification to the vehicle owner&#8217;s smartphone if there is abnormal boarding activity Ford will warn you when using your smartphone if your car is stolen. Despite containment, vehicle crime [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Ford vehicles will send you an alert to your smartphone if your car is stolen, or someone tries to start it illegally.</strong><br />
<span id="more-24774"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_326_39169026/b4242a2b2469cd379478.jpg" width="625" height="350"> </p>
<p> SecuriAlert will send a notification to the vehicle owner&#8217;s smartphone if there is abnormal boarding activity Ford will warn you when using your smartphone if your car is stolen. Despite containment, vehicle crime remains a problem, and is even increasing in some countries. In cities where cars are parked on the street overnight, car owners don&#8217;t hear the alarm at all, or hear their car start up and drive away. Ford recognizes this problem and is testing an enhanced security system that connects to smartphones it calls SecuriAlert. Once activated, SecuriAlert will send a notification to the vehicle owner&#8217;s smartphone if it detects any vehicle activity, including door opening or key start, providing peace of mind. to vehicle owners when their vehicle is out of sight. SecuriAlert will work in tandem with FordPass, an app that connects car operating systems to smartphones, which is currently unavailable in some Asian markets. However, vehicles equipped with the latest versions of the SYNC 3 system come pre-installed with Ford Pass, meaning the technology is already on board, just waiting to connect to SecuriAlert. The FordPass app, through SecuriAlert, will reveal the time and cause for any alerts, as well as the vehicle&#8217;s last location. If someone tries to open the car door with the key, SecuriAlert will still send an alert. This can be especially helpful in identifying someone who wants to get into a car with a copied or stolen key. When owners return to their vehicle &#8211; to drive to work in the morning, they simply dismiss the SecuriAlert alert via the FordPass app and continue their journey.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24774</post-id>	</item>
		<item>
		<title>Turns out this is why Apple&#8217;s iPhones are so secure</title>
		<link>https://en.spress.net/turns-out-this-is-why-apples-iphones-are-so-secure/</link>
		
		<dc:creator><![CDATA[Thái Sơn - CTV]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 22:58:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Park]]></category>
		<category><![CDATA[apples]]></category>
		<category><![CDATA[chips]]></category>
		<category><![CDATA[Craig Federighi]]></category>
		<category><![CDATA[Experiment]]></category>
		<category><![CDATA[Extreme]]></category>
		<category><![CDATA[Hard]]></category>
		<category><![CDATA[Headquarters]]></category>
		<category><![CDATA[Inaccuracies]]></category>
		<category><![CDATA[Interview]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[iPhones]]></category>
		<category><![CDATA[Laboratory]]></category>
		<category><![CDATA[Private]]></category>
		<category><![CDATA[Random]]></category>
		<category><![CDATA[Secret facility]]></category>
		<category><![CDATA[secure]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The Independent]]></category>
		<category><![CDATA[turns]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/turns-out-this-is-why-apples-iphones-are-so-secure/</guid>

					<description><![CDATA[It is no coincidence that the iPhone has such good security capabilities. Apple&#8217;s importance in ensuring the security and privacy of its users is demonstrated by the fact that the company puts the chips and other components of the iPhone through a series of rigorous tests to ensure they are not susceptible to damage. attack. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>It is no coincidence that the iPhone has such good security capabilities.</strong><br />
<span id="more-24671"></span> Apple&#8217;s importance in ensuring the security and privacy of its users is demonstrated by the fact that the company puts the chips and other components of the iPhone through a series of rigorous tests to ensure they are not susceptible to damage. attack.</p>
<p> These tests are being conducted at a secret facility near Apple&#8217;s Apple Park headquarters, according to The Independent. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/dcf53cc23280dbde8291.jpg" width="625" height="326"> <em> Photo: DigitalTrends</em> “The purpose for the chips being tested is to see if they underperform in extreme situations – and if so, to make sure they only happen in the lab and not in the wild. the phone is in the hands of the user,” said The Independent. “Any of these inaccuracies can be a weakness for the device. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/44ff3d6da42e4d70143f.jpg" width="625" height="390"> <em> Photo: Business Insider</em> The Independent added that it is rare for a normal phone device to have to pass such extreme tests as it has to go from -40 degrees Celsius to 110 degrees Celsius. But the concern is real because if the chips lack security in such situations, bad guys can take advantage and the data stored inside can be stolen,&#8221; said The Independent. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_329_39168525/62c4976d342edd70843f.jpg" width="625" height="416"> <em> Photo: Business Insider</em> The site was obtained in an interview with Craig Federighi, Apple&#8217;s senior vice president of software engineering.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24671</post-id>	</item>
		<item>
		<title>Malicious apps on Android users need to remove urgently from their phones</title>
		<link>https://en.spress.net/malicious-apps-on-android-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 21:30:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[advertisement]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Delicate]]></category>
		<category><![CDATA[detect]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Google Play Store]]></category>
		<category><![CDATA[Kaspersky]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Store]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/malicious-apps-on-android-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[This malicious application will turn the victim&#8217;s smartphone and tablet into an ad-playing engine in an extremely sophisticated way. Security software developer Kaspersky has recently issued a warning about a malicious application on the Google Play Store that is targeting fans of the Minecraft game. This malicious application is called Mods Minecraft. The app doesn&#8217;t [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>This malicious application will turn the victim&#8217;s smartphone and tablet into an ad-playing engine in an extremely sophisticated way.</strong><br />
<span id="more-23013"></span> Security software developer Kaspersky has recently issued a warning about a malicious application on the Google Play Store that is targeting fans of the Minecraft game.</p>
<p> This malicious application is called Mods Minecraft. The app doesn&#8217;t function like an ad at all, instead it turns the victim&#8217;s smartphone and tablet into an ad-player in an extremely sophisticated way. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/b5b229052447cd199456.jpg" width="625" height="513"> <em> (Photo: Kaspersky)</em> Accordingly, after the first run, the application will hide its icons from the screen and continuously open the browser to display ads. The app can also play videos from YouTube, access the Google Play app store, and more. Security experts at Kaspersky found that the app opens the browser every two minutes, rendering the device essentially inoperable. use to be. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/ae9435233861d13f8870.jpg" width="625" height="410"> <em> (Photo: Kaspersky)</em> What&#8217;s especially worrisome is that it&#8217;s hard for users to know what&#8217;s going on with their devices, which apps are responsible for the trouble, and how to prevent it. The security experts at Kaspersky informed Google of their findings and the malicious app was quickly removed from the store. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/5924cc93c1d1288f71c0.jpg" width="625" height="350"> <em> Minecraft is one of the best-selling games in the world with about 180 million copies worldwide. (Photo: Mojang)</em> However, removing this app from Google&#8217;s app store does not mean the removal of all malware. In the past, developers of this type would simply upload new, slightly modified versions, using different names, from different developer accounts to further trick victims. An example can be mentioned is the VK Music Trojan. This app stole VK user accounts, but despite being reported, the app has survived on the Google Play app store for several years. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_329_39140507/7195e622eb60023e5b71.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Kaspersky ran a search for malicious Minecraft Mods-like apps &#8211; and found a few. In addition to the malicious application Mods Minecraft, a utility called File Recovery was also found to contain malware in version 1.1. However, that version has since been removed and version 1.1.1 of the app, available on Google Play, is safe.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23013</post-id>	</item>
		<item>
		<title>Warning to usurp the right to use the phone SIM, steal money</title>
		<link>https://en.spress.net/warning-to-usurp-the-right-to-use-the-phone-sim-steal-money/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 00:49:13 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[be entitled]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Fraudster]]></category>
		<category><![CDATA[Goverment]]></category>
		<category><![CDATA[Ho Chi Minh City Law]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Khai]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Sim]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The right]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Vinaphone]]></category>
		<category><![CDATA[VNPT HCMC]]></category>
		<category><![CDATA[Vo Do Thang]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[Withdrawal]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-to-usurp-the-right-to-use-the-phone-sim-steal-money/</guid>

					<description><![CDATA[After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to make online payments or withdraw money. Last time, Ho Chi Minh City Law received many feedbacks from readers about the situation where the phone SIM was taken by someone else leading to the money in the credit [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to make online payments or withdraw money.</strong><br />
<span id="more-21956"></span> Last time, <em> Ho Chi Minh City Law</em> received many feedbacks from readers about the situation where the phone SIM was taken by someone else leading to the money in the credit card being lost.</p>
<p> <strong> Original SIM card but still occupied by others </strong> Ms. ATH (in Binh Duong) reflected on 2-3 days, she discovered that her phone displayed a message that could not be called, so she went to VNPT Binh Duong Business Center to ask for a check. Here, the technical staff said that the SIM card is not damaged, still works two-way. On March 4, she went to the center to ask for a new SIM card. After that, the phone works normally. On March 12, Ms. H. logged into her credit card account to check and found that the money in the account had been withdrawn in the form of payment for purchases. Suspecting that her SIM information was exposed during the SIM rework, Ms. H. went to VNPT Binh Duong Business Center to find out. Only now did she know that on 2-3 days there was a transaction to replace her SIM at a VNPT center in Ho Chi Minh City. Ms. H. said that this SIM phone number has been registered by her owner before. Now suddenly my SIM was declared and appropriated by someone else, leading to the loss of her credit card more than 58 million dong. “During the settlement process, the representative of VNPT HCMC (where the SIM exchange happened) said he would support me with a scratch card worth 2 million VND, but I did not accept it. The main reason for losing money is because the network operator re-issued the SIM in the wrong process, not because of me, &#8220;- Ms. H. shared. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/8d8db290bed2578c0ec3.jpg" width="625" height="416"> <em> Ms. ATH was upset because someone else took control of her phone SIM, so her credit account lost more than 58 million dong. Photo: DANG LE</em> Another case is Mr. Trieu Duc Khai (in Thai Binh) also said on April 21, he made a complaint to VNPT Center in Thai Thuy district, Thai Binh. The content of the complaint about his VinaPhone SIM, although registered by the owner, was still controlled by others, leading to the loss of 35 million VND in his credit card. Through working with VNPT in Thai Thuy district, it was determined that someone had impersonated him to carry out the procedure to lose the SIM and make a new SIM with the subscriber number that Mr. Khai was using. This person only declared five phone numbers to call out, come to the nearest, and then be given a new SIM. <strong> Occupying SIM is a trick to appropriate money</strong> Exchange with <em> Ho Chi Minh City Law</em> Vo Do Thang, Director of Athena International Security and Network Administration Training Center, said that through the two cases above, it shows that if anyone reports the loss of SIM and only needs to provide five phone numbers to call. going, calling recently, committing to subscriber owner rights to be re-issued with a new SIM is not good at all. This has created a loophole for crooks to steal other people&#8217;s SIMs, to the detriment of genuine SIM users. According to Mr. Thang, most of the victims in the SIM loss cases were taken by fraudsters by making online payments. To pay for online purchases, there are three factors: The first is a mobile phone number. The credit card holder must register this phone number with the bank to authenticate transactions and receive bank notifications. The second is the card number (a series of numbers printed on the front of the credit card). The third is the OTP (one-time password) verification code sent to the phone number registered with the bank. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/155b22462e04c75a9e15.jpg" width="625" height="416"> <em> In the working minutes and written responses to Ms. H. and Mr. Khai, the network operator confirmed that re-issuing SIM cards to others was not in accordance with the process. Photo: DANG LE.</em> After hijacking the right to use the SIM, the crooks will take the victim&#8217;s credit card number to pay online, then use the newly issued SIM to receive the OTP code and complete the payment. The victim&#8217;s credit card number has been stolen by the crooks before, appropriating the phone SIM is only the last step to perform the act of appropriating money. According to Mr. Thang, not everyone who loses their phone SIM will lose money in their credit cards and bank accounts. Only when they have had their credit card or account information exposed before can crooks steal money. The victim&#8217;s credit card information may be exposed during previous online transactions. The cause is usually because the victim has filled out information on fraudulent websites, installed malicious code on the phone to steal card information, opened attachments of unknown origin or it can also be due to credit institutions. does not guarantee safety in terms of security,&#8221; Thang shared. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_114_39132000/70cc43d14f93a6cdff82.jpg" width="625" height="416"> <em> In the working minutes and written responses to Ms. H. and Mr. Khai, the network operator confirmed that re-issuing SIM cards to others was not in accordance with the process. Photo: DANG LE</em> <strong> The network operator did the wrong process</strong> In both cases mentioned above, in the process of working with customers, the operator has confirmed that the teller when carrying out the SIM reissuance procedure only requires the customer to provide five outgoing and incoming phone numbers. subscriber ownership is not the correct procedure. In response to the recent complaint of VNPT Center in Thai Thuy district, Thai Binh province against Mr. Trieu Duc Khai, it is clear that because of this unfortunate incident, VNPT Center of Thai Thuy district has apologized to customers. The material damage that the impostor causes to the customer, the center will fix and compensate for the loss. As for the case of Ms. ATH, VNPT HCMC said that it will accompany the customer to provide necessary information to serve the investigation agency.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21956</post-id>	</item>
		<item>
		<title>6 malicious Android apps users need to remove urgently from their phones</title>
		<link>https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:57:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Bitdefender]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Gang]]></category>
		<category><![CDATA[Google Android]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Keyloggers]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Virus removal]]></category>
		<guid isPermaLink="false">https://en.spress.net/6-malicious-android-apps-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[In case your phone has 1 of the 6 applications below, quickly remove them immediately. Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware. (Artwork: Presse-citron) Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In case your phone has 1 of the 6 applications below, quickly remove them immediately.</strong><br />
<span id="more-21921"></span> Security researchers at Bitdefender recently said that the hacker gang used fake versions of famous Android apps to spread malware.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/880527933cd1d58f8cc0.jpg" width="625" height="415"> <em> (Artwork: Presse-citron)</em> Specifically, the Teabot (or Anatsa) malware, which can allow hackers to take over the victim&#8217;s Android device completely; steal their banking and other important personal information through tools like keyloggers. The analysis report from Bitdefender researchers said that Teabot malware can perform attacks through Android Accessibility Services, view private messages, steal banking information, steal authentication codes. of Google,&#8230; and even take full remote control of the victim&#8217;s devices. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/eb8fa8e1b7a35efd07b2.jpg" width="625" height="416"> <em> (Artwork: Unsplash)</em> Distributing malware directly from app stores would be difficult, so hackers use the method of impersonating top-rated apps distributed on third-party websites. . According to research by Bitdefender, fake Android apps include antivirus, media player, health, etc. To deceive users, the fake app&#8217;s name and logo will be copied. copy almost or exactly like the real application. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/732d887b9a3973672a28.jpg" width="625" height="468"> <em> (Artwork: Panda Security)</em> Here are 6 malicious apps impersonating famous apps to scam users. If you are using Android devices, please check all the applications on the device. In case your phone has 1 of the 6 applications below, quickly remove them immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_329_39085621/08f4f0a2e2e00bbe52f1.jpg" width="625" height="441"> <em> The main app icon (right) and the fake app (left) have some differences in the 5th and 6th apps. (Image: Bitdefender)</em> Bitdefender emphasizes that the campaign against these malicious applications is still active. For this reason, Android users need to be careful about downloading apps, especially apps from third parties, that aren&#8217;t part of the Google app market; Don&#8217;t click on strange links and always look carefully at the permission requests of Android apps.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21921</post-id>	</item>
		<item>
		<title>South Korea warns of increased malware attacks</title>
		<link>https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</link>
		
		<dc:creator><![CDATA[Phương Oanh (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 23:02:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[adjacent]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[increased]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[South]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[warns]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/south-korea-warns-of-increased-malware-attacks/</guid>

					<description><![CDATA[According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. (Artwork. Source: bitcoinexchangeguide.com) Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year.</strong><br />
<span id="more-21907"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_293_39085748/2281fbd0e99200cc5983.jpg" width="625" height="417"> </p>
<p> <em> (Artwork. Source: bitcoinexchangeguide.com)</em> Ransomware attacks have been on the rise in South Korea over the past year, paralyzing hospitals and shopping malls amid the COVID-19 pandemic leading to an increase in online shopping activities. . On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the South Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Malware attacks <strong> blackmail</strong> was aimed at various businesses in Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local fashion and retail group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Mr. Kim Seung-joo, Professor of Cyber ​​Security at University <strong> Korea</strong> , commented that as companies are forced to choose to increase their reliance on remote work during the pandemic, cyber attacks <strong> malicious code</strong> Blackmail has become a bigger threat because they can paralyze the entire working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. He urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks in the near future, last month, the Korean Ministry of Information and Communications Technology set up a 24-hour monitoring group to support hacked companies. . The government is now providing assistance to affected companies in system recovery.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21907</post-id>	</item>
		<item>
		<title>Covid-19: Explosion of ransomware attacks in Korea</title>
		<link>https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 21:12:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attacks]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Cosmetic Surgery]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Explosion]]></category>
		<category><![CDATA[Go to work]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Super Hero]]></category>
		<category><![CDATA[Urging]]></category>
		<category><![CDATA[Working system]]></category>
		<guid isPermaLink="false">https://en.spress.net/covid-19-explosion-of-ransomware-attacks-in-korea/</guid>

					<description><![CDATA[Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea. The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap) On June 3, a large plastic surgery hospital in the south of Seoul announced on its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Online activities in the context of the Covid-19 pandemic have led to a sharp increase in ransomware attacks in South Korea.</strong><br />
<span id="more-21891"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_194_39085601/2ef7a1a1b3e35abd03f2.jpg" width="625" height="424"> </p>
<p> <em> The entrance to a shopping mall in Seoul, South Korea is closed after a ransomware attack. (Source: Yonhap)</em> On June 3, a large plastic surgery hospital in the south of Seoul announced on its website that its server had been attacked with ransomware and that hackers appeared to have stolen data. patient&#8217;s personal data. This is the latest in a series of recently reported ransomware attacks &#8211; a tactic used by cybercriminals to infiltrate businesses&#8217; systems and use their data to demand ransom. ransom. According to the Korean Ministry of Science and Information Technology, last year there were 127 ransomware attacks, a threefold increase from the previous year. Since the beginning of this year, the country has recorded 65 attacks with ransomware. Ransomware attacks have targeted various businesses in South Korea. Last month, food delivery company Super Hero&#8217;s operations were paralyzed for hours after an attack that affected 15,000 delivery workers nationwide. Last November, local retail and fashion group E-Land was also &#8220;inquired&#8221; by hackers, forcing 23 of the 50 branches of the NC Department Store and NewCore Outlet to suspend operations. Kim Seung-joo, a professor of cybersecurity at Korea University, said that in the context of companies being forced to choose to increase their reliance on remote working during the pandemic, ransomware attacks Money has become a bigger threat because they can paralyze the whole working system. This has led to many companies paying a ransom and has led hackers to carry out more attacks. Kim Seung-joo urged businesses to invest in cybersecurity to prevent the threat in the first place. In response to ransomware attacks, last month, South Korea&#8217;s Ministry of Information and Communications Technology set up a 24-hour monitoring team to assist hacked companies. The government is now providing assistance to affected companies in system recovery. (according to Yonhap)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21891</post-id>	</item>
		<item>
		<title>Stunned tourists who took sand at Italian beaches were fined nearly 100 million VND</title>
		<link>https://en.spress.net/stunned-tourists-who-took-sand-at-italian-beaches-were-fined-nearly-100-million-vnd/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Tue, 08 Jun 2021 00:25:08 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[A little]]></category>
		<category><![CDATA[autonomous]]></category>
		<category><![CDATA[beach]]></category>
		<category><![CDATA[beaches]]></category>
		<category><![CDATA[Dizzy]]></category>
		<category><![CDATA[fined]]></category>
		<category><![CDATA[INFONET]]></category>
		<category><![CDATA[Island]]></category>
		<category><![CDATA[Italian]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Monetary fine]]></category>
		<category><![CDATA[Punish]]></category>
		<category><![CDATA[Sand]]></category>
		<category><![CDATA[Sardinia]]></category>
		<category><![CDATA[Sardinia Island]]></category>
		<category><![CDATA[Seashell]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Stunned]]></category>
		<category><![CDATA[The island of Sardinia]]></category>
		<category><![CDATA[thief]]></category>
		<category><![CDATA[Thieves]]></category>
		<category><![CDATA[Tourists]]></category>
		<category><![CDATA[Traveler]]></category>
		<category><![CDATA[TRAVELLER]]></category>
		<category><![CDATA[Truc chi]]></category>
		<category><![CDATA[VND]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/stunned-tourists-who-took-sand-at-italian-beaches-were-fined-nearly-100-million-vnd/</guid>

					<description><![CDATA[Some tourists saw that the sand on the island of Sardinia, Italy had beautiful colors, so they took some and were fined nearly 5,000 USD (nearly 100 million VND). Zing Citation Traveler On June 5, police on the island of Sardinia (Italy) fined nearly $5,000 for 41 people in a short time. The reason is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Some tourists saw that the sand on the island of Sardinia, Italy had beautiful colors, so they took some and were fined nearly 5,000 USD (nearly 100 million VND).</strong><br />
<span id="more-21409"></span> <em> Zing</em> Citation <em> Traveler</em> On June 5, police on the island of Sardinia (Italy) fined nearly $5,000 for 41 people in a short time. The reason is that they stole sand, shells and stones from the beach. It is known that the total amount of sand that authorities seized is up to 100 kg.</p>
<p> Most of the stolen items mentioned above were seized at the airport and ports on the island. According to regional law enacted in 2017, fines for this crime range from $600-3,600. The stolen items will be returned to the beach by the authorities when conditions permit. Since 2017, the government has enacted a law that makes it illegal to take sand from Sardinia&#8217;s beaches. The law was enacted to prevent the bad effects of tourists stealing sand and shells when coming to this Mediterranean island. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_07_296_39101103/fc0b548c47ceae90f7df.jpg" width="625" height="350"> <em> Tourists who steal sand from Sardinia Island (Italy) will be fined. Photo: Traveler.</em> Earlier in September 2020, a French tourist was fined $1,200, equivalent to about VND 27.8 million, for taking sand from this island. According to the<em> Infonet</em> Sardinia is the second largest island in the Mediterranean and is an autonomous region of Italy. The island&#8217;s idyllic white sands are heavily guarded and any tourists who remove the sand from the beach will face fines of up to $3,550, about $82.3 million. copper, even jail time. It is known that thieves often target beach areas with unusually colored sand, pink or fine white. Accordingly, control measures have become &#8220;much stricter&#8221; in recent years on this island. Locals and tourists are encouraged to contact the authorities if they see someone taking illegal sand. <strong> Truc Chi </strong> <em> (th)</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21409</post-id>	</item>
		<item>
		<title>&#8216;Mandarin do, endure&#8217;</title>
		<link>https://en.spress.net/mandarin-do-endure/</link>
		
		<dc:creator><![CDATA[KHÁNH HƯNG]]></dc:creator>
		<pubDate>Fri, 04 Jun 2021 23:05:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Account holder]]></category>
		<category><![CDATA[An Giang newspaper]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[Copyright infringement]]></category>
		<category><![CDATA[Decree No 72 2013]]></category>
		<category><![CDATA[Department of Broadcasting]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[Endure]]></category>
		<category><![CDATA[Journalist]]></category>
		<category><![CDATA[Mandarin]]></category>
		<category><![CDATA[Mistake]]></category>
		<category><![CDATA[Newspapers]]></category>
		<category><![CDATA[Official]]></category>
		<category><![CDATA[Original]]></category>
		<category><![CDATA[photo]]></category>
		<category><![CDATA[Press Agency]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[suffer]]></category>
		<category><![CDATA[synthetic]]></category>
		<category><![CDATA[Tangerine]]></category>
		<guid isPermaLink="false">https://en.spress.net/mandarin-do-endure/</guid>

					<description><![CDATA[Currently, many electronic news sites, general websites and social networks often &#8220;copy&#8221; news and articles in the mainstream press. In addition, these sites are also &#8216;comfortable&#8217; to steal products, piracy of press information, cause confusion, and distort the public&#8217;s thinking towards journalists and press agencies, as the saying goes. say &#8216;mandarin do, resigned&#8217;. Our team [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Currently, many electronic news sites, general websites and social networks often &#8220;copy&#8221; news and articles in the mainstream press. In addition, these sites are also &#8216;comfortable&#8217; to steal products, piracy of press information, cause confusion, and distort the public&#8217;s thinking towards journalists and press agencies, as the saying goes. say &#8216;mandarin do, resigned&#8217;.</strong><br />
<span id="more-20719"></span> Our team of reporters and journalists often face the situation: news, our articles are published in newspapers, electronic portals, a few minutes later they will be aggregated by electronic news sites or websites. use. If &#8220;lucky&#8221; is given the source or author&#8217;s name; Content can be copied verbatim or &#8220;edited&#8221;, headlined differently. Worse is seeing your &#8220;brainchild&#8221; become someone else&#8217;s &#8220;child&#8221;, become a money-making tool, earn Views (views) for &#8220;stepparents&#8221; or serve other purposes.</p>
<p> Recently, I had a similar situation. An information page with the domain angiangquetoi.com uses my information &#8220;An Giang organizes and controls people and vehicles from outside the province to enter the area&#8221; (published on An Giang electronic newspaper on May 30). It is worth mentioning that although the news site still notes the author and the source, it does not use the image of An Giang Newspaper, but uses an image of unknown source. After that, the owner of the Facebook account &#8220;QSK&#8221; (Long Xuyen City) confirmed that the photo was taken by themselves and shared on their personal Facebook social network, unexpectedly being &#8220;stolen&#8221; to post in another place. . Although the incident was simple, it affected me a lot personally. Many people who do not understand the story have condemned the journalist for breaking the rules, &#8220;sitting for a while and stealing people&#8217;s pictures and then writing articles&#8221;, &#8220;losing to the press&#8221; &#8230; Talking to reporters, account owners &#8220;QSK&#8221; expressed: “In the morning, I just posted a photo on social networks, then discovered that the photo had been posted on the angiangquetoi site, without credit. I also thought about the situation that the page stole the content and the author&#8217;s name, so I decided to share the information on the social network Facebook for everyone to share. Through that, I ask the Web site to stop using other people&#8217;s photos, bluffing, and discrediting journalists.&#8221; <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_406_39043924/7c386b287b6a9234cb7b.jpg" width="625" height="625"> The news content of An Giang Newspaper was &#8220;carried&#8221; to the angiangquetoi page reflected by readers Many people confuse the mainstream press with online news sites, between reporters &#8211; journalists and individual website administrators. A series of information &#8220;view sentences&#8221;, &#8220;Like sentences&#8221; and errors in information on these pages are all attributed to the &#8220;crimes&#8221; of the press and journalists, with extreme comments. &#8220;small don&#8217;t study, big become a journalist&#8221;. According to Decree No. 72/2013, dated July 15, 2013 of the Government and Circular No. 09/2014/TT-BTTTT, dated August 19, 2014 of the Ministry of Information and Communications, a general website is the website of an agency, organization or enterprise, providing general information on the basis of verbatim and accurate citation of the official source and clearly stating the author&#8217;s name or the name of the agency of the main source. mode, time posted, broadcast that information. Internal website is the website of an agency, organization or enterprise, providing information on functions, powers, tasks, organizational apparatus, services, products and industries. and other information for the operation of the same agency, organization or enterprise and does not provide general information. Personal website means an electronic information page set up by an individual or through the use of social networking services to provide and exchange information of that individual, not on behalf of the organization. other organizations or individuals and do not provide aggregated information… E-newspaper is a type of press designed and built as a Website based on the Internet, licensed to operate by the Ministry of Information and Communications. According to the Department of Broadcasting, Television and Electronic Information, &#8220;newspapering&#8221; a general information website is the current state of this page building an interface, synthesizing, updating news and articles like newspapers, specializing in gathering information. sensational, &#8220;View sentence&#8221; makes readers mistakenly believe it is an electronic newspaper, causing great influence on society. Many sites are still operating, producing news and articles like press agencies but do not have a license as prescribed. The management and sanctioning sanctions are prescribed, but when dealing with this page, another page pops up. The mainstream press also couldn&#8217;t take the time to report violations, so the situation continued. We hope that readers will have a better understanding of electronic newspapers and websites, general electronic information, consider choosing official websites to access correct and timely information. At the same time, it is recommended that the authorities take strong action to handle violations, especially acts of operating in contravention of the principles, purposes and contents of the issued licenses, acts of taking advantage of the website. aggregated electronic information to act as an online newspaper, an electronic magazine, acts of providing sensational information, solicitation, violation of copyright and provisions of the law on intellectual property .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20719</post-id>	</item>
		<item>
		<title>The phoenix ball in the ancient citadel</title>
		<link>https://en.spress.net/the-phoenix-ball-in-the-ancient-citadel/</link>
		
		<dc:creator><![CDATA[VŨ DUY]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 03:58:13 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[Ancient]]></category>
		<category><![CDATA[Ball]]></category>
		<category><![CDATA[Can pass]]></category>
		<category><![CDATA[citadel]]></category>
		<category><![CDATA[Far away]]></category>
		<category><![CDATA[fiery]]></category>
		<category><![CDATA[Flower King]]></category>
		<category><![CDATA[Ingots]]></category>
		<category><![CDATA[Lap]]></category>
		<category><![CDATA[Line of troops]]></category>
		<category><![CDATA[Memory]]></category>
		<category><![CDATA[Monument]]></category>
		<category><![CDATA[Phoenix]]></category>
		<category><![CDATA[Phoenix Flower]]></category>
		<category><![CDATA[Political Officer]]></category>
		<category><![CDATA[Quiet]]></category>
		<category><![CDATA[School yard]]></category>
		<category><![CDATA[Seriously]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[Tham]]></category>
		<category><![CDATA[Tilt]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-phoenix-ball-in-the-ancient-citadel/</guid>

					<description><![CDATA[Those who used to go to school when looking at phoenix flowers will evoke the most memories. Flowers in the school yard, flowers in the aisles, flowers pressed in notebook pages to keep the hot summer. The School of Political Officers located in our old citadel is always shady with green trees. But having an [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Those who used to go to school when looking at phoenix flowers will evoke the most memories. Flowers in the school yard, flowers in the aisles, flowers pressed in notebook pages to keep the hot summer. The School of Political Officers located in our old citadel is always shady with green trees.</strong><br />
<span id="more-19943"></span> But having an old phoenix tree probably left many impressions on generations of students. That phoenix tree stands sideways to the exit of the ancient city gate, next to it is a mossy brick wall. In most of the frames taken on the side of the ancient citadel, perhaps the space around the phoenix root is the most characteristic and recognizable. Therefore, the phoenix tree becomes a familiar image in the eyes of every person.</p>
<p> The summer sun is brilliant, the phoenix shape is tilted, the body is moldy and callous. The ancient citadel, the old gate, the old monument, the old phoenix root, all seem to want to gather to whisper to them what belongs to a distant time. The cast-iron citadel imprinted with traces of time is a witness of a bygone era. For now, the citadel becomes a place to welcome generations of students to come here to practice. In the middle of that quiet old space, there is still something that is silently changing. From the thin, thin branches, green sprouts rise up. That green color revives a deep and quiet space. Thousands of delicate leaf spots weave together to create a cool green color to the eyes. The blazing sun urges the phoenix to call summer. Until one day the old phoenix tree suddenly glowed red. That&#8217;s when the exam draws near. Nights with lights on by the small doorway, summer afternoons reviewing lessons under the trees. The sound of cicadas tinkling red phoenix flowers makes the heart more excited. The road leading to the familiar lecture hall was covered with red corpses. The wind gently swept the fragile phoenix wings flying in the air. In the line of troops walking under the phoenix&#8217;s shadow, there were petals falling gently on the red and gold-rimmed shoulders. That red color blends together to weave into student memories. It was the last summer we studied under the officer&#8217;s roof. Graduation exam is approaching, teammates are hard at work together. With a bit of leisure, I walked around the school, stood under the phoenix tree and picked up fallen petals. The cicada slightly tilted its head and flapped its wings in a hurry to catch the rhythm of the song. After the hard exam, the graduates are honored to carry on their shoulders the sparkling gold star badge. When the phoenix flower was over, it was time for us to part. From the roof of this school, young officers spread everywhere, each with a unit, a new horizon. Only the old phoenix shape with crimson flowers at the school gate will probably remain forever. We graduated from school with that year&#8217;s phoenix season so that every summer, we would sob with the falling color of the phoenix, the roof of the ancient citadel, and our comrades-in-arms.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19943</post-id>	</item>
		<item>
		<title>British police discovered a bitcoin &#8216;mining&#8217; facility to steal electricity</title>
		<link>https://en.spress.net/british-police-discovered-a-bitcoin-mining-facility-to-steal-electricity/</link>
		
		<dc:creator><![CDATA[Phan An (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Tue, 01 Jun 2021 07:43:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Birmingham]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[British]]></category>
		<category><![CDATA[Cannabis]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[Cop]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Deutsche Bank]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[discovered]]></category>
		<category><![CDATA[Electrical Power]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Electricity supply]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[England]]></category>
		<category><![CDATA[facility]]></category>
		<category><![CDATA[Hassan Rouhani]]></category>
		<category><![CDATA[Mining]]></category>
		<category><![CDATA[National grid]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[President of Iran]]></category>
		<category><![CDATA[Specialized]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[Thieves]]></category>
		<guid isPermaLink="false">https://en.spress.net/british-police-discovered-a-bitcoin-mining-facility-to-steal-electricity/</guid>

					<description><![CDATA[Through inspection, the police discovered about 100 specialized computers to &#8216;mine&#8217; bitcoin using a large power source stolen from the national electricity grid. Bitcoin digital currency. (Photo: AFP/VNA) On May 28, British police said they had discovered a case stealing electricity large capacity to mine the digital currency bitcoin. Specifically, in a dismantling of a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Through inspection, the police discovered about 100 specialized computers to &#8216;mine&#8217; bitcoin using a large power source stolen from the national electricity grid.</strong><br />
<span id="more-19733"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_293_39003112/4f8bf07be83901675828.jpg" width="625" height="437"> </p>
<p> <em> Bitcoin digital currency. (Photo: AFP/VNA)</em> On May 28, British police said they had discovered a case <strong> stealing electricity</strong> large capacity to mine the digital currency bitcoin. Specifically, in a dismantling of a cannabis plant, the anti-narcotics police force in England suddenly discovered an organization <strong> Bitcoin &#8220;mining&#8221;</strong> using a large power source to steal from the national grid. The facility is located in an industrial area in Birmingham &#8211; the UK&#8217;s second largest city. Through inspection, the police discovered about 100 computers dedicated to &#8220;mining&#8221; bitcoin. At the time the police arrived, there was no one at the facility. The case is currently under investigation. The digital currency &#8220;mining&#8221; system consumes a large amount of electricity, so some lines specializing in &#8220;mining&#8221; cryptocurrency in the world often choose to steal electricity to reduce costs and increase profits. According to Deutsche Bank, &#8220;mining&#8221; bitcoin alone consumes the same amount of electricity as Switzerland consumes each year. On May 12, the world&#8217;s largest electric vehicle maker Tesla (USA) announced that it would stop using bitcoin in its car sales due to concerns about environmental issues. CEO (CEO) of Tesla, American billionaire <strong> Elon Musk</strong> states: &#8220;Tesla stopped using <strong> bitcoin</strong> car sales. We are concerned about the growing use of fossil fuels for bitcoin mining and trading, especially coal &#8211; the worst-emitting fuel.&#8221; Iranian President Hassan Rouhani has announced a four-month ban on all crypto-mining activities after many major cities suffered power cuts due to power shortages.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19733</post-id>	</item>
		<item>
		<title>Nearly 1 million customers of Canada Post are at risk of having their personal data exposed</title>
		<link>https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</link>
		
		<dc:creator><![CDATA[Hương Giang (P/v TTXVN tại Ottawa)]]></dc:creator>
		<pubDate>Mon, 31 May 2021 13:35:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[Anticipation]]></category>
		<category><![CDATA[Canada]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[Customers]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Declaration]]></category>
		<category><![CDATA[exposed]]></category>
		<category><![CDATA[Got]]></category>
		<category><![CDATA[Group]]></category>
		<category><![CDATA[Help them]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[parcel]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Post]]></category>
		<category><![CDATA[Postal]]></category>
		<category><![CDATA[Receiver]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[Sender]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Supplier]]></category>
		<guid isPermaLink="false">https://en.spress.net/nearly-1-million-customers-of-canada-post-are-at-risk-of-having-their-personal-data-exposed/</guid>

					<description><![CDATA[The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed. A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA A malware attack targeting Commport Communications, one of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The malware attack against Commport Communications, one of Canada Post&#8217;s providers, put nearly a million people at risk of having their personal data exposed.</strong><br />
<span id="more-19552"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_324_38994277/1a5ceb88f3ca1a9443db.jpg" width="625" height="416"> </p>
<p> <em> A malware attack against Commport Communications puts 1 million of Canada Post&#8217;s customers at risk of having their personal data exposed. Illustration: VNA</em> A malware attack targeting Commport Communications, one of Canada Post&#8217;s providers, has affected 44 of Canada&#8217;s largest business customers, Canada Post, Canada&#8217;s national postal group, said. Canada Post across the country and nearly a million people are at risk of having their personal data exposed. Commport Communications operates in the field of electronic data exchange, management of shipping declaration data of large parcel delivery businesses. Commport Communications&#8217; systems have access to information such as the names and addresses of senders and recipients when large parcels are shipped. Canada Post said the cyberattack obtained information about delivery activity between July 2016 and March 2019. According to Canada Post, 97% of the information stolen was names and addresses. This attack did not have access to financial information. Canada Post is currently working closely with Commport Communications and has invited external cybersecurity experts to fully investigate and take appropriate action. Canada Post said it proactively notified affected business customers and provided the information and support needed to help them determine next steps. At the same time, the Privacy Commissioner&#8217;s Office was notified of the incident.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19552</post-id>	</item>
		<item>
		<title>5 Android apps contain dangerous vulnerabilities that users need to remove urgently from their phones</title>
		<link>https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Mon, 31 May 2021 11:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[apps]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Check Point]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Contain]]></category>
		<category><![CDATA[Dangerous]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Identity]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Screen Recorder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Urgently]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-android-apps-contain-dangerous-vulnerabilities-that-users-need-to-remove-urgently-from-their-phones/</guid>

					<description><![CDATA[Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks. Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data. The report found that as many as 23 apps are available on Google Play, each with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vulnerable apps put Android users at risk of fraud, identity theft, and malware attacks.</strong><br />
<span id="more-19536"></span> Recently, security researchers at Check Point have discovered a series of Android applications that are less secure, leaving users vulnerable to leakage of personal data.</p>
<p> The report found that as many as 23 apps are available on Google Play, each with between 50,000 and 10 million downloads, violating privacy guidelines in the collection and storage of user information. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/17589c0e8a4c63123a5d.jpg" width="625" height="192"> <em> Some applications are less secure, leaving users vulnerable to personal data leakage. (Photo: Check Point)</em> Of these, there are 13 applications that store user data in the cloud but are not secure. This means hackers can easily access data from the outside. Hackers can even modify the developer&#8217;s notice, and replace it with malicious links or misleading content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/0d3d856b93297a772338.jpg" width="625" height="222"> <em> Users&#8217; personal information is easily leaked when using these applications. (Photo: Check Point)</em> These vulnerabilities put at least 100 million Android users at risk of phishing, identity theft, and malware attacks. 13 out of 23 apps have extremely poor security, allowing hackers to access public data, but Check Point only lists 5 applications that need attention: <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/815116070045e91bb054.jpg" width="625" height="642"> <em> This Screen Recoder app was found to be storing users&#8217; passwords on an unsecured cloud service, leaving the data vulnerable to leaks. (Photo: Check Point)</em> &#8211; <strong> Astro Guru</strong> : Horoscope app with over 10 million downloads. Astro Guru stores each user&#8217;s name, date of birth, gender, GPS location, email address, and payment information. &#8211; <strong> iFax</strong> : Mobile fax application, stores all documents sent by more than 500,000 users in a cloud database. &#8211; <strong> Logo Maker</strong> : Logo design app with over 170,000 users. The user&#8217;s full name, account ID, email and password are all accessible. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_28_329_38993920/3716a440b2025b5c0213.jpg" width="625" height="468"> <em> (Artwork: Crystal Cox/Business Insider)</em> &#8211; <strong> Screen Recorder</strong> : This app has more than 10 million downloads. The developer stored the user&#8217;s password on an unsecured cloud service, making the data vulnerable to leaks. &#8211; <strong> T&#8217;Leva</strong> : Taxi hailing app from Angola with over 50,000 downloads. This application saves the history between the driver and the rider, the location data, name and phone number are accessible. Check Point said it notified the app developers, but only Astro Guru responded, and some of the apps are still available on Google Play.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19536</post-id>	</item>
		<item>
		<title>Mesmerized by watching the flowers of school age bloom red in the corner of Hanoi sky</title>
		<link>https://en.spress.net/mesmerized-by-watching-the-flowers-of-school-age-bloom-red-in-the-corner-of-hanoi-sky/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 28 May 2021 06:43:07 +0000</pubDate>
				<category><![CDATA[Travel]]></category>
		<category><![CDATA[A time]]></category>
		<category><![CDATA[age]]></category>
		<category><![CDATA[bloom]]></category>
		<category><![CDATA[Book]]></category>
		<category><![CDATA[Bring it over]]></category>
		<category><![CDATA[Contemplate]]></category>
		<category><![CDATA[corner]]></category>
		<category><![CDATA[Fascinated]]></category>
		<category><![CDATA[Flickering]]></category>
		<category><![CDATA[flowers]]></category>
		<category><![CDATA[Glosbe]]></category>
		<category><![CDATA[GLOW]]></category>
		<category><![CDATA[Hanoi]]></category>
		<category><![CDATA[hearts]]></category>
		<category><![CDATA[Hoang Thi Tam]]></category>
		<category><![CDATA[Lagerstroemia]]></category>
		<category><![CDATA[Mesmerized]]></category>
		<category><![CDATA[Nervous]]></category>
		<category><![CDATA[Overrun]]></category>
		<category><![CDATA[Phoenix Flower]]></category>
		<category><![CDATA[Poinciana]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[School]]></category>
		<category><![CDATA[Shade]]></category>
		<category><![CDATA[SKY]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[student]]></category>
		<category><![CDATA[Trich Sai Street]]></category>
		<category><![CDATA[watching]]></category>
		<guid isPermaLink="false">https://en.spress.net/mesmerized-by-watching-the-flowers-of-school-age-bloom-red-in-the-corner-of-hanoi-sky/</guid>

					<description><![CDATA[In the days of May, every street corner of the capital is filled with red phoenix flower, a flower that makes people&#8217;s hearts flutter and flutter to remember a time when they went to school. When the mausoleum begins to fade, it is also the time when phoenix flowers bloom brightly on every street corner [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the days of May, every street corner of the capital is filled with red phoenix flower, a flower that makes people&#8217;s hearts flutter and flutter to remember a time when they went to school.</strong><br />
<span id="more-18750"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/373768937ed1978fcec0.jpg" width="625" height="416"> </p>
<p> <em> When the mausoleum begins to fade, it is also the time when phoenix flowers bloom brightly on every street corner of the capital.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/0633b694a0d6498810c7.jpg" width="625" height="416"> <em> Attached to the student age, even if we go far away from the beloved school, when looking at the blooming red phoenix flowers in the corner of the sky, it makes our hearts flutter, reminiscing about a bygone era.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/90a92a0e3c4cd5128c5d.jpg" width="625" height="416"> <em> Phoenix flowers were brought to Vietnam by the French in the 19th century. Every year, phoenix flowers bloom from April to June. Nowadays, the flowers are grown in most provinces across the country.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/6b88d32fc56d2c33757c.jpg" width="625" height="416"> <em> In Hanoi, phoenix flowers are planted a lot on sidewalks, in school parks to create shade or to decorate along roads.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/def459534f11a64fff00.jpg" width="625" height="416"> <em> Inflorescences of phoenix flowers bloom at Trich Sai street (Tay Ho district).</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/ac0e29a93febd6b58ffa.jpg" width="625" height="937"> <em> Hoang Thi Tam (Tay Ho district) shared, phoenix flowers are associated with memories of school days and everyone has experienced such a time.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/31ecb24ba4094d571418.jpg" width="625" height="416"> <em> Cicadas cry, phoenix blooms signal the separation season of schoolchildren.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/d4a354044246ab18f257.jpg" width="625" height="416"> <em> The roads along the To Lich river are filled with the red color of phoenix flowers.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/68cee669f02b1975403a.jpg" width="625" height="416"> <em> The corner of the schoolyard flickers with red phoenix flowers/Summer comes and rushes the exam seasons. Poetry: Far away, phoenix.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/3656b9f1afb346ed1fa2.jpg" width="625" height="416"> <em> The rows of phoenixes leaning on Sword Lake.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/86f20a551c17f549ac06.jpg" width="625" height="416"> <em> Stand out in front of one of the tallest buildings in Hanoi.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_347_38983046/f0ff7d586b1a8244db0b.jpg" width="625" height="416"> <em> The blooming red phoenix flower clusters signal another summer has come.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18750</post-id>	</item>
		<item>
		<title>Is Colonial Pipeline covered by insurance?</title>
		<link>https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 27 May 2021 09:40:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[CNA]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[Covered]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Evil Corp]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Hades myth]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Insurance company]]></category>
		<category><![CDATA[Insurrance]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[OFAC]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[sensitive]]></category>
		<category><![CDATA[Steal]]></category>
		<guid isPermaLink="false">https://en.spress.net/is-colonial-pipeline-covered-by-insurance/</guid>

					<description><![CDATA[CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack. Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>CNA Financial Corp., one of the largest insurers in the US, reportedly paid $40 million in late March to regain control of its network following a ransomware attack, according to people have knowledge of the attack.</strong><br />
<span id="more-18536"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_232_38971994/d799f8a1ede304bd5df2.jpg" width="625" height="312"> </p>
<p> Ransomware is a type of malware that encrypts the victim&#8217;s data. Cybercriminals using ransomware also often steal data. The hackers then demanded a payment to unlock the files and promised not to leak the stolen data. In recent years, hackers have targeted victims with cyber insurance policies, and large volumes of sensitive consumer data make them more likely to pay ransoms, according to cybersecurity experts. According to the unnamed source, CNA paid the hackers about two weeks after a bunch of company data was stolen and CNA officials were locked out of its own network. CNA does not comment on the ransom, with a CNA spokesperson saying CNA followed all laws, regulations and guidelines, including OFAC&#8217;s 2020 ransomware guide, in handling the matter. CAN also shares attack intelligence and hackers&#8217; identities with the FBI and the Treasury Department&#8217;s Office of Foreign Assets Control because facilitating ransom payments to hackers can cause punishment risk. <strong> The largest ransom amount</strong> Ransomware attacks &#8211; and payments in particular &#8211; are rarely disclosed so it&#8217;s difficult to know what the largest ransom is. The $40 million payout is larger than any previously disclosed payments to hackers. The hackers attacking CNA used malware called Phoenix Locker, a variant of ransomware called &#8216;Hades.&#8217; According to cybersecurity experts, Hades was created by a Russian cybercrime organization called Evil Corp. Evil Corp. was sanctioned by the United States in 2019. However, identifying attacks can be difficult because hacking groups can share code or sell malware to each other. CNA, which provides cyber insurance, said its investigation concluded that the Phoenix hacker group was not on the US sanctions list. The disclosure of the payment is likely to draw outrage from lawmakers and regulators who are unhappy that US companies are paying large sums of money to criminal hackers who over the past year have targeted hospitals, drug manufacturers, police forces and other entities critical to public safety. The FBI discourages organizations from paying ransoms because it encourages additional attacks and does not guarantee data will be returned. Last year was a standout year for ransomware groups, with a task force made up of security experts and law enforcement agencies estimating that victims paid around $350 million in ransom last year, up 311% compared to 2019. The Task Force suggested 48 actions the Biden administration and the private sector could take to mitigate such attacks, including better regulation of money markets. digital currency used to make ransom payments. The report, prepared by the Institute for Security and Technology, was delivered to the White House days before the Colonial Pipeline Company was compromised in a ransomware attack that resulted in fuel shortages and long lines at stores. gas stations along the US East Coast Bloomberg reported that Colonial paid hackers nearly $5 million shortly after the attack. Colonial CEO Joseph Blount, in an interview with the Wall Street Journal published Wednesday, confirmed that the company paid the hackers &#8211; $4.4 million in ransom. According to two people familiar with the CNA attack, the company initially ignored the hacker&#8217;s request and attempted to recover the data without negotiating with the criminals. But within a week, the company decided to start negotiating with the hackers, who were demanding $60 million. Residents said the payment was made a week later. According to Barry Hensley, chief intelligence officer at cybersecurity firm Secureworks Corp. then the Phoenix Locker seems to be a variation of Hades based on the overlap of the code used in each. He said they have not yet identified which hackers used the Hades variant to attack CNA. Cybersecurity firm CrowdStrike Holdings Inc believes Hades was created by Evil Corp. to bypass US sanctions against the hacking group. In December 2019, the Treasury Department announced sanctions against 17 individuals and six entities associated with Evil Corp. At the time, the Treasury Department said Evil Corp used malware &#8220;to infect computers and collect login information from hundreds of banks and financial institutions in more than 40 countries, causing more than 100 million dollars of theft. “It is illegal for any U.S. company to knowingly pay a ransom to Evil Corp. According to Melissa Hathaway, President of Hathaway Global Strategies and a former cybersecurity adviser to Presidents George W. Bush and Barack Obama, demand for ransomware has grown exponentially over the past six months. Hathaway said the average hacker&#8217;s ransom demand is between $50 million and $70 million. Those claims are often negotiable, and companies often pay ransoms in the tens of millions of dollars, in part because cyber insurance policies cover some or all of the costs. Hathaway estimates that the average payout is between $10 and $15 million. <strong> Ngoc Linh </strong> &#8211; According to Insurance Journal</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18536</post-id>	</item>
		<item>
		<title>Hackers in Vietnam are on the rise</title>
		<link>https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Wed, 26 May 2021 14:20:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Complicated developments]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[IP address]]></category>
		<category><![CDATA[Kong]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[rise]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subset]]></category>
		<category><![CDATA[Traditional approach]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Zero Trust]]></category>
		<guid isPermaLink="false">https://en.spress.net/hackers-in-vietnam-are-on-the-rise/</guid>

					<description><![CDATA[In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230; Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In the context of complicated epidemic developments, many organizations, businesses and individuals working remotely, working from home, are creating an environment for bad guys to exploit vulnerabilities, attack, and steal information. &#8230;</strong><br />
<span id="more-18353"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_3_38951174/fc0f0f191b5bf205ab4a.jpg" width="625" height="416"> </p>
<p> Illustration. The cybersecurity situation has undergone drastic changes in recent times, especially in the context of the Covid-19 epidemic and the trend of remote working. This manifests itself in large-scale and increasingly complex attacks. Hackers perform an average of 50 million password attacks per day, 579 attacks per second. <strong> AGAINST MALWARE AND RAMSOMWARE WITH DEVELOPMENT</strong> Microsoft&#8217;s telemetry results released over the weekend showed that the prevalence of malware and ransomware infections in Asia-Pacific has been increasing over the past 18 months, stretching back to before the Covid-19 pandemic. -19 outbreak to date. Specifically, in Australia it is 23%; China is 80%; India 15%; Japan 16%; New Zealand 19%, Singapore 43%, Hong Kong 38%, South Korea 22%, Malaysia 2%, Philippines 15%, Taiwan 16%, Thailand 3% and Vietnam 7%. Among them, Indonesia alone has a 24% decrease in malware infection rate. The number of cyber attacks and the number of Vietnamese IP addresses in botnets increased in March 2021 due to hackers taking advantage of the increasing demand for Internet use by users as well as people&#8217;s interest in translation information. Covid-19. During the same period, the number of ransomware infections (a subset of malware) also increased by 453% in Australia; China (463%); India (100%); Japan (541%); New Zealand (825%); Singapore (296%), Hong Kong (179%), Indonesia (31%), South Korea (64%), Malaysia (72%), Philippines (70%), Taiwan (407%), Thailand (6%) ). This figure in Vietnam is recorded at 15%. In Vietnam, in March 2021 alone, the Information Security Administration recorded 491 incidents of cyber attacks on information systems, an increase of 8.15% compared to February 2021. In which, the number of Malware attacks is 180, while Phishing and Deface attacks are 164 and 147, respectively. In the first quarter of 2021, although compared to the same period in 2020, the number of cyberattacks causing problems on information systems decreased by 20%, but from the beginning of 2021 to now, the number of cyberattack incidents has decreased by 20%. is still in an uptrend. Experts believe that the reason for the increase in the number of cyberattacks and the number of Vietnamese IP addresses in botnets in March 2021 was because hackers took advantage of users&#8217; increasing demand for Internet use as well as the interest People&#8217;s attention to information about Covid-19 epidemic. Therefore, the number of Phishing and Malware attacks on systems has increased to cheat, destroy and steal information illegally&#8230; It can be seen that, in the context of complicated epidemic developments, when more and more organizations, businesses and individual users work remotely, work from home, they are creating an environment for bad guys to exploit vulnerabilities, Attacks, information theft, large-scale cyberattacks take place in Vietnam and around the world. <strong> ABOUT 3.5 MILLION SECURITY PROFESSIONALS IN 2021</strong> Experts say that even as more people begin returning to the office, hybrid work is forecast to remain the norm in the future. According to Forrester, as people gradually settle into a new working model after the pandemic, we will still see an increase in the proportion of employees working remotely compared to before the pandemic, at 300%. And the current Job Trends Index report shows that 53% of respondents in Asia plan to move to a new place because they can work remotely, compared to 46 percent globally. %. That change has been demanding an urgent need for new security solutions to meet the way of working, especially when the network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. Organizations and businesses need to take data and authentication as the center. While there are many other ways to secure these days, addressing identity, authentication, and information management issues is still critical. Experts have pointed out 4 main pillars to protect users against new work era cyber threats, including: identity protection, Zero Trust mindset, cloud application, and resource investment. security personnel. The network of organizations is no longer limited to the &#8220;office wall&#8221;. This requires a very different mindset from the traditional “network is the border” and “device protection” approaches. As recent attacks have shown, identity will be the &#8220;battlefield&#8221; for future attacks. Microsoft Vice President of Security, Compliance, and Identity Vasu Jakkal said that, in a world where identity is the new battleground, adopting a Zero Trust strategy has become a must for businesses. Karma. The hybrid workplace is virtually borderless, so it&#8217;s important to establish protective &#8220;barriers&#8221; around identities and devices. As part of his journey to building a Zero Trust mindset, the expert emphasized that “passwordless authentication will be the trend of the future and that transformation will be seen this year”. Besides the application of technology, experts also emphasize the special importance of people and skills in ensuring information security of each business organization. However, the lack of security professionals and the lack of diversity in security teams are two weaknesses that attackers will find to hit next year, the expert said. It is estimated that the information security industry will be short of about 3.5 million security professionals this year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18353</post-id>	</item>
		<item>
		<title>Beware of calls asking for sim upgrade support and then appropriating OTP codes</title>
		<link>https://en.spress.net/beware-of-calls-asking-for-sim-upgrade-support-and-then-appropriating-otp-codes/</link>
		
		<dc:creator><![CDATA[Nguyễn Hoài]]></dc:creator>
		<pubDate>Wed, 26 May 2021 13:25:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[call]]></category>
		<category><![CDATA[calls]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[codes]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[crooks]]></category>
		<category><![CDATA[East]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Loan]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[Pretend]]></category>
		<category><![CDATA[Sim]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[subscribers]]></category>
		<category><![CDATA[Support]]></category>
		<category><![CDATA[Upgrade]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Vinaphone]]></category>
		<category><![CDATA[Withdrawal]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-calls-asking-for-sim-upgrade-support-and-then-appropriating-otp-codes/</guid>

					<description><![CDATA[Calling pretending to be a carrier employee to request a SIM upgrade, the bad guy takes control of mobile subscribers to steal OTP code information, then withdraw money from customers&#8217; credit cards or borrow money online. Scams through SIM upgrade support have flourished recently. A representative of VinaPhone network operator said that in the past [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Calling pretending to be a carrier employee to request a SIM upgrade, the bad guy takes control of mobile subscribers to steal OTP code information, then withdraw money from customers&#8217; credit cards or borrow money online.</strong><br />
<span id="more-18343"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_24_20_38950935/91aa2bbe3ffcd6a28fed.jpg" width="625" height="391"> </p>
<p> Scams through SIM upgrade support have flourished recently. A representative of VinaPhone network operator said that in the past time, high-tech scams have increased sharply with sophisticated tricks, in which there has been a situation where fraudsters have appropriated control of mobile subscribers&#8217; SIMs. Steal OTP code information, then withdraw money from customer&#8217;s credit card or borrow money online. This carrier recommends that mobile users be wary of calls and messages from unknown numbers with content such as requests for assistance with SIM replacement/SIM upgrade or winning announcements. When there are phenomena like above, customers access the official websites and information channels of the network operator to authenticate or contact the customer service center for answers. When the phone SIM has abnormal signs such as signal loss, disabled for unknown reasons, many strange phone numbers calling in the same time period, etc., customers urgently contact the network operator to check the status of the subscriber and get advice, answers or recommendations on how to handle it. In case the subscriber receives a notice of unusual transactions such as transactions related to credit cards, related online credit loans, customers should immediately contact the banks and financial institutions where the card is issued. Credit card, where the online credit transaction occurs, request emergency card locking support to prevent fraudsters from appropriating assets or clarifying that online credit transaction. In addition, the network operator recommends that users do not access the links attached to the content of strange messages; do not perform operations on the phone according to the syntax instructed by strangers. When there is a need to change / change a new SIM, go directly to the transaction points or the official agent of the carrier to do it. VinaPhone said that it has added surveillance cameras at transaction points to prevent bad behavior and widely communicated on internal channels as well as mass media for customers to capture information and be vigilant. against scams. Previously, the authorities also warned about fraud to appropriate the right to use the sim and then borrow money online. Many cases after upgrading the sim suddenly become a debtor of several million to several tens of millions of dong.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18343</post-id>	</item>
		<item>
		<title>Raise awareness of personal data protection</title>
		<link>https://en.spress.net/raise-awareness-of-personal-data-protection/</link>
		
		<dc:creator><![CDATA[Đặng Ngọc]]></dc:creator>
		<pubDate>Sat, 22 May 2021 05:58:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Advanced]]></category>
		<category><![CDATA[Awareness]]></category>
		<category><![CDATA[Beauty salon]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[dentistry]]></category>
		<category><![CDATA[Dismantled]]></category>
		<category><![CDATA[Electric]]></category>
		<category><![CDATA[Electrical company]]></category>
		<category><![CDATA[Illegal]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Personal]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Police Department]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[raise]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Store goods]]></category>
		<category><![CDATA[usurp]]></category>
		<guid isPermaLink="false">https://en.spress.net/raise-awareness-of-personal-data-protection/</guid>

					<description><![CDATA[The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam. Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>The Department of Cybersecurity and High-Tech Crime Prevention of the Ministry of Public Security has just dismantled a large-scale data collection, appropriation, and trading line in Vietnam.</p>
<p> Accordingly, the subjects in this line have illegally collected, appropriated, bought, sold and used nearly 1.3 thousand GB of data containing billions of information about individuals and organizations nationwide. The dismantling of the above-mentioned large-scale data collection, appropriation and trading line shows the efforts of the police sector in strictly dealing with the theft and illegal use of personal data for handling. according to the provisions of law, creating a deterrent; and at the same time prevent cybercriminals from taking advantage of this information to commit fraud, appropriate property and limit the use of personal information to send spam messages, make &#8220;terrible&#8221; calls. dad&#8221; advertising&#8230; It is worth noting that the personal information being traded in the above line is the customers of the banks; power companies, finance, securities, insurance; electronics and fashion stores; services: spa, dental, beauty salon&#8230; There is even a list of parents, students, household registration, phone subscribers&#8230; Thereby showing that, in order to obtain the personal data of users, in addition to the sophisticated tricks of the perpetrators, there is also the subjectivity and neglect of many people in the security of personal information. Currently, many people are willing to provide personal information (name, address, phone number, email &#8230;) to participate in promotions, sweepstakes, purchase online&#8230; helping the subjects steal information easily. Therefore, in addition to the investigation and handling of the subjects who steal and illegally use personal information, in order to protect themselves, each individual must raise the awareness of protecting personal data, do not provide information easily, avoid becoming a victim of fraudsters or being bothered by unwanted messages and phone calls.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17269</post-id>	</item>
		<item>
		<title>Diem My 9x shows off her sexy figure in a new series of photos</title>
		<link>https://en.spress.net/diem-my-9x-shows-off-her-sexy-figure-in-a-new-series-of-photos/</link>
		
		<dc:creator><![CDATA[Lê Anh/VOV.VN]]></dc:creator>
		<pubDate>Thu, 20 May 2021 00:15:08 +0000</pubDate>
				<category><![CDATA[Fashion]]></category>
		<category><![CDATA[Album]]></category>
		<category><![CDATA[Appearence]]></category>
		<category><![CDATA[body]]></category>
		<category><![CDATA[Diem My]]></category>
		<category><![CDATA[Diem My 9X]]></category>
		<category><![CDATA[Dream]]></category>
		<category><![CDATA[Fashion brands]]></category>
		<category><![CDATA[High fashioned]]></category>
		<category><![CDATA[Huu Chau]]></category>
		<category><![CDATA[Measurements]]></category>
		<category><![CDATA[Nhan Phuc Vinh]]></category>
		<category><![CDATA[Nhat Thien]]></category>
		<category><![CDATA[Quoc Anh]]></category>
		<category><![CDATA[Seductive]]></category>
		<category><![CDATA[Set of wings]]></category>
		<category><![CDATA[Show off]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[style]]></category>
		<guid isPermaLink="false">https://en.spress.net/diem-my-9x-shows-off-her-sexy-figure-in-a-new-series-of-photos/</guid>

					<description><![CDATA[Despite being over 30, Diem My still has a desirable appearance. Her current measurements are 83-63-94. Recently, Diem My 9x has just shared a series of photos on her personal page in the latest set of photos. It can be said that Diem My&#8217;s fashion style has recently been more classy and trendy. Diem My [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Despite being over 30, Diem My still has a desirable appearance. Her current measurements are 83-63-94.</strong><br />
<span id="more-16351"></span> Recently, Diem My 9x has just shared a series of photos on her personal page in the latest set of photos. It can be said that Diem My&#8217;s fashion style has recently been more classy and trendy. Diem My 9x also said that working with Nhat Thien helps her understand what she wants at the moment, which style should be followed and helps her express herself and her fashion style more.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_65_29169215/40032d603222db7c8233.jpg" width="625" height="781"> <em> Diem My 9x.</em> Diem My 9x is famous in Vietnamese showbiz with a standard body, she often wears sexy outfits, showing her standard but still luxurious body. In this photo series, too, actress Diem My 9X impresses with her hot curves, extremely attractive, especially the 3rd round in a series of costumes from high-end fashion brands. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_65_29169215/97d5ffb6e0f409aa50e5.jpg" width="625" height="493"> At the age of 31, the beauty of Diem My 9X is considered to be more brilliant than ever. If going to the movies and in real life, her style is quite simple, her fashion for events and photography is very personal, seductive but no less sweet. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_65_29169215/7538105b0f19e647bf08.jpg" width="625" height="781"> In terms of physique, she also takes care of herself very carefully. After the New Year, Diem My once had a weight gain of 55kg, however, when she started filming a new movie, she seriously followed a strict diet and exercised to regain her old shape. Therefore, beyond 30, Diem My is still a girl with a desirable appearance. Her current measurements are 83-63-94. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_65_29169215/f2e2968189c3609d39d2.jpg" width="625" height="416"> After completing the movie &#8220;Love and Ambition&#8221; in the middle of last year, actress Diem My 9X joined the movie project 1990. In 2020, she also focuses on business. Currently, Diem My is also participating in the TV series &#8220;Mother&#8217;s Dream&#8221; in Ho Chi Minh City. The film has the participation of famous actors such as: People&#8217;s Artist Huu Chau, People&#8217;s Artist Hong Van, Nhan Phuc Vinh, Diem My, Quoc Anh &#8230; is expected to have 80 episodes and broadcast early next year.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16351</post-id>	</item>
		<item>
		<title>Ethereum &#8216;hot&#8217; up 450% since early 2021, Bitcoin &#8216;overshadowed&#8217;, crypto bubble skeptical</title>
		<link>https://en.spress.net/ethereum-hot-up-450-since-early-2021-bitcoin-overshadowed-crypto-bubble-skeptical/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Wed, 19 May 2021 17:15:15 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[All Time]]></category>
		<category><![CDATA[Balloons]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[Blurred]]></category>
		<category><![CDATA[bubble]]></category>
		<category><![CDATA[Capitalization]]></category>
		<category><![CDATA[CNBC]]></category>
		<category><![CDATA[Coin Metrics]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[early]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Ether]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[Ethereum 2 0]]></category>
		<category><![CDATA[hot]]></category>
		<category><![CDATA[Incredulous]]></category>
		<category><![CDATA[Lights]]></category>
		<category><![CDATA[Means of payment]]></category>
		<category><![CDATA[Oasis Pro Markets]]></category>
		<category><![CDATA[overshadowed]]></category>
		<category><![CDATA[Pat LaVecchia]]></category>
		<category><![CDATA[Programmer]]></category>
		<category><![CDATA[skeptical]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Vitalik Buterin]]></category>
		<guid isPermaLink="false">https://en.spress.net/ethereum-hot-up-450-since-early-2021-bitcoin-overshadowed-crypto-bubble-skeptical/</guid>

					<description><![CDATA[Recently, Ethereum, the world&#8217;s second largest cryptocurrency, stole the limelight from Bitcoin. The digital currency hit a record high above $4,000 on May 10 and is now up more than 450% since the beginning of 2021. Ethereum has skyrocketed in recent times. (Source: CNBC) Price hits all-time high According to Coin Metrics, Ethereum (also known [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, Ethereum, the world&#8217;s second largest cryptocurrency, stole the limelight from Bitcoin. The digital currency hit a record high above $4,000 on May 10 and is now up more than 450% since the beginning of 2021.</strong><br />
<span id="more-16237"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_194_38801129/e1cb23093d4bd4158d5a.jpg" width="625" height="351"> </p>
<p> <em> Ethereum has skyrocketed in recent times. (Source: CNBC)</em> <strong> Price hits all-time high</strong> According to Coin Metrics, Ethereum (also known as Ether) reached an all-time high of $4,196.3 at 12:15 p.m. on May 10. The value of Ether is up nearly 7% in the past 24 hours and is currently at $4,141.99. The total market capitalization of this coin is $476.3 billion, almost half the market capitalization of the world&#8217;s largest digital currency &#8211; Bitcoin ($1.1 trillion). With the new milestone just set, the price of Ether has increased 5 times from the price of $ 800 at the beginning of 2021. Compared to the same period last year, the price of Ethereum has increased about 20 times in just 1 year. . Ether was founded in 2013 by Russian-Canadian programmer Vitalik Buterin and several other crypto entrepreneurs. Similar to Bitcoin, Ether operates on the Blockchain technology platform. The biggest difference between Ether and Bitcoin is the intended use and core technology. Ether was created with the goal of becoming a platform for smart contract development. Ether serves as a means of paying for the network&#8217;s operating costs. Meanwhile, Bitcoin was born with the sole purpose of becoming a means of payment and a store of value. For programmer Buterin, Bitcoin is too limited in functionality. In an interview with <em> Business Insider</em> , founder Ether compared Bitcoin to a pocket computer that “does one thing well,” while Ether is like a smartphone with many apps. <strong> Ethereum is not perfect yet</strong> However, according to the page <em> CNBC</em> , Ether is not perfect yet. In 2017, the popularity of the game CryptoKitties caused Ether&#8217;s network to become severely congested, slowing transactions and causing game developers to raise fees. Scalability is one of the biggest problems with the Ether network today. This cryptocurrency currently works using a proof-of-work protocol (a mechanism that prevents double-spending), similar to Bitcoin. This means that cryptocurrency miners with purpose-built computers must compete to solve complex mathematical puzzles to validate transactions and get the miners&#8217; networks to &#8220;mine&#8221;. Electrons must consume huge amounts of energy. But Ether is currently &#8220;running&#8221; an ambitious upgrade called Ethereum 2.0. Specifically, the cryptocurrency moves to a proof-of-stake model and relies on investors holding Ether to process new transactions. Cryptocurrency investors say the upgrade will help the Ether network run at scale, process more transactions at faster speeds, and support applications with millions of users. This can also lead to short-term price increases. However, some experts are still skeptical and refuse to trade digital currencies like Bitcoin and Ether. The latest volatility of the world&#8217;s top two cryptocurrencies reminded them of the 2017 crypto bubble, during which Bitcoin surged to a peak of $20,000. But a year later, it &#8220;sloped&#8221; down to $3,122. Some cautious investors say that the cryptocurrency is in a bubble waiting to burst. <em> What do experts think about Ethereum and Bitcoin? Ed Egilinsky, CEO &#8211; Head of Alternative Investments at Direxion said: &#8220;Ethereum&#8217;s blockchain technology has more uses and functionality than Bitcoin, making it a potentially lucrative game in the long run. Also, at the present time, the price difference between Bitcoin and Ethereum could make Ethereum an &#8216;affordable&#8217; investment for investors.&#8221; “Ether is a blockchain platform that acts like the Apple and Android app stores,” said Pat LaVecchia, CEO of trading platform Oasis Pro Markets. Meanwhile, Bitcoin is a commodity like gold, or a store of value. Unlike Bitcoin, where many properties (such as supply) have been fixed since its inception, the Ethereum platform is still evolving with new updates that promise to improve the system. It&#8217;s even entirely possible that regulations change and cause the supply to drop, which will cause the price of Ethereum to continue to rise.&#8221; </em> (according to CNBC, Business Insider)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16237</post-id>	</item>
		<item>
		<title>Warning scams appropriating assets through bank messages</title>
		<link>https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 16 May 2021 23:35:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Appropriation of property]]></category>
		<category><![CDATA[assets]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[entice]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Financial institutions]]></category>
		<category><![CDATA[Hai Duong Police]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[Mobile subscription]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[scams]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Telecommunications business]]></category>
		<category><![CDATA[Telecommunications network]]></category>
		<category><![CDATA[Through verification]]></category>
		<category><![CDATA[usurp]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-scams-appropriating-assets-through-bank-messages/</guid>

					<description><![CDATA[Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages. Illustration. According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hai Duong police have issued a warning about the method of fraud and appropriation of assets through bank messages.</strong><br />
<span id="more-15154"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_181_38817834/e4f90dfd13bffae1a3ae.jpg" width="625" height="398"> </p>
<p> <em> Illustration.</em> According to Hai Duong Police, recently, many mobile subscribers have received messages impersonating financial institutions and banks, sending fake and fraudulent content in order to appropriate people&#8217;s money. Through verification and evaluation, the authorities found that these fake messages did not come from the systems of financial institutions, banks and telecommunications businesses, but were distributed through transmitters. fake mobile signal. These are devices of foreign origin, which are illegally traded and used by objects for the purpose of carrying out attacks to spread spam messages to deceive users, especially users in remote areas. urban area. Fraudsters often use fake broadcast devices to send spam messages directly to the phone without going through the mobile telecommunications network. These messages are sent by objects that change source information in order to create trust and deceive users. The message content is often advertising, instructions or contains links to fake websites like official websites of financial institutions, banks to lure and steal users&#8217; information such as accounts, password, OTP code. Many users do not recognize the fake website, so they provide personal information to access the bank account such as entering the account name and password. After the user provides the information, the fake website will redirect to another website or notify the user to wait. The subject uses the user&#8217;s personal information to log in to the official website of financial institutions and banks to get the OTP authentication code (if necessary).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15154</post-id>	</item>
		<item>
		<title>Lost money unjustly because of fake Google Chrome app</title>
		<link>https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 14 May 2021 22:45:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[crooks]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Hundred thousand]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[unjustly]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</guid>

					<description><![CDATA[Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices. The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices.</strong><br />
<span id="more-14426"></span> The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan Smishing&#8221;.</p>
<p> <strong> How the fake Google Chrome app infiltrates the phone</strong> Specifically, the crook will initially send you an SMS and ask to pay a small fee to receive the parcel. When the user clicks on the attached link, the screen will display a message asking to update the Google Chrome browser (actually fake software) and pay 1-2 USD fee to receive the goods via credit card. use. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/f42897fc88be61e038af.jpg" width="625" height="427"> If you do, the crooks will instantly get your credit card information and take your money. In addition, the malware also uses the device to send about 2,000 phishing SMS messages per week to random phone numbers. According to the researchers, the malware&#8217;s propagation speed is relatively fast, able to target hundreds of thousands of users in a short time. <strong> How to limit?</strong> The researchers recommend that users absolutely do not give out credit card information to strangers. Also only update apps directly through Google Play or the App Store, do not click on suspicious links, even if they are sent by friends or relatives. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/dd86a852b7105e4e0701.jpg" width="625" height="328"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14426</post-id>	</item>
		<item>
		<title>&#8216;Steal&#8217; skin beauty formula of Vbiz long legs, with an unpleasant odor but great effect</title>
		<link>https://en.spress.net/steal-skin-beauty-formula-of-vbiz-long-legs-with-an-unpleasant-odor-but-great-effect/</link>
		
		<dc:creator><![CDATA[Tóc Vàng]]></dc:creator>
		<pubDate>Thu, 13 May 2021 17:59:08 +0000</pubDate>
				<category><![CDATA[Beauty]]></category>
		<category><![CDATA[Beautiful skin]]></category>
		<category><![CDATA[Black beans]]></category>
		<category><![CDATA[CARB]]></category>
		<category><![CDATA[Celery]]></category>
		<category><![CDATA[Dermis]]></category>
		<category><![CDATA[Determinant]]></category>
		<category><![CDATA[Do Thi Ha]]></category>
		<category><![CDATA[Drinks]]></category>
		<category><![CDATA[Effect]]></category>
		<category><![CDATA[Epithelium]]></category>
		<category><![CDATA[formula]]></category>
		<category><![CDATA[Great]]></category>
		<category><![CDATA[Juice]]></category>
		<category><![CDATA[Leggy]]></category>
		<category><![CDATA[Legs]]></category>
		<category><![CDATA[long]]></category>
		<category><![CDATA[miss]]></category>
		<category><![CDATA[odor]]></category>
		<category><![CDATA[Protein]]></category>
		<category><![CDATA[Recipe]]></category>
		<category><![CDATA[Skin]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The secret]]></category>
		<category><![CDATA[thief]]></category>
		<category><![CDATA[tonic]]></category>
		<category><![CDATA[Uncomfortable]]></category>
		<category><![CDATA[unpleasant]]></category>
		<category><![CDATA[VBiz]]></category>
		<category><![CDATA[Yogurt]]></category>
		<guid isPermaLink="false">https://en.spress.net/steal-skin-beauty-formula-of-vbiz-long-legs-with-an-unpleasant-odor-but-great-effect/</guid>

					<description><![CDATA[The stars are not natural but beautiful, they all need a secret to shine. One of them is the skin beauty tonic drink from the inside. The structure of the skin consists of 3 layers: the epidermis, dermis and dermis. Most women usually only pay attention to the epidermis because there are keratinocytes and are [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The stars are not natural but beautiful, they all need a secret to shine. One of them is the skin beauty tonic drink from the inside.</strong><br />
<span id="more-13877"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/c4763b8924cbcd9594da.jpg" width="625" height="468"> </p>
<p> The structure of the skin consists of 3 layers: the epidermis, dermis and dermis. Most women usually only pay attention to the epidermis because there are keratinocytes and are often removed by cleansing and balm. However, this layer of horny cells will still rapidly grow again. The underlying structure under the epidermis is the key factor in bringing smoothness and radiance to the skin. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/74bf8a4095027c5c2513.jpg" width="625" height="375"> <em> The composition of the matrix is ​​a combination of fibrous proteins (collagen) and proteoglycans. They play a role in determining the amount of water retained in the skin and creating the appropriate moisture. </em> Therefore, to take care of healthy and beautiful skin, taking care from within is the most effective method. Understanding this principle, the beauties in Vbiz take great care of the outer and inner skin. Sometimes we often think that stars will have to use many superior drinking products, but in fact they take care of their skin from drinks they are close to and buy everywhere. <strong> Combo is both skin and shape with celery</strong> Celery is high in nutrients, including vitamins A, B, C, fiber and trace minerals. In addition, it also contains many groups of flavonoids such as apigenin, which have strong antioxidant properties, positively impacting the metabolism and elimination of fat in the body. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/70c08b3f947d7d23246c.jpg" width="625" height="1115"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/c6cb3c342376ca289367.jpg" width="625" height="1111"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/802a79d566978fc9d686.jpg" width="625" height="1111"> <em> Miss Do Thi Ha is enjoying moments at home avoiding the epidemic, but she still doesn&#8217;t forget to make women jealous of her smooth, rosy skin. Her secret is a combo of celery, apple and pineapple juice. The queen of Thanh still thought that she could not drink it because of the unpleasant smell, but when the finished product was so delicious.</em> In fact, celery drinks have been verified by many stars in Vbiz such as Bao Thy, Yen Trang, runner-up Diem Trang, &#8230; and they all self-reviewed with a very good skin result. However, celery is actually a vegetable with a strong smell and will not be suitable for many Vietnamese women. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/0451fcaee3ec0ab253fd.jpg" width="625" height="441"> <em> Therefore, to reduce the pungent odor of celery, stars often have to add other fruits such as cucumbers, apples or pineapples. You can store it in the refrigerator so that when enjoying, you don&#8217;t need to add ice to make it more flavorful.</em> <strong> Fruit smoothie and yogurt</strong> The weather is hot, the skin will be oily and prone to acne if women do not know how to cool down the body. Besides celery juice, fruit smoothies and yogurt are the second great idea. This drink is probably preferred by many women because it does not have an unpleasant &#8230; odor. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/5b9cac63b3215a7f0330.jpg" width="625" height="355"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/dedf28203762de3c8773.jpg" width="625" height="1076"> <em> Miss America Duyen has a beautiful rustic skin, surely everyone watching the enlistment star can see it with their own eyes on the screen. She even was &#8220;blamed&#8221; for flashy lipstick when her face did not even have a layer of powder. For every weight loss period, Nam Dinh&#8217;s long legs make fruit yogurt to sip.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/1b88ef77f035196b4024.jpg" width="625" height="1111"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/246fd790c8d2218c78c3.jpg" width="625" height="1111"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/2b37d9c8c68a2fd4769b.jpg" width="625" height="1111"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/b5ed45125a50b30eea41.jpg" width="625" height="1111"> <em> Sister Do Thi Ha also shows hand flowers to make a fruit smoothie by freezing fruit in the freezer and then putting it in a blender. She also alternates with yogurt and cereals to keep her body shape and beautify her skin.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/3119fee6e1a408fa51b5.jpg" width="625" height="473"> <em> The youngest sister of the village, Luong Thuy Linh, also loves a bowl of Greek yogurt mixed with dried nuts. Miss also insisted that this food was beautiful, beautiful skin, beautiful, eating without alcohol, but full for a long time.</em> According to the Nutrition Facts table, Greek yogurt contains more protein, fat and calories than regular yogurt. It is also low in carbs (starches / sugars) and slightly less calcium. This can come in handy for people trying to limit their lactose intake or follow a lower-carb diet. Starch when entering the body will definitely turn into sugar, but sweet sugar is not good for the skin at all. Therefore, it is the reason why the beauties are only one-inch loyal to this yogurt line. When choosing to eat yogurt with fruit, choose low-sugar or no-sugar varieties, as fruits help create natural sweetness. Women should remember, limit refined sugar as much as possible for both skin and shape. <strong> Black bean juice in detox skin</strong> Like other members of the &#8220;legume family&#8221;, black beans are prized for their rich protein and fiber content. Besides, this type of beans also possesses many beneficial vitamins and minerals, and amino acids that the body cannot synthesize. This drink is both cheap and easy to find anywhere. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/19d7d728c86a2134787b.jpg" width="625" height="435"> <em> Roasting black beans and drinking water is one of the quick, safe ways to cool down and bring many good health benefits. Two outstanding effects of black bean juice are weight loss and purification of the body, helping to brighten the skin and limit acne. Thanh Hang has applied and wade the aging stream from U40 to spring girl.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_338_38821735/4b72868d99cf709129de.jpg" width="625" height="390"> <em> As a human born from the village, Miss H&#8217;Hen Niê only applies nutritious bean powder drink. However, her recipe is more elaborate with a variety of beans and brown rice as well. It can be said that this mixture is a form of whey protein for women who are passionate about exercising.</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13877</post-id>	</item>
		<item>
		<title>Ms. Phuong Hang had her video stolen, attracting hundreds of thousands of views in a few hours</title>
		<link>https://en.spress.net/ms-phuong-hang-had-her-video-stolen-attracting-hundreds-of-thousands-of-views-in-a-few-hours/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Thu, 13 May 2021 14:00:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Artist]]></category>
		<category><![CDATA[attracting]]></category>
		<category><![CDATA[Declare war]]></category>
		<category><![CDATA[Double hand]]></category>
		<category><![CDATA[Hang]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[hundreds]]></category>
		<category><![CDATA[Hundreds of thousands]]></category>
		<category><![CDATA[Huynh Uy Dung]]></category>
		<category><![CDATA[Interactive]]></category>
		<category><![CDATA[Lime kiln]]></category>
		<category><![CDATA[LIVESTREAM]]></category>
		<category><![CDATA[Nguyen Phuong Hang]]></category>
		<category><![CDATA[Phuong]]></category>
		<category><![CDATA[Phuong Hang]]></category>
		<category><![CDATA[SAOSTAR]]></category>
		<category><![CDATA[Smoking]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[stolen]]></category>
		<category><![CDATA[The pull]]></category>
		<category><![CDATA[thousands]]></category>
		<category><![CDATA[Video]]></category>
		<category><![CDATA[View]]></category>
		<category><![CDATA[views]]></category>
		<category><![CDATA[Vo Hoang Yen]]></category>
		<category><![CDATA[Youtube]]></category>
		<category><![CDATA[YouTuber]]></category>
		<guid isPermaLink="false">https://en.spress.net/ms-phuong-hang-had-her-video-stolen-attracting-hundreds-of-thousands-of-views-in-a-few-hours/</guid>

					<description><![CDATA[Saostar &#8211; Taking advantage of Ms. Phuong Hang&#8217;s livestreams to attract many viewers, many Facebook and YouTube accounts have re-uploaded her videos to interact with. Over the past time, the controversy between Mr. Vo Hoang Yen and the couple of giants Dung &#8220;lime kilns&#8221; has attracted much attention. Ms. Nguyen Phuong Hang &#8211; wife of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Saostar &#8211; Taking advantage of Ms. Phuong Hang&#8217;s livestreams to attract many viewers, many Facebook and YouTube accounts have re-uploaded her videos to interact with.</strong><br />
<span id="more-13803"></span> Over the past time, the controversy between Mr. Vo Hoang Yen and the couple of giants Dung &#8220;lime kilns&#8221; has attracted much attention.</p>
<p> Ms. Nguyen Phuong Hang &#8211; wife of Mr. Huynh Uy Dung (also known as giant Dung &#8220;lime kiln&#8221;) &#8211; constantly spoke about the fraudulent behavior of Mr. Vo Hoang Yen. However, to date, there are no official results on this case. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38814083/dfb47b0d644f8d11d45e.jpg" width="625" height="320"> <em> Ms. Nguyen Phuong Hang attracted the attention of the online community with livestreams denouncing Mr. Vo Hoang Yen or alone &#8220;declaring war&#8221; with many showbiz artists. (Screenshots)</em> Not only caused a stir on social networks with denunciations of Mr. Vo Hoang Yen, Ms. Phuong Hang was also willing to &#8220;declare war&#8221; on her own with many showbiz artists. Specifically, Ms. Phuong Hang continuously held the livestream, communicated and answered questions from people who were concerned about the controversy between her husband and wife and Mr. Vo Hoang Yen, and Ms. Hang also answered harshly. The artist, YouTuber is meant to offend himself. Taking advantage of Ms. Phuong Hang&#8217;s livestreams to attract many viewers, many Facebook accounts, YouTube have returned to Ms. Hang&#8217;s videos to re-upload (re-upload) on these platforms to interact. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38814083/29668adf959d7cc3258c.jpg" width="625" height="131"> <em> A video with the content re-uploading the livestream of Ms. Phuong Hang reached 162,000 views in just a few hours. (Screenshots)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38814083/e7625adb4599acc7f588.jpg" width="625" height="383"> <em> (Screenshots)</em> Re-up is a term that refers to content produced by retrieving other people&#8217;s content, merging and aggregating it to post on your channel for the purpose of making money. This is a &#8220;gold mine&#8221; for accounts to interact with, even make money, because the work to do is simply take other people&#8217;s videos posted. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38814083/1542adfbb2b95be702a8.jpg" width="625" height="582"> <em> The videos of Ms. Phuong Hang livestream were uploaded by individuals and online shops for interaction. (Screenshots)</em> On the Facebook and YouTube platform &#8211; two of the most popular social networking and video platforms in Vietnam today, just type the keywords &#8220;Ms. Phuong Hang&#8221;, &#8220;Ms. Phuong Hang livestream&#8221;, &#8230; series The results returned were videos of Ms. Phuong Hang livestream re-uploaded by individuals and online shops for interaction. Many channels even edit, select images and set a shocking title for the livestreams of Ms. Phuong Hang with the aim of attracting views and increasing interaction for easy online sales. Besides, these video re-up accounts can also make money by reselling the account. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_329_38814083/cd3d7e8461c68898d1d7.jpg" width="625" height="383"> <em> Many YouTube channels have selected images and titles in a way that shocked Ms. Phuong Hang&#8217;s livestreams with the aim of attracting views and increasing interaction. (Screenshots)</em> Accordingly, when the threshold from a few tens to a few hundred thousand subscribers is reached, the channel owners will perform the next job of renaming and selling the channel for a profit of several tens or even hundreds of million dong if the channel have big followers. Channel buyers can use the channel for their advertising purposes and even switch to clean content, and request to enable monetization from Google. Up to now, the livestreams of the wife of giant Dung &#8220;lime kilns&#8221; are still attracting a lot of attention from the online community.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13803</post-id>	</item>
		<item>
		<title>More than half of Australian businesses were attacked by hackers</title>
		<link>https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</link>
		
		<dc:creator><![CDATA[Việt Nga/VOV-Australia]]></dc:creator>
		<pubDate>Sun, 02 May 2021 12:33:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[As usual]]></category>
		<category><![CDATA[attacked]]></category>
		<category><![CDATA[Australia]]></category>
		<category><![CDATA[Australian]]></category>
		<category><![CDATA[Australian Parliament]]></category>
		<category><![CDATA[businesses]]></category>
		<category><![CDATA[Claim money]]></category>
		<category><![CDATA[Enterprise]]></category>
		<category><![CDATA[Entity]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[In space]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[It is illegal]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[unlock]]></category>
		<category><![CDATA[Useful]]></category>
		<guid isPermaLink="false">https://en.spress.net/more-than-half-of-australian-businesses-were-attacked-by-hackers/</guid>

					<description><![CDATA[A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers. A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A recent report showed that in the past 1 year only half of businesses in Australia were attacked by hackers.</strong><br />
<span id="more-11035"></span> A new report released by a company specializing in cybersecurity Mimecast said that 64% of local businesses in Australia were attacked by hackers with malware last year alone, a 48% increase from the previous year. years earlier. This fact happened when in the last year, because of the Covid-19 translation, many companies switched to working online</p>
<p> Experts say that in each attack, typically hackers will attack networks or systems, steal personal or sensitive information and then demand ransom to return or unlock them. that information. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_65_38643050/39d0b9be9efc77a22eed.jpg" width="625" height="346"> Although experts say that companies should not pay a ransom to hackers because this action helps to foster legal violations, according to Mimecast statistics, 54% of the companies have paid the ransom. Of these, 76% of the companies got their data back, while 24% couldn&#8217;t get it back. Prior to this report, since last year, many entities including major Australian companies have reported being attacked by hackers. The recent victim is Nine Network Television, which makes some programs unable to broadcast as usual. Previously, the Australian National Assembly&#8217;s computer network was also attacked a number of times. In response to this situation, Australia&#8217;s Cybersecurity Center issued recommendations and procedures to instruct entities on how to secure cyber security. At the same time, experts believe that regular software updates as well as the use of multi-factor authentication are also useful measures for security in a cyberspace environment./.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11035</post-id>	</item>
		<item>
		<title>Huawei wins the case against Chanel</title>
		<link>https://en.spress.net/huawei-wins-the-case-against-chanel/</link>
		
		<dc:creator><![CDATA[Quỳnh Chi]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 10:50:27 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Android Authority]]></category>
		<category><![CDATA[Appeal]]></category>
		<category><![CDATA[Arguments]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Chanel]]></category>
		<category><![CDATA[Coca cola]]></category>
		<category><![CDATA[Competent]]></category>
		<category><![CDATA[court]]></category>
		<category><![CDATA[decision]]></category>
		<category><![CDATA[Fashion brands]]></category>
		<category><![CDATA[FedEx]]></category>
		<category><![CDATA[handling]]></category>
		<category><![CDATA[Huawei]]></category>
		<category><![CDATA[Indicate]]></category>
		<category><![CDATA[Lawsuit]]></category>
		<category><![CDATA[Logo]]></category>
		<category><![CDATA[Lose the lawsuit]]></category>
		<category><![CDATA[Nintendo]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Win Lawsuit]]></category>
		<category><![CDATA[wins]]></category>
		<guid isPermaLink="false">https://en.spress.net/huawei-wins-the-case-against-chanel/</guid>

					<description><![CDATA[A court in Europe won Huawei in a logo-related lawsuit with famous fashion brand Chanel. According to the Reuters Recently, a legal lawsuit between Huawei and Chanel involves brand logos. In a European court, famous fashion brand Chanel accused Huawei of &#8220;stealing&#8221; its logo idea. However, the accusations of Chanel did not receive the consent [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A court in Europe won Huawei in a logo-related lawsuit with famous fashion brand Chanel.</strong><br />
<span id="more-10203"></span> According to the <em> Reuters</em> Recently, a legal lawsuit between Huawei and Chanel involves brand logos. In a European court, famous fashion brand Chanel accused Huawei of &#8220;stealing&#8221; its logo idea.</p>
<p> However, the accusations of Chanel did not receive the consent of the court. Although Chanel tried to argue that if the Huawei logo were rotated horizontally, there would be similarities between the two symbols, the court disagreed with this argument. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_119_38622066/a750a23184736d2d3462.jpg" width="625" height="351"> <em> Chanel accused Huawei of &#8220;stealing&#8221; their logo ideas. Photo: Android Authority. </em> &#8220;The differences have to be compared like what was registered, not changing its direction,&#8221; said the reviewer. This is the second time that Huawei and Chanel have entered into a legal struggle in European courts. Prior to that, Chanel was sued. According to the <em> Android Authority</em> , the famous fashion brand still has a chance to appeal this ruling, when the case will be brought to the Court of Justice of the European Union, the highest authority in the country. Logo is an important element in the brand identity of any company. Well-known logos not only signify brand status, but can also become cultural markers. Some well-known brands show cultural symbols such as Coca-Cola, Nintendo and FedEx.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10203</post-id>	</item>
		<item>
		<title>The Apple partner was blackmailed by hackers immediately after the Spring Loaded event</title>
		<link>https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</link>
		
		<dc:creator><![CDATA[Anh Phạm]]></dc:creator>
		<pubDate>Thu, 29 Apr 2021 07:12:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alphabet]]></category>
		<category><![CDATA[Amounts]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[blackmailed]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Event]]></category>
		<category><![CDATA[Exchange]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Happy]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Loaded]]></category>
		<category><![CDATA[MacBook]]></category>
		<category><![CDATA[Partner]]></category>
		<category><![CDATA[Quanta Computer]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[spring]]></category>
		<category><![CDATA[Spring Loaded]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Surprise attack]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-apple-partner-was-blackmailed-by-hackers-immediately-after-the-spring-loaded-event/</guid>

					<description><![CDATA[A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs. While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A group of Russian hackers demanded a $ 50 million ransom on Apple&#8217;s partner company before May 1 in exchange for data they stole about new designs.</strong><br />
<span id="more-10140"></span> While Apple was introducing a series of new products in the Spring Loaded event on the morning of April 21 (Vietnam time), the group of hackers REvil claimed to have hacked into the computer network of Quanta Computer and stole some blueprints. new Apple products.</p>
<p> Quanta is headquartered in Taiwan (China), is the main MacBook manufacturing partner for Apple. The company is also a partner of HP, Facebook, and Alphabet (the parent company of Google). <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_280_38621478/db5d33351577fc29a566.jpg" width="625" height="482"> Accordingly, when the event just ended, REvil posted an article containing 15 pictures detailing a device that is supposed to be a MacBook designed in March 2021. Images include the part number, specific sizes and capacities, detailing many of the parts that work inside the Apple laptop. One of the images signed by designer John Andreadis. REvil has asked Apple to pay a ransom of $ 50 million by May 1. Previously, this group posted information on &#8220;Happy Blog&#8221; &#8211; where hackers announced their &#8220;victory&#8221;. REvil is said to have made an agreement with Quanta before but did not get the victim&#8217;s consent, then the new hacker group released the records on the day of the Apple event. Quanta, for its part, admitted the company had suffered a hacker attack but did not detail whether any data was stolen. The Apple partner also reported to law enforcement about the day-to-day attack and said it had immediately activated an information security defense system, upgraded its infrastructure to protect data. Whether. Apple representatives have not released any official comment on the incident. <em> according to Bloomberg</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10140</post-id>	</item>
		<item>
		<title>Warning: Android and iOS users need to immediately change the password for this app!</title>
		<link>https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 02:49:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Brian Krebs]]></category>
		<category><![CDATA[Change]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[immediately]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[License plate]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[phone number]]></category>
		<category><![CDATA[Public sale]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Third party]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-android-and-ios-users-need-to-immediately-change-the-password-for-this-app/</guid>

					<description><![CDATA[If you are already using this app, quickly change your password immediately. WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application. On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If you are already using this app, quickly change your password immediately.</strong><br />
<span id="more-8140"></span> WTAE-TV reported that a popular mobile parking assistance application called ParkMobile has leaked data, allowing hackers to access personal information related to the 21 million customers of the application.</p>
<p> On the KrebsOnSecurity blog, cybersecurity expert Brian Krebs issued a warning about the leaked data, including the application user&#8217;s email address, phone number, license plate number, customer birth date, and email address. and password. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5d49ebf6ceb427ea7ea5.jpg" width="625" height="416"> <em> (Photo: Seacoast Online)</em> Information about the data breach was first discovered by the threat intelligence firm Gemini Advisory based in New York City (USA). “Gemini Advisory shared an image showing that my personal data was publicly available on a crime forum, including my ParkMobile account information in screenshots, along with information about the data. stolen. The data contains email addresses and phone numbers, as well as license plates for four different vehicles that I have used in the past 10 years, ”said cybersecurity expert Brian Krebs. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/5811e8aecdec24b27dfd.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> On March 26, ParkMobile notified users that they had discovered &#8220;a cybersecurity incident related to a vulnerability in the third party software we use.&#8221; &#8220;We immediately launched an investigation with the assistance of a leading cybersecurity company to resolve the incident. We have also notified the appropriate law enforcement authorities. The investigation is still ongoing and we cannot provide details at this time, &#8220;said ParkMobile. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/a0351d8a38c8d19688d9.jpg" width="625" height="416"> <em> (Photo: ParkMobile)</em> According to ParkMobile, no user&#8217;s credit card information was stolen. “Our investigation indicated that no sensitive data or credit card information that we encrypted, was affected. We will continue to maintain the security and monitor our systems closely, ”the statement said. According to cybersecurity expert Brian Krebs, if you are already using ParkMobile, quickly change your password. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_329_38593874/221a9ea5bbe752b90bf6.jpg" width="625" height="416"> <em> (Artwork: Shutterstock)</em> In the event that this password is used by you with other accounts as well, you should change everything to limit the likelihood of an attack, although it may take a while to complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8140</post-id>	</item>
		<item>
		<title>The $ 500 million picture theft was made into a movie by Netflix</title>
		<link>https://en.spress.net/the-500-million-picture-theft-was-made-into-a-movie-by-netflix/</link>
		
		<dc:creator><![CDATA[Huyền Thi]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 07:20:17 +0000</pubDate>
				<category><![CDATA[Science]]></category>
		<category><![CDATA[Agent]]></category>
		<category><![CDATA[Boston]]></category>
		<category><![CDATA[Breaking down]]></category>
		<category><![CDATA[Committing crime]]></category>
		<category><![CDATA[Edouard Manet]]></category>
		<category><![CDATA[Famous artist]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Gardner Museum]]></category>
		<category><![CDATA[Hypothesis]]></category>
		<category><![CDATA[IRA]]></category>
		<category><![CDATA[Isabella Stewart Gardner]]></category>
		<category><![CDATA[Isabella Stewart Gardner Museum]]></category>
		<category><![CDATA[MARTIN]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Movie]]></category>
		<category><![CDATA[Museum]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Picture]]></category>
		<category><![CDATA[Sea of Galilee]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[The theft]]></category>
		<category><![CDATA[theft]]></category>
		<category><![CDATA[thief]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-500-million-picture-theft-was-made-into-a-movie-by-netflix/</guid>

					<description><![CDATA[When the theft of 13 paintings, including 2 paintings by Rembrandt and Vermeer painters, took place at the Isabella Stewart Gardner Museum in Boston, USA on March 18, 1993, painting experts said this. is the biggest picture theft in history. 28 years have passed, the total value of the paintings has reached 500 million USD [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When the theft of 13 paintings, including 2 paintings by Rembrandt and Vermeer painters, took place at the Isabella Stewart Gardner Museum in Boston, USA on March 18, 1993, painting experts said this. is the biggest picture theft in history. 28 years have passed, the total value of the paintings has reached 500 million USD and despite a series of theories and studies on the identity of the perpetrators, the motives and methods of the crime, and the whereabouts of the works were lost &#8230; but the FBI still has not been able to solve this case.</strong><br />
<span id="more-5875"></span> The Gardner Museum is still offering a $ 10 million bonus to anyone who can provide information on the case. On April 7, 2021, Netflix released a documentary titled &#8220;This is a theft: The most expensive painting theft in the world&#8221; &#8230;</p>
<p> <strong> Cheeky theft</strong> All 16,000 paintings, sculptures and ceramics in the Gardner Museum were collected by a woman named Isabella Stewart Gardner. After inheriting a huge fortune from her millionaire father in 1891, she and her husband Jack Gardner &#8211; also a millionaire &#8211; began to visit Europe, and buy Roman sculptures and vases. antique, paintings by painter Rembrandt. After realizing her collection was very valuable, she built a museum named after her in the hope that it would contribute to &#8220;educating and entertaining the public forever&#8221;. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_99_38562954/7d226a254167a839f176.jpg" width="625" height="416"> <em> Empty picture frames at the Gardner Museum </em> Isabella passed away in 1924, and due to the couple&#8217;s only child, who accidentally died at a young age, she confiscated the entire museum. However, without the financial patronage of the female millionaire, the Gardner Museum quickly declined. On the evening of March 18, 1993, two police robbers tricked two young night guards, 23-year-old Rick Abath and 25-year-old Randy Hestand, to open the door to the museum on the grounds of investigating a case. Puppet takes place inside. The two security guards had no doubt that March 18 was St. Patrick&#8217;s Day, which was an &#8220;occasion&#8221; for the people of Boston to party and fight. The two thieves quickly restrained Rick and Randy, disabled security cameras and removed the precious paintings from the frame. The two thieves left at 2:45 am, and two security guards were bound and gagged with tape until the other guards arrived at 8:15 a.m. Two thieves took away the most valuable artworks on display at the museum: Rembrandt&#8217;s only seascape painting &#8220;Storm on the Sea of ​​Galilee&#8221;, &#8220;Ladies and Gentlemen in Black&#8221; as well. by Rembrandt, one of more than 10 paintings surviving to this day by the most talented Dutch painter Johannes Vermeer &#8220;The Concert&#8221;. In addition, they also stole a self-portrait of the painter Rembrandt, 5 draft drawings by French Impressionist Edgar Degas, a painting by the painter Edouard Manet and when they could not remove the Yellow flag. When Napoleon came down, they took away an antique Chinese bronze jar. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_99_38562954/15dd01da2a98c3c69a89.jpg" width="625" height="728"> <em> Painting &#8220;Storm on the Sea of ​​Galilee&#8221; painted by painter Rambrandt &#8211; the most valuable item of what was stolen </em> When she donated the museum to the city of Boston, Isabella made it clear her condition in her will, presumably to protect her brainchild from merchants, that no one was allowed to sell or donate. Contribute works of art, do not add any new works, and do not rearrange collections, and if these terms are breached, everything, including land. The Gardner Museum built &#8230; will be renamed to Harvard University. These strict provisions inadvertently created a major obstacle for the museum&#8217;s management: they could not hang other paintings to replace stolen ones, so they had to hang empty frames &#8211; like one. how to remind all of the lost treasures. Years passed, and these frames became the most popular &#8220;works&#8221; here. For Anthony Amore, director of security at the Gardner Museum and chief investigator of the theft, the fact that visitors were more concerned with empty frames than the remaining works made him concerned that Theft will overshadow the real value of the stolen treasures. &#8220;The paintings are artifacts of hundreds of years ago, to demonstrate a past that is not preserved in photographs. With just one ticket, one can see Rembrandt&#8217;s brush strokes, and now Now, we don&#8217;t maintain museums for money, but because we want to end the tragedy of the missing paintings. &#8221; <strong> Theories were put forward for three decades </strong> Mr. Anthony investigated the case as detailed and comprehensive as possible, because he believed that if he answered every tip-off email and followed every trace he received, no matter how far away they sounded, he would be. Surely he will find something. Mr. Amore is still working with FBI agent Geoff Kelly, who is in charge of investigating the Gardner burglary. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_99_38562954/20a52aa201e0e8beb1f1.jpg" width="625" height="416"> <em> Gardner museum&#8217;s security director, Mr. Anthony Amore </em> Mr. Geoff is the latest FBI agent in a series of agents assigned to investigate the case since 1981. Over the past three decades, the FBI has conducted a series of underground investigation campaigns from Miami, USA to Japan. The village is far away, and every time they leave empty-handed. Mr. Witman, a retired FBI agent, believes that the Corsician gang&#8217;s line in France that he infiltrated under the guise of an antiques &#8220;trigger&#8221; in 2006 actually owns the paintings. stolen in 1981. However, since many years have passed, he is not sure if they still keep those treasures. Responding to this clue, Mr. Anthony said that the paintings were not in France. Currently, the FBI has come up with a theory that Anthony is quite confident, that is the artwork stolen by two low-level minions in a criminal organization in Boston. The FBI once believed that Carmello Merlino was holding them because during a 1998 eavesdropping, agents overheard Merlino blabbering that he knew where the spoils were. However, later, when arrested for armed robbery and interrogated by the FBI, he was unable to indicate where the Gardner museum property was hidden. Merlino was sentenced to 47 years in prison, and died in 2005. The FBI and Anthony tracked down two tycoons in Maine, USA in 2003 and almost found the stolen stuff. In 2013, the FBI announced that they knew the identities of both thieves, and that both had passed away. As of now, the paintings may be in New England, USA. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_99_38562954/1f7e16793d3bd4658d2a.jpg" width="625" height="783"> <em> Portrait sketch of two perpetrators </em> Geoff maintains his theory: Boston tycoon Whitey Bulger donated the paintings to the Interim Irish Republican Army (IRA) &#8211; a paramilitary organization aimed at ending British rule in the North. Ireland, and the IRA have indeed been involved in a number of antiques smuggling. After Bulger was arrested and the museum&#8217;s assets have yet to be found, Geoff argued that the two thieves did not follow the IRA&#8217;s orders but were still associated with the organization because they committed the crime on St. Patrick&#8217;s Day &#8211; one Important holidays for the people of Ireland. In addition, it is true that the IRA stole works of art, but they only stole domestic museums, such as the Russborough Museum in Ireland &#8211; which has been stolen by the IRA four times in a row. Mr. Anthony also pointed out that there are many works of Rembrandt in Europe, so the IRA does not have to fly to America to cause the crime. Mr. Geoff&#8217;s hypothesis was supported by inspector Charles Hill &#8211; a member of the committee that had found the picture &#8220;Scream&#8221; in 1994 &#8211; supported. Mr. Charles asserted that gangster Martin Foley, owner of the notorious debt collection company Viper, which has a close relationship with the Rossborough Museum&#8217;s painting thief, has &#8220;led the way&#8221; to two perpetrators selling the items. Gardner Museum items, that&#8217;s why Martin knows where the paintings are. Currently, Martin Foley is being sued by the Irish Property Criminal Bureau for owing $ 830,000 in taxes and Charles convinced him that he would be rewarded with $ 10 million, more than enough to pay, if he would declare it all. However, Charles thinks Martin is afraid of being prosecuted by both the FBI and Ireland for possession of fraud. There is another theory about the people behind the theft, which is that two security guards staged the crime. Dutch historian Arthur Brand, who has been dubbed the real-life Indiana Jones, opposes this argument and believes two security guards were not involved in the case. <strong> Attempts to solve the case in 2021</strong> The Gardner Museum is currently closed due to the epidemic, but Mr. Anthony still goes to work every day, communicating with all the informants about the case. Over the years, many witnesses have passed away, but Anthony patiently added new findings and reread the tens of thousands of pages of evidence the FBI had provided. This man believes the answer must lie somewhere. Former lawyer Martin Leppo, although he did not search for the paintings, was still unable to stop pursuing the case, partly because so many people contacted him every day. Of course, Mr. Martin also encountered many imposters. For example, in 2019, a woman demanded to meet him and insisted her father was involved in the case, and she knew where the paintings were. But when Mr. Martin asked to see the paintings, she disappeared. &#8220;A few days ago someone called me to invite me to Saudi Arabia because he had a clue where the stolen items were, and I told him if he could find it, call me back,&#8221; he said. .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5875</post-id>	</item>
		<item>
		<title>Warning: Account for phone sim to steal money</title>
		<link>https://en.spress.net/warning-account-for-phone-sim-to-steal-money/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 05:25:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[4G]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Bank account]]></category>
		<category><![CDATA[call]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[FECredit Finance Company]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[OTP]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[Sim]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Subscriber]]></category>
		<category><![CDATA[The crook]]></category>
		<category><![CDATA[Upgrade]]></category>
		<category><![CDATA[Vinaphone]]></category>
		<category><![CDATA[Vo Do Thang]]></category>
		<category><![CDATA[Vu Minh Nhat]]></category>
		<category><![CDATA[Warning]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-account-for-phone-sim-to-steal-money/</guid>

					<description><![CDATA[Recently, even though some mobile phone subscribers do not do anything with the sim card (the subscriber identification card), they still lose their number, lose the right to manage the account, then have money in the account. Bank. Suddenly lost my sim, lost money Send a petition to Ho Chi Minh City Women&#8217;s Newspaper, Ms. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, even though some mobile phone subscribers do not do anything with the sim card (the subscriber identification card), they still lose their number, lose the right to manage the account, then have money in the account. Bank.</strong><br />
<span id="more-5852"></span> <strong> Suddenly lost my sim, lost money</strong> </p>
<p> Send a petition to Ho Chi Minh City Women&#8217;s Newspaper, Ms. TBC &#8211; in Thu Dau Mot city, Binh Duong province &#8211; said that she had just been stolen by an object, appropriated more than 58 million dong in credit card. Ms. C. said, on March 2, she saw the phone displaying a message &#8220;unable to call&#8221;. The next day, she went to VNPT Binh Duong Business Center to check and rebuild a new sim, but the staff said that the sim card was not damaged, it was still working in two directions; &#8220;Cannot call&#8221; may be caused by phone malfunction. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_19_23_38570408/d28e65204162a83cf173.jpg" width="625" height="492"> <em> A fake message on the network operator calling for users to upgrade to a 4G sim. Phone subscribers need to be very wary of this kind of message &#8211; Photo: Provided by Competition and Consumer Protection Department</em> On March 4, she asked to renew a new sim and a new one to work properly (listen, call). On March 12, when she accidentally read an article about the theft of money from her credit card, she immediately logged into her Fe Credit credit card account to check, and discovered that the money in the account was completely withdrawn in the form of purchase payment. Suspecting that her sim information was leaked during the sim remake process, Ms. H. came to complain at VNPT Binh Duong Business Center, just learned on March 2, there was a transaction to replace her sim card in Ho Chi Minh City. “I live in Binh Duong, have never made a transaction to replace my sim card in Ho Chi Minh City. VNPT Binh Duong Business Center also confirmed to only perform one SIM replacement transaction in Binh Duong. Thus, there is a fraudster who falsified my papers to perform a sim replacement transaction in Ho Chi Minh City and then appropriated property &#8220;- Ms. C. said. Not long ago, Dang Thanh Hai &#8211; in Ho Chi Minh City, the owner of a Viettel subscriber &#8211; suddenly blocked his mobile phone number, then was withdrawn 30 million dong from his bank account. Mr. Vu Minh Nhat &#8211; in Hanoi, the owner of a Mobifone subscriber &#8211; also had his sim stolen and then hacked into his bank account, losing 74.8 million dong via online payment. In the above two cases, the fraudster used a notarized copy of the identity card (ID card), went to the phone store (also the agent of the network operator) to register the procedure. In the case of Mr. Hai, the employee does not compare the copy of ID card with the original ID card; In the case of Nhat, the staff did not see the original ID card, nor did they require the latest contacts to verify. Recently, Thanh Hoa City Police, Thanh Hoa Province prosecuted seven subjects for counterfeiting ID cards according to customer information and then pasted their photos, to transaction points of network operators such as Viettel, Vinaphone to report the loss of their sim cards. suggest to redo the sim with the old number After being granted phone numbers from the carriers, the subjects used fake IDs and stolen phone numbers to make unsecured loan contracts from Fe Credit with loans from 20-70 million VND, appropriating a total of 500 million dong. <strong> The network operator can not be indifferent</strong> In the case of Ms. TBC, the representative of Vinaphone&#8217;s mobile phone network admitted, Vinaphone staff made a mistake in the process. Rather, in order to be reissued (in case of no sim), the subscriber must present his ID card, fill out an application form to reissue the sim, provide five outgoing and five dialed phone numbers. come. But the transaction staff in Ho Chi Minh City did not ask the replacement sim (the fraudster) to present ID card, just provide five phone numbers to call out and call. As a result, the fraudster easily obtained the sim of Mrs. C. and then appropriated more than 58 million dong in the credit card. Why does the fraudster know the five dialed and dialed numbers of the sim owner? According to Mr. Vo Do Thang &#8211; Director of Athens International Security and Network Management Training Center &#8211; the crook can use many of his own sims to phone, send text messages to the subscriber owner to call back and easily get the list. these calls. The situation of sim theft is happening more and more, but the network operators have not changed the sim re-issuance process as well as require transaction staff to be more cautious in re-issuing the sim, in order to ensure safety for customers. According to Mr. Vo Do Thang, the easy re-issuance of sim cards has created a gap for the fraudster who steals the sim. Employees often check for passport or not check, while counterfeiting ID is not difficult; Furthermore, they also have no inspection skills so it is difficult to detect tampering. “If the network operator takes one more step, such as issuing a password when issuing the sim for the first time, there is a secret question that only the subscriber knows, using artificial intelligence to detect the sim owner&#8217;s face &#8230; Having forged papers, it is not possible to steal the sim card ”- Mr. Vo Do Thang proposed. The representative of Vinaphone added that this company had collected information related to the theft of Ms. C.&#8217;s sim and transferred it to the police station to assist the victim. According to FeCredit Finance Company, because Mrs. C. was not at fault in this case, she is not responsible for the lost credit card amount. <strong> Why do I lose money in credit card when I lose my sim card?</strong> Most of the victims in the sim lost cases are stolen money by fraudsters by making online payments. Three factors are required to pay for online purchases: First, a mobile phone number &#8211; the credit card holder must register this number with the bank to authenticate transactions and receive bank notices. Second is the card number (the serial number printed on the front of the credit card). Third is the OTP authentication code (one-time password) sent via registered phone number with the bank. According to Mr. Vo Do Thang, the victim&#8217;s credit card number has been stolen by the fraud before, the sim theft is just the last step to steal money. After the sim is stolen, the fraudster will take the victim&#8217;s credit card number to pay online, then use the sim to receive the OTP code. Therefore, not everyone who loses their sim card will lose money in their credit card, in their bank account, only when they have revealed their credit card or account information before that the fraudster can steal the money. The victim&#8217;s credit card information may be exposed during previous online transactions by entering fraudulent websites, being infected with malicious code on the phone to steal card information or possibly due to The credit institution does not guarantee security. According to Mr. Vo Do Thang, criminals just need to steal credit card information, steal sim cards, and get OTP codes to steal money in the victim&#8217;s account shows that it is a great risk. Online payment processes of most credit institutions are still lax. “In this situation, the most important card users need to closely protect their card and account information, to avoid providing it to strangers. Absolutely do not visit strange websites or open attachments that are sent to unknown origin to avoid being installed with malicious code. Should be equipped with anti-virus software, anti-software with self-copy function (Trojan), keyboard manipulation monitoring programs (Keylogger), equipped with firewall protection &#8230; (According to Women HCMC)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5852</post-id>	</item>
	</channel>
</rss>