<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Trojans &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/trojans/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 27 May 2021 17:40:05 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Lost my password because I opened an email attachment</title>
		<link>https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Thu, 27 May 2021 17:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Attach]]></category>
		<category><![CDATA[Attachment]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Camouflage]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Download data online]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[opened]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PDF]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Somethings like that]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[The same]]></category>
		<category><![CDATA[Trojans]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-my-password-because-i-opened-an-email-attachment/</guid>

					<description><![CDATA[Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you. Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers. The form of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Stop opening PDF files attached to emails unless you are absolutely sure of their origin and know exactly who is emailing you.</strong><br />
<span id="more-18631"></span> Distributing malware via email is one of the most common forms of fraud today. Although there have been many warnings, there are still many people who become victims of hackers.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/1459f36ae6280f765639.jpg" width="625" height="351"> <em> The form of attack and distribution of malware via email is quite common. Photo: Yahoo</em> Recently, Microsoft&#8217;s security research team discovered a new attack via email. When the victim downloads and opens the attached PDF files, the Trojan will access the device and steal login information, passwords, etc. In addition, the malware also takes control of the system and disguises itself as fake ransomware. “Version 1.5 of the malware has quite a few changes compared to the previous version, but their functionality remains largely the same, including collecting browser passwords, running remote commands and PowerShell, remembering operations. keyboard operation… and some other features”. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_26_331_38972804/c47f244c310ed850811f.jpg" width="625" height="534"> <em> Malicious PDF file attached to email. Photo: Microsoft</em> According to the report of <em> Threatpost</em> , malware is being distributed by attackers by email, users can identify their signs through messages like &#8220;Outgoing Payments&#8221;, &#8220;Accounts Payable Department&#8221; &#8230; Microsoft said that Microsoft 365 Defender software can detect and prevent malware from attacking computers based on machine learning.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18631</post-id>	</item>
		<item>
		<title>Lost money unjustly because of fake Google Chrome app</title>
		<link>https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</link>
		
		<dc:creator><![CDATA[TIỂU MINH]]></dc:creator>
		<pubDate>Fri, 14 May 2021 22:45:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Chrome]]></category>
		<category><![CDATA[Credit]]></category>
		<category><![CDATA[crooks]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[Google chrome]]></category>
		<category><![CDATA[Google Play]]></category>
		<category><![CDATA[Hundred thousand]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Infection]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost money]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Miscarriage of justice]]></category>
		<category><![CDATA[money]]></category>
		<category><![CDATA[Parcels]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[Steal]]></category>
		<category><![CDATA[Trojans]]></category>
		<category><![CDATA[unjustly]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://en.spress.net/lost-money-unjustly-because-of-fake-google-chrome-app/</guid>

					<description><![CDATA[Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices. The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, researchers at cybersecurity firm Pradeo discovered a new type of malware that impersonates the Google Chrome app and infects hundreds of thousands of devices.</strong><br />
<span id="more-14426"></span> The fake Google Chrome app is part of a mobile attack campaign that uses phishing methods to steal credit card information. Researchers have identified this threat and named it &#8220;Trojan Smishing&#8221;.</p>
<p> <strong> How the fake Google Chrome app infiltrates the phone</strong> Specifically, the crook will initially send you an SMS and ask to pay a small fee to receive the parcel. When the user clicks on the attached link, the screen will display a message asking to update the Google Chrome browser (actually fake software) and pay 1-2 USD fee to receive the goods via credit card. use. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/f42897fc88be61e038af.jpg" width="625" height="427"> If you do, the crooks will instantly get your credit card information and take your money. In addition, the malware also uses the device to send about 2,000 phishing SMS messages per week to random phone numbers. According to the researchers, the malware&#8217;s propagation speed is relatively fast, able to target hundreds of thousands of users in a short time. <strong> How to limit?</strong> The researchers recommend that users absolutely do not give out credit card information to strangers. Also only update apps directly through Google Play or the App Store, do not click on suspicious links, even if they are sent by friends or relatives. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_331_38825582/dd86a852b7105e4e0701.jpg" width="625" height="328"></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14426</post-id>	</item>
	</channel>
</rss>