<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>websites &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/websites/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Wed, 09 Jun 2021 22:10:07 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Beware of fake websites and fanpages to spread bad and toxic news</title>
		<link>https://en.spress.net/beware-of-fake-websites-and-fanpages-to-spread-bad-and-toxic-news/</link>
		
		<dc:creator><![CDATA[Lê Phương]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 22:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[BAD]]></category>
		<category><![CDATA[Bad news]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Blog]]></category>
		<category><![CDATA[Chieu]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[fanpages]]></category>
		<category><![CDATA[Knit]]></category>
		<category><![CDATA[Logo]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Object]]></category>
		<category><![CDATA[Official]]></category>
		<category><![CDATA[Party]]></category>
		<category><![CDATA[Poison]]></category>
		<category><![CDATA[posts]]></category>
		<category><![CDATA[Prevent]]></category>
		<category><![CDATA[Reactionary]]></category>
		<category><![CDATA[Spread]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Trust]]></category>
		<category><![CDATA[websites]]></category>
		<category><![CDATA[Wrong]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-fake-websites-and-fanpages-to-spread-bad-and-toxic-news/</guid>

					<description><![CDATA[With the use of some tricks such as using symbolic logos of authorities to create fanpages on social networks or using avatars and names of Party and State leaders to name the page. On the web, reactionary objects have interwoven bad and malicious information to destroy the Party and State among official information, thereby easily [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With the use of some tricks such as using symbolic logos of authorities to create fanpages on social networks or using avatars and names of Party and State leaders to name the page. On the web, reactionary objects have interwoven bad and malicious information to destroy the Party and State among official information, thereby easily gaining the trust of many people&#8230;</strong><br />
<span id="more-21899"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_361_39085580/6c5c210b3349da178358.jpg" width="625" height="424"> </p>
<p> The trick that is considered very dangerous today is that reactionary objects fake official information pages, using tricks to create fake websites, fanpages, blogs, facebook, taking the names of agencies. , individual leaders of the Party, State and a number of departments, ministries, branches and localities to spread fake news, bad news, toxic, to cause conflicts, internal divisions, even many websites and blogs Facebook posts information and images very deeply about internal issues, causing skepticism and confusion among officials, party members and the people. For example, the recent fake fan page &#8220;Central Propaganda Department&#8221; is an example. This fake fanpage has attracted hundreds of likes, hundreds of followers and posted unreliable information. More dangerously, on the social network youtube, with just a simple search, users can access thousands of videos with content related to Party and State personnel; fabricated, slanderous, libelous and defamatory information about Party and State leaders. However, many of these videos, although presented as a news report by the media, in fact the content inside is speculation, fabrication, and false information about standardization work. congress, especially the Party&#8217;s personnel work. To create trust for viewers, the subjects are also willing to create their own logos, using images of Party and State leaders, and then attach them to sensational headlines. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_05_361_39085580/aa77f920eb62023c5b73.jpg" width="625" height="408"> Leaders of Thanh Hoa Provincial Police spoke at a meeting of the 35 provincial Steering Committees on protecting the Party&#8217;s ideological foundation and fighting against wrong and hostile views. Not only appropriating the people&#8217;s trust, the deeper purpose of reactionary and hostile forces is to sabotage the Party and State, divide the Party and State with the People, and sabotage the great unity bloc. nation. Detecting and identifying sophisticated tricks and schemes of reactionary objects in order to take measures to fight and oppose is one of the top priority tasks of the current functional forces. The authorities recommend that, in order to avoid falling into the extremely sophisticated &#8220;information trap&#8221; of hostile forces, each citizen himself needs to stay awake, raise vigilance, properly identify and proactively prevent prevent, fight, prevent, and expose distorting claims of hostile forces. When approaching websites, it is necessary to be vigilant, verify and compare information with official sources, absolutely do not share or comment on articles of unknown source, first of all to protect themselves, then contribute to creating the spiritual strength of the community, firmly defending the ideological foundation of the Party against the plots of &#8220;peaceful evolution&#8221; by opportunists and reactionaries.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21899</post-id>	</item>
		<item>
		<title>Hacked AirTags can lead users to malicious websites</title>
		<link>https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</link>
		
		<dc:creator><![CDATA[Thục Anh (TH)]]></dc:creator>
		<pubDate>Thu, 13 May 2021 13:19:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[AirTags]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Jailbreak]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost Mode]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Microcontrollers]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Thomas Roth]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Use]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Video sharing]]></category>
		<category><![CDATA[Wallet]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</guid>

					<description><![CDATA[A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device. Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230; With Lost Mode enabled, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device.</strong><br />
<span id="more-13793"></span> Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230;</p>
<p> With Lost Mode enabled, AirTag will send out a signal to one of the billions of Apple devices around the globe, then send a notification about the user&#8217;s iPhone to they visit Apple&#8217;s location site (found.apple.com) so that users know the AirTag&#8217;s location. Researcher Thomas Roth recently shared a video of his work on AirTag&#8217;s performance and progress. Specifically, when the owner of AirTag turns on the loss of device notification, if an iPhone is near, the iPhone will be prompted to visit the page &#8220;found.apple.com&#8221;. However, with the affected AirTag, the iPhone displayed the researcher&#8217;s website. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_236_38813981/c3d01e8300c1e99fb0d0.jpg" width="625" height="351"> <em> AirTag is a newly launched accessory from Apple</em> Thomas Roth said he hacked into AirTag&#8217;s microcontroller, then &#8220;flashed&#8221; the component again to modify the device&#8217;s performance. It took hours to run and caused two AirTags to fail, before succeeding. However, to perform the hack shown by Thomas Roth is not easy, as hackers need to intervene directly in the AirTag without the user&#8217;s discovery. But this is proof that AirTag has been hacked and can intervene, similar to the form of &#8220;jailbreak&#8221; on the iPhone, which means that a device as compact as AirTag also poses a potential security risk. security, requires Apple to have solutions to enhance security on its device.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13793</post-id>	</item>
	</channel>
</rss>