{"id":336,"date":"2022-07-07T20:08:20","date_gmt":"2022-07-07T20:08:20","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=336"},"modified":"2022-07-07T20:08:20","modified_gmt":"2022-07-07T20:08:20","slug":"phan-mem-doc-hai-101","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/","title":{"rendered":"Malware 101: Malware l\u00e0 g\u00ec, C\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 C\u00e1ch x\u00f3a Malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Malware l\u00e0 m\u1ed9t thu\u1eadt ng\u1eef \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 m\u00f4 t\u1ea3 t\u1ea5t c\u1ea3 c\u00e1c lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 g\u00e2y ra m\u1ecdi lo\u1ea1i thi\u1ec7t h\u1ea1i. Ch\u00fang t\u00f4i s\u1ebd th\u1ea3o lu\u1eadn v\u1ec1 malware l\u00e0 g\u00ec, c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng malware v\u00e0 c\u00e1ch lo\u1ea1i b\u1ecf malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. Ch\u00fang t\u00f4i c\u0169ng s\u1ebd cung c\u1ea5p c\u00e1c m\u1eb9o v\u1ec1 c\u00e1ch gi\u1eef an to\u00e0n tr\u1ef1c tuy\u1ebfn v\u00e0 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh c\u00f3 h\u1ea1i n\u00e0y.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Malware l\u00e0 g\u00ec?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">M\u1ed9t m\u00e1y t\u00ednh b\u1ecb nhi\u1ec5m malware \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 m\u1ed9t s\u1ef1 nhi\u1ec5m malware.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">M\u1ed9t s\u1ef1 nhi\u1ec5m malware l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ho\u1eb7c m\u00e3 t\u1ea5n c\u00f4ng, kh\u00e1m ph\u00e1, \u0111\u00e1nh c\u1eafp ho\u1eb7c th\u1ef1c hi\u1ec7n b\u1ea5t k\u1ef3 nhi\u1ec7m v\u1ee5 n\u00e0o kh\u00e1c m\u00e0 k\u1ebb t\u1ea5n c\u00f4ng c\u00f3 th\u1ec3 mong mu\u1ed1n. Do s\u1ef1 \u0111a d\u1ea1ng c\u1ee7a c\u00e1c h\u00ecnh th\u1ee9c m\u00e0 malware t\u1ed3n t\u1ea1i, n\u00f3 cho ph\u00e9p nhi\u1ec1u l\u1ef1a ch\u1ecdn \u0111\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Cho ph\u00e9p k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng m\u1ed9t m\u00e1y b\u1ecb x\u00e2m nh\u1eadp nh\u01b0 m\u1ed9t n\u1ec1n t\u1ea3ng \u0111i\u1ec1u khi\u1ec3n t\u1eeb xa.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">G\u1eedi th\u01b0 r\u00e1c t\u1eeb m\u00e1y t\u00ednh b\u1ecb nhi\u1ec5m \u0111\u1ebfn c\u00e1c th\u00e0nh vi\u00ean trong m\u1ea1ng m\u00e0 kh\u00f4ng bi\u1ebft v\u1ec1 s\u1ef1 nhi\u1ec5m.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ki\u1ec3m tra m\u1ea1ng c\u1ee5c b\u1ed9 c\u1ee7a ng\u01b0\u1eddi d\u00f9ng \u0111\u1ec3 t\u00ecm d\u1eef li\u1ec7u quan tr\u1ecdng.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">C\u00e1c lo\u1ea1i Malware<\/span><\/strong><\/h2>\n<h3><strong><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m qu\u1ea3ng c\u00e1o<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Adware l\u00e0 malware t\u1ea3i qu\u1ea3ng c\u00e1o tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 kh\u00f4ng c\u00f3 s\u1ef1 cho ph\u00e9p c\u1ee7a b\u1ea1n. M\u1eb7c d\u00f9 n\u00f3 kh\u00f4ng \u0111\u1eb7c bi\u1ec7t g\u00e2y h\u1ea1i, nh\u01b0ng c\u00f3 th\u1ec3 g\u00e2y ph\u00e2n t\u00e2m v\u00ec qu\u1ea3ng c\u00e1o \u201cspammy\u201d li\u00ean t\u1ee5c xu\u1ea5t hi\u1ec7n khi b\u1ea1n l\u00e0m vi\u1ec7c, l\u00e0m ch\u1eadm \u0111\u00e1ng k\u1ec3 hi\u1ec7u su\u1ea5t c\u1ee7a m\u00e1y t\u00ednh. H\u01a1n n\u1eefa, nh\u1eefng qu\u1ea3ng c\u00e1o n\u00e0y c\u00f3 th\u1ec3 v\u00f4 t\u00ecnh khuy\u1ebfn kh\u00edch ng\u01b0\u1eddi d\u00f9ng t\u1ea3i xu\u1ed1ng c\u00e1c lo\u1ea1i malware nguy hi\u1ec3m kh\u00e1c.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi adware:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Li\u00ean t\u1ee5c c\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 tr\u00e1nh nhi\u1ec5m adware.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng malware uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi adware.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd nh\u1ea5p v\u00e0o qu\u1ea3ng c\u00e1o pop-up.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Virus<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Virus l\u00e0 m\u1ed9t lo\u1ea1i malware c\u00f3 th\u1ec3 t\u1ef1 sao ch\u00e9p v\u00e0 lan truy\u1ec1n sang c\u00e1c m\u00e1y t\u00ednh kh\u00e1c. N\u00f3 c\u0169ng c\u00f3 th\u1ec3 x\u00f3a t\u1ec7p, thay \u0111\u1ed5i c\u00e0i \u0111\u1eb7t ho\u1eb7c l\u00e0m h\u1ecfng d\u1eef li\u1ec7u tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. Trong m\u1ed9t s\u1ed1 tr\u01b0\u1eddng h\u1ee3p, virus th\u1eadm ch\u00ed c\u00f3 th\u1ec3 hi\u1ec3n th\u1ecb c\u1ea3nh b\u00e1o gi\u1ea3 ho\u1eb7c qu\u1ea3ng c\u00e1o \u0111\u1ec3 l\u1eeba b\u1ea1n c\u00e0i \u0111\u1eb7t th\u00eam malware.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Virus th\u01b0\u1eddng lan truy\u1ec1n qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi virus:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd t\u1ea3i xu\u1ed1ng t\u1ec7p t\u1eeb c\u00e1c trang web kh\u00f4ng \u0111\u00e1ng tin c\u1eady.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Tr\u00e1nh c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi virus.\u00a0<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Malware kh\u00f4ng t\u1ec7p<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Malware kh\u00f4ng t\u1ec7p l\u00e0 m\u1ed9t lo\u1ea1i malware kh\u00f4ng d\u1ef1a v\u00e0o t\u1ec7p \u0111\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. Thay v\u00e0o \u0111\u00f3, n\u00f3 s\u1eed d\u1ee5ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh h\u1ee3p ph\u00e1p \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00f4ng vi\u1ec7c b\u1ea9n th\u1ec9u c\u1ee7a n\u00f3. V\u00ec malware kh\u00f4ng t\u1ec7p kh\u00f4ng s\u1eed d\u1ee5ng b\u1ea5t k\u1ef3 t\u1ec7p n\u00e0o, n\u00ean c\u00f3 th\u1ec3 kh\u00f3 ph\u00e1t hi\u1ec7n v\u00e0 lo\u1ea1i b\u1ecf.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Malware kh\u00f4ng t\u1ec7p c\u00f3 th\u1ec3 ph\u1ee9c t\u1ea1p \u0111\u1ed1i v\u1edbi ph\u1ea7n m\u1ec1m ch\u1ed1ng virus \u0111\u1ec3 b\u1ea3o v\u1ec7 v\u00ec n\u00f3 kh\u00f4ng c\u00f3 t\u1ec7p th\u1ef1c thi. Nh\u01b0ng b\u1ea1n c\u00f3 th\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a m\u00ecnh b\u1eb1ng c\u00e1ch \u0111\u1ea3m b\u1ea3o ng\u01b0\u1eddi d\u00f9ng ch\u1ec9 c\u00f3 c\u00e1c quy\u1ec1n h\u1ecd c\u1ea7n \u0111\u1ec3 th\u1ef1c hi\u1ec7n c\u00f4ng vi\u1ec7c c\u1ee7a m\u00ecnh. \u0110i\u1ec1u n\u00e0y s\u1ebd ng\u0103n ch\u1eb7n t\u1ed9i ph\u1ea1m m\u1ea1ng s\u1eed d\u1ee5ng malware kh\u00f4ng t\u1ec7p \u0111\u1ec3 l\u1ea5y th\u00f4ng tin \u0111\u0103ng nh\u1eadp c\u1ee7a nh\u00e2n vi\u00ean v\u00e0 truy c\u1eadp d\u1eef li\u1ec7u b\u1ecb h\u1ea1n ch\u1ebf.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">S\u00e2u m\u00e1y t\u00ednh<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">S\u00e2u m\u00e1y t\u00ednh l\u00e0 malware c\u00f3 th\u1ec3 t\u1ef1 lan truy\u1ec1n m\u00e0 kh\u00f4ng c\u1ea7n s\u1ef1 t\u01b0\u01a1ng t\u00e1c c\u1ee7a ng\u01b0\u1eddi d\u00f9ng. S\u00e2u m\u00e1y t\u00ednh c\u00f3 th\u1ec3 g\u00e2y ra nhi\u1ec1u thi\u1ec7t h\u1ea1i v\u00ec ch\u00fang c\u00f3 th\u1ec3 nhanh ch\u00f3ng lan r\u1ed9ng kh\u1eafp m\u1ed9t m\u1ea1ng l\u01b0\u1edbi, l\u00e2y nhi\u1ec5m t\u1ea5t c\u1ea3 c\u00e1c m\u00e1y t\u00ednh trong m\u1ea1ng \u0111\u00f3. Khi m\u1ed9t s\u00e2u m\u00e1y t\u00ednh l\u00e2y nhi\u1ec5m m\u1ed9t m\u00e1y t\u00ednh, n\u00f3 s\u1ebd qu\u00e9t m\u1ea1ng \u0111\u1ec3 t\u00ecm c\u00e1c m\u00e1y t\u00ednh d\u1ec5 b\u1ecb t\u1ea5n c\u00f4ng kh\u00e1c v\u00e0 ph\u00e2n ph\u1ed1i ch\u00fang \u0111\u1ebfn c\u00e1c h\u1ec7 th\u1ed1ng \u0111\u00f3.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">S\u00e2u m\u00e1y t\u00ednh th\u01b0\u1eddng lan truy\u1ec1n qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi s\u00e2u m\u00e1y t\u00ednh, tr\u00e1nh c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd t\u1ea3i xu\u1ed1ng t\u1ec7p t\u1eeb c\u00e1c trang web kh\u00f4ng \u0111\u00e1ng tin c\u1eady.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi s\u00e2u m\u00e1y t\u00ednh.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">https:\/\/www.youtube.com\/watch?v=QozdEbyMK5E<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Trojan<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Ch\u01b0\u01a1ng tr\u00ecnh Trojan l\u00e0 c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh gi\u1ea3 m\u1ea1o gi\u1ea3 v\u1edd l\u00e0 m\u1ed9t th\u1ee9 kh\u00e1c. Ch\u00fang kh\u00f4ng ph\u1ea3i l\u00e0 virus hay s\u00e2u m\u00e1y t\u00ednh, nh\u01b0ng ch\u00fang v\u1eabn c\u00f3 th\u1ec3 g\u00e2y ra nhi\u1ec1u thi\u1ec7t h\u1ea1i. Ch\u01b0\u01a1ng tr\u00ecnh Trojan th\u01b0\u1eddng x\u00e2m nh\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n th\u00f4ng qua email ho\u1eb7c li\u00ean k\u1ebft d\u1eabn \u0111\u1ebfn m\u1ed9t trang web gi\u1ea3 m\u1ea1o. V\u00ec ch\u00fang d\u1ef1a v\u00e0o k\u1ef9 thu\u1eadt x\u00e3 h\u1ed9i \u0111\u1ec3 khi\u1ebfn ng\u01b0\u1eddi d\u00f9ng lan truy\u1ec1n v\u00e0 t\u1ea3i xu\u1ed1ng, ch\u00fang c\u00f3 th\u1ec3 kh\u00f3 ch\u1ed1ng l\u1ea1i h\u01a1n so v\u1edbi virus v\u00e0 s\u00e2u m\u00e1y t\u00ednh th\u00f4ng th\u01b0\u1eddng.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00e1ch d\u1ec5 nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi ch\u01b0\u01a1ng tr\u00ecnh Trojan l\u00e0 c\u1ea9n th\u1eadn v\u1edbi c\u00e1c email b\u1ea1n m\u1edf v\u00e0 c\u00e1c trang web b\u1ea1n truy c\u1eadp.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi Trojan.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Ransomware l\u00e0 malware m\u00e3 h\u00f3a c\u00e1c t\u1ec7p c\u1ee7a b\u1ea1n v\u00e0 gi\u1eef ch\u00fang l\u00e0m con tin cho \u0111\u1ebfn khi b\u1ea1n tr\u1ea3 ti\u1ec1n chu\u1ed9c. Tr\u1ea3 ti\u1ec1n chu\u1ed9c c\u00f3 th\u1ec3 kh\u00f4ng \u0111\u1ea3m b\u1ea3o r\u1eb1ng b\u1ea1n s\u1ebd l\u1ea5y l\u1ea1i \u0111\u01b0\u1ee3c c\u00e1c t\u1ec7p c\u1ee7a m\u00ecnh, v\u00e0 n\u00f3 c\u0169ng h\u1ed7 tr\u1ee3 c\u00e1c t\u1ed9i ph\u1ea1m m\u1ea1ng t\u1ea1o ra ransomware.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Khi c\u00e1c t\u1ec7p c\u1ee7a b\u1ea1n b\u1ecb m\u00e3 h\u00f3a, b\u1ea1n s\u1ebd kh\u00f4ng th\u1ec3 truy c\u1eadp ho\u1eb7c s\u1eed d\u1ee5ng ch\u00fang. Ransomware th\u01b0\u1eddng lan truy\u1ec1n qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Ransomware th\u01b0\u1eddng lan truy\u1ec1n qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi ransomware, tr\u00e1nh c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd t\u1ea3i xu\u1ed1ng t\u1ec7p t\u1eeb c\u00e1c trang web kh\u00f4ng \u0111\u00e1ng tin c\u1eady.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean. C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi ransomware.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Bot<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Bot l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ph\u1ea7n m\u1ec1m th\u1ef1c hi\u1ec7n c\u00e1c t\u00e1c v\u1ee5 t\u1ef1 \u0111\u1ed9ng qua internet. C\u00e1c nh\u00e0 ph\u00e1t tri\u1ec3n c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng bot cho m\u1ee5c \u0111\u00edch t\u1ed1t ho\u1eb7c x\u1ea5u. V\u00ed d\u1ee5, m\u1ed9t bot th\u1eddi ti\u1ebft c\u00f3 th\u1ec3 t\u1ef1 \u0111\u1ed9ng g\u1eedi cho b\u1ea1n m\u1ed9t tweet khi tr\u1eddi s\u1eafp m\u01b0a trong khu v\u1ef1c c\u1ee7a b\u1ea1n. Nh\u01b0ng hacker c\u0169ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng bot \u0111\u1ec3 ph\u00e1t t\u00e1n th\u01b0 r\u00e1c ho\u1eb7c malware.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">M\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng t\u1eeb ch\u1ed1i d\u1ecbch v\u1ee5 ph\u00e2n t\u00e1n qua botnet v\u00e0o n\u0103m 2018 \u0111\u00e3 l\u00e0m s\u1eadp Twitter, Netflix v\u00e0 c\u00e1c trang web ph\u1ed5 bi\u1ebfn kh\u00e1c.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">C\u00e1ch t\u1ed1t nh\u1ea5t \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi bot:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Th\u00eam CAPTCHA v\u00e0o c\u00e1c bi\u1ec3u m\u1eabu tr\u00ean trang web c\u1ee7a b\u1ea1n \u0111\u1ec3 l\u00e0m cho bot kh\u00f3 g\u1eedi ch\u00fang h\u01a1n.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Spyware l\u00e0 malware cho ph\u00e9p t\u1ed9i ph\u1ea1m m\u1ea1ng thu th\u1eadp th\u00f4ng tin v\u1ec1 b\u1ea1n m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft. Ch\u00fang c\u00f3 th\u1ec3 theo d\u00f5i c\u00e1c trang web b\u1ea1n truy c\u1eadp, c\u00e1c t\u00ecm ki\u1ebfm b\u1ea1n th\u1ef1c hi\u1ec7n v\u00e0 c\u00e1c t\u1ec7p b\u1ea1n t\u1ea3i xu\u1ed1ng. Spyware c\u0169ng c\u00f3 th\u1ec3 thu th\u1eadp th\u00f4ng tin nh\u1ea1y c\u1ea3m nh\u01b0 m\u1eadt kh\u1ea9u v\u00e0 s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng c\u1ee7a b\u1ea1n.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Spyware th\u01b0\u1eddng \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft, th\u00f4ng qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi spyware:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Tr\u00e1nh c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd t\u1ea3i xu\u1ed1ng t\u1ec7p t\u1eeb c\u00e1c trang web kh\u00f4ng \u0111\u00e1ng tin c\u1eady.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean. C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi spyware.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Rootkit\u00a0<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">Rootkit l\u00e0 malware cho ph\u00e9p t\u1ed9i ph\u1ea1m m\u1ea1ng truy c\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 th\u00f4ng tin nh\u1ea1y c\u1ea3m c\u1ee7a n\u00f3 m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft. Rootkit th\u01b0\u1eddng \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft, th\u00f4ng qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email ho\u1eb7c b\u1eb1ng c\u00e1ch t\u1ea3i xu\u1ed1ng c\u00e1c t\u1ec7p b\u1ecb nhi\u1ec5m t\u1eeb internet. T\u1ed9i ph\u1ea1m m\u1ea1ng c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng ch\u00fang \u0111\u1ec3 thu th\u1eadp th\u00f4ng tin v\u1ec1 b\u1ea1n, theo d\u00f5i c\u00e1c trang web b\u1ea1n truy c\u1eadp v\u00e0 th\u1eadm ch\u00ed \u0111i\u1ec1u khi\u1ec3n m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n t\u1eeb xa.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">\u0110\u1ec3 b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi rootkit:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Tr\u00e1nh c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email t\u1eeb ng\u01b0\u1eddi g\u1eedi kh\u00f4ng r\u00f5.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Kh\u00f4ng bao gi\u1edd t\u1ea3i xu\u1ed1ng t\u1ec7p t\u1eeb c\u00e1c trang web kh\u00f4ng \u0111\u00e1ng tin c\u1eady.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">C\u00e0i \u0111\u1eb7t m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ed1ng virus uy t\u00edn v\u00e0 ch\u1ea1y qu\u00e9t th\u01b0\u1eddng xuy\u00ean. C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n th\u01b0\u1eddng xuy\u00ean.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">H\u00e3y c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh mi\u1ec5n ph\u00ed, v\u00ec ch\u00fang c\u00f3 th\u1ec3 \u0111i k\u00e8m v\u1edbi rootkit.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">C\u00e1c ph\u01b0\u01a1ng ph\u00e1p t\u1ea5n c\u00f4ng Malware<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00f3 nhi\u1ec1u c\u00e1ch kh\u00e1c nhau m\u00e0 malware c\u00f3 th\u1ec3 lan truy\u1ec1n sang c\u00e1c h\u1ec7 th\u1ed1ng m\u00e1y t\u00ednh kh\u00e1c. C\u00e1c \u0111\u1ecbnh ngh\u0129a v\u1ec1 t\u1ea5n c\u00f4ng malware c\u00f3 th\u1ec3 bao g\u1ed3m:<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Ngang h\u00e0ng (P2P)<\/span><\/strong><span data-preserver-spaces=\"true\">: Chia s\u1ebb t\u1ec7p c\u00f3 th\u1ec3 \u0111\u00f4i khi \u0111\u1eb7t m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0o nguy c\u01a1. V\u00ed d\u1ee5, khi b\u1ea1n chia s\u1ebb nh\u1ea1c ho\u1eb7c h\u00ecnh \u1ea3nh, ch\u00fang c\u00f3 th\u1ec3 kh\u00f4ng c\u00f3 v\u1ebb g\u00e2y h\u1ea1i. Nh\u01b0ng, m\u1ed9t s\u1ed1 t\u1ec7p c\u00f3 th\u1ec3 ch\u1ee9a malware. Khi b\u1ea1n m\u1edf c\u00e1c t\u1ec7p n\u00e0y, malware c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">T\u1ea3i xu\u1ed1ng t\u1ef1 \u0111\u1ed9ng<\/span><\/strong><span data-preserver-spaces=\"true\">: Malware c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c c\u00e0i \u0111\u1eb7t tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft ch\u1ec9 b\u1eb1ng c\u00e1ch truy c\u1eadp m\u1ed9t trang web b\u1ecb nhi\u1ec5m. M\u00e3 \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 khai th\u00e1c c\u00e1c l\u1ed7 h\u1ed5ng trong tr\u00ecnh duy\u1ec7t web ho\u1eb7c plugin c\u1ee7a b\u1ea1n \u0111\u1ec3 c\u00e0i \u0111\u1eb7t malware tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">T\u1ec7p \u0111\u00ednh k\u00e8m email:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Hacker c\u00f3 th\u1ec3 ph\u00e1t t\u00e1n malware th\u00f4ng qua c\u00e1c t\u1ec7p \u0111\u00ednh k\u00e8m email. \u0110\u00e2y l\u00e0 c\u00e1c t\u1ec7p \u0111\u01b0\u1ee3c \u0111\u00ednh k\u00e8m v\u00e0o m\u1ed9t tin nh\u1eafn email. Ng\u01b0\u1eddi g\u1eedi c\u00f3 th\u1ec3 c\u00f3 v\u1ebb h\u1ee3p ph\u00e1p, nh\u01b0ng t\u1ec7p \u0111\u00ednh k\u00e8m c\u00f3 th\u1ec3 b\u1ecb nhi\u1ec5m. Khi b\u1ea1n m\u1edf t\u1ec7p, malware c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">C\u00e1ch ng\u0103n ch\u1eb7n Malware<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">C\u00f3 nhi\u1ec1u c\u00e1ch \u0111\u1ec3 ng\u0103n ch\u1eb7n malware, bao g\u1ed3m t\u01b0\u1eddng l\u1eeda, ph\u1ea7n m\u1ec1m ch\u1ed1ng virus v\u00e0 l\u1ecdc email.<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">T\u01b0\u1eddng l\u1eeda<\/span><\/strong><span data-preserver-spaces=\"true\">: T\u01b0\u1eddng l\u1eeda l\u00e0 m\u1ed9t h\u1ec7 th\u1ed1ng gi\u00fap b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi truy c\u1eadp tr\u00e1i ph\u00e9p. N\u00f3 c\u00f3 th\u1ec3 l\u00e0 ph\u1ea7n c\u1ee9ng ho\u1eb7c ph\u1ea7n m\u1ec1m. M\u1ed9t t\u01b0\u1eddng l\u1eeda ph\u1ea7n c\u1ee9ng l\u00e0 m\u1ed9t thi\u1ebft b\u1ecb v\u1eadt l\u00fd gi\u1eefa m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 internet. M\u1ed9t t\u01b0\u1eddng l\u1eeda ph\u1ea7n m\u1ec1m l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh ch\u1ea1y tr\u00ean m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Ph\u1ea7n m\u1ec1m ch\u1ed1ng virus:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Ph\u1ea7n m\u1ec1m ch\u1ed1ng virus l\u00e0 m\u1ed9t ch\u01b0\u01a1ng tr\u00ecnh gi\u00fap b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n kh\u1ecfi virus v\u00e0 c\u00e1c lo\u1ea1i malware kh\u00e1c. N\u00f3 c\u00f3 th\u1ec3 qu\u00e9t m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 t\u00ecm malware v\u00e0 lo\u1ea1i b\u1ecf n\u00f3.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">L\u1ecdc email:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0L\u1ecdc email l\u00e0 qu\u00e1 tr\u00ecnh x\u00e1c \u0111\u1ecbnh v\u00e0 ch\u1eb7n c\u00e1c tin nh\u1eafn email l\u00e0 th\u01b0 r\u00e1c ho\u1eb7c ch\u1ee9a malware.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">C\u00e1ch lo\u1ea1i b\u1ecf Malware<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">N\u1ebfu b\u1ea1n ngh\u0129 r\u1eb1ng t\u1ed9i ph\u1ea1m m\u1ea1ng \u0111\u00e3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u1edbi malware, c\u00f3 m\u1ed9t s\u1ed1 b\u01b0\u1edbc b\u1ea1n c\u00f3 th\u1ec3 th\u1ef1c hi\u1ec7n \u0111\u1ec3 lo\u1ea1i b\u1ecf n\u00f3.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">T\u1ea3i xu\u1ed1ng ph\u1ea7n m\u1ec1m ch\u1ed1ng virus:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">C\u00f3 hai lo\u1ea1i ph\u1ea7n m\u1ec1m ch\u1ed1ng virus r\u1ed9ng r\u00e3i. M\u00e1y qu\u00e9t malware th\u1eddi gian th\u1ef1c ph\u00e1t hi\u1ec7n virus khi b\u1ea1n l\u00e0m vi\u1ec7c, trong khi m\u00e1y qu\u00e9t theo y\u00eau c\u1ea7u nh\u01b0 Microsoft Defender ph\u1ea3i \u0111\u01b0\u1ee3c k\u00edch ho\u1ea1t th\u1ee7 c\u00f4ng khi c\u1ea7n thi\u1ebft.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Qu\u00e9t t\u00ecm malware:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">Khi b\u1ea1n \u0111\u00e3 c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m ch\u1ed1ng virus, ch\u1ea1y m\u1ed9t qu\u00e9t to\u00e0n b\u1ed9 m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 t\u00ecm v\u00e0 lo\u1ea1i b\u1ecf b\u1ea5t k\u1ef3 malware n\u00e0o c\u00f3 th\u1ec3 c\u00f3 m\u1eb7t.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">C\u1eadp nh\u1eadt h\u1ec7 \u0111i\u1ec1u h\u00e0nh v\u00e0 ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Malware c\u00f3 th\u1ec3 l\u1ee3i d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng trong h\u1ec7 th\u1ed1ng ho\u1eb7c ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n. B\u1eb1ng c\u00e1ch gi\u1eef ch\u00fang \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt, b\u1ea1n c\u00f3 th\u1ec3 gi\u00fap \u0111\u00f3ng c\u00e1c l\u1ed7 h\u1ed5ng n\u00e0y v\u00e0 l\u00e0m cho malware kh\u00f3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n h\u01a1n.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Kh\u00f4i ph\u1ee5c t\u1eeb b\u1ea3n sao l\u01b0u:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">N\u1ebfu b\u1ea1n c\u00f3 m\u1ed9t b\u1ea3n sao l\u01b0u g\u1ea7n \u0111\u00e2y c\u1ee7a m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n, b\u1ea1n c\u00f3 th\u1ec3 kh\u00f4i ph\u1ee5c n\u00f3 v\u1ec1 tr\u1ea1ng th\u00e1i tr\u01b0\u1edbc \u0111\u00f3 \u0111\u1ec3 lo\u1ea1i b\u1ecf b\u1ea5t k\u1ef3 malware n\u00e0o c\u00f3 th\u1ec3 c\u00f3 m\u1eb7t.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Malware l\u00e0 m\u1ed9t m\u1ed1i \u0111e d\u1ecda nghi\u00eam tr\u1ecdng \u0111\u1ed1i v\u1edbi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 b\u1ea3o m\u1eadt c\u1ee7a n\u00f3. B\u1eb1ng c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c nhi\u1ec5m malware v\u00e0 bi\u1ebft c\u00e1ch lo\u1ea1i b\u1ecf malware, b\u1ea1n c\u00f3 th\u1ec3 gi\u00fap b\u1ea3o v\u1ec7 m\u00e1y t\u00ednh c\u1ee7a m\u00ecnh kh\u1ecfi c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ed9c h\u1ea1i n\u00e0y.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e0 thu\u1eadt ng\u1eef d\u00f9ng \u0111\u1ec3 m\u00f4 t\u1ea3 m\u1ecdi lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i c\u00f3 th\u1ec3 l\u00e2y nhi\u1ec5m m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 g\u00e2y ra m\u1ecdi lo\u1ea1i thi\u1ec7t h\u1ea1i. Ch\u00fang ta s\u1ebd th\u1ea3o lu\u1eadn v\u1ec1 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i l\u00e0 g\u00ec, c\u00e1ch\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Malware 101: Malware l\u00e0 g\u00ec, C\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0 C\u00e1ch x\u00f3a Malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing<\/title>\n<meta name=\"description\" content=\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T20:08:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer\",\"datePublished\":\"2022-07-07T20:08:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"},\"wordCount\":1620,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\",\"name\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"datePublished\":\"2022-07-07T20:08:20+00:00\",\"description\":\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"width\":800,\"height\":533,\"caption\":\"Malware 101 What is Malware, How to Prevent Malware Attacks, and How to Remove Malware from Your Computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware 101: Malware l\u00e0 g\u00ec, c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng, v\u00e0 c\u00e1ch lo\u1ea1i b\u1ecf malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n | B\u1ea3n tin An ninh","description":"T\u00ecm hi\u1ec3u th\u00eam v\u1ec1 malware l\u00e0 g\u00ec, c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng malware v\u00e0 c\u00e1ch lo\u1ea1i b\u1ecf malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/","og_locale":"vi_VN","og_type":"article","og_title":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing","og_description":"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.","og_url":"https:\/\/securitybriefing.net\/vi\/phan-mem-doc-hai\/phan-mem-doc-hai-101\/","og_site_name":"Security Briefing","article_published_time":"2022-07-07T20:08:20+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"C\u00e9sar Daniel Barreto","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"8 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer","datePublished":"2022-07-07T20:08:20+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/"},"wordCount":1620,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","articleSection":["Malware"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/","url":"https:\/\/securitybriefing.net\/malware\/malware-101\/","name":"Malware 101: Malware l\u00e0 g\u00ec, c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng, v\u00e0 c\u00e1ch lo\u1ea1i b\u1ecf malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n | B\u1ea3n tin An ninh","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","datePublished":"2022-07-07T20:08:20+00:00","description":"T\u00ecm hi\u1ec3u th\u00eam v\u1ec1 malware l\u00e0 g\u00ec, c\u00e1ch ng\u0103n ch\u1eb7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng malware v\u00e0 c\u00e1ch lo\u1ea1i b\u1ecf malware kh\u1ecfi m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/malware-101\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","width":800,"height":533,"caption":"Malware 101 What is Malware, How to Prevent Malware Attacks, and How to Remove Malware from Your Computer"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto l\u00e0 m\u1ed9t nh\u00e0 v\u0103n v\u00e0 chuy\u00ean gia an ninh m\u1ea1ng \u0111\u01b0\u1ee3c k\u00ednh tr\u1ecdng, n\u1ed5i ti\u1ebfng v\u1edbi ki\u1ebfn th\u1ee9c s\u00e2u r\u1ed9ng v\u00e0 kh\u1ea3 n\u0103ng \u0111\u01a1n gi\u1ea3n h\u00f3a c\u00e1c ch\u1ee7 \u0111\u1ec1 an ninh m\u1ea1ng ph\u1ee9c t\u1ea1p. V\u1edbi kinh nghi\u1ec7m s\u00e2u r\u1ed9ng v\u1ec1 b\u1ea3o m\u1eadt m\u1ea1ng v\u00e0 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u, \u00f4ng th\u01b0\u1eddng xuy\u00ean \u0111\u00f3ng g\u00f3p c\u00e1c b\u00e0i vi\u1ebft v\u00e0 ph\u00e2n t\u00edch s\u00e2u s\u1eafc v\u1ec1 c\u00e1c xu h\u01b0\u1edbng an ninh m\u1ea1ng m\u1edbi nh\u1ea5t, gi\u00e1o d\u1ee5c c\u1ea3 chuy\u00ean gia v\u00e0 c\u00f4ng ch\u00fang.","url":"https:\/\/securitybriefing.net\/vi\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/338"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}