Latin America and Africa are a juicy caramel for car manufacturers. And the Chinese industry is already moving file

The Chinese automotive industry has launched to the ambitious adventure to conquer the world. Yes last year We were talking about tariffs And both the United States and Europe looking for trying stop the expansion of the Chinese electric carnow we talk about huge ships from the main companies bringing their cars. But China Not only is your eye on Europe. It is already moving towards Africa and Latin America. Restrictions. Apart from bringing their cars to our borders, Chinese companies are moving forms for expand your dealer network in Europeas well as They operate their own factories. To ‘skip’ tariffs and restrictions, instead of manufacturing cars in the usual way, they do so by removal kits and put. But it is evident that these tariffs imposed on the electric car have been the trigger for the export to the West to cover other territories. In fact, brands such as ByD came to rethink their international strategy in some markets, and those alternative destinations outside the traditional axis are those that have lower commercial protection and greater growth potential. Africa (the north, especially) and some Latin American countries stand out for their lower customs obstacles and local policies that encourage the industry.

Spain is the favorite caramel of hackers

Spain already has the third most attacked domain in the world, the .es. It only has a .com and .ru, a fact accompanied by reports that suggest that cybersecurity incidents 64% have increased in the country Regarding the previous year. A situation that It does not improve despite the response of Europe And that raises an immediate question: what does Spain have to be so sweet? And one more. Cofensecompany specialized in defense against phishing, has detected a increase of up to 19 times more attacks on domains. in the period between the last quarter of 2024 and the first of 2025. 99% of these attacks focused on phishing. The other 1% went to distribute different remote access Trojans. The method. The growing attacks on addresses. They use one of the simplest methods to infect a computer: email. Simulating Microsoft addresses. From these C2 servers (Command & Control) the attackers can send personalized commands to the computer. In other words: Capture the screen Register what you write Activate or deactivate the camera and microphone of the PC Access PC files Why Spain. Spain is one of the whites more attractive in the world for cybercriminals. Experts like Francisco Valencia, director of Hackrisk.io, points to several reasons for this to happen. Strong international presence of Spanish companies. Geographic position as a bridge between Europe and America (submarine cables such as Marea, Grace Hopper) Changes in the global context after Brexit and deviation of attention to countries such as the United Kingdom. They are not the only suspects. The rapid digitalization of companies after the arrival of European funds The attack radius increasedweaknesses in small and medium enterprises, and a public administration exposed to vulnerabilitiesand geopolitical interest in the country make Spain The second objective with more cyber thrames detected globally. The impact. Some of the cyber attacks received in recent weeks are making the Spanish administration itself, preventing access to the systems of some municipalities in the country, and having affected authorities such as CNMCeither national companies like Repsol and Telefónica. Recent cases. While I write these lines, Spain is mired in two cyber attacks that have left KO the systems of two municipalities. The first is that of Melillawhich adds two weeks under an attack whose authorship a Russian group has been awarded, and the second one that of a small Alicante municipality that has suffered the same fate: Villajoyosa. The answer. In May 2025, the Council of Ministers approved a package of 1,157 million euros To reinforce national cybersecurity, a budget distributed between defense, digital transformation and public function, interior and the Department of National Security. The focus is being put also in processing the transposition of the NIS2 directives and the EU Regulation Dora. In other words, force the critical sectors of the country (energy, telecommunications, health, finance …) to notify cybersecurity incidents and implement more robust risk management systems. At the moment, none of the efforts seems to be materializing in real improvements. In Xataka | How to change all our passwords according to three cybersecurity experts

They are a caramel for hackers

Use headphones With cable as a retransmission antenna. Sounds crazy, but it’s the New practice whereby the attackers can listen at a distance everything you are saying. Periscope is the new espionage system by electromagnetic radiation developed in the laboratory, in order to prove that the devices that are connected to this type of headset are vulnerable. New research has deepened this method by which the sound can be intercepted that is being broadcast through laptops and mobile computers (both Android and iPhone). The authors discovered that both phones and computers generate electromagnetic radiation When they process the sound signals. The funny thing is that, intercepting this signal, the original sound can be recovered. Cable headphones They act as antennas, so they amplify this signalinterceptable up to 15 meters. These signals are imperfect, but can be cleaned with noise and distortion by computer. A complete reconstruction of the audio was achieved with 7.44% error, making audio intelligible both by humans and artificial intelligence. What scenarios can this vulnerability be exploited? In anyone in which your device is broadcasting audio. For example, if you were in a meeting and say any confidential data, a laptop located in a range of 15 meters could intercept the signal and rebuild it later. The researchers reported the problem to Apple, Lenovo, Huawei, Vivo, Oppo and Dell, ensuring that Huawei has been one of the first to get to work to develop a solution. This vulnerability has been discovered in the laboratory, so, for the moment, it does not seem to have been tested in real scenarios at the hands of hackers. Image | Xataka mobile In Xataka | I have wireless headphones of all types. None works as well as cable

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.