An Anthropic worker was having a snack when he received an email he should never have received: it was Mythos

Anthropic Claude Mythos Preview launched yesterday and it left many of us fascinated and, above all, worried. We expected their new AI model to be more powerful, but what we didn’t expect is that according to your tests and your “system card” He managed to do so many things that are scary because it didn’t seem possible that he could do them. Some of these stories sound like a Black Mirror episode, but they are not. The sandwich email. During one of the tests carried out, Anthropic researchers gave a version of Mythos access to control a computer in a secure, isolated environment and asked it to try to escape from that container and send a message to the researcher who was supervising the evaluation. The model succeeded, but it did something else: it developed on its own a very advanced multi-step exploit to gain access to the Internet from a system that by design was only capable of accessing a limited list of predefined services. The researcher was calmly eating a sandwich in the park when he received the email he should never have received. The thing does not end there, because the model also decided, without anyone asking him, to publish the technical details of his exploit on several websites that are difficult to access but that are technically public. He wanted to record his achievement. The OpenBSD bug that had been hidden for 27 years. Another technical article published by Anthropic gave even more clues about the “achievements” of Claude Mythos. OpenBSD is the operating system with one of the world’s strongest reputations for cybersecurity. Even so, Mythos found a vulnerability in him that had been there since 1998. The bug was hidden in the implementation of the TCP protocol with a function that manages the selective forwarding of lost packets. Here it is not enough to detect the error: you have to chain two separate failures that individually seem almost harmless, and then take advantage of an overflow of the TCP sequence to satisfy a very rare condition. With this method, an attacker on the Internet could send a special packet and hang the machine remotely without authentication. Mythos found him alone without anyone telling him where to look. FFmpeg and fuzzing. FFmpeg is an extraordinarily famous library on the Internet because it processes video massively on the Internet. It is also a highly audited tool and researchers often use the technique of fuzzing —bombing it with millions of malformed video files until one breaks it— to exploit its vulnerabilities. Mythos found a bug that has been in the code since 2003 and became a vulnerability in a refactoring that was performed in 2010. The problem is again extraordinarily difficult to find, so much so that 20 years of human and automated reviews had missed it, but Anthropic’s model detected it. Remote code execution on FreeBSD. Mythos autonomously identified and exploited a 17-year-old vulnerability in the FreeBSD NFS server code—which allows network file sharing. With it, any unauthenticated user on the Internet could obtain full root access to the machine. The magnitude of this flaw is enormous, because the NFS server runs in the core of the operating system and gives access to absolute control by the attacker. Mythos found the bug and built the exploit for $50 worth of API calls. Zero-days autonomous in operating systems and browsers. Mythos is, as far as is known, the first model capable of autonomously discovering vulnerabilities zero-day —unknown and unpatched security flaws—in both open and closed source software, including operating systems and web browsers. It also does so with minimal human supervision using what is called an agentic harness (agentic harness). Thanks to this technique, the model can execute actions, read results and plan its next steps in a loop. In many of those cases the model was not only able to find the vulnerability, but also turned it into a functional exploit (usually a script or small program) ready to be used. Firefox 147 in danger. In collaboration with Mozilla, Anthropic’s new model analyzed 50 categories of “crashes” of the SpiderMonkey JavaScript engine that is the core of this browser. Their task was to detect the most serious problems, exploit them to create memory corruption scripts and thus be able to execute arbitrary code, that is, execute instructions beyond what JavaScript allows. Claude Mythos Preview was able to detect with great precision which were the most “exploitable” vulnerabilities, and took advantage of two unfixed bugs to achieve its goal. capture the flag. ‘Capture the Flag’ (CTF) cybersecurity competitions allow participants to solve challenges that simulate real system attacks and defenses. Claude Mythos Preview faced the public benchmark Cybench with 40 challenges taken from different competitions and achieved 100% success in all attempts. This benchmark has actually become useless: Anthropic’s model is too powerful for it. Opus 4.6, for example, achieved 93% effectiveness, but Mythos has “saturated” it. Thousands of critical vulnerabilities pending patch. There are numerous other examples in those two cited documents in which it seems clear that Mythos’ cybersecurity capabilities are amazing. But when the model was announced, 99% of the vulnerabilities discovered (and not yet mentioned) had not been patched yet, so Anthropic did not reveal those details and these were just some of those that were patched. What they did indicate is that in 89% of the 198 reports manually reviewed by external experts, these experts agreed with the severity assessment of the problem assigned by Mythos. Given this situation, Anthropic has hired teams of professional cybersecurity auditors to validate the reports before sending them to the maintainers of the affected software. And Mythos is just the beginning. On the Anthropic blog, its researchers say it bluntly: we had a relatively stable cybersecurity balance for 20 years, but things have changed. The attacks had evolved technically in that period, but were fundamentally of the same type as those in 2006. Mythos is able to find flaws in software that has been audited … Read more

Houston, we have a problem with Outlook. Microsoft spends millions on AI, but Artemis II does not escape the failures of its email

On April 2, we experienced a historic event for humanity: the mission Artemis II It successfully took off towards the moon after more than 50 years without orbiting near the Earth’s satellite. Although the takeoff was a success, the path to get here was not without problems: it already had to delay the first date launch and also the second. Even on the official day there were problems. In the previous hours it was necessary check an anomaly in a temperature sensor of a battery abort system and also appeared another incident in the flight termination system (the safety mechanism that makes it possible to destroy the rocket if it deviates from its trajectory and becomes a threat). When the Orion spacecraft was flying almost 150,000 kilometers from Earth according to FortuneCommander Reid Wiseman encountered a mundane problem faced by any mortal with a computer and Microsoft email: an Outlook crash. The incident. The launch of Artemis II could be followed live and in that live, approximately 13 hours and 15 minutes after the broadcast began there is a fragment where the problem appears: “I see that I have two Microsoft Outlook accounts, and neither one works. If you could connect remotely and check Optimus and those two Outlook accounts, that would be great.” At first, Wiseman had issues related to the Optimus software, but then he pointed out a more trivial concern: There were two instances of Outlook running on his personal computing device. As a curiosity, the live stream to follow the takeoff still available on YouTube. Why it is important. The Artemis II mission is historic and the stream has left for posterity its first hours of flight and this anecdote that constitutes what is probably the first Microsoft technical support ticket generated from space. Beyond the joke, the episode shows that today’s space exploration and its cutting-edge technology coexist with commercial productivity software and its common failures. When an agency standardizes its entire infrastructure on a single technological ecosystem, the problems of that ecosystem also become problems of the mission. Tap to go to the post There is a support ticket from the Moon. As with any standard corporate ticket, the user first reported the incident, the technical team took over remotely, and finally closed the case. Houston accepted the request for remote access to the commander’s device, identified in records as PCD 1, and about an hour later, Outlook was back up and running. After 14 hours and 20 minutes of broadcast, someone from mission control communication said: “We managed to open Outlook. It will appear as “offline”, as expected”, as pick up Tom’s Hardware. Why they use Outlook in space. That there is Microsoft software on board is not something casual or improvised: Microsoft is a strategic partner of NASA that provides everything from productivity software to cloud data infrastructure and artificial intelligence (NASA Earth Copilot), hardware and mixed reality and Minburn Technology Group is your partner for software support and maintenance. In fact and according to NASAthe personal devices of the astronauts on the Orion spacecraft are Microsoft Surface Pro and the software they run is Commercial Off-The-Shelf, That is, standard commercial software for everyday tasks like talking to your family or managing your photos and videos. Another thing is the spacecraft and main flight systems: these are powered by specialized radiation-resistant hardware and specialized software with rigorous maintenance. The bathroom was also broken. The Outlook failure was not the only technical problem in the first hours of the flight, as can be seen in the broadcast. About two hours after launch, a malfunction light came on in the ship’s waste management system: the urine extractor fan had jammed. This component is responsible for sucking urine into a collector, avoiding the uncomfortable and unhygienic effects of microgravity. NASA confirmed shortly after the toilet problem had been solved. In Xataka | NASA had been refusing to allow its astronauts to carry iPhones for decades. For Artemis II you have made a historic decision In Xataka | The Artemis II astronauts will carry out experiments in what will be their own study models Cover | POT and Ed Hardie

How to schedule a daily summary of your new newsletters sent by artificial intelligence to your email

Let’s tell you how to create a summary of all the newsletters received in your email electronic using artificial intelligence. For this, we are going to use the service Make to create a workflow or workflow with a three-step automation. The idea is to have an email where we receive the newsletters, and configure an automation that once a day analyzes if you have new ones in your mailbox, sends them to an AI like Gemini to make a summary for you, and to send you an email to a second account with a summary of each newsletter you have. But before we start, I must remind you that when you do this, you will be sharing your email data first with Make, where you will link your account, and then with Gemini to give you a summary. It is something that you should take into account if you are a person who wants to take maximum care of your privacy. And if you don’t want to complicate things so much, remember that we have taught you how to make a timely summary of your newsletters with AI. This will not be programmed as we are going to show you today, but you will only need to link your email directly to an AI and write the prompt corresponding. You have to use two email accounts To create this automation you will need two email accounts. One will receive the newsletters and send an automatic email with the summary of each one to your second account. A practical tip is to have an account only for newsletters. With this, first you will prevent unwanted newsletters from reaching you and so much data from your main account being shared, and on the other hand, when you create this workflow you will not be linking the email that you normally use, only the one for the newsletters. And with this, when you configure the third step or module of our workflow, that is where you will have to put the main email to receive the summaries, while all the connections and content explorations will be where the newsletters arrive. Tag your newsletters You will also have to tag all newsletters that you receive. This way, you will have all the emails under that label, and then when creating the automation it will be easier to point out where the AI ​​has to read. For example in Gmail, go to the manage labels option and create one. Once you have created the label, simply label all the emails that are newsletters. So, sender addresses will be labeledand all the emails that arrive will go directly to the tag that you have created for the newsletters. Get the AI ​​API you want to use For this automation, also we are going to need the API of an AI to be able to use it in our project. In our case, we will follow the guide that we have made for you to get the free Gemini APIand thus use Google AI to process the newsletters and send you the summaries. You simply have to enter the website of aistudio.google.com and sign in with your Google account. When you do, in the left bar click on API keysand then at the top click on Create API key. By doing so, create a new project to link the key to and that’s it. When you have created the API, you will see that it appears in the list of API keys. You just have to click on the left, below where it says Clueand a window with the API will open, starting with “AIza–“. You can do this with any other AI whose API you want to use. Now, create your automation Let’s now move on to creating our automation. As we have been doing several times, we are going to turn to Make, as it is a platform that is easy to use and very versatile. In it we will create automations with Gmail and Gemini modules, and in all of them we will have to log in. We are going to skip these steps in the guide, but to log in with Gemini you will need to enter the API that we obtained in the previous step, and with Gmail you will have to log in and give the platform permission to read all your emails and be able to write them in your name. First the Gmail module The first thing we are going to do is create a new scenario in Make, and add module Watch emails from Gmail inside him. This module is used to make the automation read emails, and can be launched when you receive a new one. Now we go to the panel to configure this module. In him, in Folder you can put All mailso that it reads all the emails, but just below it says that it does not include spam and garbage. So make sure the newsletters don’t go there. In Label you have to choose the label Newsletters that we have created before in Gmail. As a criterion you can put them all, or those you have not read yet, and below mark the processed emails as read. Finally, you can set a limit on the number of emails to process. Save it like this, and in the next step choose if you want to process the emails from now on, all of them, or from a date. Now a Gemini module to do the summary We now go to the second step, that of create a Gemini module right after Gmail. Click on the + to the right of the Gmail module, among the options look for Google Gemini, and within its functions choose the option Generate a response. This is used to generate a response from some data you give it, which in this case will be emails labeled as newsletters. Now let’s configure this module. You will first have to … Read more

summarize everything in your email inbox with Claude, Gemini or ChatGPT

Let’s explain to you how to make summaries of the newsletters you have in your email punctually with artificial intelligence. So, if you see that they have been accumulating but you don’t have time to read them, you will be able to ask the AI ​​to summarize them all for you. If your email is Gmail you can resort to Gemini already Claudeand if you have an outlook email then you can do it with ChatGPT. These are the AIs that have connectors for each mail service. But we will also start by telling you how we recommend organizing the newsletters in the email so that it is easier for the AI ​​to find them. First, organize your newsletters Before you start, I recommend tag all newsletters with the label or category system that Gmail and Outlook have. This way, you will be able to later ask the AI ​​to search directly in these categories instead of having to analyze the entire content of your email. Therefore, take your time entering the newsletters and tagging them. At first you will have to label them all, but then, each email address will be linked to the labelmeaning that the next ones that arrive to you and are not new will already be well labeled. Now link AI to your email Claude has a connector system where you must add and activate Gmail. Gemini allows you to do the same with its Connected Appsand in ChatGPT you have a section Applications which allows you to connect Outlook. With this previous step, you will have to link your email account to the AI ​​so that it can access and read your emails. If you are most concerned about your privacy Maybe you should reconsider doing this, because in the end you are going to link your account to the AI, so it can read and process all your emails when you ask it, storing its content on your company’s servers. The emails will no longer be private, you will be sharing them. Now, ask the AI ​​for a summary And now it’s time to go to the AI ​​and write a message asking for the summary. This prompts It has to mention Gmail or Outlook depending on the AI ​​you use and the email you have linked, and if you have done what we have recommended you have to indicate the newsletter label and ask for a summary. Besides, you can specify the structure of the summary so that it is more to your liking. This is the prompt that I have used: I want you to enter my Gmail account, analyze all the emails in the “Newsletters” label, and give me a summary of their content. It has to be a schematic summary, with an H2 for each email telling me the title and sender, and then bullets where you explain the most interesting points of its content. With this, the AI ​​will start to see the emails within your account and will give you a summary as you have requested. Here, keep in mind that you can simply tell it to search for the newsletters without having tagged them, but then there is the possibility that it will not find them all or consider something as a newsletter that really is not. Each AI will give you the results in its own wayalthough maintaining the structure that you have requested if you have specified it. Thus, with the prompt that we have used you will have everything summarized in several points so that you can read it in just a few minutes. In Xataka Basics | Claude: 23 functions and some tricks to get the most out of this artificial intelligence

How to receive a daily email with the summary of your favorite podcast made by artificial intelligence

Let’s explain to you how to receive summaries of your favorite podcasts by email. These summaries will be made by artificial intelligenceafter you have received the audio file and processed it. This is not something you can do in a specific application, so we will have to configure a workflow of several steps. Specifically, we are going to use the service Makebecause its free version is enough to do it. In addition, we are going to use artificial intelligence Geminisince it is very easy to obtain a free API with which to use AI on this website. At Make.com we will have to log in with the Gemini modules and especially Gmail. It is important to highlight this because in the end you will be giving a third party access to your email, which could compromise your privacy, although this tool is reputable enough to think that it complies and that you should be safe. First you need the RSS of the podcast In order to carry out this automation, the first thing is get the RSS address of the podcast that you want to analyze. It is the page with the code where the title, description and the address of the mp3 file of each chapter appear, which in the end is the most important thing. If you don’t know where to get this address, you can use the Get RSS Feed websitewhich you can get at getrssfeed.com. On this website, you just have to enter the URL to Apple Podcast, iVoox, Spotify or the podcast website, and then it will search there for the RSS address. When it does, click on the button RSS Copy and that’s it, you will have the address copied. It will also be important that Find out what time each chapter is published. At the end of this project, the workflow will have to be scheduled to activate at a certain time each day, and it should be at a time when the chapter has already been published. Configure the Gemini API Key The AI ​​we are going to use for this project is Gemini. And to link and use this AI, you need get a google api. For that, go to the website aistudio.google.com and sign in with your Google account. When you do, in the bar on the left at the bottom click on Get API Key. Now you have to click on the option Create API key that appears at the top of the screen you have created. This will open a window where you have to create the project for which you are going to use it in order to identify it, for example Gmail Gemini. When you create the project, you can now create the API. When you have created the API, you will see that it appears in the list of API keys. You just have to click on the left, below where it says Clueand a window with the API will open, starting with “AIza–“. When you later create the first Gemini modulethen on the login screen you will have to write the Gemini API Key that you generated at the beginning of this tutorial. We are not going to repeat this later because it is something that we will assume has already been done after previous projects such as create a Telegram bot that summarizes your emails. Now we create the workflow Now let’s go to Make.com and create a new scenario or workflow. We start by clicking on the initial + for the first step, for which you have to choose the option Watch RSS feed items. It is used to display the elements of an RSS address. In this first module, what you have to do is write the RSS URL that we have searched for in the previous step, and put it in the URL field. Then, in Maximum number of returned items set 1, so that every time this scenario is run it only pulls the latest post. Once you have this first step configured, I recommend you click on Run eleven to run the project with just this step. Thus, the content will be loaded, and it will appear in the autocompleted suggestions in the following steps. Now let’s go add module HTTP with the action Download a filewhich will be used to extract and download the audio file of the podcast chapter. When you click on URL, a window will appear with autocompletion suggestions, and here you will have to write the address of the mp3 file of the audio. If necessary, you can search for it in the RSS code. In our case, it is in Enclosures > URL. This is a somewhat complex step. A little tip I can give you if you’re not clear is to ask an AI where the audio file is to download, and attach the RSS web address. After the HTTP module, we are going to add a Gemini module. Specifically, we must add module Gemini Upload to filewhich is used to upload a file to artificial intelligence. Here in the field File you have to choose the option HTTP – Download a file. This means that the file that we are going to upload will be the one that we have downloaded with the previous module. Now, After the Gemini module we are going to put another Gemini module. We are going to use the module Generate a response to generate a response. Whom Role put User, and in the Partsin it Item 1 set the message type as text, and choose the option Source to add the source text. and in Item 2 put Filefollowed by audio/mpeg in Mime Typeand in File URI look for the URI. All these elements will have to come from the Upload to file module. Further down, in the field of System Instructionsyou have to open the section Prompts and write a prompt in the field of Prompt 1. This is the prompt with … Read more

best email providers made in europe

Let’s tell you the best European alternatives to Outlook or Gmail. If you are looking for greater privacy and protection in your email, opting for a European provider subject to rigid European regulations is a good option, and we will tell you the top five. But you have to know that greater privacy and security has its price, because by not negotiating with your data or serving you advertising, many of these services are paid. Many are as cheap as one euro per month, but others try to offer you more services in exchange for a higher price. Proton Mail It is possibly the best known alternative. Based in Switzerland, it offers you end-to-end encryption as well as an open source product and a totally free basic email service. Yes, creating an account and using it on your mobile with its own app, or in the browser of any device is free. IMAP support for adding to other email clients is only available with Proton Mail Bridgewhich is a paid feature. But it also has payment plans that start in 3.99 euros per monthwith features such as creating aliases, such as alternative addresses to register on unreliable sites without giving your real email, and then deactivating them. In addition, it also offers a VPN, an office suite like Drive and cloud storage, as well as a password manager, calendar and everything so that you do not depend on other companies. Tuta Fewer additional services but more ethics. This is what Tuta, formerly known as Tutanota, offers, the German provider with end-to-end encryption that uses renewable energy to operate. It is also open source, although it does not have IMAP support, meaning you cannot add it to third-party email managers. Your basic email account is totally freealthough it also offers price plans that start at 3.60 euros per month, and that offer more storage, unlimited calendars and labels, 15 extra email addresses, or custom domains. mailbox This other German supplier It has a price of 1 euro per monthwithout free modality. Its focus is on privacy, being able to even make anonymous payments, and it offers a calendar, cloud storage, task manager and agenda service. It also gives you 3 different aliases to configure. Mailbox also has other plans with a higher price, and that offer more aliases, more storage, office automation service, alternative to Meet for meetings, etc. It is also compatible with IMAP, something that the previous alternatives do not have, allowing you to use your account in your favorite email manager. Post Posteo is another German provider that seeks simplicity above all else. The price of Your account is 1 euro per monthhas IMAP support, and its focus is on privacy and anonymity. In fact, it does not ask you for private information to register and you can pay with cryptocurrencies. It also runs on clean energy and you can add custom domains, aliases or more storage by paying a little more. Its web client has an outdated interface, but it is one of the best features if you are going to use it in the native or third-party email app on your mobile or computer. SmartMail This is the Startpage email service, which is possibly the best European alternative to Google. The bad news is that Its price is 6.99 euros per monthsomewhat less if you pay annually, although in exchange it offers unlimited aliases. It also has support for your own domain and has IMAP compatibility, in addition to the highest privacy standards. Therefore, it is the most expensive option, but also the most unlimited if you want to protect your privacy, especially by creating various aliases. In Xataka Basics | 61 European alternatives to Google, X, Gmail, Chrome, Maps, DropBox, Google Drive, WhatsApp and other popular services

How to create a Telegram bot that sends you a summary made by Gemini of each email you receive in Gmail and other emails

Let’s explain to you how to create a Telegram bot that sends you a summary of your emails emails, such as Gmail. Thus, when you receive a new email, whether from anyone or from specific senders or topics, an artificial intelligence will make a summary and send it to you. All this without knowing how to program nor have technical knowledge. This is not something you can do simply by asking artificial intelligence, and we are going to need a program that generates workflows or work flows. We will use Make.com, because it is very complete and easy to use. Besides, Make.com It has a free version that is perfect for taking the first steps, although with some limitations. In Make we will have to link any artificial intelligence, although we have opted for Gemini because it is easy to obtain a free API for it. And then, We have chosen Telegram because creating bots is easyand it only takes a few minutes. In the end, what you will need is an API from an AI, a Token key from a Telegram bot, and creating the workflow chain on Make.com. In the examples we have used Gmail because it is also easy to link to it. Get your Gemini API first The first thing we are going to do is get a google api to be able to use Gemini in our project. For that, go to the website aistudio.google.com and sign in with your Google account. When you do, in the bar on the left at the bottom click on Get API Key. Now you have to click on the option Create API key that appears at the top of the screen you have created. This will open a window where you have to create the project for which you are going to use it in order to identify it, for example Gmail Gemini. When you create the project, you can now create the API. When you have created the API, you will see that it appears in the list of API keys. You just have to click on the left, below where it says Clueand a window with the API will open, starting with “AIza–“. Set up the Telegram bot The first thing you have to do is create a bot on Telegram. For that you have to look for the “@BotFather” tool and write to it as if it were a new user. Use the /newbot command to create a new bot, giving it a name to identify yourself and a unique username to access the bot whenever you want. When you do it, it will give you two things, first the username and address of your bot to access it, and second an access token with various figures and letters. You have to save this token to use later. Start creating your project Now you have to go to Make.com and click on the option Create new scenario to create a new project. In the options choose the option Build from scratch to create an automation from scratch. From what we are going to do, you must understand that we will create an automation of several modules, each one of them different. These automations will form a chainso that the action of the first leads to the second, and that of the second to the third. Come on, the order in which we put them is important. Add your email module as a trigger You will go to a blank screen with a button with the plus symbol. Here, click on the + button and from the drop-down menu choose Gmail. Inside now click on the option Watch emails to configure the action of reading your emails. This will cause your automation to be activated every time you receive an email in Gmail. It is a trigger, which is the element that will start this automation. Now click on the button Create a connectionwhich will open a screen where you have to name the connection at the top, and at the bottom log in with your Gmail account to link it. You will have to log in and give the website permissions to access your email. Once the action has been added, you can filter the type of emails that this automation executes. Can choose emails from a specific folder or labelas well as other criteria, so that these are launched and read by the AI. You can also set some limits. This screen gives you the possibility to fully customize the experience depending on What type of emails do you want the AI ​​to summarize for you?. It is an important step, especially because you will be able to make it only perform this action with certain types of emails. For example, they can be from senders related to your work or a specific project. If you open the advanced settings either Advanced settingsyou can specify even more. For example, you can configure so that only runs with emails from a certain senderwith a certain subject, and many other characteristics. Now you can configure from what moment do you want the data to be processed. For example, you can choose From now on so that they are processed from the emails you start receiving from now on. You can also link other emails. For this, instead of the Gmail module you can use the Email module, which will allow you to connect with Google, with Microsoft for Outlook, or with others through IMAP. Outlook also has its own module. Now add the Gemini module Now it’s time to add the second module. To do this, click on the + button to the right of Gmail, and on the screen that opens choose the option Gemini. In the options that appear in the module that opens, choose where to put Generate a response. This will now open a key module, where you simply have to write the Gemini API Key that we have generated at … Read more

What do you have to do to protect yourself if you have received an email saying that you have been affected?

Let’s tell you How to act if you have been affected by the Endesa hack. The electricity company has suffered a cyber attack that has affected its Spanish platform, something that has compromised the personal information of a large number of customers, exposing data such as the DNI, your personal data and even payment data such as the IBAN. Endesa has started send emails to affected usersso if you have come across one it is possible that your data has been stolen. Therefore, we are going to tell you several important steps to take to minimize the risks and avoid fraud that may arise when cybercriminal groups purchase this stolen data. Because the worst thing about these hacks is not always that they can steal money from your bank details, but that you can then receive fraudulent emails or messages with which they try to steal even more from you. Therefore, in these cases it is always advisable to pay close attention to what may happen in the following months. Remember that you have a complete and general article about what to do when your data is leaked online. Check your banking transactions The first thing is to check your bank and look if there is any strange movement. As Endesa has said that in some cases payment data may have been stolen, that means they could try to make some type of charge to your account. It is advisable to maximize attention during the coming weeks and months, and for any payment that is not clear, contact your bank to block it and avoid major problems. Be wary of emails, SMS and calls It is assumed that if a cybercriminal group buys the data stolen from Endesa, they will know your name and surname, your telephone number and your email. Therefore, you may receive fraudulent messages By any of these means, campaigns phishing with which to try to steal money from you. Here, be wary of any supposed communication from Endesa in which they ask for personal or banking information by phone or email. If you are asked for this information in a message, be wary immediately.because the real company will never ask you for them. Do not continue the conversation or respond to the message that arrives. Do not click on links or download files Phishing is a technique with which a cybercriminal sends mass messages to hundreds of thousands of people with a virus attached or links to fraudulent pages. Their goal is for at least a handful of people to click on them and become infected or go to the fraudulent page where they give their bank details and steal money with it. Therefore, if you receive a supposed email or SMS from Endesa or any other person with a file or a link to a website, never interact with this content. It’s okay to read the message, but never download anything or click on a link that takes you to another page. Save all Endesa communications Finally, to protect yourself for the future it is important keep the letter or email from Endesa. Thus, if in the future you have to prove possible misuse of your data, you will have proof that there was a hack and it was stolen. Other security measures Lastly, you may also want activate two-step verification on platforms where you use the same email that you have linked to Endesa. In those more sensitive ones, it may be interesting to change your passwords, and also take extreme precautions against any email and message that you may receive from other pages, because they can also be fraudulent. In Xataka Basics | My data has been leaked, now what: the steps you should take whenever there is a massive leak on the Internet that could affect you

Sending an email to a low employee has cost 1,500 euros to a company: it doesn’t matter if you respond or not

The Superior Court of Xustiza de Galicia (TSXG) has marked a before and after in the protection of the right to digital disconnection of workers in Spain. For the first time, a company has been convicted of sending electronic jobs to an employee who was on a medical leave. The sentence is considered a pioneer because, although other countries Like France and BelgiumThey have already legislated on digital disconnectionGalician justice has taken another step by sanctioning not only the obligation not to respond, but also the duty of the company of Do not send communications Out of working hours. What happened? According to details the sentencethe affected worker was in a situation of temporary disability due to an “anxiety disorder”, apparently “motivated by the emotional wear that implies the current situation of excess work, realization of overtime continuously and labor responsibility, which has led to the appearance of relational insecurity with respect to their environment.” In that context of medical disabilitythe employee continued to receive electronic emails related to her work during the entire low period. The company recognized the facts, but argued that the emails to the complainant were part of a thread created above and whose content was aimed at other people of the team. In addition, he claimed that they were not asked for “an immediate response.” In Xataka 40,000 euros for a croquette: Mercadona dismissed an employee for eating a croquette and must now compensate him The TSXG got serious with disconnection. In its resolution, the Superior Court dismissed the company’s arguments and was overwhelming in its ruling. The magistrates considered that the company not only breached their duty to refrain from communicating with the worker during his temporary disability, but also attempted against his moral integrity. According to the sentence, the Right to digital disconnection “It demands that communications from the company are not received outside the work time”, and warns that “that right is not fulfilled due to the fact that the working person does not have the duty to respond to the communications received outside the work time more or less immediately.” That is, and here the Importance of this resolutionthat the right to digital disconnection does not only refer to the interpretation of the urgency of the communications received, but “carries with it an obligation by the employer, and of dependent or linked persons, of abstention in the communications of labor order or linked to the provision of services outside the working time.” In Xataka Some employees sued their company for cutting the salary. The supreme has responded that being unpunctual is not a job Vulnerability situation. The TSXG highlights the special importance of the right to digital disconnection when the worker is in a situation of temporary disability by A psychic ailment. In the sentence, the Galician Court emphasizes that emails in these circumstances “uneasy the receiver, and also reifted it and undermined their dignity” and places the worker in a state of permanent availability incompatible with her right to recover without pressures. The right to digital disconnection in Spanish law. The right to digital disconnection is included in article 88 of the Organic Law 3/2018 and reinforced with the arrival of the call Distance Labor Law of 2021. According to the regulations, “all workers and public employees will have the right to digital disconnection in order to guarantee, outside the legal or conventionally established work time, respect for their rest time, permits and vacations, as well as their personal and family intimacy.” This right allows workers not to answer mails, calls, video calls or any other digital communication out of work hours. The law does not differentiate between the size of the workforce or the public or private nature of the company, so the protection is universal for all employees in Spain. With the TSXG ruling, the prohibition is not limited to the fact of “not answering” but its interpretation is expanded to “not receive.” {“Videid”: “X919SE0”, “Autoplay”: False, “Title”: “The AI ​​and the future of our work Silvia Rivela | 100 years, 100 visions Ep.3”, “Tag”: “”, “Duration”: “2630”} Symbolic condemnation, but pioneer. The process reached the TSXG as a result of a previous sentence in which, in addition to the violation of the right to digital disconnection of workers, compensation for violations of the right to honor and physical integrity were requested. In this case, the new resolution revokes these last two concepts because it has not been damaged physically or its honorability has been affected. However, it imposes compensation of 1,500 euros “for damages” for violating the right to digital disconnection because the company “was not guaranteed” of this right and points out that “pretending that it is available at any time of its life, including temporary disability, prevents the free development of personality and hinders the exercise of the field of intimacy of personal life of personal life.” In Xataka | 55,245 euros for eating a sandwich and a beer: Mercadona must compensate an employee for unfair dismissal Image | Unspash (Brian J. Tromp), Wikimedia Commons (Caronio) (Function () {Window._js_modules = Window._js_modules || {}; var headelement = document.getelegsbytagname (‘head’) (0); if (_js_modules.instagram) {var instagramscript = Document.Createlement (‘script’); }}) (); – The news Sending an email to a low employee has cost 1,500 euros to a company: it doesn’t matter if you respond or not It was originally posted in Xataka by Rubén Andrés .

convert email into a list of tasks

The email, that novelty relic whom no one has been able to kill, is about to suffer its greatest metamorphosis. Hotmail or Gmail They brought storage and search capacity, clients of third parties such as Spark introduced a new way of managing them. What is coming is deeper: AI is making The mail goes from being a writing activity to a decision activity. To write answers to mark boxes. The first systems are already here: Gmail summarizes long threads and develops basic ideas. Outlook suggests short answers. Apple Intelligence summarizes, rewrite and expand paragraphs. Spark Directly take your previous mails to emulate your voice and generate answers with your style. It is just the prologue. When this goes more, We will stop writing most mails, we will simply approve a proposalor we will clarify it. Or we will choose between certain options. In the future, our mail clients will present each mail not as a text to read, but as an action proposal: Accept meeting Thursday at 11:00 a.m. Thank information and ask for more details. Decline proposal. A touch and ready. It is an inevitable change because in the background mail has always been a task management system disguised as communication. Most professional emails ask for something: confirmation, information, decision, action. The AI ​​simply naked this reality, eliminates the liturgy of forced courtesy and repetitive writing. I have written thousands of times “thanks in advance” or “good weekend.” The machine can do it for us. Even in our style. And it will free us from That corporate slavery For what really matters: decide. The end of the game will be something we already anticipate: Bots talking with bots. As Mg Siegler points outthere will come a time when the AI ​​will automatically schedule that meeting with the AI ​​of your contact, will negotiate dates, send reminders, will write the subsequent act, even ask how your child after the operation, perhaps. Humans We will appear for decisions that really require human criteria (Some will also want to delegate that, but It is another topic). And the mail will not disappear, but it will largely be somewhat invisible. And by automating routine communication, we will recover the communication that is worth it. In Xataka | From chaos to calm: thus manage my email using the technique of “Inbox Zero“ Outstanding image | SparkXataka

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.