Booking has been hacked. If you thought phishing was dangerous, wait until you see the follow-up phishing attacks

Basic-Fit’s hack yesterday It has not been the only relevant event in terms of cybersecurity in recent days. Last weekend several Booking users received emails with less than reassuring content. In these messages, the company reported that a cyber attacker could have had access to the information on its reservations. On Monday Booking confirmed that the security flaw existedbut has not given too many details about the problem. Your name and reservations were leaked, your card details were not. The information accessed by the attacker(s) includes names, email addresses, phone numbers and booking details. However, Booking has highlighted that the users’ financial data have not been part of this unauthorized access and they have not accessed the users’ home addresses either. To try to mitigate possible problems, the company forced reset of backup PINs of all affected reserves, both active and past. Too many unknowns. Although it has confirmed the incident, Booking has not provided clarification on it and it is not clear if its systems were hacked directly or the problem occurred through other means. There are also no details on the number of users affected nor is it a problem of real scope or limited to certain countries or regions. Booking has indicated that it will inform affected users individually without giving figures. According to its own website, Booking manages hundreds of millions of reservations a year and it is estimated which have about 135 million users of their mobile app. Phishing attacks have already started. These types of data thefts are exploited for massive phishing attacks, and it appears that such attacks have already begun. At least one user indicated on Reddit that he had received a suspicious message on WhatsApp with details of his reservation and personal information. That seems to confirm that the attackers were already using the stolen data to deceive customers before the public announcement occurred. But beware of “tracking” phishing. But in this case the risk is somewhat greater because this is the type of platform from which we are not so surprised to see messages that inform us of the follow-up of the reservation (with the style “There is one week left for your trip!”). Precisely these types of smishing messages can now be generated by attackers fraudulently leveraging the reservation data they have extracted to appear legitimate. If you are a Booking customer and have a pending reservation, be especially careful if you receive one of these follow-up messages. It’s not the first time. In 2021, Dutch regulators fined Booking.com with 475,000 euros after a hack exposed the data of more than 4,000 customers, including credit card information in some cases. On that occasion, Booking notified the Dutch authorities of the cyberattack 22 days late, well above the 72-hour limit required by the GDPR, which caused the company to be fined. In June 2024, the platform itself warned that phishing attacks against its clients had increased by 900% thanks to the use of AI. The company has reported the security breach to Dutch authorities, but it remains to be seen if it again took too long and could face further fines. What to do if you are a Booking user. Theoretically nothing if you have not received an email from Booking.com notifying you of the problem. If you receive it, it is important that you distrust any message, call or WhatsApp that mentions details of your reservation even if they seem legitimate. Attackers may have data about your reservations and may be using it to deceive you. You should not provide your financial data through any channel other than the platform’s official website or app. This data can be used for phishing attacks from other services that use your name or email, since this information is usually sold to be reused by other groups that carry out massive phishing attacks. In Xataka | A family paid 1,800 euros for a tourist house in Galicia. Upon arrival there was no house and no response on Booking

An algorithm has hacked their B-2s in Iran, and they have the audio

In modern military history there are weapons so sophisticated that for decades they seemed practically impossible to follow or anticipate. However, as satellites, sensors and massive data analysis multiply, the battlefield begins to change. change nature: It is no longer always whoever wins the most advanced plane, but rather whoever is able to interpret before anyone else millions of seemingly unconnected signals. In this new scenario, algorithms begin to play a role that previously only radars had. The bomber that changed war. He B-2 Spirit It is one of the most exclusive and secret pieces of the American arsenal. There are only 20 operational units and each one cost more than 2 billion dollars, making it the most expensive airplane ever built. Its flying wing design eliminates vertical surfaces and reduces to a minimum the signal that bounces off enemy radars. Added to this are radar-absorbing materials, engines hidden within the fuselage and flight profiles designed to remain undetected. The result is a true “bug” capable of penetrating dense air defenses, penetrating deep into enemy territory and attacking strategic objectives. without being seen. For decades, that combination of stealth and range has made the B-2 the silent weapon par excellence from the United States, a platform designed precisely to operate without the adversary even knowing it is there. Epic Fury, the invisible attack on Iran. That capability was tested again when the US Air Force launched four B-2As (identified by the callsigns Petro 41, Petro 42, Petro 43 and Petro 44) to attack Iranian facilities hidden in mountainous complexes during Operation Epic Fury. The mission was part of the coordinated military campaign between Washington and Tel Aviv and was designed to hit high-value targets, including centers linked to the Iranian missile program. The B-2 is designed precisely for those types of operations: fly thousands of kilometers, penetrate advanced air defense systems and launch precision-guided munitions against strategic targets. Its greatest advantage is not speed or firepower, but the stealth. The enemy doesn’t have to intercept it if he doesn’t even know the attack is happening. The Chinese spy: an algorithm. But as we said at the beginning, modern warfare is beginning to introduce a new type of sensor: the software. A Chinese technology company, Jingan Technologyhas announced that its artificial intelligence-based military analysis system (one called Jingqi) detected linked signals to the American deployment weeks before the attack. The system reportedly combines satellite images, flight paths, ship movements, public records and other open sources to reconstruct patterns of military activity. According to the companythis analysis made it possible to identify since January an accumulation of US forces in the Middle East that even exceeded that registered before the Iraq war. The AI ​​would have followed transport aircraft routes, reconnaissance missions and movements of aircraft carrier groups until reconstructing the sequence that led to the military operation. A hole. The most striking statement came after the attack. Jingan assured that his system detected radio communications from the bombers during their return flight, despite the fact that operations of this type are usually carried out under strict silence on radio. The company maintains that it could rebuild the route of the bomber group and even published an audio fragment to support your claim. If this interception is correct, it would imply something much more significant: the weak point would not be in the enemy radar, but in the data ecosystem surrounding the operation. Put another way, the B-2 may be nearly invisible to traditional sensors, but the accumulation of indirect signals (communications, logistics, support movements) can allow trained algorithms to find patterns that previously went unnoticed. Algorithm war. If you like, the episode illustrates the extent to which artificial intelligence is transforming the way to wage war. Analysis systems like the Chinese Jingqi compete with American platforms that also use AI to plan military operations. In the campaign against Iran, Washington used tools like the model Claude by Anthropic and the Maven Smart System developed by Palantir to analyze large data streams and generate attack recommendations. This type of technology makes it possible to reduce in a lot the time needed to identify objectives: processes that could previously take three days are now completed in a matter of hours. The ultimate goal is to compress the entire attack chain (detect, evaluate, hit and re-evaluate) in just minutes. A new front. Plus: artificial intelligence is also altering another front of the conflict, the informative. The proliferation of AI generated videos is starting to make it difficult to distinguish between real and manipulated images on social media. Platforms like X have warned that they will penalize users who share AI-generated war content without warning, after numerous fake videos will begin to circulate during the crisis. Thus, in a scenario like the current one, where algorithms analyze military operationsgenerate propaganda and detect invisible patterns To the human eye, the battlefield is no longer limited to air, sea or land. It is also released in data centers. And in that terrain, even the quietest bomber on the planet can leave traces that no one knew before hear. Image | Jonathan Cutrer, goretexguy In Xataka | The arrival of the B-2s to Iran can only mean one thing: the search for the greatest threat to the United States has begun In Xataka | Iran is planting sea mines in Hormuz. And what threatens to blow up is not ships: it is the world economy

The F-35 cannot be hacked like an iPhone. The explanation is the same why Spain and Europe cannot go to war without the US.

There was a moment, probably towards the end of the Cold War, when the concept of Western military superiority stopped being measured solely in tons of steel or number of divisions and began to depend more and more on lines of code, networks and invisible architectures. As the decades passed, that technological transformation redefined not only how war is fought, but who really has control of the tools with which war is waged. Europe is realizing that that train has missed it. The jailbreak myth. Last year we already have that the possibility of an “off” button on the American F-35 it wasn’t exactly like that. Now, the comparison launched last week by the Dutch minister when suggesting that the fighter could “break free” like an iPhone It simplifies to the absurdity what is, in reality, a combat system defined by software and armored by cryptographic architecture. The F-35 is not designed for the operator to modify its code, but only to run software authenticated by keyscontrolled supply chains and closed validation environments, which means that physically accessing the aircraft is not the same as controlling its system. It is therefore not a consumer device on which alternative applications are installed like those on a mobile phone, but rather a platform whose integrity depends on digital signaturestrusted hardware modules and a support infrastructure that validates each update before the aircraft executes it. ODIN and structural dependency. They remembered in the middle The Aviationist that the real core of the problem is not in “hacking” the plane, but in keeping it outside the American ecosystem that keeps it operational. The F-35 depends on ODINthe logistics and data network that manages maintenance, mission planning, software updates and threat files, all under the control of infrastructure and processes largely managed from the United States. Disconnecting it does not turn it off immediately, but it initiates a progressive loss of capabilities that transforms it from a fully integrated fifth-generation platform to a combat fighter that is increasingly less relevant in the face of modern threats. So yes, exactly the same as a phone that stops receiving critical patches and updates. The same European dependence. Curiously, or perhaps not so much, this logic does not end with the plane, but runs through the entire European military architecture. The Financial Times recalled this morning in a piece that tried to answer the big European questions, that the continent’s armies depend on American software, clouds and systems for secure communications, data analysis, command and control, intelligence and platform maintenance. We are talking about platforms with contracts that involve giants like Google, Microsoft or Palantir and fundamental systems such asl Lockheed Martin Aegis integrated into, for example, European ships. The European military commanders themselves they recognized in the report that an abrupt break would generate operational gaps, fragmentation and loss of effectiveness, because a good part of the digital “back-end” on which its capabilities rest is not under European sovereign control. Digital sovereignty vs reality. Now that Washington is going through a phase where the word “ally” does not fit to the profile, the political speeches that advocate accelerate technological sovereignty in defense they collide with a structural reality: replicating the entire ecosystem that supports platforms, networks, encryption, AI and cloud services is not as simple as moving servers to European soil or changing providers overnight. And it is not because data localization does not equate to real sovereignty when that same software, updates, cryptographic keys and interoperability depend on American supply chains and regulatory frameworks, and where European generals themselves warn that a hasty decoupling would put daily operations at risk. Same explanation. In the end, the F-35 can’t be hacked like an iPhone has the same explanation why Spain and Europe cannot aspire to full digital sovereignty or resort to a high-intensity war without the United States: the structural dependence of the North American technological ecosystem. In the air, that translates into a fighter whose effectiveness rests on updates, threat data and logistical support controlled from Washington. On the ground, in militaries that operate on digital infrastructures, critical software and command architectures deeply intertwined with American suppliers and standards. If you also want, it is not so much a question of political will, but rather of technical architecture: whoever controls the software, controls the capacity. Image | RawPixel In Xataka | “It’s not what we need”: Germany has just put the finishing touches on Spain’s great military dream, the European anti-F-35 is disappearing In Xataka | The Netherlands has just activated panic in Spain and the US allies: the F-35 can be “released” like an iPhone

a Russian startup has hacked their brains to turn them into drones with wings

Nothing more a priori innocent than a pigeon flying over the buildings of a city or perched in a square. Or not, because in addition to being just another city dweller (sometimes excessively so, which becomes a problem), pigeons have been used as discreet express messengers from the ancient Sumerian and Egyptian civilizations. And also in war scenarios: in World War I, the United States Army created a carrier pigeon service called United States Army Pigeon Service for tactical messaging when all else failed or was destroyed. Now the Russian startup Neiry assures having given them one more twist: it has turned pigeons into biological drones. An electrode in the brain. What the Russian company proposes is not to biomimic a drone so that it resembles a pigeon, but to convert this animal into a transport vector by equipping it with implanted neural interfaces. More specifically, they implant electrodes in the brain, which are then connected to a stimulator attached to the head. That is, a kind of GPS that speaks with the brain of the bird. Neiry explains that the interface provides mild stimulation to certain brain regions, thus causing the bird to (artificially) prefer a certain direction. Otherwise, the bird behaves naturally. This system does not replace the bird’s will, but rather biases its sense of orientation to follow pre-established routes. Why birds? According to the Russian startupthe objective is to use biological carriers in situations where drones have limitations in range, weight or others such as a restricted area. Alexander Panov, CEO of the company, explains that birds can maneuver in complex environments, fly for long periods and operate in places where drones are restricted, such as collects Bloomberg. Anyone who has handled a drone knows that there is one critical element: the battery. Unlike unmanned aerial vehicles, a pigeon does not need to change its battery nor does it require frequent landings: its nature gives it everything necessary to carry out a long-distance flight. Millions of years of evolution make a bird beat any commercial drone and its 20-minute battery life in terms of flight stabilization and energy efficiency. In fact, up to 400 kilometers a day without stops. Pigeons with backpack. In the test flights that Neiry has carried out with these pigeon drones, the birds were equipped with this neural interface, in addition to a small backpack with the controller, solar panels mounted on the back and a camera. Of course, without giving as much singing as a drone, they did not go unnoticed, as can be seen in the video provided by the company. Pigeons are just the beginning. Panov has explained that although they currently focus on pigeons, “different species can be used depending on the environment or payload.” Bloomberg echoes of other similar implantations, such as the brain of cows for NeuroFarming, so that they produce more milk. And a rather spooky ultimate goal: “to create the next human species after Homo sapiens: Homo superior.” Possible applications. After the tests, the company ensures that the system is ready for practical implementation. According to Neiryhave no plans to use these birds for military purposes despite the fact that in a war or surveillance scenario their use is disruptive: the radars are programmed to filter out winged fauna as ‘noise’ or false positives. In short: they would go unnoticed. Among the ideas of use where they see an opportunity are infrastructure inspection, support for search and rescue, coastal and environmental observation or monitoring of remote areas in places like Brazil or India. Where is the ethics?. Mechanical drones are easier to control, they are capable of carrying larger loads and obviously, they do not need to feed nor will they defecate on you. And that’s not to mention the ethical implications of altering an animal’s behavior. Gizmodo details that after the surgery to implant the chip, the pigeons are almost ready to fly, so the risk “is low for the survival of the birds.” Of course, the startup has not provided independent third-party reviews, which makes specialists question the ethical implications of its technology. The bioethicist and law professor at Duke University Nita Farahany affirms that “Every time we use neural implants to try to control and manipulate any species, it is disgusting.” In Xataka | The war in Ukraine has become something absurd: there are drones shooting at Russian soldiers dressed as “penguins” In Xataka | We had seen everything in Ukraine, but this is unprecedented: Russia is not launching drones, it is launching “Frankensteins” Cover | sanjiv nayak and Andreas Schantl

How technology hacked psychology so we can’t put down our cell phones

You’ve spent two hours, three, in an impossible position looking at your cell phone in the middle of a kind of trance. A notification made you unlock it and after jumping from one application to another for a few minutes, you fell into the black hole of the scroll infinite. You could hardly say what you have seen or if you have enjoyed any of the dozens of videos that have passed you by. What perverse mechanism has been capable of hijack your attention for hours? The first thing you have to know is that not even rats escape this spell. In the 1940s, a psychologist named BF Skinner tried to find out how our brain’s reward system works by studying the reactions of laboratory rats with an experiment: the animals learned that if they pressed a lever, they got food. Easy, but it gets complicated. The most interesting part of the experiment, known as skinner boxand the one that can most be compared to the time drain that social networks are is the following part: Skinner stopped rewarding the rats every time they pressed the lever and started giving them food sometimes and sometimes not. Was this enough to discourage them? Far from it: they had tried the benefits of intermittent reinforcement. The logic of intermittent reinforcement For rats, the possibility of food was enough, just as you have only received interesting notifications a few times out of the many times you look at your cell phone, or only one of the publications you have compulsively consumed has satisfied your curiosity. Intermittent reinforcement is a psychological pattern that is characterized because rewards are given unpredictably, so that it creates a hook and strong attachment. “The mechanisms behind social networks are the same as those of slot machines,” David Ezpeleta, neurologist and vice president of the Spanish Society of Neurology, explains to Xataka. He intermittent booster It is also a vice of toxic human relationships, where affection, attention, and validation are marketed. In the case at hand, both the rats with the food and you with the likes, DMsor finding something you want to buy, get a hit of dopamine, a neurotransmitter that is released in pleasure-related situations, when the random reward finally appears. “They are short-duration, high-intensity stimuli with the possibility of reward. For every ten times we look at the networks, perhaps we only receive a reward on one. And that possibility is more addictive than a sure reward ten times,” he points out. The first thing we do when we wake up, the last thing we do before going to sleep. (Unsplash) “Technologies are capable of doing anything to keep you reading headlines, clicking links, adding favorites, commenting posts, retweeting articles, looking for the perfect GIF to answer a hater“, writes Marta Peirano in The enemy knows the system (Debate). The text is from 2019, and although some behaviors may have changed since then (who answers with GIFs anymore?) and neither TikTok nor the reels still dominated our attention, the mechanisms that go behind our hitch They are the same since Skinner. There are more and more people who have a profile on some platform and use them for more activities. They are a source of socialization, entertainment and information: 49% of Spaniards between 16 and 30 years old say inform of what happens through social networks, especially Instagram, according to the latest Eurobarometer youth survey. Don’t leave the platform It is precisely this platform that has grown the most in Spain in the last year, followed by Tik Tok. The oldest ones like X (Twitter) and Facebook are in decline although the latter is still the second most used (after Instagram), according to a report from the CNMC. Algorithms are the heart of this design. They are a set of hypercomplex, changing and opaque mathematical operations that decide what you see. They are not neutral or “objective”: they are machine learning systems that select and prioritize content that maximizes user interaction. That is, the algorithm observes what you devote the most attention to, and repeats that pattern to show you more of the same. Social media algorithms have the ability to modify ideas, behavior patterns and, in some cases, contribute to the radicalization of thought, the polarization and to conflict: visceral reactions (anger, fear, indignation) generate more clicks, shares and comments than other types of content. A study published in the journal Science shows that small changes in what is prioritized in a feed can accelerate feelings of political polarization in a very short time, evidencing how the technology behind the algorithm not only organizes content, but also shapes attitudes and emotions. And what purpose does your anger serve them? Regardless of whether or not there is a black hand behind it that wants to direct our attention and our time to a certain focus, the main function of this machinery is to keep you within the current application. Don’t feel the need to consult a website, specialists or an encyclopedia: attention time is the economic value that is sold to advertisers. Can we talk about addiction? Another phenomenon that greatly encourages time to slip away between applications is the so-called Fear of Missing Out (FoMO), whereby it seems that if we do not see everything that happens we feel that we are not part of the conversation, generating problems such as anxiety and giving rise to a continuous and compulsive connection, driving dependence on device platforms. But can we talk about addiction to social networks? For Ezpeleta, “you can talk about addiction when you need the stimulus and, when you withdraw it, anxiety appears.” And at least two important elements are needed: opportunity and habituation. (Unsplash) Each of these apps that fight for your time have something in common: they are on the same device, one that you use to wake up and that is the last thing you look at before going to sleep. For many people it is also a work tool, … Read more

In 2023 someone hacked the GPS signal of 20 planes. The European alternative Galileo already offers an option to avoid it

A pilot Fly on the Baltic Sea When, suddenly, all his navigation systems told him that he was tens of kilometers of his real position, drawing ghost circles on Russian territory. Weeks before, in the Middle East, More than 20 crews They had reported a “total navigation failure”, forcing aerial drivers to guide them blind. They were not technical problems. They were deliberate attacks on GPS systems, known as spoofing or signal supplantation. In this type of attack, a powerful transmitter on land emits false signals that mimic the satellites, cheating the plane to calculate an erroneous position and route. Already in 2012, a team from the University of Texas showed that it was possible Take control of a civil drone through Spoofing. In 2017 there were the first cases with ships passing through the black sea. Today the Baltic and the Persian Gulf are black points where maritime operators and airlines routinely report similar incidents. Europe’s response is already here. Until now, the aviation sector has avoided a catastrophe thanks to redundant systems and the expertise of the pilots. But The threat is real, it is growing And you need a robust technological solution. Therefore, the Galileo constellation, the European GPS, has just officially activated its Osnma service: An additional security layer that hinders this type of deception without degrading the performance or precision of positioning. How Osnma works. The Open Service Navigation Message Authentication (OSNMA) is a kind of digital authenticity seal available for free For Galileo users. In essence, it is a cryptographic protocol that introduces authentication data into the signaling system itself. Specifically, in the I/NAV message of the E1-B signal; An already reserved space, hence it does not affect service performance. The process to have a compatible receiver is to obtain the cryptographic public key from the GNSS European Services Center. Upon receiving the signal, the receiver uses that key to verify the “digital signature” of the message. If the firm is false or does not exist, the receiver knows that he is being a victim of a hoax and can alert the pilot or the autonomous system. Prevents the Spoofingnot the Jamming. Osnma makes supplanting a Galileo signal exponentially more difficult. However, it does not prevent the Jammingthat is, someone interfere with the signal through a brute force attack That the receptors saturate. It is good news equally: it is no longer enough to issue a false signal; The cryptographic firm in real time, an immense computational feat should also be falsified. OSNMA will not only serve to Increase security in air and sea traffic management. It will also be key to the future of autonomous cars, smart tacographers and road use systems. Even for sectors such as telecommunications, energy and finance, which depend on an ultra -precise time signal to synchronize their operations. Image | ESA, Euspa In Xataka | The GPS has become the Achilles heel of modern aviation. And engineering already has its sustained ready

A young computer scientist was looking for work. So “hacked” LinkedIn to always receive offers first

The youth of generation Z face serious difficulties in starting their work career in a labor market so competitivein which for Each job offer hundreds or thousands of candidates are presented. Find The slightest advantage To highlight in job requests it is fundamental. Michael Yan, a 25 -year -old founder and CEO from Simplify, has shared A trick on LinkedIn which allowed him to receive job offers from large companies such as Meta, Microsoft and Google. This method allowed him to access before the rest of vacancies candidates, thus increasing the possibilities of being hired Faced with other candidates. Yan’s trick. Like Yan told to Business InsiderIn 2018, the young manager was in his first year of computer science at Stanford University and was looking for companies to do his first practices. Given its technological training, Yan warned that the URL address of the LinkedIn Employment Section showed an “86400”. That number is not accidental: it is the number of seconds that have 24 hours a day. Therefore, when Yan asked LinkedIn the job offers of “the last 24 hours”, he always showed him those that had been published the day before, not in the last hours. A simple change to be the first. From that discovery, Yan accessed LinkedI’s employment tab and made a search for the professional profile that demanded and applied the filter “publication date” to “last 24 hours”. Then, the number “86400” of the URL address in the browser bar for “3600” changed, which is the seconds that have an hour. In this simple way, the young candidate “hacked” LinkedIn’s job search obtaining the offers published in the last hour, so that always He was one of the first candidates in postulating for vacancies. “I got job offers in Meta and Google because I postulated offers a few hours after they were published,” said the young manager in his publication. Access to better opportunities. Yan discovered that manually modifying these URLs could access the newest offers before other users, which placed their curriculum among the first in the list, causing their hiring options to improve considerably. Although this trick does not guarantee that a company hires someone for a position for which It is not preparedit does offer an important advantage in the selection process. Many companies establish an order of arrival to review the candidacies, so being among the first to apply will place you among the first to do your job interview. That served him to do your practices In the best technological companies. Any advantage is welcome. According to a report of Handshake of 2024, 57 % of the Z generation that will be incorporated into the labor market in 2025 is pessimistic about the start of its careers. 63% ensure that pessimism comes from an extremely competitive labor market. The data suggests that these newly graduated young people have already sent 24 % more employment requests than last year students of the previous year. Although skills and experience remain crucial, response time can be decisive to advance the selection. According The published by Business InsiderAndrew McCashill, expert in professional racing in LinkedIn, said that “being one of the first to run, especially for jobs you really want or for those who are super qualified, should undoubtedly be part of a job search strategy.” In Xataka | A LinkedIn function opens a debate that divides recruiters: the #Pentowork label Image | Unspash (Sign Pratama)

Those responsible for the Robinson list deny having been hacked. The data of more than 600,000 people are at stake

Hackmanac hackeos monitoring account published A few hours ago a worrying advertisement: the Robinson list It has supposedly hacked in Spain. According to hacking data, personal data of 614,197 people They would have been exposed. Among these data are full names, postal addresses, ID, telephone, date of birth and emails. These data represent a real treasure for cybercriminals who make use of the phishing technique to try to cheat users. With this information they can make personalized messages even try to supplant identities in attacks more specific to anyone. Our partners Xataka mobile indicate who have contacted Adigital, the agency that manages the Robinson list. Those responsible deny that this hacking has occurred And they have issued the following statement: “We have carefully reviewed the information available with our technical and legal team and we can conclude with total security that there has been no hacking or illicit access to our systems. In any case, we will be attentive to evolution and make our knowledge and tools available to the Spanish Agency for Data Protection.” The Robinson list is An advertising exclusion service to which any Spanish citizen can sign up for free. Its objective is to send advertising to registered users, both to their postal addresses and email or by mobile messages. A potential theft of the data on the list could precisely cause the opposite: that these users became direct victims of future Phishing attacks. It remains to be seen if the information published by Hackmanac and other media was really true or not – the authenticity of cyberboo is To be confirmed– But the organism presume to maintain the most important repository in the world of “verified, successful and publicly known cyberbrays.” In Xataka | The Robinson list works. And the companies that jump are already known the punishment: 10,000 euros

A 19 -year -old hacked the iPhone, was hired by Apple and ended up fired for not answering an email

The iPhone has been among us for almost 17 years. During all this time, the phone has changed a lot, but some things have remained practically intact since its launch. One of them is the closed ecosystem to which Apple products belong. Anti-Jailbreak. The Cupertino company has struggled to maintain a strong control over what can be done on the iPhone. But even in the first generation of the device there were those who rejected this mechanic and offered users an alternative: the Jailbreak. Jailbreak was nothing other than a method that was used of certain vulnerabilities of the device to remove the restrictions that Apple had imposed. Thus, those who resorted to this method accessed unpaid functions in exchange for putting their safety at risk. The road from Allegra. From advanced adjustments to the possibility of installing third -party applications without going through the App Store (store that was not available at the beginning and arrived in 2008 with OS 2). One of the hackers that had developed his own jailbreak was Nicholas Allegra. The 18 -year -old known on the network as “Comex” launched the first jailbreak publicly available for the iPhone 4 In 2010. To achieve this, he found a way to exploit vulnerability in a Safari library, so his method worked directly from the browser. Advanceing. Comex continued to cultivate his ability to break Apple’s telephone security and the following year launched Jailbreakme 3.0, which reached several iOS devices, including iPad 2. At this point, the community believed that Allegra was “years ahead” of other iOS hackers. And hired. But in 2011, his reality changed radically. The young man He went from creating Jailbreakme to be part of Applethe company that had challenged, as “remote fellow.” It is not clear what the dynamic between the multinational and the young man was, but that link did not take too long to dissolve. The farewell. After almost a year in Apple, in 2012 Allegra He announced on Twitter that was no longer part of Apple. In another message he explained that he had reached that situation because he had “forgotten to answer an email.” The mail in question was an offer to continue hired. The internship had a duration of one year and, apparently, Apple asked Comex by email to confirm if it would continue in the company for one more year. Not receiving an answer, the firm left the iphone hacker contract without effect, so it ceased to be a fellow. Images | Unspash In Xataka | Banks spent years criticizing cryptocurrencies. The BBVA will soon allow to operate with Bitcoin and ETH from its app In Xataka | Japan’s demographic crisis is leaving him without workers. Your solution: thousands of robots with a cat’s face *An earlier version of this article was published in January 2024

“LaLiga has hacked the law” with IPS blocks

The Rootedcon event is one of the referents of the cybersecurity segment in Spain and worldwide, but this afternoon it has been something else. There those responsible have organized a round table entitled “Thebes to run out of football.” The word game was just detail, because those who participated there are clear that you have to stop LaLiga. Background. In early February they began to occur indiscriminate blockages of IPS that left Spanish Internet users out of play. It was soon discovered that the blockades had been ordered by LaLiga, which tried to avoid illegal soccer broadcasts in IPTV services. These actions were based on Disposable legal argumentsand all this ended up detonating The war between LaLiga and Cloudflare Due to her they began to pay just for sinnerswith many users and companies affected by blockages and losing business during those cuts. Rootedcon is activated. The situation ended up causing Rooted with began to take action on the matter. Your responsible Victims data began to collect of these blockages to initiate potential legal actions. While, Cloudflare began its own legal actions Against LaLiga, accusing the blockages of “clumsy and ineffective.” LaLiga He replied To this demand, and a few days later we learned that Rootedcon had submitted a Nullity incident to try to make the sentence used by LaLiga – a manager with “legal tricks” according to RootedCon experts – could not be applied. Thomas Ledo. Disproportionate actions. On the round table, moderate by Omar Benbouzza (@omarbv), participated among other Tomás Ledo (@Toplus), co -founder and CEO of the technocratic company. According to him what LaLiga was doing was “how to close a whole shopping center because a bar inside is putting the game for IPTV”. The analogy is clear: the IPS blockades, as we say, cause potentially tens of thousands of fully legitimate web sites and services, with the damage that that can cause to those responsible. Javier Maestre. Soccer has no intellectual property. Javier A. Master (@Javieramastre), by Master Abogados, was another of the table participants. Maestre is RootedCon’s lawyer, and a few days ago he published ‘The Affaire Cloudflare‘Explaining the legal situation in this area. Both there and in the talk he remembered that Soccer has no intellectual propertyand also used an analogy to explain it. “When you take a picture of a landscape, the landscape has no intellectual property, but the photo does.” The same with football: the recording (the signal) does have intellectual property, but football is not. According to Maestre, LaLiga went several times to judicial bodies to get what he pursued. Omar Benbouzza. A first attempt from LaLiga. A car of the Provincial Court of Pontevedra of June 2019 is the first to It appears in Cendoj with reference to attributing production and realization functions. LaLiga then tried to attribute these functions, but the car made it clear that: “These statements are not correct in their entirety (…) Therefore, in no way can it be considered that LaLiga has attributed the functions of production and realization of the audiovisual recording but only of marketing of audiovisual rights and of control of production and realization to establish the same pattern that guarantees a common style. Nothing more.” That attempt failed for LaLiga, and it was indicated that “an intellectual property right would not have been accredited.” The thing did not end there. Capucera Judgment. Maestre indicated that LaLiga continued to insist until she achieved her purpose. In a judgment of the Valencia Court of March 1, 2021, It was indicated that: “In the first place, it must be left, as a proven fact, that the National Professional Soccer League, which acts as a complainant and particular accusation in this cause, It is, by the Ministry of Law, the only assignee of the marketing powers Joint of the audiovisual rights of the National and Second Division League Championship and of the His Majesty Cup the King, with the exception of the final of said competition, having legally attributed, the functions of production and realization of your audiovisual recording, as well as the authorization rights of your public communication, reproduction and distribution “. That “Capucera Judgment”, as Master explained, made these functions attribute to him, but according to this expert that does not make the celebrities apply Articles 138 and 139 of the Intellectual Property Law because said law was not modified. For him “LaLiga has hacked the law.” Ofelia Tejerina. The hackers are we, the cybercriminals them. OFELIA TEJERINA (@Fetg), lawyer and president of the Association of Internet users, also participated in that round table. Remembered how this was like a déjà vu After everything that happened With the Sinde lawand that LaLiga has already proven not to do things well. He was recently seen with the fine imposed by the Spanish Agency for Data Protection (AEPD) by biometric recognition systems. For this expert those who were violating the law and various fundamental rights (Ideological, religious and worship freedom – artico 16—, Freedom of expression and information – article 20—, or the right to effective judicial protection – articles 24—) were responsible for LaLiga. The word hacker has often had negative connotations, but he wanted to make them take them to make it clear that in this case “the hackers are us, the cybercriminals are them (LaLiga).” Román Ramírez. This may be the beginning of something really bad. For Román Ramírez (@patowc), confunder and CEO of Rootedcon, which is happening with these attacks on Cloudflare It is just the beginning of something more dangerous. “This goes against all CDNs,” he explained, and pointed out with Master how there have always been excuses to try to “cut off internet freedom.” They put examples such as those of the money laundering, terrorism or, now, the violation of intellectual property rights. “If this works (A LaLiga) with the base of intellectual property, then they will apply it with the excuse of fake news, for example,” and that could give rise to a much more strong control of … Read more

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.