Antwerp is the great gateway for cocaine in Europe. Now Belgium risks becoming a “narco-state”

Belgium is the heart of Europe, home of the main institutions community, part of one of the regions more industrialized of the planet… and also a ‘narco-state’ in the making. It may sound exaggerated, but that is the warning that a judge from Antwerp has issued. In an open letter disclosed by the city’s own court at the end of 2025, a magistrate puts his finger on the issue by denouncing the high cost for Belgium that the Flemish port has become one of the big doors entry of coca into Europe. In fact, its author does not hesitate to use the cursed word: ‘narco-state’. Message for Belgium. It is not usual for a magistrate to publicly denounce that his country is succumbing to drug trafficking networks. Even less so that this happens in the heart of Europe, in the nation that hosts the headquarters of the EU Council and Commission. However, that is exactly what happened on October 27, when the Belgian Justice published a judge’s letter of Antwerp that warns of the extent to which the mafias are “undermining” the institutions. The letter, anonymous and addressed to the Justice Committee, was launched a few months ago, but its tone is so emphatic that it has continued to stir up the debate. In fact a few days ago the president of the Antwerp Court of Appeal and the general prosecutor of Antwerp and Limburg they sat with Guardian to insist on the same idea: the drug trafficking that is channeled through Belgium poses a real danger to both the judicial system and the rule of law. What does the letter say? “Large mafia structures have been consolidated and have become a parallel power that challenges not only the police, but also the judiciary. The consequences are serious: Are we becoming a narco-state? Don’t you think it’s possible? Does it seem exaggerated? According to our anti-drug commissioner, that evolution has already begun. My colleagues and I share that feeling,” start the writing before remembering that narco-states are defined by their reliance on an illegal economy and their levels of corruption and violence. Does Antwerp meet those requirements? And Belgium? The magistrate begins by remembering what the authorities discovered when accessing Sky ECCcourier network used for smuggling. “The investigation has uncovered a parallel economy in our port, a multi-million dollar economy that operates outside official channels,” the magistrate insists flamenco. His investigations, he recalls, have discovered money laundering networks and a flow of black money that (among other consequences) raises prices in the real estate sector. Corruption and violence. That is just one of the criticisms that it collects the letter. Its author denounces that corruption has managed to infiltrate the port and “permeates” the institutions “from the base”, reaching customs officials, judicial officials, prisons, city councils and even the police. The gangs, alert, operate through blackmail, coercion and large bribes. “Moving a container, a 10-minute job, generates income of 100,000 euros, and a bag costs 50,000.” The mafias also do not hesitate to resort to violence, including kidnappings, torture and murder. “An attack on a house with bombs or weapons, a raid or a kidnapping can be easily ordered. You don’t even need to resort to the dark web. Just use Snapchat. Plus, it’s not expensive.” The author of the letter goes further and states that several investigating judges have had no choice but to live for long periods with an escort or even move house. The risk? Let this intimidation work and fewer and fewer judges and prosecutors in Antwerp are willing to hand down sentences in these cases. “A danger to stability”. The October letter focused the focus in drug trafficking in the heart of Europe, but despite its forcefulness (and the fact that the letter ended with a series of ‘duties’ for the Government) the problem is still far from being resolved. confirmed it a few days ago Bart Willocx, president of the Antwerp Court of Appeal, in an interview with Guardian. “The amount of money involved is so large that it poses a danger to the stability of our society,” ditch. “We are becoming a state with a lot of corruption and threats,” agrees Guido Vermeiren, attorney general. 250,000 euros for an order. The magnitude of the challenge is better understood by knowing certain data. For example, how mafias operate to gain influence in ports. Vermeiren cite a case in which criminals paid more than 250,000 euros to a worker in exchange for moving a single container. When the checkbook doesn’t work, gangs can resort to coercion, sending letters with photos of relatives or even launching attacks with homemade explosives. The Antwerp prosecutor remember another incident from two years ago, when police thwarted an attempt to steal 1,500 tons of confiscated cocaine. There are even suspicions that in 2022 a criminal network tried to kidnap to a Belgian minister. Do you move so many drugs? Yes. Although It is not the only border of the continent plagued by drug trafficking, Guardian assures (citing Europol) that more than 70% of the coca that entered Europe in 2024 passed through Antwerp and Rotterdam. It’s nothing new. For years Antwerp has been identified by something more than its diamond trade: it is often noted as the favorite port of Latin American drug traffickers when they want to send drugs to Europe. Police control would be leading the gangs to go to smaller ports, but even so the data is compelling. In the report June 2025 on surveillance of seaports and drug trafficking, the European Union Drugs Agency reports on the importance of the Flemish terminal: “Seventeen EU ports seized more than 10 tons of drugs in this period (2019-2024), with Antwerp seizing the largest amount, 483 tons.” What the data reveals. The same report recalls that in 2023 the authorities intercepted around 121 tons of cocaine in Antwerp, a figure that dropped to 44 tons the following year. A similar trend was experienced in Rotterdam: from 45 t … Read more

The European Commission has just opened an investigation into several worrying risks

For years, in Europe, when opening Shein We have found an almost infinite showcase of products at very low prices, constant discounts and points systems that turn the purchase into an experience that invites repetition. This model, based on the continuous rotation of the catalog and incentives that invite people to return to the application, explains a good part of its popularity. But it also helps to understand why European authorities have begun to look at it more closely. What seemed like a simple way to buy cheap has ended up entering the European regulatory radar. Formal investigation. The European Commission opened today February 17, 2026 formal proceedings against Shein under the Digital Services Lawwhich establishes the obligations of digital platforms that operate in the community bloc. From this moment on, the investigation enters a more structured phase, with the capacity to demand additional information and evaluate possible non-compliance. Brussels emphasizes, however, that this decision does not prejudge the outcome of the case, so we will have to wait to draw conclusions. What is under examination. The investigation focuses on three specific fronts related to the operation of the platform. On the one hand, it analyzes the systems that Shein has in place to limit the sale of illegal products, including content that could constitute child sexual abuse material, and expressly mentions examples such as child-like sex dolls. It also studies the risks associated with a possible addictive design of the service, such as rewards for interaction that could affect the well-being of users. And, in addition, it reviews the transparency of the recommendation systems that determine what products and content we see, an obligation that in the EU includes explaining the main parameters of these recommenders and offering at least one accessible option that is not based on profiles. behind the scenes. For nearly two years, Brussels repeatedly requested data from Shein to evaluate its compliance with European rules on product safety, user protection and transparency, with requirements dated June 28, 2024, February 6, 2025 and November 26, 2025. Added to that supervision the impact of the known case in France. Let us remember that last November the marketing of child-like dolls was detected through external sellers on the platform, which caused protests and measures by the Government. This chain of events helps to understand why the matter has escalated to a formal procedure. The next steps. With the procedure already underway, the Commission enters a phase of collecting evidence aimed at contrasting the real functioning of the service. This may require additional information, carry out specific controls or maintain direct contact with the company and other actors involved. The legal framework also opens the door to imposing temporary measures, declaring a possible non-compliance or accepting solutions proposed by the company itself to correct the issues that are the subject of the file. What changes for users. For now, the opening of the procedure does not immediately change how we use the platform. The outcome will depend on what the investigation reveals and the response that the company offers to the Commission’s demands. It should be noted that all this occurs without a fixed calendar: European regulations do not establish a time limit to conclude this type of investigation, which can be prolonged depending on its complexity and development. From Xataka we have written to Shein to find out their position and we will update this information when we receive a response. Images | appshunter.io In Xataka | LaLiga’s massive IP blocks are going to go further: they will now require VPN providers to also block IPs

The V16 wanted to replace the triangle and reduce risks. They have ended up proving that they can also create them

On January 1, 2026, it will be mandatory to carry in the car an approved V16 beacon. The introduction of this device is surrounded by a great controversy regarding its implementation, its real usefulness or the emergence of illegal devices. What has just been discovered is that more than 250,000 beacons are affected by serious cybersecurity vulnerabilities. It is the umpteenth disaster that affects these devices. what has happened. Luis Miranda Acebedo, cybersecurity expert, has published a complete and in-depth analysis of the digital security (or rather, lack thereof) of one of these V16 beacons. Specifically, the Help Flash IoT model, which is especially striking because the person who distributed it is Vodafone and the operator confirmed months ago that it had sold more than 250,000 units in Spain. The document and its conclusions are worrying. Vulnerabilities everywhere. In his analysis Miranda explains that although the analysis only focuses on this device, “the security problems found in the communications part seem to be common to all devices.” Specifically, the errors found by this expert for that part were the following: Sending data in plain text– The beacon transmits exact GPS coordinates, IMEI and network parameters without any encryption. Anyone who intercepts the signal can read them. Lack of authentication and integrity: There are no mechanisms to verify that the server is legitimate or to ensure that the message has not been modified along the way. Susceptibility to false stations– It is possible to spoof a cell tower to intercept traffic, block alerts from being sent, or inject false data. Private APN Exposure– Although this beacons a private Vodafone network, the connection commands and keys are exposed on the debug port, making the network accessible to an attacker. The V16 Help Flash IoT beacon is a real trick. Image: Luis Miranda Acebedo. OTA updates, another disaster. The problems are not only limited to that part of the V16 beacon’s communication with the APN and the servers of each provider, but are also present in the OTA (Over-The-Air) update system: Insecure update: Simply press the power button for 8 seconds to activate a maintenance Wi-Fi network. The name (SSID) of the Wi-Fi and its password are identical (HF-UpdateAP-5JvqFV), they are “harcoded” in the firmware. Not only that: Miranda tested two different units and those credentials coincided, which leads him to think that they are the same in the 250,000 devices sold by Vodafone. unsecure HTTP: To download the new firmware, the HTTP protocol is used without further ado, not the secure version (HTTPS), allowing an attacker to intercept and modify the file in transit. No digital signature: The device does not verify the authenticity of the firmware, and accepts any file sent to it, allowing the installation of malicious software. DNS Spoofing– By not using DNSSEC it is trivial to trick the device into connecting to a fake server controlled by a cybercriminal. Open debug port: The port is also physically accessible without a password, allowing you to view all the logs and extract sensitive information from the hardware. Hacking a beacon is easy and cheap. The researcher explained that it is possible to buy a device that simulates a telephone antenna (500-1,000 euros). Using a Rasperry Pi 4 or a laptop, free software can be used to “intercept and manipulate the “secure” communications of these beacons.” After running a proof of concept, he managed to hack a beacon in 60 seconds and install malicious firmware that allowed him to have full control of the beacon. With this firmware it could send false locations, access the operator’s private APN, generate massive false alarms or turn the beacon into a brick. What Netun says. The company that manufactures these beacons, Netun Solutions, has sent out a press release to try to clarify these risks. Exposed data: The signature indicates that the beacon transmits geolocation, a device identifier and some technical parameters. They admit that this data can be exposed, but they emphasize that there is no transmission of personal data such as license plates or user IDs. Logical: they are not associated with the beacons. Plain text: Netun officials explain that the decision to send plain text was made to “guarantee long-term interoperability and robustness.” Private APN: It is also noted that the beacons connect through a private APN and a VPN from the operator, but Miranda explained how the connection parameters are exposed on the serial port. Physical access and removing the eSIM are enough for an attacker to connect to that private network. Netum in turn points out that physical access means that “the impact is limited to that specific unit.” OTA problems: Regarding the OTA functionality that also shows a vulnerability, Netun states that this function has been disabled through firmware updates. Improbable mass attacksFinally, those responsible point out that massive attacks could only be carried out by compromising a large number of beacons. They also explain that the Netun platform “limits the number of frames that each SIM can send” and the frequency of sending. What Vodafone says. At Xataka we have contacted Vodafone, and one of their spokespersons tells us the following: “The V16 beacons approved and marketed by Vodafone Spain constitute an adequate system that complies with current regulations for road emergency signaling. In particular, Help Flash IoT is certified in accordance with the regulations required by the General Directorate of Traffic (DGT) for connected V16 beacons, meeting the necessary technical requirements in terms of visibility (sufficient light intensity), resistance, flash reliability, signal duration, etc. These requirements also include the data communication protocols of the beacon with the servers. The V16 beacons have internal security mechanisms and the Vodafone network provides an additional layer of security with controls that ensure that communication is made from the beacon authorized by the network. On the other hand, the beacons integrate NB-IoT connectivity, which guarantees that the beacon is only used for location in an emergency by authorized entities with the user’s knowledge. The communication that passes through Vodafone … Read more

Europe approved the sale of Nexperia to China in 2024 after “assessing risks.” Someone miscalculated

Less than two years ago, European authorities assessed the risks of China controlling Nexperia through Wingtech and gave the green light. This week, The Netherlands has used a 1952 emergency law to confiscate that same company claiming that it is strategic for European security. Why is it important. Worse than being too rigorous or too lax is lurching. Europe has proven to lack a consistent criterion on what is strategic and what is not. This inconsistency comes at an enormous cost: any company that wants to invest in technology sectors in Europe now knows that the rules can change retroactively, without prior notice, under external pressure. And that scares away investments. The contradiction: If Nexperia was so strategic for Europe, why was it allowed to be sold to a consortium backed by the Chinese government in 2017? If it wasn’t then, what has changed now to justify a seizure using a law created for supply crises? The only possible answer is that someone miscalculated very, very badly. Between the lines. He editorial of Financial Times He puts it bluntly: Holland made a mistake in approving the sale, and is now trying to correct it. The problem is that this lurch sets a toxic precedent. You can pass all the regulatory filters, invest billions, operate for years under European supervision and suddenly the State decides that it was wrong. When Wingtech bought Nexperia in 2019European regulators had plenty of time to block the operation. They didn’t do it. For years, Nexperia has operated in the Netherlands, manufacturing millions of components annually for the European automotive and consumer electronics industry. Everything legal, everything supervised, everything approved. turning point. What has changed is not Nexperia’s technological capabilities or its strategic importance. What has changed is the geopolitical pressure: The United States blacklisted Wingtech in 2024. In September 2025, the US government extended restrictions to all subsidiaries of sanctioned companies. Court documents in the case suggest that the Netherlands acted under American pressure, not because of its own risk assessment. Yes, but. Wingtech is right about one thing: this is “excessive interference driven by geopolitical bias rather than fact-based risk assessment.” It’s the exact opposite of what regulators did when they approved the sale. So they did evaluate risks with facts. Now they confiscate for geopolitics. The money trail. Nexperia invested in its European facilities under Zhang Xuezheng. The company kept production in Holland, created jobs, paid taxes. He did exactly what an investor is supposed to do. The reward has been a confiscation by a 1952 law and a CEO suspended without formal accusations of mismanagement until it was convenient to find them. The case has an additional twist that is dangerously reminiscent of Huawei in 2018-19: First come Western restrictions for national security. Then the Chinese countermeasures. Days after the Dutch intervention, the Chinese Ministry of Commerce has banned Nexperia from exporting certain components from its Guangdong plant. The company is now caught between two countries that do not speak to each other. Huawei was gigantic and could hold its own. Nexperia is medium and we’ll see what happens with it. At stake. There is… 12,500 employees without knowing what will happen to their jobs. A CEO suspended in Amsterdam. An export veto from China. European automobile customers dependent on their chips. All this because less than two years ago someone approved a sale after “evaluating risks” and now it turns out that those risks were unacceptable. If Europe wants to attract technological investment, it needs clear and stable criteria on which sectors are strategic. What it cannot do is approve operations for years and then seize companies when the geopolitical wind changes. That is not protecting technological sovereignty, it is improvisation disguised as national security. Featured image | Nexperia In Xataka | China is taking a giant step in its quest for technological self-sufficiency: its own EDA software

Vigo’s elite has an island for her isolated from the rest of the city. Now risks that to change

Maybe it’s not as famous as The Cíesbut Torralla It is also a unique island. In its own way, of course. More than its fauna and flora, this small insula of the southern coast of Galicia stands out for its legal situation. Although it is connected to Vigo’s coast through a 400 -meter bridge and in theory it must comply The Costas Lawin practice it is an impenetrable urbanization for most vigueses. At the end of the viaduct there are A garrita with a guard who restricts the passage to the interior of the island. The barrier only rises for the (scarce) residents, their guests and the researchers who work in the Marine Science Station (Ecimat), a space linked to the University of Vigo that premiered in 2006. Torralla is therefore a city within a city, a private and exclusive village available to its even more exclusive residents, including The business elite local. The country Precise that there are only 149 people censored there, although in good weather the number of residents multiplies. Two ways to visit her As access is closed to anyone outside the island, there are only two ways to get an idea of ​​what is inside. One is to cross the bridge and (without crossing the garrita), go down to one of the coves located on both sides of the catwalk, accessible from the 90s Thanks to a Supreme Judgment. The other (more comfortable) is to open Google Maps and notice In view of birds, internal roads, large gardens, chalets and swimming pools that are distributed throughout the island. Its most characteristic piece (and perhaps controversial) can be observed, however, from a good part of the vigués coast: a tower of 70 meters high and 21 plants Raised between the end of the 60 and the beginning of the 70s, during the boom of the developmentalism. In idealist it is possible to find The announcement of a floor of 120 square meters on the 18th plant sold for 620,000 euros. Another peculiarity of the island is that in practice it is intended as a Private condominium in which the City of Vigo barely has a presence: the basic services, such as lighting, water supply or maintenance of the vials are assumed by the neighborhood community, Precise The confidential. That Torralla is today an island of private use, an anomaly of the Galician coast, is greatly explained by Its complex story. Until the second third of the nineteenth century the island belonged to the Church, but after confiscation He went to the Marquis de Valladares. Since then it has changed ownership (in 1884 a prosperous factory came to rise there, Iberian string) until in the mid -60s it ended up under the control of a society, Torralla S. This episode was key to the future of the insula, which saw how in just a few years the bridge was built that connects it with the coast, the Huge residential tower and the thirty of exclusive chalets that are distributed by its surface, some with gardens and pools that arrive almost to the rocks where the sea breaks. In its day, the construction of a nine height and 120 meters long for 85 exclusive homes that met the frontal opposition of the city. “It goes against every idea not only landscape, but I am even afraid that the island sinks,” He came to iron In 1975 the then mayor, Joaquín García Picher. After an intense pull and loosen, three years later the Supreme Court proved him right and gave the judicial folder to the megaproject. Goodbye to privileges? Torralla has been hoarding for years headlines Because of its peculiar status, but a quick search arrives on Google to verify that its rhythm has increased exponentially in recent months. The reason is simple: if the government Fulfill your wordin not long residents could lose one of the privileges that have been retaining for several decades, being the only ones (except for Ecimat workers) who can enjoy the coast of the island. In June, during a visit to the neighboring beach of Samil, Minister Sara Aagesen, guaranteed that will defend “he toCceso to the public domain Maritime-terrestrial “in the area.” It has to be for public use and we are working on the definition of the project, we hope to have it just around the summer, “he insisted. Wednesday The confidential revealed That the government is already finalizing the project to achieve it, which in practice would go through lifting the garrita that prevents the passage of non -residents and recovering the public domain strip of the insula. To understand that effort you have to understand some keys before. The first, the status of the island. What Torralla SA has is a concession, an authorization of almost a century granted in the mid -60s and will not end Until 2064. In between, in the late 80s, the Government approved the Coastal Lawa regulation that regulates the public use of the coast and the one that right now does not adjust the Galician island. In fact, if the vigueses (and the rest of the visitors) can cross the bridge and sunbathe on the coves of the island located on their margins is not because of the hospitality of the SA, but by a sentence of the 90s that forced him to retract the garrita to the end of the catwalk, allowing his public access. The Coastal Law however demands something else. The norm includes a space of “Traffic servitude” that must respect a strip of six meters widean area in which “the construction of any installation is not authorized and should be left permanently expedited for pedestrian public use.” That is what Vigo aspires now with the support of the government: a perimeter walk of more than 1.5 km and at least six meters wide for which residents probably They will have to give land. With him they would achieve two objectives: to end decades of privileges and erase Torralla … Read more

A new generation of robots promises precision and efficiency. It also opens the door to cyberspage risks

The movement of the robotic arm seems impeccable: each turn, each clamp, each displacement occurs with the accuracy of a metronome. However, while these actions convey confidence in a hospital or a factory, another story is drawn in the background. The commands, although encrypted, let rhythms and pauses In the traffic that travels through the network. These patterns, invisible to the naked eye, in many cases allow to deduce the task executed. The same accuracy that we applaud in the robot can become a trace for external observers. Over the last years the interest in collaborative robots has shot himself. Hospitals are used as surgical assistants for their ability to make fine movements without fatigue, and in factories they have become allies for repetitive or risk tasks. Not only do productivity improve, they also reduce accidents by replacing the operator in hostile environments. The connectivity that drives its expansion, however, is also the one that can expose them to new vulnerability scenarios, According to a study in the University of Waterlooin Canada. Precision that dazzles in hospitals, a trail that can be interpreted The investigation did not focus on real -time robots by means Preprogrammed scripts. These systems receive an orders sequence and execute them with minimal human intervention, which reduces direct supervision and expands automation possibilities. At the same time, the way in which these systems structure high -level commands generates regular traffic patterns, and that regularity opens opportunities for analysis. The work was designed with a very concrete scenario: a passive attacker, someone who only observes the network traffic between the robot and its controller without deciphering it. The experiment was carried out with an arm Kinova Gen3a light robot usually used in research environments. The controller executed preprogrammed commands and the communications were protected with TLS encryption. With this assembly, the researchers registered 200 network traces corresponding to four different actions, looking for a varied and representative set. The authors began by converting network catches into temporary signals: instead of looking at the content of the packages, they analyzed when each one was sent and with what separation. Those time series were treated as acoustic signs, which allowed to apply classic signal processing techniques, such as correlation and convolution, which seek similarities and patterns in pulses and rhythms. From this transformation they trained a classifier that, in the closed environment of the test, assigned an action to each trace. The experiment used 200 traces on four actions and showed that, even with activated TLS, temporary subpatrones were detectable. Kinova Gen3 The trials showed that the method worked with remarkable efficiency: in most tests the system was able to identify the robot action with a success level close to 97%. This means that, although the orders travel encrypted by TLS, the observation of the intervals and the cadence can allow to rebuild what task it is executed. In a hospital, that could give clues about the nature of an intervention; In a factory, on the production sequence. A complete deduction is not always achieved, but the finding shows that the encryption alone is not enough. Although orders travel encrypted by TLS, the observation of the intervals and cadence can allow to rebuild what task it is executed. The finding acquires relevance to extrapolating it to real environments. In health, an attacker could identify details of a surgical intervention without the need to access the medical history, only observing the robot communication flows. In the industry, the patterns themselves could reveal assembly steps or Characteristics of a patented process. It is not an isolated failure of a specific model, but an alert signal on how connectivity multiplies the exposure. Each connected robot becomes a possible observation point. The researchers did not limit themselves to pointing out the problem: they also explored possible defenses. One of them is to modify the timing of the robot programming interface, so that the commands do not follow such a regular and predictable pattern. Another is to apply package filling and timing manipulation to hide the real rhythms. These measures could reduce the inference capacity of an attacker, although with a cost: lower network efficiency and, in some cases, more latency in the execution of the robot. Technological innovation always advances in parallel to the need to protect it. Cobots exemplify that balance: they promise efficiency and new forms of work, but also force rethink defense measures. It is not about stopping its adoption, but about doing it with a conscious look of the risks. Security and development are not opposite paths; They must travel together if you want the future of robotics to be sustainable and reliable. Images | Kinova Robotics (1, 2) | Freepik In Xataka | Alibaba is becoming the Ai Open Source sponator. Your family of Qwen models is putting the market above

What is, when it comes, advantages and risks and how to install it when launched

We are going to explain everything you need to know about the next Public beta of iOS 26the next version of the iPhone operating system. iOS 26 is the name of what IOS 18 would have been, only that Apple has decided to change the name to match the year during which you are going to use the version. Let’s start by telling you What exactly a public betaand the risks and advantages of installing it. Then, we will tell you when it is expected to arrive, and we will end up telling you how you can install it. What is the public beta of iOS 26 When a new version of its operating systems occurs, Apple does not launch it directly for all users. First use beta versions, still unfinished versions that developers and users who want to start trying. The objective of these beta versions is that the users who try it find and report errorsand that they can give the last touches with a real feedback of people who are using it on a day -to -day basis. Because maybe those who are developing iOS do not think of doing a specific thing that gives error, and that is why it is good to have thousands of people doing tests and encountering the problems. Of this, When the final version arrives, almost all these problems will have been solvedand it will be stable and safe to use on a day -to -day basis. Apple has two levels of beta versions. First arrived Beta for iOS 26 developersone for which you need to download some certificates if you want to install it. Its objective is not so much to find errors as that developers can start trying their applications in the future version of the operating system, and thus do what is necessary to adapt them and work well. And after the beta for developers, which arrived in June, the next step is to install the public beta. It is called public because Any user will be able to install it on your iPhone and try it. These betas are already more refined, they do not have so many mistakes, but it still has many and that is why it is important that users who want to access and find bugs and failures that can be solved. The public beta will have several versions, each with improvements in the optimization and error solution. And so, after several versions in September, the final version will arrive, the update that will be installed on all the iPhone after several weeks and months of tests between the Betatesters. When the Public Beta of iOS 26 arrives Beta for developers arrived on June 10, and in recent years public betas have arrived in mid -July. In the previous two years he arrived on July 13 and 16, so many people are wondering why July 17 has not yet arrived in 2025. The thing is that, According to the latest leaks, It seems that Apple will delay a week The launch of this beta. The famous journalist Mark Gurman, known for his sources within Apple, indicates that the chosen date could be Around July 23. Apparently, as last year Apple launched a new version with iOS in which many versions arrived months later, in this case everything should arrive at the same time. In recent weeks, in betas for developers we are seeing several modifications in the star novelty, The Liquid Glass designreducing initial transparency. Officially nothing has been said, but perhaps the delay has to do with trying to work this a little more. In any case, Everything indicates that next week the public beta will arriveand therefore whoever wants can already start trying the new iOS 26. Advantages and disadvantages of the public beta The advantage of trying the public beta of iOS 26 is that You can start trying the new functions before the others. Apple has completely redesigned the iOS interface, and if you want to start trying this this type of betas will allow you to do it two months before it comes to others. The disadvantage is that They are still unstable iOS versions, with bugs and without optimizing. You may find errors here and there, that there are unexpected closures, and above all that the battery is consumed faster than normal because they still have to optimize the system. Those who have tried the betas for developers say that iOS 26 is already quite mature, but it is normal that in the first public betas there are still failures. Then, every certain time will be coming new versions that solve problems and improve performance. If you can’t wait, go ahead, you can jump to the public beta when it arrives. If you cannot wait but you need your iPhone to be as stable as possible and do not consume more than normal, it may be better to wait a month, that after one or two updates of the public beta it is already more mature and optimized. And if not, in mid -September the final version will arrive. How to install the public beta of iOS 26 When the public beta arrives, you will have to enter Apple’s Beta program website. Once inside, log in and click on the button Register What will you see in blue under the introduction. In doing so you will indicate that you want to sign up to be able to try betas from Apple operating systems. You will have to log in with the Apple account that you use on your iPhone. Once you do it, enter the Settings From your iPhone and click on the section General. Once inside, click on the section Software updatethe same place where you download normal updates. Now, within Software updateat the top you will see that You can activate the option of Beta updates. It is an option that will always stay here while you are in the program, and when you … Read more

The strokes have become a huge silent health problem in Spain. And there are ways to limit risks

Every year 90,000 cases of strokes are produced in Spain that leave 23,000 deaths on average, According to the data of the Spanish Society of Neurology. This number could be significantly reduced, after all, many of the Risk factors which are associated with this type of event correspond to behaviors and habits that we can modify. Before reviewing what the risk factors are controllable or not, associated with the stroke, maybe it is appropriate to consider us What exactly is an stroke. The stroke or stroke (stroke) occurs when the blood flow that reaches a part of the brain is interrupted or drastically reduced. There are two types of accidents: ischemic and hemorrhagic. The former are the most common, are produced by the blockade of one of some circulatory route, for example by a clot or its narrowing as a result of fatty deposits. Hemorrhagic strokes for their part are produced by the breakage of a blood vessel. There is no exact list of risk factors that are related to these episodes since there are numerous overwhelms and interconnections Among these factors. Nor can we make an accurate distinction between the factors that we can control and those that do not. A clear example is that of diabetes. This disease is a risk factor in the appearance of ICUTS. Suffering or not this disease is not under our control, but we can avoid factors that in turn are linked to it. Despite the difficulties when delimiting these concepts, experts estimate that controllable risk factors are associated with 60% and 90% of the risk of suffering a stroke. That is, avoiding these factors we can reduce very significantly the risk that this type of event will be triggered in our brain. And what are the risk factors on which we have the greatest control? According to the National Heart, Lung and Blood Institute From the United States, controllable risk factors include blood pressure, obesity, physical inactivity, poor diet and tobacco. According to the American medical institution Johns Hopkins Medicinea blood pressure of 140/90 or higher is a factor that can condition our probability of suffering such an accident. Obesity, food and physical inactivity They are clearly interconnected risk factors. Smoking is one of the Risk factors More widely mentioned, but alcohol and some recreational drugs such as intravenous or cocaine are also related to an increase in the risk of suffering from an stroke. Some legal substances such as the contraceptive pill have also been related to an increased risk of stroke. With anxiety, depression and stress, something similar occurs than with other diseases: we have a certain degree of control, but this can be very limited depending on the circumstances of each person. Something similar happens with the environment in which we live: although residing or working in contaminated areas can aggravate our risk of suffering from an stroke, changing work or residence is often not in our hand. What we cannot change Some of the risk factors that we associate with the stroke totally escape from our control. Maybe age is the most important: Age. As we become greater the possibilities of suffering a stroke are increasing. Sex is another factor linked to the appearance of this disease and in a unique way: it is fine at an early age men suffer from these accidents more frequently, the greatest life expectancy of women means that throughout life these suffer more such problems. Different ethnic backgrounds can lead to different levels of risk: in the United States African -American, native and Hispanic people have a higher risk of suffering a stroke. Finally, Genetics And family history can also be considered risk factors, especially in cases where a family member has experienced one of these events at earlier ages. In addition to the risk factors, it is worth remembering what are the main symptoms that accompany these events in order to better identify an stroke and improve the chances that whoever suffers it receives medical assistance on time. There are a few key factors that can help us Identify an stroke quicklybut there is also a challenge of symptoms that can also be associated with strokes. Among the Key symptoms There are the loss of strength or sensitivity in the face, arm or leg, which usually swams to a single side of the body; Confusion in speech, for example in the use of unconnected words; sudden loss of vision; dizziness, loss of balance or the appearance of a severe headache without a clear origin. In Xataka | We have a new and promising treatment against the consequences of stroke (and has been created in Spain) Image | Anna Shvets

What we know about the risks of suffering a stroke being young

Over the years our health worsens and that is why it is not surprising that there are diseases and ailments that we associate with age, such as Alzheimer’s or some types of cancer. However, young people are not immune to these diseases and when these call the consequences can be devastating. An increasing problem. Age is One of the key risk factors In the appearance of stroke or stroke (stroke), but that does not mean that young people are immune to this type of event. According to the European ICTUS organization (that for its acronym in English), the prevalence of ischemic stroke (the most frequent type of stroke) in adults between 18 and 50 years is approximately 10 cases per 100,000 inhabitants and year. More worrying perhaps is the fact that this prevalence has been growing, at least in high -income countries between the 1980s and the present. Also worrying the fact that we do not know exactly the reason. The stroke. The strokes occur when interrupts or reduces drastically The blood flow that reaches a part of the brain. There are two types of stroke depending on the origin of this interruption, ischemic (the most frequent), or hemorrhagic (less prevalent). The ischemic stroke occurs when one of the circulatory routes of the brain is blocked, by a clot or by a narrowing of this route. The hemorrhagic instead is caused by the breakage of the blood vessel and can therefore be even more harmful than the ischemic. Risk factors. The risk factors in the appearance of the ICUTS have been extensively studied, but the information we have regarding cases in which this ailment is unleashed early is more limited. A study Posted in 2018 in the magazine Journal of the American Heart Association He studied these factors and found 11 that showed statistical correlation. These risk factors included atrial fibrillation, cardiovascular diseases, diabetes types 1 and 2, LHD clollesterol, hypertension, and family history of stroke. The study also found a negative correlation between LDL cholesterol and the risk of suffering from an early stroke. Other studies have also found risk factors in the consumption of tobacco, obesity or metabolic syndrome although only the first of these three factors did it with consistency According to that. The weight of genetics. Genetics is an important factor in the appearance of stroke. Another study Posted in 2022 in the magazine Neurologyobserved some genetic trends among patients with early stroke. The team found a relationship between the genes that determine the blood group and this risk. The existence of stroke cases in family history is generally considered a risk factor, but it is more when these cases occur at an early age. That is, the cases of stroke in young people are, in themselves, a risk factor. When the stroke comes soon. Experts used to think that the arrival of an ICTUS at an early age raised a smaller problem than its arrival at a late age since the response capacity was better. However, long -term studies They have questioned that idea: People suffering from an early ichtus show an increase in long -term mortality among those who suffer from this type of events before the age of 60. In Xataka | We have a new and promising treatment against the consequences of stroke (and has been created in Spain) Image | MART PRODUCTION

ASML, Airbus and Mistral are planted before Brussels. They ask that the application of the law of AI and notify the risks delay

Europe already has its great artificial intelligence law. What is missing, according to several companies, are the concrete rules to apply it. Only one month after the first standards for the most advanced models, more than 45 large companies – among them ASML, Airbus or Mistral – enter into force – They have signed an open letter asking Brussels to “stop the clock” and postpone their entry into force two years. They point to an unrealistic calendar and the difficulty of competing with the United States or China. What exactly is EU’s artificial intelligence law? The European Union Artificial Intelligence Law entered into force on August 1, 2024after having been politically approved by the European Parliament and the Council in December 2023. It is the first comprehensive regulation of the world focused on this technology, and regulates from how the models are trained to what contexts can be used. The key is in its approach to risk levels: the greater the potential impact, more legal obligations. And what exactly Asml, Airbus, Mistral and the rest ask? They demand a pause two years before the most demanding parts of the law enter into force, especially those that affect high -risk systems and the general purpose models, whose first section is scheduled for August 2025. The reason: The standard is too complex, overlaps with other regulations and still lacks key guides for its application. ASML headquarters in Veldhoven Among those guides is the code of good practices, that had to have been published in spring and still does not be ready. Companies argue that without that document, and with this level of uncertainty, the law can become a brake for European innovation. “This situation puts at risk not only the development of European leaders, but the ability of all industries to deploy the scale required by global competition,” They warn. They also ask that regulatory quality prioritize against speed, and warn that continuing without changes would send a wrong message to the seriousness of Europe in its commitment to technological competitiveness. The names behind this initiative. The request does not arise from an isolated startup or from an informal group of companies. Behind is the EU AI Champions Initiative, a group that groups more than 60 European companies that claim to be committed to the development of a competitive AI and aligned with the EU values. Among its members are names such as ASML, Airbus, Mistral AI, Mercedes-Benz, BNP Paribas, Siemens Energy, Lufthansa, Philips or Publicis. Of course, not all members of the US Ai Champions Initiative signed the letter published this week. Images | Sigmund | Rawpixel | ASML In Xataka | After strictly regulating AI, the European Union has identified a problem: it has been too European Union

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.