Netherlands warns of Russian cyberattacks against Signal and WhatsApp around the world: they don’t need malware

When we think about applications like Signal or WhatsApp we usually immediately associate them with the idea of ​​privacy. Both have been built on a very clear promise: end to end encryption prevents third parties, including the companies themselves, from reading users’ messages. This security model has made millions of people trust these platforms for personal, professional and even sensitive conversations. However, that protection does not mean that accounts are completely safe. The intelligence services of the Netherlands have warned now of a global campaign that seeks to compromise accounts of these unused applications malware nor exploit technical flaws. The objectives. The military intelligence service (MIVD) and the general intelligence and security service (AIVD) indicate that the attacks seek to access accounts belonging to dignitaries, public officials and military personnel. Authorities also acknowledge that Dutch Government employees have been both targets and victims of these attempts. In addition, the report indicates that other profiles that may be of interest to the Russian Government, such as journalists, could also be among the recipients of this type of attack. Social engineering instead of spyware. Unlike other episodes of digital espionage that have affected messaging services in the past, the campaign described by the Dutch services does not rely on malware or the exploitation of technical flaws. The report explains that attackers mainly resort to phishing and social engineering techniques to gain access to accounts. This difference is relevant when compared to tools such as Pegasusthe famous spyware capable of infiltrating mobile phones. In this case, the goal is not to compromise the phone system, but rather to take advantage of the user’s behavior to take control of their account or link a foreign device. “Account take-over”. One of the methods is direct takeover of the account. The attackers, they explain in the report, pose as the official support team of the application and send messages to the victim alerting them of alleged suspicious activities, possible data leaks or attempts to access their account. From there they request that the user complete a verification process and share the code they receive by SMS, as well as the PIN configured in the application. If the victim provides this data, the malicious actor can take control of the account and reassociate it with a number under their control. The trick of QR and linked devices. The report also describes a second access route that does not necessarily imply that the victim loses immediate control of their account. In this case, attackers use social engineering techniques to convince the user to scan a QR code or click on a seemingly legitimate link, for example under the guise of joining a chat group. That QR or link may be designed to link the attacker’s device to the victim’s account using the apps’ linked device features. Once connected, the attacker can access the conversations and, depending on the platform and access mode, see messages in progress or even part of the history, in addition to being able to send messages on behalf of the user. What the intelligence services recommend. The report also includes several practical recommendations to reduce the risk of these types of attacks. Authorities warn that you should never share verification codes or your account PIN through messages, even if the request appears to come from the app’s support service. They also recommend distrusting links or QR codes sent by unknown contacts and always verify these requests through another channel before interacting with them. Another important measure is to periodically review the list of devices linked to the account and remove any devices that are not recognized. The document also adds other useful measures, such as activating the registration block in Signal and notifying contacts by another means if there is a suspicion that the account has been compromised. Images | BoliviaIntelligent | Also AY In Xataka | That they can hack a mobile phone just by entering a website is scary. If that mobile phone is also an iPhone, it’s terrifying

It’s a warning signal from your brain.

in a world where insomnia is the order of the dayhearing people saying the phrase ‘it’s like putting your head on the pillow and going cold’ can make you very envious. An attitude that in some cases is seen as a great skilland that certainly seems like an evolutionary advantage. However, science has a much darker reading: it is not efficiency, it’s debt. The thermometer of fatigue. In sleep medicine, the time between getting ready to sleep (such as turning off the light in the bedroom) and entering the first phase of sleep is called Sleep Onset Latency (SUN). A time that has been measured to establish how long is normal for a person, and science estimates it between 10 and 15 minutes. That is to say, between turning off the light and lying down until we start to sleep, the normal thing for an adult is that about 10 minutes pass. When we are below. If there is a range, being above or below it can trigger alarms, such as when the value in a blood test is not within the normal ranges. If it is below, the brain enters a state of “homeostatic hyperexcitability” according to research done for the Sleep Foundation. By this they mean that when the system is so desperate to recover, it ends collapsing when given the chance. And that is why we have three different stages depending on how long it takes us to sleep: The normal range is between 10 and 18 minutes. We speak of pathological drowsiness when it lasts less than 8 minutes. We refer to severe sleep deprivation when we spend less than five minutes. The brain shuts down very quickly. The idea, replicated by experts and based on principles of chronobiology, suggests that instant sleep is the response to chronic restriction. In this way, if for weeks or months you sleep less than necessary, the body accumulates a “bill” that tries to charge himself in every microbreak. Science has wanted to delve into this aspect, and that is why different studies that have been published in Nature and PMC link this ultra-short latency not only with fatigue, but with metabolic alterations and a decrease in cognitive performance. That is why the idea that falling asleep quickly is synonymous with better rest is completely wrong. In fact, research shows that people with this “short latency” often suffer from involuntary lapses of attention and accumulated fatigue which, in environments such as driving or precision work, can be fatal. A long process. The sleep debt is not erased with a night of ‘bingeing’ in bed and getting up at 3 in the afternoon, but studies suggest that this latency can persist during the day. It all depends on what sleep deprivation we have faced our body with. But logically you also have to be careful with this false belief of having rested a lot because the onset of sleep is very rapid. The quality of sleep is only measured by its phases, but in no case does the variable of how quickly I enter the sleep phase come into play. What needs to be done. In the case of a person who falls exhausted at the first yawn, the first thing is to check sleep hygiene. But also be attentive to other indicators such as a possible sleep apneasince this value of sleeping quickly or in any situation is an indication of the presence of this disease that can be really serious and difficult to diagnose. The important thing is that one of the initial symptoms What must be checked in these cases is this poor rest. Images | Shane In Xataka | We thought insomnia was just not being able to sleep. Now we know that there are five different disorders

The V-27 signal warns you where no one warns. Or, at least, where the DGT’s V-16 beacon does not warn

Much has been said about the V-16 beacon. We have told of Where does this invention come from that the DGT will make mandatory? in just a few days and, also, who is doing business with them. It has even been questioned whether or not we are buying really legal beacons. But of all the controversies, the one that has gained the most force due to a purely practical issue has been the issue of its visibility and effectiveness. And it is that the experts themselves have warned that the light is seen little and may be insufficient. From Xataka We have shown our own doubts about whether or not it is really advisable to get rid of triangles. These doubts are generated, in part, by the visibility of the beacon in complicated environments such as a secondary road, especially if we are next to a change in gradient or a secondary road. In this case, we still think that triangles are the best tool but the DGT also includes help that, of course, will not always work. We are talking about the V-27 signal. A notice in exchange for the triangles As we have told you before, When we activate a connected V-16 beacon we have 100 seconds until our position is first submitted. This data is sent through IoT networksknown as “the Internet of Things.” Our position is sent to the DGT 3.0 platform so that they can locate the incident. Once the DGT receives the notice that something is happeningactivates the warning on nearby light panels that an accident or breakdown has occurred in the vicinity so that vehicles drive with caution. This, obviously, does not make much sense on a secondary road where these panels do not exist. But the DGT warns that, in exchange, we will have the signal V-27. This sign is in the shape of a triangle with an exclamation mark inside and three stripes on its right side to represent its “connectivity.” Once DGT 3.0 detects the incident, in addition to sending the warnings to the light panel, it will also activate this V-27 signal that will light on the instrument panel of our car to warn us that we are facing a risky situation. Likewise, the body can activate it for any other reason it considers dangerous, not just by activating a beacon. V-16. Of course, as noted in the Royal Decree that regulates its arrival“this signal, of a voluntary nature, will only be displayed in those vehicles that are connected by telematic means, directly or through a service provider, with the National Access Point for Traffic and Mobility Information“. Therefore, it will not be available in all cars. Is the V-27 signal useful? Yes, because the driver will receive more information about what is happening around him. It must be taken into account that on a highway it is easier to visualize a problem and it is easy to pass by one of the illuminated panels that alert us of any type of emergency. However, on a secondary road it can be very useful since it will be activated before we reach the scene of the accident, right on a type of road where visibility is reduced and where the focus has been placed on limiting the V-16 beacon. We must not lose sight, however, that in order to receive this notice we must have a connected car and, in addition, the car or its provider must be registered with the National Access Point for Traffic and Mobility Information. If not, it will be of no use. Photo | Andri Klopfenstein and DGT In Xataka | The V16 wanted to replace the triangle and reduce risks. They have ended up proving that they can also create them

What kind of lights can interfere with the signal, and how to solve it

Let’s tell you How the lamps can interfere with the wifi of your home, because when you have problems It will not always be the router’s fault. The WIFI of your home can have problems, either because of its location or by The interference of the neighborssometimes you can give problems, and tricks to expand the Wi -Fi signal wave 30 centimeters rule They are not always enough. That is why we are going to tell you why a lamp or bulb can hinder the signal of your wifi, and What types of lighting They are the ones that cause these failures. Thus, you can have a list of usual suspects. Then, we will tell you some tips to prevent these interference from being given. What lamps hinder the wifi There are lighting systems that emit electromagnetic radiation. Not all, but when they do it happens at certain frequencies, and these can interfere with the Wifi signals affecting the quality of the connection. This happens with several specific types of lighting, which are the following: Compact fluorescent lights or CFL: They emit microwave ranges radiation, causing interference in the Wi -Fi signal. Especially when they are near the router or the device that the signal receives. Tube fluorescent: Those lights such as offices or shopping centers, which can also be in domestic kitchens. Its marketing has been prohibited, but if you still have one, they also generate interference due to their electromagnetic radiation. Low quality LED: Although good quality LED lights do not usually give problems, when the quality is low they can emit electromagnetic interference that affects the WiFi. It can also happen with good, but it is not so common, hence it is worth investing in recognized brands. Halogen lamps: They are already unusual, but they can also generate electromagnetic interference. Lamps and lights with metal structures: As with the walls of the walls, this metal can cause signal interference when they are close to the router. What can you do to solve it We have already told you the types of bulbs and lighting that can cause interference in your home. However, There are methods to reduce interference caused by them following some tips. First of all, Place the router away from the light sourcesespecially if they are halogen, fluorescent lamps, or any of the types of bulb or lighting that we have told you above. Whenever possible is recommended Use the 5 GHz band In your Wi -Fi router when it is compatible, or also in your mobiles. Sometimes you can choose between that or 2.4 GHz because your router generates two wifis. This 5 GHz SFNO band less susceptible to interference. In the event that you think the lights are affecting you and you cannot make changes in the router position or the receptors, you can use signal repeaters, Mesh networkssome PLC or wifi repeater and similar. In Xataka Basics | How to amplify the wifi signal: guide with all the ways you have to do

direct signal for smartphones worldwide

Spacex closed a few days ago the greatest purchase of its history. It has nothing to do with rockets, or spacecraft, but it paves the way for Starlink not to leave any corner of the earth without coverage. A little context. On September 8, Spacex announced an agreement which shake again the foundations of the satellite industry: the purchase of the entire spectrum of the band S of Echostar in the United States and its global satellite mobile service licenses. The operation, valued at 17,000 million dollars, is astronomical because it does not seek a short -term investment return, but the strategic domain of the market. With this play, Spacex acquires the necessary lane for its Direct To Cell Cell Call Service, but also eliminates its main power competitor from a strokewhich was the echostar. Charlie Ergen’s company had been accumulating this valuable spectrum for decades without displaying its own network, and now becomes the fuel of Elon Musk’s plans. A giant jump. The current constellation Starlink Direct to Cell satellites has more than 600 satellites in orbit that offer 4G coverage. The Spacex plan is to use its frequencies newly acquired to move to the next level. The next generation of Direct To Cell satellites promises to multiply the current capacity by 100 thanks to the new spectrum and 5G protocols. In practice, this should translate into the total elimination of dead areas: provided you can see the sky you will have coverage, either from your land operator or Starlink. Buy spectrum to eliminate competition. According to an analysis by the specialized consultant TMF Associates, the purchase is designed To corner other competitors such as Ast Spacemobile or the alliance between Apple and Globalstar, forcing them to join Spacex or be left behind. In a characteristic turn of the character, Elon Musk responded to the analysis stating that “almost everything in this article is wrong”, which leaves a cloud of uncertainty about the finest details of the strategy, but not on its impact. Starship, the piece that was missing in the puzzle. Having the best spectrum in the world does not serve to offer global coverage to millions of customers if you can’t launch many Satellites And this is where the second key piece comes in: Starship. After a series of failed test flights, the tenth launch of the world’s largest rocket managed to display a load for the first time. August 26, Starship not only reached space and survived an infernal reentrybut he fulfilled a key mission for the future of Starlink: he successfully displayed a payload. Using a mechanism that Spacex compares with fish candy dispensers, the ship released eight Starlink satellite simulators, which shows that it is already ready to self -financing in the short term. This milestone is crucial. Starship will be the vehicle in charge of launching the new generation Starlink V3 satellites, and the difference in capacity with the Falcon 9 is abysmal: while a Falcon 9 rocket can put into orbit about 22 satellites V2 mini, Starship is expected to deploy much larger batches. Not only more satellites, but much better. The last key of the plan is the technological evolution of Starlink satellites themselves. Starship will not only allow more satellites, but much larger and more capable satellites. According to Spacex herself, a single starship launch with satellites V3 will add 60 tbps capacity to the networkmore than 20 times which achieves a Falcon 9 today. The Starlink V3 also involve an engineering leap, especially because of their navigability. They incorporate new generation hall argon propellers such as the one seen in the header image. According to A SPACEX managerThey destroy the specifications of the already impressive current thrusters and allow more efficient orbital maneuvers. A constellation to dominate them all. Spacex’s strategy is built on a practically unattainable basis by competition. The Starlink Broadband Network has More than 8,300 satellites in orbitmore than all other constellations together. Broadband Internet service offers discharge speeds of 200 Mbps and latencies of 25 milliseconds in the United States, with a total capacity of almost 450 Tbps. And although third generation satellites (V3) will not reach until 2026the Spacex production machine does not stop. The future of Spacex. But the vision of the future goes even further. Spacex recently revealed A new “25 Gbps” mini-raser that will be integrated into its satellites. This technology not only serves for Starlink to communicate with each other creating a mesh in space, but will allow other ships, satellites or space stations to connect directly to the Starlink network as if it were an orbital internet provider. With the purchase of the ideal spectrum, a heavy launching vehicle and a satellite technology that advances at a dizzying pace, Starlink’s goal of eradicating dead the dead coverage areas on Earth has ceased to be a chimera to become an engineering plan in full execution. The world is about to become much smaller. Image | Spacex

We have detected a mysterious and very potent radio signal of a nearby galaxy. And its origin is a complete enigma

In March 2025, an energy pulse as powerful as the one that emits our Sun in several days hit the earth. It lasted just a few milliseconds, but its detection, and above all, the location of its origin, mark a before and after modern astronomy. Now a team from Northwestern University has managed to identify the origin of the fast radio gust (FRB) brighter ever registered. Although there are still many questions to answer. What is a fast radius gust. To understand the magnitude of this finding you must first know what we are talking about. The astronomers themselves describe THE FRB LIKE a cosmic lighthouse of immense power that ignites during a fraction of second In a vast and distant universe. These signals are incredibly energy and travel for millions of light years to reach the earth’s telescopes. Detect one of these bursts It is already an achievement. However, the real challenge is Respond to the origin of these bursts of energy. Until now, the frb that were repeated, which gave scientists multiple opportunities to triangulate the position, had been precisely located. Now they have done it with only one signal. A “photo” with unprecedented precision. The protagonist has been baptized as FRB 20250316A which was detected on March 16, 2025. To achieve this, it is where our current technological capacity enters. Thanks to a telescope network called Chime Outriggerastronomers were able to locate this burst of energy with an amazing accuracy of 13 parsecs, which is equivalent to 42 light years. If we move this measure to the universe itself, we could talk that they have been able to point out a specific house in an entire city seen from space. Something that marks preceding, is that the first time it is achieved for a burst that has apparently been a unique event. An origin that was almost empty. The address from where this signal came to a spiral galaxy called NGC 4141. At that time, all the great telescopes of the world, from the MMT in Arizona to him Keck in HawaiiThey turned to observe that little corner of the universe. Everyone tried to look for some explanation to this event, but what they found did not square them at all. And it is that in the exact place of the outbreak of this signal there is nothing. Not a supermagnnetic neutron star (a Magnetar), Neither a nebula, nor any continuous radio source. A very quiet neighborhood. When looking around the point that scientists had located, you could think that there would be something spectacular. But nothing is further from reality. It was seen that the signal could not come from another close place. Specifically, the formation of stars closest to the localized point is 190 Persecs away. In this way, the origin is located in a really quiet region of the universe. There have been no more repetitions of the event. Despite looking intensely for months, the signal has not reappeared. This is key. Many frb are “repeating”, emitting bursts sporadically. If it were, given its closeness and power, we should have detected weaker pulses. Statistical calculations are clear: the probability that it is a known repeater and we have only seen this bright pulse is very small (with a tension of more than 3.7σ, a very high level of certainty in physics). What could cause this signal. This combination of factors puts the main theories about the origin of FRB. The most accepted hypothesis is that they come from young magnetares, neutron stars with incredibly powerful magnetic fields. These objects are usually born in active star formation regions. The fact that FRB 20250316A is displaced from its “cradle” could mean that the Magnetar He is older of the one that is thought (between 200,000 and 3 million years) and has moved away. However, this clashes with the active life that is presupposed to these objects. The study also rules out other scenarios, such as outbreaks gamma rays Recent The “cleaning” of the environment and the lack of any residual glow in radio or X -rays do not fit with the models of cataclysms such as the Fusion of two neutron starsat least not immediately. The beginning of a new era. Beyond the enigma of the origin of this particular signal, this phenomenon marks a before and after in astrology. The capacity of the Chime/FRB system to locate unique events with this precision The field will revolutionize. It will no longer be necessary to wait for a source to be repeated to be able to study it in detail. Now, astronomers will be able to create a large -scale map of the environments of hundreds of FRB, allowing to compare the unique bursts and those that are repeated every so often. Perhaps in this way we discover that, after all, not all FRB are born from the same type of event. We may be facing two (or more) different phenomena that produce the same type of signal. The universe is plagued by mysteries. From how The stars were formed to him How the ‘big bang’ formedthey still have Many intrigues For our scientists. This makes every time there are more fronts in open -open astronomy And also the hardware field for put our best teams pointing to space with the aim of increasing our knowledge. In Xataka | There is a radio signal arriving at Earth since 1988. The pulsar from which an important mystery is hidden

In 2023 someone hacked the GPS signal of 20 planes. The European alternative Galileo already offers an option to avoid it

A pilot Fly on the Baltic Sea When, suddenly, all his navigation systems told him that he was tens of kilometers of his real position, drawing ghost circles on Russian territory. Weeks before, in the Middle East, More than 20 crews They had reported a “total navigation failure”, forcing aerial drivers to guide them blind. They were not technical problems. They were deliberate attacks on GPS systems, known as spoofing or signal supplantation. In this type of attack, a powerful transmitter on land emits false signals that mimic the satellites, cheating the plane to calculate an erroneous position and route. Already in 2012, a team from the University of Texas showed that it was possible Take control of a civil drone through Spoofing. In 2017 there were the first cases with ships passing through the black sea. Today the Baltic and the Persian Gulf are black points where maritime operators and airlines routinely report similar incidents. Europe’s response is already here. Until now, the aviation sector has avoided a catastrophe thanks to redundant systems and the expertise of the pilots. But The threat is real, it is growing And you need a robust technological solution. Therefore, the Galileo constellation, the European GPS, has just officially activated its Osnma service: An additional security layer that hinders this type of deception without degrading the performance or precision of positioning. How Osnma works. The Open Service Navigation Message Authentication (OSNMA) is a kind of digital authenticity seal available for free For Galileo users. In essence, it is a cryptographic protocol that introduces authentication data into the signaling system itself. Specifically, in the I/NAV message of the E1-B signal; An already reserved space, hence it does not affect service performance. The process to have a compatible receiver is to obtain the cryptographic public key from the GNSS European Services Center. Upon receiving the signal, the receiver uses that key to verify the “digital signature” of the message. If the firm is false or does not exist, the receiver knows that he is being a victim of a hoax and can alert the pilot or the autonomous system. Prevents the Spoofingnot the Jamming. Osnma makes supplanting a Galileo signal exponentially more difficult. However, it does not prevent the Jammingthat is, someone interfere with the signal through a brute force attack That the receptors saturate. It is good news equally: it is no longer enough to issue a false signal; The cryptographic firm in real time, an immense computational feat should also be falsified. OSNMA will not only serve to Increase security in air and sea traffic management. It will also be key to the future of autonomous cars, smart tacographers and road use systems. Even for sectors such as telecommunications, energy and finance, which depend on an ultra -precise time signal to synchronize their operations. Image | ESA, Euspa In Xataka | The GPS has become the Achilles heel of modern aviation. And engineering already has its sustained ready

The drones of the greatest attack against Russia lost the signal before reaching the target. Ukraine had an ace in the manga

On June 1 and the agreed time, trucks parked for weeks in several points from Russia They opened their doors. A swarm of more than 100 advanced drones thus began a mission that was destined for several air bases in Moscow. Upon reaching the designated objectives, explosive loads were automatically activated. The mission was historic for The sophistication level in the Uncianned war. In fact, the drones even lost every signal before achieving the goal. And at that time the algorithms came into play. The face that changes the war. We had slipped it weeks agobut now it has been The Financial Times The one described that AS in the Ukraine manga so that the Spiderweb operation was a success. The war in Eastern Europe has entered a new phase marked by accelerated integration of artificial intelligence In attack and defense systems, and in “Spiderweb”, where the drones successfully attacked Russian military airfields even beyond the Arctic Circle, it was key. A new generation. The operation, carried out by the Ukraine Security Service (SBU), not only evidenced Kyiv’s technical and strategic capacity for enemybut exposed the growing importance of Automation On the modern battlefield. Behind the attack was a new generation of drones designed by the First Contact companydirected by Valeriy Borovyk, whose flagship, The Osastands out for its sophistication, high -end materials and autonomous navigation capabilities resistant to adverse conditions and interference systems. These devices, five times more expensive that conventional drones were scheduled to continue their flight following pre -established routes even After losing signal and automatically detonate when reaching the goal. SBU map that illustrates drone transports in trucks from Cheliábinsk to the five target air bases Assisted autonomy. He counted the medium that the development of these drones has not been exclusive to a single company. Yaroslav Azhnyuk, creator From The Fourth LawHe explained that both Ukraine and Russia are expanding their deployment capacity of autonomous systems in early stages, although still with partial human intervention in the terminal guidance. For a year, Adehnyuk He has delivered To the lines of the Front Systems with these experimental functions, and other Ukrainian companies have followed the same path. The idea of ​​delegating final decisions to AI in environments where signals can be easily blocked by the enemy has become a tactical need rather than a technological ambition. In parallel, the Ministry of Digital Transformation of Ukraine recently announced the activation of carrying drones capable of Fly 300 kilometers and launch two free FPV, thus expanding the operational dimension of these tools in strategic depth. Invisible war. We had already talked about the term With optical fiber. In this war of wear, technology not only responds to advances but also to deficiencies. The lack of anti -aircraft missiles, artillery or ammunition has forced Ukraine to reinvent continuously. Civil foundations like The Prytula Foundationheaded by Bohdan Danyliv, they have contributed hundreds of fixed wing interceptors They have managed to demolish almost 250 Russian drones, demonstrating how improvised solutions have compensated for the shortage of traditional systems. Russia has not been left behind. He has identified Ukrainian drones and has counterattacked with improved modelsmany of them equipped with autonomous technology, optical fiber and even components from American video game consoles, According to services of Ukrainian intelligence. This evolution reveals a technological career in which the borders between civil and military are increasingly blurred. The Russian challenge. It We have explained: One of the most surprising turns has been the effectiveness of Russian drones connected by fiber optic cable, a seemingly rudimentary solution but brutally effective in front of Ukrainian interference systems. This technology, which allows operators to control drones without worrying about electronic blockages, has been decisive in the recent Russian offensive In the Kursk region, where they have made faster advances than at any other time since November. The Ukrainian reaction has been slow. Oleksandr Yakovenko, director of Taf Drones, recognized having underestimated the potential of this technique, and your company now tries to recover land by increasing production to 10,000 fiber optic drones per month, although he admits that they would need to manufacture at least 70,000 to match the Russian offensive capacity. New war balance. It seems clear that drone war It is no longer a complement to the conflict, but its central operating core. In an environment saturated with interference, scarcity of resources and geostrategic pressure, Ukraine and Russia face in a duel where innovation is not a luxury, but A vital imperative. Artificial intelligence, autonomous systems, improvised production networks and unexpected adaptations such as the use of cables or video games are redefining the limits of the possible. Seen, the question that looms over the coming months does not seem to be who has more drones, but who will adapt faster in a war where intelligence, in any of its forms, has become the decisive factor. Image | Ssu.gov.ua In Xataka | The Ukraine War is getting rid, first of all, with drones. And that is leaving an infinite fiber optic trail through the field In Xataka | We suspected that Ukraine drones attack had been destructive. Space images have revealed how much

Webb telescope has been looking for extraterrestrial life for years. He just found the strongest signal so far in K2-18b

The finding. An international team of scientists, headed by researchers at the University of Cambridge, has just made public sulfide detection or dimethyl disulfide in the atmosphere of the exoplanet K2 –18B, which has been observing the James Webb space telescope. On earth, these molecules are only produced by living organisms, mainly marine phytoplankton. It is the strongest evidence so far of a biofirma, a sign of possible extraterrestrial life, outside the solar system. To confirm it, they will take between 16 and 24 hours of observation with the Webb Telescope, according to the study published by The Astrophysical Journal Letters. What is K2-18b. It is what is called a “subneptune”, a planet of 8.6 times the dough and 2.6 times the radius of the earth that orbits a red dwarf in the habitable zone (receiving a flow of energy from its star similar to the earth). It is 124 light years from us, in Leo’s constellation. He is also a candidate for planet Hacéano, worlds that could house global oceans under hydrogen -rich atmospheres. Webb’s first observations have already detected methane and carbon dioxide, which fits with this scenario. Reasons for optimism. When the planet passes in front of its star, part of the stellar light crosses its atmosphere. Each molecule leaves a pattern in the spectrum that scientists associate with molecules. Scientists They have seen twice the same pattern since 2023 With the Miri instrument of the Webb. We are facing the first coherent biofirma on a planet outside the solar system. Life could be more common than we think of planets greater than Earth. The planets made us would enter our external life search radar, today focused on rock worlds such as superstierras. Reasons for caution. Although on earth dimethyl sulfur is biological, researchers admit that in a world under high pressure and with an atmosphere of hydrogen, it could be the result of exotic geochemical reactions. They will need laboratory experiments and models to check.

The alarm signal comes for its accessibility

Félix Juárez, director of the National Institute of Cybersecurity (INCIBE), has described the Model of the Chinese Depseek as “a weapon of mass destruction” during his speech at the Tel Aviv Cybertech forum, according to The world. His statement occurs in a context of increasing concern for open source IASs that eliminate technical and economic barriers for malicious actors. Why is it important. Deepseek It represents a turning point in the democratization of advanced tools of AI. At zero cost, it offers similar to commercial models such as GPT-4but without the ethical restrictions implemented by Western companies. Its accessibility allows anyone, regardless of their resources, to train systems to generate sophisticated malware campaigns, create convincing misinformation or develop applications to destabilize critical infrastructure. The context. China has accelerated its investment in open source AI as a strategy to counteract US advantage in the sector. Deepseek, founded in 2021 by former Baidu and Google employees, represents one of the greatest successes of this policy. Unlike OpenAi or Anthropic, which operate under Western regulatory frameworks, Chinese companies work with state supervision … but without international scrutiny on privacy and security issues. Between the lines. Juarez’s statements not only reflect technical concern but also geopolitical. That a high Spanish position publicly qualifies “a weapon of mass destruction” a Chinese technology in an Israeli forum is a sample of a certain alignment with the US position in the technological war against China. It is striking that these warnings are carried out in Israel, a country with close links with the Western cybersecurity and defense industry. The answer. Juarez proposes to transform this threat into opportunity, through …: International cooperation between public and private sector. Investment in Supercomputing and Data Centers. Accelerated training of cybersecurity specialists. Impulse on initiatives such as NATO Diana Program. Deepen. The true threat is not only Deepseek as isolated technology, but what it represents: the beginning of an era where anyone with a computer and the Internet can access tools that previously required millionaire investments and specialized equipment. We are facing a democratization of capacities that, as Juarez warns, could unleash “a wave of new threats” during the next year, turning cybersecurity into the first line of defense of digital sovereignty. In Xataka | 017 has been attending cybersecurity for five years. The question is who calls and for what Outstanding image | Solen Feyissa in Unspash

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.