A retiree and his children have stolen millions of dollars to Ford in office material. Indeed, lights, caps and bumper

Although in February this year Audi closed its Brussels plant After 75 years in operation, the road was not simple. In the middle of the workers’ protests, someone had an idea: take the keys of 200 cars, put them in a box and remove them from the factory. Clean, simple and with 200 kidnapped cars whose unit value was around 100,000 euros. As simple as keep a box under the jacket and go through the door. More complicated seems to steal the entire engine of a car. This is what was discovered A few months ago in India. For five years, up to 900 Kia combustion engines were stolen from their plants and has not been clear to what extent some worker of the company itself is involved. However, and although large, one can understand that engines from a factory have been steal if they manage to partially disassemble. But how can one take a car cap? And a bumper? This is what they wonder in Ford where a retiree and two children, company workers, have committed a “billionaire” robbery for more than two years. Hello, dad, I bring you a bumper The information, which comes from Detroit Free Pressa police note echoed in which it was confirmed that four people have been arrested for the theft of pieces of different Ford assembly chains that later sold on Ebay. Among those arrested is a former Ford employee but the identity of any of them has not been revealed so far. The pieces were stolen from three Ford plants, one in Deabane, another on a mounting plant in Michigan and one last in Flat Rock. In Motorpasion and The Drive They point out that three of these four men were family. One of them was a retired father and the other two were his children who had contact with a Ford employee. The extracted pieces were taken to stores where they accumulated for sale. A robbery that, according to the local police, is encrypted in “multimillionaire”. And it is that the four employees would have been subtracting and selling pieces for more than two years. The most curious thing is that it is not small or easy to hide pieces. Among the products found were car headlights but also Bumper and Capóslarge pieces therefore. An agent pointed to Fox That the stores where the pieces were stored were covered to the roof. The investigation is analyzing how these pieces could be taken out of the plant without attracting attention from other employees and will have to discover how they were eliminated from the inventory so as not to attract attention since all the pieces in a mounting plant usually have some type of code that identifies each piece. In addition, from the police they point out that they are still looking for new indications that take them to ships or warehouses where the suspects could save the pieces, taking into account the volume of them and the economic damage that it seems to have caused. Photo | Ford In Xataka | The “Sowing Method” alerted by the Civil Guard: this is the new scam popular in the great parking lots

A former SK Hynix employee is suspected to deliver stolen technology to Huawei

Although not monopolized attention to the same extent that TSMC, Intel or Samsung, the South Korean company SK Hynix is ​​done is One of the main designers and manufacturers of semiconductors of the planet. His specialty is The tuning of memory chipsand it is doing so well that LEADS THE HBM Chips Market so much (High Bandwidth Memory) like that of the DRAM memories. In fact, SK Hynix controls no less than 70% of the integrated HBM memory circuits market, so His leadership in this sector is overwhelming. In addition, it is the NVIDIA supplier if we stick to its GPU to artificial intelligence (AI) Thanks to the high competitiveness of your HBM chips. Samsung has an approximate share of 28%, and Micron touchs 18%. However, the success of SK Hynix is ​​based, as we can intuit, about its capacity for innovation. At the current situation, industrial espionage is the order of the day The Prosecutor of the Central District of Seoul (South Korea) has accused a former SK Hynix employee of illegally transferring technology to the Chinese company Huawei. This person’s identity has not yet transcended, but according to Digitimes Asia He is a name Kim, is South Korean and worked in the subsidiary in China of Sk Hynix until in 2022 he left this South Korean company to join Hysylicon, the Huawei subsidiary specialized in the design of semiconductors. Kim is South Korean and worked at SK Hynix until in 2022 this company left to join Hysilicon Presumably the Prosecutor’s Office is acting at the instances of SK Hynix. And it seems that this last company has discovered that during the negotiation of its hiring Kim gave Hysilicon Secret Information About advanced packaging technology used in the production of 3D NAND and HBM memories, as well as about multiple assembly Chiplets and of the CMOS image sensors. These technologies are protected by the property rights of SK Hynix, and in them largely resides the competitiveness of this company. According to the Kim prosecution he printed and took more than 11,000 photographs of internal SK Hynix files with the purpose of abandoning this last company and using this confidential material to get work in the competition in very advantageous conditions. In fact, according to the researchers of the Kim accusation he presented the material that extracted from SK Hynix at least two Chinese companies. One of them Hysilicon, He finally hired him. An important note: neither this last company nor its matrix, Huawei, asked him to give them commercial secrets, but, according to the Prosecutor’s Office, they accepted them as part of the hiring process. More information | Digitimes Asia In Xataka | China’s future in the chips industry is in the hands of a single company almost unknown: Sicarrier

What is and how to avoid falling and that your data is stolen

Let’s explain WHAT IS THE TMO OF THE FALSE SMS OF A PACO WITH EL Corte Inglésa new scam that has begun to reach many users. The goal is to alarm by informing you of a false payment and lead you to a false website where you can get your access data. In this article we will explain how this scam works, and also where it seems to come. Besides, we will teach you Identify this type of deceptionwhich is very important to know that they are trying to scam and be able to avoid it. What is this type of scam A few days ago we found that the database of The English Court had been hacked. In this event Banking data were not compromised No user passwords, but other data such as telephone numbers seem to have leaked. Taking advantage of this confusion and the one we can not be very sure of whether our card has been filtered or not, a group of cybercriminals is sending some SMS in which They tell you that a purchase has been made with your account. In this same message you add a web address in which they say you can claim if the purchase has been a mistake. The SMS includes as title “Financiera Corte Inglés”, with which they try to confuse you to pass through this entity. In addition, they have altered the name of the sender so that some acronyms that may correspond appear. This is the first step to confuse users. In addition to this they use other tricks, such as including an amount of money large enough to alarm And try to make panic and hurry to lower our guard. They also add a web address whose URL contains the name of this entity, although the domain is a totally different one. The address points to a website that in some cases will already be blocked by your browser, but that can be A clonic page where your user data is requested or your bank data. The idea is that you write them and send them voluntarily. Although for those who already have knowledge of this type of scams, the deception is more evident, the cybercriminals have to send these messages massively, and that among the thousands of users to whom they are sent by there are some who pique and who can steal the account or their bank data. How to detect this scam The first clue that the SMS is false can be in The composition of the text itself. It is usually written in an incorrect or unprofessional way, even with some point where there should be a comma. This should be something that already caught your attention. But the most important thing is look at the web address included In the SMS. In the body of the direction you can put some name that refers to El Corte Inglés, but notice that at the end of the link there is a URL that does not correspond. By this I mean that if an address has a point in the middle, the main website to which it is what appears after the name. For example, if you have elcorteingles.paginafalsa.com, even if you put ELCORTEINGLESthis is a subdomain, as a secondary page, and the main one is what appears after the point, in the case of our example .paginafalsa.com. The real messages of the Financiera El Corte Inglés also begin by putting FinancialCorteinglesand this is something that cybercriminals have imitated. Normally the company will not include any web address In your real messages, and it is something that you must take into account. The best thing in these cases is that, given the doubt, you enter the web manually of financialelcorteingles.es either elcorteingles.es To look in your account if there is any payment. The website always writes manually, and Never enter from the link of an SMSbecause it is what cybercriminals want. In Xataka Basics | How to change your password at El Corte Inglés and choose a new one for your user

Someone has stolen $ 1.5 billion in a cryptocurrency market. It is the greatest crypto hacking in history

The cryptocurrency market had been encouraged again months ago. Everything seemed relatively quiet, but two serious events in this segment have brought us again those sensations of distrust and insecurity. And it will not be easy to get rid of them. A historical theft. Last Friday someone managed to hack the market for the sale of BYBIT cryptodivisas. The firm He quickly warned how they had detected “unauthorized activity” in their systems. It was the greatest cryptocurrency hacking in history: it is estimated that the attackers (s) managed to steal $ 1.5 billion in the form of ETH. The previous most important robberies had been the 470 million dollars stolen in the Mt Gox hacking In 2014, the 530 million coincheck In 2018 or 650 million from Exploit Ronin Bridge In 2022. Lazarus group as suspicious. At the moment the firm does not know how the hacking was performed, but apparently the company’s laptops were not compromised and the problem affected Safe, the “cold” purse of the platform. Cybersecurity consultant Arkham Intelligence indicates that Lazarus Group had been responsible, a statement based on The investigation of the expert in this area Zachxbt. Bybit says to be covered. Ben Zhou, CEO of Bybit, highlighted How his criptomoned sale market had enough reserves to cover hacking and cryptocurrency withdrawal – especially, especially, Stablecoins– Although for a few hours They blocked some functions of their purses to guarantee their safety. A few hours ago Zhou indicated how they had managed to cover virtually all funds. Panic in Bybit. The theft has caused many users to withdraw funds in Bybit for fear that these funds will also end up being stolen. As indicated In Coindeskin the hours following the HACKEO Bybit he saw how their clients withdrew 4,000 million dollars in funds. Of the 16.9 billion dollars managed in crypto assets in Bybit, the firm went to manage 11.2 billion dollars According to defillama data. Can Ctrl-Z do to the block chain? Some users asked if it would be feasible to make a kind of “roll-back” of the Ethereum block chain. That would allow us to undo the changes made by hackers and return the status of that great book of accounts to how it was before hacking, but it is not clear that this is possible. Experts indicate according to Coindesk that something like this would be possible, but the interactions between the Smart Contracts and their internal architecture make it not easy. It would be necessary to reach a consensus, and could even cause a division of the Ethereum block chain in two. Just when in the US the thing was encouraged. The robbery occurred just the day Coinbase had managed to reach an agreement with the United States Securities and Exchange Commission leave the demand without also being issued. Donald Trump’s re -election had promoted the value of cryptocurrencies, but since his appointment we have lived several worrying events. Memecoins, Trump and Milei. The scandals have been especially primed with the Memecoins created or supported by Trump and especially by Javier MileiPresident of Argentina. Both grew in a brilliant value and then collapsed in a mysterious and disturbing way, which points to possible fraud in which a few privileged were winning while hundreds of thousands of people lost their investments in these cryptodivisas. Distrust and insecurity, the eternal condemnation of crypts. The scandals with these memecoins and the spectacular bykit hacking return us the constant feeling of insecurity and distrust that the cryptodivisas have always generated. The institutional interest and a certain tranquility in recent times seemed to have softened that environment, but these new events will probably make more people think twice before investing in this type of assets. It is a bad idea to leave your cryptocurrencies in an “Exchange”. The truth is that these robberies have confirmed that their security measures can end up being insufficient to protect their customers’ funds. The most recommended form of experts to save these cryptocurrencies is do it in physical pursesdo not leave them in the purchase market for sale of cryptocurrencies (“Exchange”). Image | KANCHANARA In Xataka | A British did not let his album search with Bitcoins in the trash for years: now he considers buying the landfill

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.