(2023-01-28). SOUTHCOM Chief Aims To Increase Imperialist Plunder Of Latin America. popularresistance.org Laura Richardson, the Chief of the U.S. Southern Command, which oversees military operations in Central America, South America, and the Caribbean, spoke about the importance of Latin America's resources for U.S. foreign policy in an interview with the U.S. think tank Atlantic Council. | "Why is this region important?" Richardson asked. "With all its rich resources and rare earth elements, there is the lithium triangle, which today is necessary for technology. Sixty percent of the world's lithium is found in the lithium triangle: Argentina, Bolivia, Chile." She also pointed out that "the largest oil reserves, incl…
(2023-01-27). Detectan virus informático capaz de controlar el móvil y robar cuentas bancarias. cubadebate.cu Expertos en ciberseguridad han advertido sobre la proliferación de un nuevo "malware", el cual ataca principalmente a teléfonos Android. Es capaz de tomar el control del móvil por completo en tiempo real e incluso robar las contraseñas de las aplicaciones de cuentas bancarias.
(2023-01-28). SOUTHCOM Chief Aims To Increase Imperialist Plunder Of Latin America. popularresistance.org Laura Richardson, the Chief of the U.S. Southern Command, which oversees military operations in Central America, South America, and the Caribbean, spoke about the importance of Latin America's resources for U.S. foreign policy in an interview with the U.S. think tank Atlantic Council. | "Why is this region important?" Richardson asked. "With all its rich resources and rare earth elements, there is the lithium triangle, which today is necessary for technology. Sixty percent of the world's lithium is found in the lithium triangle: Argentina, Bolivia, Chile." She also pointed out that "the largest oil reserves, incl…
(2023-01-27). Detectan virus informático capaz de controlar el móvil y robar cuentas bancarias. cubadebate.cu Expertos en ciberseguridad han advertido sobre la proliferación de un nuevo "malware", el cual ataca principalmente a teléfonos Android. Es capaz de tomar el control del móvil por completo en tiempo real e incluso robar las contraseñas de las aplicaciones de cuentas bancarias.