• Plot 62 by TAEP/AAP: A Dynamic Commercial Core in Shuwaikh Industrial Area
    archeyes.com
    Plot 62 | Mohammad Taqi AshkananiPlot 62 by TAEP/AAP, located within the Shuwaikh Industrial area in Kuwait, is a thoughtful commercial space that bridges the local urban landscape with the demands of modern retail and office spaces. Positioned at a chamfered corner plot intersecting 21st and 26th streets, this project redefines the area by filling a notable urban volumetric gap in Shuwaikhs industrial and commercial hub. The designers aimed to craft a building harmonizing with its industrial surroundings while introducing a forward-thinking, contemporary identity.Plot 62 Technical InformationArchitects1-5: TAEP/AAPLocation: Shuwaikh Industrial, KuwaitArea: 11,923m2 | 128,338Sq. Ft.Year of Completion: 2024Photographs: Mohammad Taqi AshkananiThe building is organized around an open flexible central courtyard, suitable for several different types of use, where to is directed all the human flux. TAEP/AAP ArchitectsPlot 62 Photographs Mohammad Taqi Ashkanani Mohammad Taqi Ashkanani Mohammad Taqi Ashkanani Mohammad Taqi Ashkanani Mohammad Taqi Ashkanani Mohammad Taqi AshkananiStructural and Functional LayoutTAEP/AAP approached this project with an architectural philosophy that balances simplicity with functionality. The buildings rectangular volumes and neutral-toned facades create a calm, composed visual presence that complements the rugged industrial fabric of Shuwaikh. Despite its minimalist facade, the building establishes a striking identity in the area through refined design choices, such as expansive glazing and dynamic facades that interact with the streetscape. This fusion of form and context is emblematic of TAEP/AAPs sensitivity to urban integration, allowing Plot 62 to emerge as a new architectural landmark in the area.The internal structure and organization of Plot 62 are tailored to support a diverse array of commercial activities, achieving a flexible yet efficient spatial hierarchy. With three above-ground levels and one underground level, the building offers a variety of spaces, including retail outlets, offices, workshops, and warehouses. This careful layering of functions allows for a seamless coexistence of different commercial entities within a single structure, each occupying its designated space while benefiting from shared amenities and infrastructure.At the heart of the building lies a spacious, open-air courtyard designed to serve as the central social hub of Plot 62. This courtyard not only enhances the visual permeability of the structure but also facilitates human flow between the different areas. The central square is flexible and adaptable, serving as a dynamic focal point where users can gather, interact, or simply pass through, seamlessly connecting the various levels and functions. The projects three street-facing facades further engage with the urban environment, allowing visibility into the retail and commercial spaces while showcasing branding and advertisements that energize the street-facing elevation.Technical Aspects and InfrastructurePlot 62s infrastructure exemplifies technical rigor, accommodating complex mechanical, electrical, and plumbing (MEP) requirements and addressing the high demands of a mixed-use commercial building. The MEP design, directed by Ruben Gonalves and Joo Catrapona, integrates innovative solutions that support the buildings diverse activities, from high-capacity retail areas to flexible office spaces. Each floor has been engineered to meet energy requirements, optimize ventilation, and enhance climate control, ensuring comfort and efficiency for occupants and visitors alike.Accessibility is another crucial component of Plot 62s design, with carefully considered circulation paths and mobility solutions. Multiple access cores, exterior stairs, and partial connectionssuch as car elevatorsenable fluid movement across the buildings levels, accommodating the demands of high-traffic commercial use. The technical roof and specialized compartments throughout the building demonstrate a commitment to meeting infrastructural needs without compromising the aesthetic integrity of the structure. The design achieves a balance between functionality and visual impact, creating a streamlined yet highly functional commercial environment.Architectural Impact and Contribution to the Urban LandscapePlot 62s architectural identity lies in its simplicity and functionality, achieved through an understated palette of neutral tones and raw materials that align with the industrial character of Shuwaikh. This restrained aesthetic not only respects the surrounding urban fabric but also introduces a contemporary elegance that distinguishes it as a modern commercial hub. TAEP/AAPs approach to design reinforces the buildings presence as a refined addition to the urban landscape, inviting interaction and encouraging foot traffic through its open facades and engaging street-level design.Beyond its architectural form, Plot 62 contributes to the social and commercial vibrancy of Shuwaikh. Its central courtyard fosters a sense of community among users, creating a shared space where various commercial activities can converge. This design strategy positions Plot 62 as a catalyst for economic activity, inviting businesses, workers, and customers to engage in an interconnected urban environment.Plot 62 PlansFloor Plan | TAEP/AAPLevel 1 | TAEP/AAPSection | TAEP/AAPAxonometric | TAEP/AAPPlot 62 Image GalleryAbout TAEP/AAPTAEP / AAP is a multidisciplinary architecture and design firm with studios in Kuwait, Portugal, and France, known for its innovative and context-sensitive approach to urban and commercial projects. Led by a diverse team of architects and designers, TAEP / AAP blends local cultural influences with contemporary design principles, crafting spaces that enhance urban interaction and meet complex infrastructural demands. Their projects, like Plot 62 in Kuwaits Shuwaikh Industrial area, reflect a commitment to flexible, functional spaces that integrate seamlessly into the urban fabric, fostering community engagement and responding to the evolving needs of modern cities.Notes & Additional CreditsLead Architects and Designers: Abdulatif Almishari, Rui Vargas, Carla Barroso, Telmo Rodrigues, Joo Costa, Antnio Brigas, Elvino Domingos, Gonalo Silva, Nuno Roque, Mariana Gouveia, Abdul Aziz, Lionel Estriga, Pedro Miranda, Bruno Alves, Tiago Brito, Tiago Lopes, Duarte Correia, Hassan Javed.MEP Engineers: Ruben Gonalves, Joo Catrapona, Mohamed Hassan, Ahmed Shawqi Sadeeq, Ron Favor, Bruno Simes.Graphic Design: Fbio Dimas, Aquilino Sotero.Site Supervision: Mohammed Shata, Marwa Marzouq, Ahmed M.Quotab, Roderick Mangampo, Shoaib Mujahid, Ahmed Abdulaziz, Hassan Javed.Structural Consultant: R5 Engineers.
    0 Comments ·0 Shares ·138 Views
  • Forge Projects land remediation project is about restoring the relationship between its site and history
    www.archpaper.com
    Driving up the steep gravel driveway at Forge Projecta nonprofit Indigenous arts initiative in Ancram, New Yorkfirst you see, then you hear, the landscape. In the late-summer sun, black-eyed Susans, shoulder-high goldenrods, and wispy native grasses appear to shimmer as they catch the light when the breeze ripples through. Open your car door and you hear the chirping of birds and buzzing of crickets, katydids, and bees. Just a few years ago, the scenery at Forge was different: It was a neatly shorn lawn like youd find in the suburbs. The ongoing transformation of that lawn into a biodiverse meadow is the result of Forge Project restoring the principles of Indigenous land stewardship to its 60-acre site. As beautiful as the meadow is today, aesthetics are secondary to the mission of the organization: Forge is committed to developing a mutually beneficial relationship between the land and the people who use it.Forge Project is notably home to Chinese artist Ai Weiweis sole work of architecture in the U.S. (Courtesy Forge Project)This work is really meant to interrupt the ways that Western understandings of conservation often still reproduce an extractive relationship with the land rather than Indigenous worldviews that understand our interdependence with it, said Sarah Biscarra Dilley, director of Indigenous programs and relationality at Forge and a member of the Northern Chumash tribe.Forge is located on the ancestral lands of the Stockbridge-Munsee Band of Mohican Indians, a tribe that lived there until the United States government forced them to relocate multiple times in the 17th and 18th centuries. Today, most people know the area as the Hudson Valley, one of the most influential regions in the United States with respect to instilling Eurocentric ideologies about land and landscape in the West. Here, artists like Thomas Cole, Frederic Church, and other Hudson River School painters portrayed sublime landscapes that romanticized myths about untouched wilderness and national expansion. Meanwhile, European settlers clear-cut the regions forests to supply timber and fuel and to make space for farming. This history is expressly visible at Forge Project from the position of its headquartersa residence that Ai Weiwei designed for an art collector in 2006. Most of the landscape around the house was either European lawn grass or hay (evidence of agriculture) with a few ornamental trees. Just beyond the homes roughly 30-acre clearing is forest.Earlier this year, Forge Project, which was founded in 2021, transitioned its leadership model to be Native-led, which included forming an Indigenous steering council and developing a memorandum of understanding with the Stockbridge-Munsee Tribal Council. The organization took a similar approach to its landscape. It developed a vision and goals document for the land remediation work in consultation with the Stockbridge-Munsee Tribal Council; Misty Cook, a member of the Stockbridge-Munsee tribe and herbalist; landscape architect Jamie Purinton; botanist Claudia Knab-Vispo; and meadow specialist Beth Romaker.Dramatic sunrises and sunsets make for spectacular performances over the hills. (Courtesy Forge Project)Biscarra Dilley explained that developing a process for managing the site was a structural response to the structural problem of colonization. While land acknowledgments reference the violence of colonialism, the reparative work Forge is doing is an example of what might come after.Were building on a relational way of doing things, which is central to how we work, Dilley said. Its understanding the land not as it has been conceptualized through settlement something inanimate or somehow objectified but understanding place as an interlocking and interdependent set of relations. Were not just talking about the plants; were talking about all of the life that the land supports.Its a metaphorical way of exploring what land back might look like. While the Stockbridge-Munsee have sought the return of their land, like at Monument Mountain, they have not requested the same of Forge Projects site. But if they do, we will have been stewarding the land in alignment as best we can with their protocols, said Paloma Wake, strategy and operations manager at Forge. So if it does come back to them, itll be in a better place. Forge and the landscape designers mapped the landscape and took account of the plant communities in various zones. Then they thought about how native plants could be invited into the landscapea term that comes up often when discussing Forges remediation work and speaks to the relational method of caring for the land. Cooks 2013 book Medicine Generations influenced the plant mix. We drew up this long list of plants that theoretically would be acceptable, Knab-Vispo explained. And then it was really a matter of looking at the site conditions and who would actually be happy there.Some areas, like the lawn, had no native plants, so the team decided to take a high-intervention approach to that area. This entailed the complete removal of all the grass (mostly Kentucky bluegrass, which is of European origin), tilling the soil, applying a horticultural vinegar, and reseeding it with a custom meadow mix. The plants of European origin were a profound reminder of the hard and painful history of colonialism, so their removal felt like a significant act of reclamation as much as remediation, Purinton said. For this reason, the landscape design team also decided to part with the ornamental weeping cherry trees and yellow magnolias that lined the driveway.A volunteer learns about a native plant species. (Courtesy Forge Project)Other wetter, rockier parts of the site had more biodiversity. Here, the team opted to remove plants they didnt want to seelike purple loosestrife and multiflora roses, species that grow aggressively and crowd out native onesand nurture or add the varieties they wanted to see. Theres an understanding that even though some of the plants might not be native to the area, they are playing a role in the landscape. Small yellow trefoils, for example, act as nitrogen fixers. Plants will grow where theyre needed, even if were not ready for them, Wake explained.Today, much of the removal process takes place slowly, by hand. It mostly happens during Meadow Work Days, which Forge Project, Knab-Vispo, and Purinton lead. During these afternoons, volunteers come to help selectively remove discouraged plants. In exchange, they learn about the landscape. This type of relationship building is at the heart of the remediation work. Were learning alongside the land and inviting people into that process, Wake said. Instead of putting culturally significant plants on display, like in a clearly labeled medicine garden, the Forge Project landscape encourages people to take the time to learn about them and add dimension to the richness they are experiencing.Volunteers work during the institutions Meadow Work Days. (Courtesy Forge Project)While parts of the meadow might appear to be uncultivated by Western standards, it is still tended. If left alone, the surrounding forest would grow back into the cleared meadow. Part of the ground maintenance includes cutting back saplings that might crop up. But what exists now are more plants that help pollinators and reflect the culture at Forge Project. I always like to point out that the term restoration gets used with different reference points, Knab- Vispo shared. At Forge Project, we dont try to restore an ecosystem that has never existed there before. Were inviting more native plants back into the current landscape, which reflects centuries of European-style land use andin some placesis dominated by European plants.Forge is still experimenting with its model. Its been a little over 18 months since it embarked on this remediation work, and as time goes on, the model will evolve as the organization learns and listens to what the land wants to do. As Biscarra Dilley reminds us, The land has agency.Diana Budds is a design journalist based in Brooklyn, New York.
    0 Comments ·0 Shares ·150 Views
  • www.archpaper.com
    The JFK Community Center in Buffalo, New York, designed by Robert T. Coles, the first Black Chancellor of the AIA, is just one of a handful of projects that has received funding from the National Trust for Historic Preservations Conserving Black Modernism campaign. The program now entering its third iteration is a part of the National Trusts larger African American Cultural Heritage Action Fund. Today, the foundation announced a third round of funding for the Conserving Black Modernism program. An additional $1.55 million will be allocated to support modern buildings designed by Black architects and designers. This brings the total investment for the program up to $4.65 million. Launched in 2017, the National Trust for Historic Preservation launched its African American Cultural Heritage Action Fund, in an effort to invest in and restore cultural assets to use preservation as a force for enacting positive social change. Conserving Black Modernism, the campaign within the Action Funds National Grant Program, supported by the Getty Foundation, is dedicated to persevering historic modernist buildings created by. To date, the Action Funds National Grant program has funded 304 Black historic sites across the country.Many of the current funded projects include churches and university buildings, such as the Ira Aldridge Theater at the College of Fine Arts at Howard University. Completed in 1961, the theater was designed by Black architects Paul R. Williams, and Hilyard Robinson. Robinson was the first Black graduate to earn an architecture degree in Columbia GSAPPs history. Important buildings continue to be threatened, and a third year of Conserving Black Modernism will deliver much needed project support and critical training in communities across the country to ensure a robust network of professionals are in place to care for this heritage into the future. said Joan Weinstein, director of the Getty Foundation in a statement.The Getty Foundation grant will fund renovation and preservation projects and facilitate educational opportunities and professional networking at the various sites. Additionally, it aims to strengthen partnerships among the Action Fund, Getty, Black heritage networks, grantees, and national stakeholders dedicated to preserving sites of Black-designed modern architecture. African American architects and designers have been left out of the modern architecture movement for over a century. Because of this, many pioneers of the Black modernism movement remain unknown, despite the incredible work they have done to fuel innovation, experimentation and push the limits of how people interact with the built environment, said Brent Leggs, executive director of the Action Fund and senior vice president of the National Trust. With the support of the Getty Foundation, the Action Fund will continue to leverage historic preservation as a force that ensures the contributions of Black people and culture are protected and included in the narrative of our nations heritage.This is the Getty Foundations 18th grant to the National Trust for Historic Preservation. Applications for this next round of Conserving Black Modernism grants will be accepted beginning January 10, 2025. Grantees will be announced in July 2025. For more information, you can click here.
    0 Comments ·0 Shares ·158 Views
  • Poland Springs Beach House // 1909
    buildingsofnewengland.com
    The Poland Springs Resort in Poland, Maine, brought thousands of visitors to the once sleepy community to take in the clean air and healing spring waters on the grounds, and eventually built recreational facilities to keep guests entertained for summers. An 18-hole golf course on the grounds was originally designed by Arthur Fenn in 1896 and redesigned by Donald Ross in 1915; and the Ricker family who owned and operated the resort, sought to take advantage of the nearby Middle Range Pond for guests. In 1909, this 1909 eclectic Queen Anne beach house was built on the northwest edge of Middle Range Pond. For twenty-four years, it was set over the water, supported on piers, but in 1932, it was moved to the east and was set on land. In 1982, the building was remodeled to a private home, now available for rent.
    0 Comments ·0 Shares ·136 Views
  • Hiram Ricker House // 1893
    buildingsofnewengland.com
    The Hiram Ricker House sits in the Poland Springs Historic District of Poland, Maine, and was built as the personal residence of its namesake, who developed this formerly sleepy town into a destination in the 19th and 20th centuries. Hiram Ricker (1809-1893), the son of Wentworth Ricker and Mary Pottle, helped turn his fathers country inn in Poland into a popular late 19th century resort, bringing in droves of tourists to take in fresh air and the healing natural spring water. He and his wife, Janette (Bolster) Ricker had six children, all but one of which helped run the resort. This Queen Anne style residence was designed by Lewiston architect, George M. Coombs, and is set back down a long drive overlooking the resort grounds. Sadly, Hiram Ricker died the same year his residence was built, but the home was occupied by the Ricker Family for years after, notably by Hirams son, Hiram Weston Ricker. It is covered in later siding, but the trim details are preserved and typical of high-end Victorian homes of this period in Maine.
    0 Comments ·0 Shares ·134 Views
  • Empowering and Protective Bodies Merge in Laura Bergers Metaphysical Paintings
    www.thisiscolossal.com
    Ghost Garden. All images courtesy of Laura Berger, shared with permissionEmpowering and Protective Bodies Merge in Laura Bergers Metaphysical PaintingsNovember 12, 2024ArtKate MothesIn complementary shades of blue and orange or pink and green, Laura Bergers oil paintings (previously) meld embracing figures with botanicals, landscapes, and celestial phenomena. Women lounge comfortably in a steam bath or walk across an expanse of dunes, often rendered lightly transparent as if floating over or absorbing their surroundings.Berger situates the figures interactions in the center of the composition, bending and arranging limbs, foliage, fabric, or strings of stars into intimate, metaphysical geometries.ResurfacingHer imagery adopts a subtle rhythm, sometimes even near-symmetry, in a nod to spirituality and transformation. Emanating empowerment and a sense of safety, the women wrap around one another in endearing, protective collectivity.Berger will have work in a booth presented by Mama Projects at Untitled Art Fair, which runs December 4 to 8 in Miami Beach, and will be part of the exhibition Ultraviolet Catastrophe at The Pits Palm Springs location, which is scheduled to open on December 17.Find more on the artists website, and follow updates on Instagram.Desert WalkingThe Steam BathNight ThoughtsBehind the GardenThe GarlandTracing Your OutlineTransienceNext article
    0 Comments ·0 Shares ·169 Views
  • Endless Fields of Detritus Blanket Cssio Vasconcelloss Aerial Composites
    www.thisiscolossal.com
    Detail of Air Force. All images courtesy of Cssio Vasconcellos and Nara Roesler Gallery, shared with permissionEndless Fields of Detritus Blanket Cssio Vasconcelloss Aerial CompositesNovember 12, 2024Kate MothesWhere do jets go when they no longer fly? What happens to shipping containers when they arent useful anymore for cargo? The answer is invisible to most of us, but for Cssio Vasconcellos, abandoned trains, planes, and automobiles are far from forgotten.For more than four decades, the So Paolo-based artist has been fascinated by the relationship between humans and the landscape. Over the years, his work has captured dramatic impressions of sprawling cities around the globe, often from the air, spurring an ongoing series called Collectives that condenses details of urban infrastructure like highways and parking lots into sprawling, all-over compositions.Collective 11: AirplanesCollectives 2, to which these images belong, focuses solely on the mesmerizingand mind-bogglingquantity of scrapped vehicles and metal indefinitely parked in nondescript places. Vasconcellos draws from tens of thousands of aerial photographs he has made of junkyards, scrap heaps, airplane graveyards, and dumps to create remarkable, large-scale composite images.The artist has mapped all of the junkyards around So Paolo, plus numerous more near the Brazilian cities of Cubato, Santos, and Rio de Janeiro. He has also documented desert landscapes in the U.S. that serve as final resting places for commercial airliners and military jets.Over, for example, considers numerous associated meanings, like overview, all-over, overdose, or game over. The title references not only excess but the overflow of visual information in contemporary society.Seeing an image like this is to make clear that there is no throw away,' Vasconcellos says in a video about OVER, which took him about a year and three months to complete. This volume of things that are in the work they are out there, he adds. I just put them together.Detail of OverThese photos may look like post-apocalyptic scenarios, but they could be our future, the artist says in a statement. We still have to learn that by throwing things away and taking them out of our sight, we dont make themdisappear. In fact, they keep existing somewhere else, outliving us mostof the time.Vasconcellos cuts out individual shipping containers, trucks, dumpsters, and piles of detritus in a meticulous and time-consuming digital process. He never repeats an element in a composition, and each piece is scaled and situated so that the shadows align with the directionality of the light. He then adds dust and dirt to the surfaces, simultaneously emphasizing the patina of time and an eerie sense of timelessness. Devoid of people, Vasconcelloss images nevertheless describe the human predilection to produce, consume, and cast aside. Its kind of nonsense, because there are some paths, but you dont really understand how a person or a car can get in thereor get out, Vasconcellos says. It is a possible world, but at the same time, an absurd one.Vasconcellos is represented by Nara Roesler Gallery, and you can explore more of his work on his website and Instagram.Collective 12: BoatsCollective 10: ContainersAir ForceCollective 7: Metal ScrapDetail of Collective 7: Metal ScrapCollective 9: Scrap DumpsterPrevious articleNext article
    0 Comments ·0 Shares ·167 Views
  • Alarming rise of fake legal requests: What it means for your privacy
    www.foxnews.com
    Published November 12, 2024 10:00am EST close Tips to protect yourself against bank scams Scammers often ask for answers to secret questions for crucial information needed to access accounts. Phishing emails are one of the most common tricks scammers use, but theyre usually easy to catch if you pay attention. Awkward grammar, random details and, most importantly, an unofficial email address are dead giveaways. For example, you might get an email saying your Apple IDs been disabled, but the senders email wont actually be from Apple. Now, though, scammers are finding ways to get around this.According to the FBI, theres been a recent rise in cybercriminal services using hacked police and government email accounts to send fake subpoenas and data requests to U.S.-based tech companies.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletter! Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)What you need to knowTheFBI has seen a spike in criminal forum posts about emergency data requests and stolen email credentials from police departments and government agencies. Cybercriminals are getting into compromised U.S. and foreign government email accounts and using them to send fake emergency data requests to U.S.-based companies, which exposes customer data for further misuse in other crimes.In August 2024, a popular cybercriminal on an online forum advertised "high-quality .gov emails" for sale, meant for espionage, social engineering, data extortion, emergency data requests and more. The listing even included U.S. credentials, and the seller claimed they could guide buyers on making emergency data requests and even sell real stolen subpoena documents to help them pose as law enforcement.Another cybercriminal boasted about owning government emails from over 25 countries. They claimed anyone can use these emails to send a subpoena to a tech company and get access to usernames, emails, phone numbers and other personal client info. Some con artists are even hosting a "masterclass" on how to create and submit their own emergency data requests to pull data on any social media account, charging $100 for the full rundown. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)How this phishing scam worksWhen law enforcement, whether federal, state or local, wants information about someones account at a tech company, like their email address or other account details, they typically need a warrant, subpoena or court order. When a tech company receives one of these requests from an official email address, theyre required to comply. So, if a scammer gets access to a government email, they can fake a subpoena and get information on just about anyone.To bypass verification, scammers often send emergency data requests, claiming that someones life is at risk and that the data is needed urgently. Because companies dont want to delay in case of an actual emergency, they may hand over the information, even if the request turns out to be fake. By portraying it as a life-or-death situation, scammers make it harder for companies to take time to verify the request.For example, the FBI reported that earlier this year, a known cybercriminal posted pictures on an online forum of a fake emergency data request theyd sent to PayPal. The scammer tried to make it look legitimate by using a fraudulent mutual legal assistance treaty, claiming it was part of a local investigation into child trafficking, complete with a case number and legal code for verification. However, PayPal recognized that it wasnt a real law enforcement request and denied it. Illustration of a person receiving a phishing email (Kurt "CyberGuy" Knutsson)What can companies do to avoid falling for these phishing scams?1) Verify all data requests: Before sharing sensitive information, companies should verify every data request, even those that look legitimate. Establish a protocol for confirming requests directly with the agency or organization that supposedly sent them.2) Strengthen email security:Use email authentication protocols like DMARC, SPF and DKIM to block emails from unauthorized sources. Implement anti-phishing filters to detect suspicious content in messages.3) Train employees on phishing awareness: Regular training sessions on phishing scams can help employees recognize red flags, such as urgent language, unusual requests or emails from unknown addresses. Employees should be encouraged to report suspicious emails.4) Limit access to sensitive data: Restrict who can view or share sensitive customer data. Fewer people with access means fewer chances for accidental or intentional data leaks.5) Implement emergency verification procedures: Have a clear verification process in place for "emergency" data requests, including steps for double-checking with higher management or legal teams before responding to any urgent request for customer information. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Is there something you need to do?This particular phishing scam mostly targets big tech companies, so theres not much you can do directly. However, its a reminder that you shouldnt automatically trust an email, even if it comes from a .gov address. Here are some steps you can take to stay safe.1) Double-check email addresses and links: Even if an email looks official, take a moment to check the senders email address and hover over any links to see where they actually lead. Be cautious if anything looks off. The best way to safeguard yourself from malicious links is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.2) Enable two-factor authentication (2FA):Use2FA for all sensitive accounts. This extra layer of security helps protect you even if your login credentials are compromised.3) Stay updated on phishing scams:Keep an eye on the latest phishing tactics, so you know what to look out for. Regular updates help you spot new types of scams before they affect you.4) Verify suspicious requests:If you get an unexpected email asking for sensitive info, contact the sender directly through an official channel to confirm the request. Illustration of a scammer at work (Kurt "CyberGuy" Knutsson)Kurts key takeawayScammers are taking phishing emails to a whole new level. I often recommend checking the email carefully when you receive anything suspicious to see if its legit. But now, since scammers can even access government emails, you need to be extra cautious. This phishing scam seems to target mostly big tech companies, so its on them to strengthen their security and verify every request thoroughly before sharing any user information. It's also up to governments worldwide to protect their digital assets from being compromised.Whats your stance on how governments are handling cybersecurity? Are they doing enough to protect sensitive data? Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments ·0 Shares ·133 Views
  • Prada's out-of-this-world spacesuit for NASA
    www.foxnews.com
    Published November 12, 2024 6:00am EST close 'CyberGuy': Prada's out-of-this-world spacesuit for NASA Kurt Knutsson discusses how Axiom Space and luxury designer Prada are collaborating on NASA's Artemis III spacesuit design. In an unexpected yet fascinating collaboration, Axiom Space has joined forces with the prestigious luxury Italian fashion house Prada to design the next-generation spacesuit for NASA's Artemis program. This partnership marks a significant shift in how spacesuits are conceived, merging high fashion with advanced engineering.IM GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYSEnter bysigning up for my free newsletterhere! AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)The need for new spacesuitsNASA has been using the same extravehicular activity suits since 1982, and there have been no new designs for lunar missions since the Apollo program ended in 1972. To address this gap, NASA awarded Axiom Space a contract worth $228 million in 2022 to develop a modern version of the Apollo suit, leading to the creation of theAxiom Extravehicular Mobility Unit (AxEMU) suit. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Blending fashion with functionAt first glance, involving a fashion designer in an engineering project may seem unusual. However, Axiom and Prada's collaboration highlights an innovative approach to spacesuit design. The AxEMU suit incorporates aesthetic considerations alongside functionality, reflecting a trend seen inprevious designs, such as those for SpaceX's Dragon astronauts. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Key features of the AxEMU SuitAdaptive fit: Unlike previous suits tailored for individual astronauts, the AxEMU is designed to fit 99% of both males and females, enhancing comfort and usability.Advanced materials: The suit features high-performance materials developed through Prada's expertise, ensuring durability against lunar conditions.Enhanced mobility: Innovative joint designs allow for a greater range of motion, enabling astronauts to perform tasks more effectively.Safety innovations: The AxEMU includes redundant systems and self-diagnostic capabilities to ensure astronaut safety during missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Unveiling at the International Astronautical CongressThe AxEMU was formally unveiled at the International Astronautical Congress in Milan. During this event, both Axiom Space and Prada emphasized their commitment to pushing boundaries in space exploration through collaborative efforts.Russell Ralston, executive vice president of extravehicular activity at Axiom Space, said,"We are pioneering a new era in space exploration where partnerships are imperative to the commercialization of space."Lorenzo Bertelli, Prada Group chief marketing officer, added,"Going beyond our limits is one of the companys values that perfectly reflects the spirit of the Prada brand." AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Testing and future prospectsThe AxEMU is currently undergoing extensive testing, including simulations designed to mimic lunar conditions. It is expected to enter its critical design review phase in 2025. This rigorous testing process aims to ensure that astronauts are equipped with reliable and advanced capabilities for future lunar missions. AxEMU space suit (Axiom Space) (Kurt "CyberGuy" Knutsson)Kurt's key takeawaysWho would have thought that high fashion and space exploration could find common ground? Yet here we are, witnessing a luxury brand contribute its expertise to one of humanity's most ambitious endeavors. By combining Prada's knowledge of materials and craftsmanship with Axiom's engineering prowess, we're seeing a suit that promises to be more comfortable, more adaptable and more efficient than anything that's come before.Could we see more fashion houses getting involved in space tech? One thing's for sure: The AxEMU suit is a perfect example of what can happen when we think outside the box and bring diverse expertise together. As we continue to reach for the stars, it seems that the sky is no longer the limit, not even for fashion.How do you feel about the role of aesthetics in spacesuit design? Do you think looking good in space is just as important as functionality?Let us know by writing us at Cyberguy.com/Contact.CLICK HERE TO GET THE FOX NEWS APPFor more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Copyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.
    0 Comments ·0 Shares ·127 Views
  • Microsoft fixes 89 CVEs on penultimate Patch Tuesday of 2024
    www.computerweekly.com
    Microsoft has issued fixes addressing a total of 89 new Common Vulnerabilities and Exposures (CVEs) 92 including third-party disclosures to mark the penultimate Patch Tuesday of 2024, including four critical issues and a number of flaws that could be considered zero-days.Of these issues, one meets the full traditional definition of a full zero-day, a vulnerability that is both public and known to be exploited. This is CVE-2024-43451, a spoofing vulnerability in New Technology LAN Manager (NTLM) Hash.NTLM is a set of security protocols used to authenticate users identities. It dates back years and has been largely supplanted by vastly more secure protocols Microsoft has not recommended its use in over a decade, but since it was used in Internet Explorer, it remains supported to some extent and continues to cause problems, not least because at this stage, it is incredibly insecure.In this instance, successful exploitation of this issue could lead to total loss of confidentiality, according to Microsoft, as it discloses a users NTLMv2 hash to an attacker who could then use it to authenticate as the user if the victim can be tricked into minimal interaction with a malicious file, which could include merely selecting or clicking it, not even opening it. This may make it considerably more dangerous than its comparatively low severity score may indicate.Mike Walters, president and co-founder of Action1, explained: This issue arises from the mechanism where NTLM authentication credentials, specifically NTLMv2 hashes, are improperly exposed via a maliciously crafted file.The root cause of this vulnerability lies in improperly handling file interactions within systems, potentially allowing attackers to extract NTLMv2 hashes without requiring complete file execution, he told Computer Weekly in emailed commentary.All supported versions of Microsoft Windows are vulnerable to this issue, said Walters, especially if they use applications reliant on MSHTML and EdgeHTML platforms, while risk is further increased across different system environments thanks to the involvement of other scripting engines.Walters said the main concern with CVE-2024-43451 is the disclosure of NTLMv2 hashes that can be used to authenticate as the user and leveraged in pass-the-hash attacks, enabling further lateral movement for a canny threat actor.This vulnerability is particularly effective in phishing scenarios, where users might be deceived into interacting with malicious files. Once NTLM hashes are obtained, attackers can combine them with other network vulnerabilities to extend their access and compromise additional systems, he said.Organisations that heavily use Windows in environments with substantial network file sharing or legacy applications dependent on Internet Explorer and related platforms face heightened risk. Those lacking robust user training and monitoring systems to detect unusual file interactions may be more susceptible to exploitation.Also on the list is CVE-2024-49309, which is exploited but not yet public. This is an elevation of privilege (EoP) vulnerability in Windows Task Scheduler.This stems from an issue where authentication tokens or credentials are improperly managed and could allow a low-privileged attacker to gain deeper access if they can execute a malicious application designed for the purpose. It impacts multiple versions of Windows that incorporate Task Scheduler as part of their routine task automation processes, and it is thought that environments with shared or multiple-user setups may be particularly vulnerable to it.This vulnerability serves as a potential entry point for attackers who have already accessed a system with low privilege. Once privileges are escalated, these attackers can utilise this foothold for further lateral movement within a network or to exploit other vulnerabilities that necessitate higher access levels, said Walters.The nature of this vulnerability is especially concerning in corporate settings where individual users possess specific task automation privileges that could be exploited to gain unauthorised access.Four further vulnerabilities have been made public but as of yet have seen no exploitation, according to Microsoft, and one of these, CVE-2024-5535, a remote code execution issue in OpenSSL, is among the three third-party disclosures incorporated into this months drop.The other three are CVE-2024-43498, a remote code execution (RCE) vulnerability in .NET and Visual Studio, CVE-2024-49019, an EoP vulnerability in Active Directory Certificate Services, and CVE-2024-49040, a spoofing vulnerability in Microsoft Exchange Server.Chris Goettl, vice president of security products at Ivanti, shared further thoughts on both the Active Directory and Microsoft Exchange Server issues, and urged defenders to treat them as higher priorities than the official guidance might imply.[CVE-2024-49019] is rated Important and has a CVSS v3.1 score of 7.8. If exploited, the attacker could gain domain administrator privileges. The vulnerability does provide additional mitigations including removing overly broad enrol or auto-enrol permissions, removing unused templates from certificate authorities, and securing templates that allow you to specify the subject in the request, said Goettl.The vulnerability affects Windows Server 2008 and later Server OS editions. From a risk-based perspective, a public disclosure puts this vulnerability at a higher risk of being exploited and may warrant treating the vulnerability as a higher severity.Goettl continued: [CVE-2024-49040] is rated Important and has a CVSS v3.1 score of 7.5. The vulnerability exists in the P2 From header verification. Microsoft Exchange Server is often targeted by threat actors who specialise in Exchange exploits. From a risk-based prioritisation perspective, the public disclosure and availably of PoC level exploit code warrants treating this vulnerability as Critical.Finally, three other Critical issues are listed as, CVE-2024-43625, an EoP vulnerability in Microsoft Windows VMSwitch; CVE-2024-43639, an RCE vulnerability in Windows Kerberos; and CVE-2024-49056, an EoP vulnerability in Airlift.microsoft.com. In each of these instances, no proof of concept has yet been made public and no exploitation in the wild has been observed.Read more about Patch TuesdayOctober 2024: Stand-out vulnerabilities in Microsofts latest Patch Tuesday drop include problems in Microsoft Management Console and the Windows MSHTML Platform.September 2024: Four critical remote code execution bugs in Windows and three critical elevated privileges vulnerabilitieswill keep admins busy.August 2024: Microsoft patches six actively exploited zero-days among over 100 issuesduring its regular monthly update.July 2024: Microsoft has fixed almost 140 vulnerabilities in its latest monthly update, with a Hyper-V zero-daysingled out for urgent attention.June 2024: An RCE vulnerability in a Microsoft messaging feature and a third-party flaw in a DNS authentication protocol are the most pressing issues to address inMicrosofts latest Patch Tuesday update.May 2024: A critical SharePoint vulnerability warrants attention this month, but it is another flaw that seems to be linked to the infamous Qakbot malwarethat is drawing attention.April 2024: Support for the Windows Server 2008 OS ended in 2020, but four years on and there's a live exploit of a security flawthat impacts all Windows users.March 2024: Two critical vulnerabilities in Windows Hyper-V stand out onan otherwise unremarkable Patch Tuesday.February 2024: Two security feature bypasses impacting Microsoft SmartScreen are on the February Patch Tuesday docket,among more than 70 issues.January 2024: Microsoft starts 2024 right with another slimline Patch Tuesday drop, but there are some critical vulnerabilities to be alert to, including a number ofman-in-the-middle attack vectors.
    0 Comments ·0 Shares ·115 Views