0 Reacties
0 aandelen
4 Views
Bedrijvengids
Bedrijvengids
-
Please log in to like, share and comment!
-
BUILDINGSOFNEWENGLAND.COMChester-Rowley House // 1897This unique brick houseis located on Devon Roadin Newton Centre, and was built in 1897 for Arthur Herbert Chester andElizabeth S. (Rich) Chester.Arthur H. Chester (1868-1898) worked in real estate, largely in the office ofJ. Montgomery Sears. He acquired a large house lot in Newton Centre, and had this unique Jacobean Revival residence built for his young family. Sadly, within a year of its completion, Arthur died of Malarial Fever at the age of just 30 years old in 1898. Elizabeth, his widow, would retain the house for a decade longer before it sold toHenry Esmond Rowleyand his wife, Josephine. While it looks like a brick house, this residence is actually wood-frame with a brick veneer, a cost-saving measure to still give a stately appearance. The house is notable for its twin rounded gable parapets at the faade and lack of ornate trimmings. The house was covered in white paint for years, but the owners recently removed all the paint from the brick.0 Reacties 0 aandelen 5 Views
-
BL.AGNow Streaming: Married to Comics by John KinhartFilmsNow Streaming: Married to Comics by John KinhartComic artists Justin Green and Carol Tyler profiled in this feature-length documentary.Better LettersNov 21, 2024 2 min readCarol Tyler's relationship with Justin Green forms part of her autobiographical comic books.Something I neglected to mention in my 'Signs of the Summer' post was the screening of Married to Comics that I attended/organised at the Rio Cinema in Dalston, London. The good news for those that have been unable to catch it on the big screen is that it's now streaming.Stream Married to ComicsThe film is a feature-length documentary about the life and work of two pioneers in the genre of autobiographic comics: Justin Green (RIP) and Carol Tyler. (You may recall Justin from his Sign Game strips and/or the Sign Painters film.) As the title suggests, they were married to each other, with their relationship and individual perspectives on it creating much of the film's intrigue. on Vimeo.Contributors to the film include luminaries such as Robert Crumb and Art Spiegelman, who discuss the profound influence that Green and Tyler's comics had on them. And, for sign painting folk, there's a lovely segment with Green discussing his Sign Game series for Signs of the Times magazine, which he describes as some of his favourite work.I recommend setting aside a couple of hours this weekend to take a trip into Green and Tyler's minds, and to learn about the remarkable lives and work that emerged from them.Married to Comics is available via different streaming services. If you are outside the USA then you may need to install a VPN to access it. (Independent productions like this always benefit from ratings and reviewsyes, for the algorithm!so be sure to leave one if you do watch it.) Thank you to John Kinhart and Carol Tyler for all of the work that has gone into the film, and for now making it available online after its time at the festivals.More FilmsMore People0 Reacties 0 aandelen 4 Views
-
WWW.THISISCOLOSSAL.COMThrough Monumental Installations of Soap and Stones, Jesse Krimes Interrogates the Prison SystemApokaluptein:16389067 (20102013), cotton sheets, ink, hair gel, graphite, and gouache, 15 x 40 feet. All images courtesy of Jesse Krimes, Jack Shainman Gallery, and The Met, shared with permissionThrough Monumental Installations of Soap and Stones, Jesse Krimes Interrogates the Prison SystemNovember 21, 2024ArtSocial IssuesGrace EbertAround 2009, Jesse Krimes was sent to solitary confinement while awaiting trial for a drug charge. He had recently graduated from Millersville University of Pennsylvania with an art degree and spent his first year inside Fairton Federal Correctional Institution making. The one thing they could not take away or control was my ability to create, he says.Like many incarcerated artists, Krimes had to forgo the luxuries of a pristine canvas and set of paints. Instead, he had to be resourceful and utilize the few materials available to him. He began transferring mugshots and small photos printed in The New York Times onto wet remnants of soap bars. He then tucked the blurred, inverse portraits into cut-out decks of playing cards glued together with toothpaste, which created a kind of protective casing that allowed him to smuggle the works out of the facility.Detail of Purgatory (2009), soap, ink, and playing cardsThe 292 works became Purgatory, which considers how we view criminality and references the unwinnable game of living in a carceral society. Having transferred both photos of people sentenced to prison and celebrities like Naomi Campbell and David Letterman, Krimes points to the ways popularized images can exacerbate power imbalances.Purgatory is currently on view at The Met in Jesse Krimes: Corrections, one of two New York exhibitions of the artists work.Exploring the role of photography in the criminal justice system, Corrections brings together several of Krimes large-scale works, including Apokaluptein: 16389067. The 40-foot patchwork mural similarly features imagery taken from newspapers that the artist transferred to 39 prison-issue bedsheets using hair gel. Inverted photographic renderings piece together advertisements, snapshots of global strife, and scenes of life from 2010 to 2013, all overlaid with Krimes own drawings.The root of apocalypse, apokaluptein is a Greek word translating to uncover and revelation. Paired with Krimes Bureau of Prisons ID number, the title references mass destruction and the mediated view of the world from inside the justice system.Detail of Apokaluptein:16389067 (20102013), cotton sheets, ink, hair gel, graphite, and gouache, 15 x 40 feetFollowing his release, Krimes co-founded the Center for Art and Advocacy, which supports artists directly impacted by the justice system, and continues to collaborate with people who are incarcerated, often seeking help in sourcing materials for his work.Naxos, for example, suspends 9,000 pebbles from prison yards in a vivid installation as a parallel to Apokaluptein: 16389067 at The Met. And at Jack Shainman Gallery, where Krimes is represented, the artists new body of work repurposes clothing gathered from currently and formerly incarcerated people into sweeping tapestries.Cells features three abstract works of transferred art historical imagery overlaid with sprawling, network-like embroideries. The webbed pattern is based on microscopic images of cancerous cells, which the artist excised to leave only the healthy tissue intact. By removing these malignancies, he creates an intricate metaphor for the ways the justice system extracts people from society while exploring new pathways toward care and redemption.Part of Krimes intent for his practice is to pay homage to those inside. It is an absolute honor to have works that were created in such an austere and traumatic environment on display, he said about Corrections. To show these works highlights much more than the work of an individual artist, namely the collective value, creativity, and dignity of the millions of people currently behind prison walls.Cells is on view through December 21 at Jack Shainman Gallery, while Jesse Krimes: Corrections runs through July 13, 2025, at The Met. Find more from Krimes on his website.Unicorn (2024), used clothing collected from currently and formerly incarcerated people, assorted textiles, embroidery, and image transfer, 109 x 105 x 2 3/4 inchesDetail of Unicorn (2024), used clothing collected from currently and formerly incarcerated people, assorted textiles, embroidery, and image transfer, 109 x 105 x 2 3/4 inchesDetail of Purgatory (2009), soap, ink, and playing cardsDetail of Purgatory (2009), soap, ink, and playing cardsDetail of Naxos, installation view of Jesse Krimes: CorrectionsDetail of Naxos, installation view of Jesse Krimes: CorrectionsStag (2024), used clothing collected from currently and formerly incarcerated people, assorted textiles, embroidery, image transfer, acrylic paint, 82 x 77 x 2 3/4 inchesNext article0 Reacties 0 aandelen 4 Views
-
WWW.THISISCOLOSSAL.COMFrom Single Balls of Clay, Paul S. Briggs Hand-Turns Leafy VesselsOscillation (2017). All images courtesy of Paul S. Briggs, shared with permissionFrom Single Balls of Clay, Paul S. Briggs Hand-Turns Leafy VesselsNovember 21, 2024ArtCraftKate MothesCurling leaves and pinched patterns cloak the bold vessels of artist Paul S. Briggs. Using a slab-building technique, he creates chunky sculptures that nod to nature, mindfulness, and the malleability of his chosen medium.Briggs approaches his process as a kind of meditation, pinch-forming each piece from a single ball of clay. When sharing his work on social media, he even uses the hashtag #noadditionorsubtraction to illustrate how the form emerges from the precise quantity he begins with. Calyx Krater (2021). Photo by Joe PainterIt is difficult to see from the finishedvessels how the pieces emerge from one piece of clay, Briggs tells Colossal. Im at a stage in the process where to call them pinch-pots doesnt quite capture the evolution of the form, and so Ive been using the terminology hand-turned.'The artist composes each piece through a kind of two-pronged method: the initial step of building with slabs helps him to think through ideas and philosophize concretely, while pinching quiets his mind.As a teacher at The New York State College of Ceramics at Alfred University, Briggs is interested in how a range of topicseducational theory and policy, art education, theology, and artcoalesce in both the studio process and the finished work. One of the main tools I ask students to bring to my workshops is patience, he says. You cannot rush these pieces; one must slow down. It is a very assertive but tender process, especially when handling six to 12 pounds of clay.Windflower Vase (2022)Being psychologically present in the process is central to Briggss approach, which is why I have talked about the work as being a mindful, meditative technique, he adds. Undulating leaf forms, intimate divots, and rippling edges repeat in infinite circles around each vessel, evocative of a mesmerizing, three-dimensional zoetrope.Very recently, Ive been making pieces with a balance of slow, intentional pinches and very loose, intuitive marks, Briggs says. These works are still emerging, and hes interested in the potential of combining different approaches in one form.Among several other group shows, Briggs will show a few vessels in an exhibition celebrating the 50th anniversary of The Art School at Old Church in Demarest, New Jersey, which runs December 6 to 8. Hes also preparing for his next solo exhibition at Lucy Lacoste Gallery in Concord, Massachusetts, slated for July. Until then, explore more on the artists website.Wildflower (2021). Photo by Joe PainterWhorl (2024)Calyx Bowl (2021). Photo by Joe PainterWindflower Vase (2022)Calyx Krater (2021)Previous articleNext article0 Reacties 0 aandelen 4 Views
-
WWW.FOXNEWS.COMHow to protect your deliveries from getting stolen by porch piratesclose Holiday shopping fraud expected to increase due to AI The busy holiday shopping season is just around the corner and most of us will be targeted by an AI scam. As the holiday season approaches, the excitement of gift-giving can quickly turn into anxiety over package theft. With porch pirates on the prowl, your carefully delivered gifts can vanish right from your doorstep. In 2023 alone, a staggering119 million packages were reported stolen, meaning one in every 180 deliveries disappeared into thin air.Cities like Seattle, Memphis and San Diego have become hot spots for these unfortunate heists.If youve ever found yourself racing home to rescue a package, asking neighbors to keep an eye out or, worst of all, falling victim to these sneaky thieves, youre not alone. But dont worry! Weve got some tips that could save you from the holiday headache of package theft. Lets dive in. Alleged porch pirate taking packages from property (Kurt "CyberGuy" Knutsson)Tip 1: Get security camerasFirst things first, consider installing security cameras around your home. Having a good camera system can really make a difference when it comes to deterring those sneaky thieves. Depending upon how well your police department responds to porch pirate package theft, position yourvideo doorbell to capture the face of the pirate and your package deliveries. A Video Doorbell can push notifications to get a phone alert whenever anyone or anything approaches your door, even if they don't ring the doorbell.Also, you might want to consider adding a couple of nearly invisiblewireless cameras on tree limbs near the street at your house. We did it in hopes of being able to record a license plate if ever needed for police. I can set them to send a notification when the camera detects a person or car.When youre shopping for cameras, look for high-resolution video so you can see everything clearly, even at night, with night vision capabilities. Motion detection is a must. Itll alert you if someone gets too close to your front door. Plus, two-way audio lets you talk to anyone at your door, whether its a delivery person or someone who shouldnt be there. And dont forget about cloud storage. This way, you can easily access footage whenever you need it. Check out my top picks for thesix best outdoor security cameras.Pro tip: If your camera has the feature, set your video camera to notify you when it identifies packages within view.GET MORE OF MY TOP PICKS TO AMP UP YOUR HOME SECURITY Image of a doorbell camera (Kurt "CyberGuy" Knutsson)Tip 2: Use tracking appsNext up, make sure you're using tracking apps for your deliveries. Most shipping companies offer tracking services that let you follow your package from the moment it leaves the warehouse until it arrives at your home.WHAT IS ARTIFICIAL INTELLIGENCE (AI)?If you sign up forUSPS Informed Delivery, youll get digital previews of whats coming to your mailbox, which is super handy. You can set up email or text alerts for delivery updates so youre always in the loop about when your packages are arriving. Some retailers even send you photos once your package has been delivered, giving you extra reassurance that it made it safely. A woman using a tracking app on her iPhone (Kurt "CyberGuy" Knutsson)Tip 3: Make sure someone is homeNow, lets talk about timing. Its important to have someone around to receive packages as soon as they arrive. This can be tricky since many deliveries happen during work hours. If you can swing it, try working from home on days when important packages are expected. If thats not possible, coordinate with friends, family members or roommates so someone is always there to grabthe delivery right away.GET FOX BUSINESS ON THE GO BY CLICKING HERE A woman receiving packages at home (Kurt "CyberGuy" Knutsson)Tip 4: Coordinate with your neighborsDont underestimate the power of community. Teaming up with your neighbors can be a game-changer in preventing package theft. Sign up for neighborhood porch pirate alerts from popular local networks likeNeighbors andNextdoor apps. This is where people often post when they've had a package stolen and sometimes upload videos or images of the suspected porch pirates. Plus, making an agreement with trusted neighbors to watch each others packages can really enhance security; there's strength in numbers. A person picking up packages for their neighbor (Kurt "CyberGuy" Knutsson)Tip 5: Have the package delivered somewhere elseIf home delivery feels too risky, consider alternative delivery options that offer more security. Many people choose to have their packages sent to their workplace if allowed; this way, theyre less likely to be stolen than sitting on a porch all day. Retailers often provide secure pickup points where you can collect your packages at your convenience. Renting a P.O. Box or using services that hold packages for pickup at local shipping facilities are also great options for those valuable items. A woman receiving packages at her workplace (Kurt "CyberGuy" Knutsson)Tip 6: Request a signature confirmationAnother way to prevent package theft is to request a signature confirmation for your deliveries. This means that the delivery person will not leave the package at your door unless someone signs for it. You can request a signature confirmation from most delivery services, such as FedEx, UPS, USPS and DHL. This option may cost extra, but it can give you peace of mind that your package will not be stolen.Tip 7: Send to remote pick-up locationsDid you know that most delivery services now offer remote pick-up locations? These can be secure lockers, post offices or retail counters. Amazon has hundreds of Amazon Lockers and pick-up counters across the country, which are free for Prime members.See howfar away the nearest Amazon Locker is located from your home.When you're checking out, just click onChange next to your shipping address, then selectFind a pickup location near you to see your options. Once your package is delivered, you'll get a notification or email with a code to retrieve it from the locker or pick-up point. Some items can even be returned at these locations. A person picking up a package from a locker (Kurt "CyberGuy" Knutsson)Tip 8: Amazon Key In-Garage DeliveryWe added a strong deadbolt to the door leading into the house from the garage before signing up. Now, when we are not home, an Amazon delivery can be placed securely inside our garage using the free service called Amazon Key In-Garage Delivery. The addition of asmart garage controller is the first step. Once you've signed up for Amazon Key In-Garage Delivery, pick Key Delivery when checking out on Amazon to have your packages securely put in the garage. I really like that you can block access to your garage any time you want. The driver never needs your garage code, and access only works for their one-time delivery. A delivery being made using Amazon Key-In-Garage Delivery (Kurt "CyberGuy" Knutsson)Tip 9: Provide a delivery boxAnother great option is to invest in adelivery box that allows packages to be securely dropped off and stored discreetly. Just remember that you'll need to inform delivery personnel about using the box and how it works. Package being placed in a delivery box (Kurt "CyberGuy" Knutsson)Tip 10: Sign up for delivery notificationsYou can get an alert each time a package arrives at your doorstep.Both FedEx and UPS will send a text when you've just received a delivery.Amazon will also send you a shipment text letting you know a package has just been delivered.To set upAmazon delivery notifications, follow these quick steps.Log on to theAmazon siteGo toYour Account sectionScroll down to theCommunication and Content sectionTapShipment Updates via TextFollow the on-screen instructions, tapSubscribeKurt's key takeawaysRemember, simple actions like installing security cameras, using tracking apps and coordinating with neighbors can go a long way in protecting your packages. So, as you prepare for the holiday season, take these tips to heart and enjoy a worry-free gift-giving experience. Let's keep those porch pirates at bay and ensure that every package arrives safely at your doorstep.CLICK HERE TO GET THE FOX NEWS APPHave you ever had a package stolen? If so, how did you handle the situation, and what lessons did you learn?Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com.All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Reacties 0 aandelen 29 Views
-
WWW.FOXNEWS.COMAI-powered dog robot sniffs out invasive fire antsPublished November 21, 2024 6:00am EST close AI-powered dog robot sniffs out invasive fire ants Robot uses artificial intelligence to locate nests with precision. Imagine walking through a park on a sunny day, only to feel the sharp sting of fire ants attacking your ankles.These tiny invaders are not just a nuisance; they pose significant threats to our ecosystems and economies. Fortunately, scientists have developed an innovative solution to combat these pests: robot dogs.These high-tech canines are being trained to sniff out invasive fire ants, using artificial intelligence to identify their nests with remarkable precision. This breakthrough could change the way we manage invasive species and protect our environment. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)A high-tech ant hunterResearchers from China and Brazil have created a robotic dog known as CyberDog, specifically designed to locate fire ant nests. This high-tech robot has been trained to identify red imported fire ants, which are wreaking havoc in various ecosystems around the globe. Impressively, the CyberDog is capable of finding three times more nests than human inspectors, all while showing off greater accuracy. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Why fire ants are such a big dealRed imported fire ants may be small, but their impact is anything but trivial. Native to central South America, these aggressive ants have spread across the United States, Australia and parts of Asia, causing extensive environmental and economic damage. In the U.S. alone, they are responsible for an estimated $6 billion in losses each year due to reduced crop yields and damage to farm equipment.WHAT IS ARTIFICIAL INTELLIGENCE (AI)? CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)How the CyberDog works its magicPublished in theSCI journal Pest Management Science, the study showcases how the CyberDog robot, equipped with an AI model, can efficiently automate the identification and control of red imported fire ants, a notoriously destructive global pest. The research team trained the CyberDog using a comprehensive dataset of over 1,100 images of fire ant nests, resulting in an impressive detection accuracy rate of over 90%.The robot is programmed to poke suspected nests with its paw; when it does so, active nests release their workers in a defensive frenzy, confirming the presence of fire ants. This unique method allows researchers to distinguish between active mounds and those that may be abandoned or occupied by other species. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)More than just ant controlBeyond its practical applications in pest management, the CyberDog also serves an educational purpose. Zheng Yan, one of the researchers involved in the project, emphasizes that sightings of robots tracking fire ant nests can captivate public interest and raise awareness about the dangers posed by invasive species. By engaging communities in this way, scientists hope to foster greater understanding and proactive measures against these ecological threats.GET FOX BUSINESS ON THE GO BY CLICKING HERE CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Challenges and future prospectsDespite its impressive capabilities, the CyberDog is not without challenges. Its battery life currently lasts about 30 minutes, which limits its operational time in the field. Additionally, acquiring more advanced models can be costly. However, as technology continues to evolve and production costs decrease, it's likely that robotic solutions like this will become more accessible for widespread use in pest control. CyberDog designed to locate fire ant nests (Dr Hualong Qiu, Guangdong Academy of Forestry)Kurts key takeawaysThe development of the CyberDog shows us how technology can be harnessed to tackle ecological challenges in innovative ways that benefit both nature and society. As we confront increasing threats from invasive species worldwide, AI-powered robots could become our new allies in protecting ecosystems.Would you welcome robot dogs patrolling your local park for fire ants? Or does the idea of AI-powered pest control make you feel uneasy? Let us know by writing us at Cyberguy.com/Contact.For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.Follow Kurt on his social channels:Answers to the most asked CyberGuy questions:New from Kurt:Unbeatable Best Black Friday dealsBest gifts forMen |Women |Kids |Teens |Pet loversBest deals:Laptops |DesktopsCopyright 2024 CyberGuy.com. All rights reserved. Kurt "CyberGuy" Knutsson is an award-winning tech journalist who has a deep love of technology, gear and gadgets that make life better with his contributions for Fox News & FOX Business beginning mornings on "FOX & Friends." Got a tech question? Get Kurts free CyberGuy Newsletter, share your voice, a story idea or comment at CyberGuy.com.0 Reacties 0 aandelen 29 Views
-
WWW.COMPUTERWEEKLY.COMBianLian cyber gang drops encryption-based ransomwareThe Australian Cyber Security Centre (ACSC) and the United States Cyber Security and Infrastructure Security Agency (CISA), have published updated intelligence on the activities of the dangerous BianLian ransomware operation, after observing a rapid evolution in the gangs tactics, techniques and procedures (TTPs).One of a number of gangs that first came to prominence alongside LockBit in 2022 during a shift in the cyber criminal landscape following the demise of the Conti crew, BianLian is almost certainly based in Russia despite the Chinese name probably an attempt at obfuscation.Over the past couple of years it has established a name for itself by targeting critical national infrastructure (CNI) operators in both Australia and the US, with victims also claimed in the UK.Having gained access to its victims environments, usually by stealing valid Remote Desktop Protocol (RDP) credentials, and exfiltrating their data, BianLian historically employed the standard double extortion model, encrypting the victims systems and then threatening to leak their data if they werent paid off.However, said the Australians, in 2023 BianLian started to shift to encryption-based extortion, in which systems are left intact and victims are warned of financial, business and legal consequences if payment is not made. Among cyber criminals, this technique may be considered a somewhat easier method of extorting a victim as it requires less technical work. BianLian certainly seems to think so, because since January 2024, they have exclusively used this method.FBI, CISA, and ACSC encourage critical infrastructure organisations and small- and medium-sized organisations to implement the recommendations in the mitigations section of the advisory to reduce the likelihood and impact of BianLian and other ransomware and data extortion incidents, said the ACSC.The most significant change observed is the abandonment of a traditional ransomware locker for encryption and the updating of its standard ransomware note to reflect this samples of which are provided in the advisory.It has also adopted more high-pressure techniques in an attempt to pressure its victims into paying. It now sends copies of the ransom note to office printers and employees of affected companies have been on the receiving end of threatening telephone calls.However, in the run-up to its attacks the gang is also using a number of other updated techniques that defenders should be alert to. A full run-down is available from the ACSC, but among some of the changes some of those observed by the authorities are the targeting of public-facing applications of both Microsoft Windows and VMware ESXi infrastructure, exploiting the vintage ProxyShell exploit chain for initial access, in addition to RDP.Once inside its target, BianLian also now implants a custom, Go-coded backdoor specific to the victim and from there installs remote management and access software, it favours popular products including AnyDesk and TeamViewer, to establish persistence and command-and-control (C2) purposes. It now also appears to be using the Ngrok reverse proxy tool and possibly a modified version of the open source Rsocks utility to establish tunnels from victim networks and cover up where the C2 traffic is heading.To escalate its privileges within the victim environment, it has recently taken to exploiting CVE-2022-37969. This zero-day, among 64 bugs that Microsoft attempted to quash in its September 2022 Patch Tuesday update, is a privilege elevation vulnerability in the Windows Common Log File System Driver and successfully exploited, grants admin-level rights.Historically, BianLian has leveraged Power Shell and Windows Command Shell to disable antivirus tools such as Windows Defender and Anti-Malware Scan Interface (AMSI). It has now been observed renaming binaries and scheduled tasks after genuine Windows services and security products and appears to be trying to pack executables using UPX to conceal their code in an attempt to bypass detection tools.When it comes to establishing persistence and facilitating further lateral movement, the gang has been observed using PsExec and RDP with valid accounts, but has also been spotted using the Server Message Block (SMB) protocol, installing webshells on Exchange servers, and creating Azure Active Directory (AD) accounts.Andrew Costis, engineering manager of the Adversary Research Team and AttackIQ, which specialises in MITRE ATT&CK-based cyber attack simulations, said it was vital for defenders to understand and test against the often highly-specific TTPs used by gangs like BianLian.The shift to exfiltration-based extortion is interesting, particularly as its believed that theBianLianoperators are likely based in Russia or have ties to Russia based on some of the tools they have been observed using, he observed.With the current geopolitical situation unfolding between Russia, Ukraine, and the West, this could be a strategic move to strike their victims faster and ultimately target more victims. This de-prioritisation of double extortion could potentially be a time-saving strategy, as double extortion negotiations take time and resources on both sides, Costis told Computer Weekly in emailed comments.From a value perspective, the intention of this change in tactic suggests that they dont currently value encryption or double extortion. It will certainly be interesting to see if other ransomware groups follow suit.Read more about ransomwareWe look at ransomware attacks, and the importance of good backup practice as well as immutable snapshots, air-gapping, network segmentation, AI anomaly detection and supplier warranties.Anomaly detection and immutable copies can be frontline tools against ransomware we look at the role storage can play against the latest techniques employed by ransomware gangs.Threat intel specialists at Recorded Future have shared details of newly developed techniques they are using to disrupt Rhysida ransomware attacks before the gang even has a chance to execute them.0 Reacties 0 aandelen 26 Views
-
WWW.COMPUTERWEEKLY.COMMicrosoft slaps down Egyptian-run rent-a-phish operationMicrosofts Digital Crimes Unit (DCU) has scored a major win against the cyber criminal underworld after leading an operation to seize 240 fraudulent websites used by an Egyptian national named today as Abanoub Nady who sold do-it-yourself phishing kits under the brand name ONNX to less adept crooks.Nady, who used the handle MRxD0DER, both developed and sold the phishing-as-a-service kits, which were used in multiple campaigns against Microsoft customers in various sectors, although it is understood that the financial services industry was the most heavily targeted.The DCU believes that emails originating from the ONNX family of products made up a significant portion of the tens to hundreds of millions of phishes caught in Microsofts nets every month it was likely among the top five such ops globally.Redmond said that in targeting ONNX, it was disrupting the illicit cyber criminal supply chain and protecting customers from downstream threats such as fraud, data theft, and ransomware.This action builds on the DCUs strategy of disrupting the broader cyber criminal ecosystem and targeting the tools cyber criminals use to launch their attacks, Microsoft DCU assistant general counsel Stephen Masada explained.Our goal in all cases is to protect customers by severing bad actors from the infrastructure required to operate and to deter future cyber criminal behaviour by significantly raising the barriers of entry and the cost of doing business.We are joined by co-plaintiff LF (Linux Foundation) Projects, LLC, the trademark owner of the actual registered ONNX name and logo.ONNX or Open Neural Network Exchange is an open standard format and open source runtime for representing machine learning models, enabling interoperability between different hardware, frameworks, and tools for easier deployment and scalability, he said.Together, we are taking affirmative action to protect online users globally rather than standing idly by while malicious actors illegally use our names and logos to enhance the perceived legitimacy of their attacks.Masada said that the DCU had unilaterally opted to name Nady to serve as a further deterrent to others.A spokesperson for the Linux Foundation said: At the Linux Foundation, we advocate collaboration as a powerful tool for tackling complex challenges. Today, we celebrate our recent collaboration with Microsoft to defend millions of individuals and organisations from a global phishing-as-a-service criminal operation. We encourage organisations who find themselves in a position to fight one element of a cyber crime problem to identify ways to collaborate and build a stronger collective response.Recent months have seen a significant upswing in sophisticated adversary-in-the-middle (AitM) phishing attacks such as those orchestrated through ONNX in recent months, notably a spike in so-called quishing phishing using malicious QR codes.However, Microsoft's action against ONNX is in fact the result of a lengthy investigation dating back to 2017. Over the years, said Microsoft, it has tracked various of Nadys enterprises including other phishing operations known as Caffeine and FUHRER.All of his kits were designed to send emails at scale in coordinated campaigns, and ONNX was sold on a subscription-based model with various tiers of access and support, even a VIP tier for the most discerning criminals, who benefited from round-the-clock tech support offering step-by-step guidance.ONNX was mostly promoted, sold and configured via the Telegram messaging platform, alongside demonstration videos. Once bought, customers were able to orchestrate attacks using the provided templates and the fraudulent ONNX technical infrastructure, where they were allowed to connect malicious domains obtained from elsewhere.Under a civil court order, unsealed today in the Eastern District of Virginia, Microsoft has now taken over this technical infrastructure, putting it beyond use for future attacks.Unfortunately, observed Masada, while the DCUs action will substantially disrupt ONNX, it is a certainty that other threat actors will fill the void, with adapted techniques.However, taking action sends a strong message to those who choose to replicate our services to harm users online: we will proactively pursue remedies to protect our services and our customers and are continuously improving our technical and legal strategies to have greater impact, he said.Furthermore, as cyber criminals continue to evolve their methods, it is crucial for organisations and individuals to stay informed and vigilant. By understanding the tactics employed by cybercriminals and implementing robust security measures, we can collectively work towards a safer digital environment. Continued collaboration, like the partnership with LF Projects, remains essential if we want to meaningfully dent the cyber threat landscape.Read more about phishingThe Metropolitan Police working with international police forces have shut down LabHost, a phishing-as-a-service website that has claimed 70,000 victims in the UK.Phishing techniques are evolving away from malicious email attachments, according to a Mimecast report.A healthy dose of judicious skepticism is crucial to preventing phishing attacks, said David Fine, supervisory special agent at the FBI, during a presentation at a HIMSS event.0 Reacties 0 aandelen 28 Views
-
WWW.ZDNET.COMThe best MagSafe accessories of 2024: Expert tested and reviewedIf you're reading this, you probably already know thatMagSafetechnology is a pretty handy feature. You can use it to wirelessly charge your phone, attach a wallet to the back of your phone, use it as a combination phone stand and power bank, and more.To put it simply: MagSafe makes phone charging fun and far more convenient. But with plenty of accessories on the market, it can be hard to know what is and isn't worth your cash. That's why we've tested plenty options on the market, so you can find the most useful MagSafe accessories for your lifestyle.What are the best MagSafe accessories right now?Our picks for the best MagSafe accessories overall are Anker's 3-1 MagGo Wireless Qi2 Charger and Casely's Grippy Mount. Keep reading for more top MagSafe accessories, including battery packs, phone stands, car mounts, wallets, and more.The best MagSafe accessories of 2024 Show less View now at Casely Pros Strong magnetic hold Easy to use Cons A bit pricey Sometimes hard to remove off of surfaces Casely MagSafe Grippy Mount Best MagSafe accessory for taking photos and videos If you're a content creator or you just like to take photos and videos during solo outings, this MagSafe mount is a handy gadget to have in your MagSafe accessory repertoire. You can easily stick your phone to any clean, flat, and glossy surface and instantly create a mount for your iPhone. When I tested the Casely Grippy Mount, I was surprised by how strong the magnetic hold was, even when I stuck it to a cheap, over-the-door mirror. It's a nifty option for mounting your phone for streaming or for taking it out on solo endeavors to help shoot content hands-free.Customers on Casely's website said that they liked the Grippy Mount's strong magnetic grip and hold, plus the ability to use their phone hands-free for photo, video, or entertainment purposes.Casely Grippy Mount features: Available in several colors | Compatible with iPhone 12 & newer (requires MagSafe case) | Fastens phone to any clean, flat, glossy surface (like mirrors and windows) | Allows for easy hands-free photo and video shooting, plus browsing Show Expert Take Show less Show less View now at Amazon Pros Travel-friendly 3-in-1 charging Foldable design Stand feature Wall adapter included Cons A bit bulky Limited color options Pricey For iPhone only Anker MagGo 3-1 Wireless Charging Station Best 3-in-1 MagSafe wireless charger Anker's MagGo 3-1 Wireless Charging Station for iPhone is still a wireless charging dream almost 7 months after my initial purchase, and it's also ZDNET's pick for best wireless charger. This MagSafe charger features 15W charging, offers a stand component for my iPhone, charges all of my Apple devices at once, and folds up easily for quick transport and storage. It also comes with a wall adapter, which isn't always a guarantee.I first purchased this Anker charger after ZDNET's Sabrina Ortiz tested it last year. I was looking for a safe and functional 3-1 charger that would cut down the amount of cords I needed to pack while traveling. This is it. Unveiled at CES 2023, this 3-1 is truly worth your money if you own an Apple Watch and a pair of AirPods too and want a great charger for at home and on the go. Ortiz said that the charging speed on this charger is comparable to individual cords with respective wall adapters, even when charging simultaneously. "Whether I was charging one device or three, I noticed that the devices were charging at a comparable speed to when I normally had them plugged into their respective wall chargers," she wrote in her review.I can concur based on my personal use, too. This stand charges up all of my devices quickly, and I love how easy it is to pack up to take on a trip. Even though this Anker charger is on the pricier side, costing $110, it's worth it thanks to its function and duality. It also frequently goes on sale. Compared to other options on the market, I think this 3-in-1 pick offers immense value because it can be used at home or on the go with ease, especially if you can grab it on sale.Verified Amazon customers give this Anker charger a 4.6/5 stars and said they liked the compactness and convenience of this design as well as the easy to use setup, foldability, and magnetic strength. However, some customers said the simultaneous charging wasn't consistent.Author's Note: The Anker MagGo 3-1 charger in white is on sale for $82 (save $28) at Amazon upon the latest publication.Anker MagGo 3-1 Wireless Charging Station features: Compatability: iPhone (any with MagSafe), Wireless Earbuds, Apple Watch |Color:White or Black | Foldable | Easy for travel | Comes with wall adapter Show Expert Take Show less Show less View now at Belkin Pros Qi2 charging Minimal warming Kickstand to prop phone Fits snug on iPhone Several color options Strong magnetic grip Recently upgraded design Clear battery indicator lights Cons Fun colors only sold by Apple Not the sleekest option Belkin Boostcharge Pro Qi2 Magnetic Power Bank 5k Best MagSafe battery pack This Belkin battery pack is not only an upgraded version of a good original, but it's also ZDNET's pick for the best MagSafe battery pack right now.I really liked the first iteration of this battery pack, and I like the newly upgraded Qi2 version even more. This new model has the USB-C connector on the side instead of the bottom of the pack, making it easier to use your phone standing upright while the pack is charging. Instead of the charging indicator lights being on the side, they're now more visible, located on the back of the pack. This model is also a tad slimmer and lengthier than its predecessor, making it easier to transport.And while this Belkin pack is a true embodiment of a classic brick-style battery booster, there is still a place in my heart for it because it just works so well. Similarly to many options on our Best MagSafe battery pack list, it provides 5,000mAh of extra juice to your phone, which is a standard capacity for many MagSafe packs. Its design, though simple, fits snugly against my phone (no bumping onto the lip of my camera lens) and remains secure.Its secure grip and competitive battery speak for themselves. I took this pack to a Yankees game, to several late-night outings, to work, and even on errands, and I am impressed with the charging. You can expect between a 25-30% battery boost in about an hour to your phone.What's more is that it comes with a built-in stand that easily swings in and out -- no folding required -- and while I originally thought this would be useless, I rather enjoyed being able to prop my phone up whenever. Perhaps the best thing about this Belkin pack is that it comes in a few fun colors, a nice feature many competitors still haven't matched.Like the previous iteration, this pack is still not the slimmest design I've ever seen. But the newly upgraded design offers a more comfortable and sleek user experience that feels great in the hand and doesn't feel as boxy as the pack really is. Overall, I'm impressed with the new shape and think it was a much-needed facelift.Apple is the only retailer that sells the blue, green, pink, and sand color options right now (as well as black), which is a bit of a downside. On the flip side, Belkin only carries the black and white iterations as well as the 8k and 10k models. Regardless, Redditors who own this battery pack really like the intentional upgrades.Some Redditors saidthat this is a great pack to replace Apple's discontinued battery pack, too.Belkin Boostcharge Pro Qi2 Magnetic Power Bank 5K features: Capacity: 5,000mAh|Charging Port: USB-C |Power button: Yes | Available in a few colors (some Apple exclusive) Show Expert Take Show less Show less Telesin MagSafe Neck Mount Best MagSafe accessory for shooting video hands-free If you shoot video from your POV frequently, consider a MagSafe accessory that will amp up your functionality. This MagSafe neck mount from Telesin does just that. ZDNET's senior reviews editor Kerry Wan was able to try one out while covering the iPhone 16 launch in California a few weeks ago, and immediately purchased one."I recently got this POV MagSafe mount, and it's perfect for hands-free video shooting. Saw dozens of content creators at Apple Park using it a few weeks ago," he said.Verified Amazon customers said that they liked the easy and simple setup of the Telesin neck mount, and said that they enjoyed using it to shoot video from their POV, or to just keep using their phone hands-free. One customer said she even enjoys using this neck mount to use her phone while walking her dogs.Telesin MagSafe Neck Mount features: Portrait and Landscape compatible | Multi-functional shooting modes (landscape, portrait, overhead, and low angle, which allows you to play with a wide range of POV scenarios) | Extended pole for viewing while shooting | Enhanced Dual-Ear + Strap for added stability | Dual-sided phone grip Show Expert Take Show less Show less View now at Best Buy Pros RFID protection Large card capacity Doubles as stand Premium feel Strong magnetic hold Slim design Cons Expensive Limited color options Adds some weight to phone May be too bulky for some Journey Ezmo MagSafe Wallet and Stand Best MagSafe wallet Journey's Ezmo MagSafe wallet is the perfect balance of style and function, and it's ZDNET's current pick for best MagSafe wallet. With enough space to hold five cards, it indeed resembles a classic wallet and not just a cardholder. The Ezmo wallet also doubles as a phone stand, so you can watch your favorite entertainment on the go or keep your phone screen visible at your desk. The stand has adjustable viewing angles in both portrait and landscape modes.It's made of vegan leather and comes in four traditional color options (black, dark brown, navy blue, and dove gray). The Ezmo MagSafe wallet also features a protective lining with RFID technology to safeguard your cards' information while preventing them from becoming demagnetized.I tested the Ezmo wallet for several weeks in my everyday activities, including my commute from New Jersey to New York City. When evaluating MagSafe wallets, I always look for easy and seamless access to my NJ Transit card, which I need to grab and put away quickly. Thanks to the notch on the front of the Ezmo wallet, I can store my transit card in the front. It's easy to slide out, so I highly recommend choosing one with a front-notch option if you're looking for a commuter-friendly wallet.I also like how the Ezmo MagSafe wallet provides enough space for five cards and even folded cash. It's perfect for holding my debit card, work badge, and other incidentals like paper train tickets.The phone stand was nice, too. I enjoyed being able to prop my phone up while at the office. I even found myself using the back half of the wallet as a makeshift grip on the train, which added some extra stability. Although it's a pricier option, I think it's well worth the investment due to its multi-functionality and excellent quality, especially if you use your MagSafe wallet daily. The Ezmo wallet is also available in a tracking version -- the LOC8 MagSafe Finder Wallet and Stand -- if you're prone to losing things frequently.Current users on the Journey website said they liked the slim profile, smart design, larger card capacity, and sleek material -- so much so that the wallet has a 5/5-star rating online, with one customer noting that it "does it all really well."Journey Ezmo wallet and phone stand features:Multi-functional| RFID protection | Built-in lock to prevent card slippage |Dimensions: 66 mm x 102.5 mm x 12.5 mm |Card capacity: Up to 5 cards Show Expert Take Show less Show less View now at Moft Pros Slim Great for those needing small capacity options Great color options Fairly priced Cons Small capacity Hard to dislodge certain cards Moft Snap on Phone Stand and Wallet Best minimalist MagSafe card holder If you don't need a larger capacity to store your favorite cards, cash, or other incidentals, a card holder is probably a better bet. While Moft markets their Snap on Phone Stand and Wallet as a wallet, it's definitely more of a card holder. Based upon my own testing, I've only ever been able to squeeze two cards into this holder, and most of the time prefer to just use it for one important card (often my NJ Transit SmartLink card).The design of this holder is very sleek and minimalist, but it's available in a wide-range of color options and costs only $30. While there's for sure cheaper wallet options out there, this is really fairly priced considering the dual function you get with the stand and card holder combo, plus the quality material and construction. Most other wallet options are often upwards of $35, so Moft has competitively priced a great MagSafe accessory, in my opinion.I have used this card holder countless times, and it is my favorite option when I am traveling with only one card that I need accessible. I find it easy to remove and insert cards from this wallet, though occasionally, it can be tricky to quickly pull out two cards without a hassle, which isn't the biggest deal unless you're rushing to make the train in the morning like me. Regardless, I have gifted this three times since being able to test one for ZDNET, and think it's a great option to add to your MagSafe collection.Moft Snap on Phone Stand and Wallet features: Thin profile and design | Works in Floating, Portait, and Landscape modes | Compatible with other Moft accessories, like the MagSafe battery pack | Compatible with iPhone 12+ and MagSafe compatible phone cases Show Expert Take Show less Show less Pros Adjustable height Sturdy base Good use of the platform with the addition of MagSafe Cons MagSafe connector costs extra Twelve South HiRise Pro for MacBook Best MagSafe accessory for a tidy desk Jason Cipriani, a former ZDNET contributor, has been using the non-pro version of Twelve South's HiRise for MacBook for about a year with no complaints. It did exactly what it's designed to do: get his laptop off of my desk and at eye level while freeing up some desk space. Underneath his laptop, Cipriani placed a wireless charging station, making use of the free space.However, with the HiRise Pro, Twelve South built a MagSafe charging pad directly into the leather-covered base. That means you no longer need a separate charging station under your laptop. Instead, attach a MagSafe charger -- which isn't included with the HiRise Pro -- to the bottom of the base and route the power cable to a nearby outlet.Twelve South HiRise Pro for MacBook features:Leather-covered base with MagSafe | Puts your MacBook at eye level, or up to 6 inches off your desk | Holds your laptop in place Show Expert Take Show less What is the best MagSafe accessory? Our favorite MagSafe accessories off style, function, and added features like kickstands and more. Maybe you're looking for a battery pack to boost your phone or a handy place to store your metro card. We've got you covered with top-tested accessory picks from Casely, Belkin, Moft, and more.MagSafe accessoryPrice*TypeCasely MagSafe Grippy Mount $25Grippy mount for photo and video opportunities.Anker MagGo 3-1 Wireless Charging Station$1103-1 MagSafe Wireless charging dock. Belkin Boostcharge Pro Qi2 Magnetic Power Bank 5k$60Portable MagSafe battery pack with kickstand. Telesin MagSafe Neck Mount$28MagSafe neck mount designed for video shooting.Journey Ezmo MagSafe Wallet and Stand$70MagSafe wallet for card and cash storage.Moft Snap on Phone Stand and Wallet$30MagSafe card holder and stand combo.Twelve South HiRise Pro$100Laptop stand with MagSafe wireless charging.*MSRP at the time of publication Which MagSafe accessory is right for you? Any of the MagSafe accessories on this list are great picks -- it just depends on what you are looking for, the price you are willing to spend, and what devices you currently have.Choose this MagSafe accessory...If you want...Casely MagSafe Grippy Mount A MagSafe content creation tool. Anker MagGo 3-1 Wireless Charging StationA seamless way to charge your devices, without all the wires. Belkin Boostcharge Pro Qi2 Magnetic Power Bank 5kAn easy way to boost your phone on-the-go. Telesin MagSafe Neck MountA hands-free option to easily record video. Journey Ezmo MagSafe Wallet and StandMagSafe storage for cards and cash.Moft Snap on Phone Stand and WalletA minimalistic, MagSafe card holder option. Twelve South HiRise ProA desk optimizer that strategically places your laptop and phone in the right place for easy charging and an organized space. Factors to consider when choosing a MagSafe accessory: As someone who regularly tests MagSafe accessories and gear, these are the three most critical things to keep in mind while you shop, both to ensure you nab the best products and avoid spending your cash on useless junk.Compatibility: This is the most important factor to keep in mind. Make sure that your iPhone is compatible with the accessory you are looking to purchase and that you keep an eye out for other requirements (often hidden in the fine print), like needing a MagSafe phone case. If you're not an iPhone user, be sure to find options to make your device MagSafe compatible (it's easy), and again, watch for compatibility when checking out. Always read full product descriptions before you add to your cart, trust me.Price: Probably the most obvious thing to keep in mind is the cost. MagSafe accessories can be really handy and helpful, but only if they're within your budget or worth the long-term investment. Otherwise, they may be an unnecessary expense or something that winds up sitting in a drawer for several years before being tossed out. Try to keep a reasonable budget for yourself when shopping, and remember that the best products aren't always the most expensive items on the market, and it's always a good idea to check out sale events.Use case: This ties into the bullet above, but keeping your use case in mind while shopping for MagSafe gear is critical to avoid buying junk that you throw out or give away down the line. For something to be worth the money you spend on it, it has to bring added value and fix a current problem you're experiencing with your phone. If you only need a card holder to store your transit card, you don't necessarily need to splash out on a pricier wallet option that holds more cards and cash. Try to stay reasonable with yourself to avoid spending unnecessary cash and contributing to more tech waste. How did we choose these MagSafe accessories? ZDNET only recommends products we ourselves have used or researched extensively so we can speak to each product's value, function, and overall user experience. While rounding up this list of MagSafe accessories (of which, we've tested every product included), here's a few things we kept in mind to guide our selections accordingly.Functionality: From laptop stands to car mounts, there's a diversity of MagSafe use cases on this list. We considered user experience and overall functionality in each product we spotlighted. Keep in mind that we've gone hands-on with many other MagSafe accessories like wallets, chargers, and battery packs, and you can check out our full, in-depth best of lists if you're looking for a few more options.Price: Accessorizing your mobile device is a lot like customizing a purse or a bedroom. You have essential items like cases and chargers, as well as nonessential add-ons like grips, stands, mounts, and more. The beauty of accessorizing is you can take it as little or as far as you'd like and spend as little or as much as you're comfortable with. While most accessories remain under the $100 mark, there are several items like MagSafe charging stations that can easily push over that limit. We made sure to consider numerous types of accessories across varying price points and their overall value compared to what you'll pay. We think every item on this list is worth the money if it's the type of product you're looking for, but ultimately, the total cost spent on accessorizing with MagSafe is up to you.Best List picks:The accessory options included in this list are certainly not the only options available on the market and are definitely not the only MagSafe accessories that we've tried. Since ZDNET has already extensively tested many MagSafe accessories across several categories, including MagSafe wallets, battery packs, wireless chargers, and more, we considered the top-ranking picks selected for those lists to ensure congruency on our site and to maintain the authority in our picks. What is MagSafe? MagSafe was originally developed as a safety feature for MacBook charging cords, but it's now built into iPhone 12, 13, 14, 15, and 16 models for use with a range of accessories.The system uses a series of magnets around the iPhone's internal charging coil that sense other compatible devices and hold them securely. The magnets are specifically designed for the MagSafe system to protect your iPhone from damage. Which iPhone models have MagSafe? All current iPhone models, including the iPhone 14, iPhone 15, and newly released iPhone 16, feature MagSafe charging. Older iPhones, such as the iPhone 12 and 13 also feature MagSafe technology. Some charging cases for Apple's AirPods, such as the latest AirPods Pro, also have MagSafe built in. Is MagSafe the same as Qi? The two systems work on the same wireless charging principles, but the key difference is that Qi chargers don't use magnets for alignment. Qi chargers need a near-perfect alignment for optimal speeds. The MagSafe system eliminates the hassle of positioning and repositioning your devices on the charger by using magnets to properly align the charging puck and iPhone's internal charging coils, giving you consistent, fast charging every time. Is MagSafe charging better than cable charging? It's a personal preference. Both cable charging and wireless charging boost your phone effectively. But with a cable, you must ensure you're near an outlet or alternative power source when recharging your phone.With MagSafe, you can experience wire-free charging at home and even purchase abattery packfor power on the go. So, if you're a mobile a lot, we recommend a MagSafe battery pack to keep your iPhone charged while you travel. For certain situations or environments, a cable may be preferred. Why should I bother with MagSafe accessories? MagSafe capabilities can enhance your user experience and your iPhone's functionality. Besides creating simpler, more efficient wireless charging, MagSafe technology opens the door for various accessories such as wallets, car vent clips and mounts, fitness mounts, power banks, grips and key ring accessories, and more to widen the iPhone experience and make your life as efficient as possible. Are there alternative MagSafe accessories to consider?Yes, the market is flooded with MagSafe accessory options; by all means, the ones we've included aren't your only options. Check out a few other picks we'd recommend below.ZDNET Recommends0 Reacties 0 aandelen 28 Views