Follow this tag to curate your own personalized Activity Stream and email alerts.
Cybersecurity firm Cisco Talos is warning of the potential for hackers to target architects and other designers with crypto-mining malware. The hacking campaign, which has largely targeted French-speaking architects, engineers, and graphic designers, sees the victim’s computer infected with... View full entry
Information stolen from the servers of Zaha Hadid Architects (ZHA) is being held at ransom by computer hackers. The Architect’s Journal reports that the 348-person, London-based practice has been ensnared by a ransomware attack that has resulted in the loss of some unknown quantity of... View full entry
Little by little, new biometric technologies are making inroads into the domestic sphere. The Wall Street Journal reports that digital fingerprint lock and facial-recognition systems have become a fact of life for some of the wealthiest homeowners and now come standard for many high-end... View full entry
Among the toughest cybersecurity challenges cities face are recruiting a skilled workforce, increasing education and training for employees on cyberthreats, and taking steps to ensure utility companies and service providers are protecting public water and electrical systems. [...]
Cybersecurity experts say large cities are competing with private companies to recruit and retain skilled workers. Smaller cities, particularly in rural areas, often lack staffing and funds for cybersecurity
— mystatesman.com
More cybersecurity and hacker news on Archinect:Hack The CityFrance moves to block Tor, ban free and public Wi-FiArchitecture of paranoiaTraffic Lights are Easy to HackWhen 'Smart Homes' Get Hacked: I Haunted A Complete Stranger's House Via The InternetThe New French Hacker-Artist Underground View full entry
NBBJ calls the concept No-Shadow Tower, though it would be more accurate to call it the Smaller-Shadow-From-One-of-Two-Towers, since it depends on a pair of buildings separated by an open space. For that reason, the technique is an awkward fit for New York — NY Magazine
A weeklong series of ideas for improving urban life, ranging from an examination of how Next-Generation Drones Will Save New York City’s Infrastructure, to how new building designs will usher in the Age of Shadowless Skyscrapers. View full entry
Sometimes it's easy to pretend that architecture exists outside of this world, erupting instead in the blank of a 3D space governed only by the laissez-fair laws of software. But sometimes a news headline will penetrate through this fog of imagination, appearing as a blazing light shining forth... View full entry
Friday, October 3:Eisenhower Memorial clears key hurdle on Gehry design: In a positive step for the Memorial's Approving Process Odyssey, the National Capital Planning Commission has OK'd the Commission on Fine Arts (the other federal body that must approve the design) to vote on the... View full entry
Hacking an architecture exhibition through augmented reality? Yes, there's an app for that. "Project Source Code" is a digital guerrilla-style exhibition created by architect/artist/researcher Güvenç Özel that lets mobile-device users "hack" key works in Rem Koolhaas' "Elements of Architecture"... View full entry
In a paper published this month, the researchers describe how they very simply and very quickly seized control of an entire system of almost 100 intersections in an unnamed Michigan city from a single ingress point. The exercise was conducted on actual stoplights deployed at live intersections [...] As is typical in large urban areas, the traffic lights in the subject city are networked ... allowing them to pass information to and receive instruction from a central management point. — Ars Technica
A hacker with a smartphone can unlock your front door [...] Criminals and intelligence agencies grab data from your home thermostat to plan robberies or track your movements. According to computer-security researchers, this is the troubling future of the Internet of Things, the term for an all-connected world where appliances like thermostats, health-tracking wristbands, smart cars and medical devices communicate with people and each other through the Internet. — Al Jazeera
“I can see all of the devices in your home and I think I can control them,” I said to Thomas Hatley, a complete stranger in Oregon who I had rudely awoken with an early phone call on a Thursday morning.
He and his wife were still in bed. Expressing surprise, he asked me to try to turn the master bedroom lights on and off. Sitting in my living room in San Francisco, I flipped the light switch with a click, and resisted the Poltergeist-like temptation to turn the television on as well.
— forbes.com
A federal court ruled last week that an employer didn't violate a federal anti-hacking law when it took over an employee's LinkedIn account after firing her, Ars Technica reported.
Edcomm, the Pennsylvania company Linda Eagle presided over until it was bought out in 2010, fired Eagle in 2011, according to Ars Technica.
— businessinsider.com
Through meticulous infiltration, UX members have carried out shocking acts of cultural preservation and repair, with an ethos of “restoring those invisible parts of our patrimony that the government has abandoned or doesn’t have the means to maintain.” The group claims to have conducted 15 such covert restorations, often in centuries-old spaces, all over Paris. — wired.com