memoment editorial

american man at computer

Farmers Insurance data breach exposes 1.1M Americans

NEWYou can now listen to Fox News articles!
Data breaches are no longer just a problem for the tech industry. They’ve become a constant across every sector, from airlines to banks to fashion brands, exposing personal data and leaving customers worried about where their information might end up. Insurance companies, sitting on mountains of sensitive details, are no exception. The latest to join the list is Farmers Insurance. The U.S. insurer confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year, stealing customer databases and fueling a growing wave of extortion attempts.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM/NEWSLETTER DIOR DATA BREACH EXPOSES US CUSTOMERS’ PERSONAL INFORMATIONWhat you need to know about the Farmers Insurance breachFarmers Insurance has confirmed a data breach impacting more than 1.1 million customers. The incident is tied to the ongoing wave of Salesforce-related cyberattacks that have hit major companies this year.In a notice published on its website, the U.S. insurance giant said the breach occurred on May 29, 2025, through one of its third-party vendors. Farmers serves over 10 million households nationwide. It offers auto, home, life, and business insurance through a vast network of agents and subsidiaries.”On May 30, 2025, one of Farmers’ third-party vendors alerted Farmers to suspicious activity involving an unauthorized actor accessing one of the vendor’s databases containing Farmers’ customer information,” the company wrote in its advisory. Farmers Insurance confirmed that more than 1.1 million customers were affected in a breach linked to the Salesforce attacks that have swept through major organizations this year. (Kindamorphic/Getty Images)According to the company, the vendor’s monitoring tools detected the intrusion quickly, allowing containment measures to be taken. Farmers said it immediately launched an investigation, notified law enforcement, and worked to determine the scope of the breach.The investigation revealed that the stolen data included customer names, addresses, dates of birth, and driver’s license numbers. In some cases, the last four digits of Social Security numbers. Farmers began notifying affected individuals on Aug. 22, with a filing to the Maine Attorney General’s Office confirming that 1,111,386 customers were impacted.While Farmers did not publicly name the vendor involved, reports indicate that the breach is part of the larger Salesforce data theft campaign carried out by threat actors this year.ALLIANZ LIFE INSURANCE DATA BREACH EXPOSES 1.4 MILLION AMERICANSThe Salesforce data theft campaignThe Salesforce attacks have been ongoing since early 2025. Researchers attributed them to a threat actor cluster tracked as UNC6040/UNC6240. The intrusions typically begin with voice phishing (vishing) calls, where employees are tricked into approving a malicious OAuth application linked to their company’s Salesforce instance.Once connected, attackers siphon customer relationship management (CRM) databases and use the stolen data in extortion attempts. The cybercrime group ShinyHunters has claimed responsibility, according to BleepingComputer. The group claims that the attacks involve overlapping threat groups, including members of the notorious Scattered Spider gang. Hackers exploited a third-party vendor tied to Salesforce systems to steal 1.1 million Farmers Insurance customer data. (Kurt “CyberGuy” Knutsson)”Like we have said repeatedly already, ShinyHunters and Scattered Spider are one and the same,” a representative told the publication. “They provide us with initial access, and we conduct the dump and exfiltration of the Salesforce CRM instances. Just like we did with Snowflake.”The Salesforce campaign has affected a growing list of high-profile companies, including Google, Cisco, Workday, Adidas, Qantas, Allianz Life and luxury brands under LVMH such as Louis Vuitton, Dior, and Tiffany & Co.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUPFarmers Insurance responseIn response to CyberGuy’s inquiry, a Farmers Insurance spokesperson shared the following statement:”At Farmers, protecting our customers’ information is our top priority. We recently discovered that an unauthorized third party briefly accessed a vendor’s system that contained some Farmers’ customer information. The incident involved only limited information from certain customers. An investigation-conducted with both internal and external security experts-found no evidence that the exposed data has been misused, nor any indication that Farmers’ own systems were compromised. We are contacting affected individuals directly and are providing support resources, including complimentary credit monitoring.”8 ways you can stay safe after a data breachIf your personal information has been exposed in the Farmers data breach, take the steps below immediately to limit the damage, protect your identity, and prevent future fraud. Farmers Insurance said it began notifying more than 1 million affected policyholders after detecting unauthorized access to customer records in a data breach. (Kurt “CyberGuy” Knutsson)1) Invest in a data removal serviceYou can’t undo the damage once hackers have accessed your data. However, you can limit the fallout by investing in a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap, and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.2) Use identity theft protection servicesYour Social Security number or other sensitive data may have been exposed in the data breach. Identity Theft companies can monitor personal information, such as your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.See my tips and best picks on how to protect yourself from identity theft at Cyberguy.com.3) Enable two-factor authentication (2FA)Turn on 2FA for your email, banking, and insurance logins. Even if a hacker has your password, 2FA requires a second verification step, like a code sent to your phone, making unauthorized access much harder.4) Be wary of phishing and follow-up scamsAfter a data breach, attackers often follow up with phishing emails or phone calls. They pretend to be from your insurance company or a support service. Don’t click on links in unsolicited messages, and verify any claims through official channels before responding. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at Cyberguy.com.5) Freeze your credit right awayPut a credit freeze on your files with Equifax, Experian and TransUnion. This stops criminals from opening new accounts in your name. It’s free, easy to set up, and you can lift the freeze temporarily when needed.6) Update your passwords nowChange your passwords for all important accounts. Start with email, financial, and health-related logins. Use strong, unique passwords for each account. Consider using a password manager, which securely stores and generates complex passwords, reducing the risk of password reuse.Next, see if your email has been exposed in past breaches. Our #1 password manager (see Cyberguy.com) pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials. Check out the best expert-reviewed password managers of 2025 at Cyberguy.com.7) Check your accounts for strange activityLook for any signs of identity misuse, like:Unknown chargesLogins from unfamiliar devicesNew accounts or lines of credit you didn’t openEarly detection makes a big difference.8) Report identity theft fastIf someone is misusing your identity, go to IdentityTheft.gov. This government site provides step-by-step help and generates the letters and reports you’ll need to stop the fraud.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayData breaches keep hitting companies we trust, and Farmers Insurance is the latest reminder. Even when the stolen data hasn’t been misused yet, the risk lingers long after the headlines fade. That’s why it’s so important to stay alert, protect your identity, and take simple steps now. By acting today, you put yourself in control, not the hackers.Do incidents like this make you reconsider which companies you do business with? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved. 

Farmers Insurance data breach exposes 1.1M Americans Read More »

megan mcarthur iss

NASA Astronaut Megan McArthur Retires

NASA astronaut Megan McArthur has retired, concluding a career spanning more than two decades. A veteran of two spaceflights, McArthur logged 213 days in space, including being the first woman to pilot a SpaceX Dragon spacecraft and the last person to “touch” the Hubble Space Telescope with the space shuttle’s robotic arm.
McArthur launched as pilot of NASA’s SpaceX Crew-2 mission in April 2021, marking her second spaceflight and her first long-duration stay aboard the International Space Station. During the 200-day mission, she served as a flight engineer for Expeditions 65/66, conducting a wide array of scientific experiments in human health, materials sciences, and robotics to advance exploration of the Moon under Artemis and prepare to send American astronauts to Mars.
Her first spaceflight was STS-125 in 2009, aboard the space shuttle Atlantis, the fifth and final servicing mission to Hubble. As a mission specialist, she was responsible for capturing the telescope with the robotic arm, as well as supporting five spacewalks to update and repair Hubble after its first 19 years in space. She also played a key role in supporting shuttle operations during launch, rendezvous with the telescope, and landing.
“Megan’s thoughtful leadership, operational excellence, and deep commitment to science and exploration have made a lasting impact,” said Steve Koerner, acting director of NASA’s Johnson Space Center in Houston. “Her contributions have helped shape the future of human space exploration, and we are incredibly grateful for her service.”
In addition to her flight experience, McArthur has served in various technical and leadership roles within NASA. In 2019, she became the deputy division chief of the Astronaut Office, supporting astronaut training, development, and ongoing spaceflight operations. She also served as the assistant director of flight operations for the International Space Station Program starting in 2017.
Since 2022, McArthur has served as the chief science officer at Space Center Houston, NASA Johnson’s official visitor center. Continuing in this role, she actively promotes public engagement with space exploration themes, aiming to increase understanding of the benefits to humanity and enhance science literacy.
“Megan brought a unique combination of technical skill and compassion to everything she did,” said Joe Acaba, chief of the Astronaut Office at NASA Johnson. “Whether in space or on the ground, she embodied the best of what it means to be an astronaut and a teammate. Her contributions will be felt by the next generation of explorers she helped train.”
McArthur was born in Honolulu and raised as a “Navy kid” in many different locations worldwide. She earned a Bachelor of Science in aerospace engineering from the University of California, Los Angeles, and a doctorate in oceanography from the Scripps Institution of Oceanography at the University of California, San Diego. Before being selected as an astronaut in 2000, she conducted oceanographic research focusing on underwater acoustics, which involved shipboard work and extensive scuba diving.
McArthur is married to former NASA astronaut Robert Behnken, who also flew aboard the Dragon Endeavour spacecraft during the agency’s SpaceX Demo-2 mission in 2020.
“It was an incredible privilege to serve as a NASA astronaut, working with scientists from around the world on cutting-edge research that continues to have a lasting impact here on Earth and prepares humanity for future exploration at the Moon and Mars,” said McArthur. “From NASA’s Hubble Space Telescope to the International Space Station, our research lab in low Earth orbit, humanity has developed incredible tools that help us answer important scientific questions, solve complex engineering challenges, and gain a deeper understanding of our place in the universe. Seeing our beautiful planet from space makes it so clear how fragile and precious our home is, and how vital it is that we protect it. I am grateful I had the opportunity to contribute to this work, and I’m excited to watch our brilliant engineers and scientists at NASA conquer new challenges and pursue further scientific discoveries for the benefit of all.”
To learn more about NASA’s astronauts and their contributions to space exploration, visit:
https://www.nasa.gov/astronauts
-end-
Shaneequa VereenJohnson Space Center, Houston281-483-5111shaneequa.y.vereen@nasa.gov

NASA Astronaut Megan McArthur Retires Read More »

1 mary kays iconic pink cadillac shifts to full electric

Mary Kay’s iconic pink Cadillac shifts to fully electric

NEWYou can now listen to Fox News articles!
Nearly 60 years ago, Mary Kay Ash was turned away by a car salesman who refused to sell her a car without a man’s signature. That moment became the catalyst for a legacy, one powered by determination, lipstick, and eventually, horsepower. Now, the iconic Mary Kay pink Cadillac is entering a bold new chapter: electric mobility. Mary Kay is offering its top-performing sales reps a fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish. It’s the first time the company’s legendary incentive vehicle is going fully electric, and it’s turning heads while staying true to its roots.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. A fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish is parked in front of Mary Kay. (Mary Kay)A statement in pink (and green)In a press release, CEO Ryan Rogers, grandson of founder Mary Kay Ash, called the move a tribute to the company’s past and a leap into the future:”With the introduction of the all-electric OPTIQ, we’re honoring that iconic legacy while driving into a transformative future-one grounded in our commitment to sustainability and dedication to inspiring and celebrating the achievements of our independent sales force for generations to come.”THIS EV HAS A FACE, AND IT TALKS BACK WITH AIIt’s not just a change in drivetrain. It’s a shift in mindset and a signal that luxury, reward, and eco-consciousness can coexist without compromise. The Cadillac Optiq grille and logo are seen up close. (Mary Kay)Why the pink Cadillac still mattersMary Kay pink Cadillacs are more than just a flashy ride. They represent achievement, empowerment, and recognition. Only the top 1% of the company’s sales force qualify. Even then, it’s not handed out lightly; recipients can choose a $900 monthly bonus instead. But 90% take the car. What makes these cars even more exclusive is that they’re leased for just two years. When the lease ends, they’re returned and repainted to the original factory color. That makes a true pink Cadillac a rare sight outside of Mary Kay circles. And yes, they’re beautiful. That pink pearl paint is exclusive, and few people outside the company ever get to drive one.VOLKSWAGEN’S ICONIC CUTE VAN DRIVES ITSELF WITH 360-DEGREE VISION The fully electric Cadillac Optiq wrapped in a custom “pink pearl” finish drives down a road. (Mary Kay)What this means for youWhether or not you’re building an empire through lipstick sales, this shift tells a bigger story. The auto industry is changing. EVs are no longer just for tech-savvy early adopters or Silicon Valley commuters. Now, they’re reaching industries built on tradition and glamour. The Mary Kay electric Cadillac shows how companies can preserve their legacy while embracing innovation. If you’re considering switching to an electric vehicle, this proves that style and sustainability don’t have to be at odds.Take my quiz: How safe is your online security?Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right – and what needs improvement. Take my Quiz here: Cyberguy.com.Kurt’s key takeawaysThis move isn’t just a flex. It’s a smart pivot that aligns Mary Kay with modern values while still honoring its founder’s bold spirit. And frankly, it’s refreshing to see a legacy brand walk the talk when it comes to sustainability and do it in such an eye-catching shade of pink.How do you see the integration of electric vehicles by legacy brands like Mary Kay impacting attitudes towards sustainability in industries rooted in tradition? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Mary Kay’s iconic pink Cadillac shifts to fully electric Read More »

hackers disable windows defender remotely fox news

Hackers found a way to turn off Windows Defender remotely

NEWYou can now listen to Fox News articles!
Most modern Windows PCs rely on Microsoft Defender as their first line of defense against malware. Over the years, it has evolved into a capable and often underrated antivirus that blocks a wide range of threats. But a hacker group has found a way to abuse a legitimate Intel CPU tuning driver in a “Bring Your Own Vulnerable Driver” (BYOVD) attack to completely disable Microsoft Defender.The technique has been observed since mid-July 2025 and is already being used in active ransomware campaigns. The method doesn’t rely on exploiting a software bug or delivering an obviously malicious file. Instead, it takes advantage of how the Windows driver system is designed to allow deep hardware access.Let’s discuss all you need to know about the attack and how you can stay safe.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIASign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. The Akira ransomware group exploits a legitimate Intel CPU tuning driver in cyberattacks to completely disable Microsoft Defender on Windows systems. (Kurt “CyberGuy” Knutsson)How Akira ransomware disables Microsoft DefenderThe Akira ransomware group has developed a new way to bypass security tools by using a legitimate Intel CPU tuning driver called rwdrv.sys from the performance-tweaking tool ThrottleStop. Security firm GuidePoint Security says attackers load this driver to gain kernel-level access to Windows systems, then install a second malicious driver, hlpdrv.sys, which changes the DisableAntiSpyware registry setting via regedit.exe to shut down Microsoft Defender.Once Defender is disabled, attackers can run other malicious programs undetected. GuidePoint says this method has been consistently spotted in Akira campaigns since mid-July. The Akira ransomware group has been infiltrating Windows operating systems by exploiting a legitimate driver to gain access. (Kurt “CyberGuy” Knutsson)Akira ransomware targets Microsoft Defender and SonicWall VPNsThe same group has also been linked to attacks targeting SonicWall VPN devices. SonicWall has stated that these incidents likely involve a known vulnerability, CVE-2024-40766, rather than a brand-new zero-day. The company recommends restricting VPN access, enabling multi-factor authentication, and disabling unused accounts as immediate defenses.Akira attacks often involve stealing data, setting up hidden remote access, and deploying ransomware to encrypt files across an organization. Security experts warn that fake or lookalike websites are increasingly being used to distribute these malicious tools.FBI WARNS SENIORS ABOUT BILLION-DOLLAR SCAM DRAINING RETIREMENT FUNDS, EXPERT SAYS AI DRIVING ITResearchers at GuidePoint have published a YARA detection rule, along with file names, service names, SHA-256 hashes, and file paths to help identify this activity. They recommend administrators actively monitor for these indicators, apply filtering and blocking rules as new IoCs emerge, and only download software from official or verified sources.We reached out to Microsoft for a comment, but did not hear back before our deadline. Antivirus software, two-factor authentication and data removal services are just a few ways Windows users can protect themselves from hackers. (Cyberguy.com)6 ways to protect yourself against Akira ransomware and similar threatsThe Microsoft Defender attack is smart and dangerous, but you’re not without defenses. Here are a few tips to help you stay safe:1) Use strong antivirus softwareEven with regular updates, Windows systems can be left exposed if built-in defenses are disabled. A strong antivirus software with real-time protection, kernel-level monitoring, and frequent updates can provide backup security. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices at CyberGuy.com.2) Limit exposureMany exploits rely on user interaction, such as clicking a shady link, downloading a compromised file, or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments, and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).3) Avoid running unexpected commandsNever paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.GOOGLE CONFIRMS DATA STOLEN IN BREACH BY KNOWN HACKER GROUP4) Keep your software updatedRegularly update your operating system, browsers, and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.5) Use two-factor authentication (2FA)Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.6) Invest in personal data removal servicesEven with strong device security, your personal information may still be exposed online through data brokers and people-finder sites.While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice.  They aren’t cheap – and neither is your privacy.  These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet.  By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPKurt’s key takeawayAkira’s trick shows a bigger flaw in how Windows trusts certain tools. A driver meant for harmless CPU tuning ends up being the key to turning security off. Since it’s from a legitimate source, Windows just lets it through without asking questions. We tend to think hackers always break in from the outside. Here, they’re already inside the circle of trust, using the system’s own rules.Should Microsoft be doing more to stop ransomware groups from disabling Defender? Let us know by writing to us at Cyberguy.com.Sign up for my FREE CyberGuy ReportGet my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.

Hackers found a way to turn off Windows Defender remotely Read More »

chupacabra nose

Alien Soccer Fans, WOW! Signal Gets More Wow, Nosey Chupacabra, Wet Bigfoot and More Mysterious News Briefly

A roundup of mysterious, paranormal and strange news stories from the past week.
You know a possible alien communication is famous if it gets a name, and few are more famous than the ‘Wow!’ signal detected on August 15, 1977, and named for the exclamation an astronomer wrote on the computer printout of the signal – the Wow! signal’s origin has never been determined, but a new paper by researchers from the Arecibo Wow! (AWOW) project at the Arecibo Observatory in Puerto Rico details a new analysis of the signal using modern technology; the researchers determined that the signal’s intensity (flux density) was four times greater than previous estimates, which suggested that the Wow! Signal came from a source within our galaxy and moved faster than previously thought; this adds support to the theory that the signal was not due to terrestrial radio interference (a popular theory) but had an astrophysical origin – small, cold hydrogen can produce these narrowband signals, which also suggests that later signals similar to Wow! had a common origin; this is not a “Wow!” moment (or even a Eureka!) but Abel Méndez, the lead author of the new study and director of the Planetary Habitability Laboratory at the University of Puerto Rico, says: “We are confident—and surprised—that we are getting closer” and the research will continue. If they prove it’s not a Wow!, should it be changed to a ‘Whoa!’ or a ‘WTF!’?
The three-fingered (tridactyl) mummies of Nazca, Peru, are back in the news once again as noted alien researcher Dr. Garry Nolan of Stanford University revealed on a recent podcast that he has been researching the fingers of the tridactyl mummies and found that “the fingerprints show characteristics that do not match those of humans or primates” and the complexity of these unusual fingerprints would be nearly impossible to fake; this calls into question claims that the mummies are fakes or dolls; Nolan would like to see a serious public study of the mummies which would cost about $5 million and require  multiple research teams, strict controls, and preparation for peer-reviewed publication’; Nolan would like to see genetic analysis of the mummies, noting that the three-fingered mutation, the strange heads and other body anomalies would require multiple genetic modifications across the genome and “evolution doesn’t work quite like that” – thus implying that they could indeed be of alien origin. Good luck with that – circus sideshows and cable alien programs get all the money these days.
The 1980 Rendlesham Forest UFO Incident gets analyzed once again in a new film, “Capel Green,” and the producer and director, Dion Johnson, and two witnesses, Larry Warren and Steve Longero, former U.S. Air Force Security Police officers stationed at Bentwaters Air Base in December 1980, gave their thoughts on a recent podcast – thoughts which Warren and Longero were not able to share before because they were told to “keep their mouths shut” by government officials; their biggest revelation was their claim that a second UFO – a large triangular craft – landed at Capel Green, a nearby location, and beings disembarked from it ; Warren said it was “a triangular object, about six meters across, rising to a rounded top” which he observed from only 4.5 meters (14.7 feet) away, a suitable distance to see  that beings came out of the object” and the three humanoid figures resembled so-called “alien Greys”; both men said this second Rendlesham incident was documented by “still, film, and video cameras” but all of the equipment and film was immediately confiscated by military officers. Who are you going to believe – the government, witnesses, a new movie, or your lyin’ eyes?
A rancher in Tintina in northern Argentina, thinks his cattle are being attacked by a Chupacabra after one of his employees saw a creature “bigger than a dog” and “with a completely different head” and ran away; when the worker returned, he found a dead calf covered in slime; even worse, the calf’s head was  “completely clean inside” as the creature could “suck the entire head out through the nostril” because the nose was eaten off; this and other dead cattle were said to have been ignored by crows and other scavengers and had no odor of decay; the rancher doesn’t believe it was dogs because his neighbor’s canines had been locked up; while there is no proof, the local media is stoking fears of Chupacabras with images and bold headlines. If it enters through the nostril, shouldn’t this creature be called a “Chupador de nariz” (nose sucker)?

Could this be why the Chupacabra hates noses?

If there’s something strange in your house, a viral video recommends that before you call the Ghostbusters you can check for spirits yourself with a simple glass of salt water – according to the video, a half-glass of water with a pinch of salt should be left undisturbed in a quiet corner of the house for seven days; after a week, if the glass shows bubbles, surface patterns or cloudy spots, the water absorbed the energy vibrations of a spirit (or spirits) and they crystalized the salt, thus detecting their presence; while some people swear by this folkloric homemade ghost detector, scientists say simple capillary action draws the salt water up the side of the glass where it dries out, leaving salt crystals which further stimulate the capillary action, causing more crystals to form. If the salt leaves a shadow, does that mean six more weeks of haunting?
A famous UFO sighting occurred on October 27, 1954, when 10,000 fans at a football (soccer) match between the Fiorentina club and its local rival Pistoiese looked up and saw egg-shaped and cigar-shaped UFOs flying over the stadium – an event that fueled rumors of an alien invasion but was eventually explained as a case of mistaken identity with migrating masses of spiders caught up by the wind being the culrpits; however, that linked UFOs to soccer to this day as shown by a new poll of fans of teams in England’s Premier League which found that Sunderland fans were most likely to have seen a UFO or alien, with eight per cent of them reporting an encounter; they were followed by Newcastle United (7%), Everton (6%), Aston Villa (6%), Burnley (5%) and West Ham United (4%); surprisingly, fans of all 20 teams reported UFO sightings, including Chelsea (2%), Wolverhampton Wanderers (2%) and Brighton & Hove Albion at the bottom with 1% of its fans seeing UFOs. If aliens are fans, do they call it football, soccer or humans kicking balls?
The alleged black-and-white alien autopsy film unveiled in 1995 showing 18 minutes of scientists in hazmat suits dissecting the corpse of an alien said to have been recovered from a UFO crash site near Roswell in New Mexico, US, in 1947 has been proven fake by the filmmakers who created it, but that hasn’t stopped others from profiting from it – the latest is director John Dower who released a new documentary on the making of the fake film, and says the research and investigation for the documentary has convinced him that one claim that the fake was a recreation “based on original frames from an existing post-war film”; Dower says, “I’ve directed some bonkers documentaries in my time but never one in which it is so difficult to work out what is real and what isn’t”. A documentary based on a fake film based on a real but lost movie – even rabbits think this is a deep hole.

You can watch, but you’re not licensed to practice in this state.

The mystery of fast radio bursts – whether they are a natural result of a supernova exploding into a magnetar or a signal deom an alien civilization – got a little less mysterious when researchers from the Harvard & Smithsonian Center for Astrophysics and McGill University in Canada announced they had finally tracked one (FRB 20250316A or ‘RBFLOAT,’ which was discovered in March 2025) to the galaxy NGC 4141 just 130 million light-years away from Earth; then they used the James Webb Space Telescope (JWST) to locate a faint infrared light they called NIR-1 on the outskirts of NGC 4141 which might be a star cluster or a faint single object; that object and its FRB could be a red giant star, a magnetar pulling material from the dying red giant, or an echo from the actual FRB, which could lead astronomers to the real source; to put this game-changing discovery in perspective, Amanda Cook, a McGill-based Postdoctoral Researcher who led the study, said in the press release: “The precision of this localization, tens of milliarcseconds, is like spotting a quarter from 100 kilometers away”. No, they don’t have time to help you find that diamond earring you lost.
One of the most impressive features of the James Webb Space Telescope was how it was compactly folded into an origami-like bundle for transport before it was successfully unfolded in space – now, origami experts in Japan have developed a new family of origami shapes that are even more compact and reliable so that they can be used to build the next generation of spaceships; the origami structures are called bloom patterns because they fold up flat and unfold like flower petals; in a new study, engineers at Brigham Young University explain how they developed a mathematical model for how the bloom patterns work, built physical paper models, paper prototypes and even #D printed plastic models that unfolded reliably; besides in space, these shapes can be used for Earth-bound structures like temporary shelters, pop-up buildings and even robot parts. Once again, Mother Nature gives us better answers than AI … but for how long?
The Bigfoot Field Researchers Organization received a report from a motorist in Tuttle, Oklahoma, who says he was driving on Hwy 4 bridge over the Canadian River on August 4, 2025, when he looked down and “saw a very large black figure walking across the river”; while he couldn’t make out details, he said “the size was massive and it was walking on two legs” in water that was up to its knees; he told the BFRO investigator it was  “wider than 50 gallon drum” with dark or black fur; the creature left a wake as it walked and the witness said the fur may have been wet as if it had been submerged in the river; BFRO deemed him to be a credible witness and called this a Class A Bigfoot sighting. If Sasquatch can swim underwater, hunters are going to need a bigger towel.

It beats running laps around the lake.

UFOs aren’t the only mystery being covered up by the authorities as a woman in England found out when she was driving on the M5 between J12 and 11A in Gloucestershire when she swears she saw a dead puma on the median; Jodie Jenkins said she had just seen a program about alien big cats and was sure this was one because “the length of the body from rear end to shoulder was long and looked muscular” and it was “sandy and tan color”; her passenger also saw the dead cat, as did another person traveling on the M5 at the same time who saw Jenkins’ report on social media and commented that they runed around and witnessed two police officers carrying the ABC away in a white sheet; Wildlife enthusiast and big cat researcher Frank Tunbridge received an email from Jenkins about the cat and noted that “Gloucestershire has always been a hot spot for British big cat sightings, and where this deceased one was located is in an area often frequented by big cats”; he also noted that “the majority of these fatal collisions I believe have soon been removed by the police, or other authority” and not publicized, which he believes is wrong because they’re real and should be accepted as part of the local fauna. As always, the cover-up is worse than the actual reality.
Leann Hunting, the Director of Animal Industry at Utah Department of Agriculture and Food (UDAF), called for an investigation into the mysterious mutilation of a bull in East Carbon because it was found on Bureau of Land Management land – investigators found “very suspicious circumstances” such as the bull’s reproductive organs being removed ”but there were no tracks around the animal, or tracks leading up to the animal”; Hunting says the investigators were able to “rule out other factors and say that it was mutilation” and the Utah Department of Agriculture and Food is offering a reward for information to help them resolve the mystery. We’re not saying it’s aliens … but the cows might be.
Yorktown Memorial Hospital in Yorktown, Texas, was closed as a hospital in 1986 and as a drug and alcohol rehabilitation center in the 1990s, after which its reported paranormal activities have made it a popular site for ghost hunters, but that may change soon after the City Council of Yorktown ordered it shut down for safety reasons; the ghosts are believed to be the spirits of some of the thousands of former patients who died there; Curious Twins Tours & Events co-owners Fred and Stephen Garza-Guzman say they put their proceeds back into the upkeep of the building and were blindsided by the order – they’re hoping to resolve it by having it designated a historical building. Is it possible that the spirits are influencing the shutdown so they can finally rest in peace?
Researchers from the Environmental Studies Group (GEA) of the University of Magallanes (UMAG) in Chile have trail cameras set up in remote areas for the monitoring of ecosystems, but they were surprised when one placed 54 kilometers north of Punta Arenas at the edge of a meadow far from any roads picked up a series of bright lights seemingly moving downward; the UMAG team ruled out vehicles or wildlife so they sent the images to the General Directorate of Civil Aeronautics (SEFAA), the UFO Museum of La Serena, and specialists in anomalous aerial phenomena; after performing a technical analysis, UFO researcher Freddy Alexis Silva called it “mind- blowing” as the speed was estimated to be 947 km/h, equivalent to Mach 0.7 and close to the speed of sound; Rodrigo Bravo Garrido of GEA UMAG said unidentified aerial phenomena in Patagonia “have indeed existed” but he feels this one “is a first and something very unprecedented” that needs to be further investigated. It’s about time the U.S. has scientists more involved in the investigations of UAPs.
A new study, “Detecting Extraterrestrial Civilizations that Employ an Earth-level Deep Space Network”, published in Astrophysical Journal Letters and written by scientists from Penn State and NASA’s Jet Propulsion Laboratory (JPL), proposes that those involved in the search for extraterrestrial intelligence (SETI) should assume that ETs with the ability to leave their planet will be tracking those ships and satellites in their own deep space, so we should look for signals similar to NASA’s deep space transmissions to satellites, planetary missions and the Voyager and Pioneer probes; two decades of deep space network (DSN) revealed that, if aliens were in a position to observe an Earth-Mars alignment, there’s a 77% chance they’d be in the path of our transmissions; the study recommends searching within 23 light-years for systems with orbital planes edge-on to Earth and look for laser signals rather than radio waves because they spill less around other planets. Good idea – this could identify aliens within our pay grade and less likely to be superior – and hostile – to us.
The potential for humans with animal parts just became closer to reality with the successful transplanting of a pig lung in a human (called ‘’xenotransplantation’) – successful because the lung remained viable for 9 days in the body of a brain-dead man following a brain hemorrhage; the pig lung was genetically modified to help prevent rejection; gene-edited kidneys, hearts and livers from pigs have been successfully transplanted into living humans, but lungs are more difficult because of their delicateness, complexity and exposure to toxins from air breathed by the human; the operation was done in China which has less regulations and ethical concerns than other countries; the study, published in the journal Nature Medicine, points out that transplanting genetically modified lungs into living humans could be decades away. It’s not a chimera or an episode of ‘Seinfeld’ – just another example of the importance of scientific research.

Impressive – now do the reverse.

While hiking with his brother on Colorado’s 14,068-foot Humboldt Peak on August 19, Jeffrey Winzenried photographed what looks like a humanoid alien or creature walking near the summit of Humboldt Peak; the arms look like they are resting on the being’s hips and Winzenried says it appeared to walk forward toward the crest of a false summit before disappearing; his brother didn’t see it and other hikers on the trail made no comments to suggest they observed the being; Winzenried was open-minded on social media but many commenters believed the being was not human; because Winzenried said it was moving, that eliminates a rock or a tree but the distance doesn’t help in identifying the anomaly. If it were an alien, it’s good to see them getting some exercise rather than abducting cattle.

Alien Soccer Fans, WOW! Signal Gets More Wow, Nosey Chupacabra, Wet Bigfoot and More Mysterious News Briefly Read More »

Webb s view of planet forming disc IRAS 04302 2247 pillars

Dusty wisps round a dusty disc

Science & Exploration

29/08/2025
420 views
10 likes

For this new Picture of the Month feature, the NASA/ESA/CSA James Webb Space Telescope has provided a fantastic new view of IRAS 04302+2247, a planet-forming disc located about 525 light-years away in a dark cloud within the Taurus star-forming region. With Webb, researchers can study the properties and growth of dust grains within protoplanetary discs like this one, shedding light on the earliest stages of planet formation.

Webb’s view of planet-forming disc IRAS 04302+2247

In stellar nurseries across the galaxy, baby stars are forming in giant clouds of cold gas. As young stars grow, the gas surrounding them collects in narrow, dusty protoplanetary discs. This sets the scene for the formation of planets, and observations of distant protoplanetary discs can help researchers understand what took place roughly 4.5 billion years ago in our own Solar System, when the Sun, Earth, and the other planets formed.IRAS 04302+2247, or IRAS 04302 for short, is a beautiful example of a protostar – a young star that is still gathering mass from its environment – surrounded by a protoplanetary disc in which baby planets might be forming. Webb is able to measure the disc at 65 billion km across – several times the diameter of our Solar System. From Webb’s vantage point, IRAS 04302’s disc is oriented edge-on, so we see it as a narrow, dark line of dusty gas that blocks the light from the budding protostar at its centre. This dusty gas is fuel for planet formation, providing an environment within which young planets can bulk up and pack on mass.When seen face-on, protoplanetary discs can have a variety of structures like rings, gaps and spirals. These structures can be signs of baby planets that are burrowing through the dusty disc, or they can point to phenomena unrelated to planets, like gravitational instabilities or regions where dust grains are trapped. The edge-on view of IRAS 04302’s disc shows instead the vertical structure, including how thick the dusty disk is. Dust grains migrate to the midplane of the disc, settle there and form a thin, dense layer that is conducive to planet formation; the thickness of the disc is a measure of how efficient this process has been.The dense streak of dusty gas that runs vertically across this image cocoons IRAS 04302, blotting out its bright light such that Webb can more easily image the delicate structures around it. As a result, we’re treated to the sight of two gauzy nebulas on either side of the disc. These are reflection nebulas, illuminated by light from the central protostar reflecting off of the nebular material. Given the appearance of the two reflection nebulas, IRAS 04302 has been nicknamed the ‘Butterfly Star’.This view of IRAS 04302 features observations from Webb’s Near-InfraRed Camera (NIRCam) and its Mid-InfraRed Instrument (MIRI), combined with optical data from the NASA/ESA Hubble Space Telescope. Together, these powerful facilities paint a fascinating multiwavelength portrait of a planetary birthplace. Webb reveals the distribution of tiny dust grains as well as the reflection of near-infrared light off of dusty material that extends a large distance from the disc, while Hubble focuses on the dust lane as well as clumps and streaks surrounding the dust that suggest the star is still collecting mass from its surroundings as well as shooting out jets and outflows.

Webb zooms in on a dusty disc

More informationThe Webb observations of IRAS 04302 were taken as part of the Webb GO programme #2562 (PI F. Ménard, K. Stapelfeldt). This programme investigates four protoplanetary discs that are oriented edge-on from our point of view, aiming to understand how dust evolves within these discs. The growth of dust grains in protoplanetary discs is believed to be an important step toward planet formation.
Release on esawebb.orgScience paper (M. Villenave et al.)Webb is the largest, most powerful telescope ever launched into space. Under an international collaboration agreement, ESA provided the telescope’s launch service, using the Ariane 5 launch vehicle. Working with partners, ESA was responsible for the development and qualification of Ariane 5 adaptations for the Webb mission and for the procurement of the launch service by Arianespace. ESA also provided the workhorse spectrograph NIRSpec and 50% of the mid-infrared instrument MIRI, which was designed and built by a consortium of nationally funded European Institutes (The MIRI European Consortium) in partnership with JPL and the University of Arizona.Webb is an international partnership between NASA, ESA and the Canadian Space Agency (CSA).
Contact:ESA Media relationsmedia@esa.int

Like
Thank you for liking
You have already liked this page, you can only like it once!

Dusty wisps round a dusty disc Read More »

meatball w black background

NASA Awards Spaceflight Operations, Systems Organization Contract

NASA has awarded ASCEND Aerospace & Technology of Cape Canaveral, Florida, the Contract for Organizing Spaceflight Mission Operations and Systems (COSMOS), to provide services at the agency’s Johnson Space Center in Houston.
The COSMOS is a single award, indefinite-delivery/indefinite-quantity contract valued at $1.8 billion that begins its five-year base period no earlier than Dec. 1, with two option periods that could extend until 2034. The Aerodyne Company of Cape Canaveral, Florida, and Jacobs Technology Company of Tullahoma, Tennessee, are joint venture partners.
Work performed under the contract will support NASA’s Flight Operation Directorate including the Orion and Space Launch System Programs, the International Space Station, Commercial Crew Program, and the Artemis campaign. Services include Mission Control Center systems, training systems, mockup environments, and training for astronauts, instructors, and flight controllers.
For more information about NASA and agency programs, visit:
https://www.nasa.gov
-end-
Tiernan DoyleHeadquarters, Washington202-358-1600tiernan.doyle@nasa.gov
Chelsey BallarteJohnson Space Center, Houston281-483-5111chelsey.n.ballarte@nasa.gov

NASA Awards Spaceflight Operations, Systems Organization Contract Read More »

20410 imap spinning h264 00001 print

NASA Invites Media to Learn About New Missions to Map Sun’s Influence

NASA will hold a media teleconference at 12 p.m. EDT on Thursday, Sept. 4, to discuss the agency’s upcoming Sun and space weather missions, IMAP (Interstellar Mapping and Acceleration Probe) and Carruthers Geocorona Observatory. The two missions are targeting launch on the same rocket no earlier than Tuesday, Sept. 23.
The IMAP mission will map the boundaries of our heliosphere, the vast bubble created by the Sun’s wind that encapsulates our entire solar system. As a modern-day celestial cartographer, IMAP will explore how the heliosphere interacts with interstellar space, as well as chart the range of particles that fill the space between the planets. The IMAP mission also will support near real-time observations of the solar wind and energetic particles. These energetic particles can produce hazardous space weather that can impact spacecraft and other NASA hardware as the agency explores deeper into space, including at the Moon under the Artemis campaign.
NASA’s Carruthers Geocorona Observatory will image the ultraviolet glow of Earth’s exosphere, the outermost region of our planet’s atmosphere. This data will help scientists understand how space weather from the Sun shapes the exosphere and ultimately impacts our planet. The first observation of this glow – called the geocorona – was captured during Apollo 16, when a telescope designed and built by George Carruthers was deployed on the Moon.
Audio of the teleconference will stream live on the agency’s website at:
https://www.nasa.gov/live
Participants include:

Nicky Fox, associate administrator, Science Mission Directorate, NASA Headquarters in Washington
Teresa Nieves-Chinchilla, director, Moon to Mars Space Weather Analysis Office, NASA’s Goddard Space Flight Center in Greenbelt, Maryland
David J. McComas, IMAP principal investigator, Princeton University
Lara Waldrop, Carruthers Geocorona Observatory principal investigator, University of Illinois Urbana-Champaign

To participate in the media teleconference, media must RSVP no later than 11 a.m. on Sept. 4 to Sarah Frazier at: sarah.frazier@nasa.gov. NASA’s media accreditation policy is available online.
The IMAP and Carruthers Geocorona Observatory missions will launch on a SpaceX Falcon 9 rocket from Launch Complex 39A at NASA’s Kennedy Space Center in Florida. Also launching on this flight will be the National Oceanic and Atmospheric Administration’s (NOAA) Space Weather Follow On – Lagrange 1 (SWFO-L1), which will monitor solar wind disturbances and detect and track coronal mass ejections before they reach Earth.
David McComas, professor, Princeton University, leads the IMAP mission with an international team of 27 partner institutions. The Johns Hopkins Applied Physics Laboratory in Laurel, Maryland, built the spacecraft and will operate the mission. NASA’s IMAP is the fifth mission in NASA’s Solar Terrestrial Probes Program portfolio.
The Carruthers Geocorona Observatory mission is led by Lara Waldrop from the University of Illinois Urbana-Champaign. Mission implementation is led by the Space Sciences Laboratory at University of California, Berkeley, which also designed and built the two ultraviolet imagers. BAE Systems designed and built the Carruthers spacecraft.
The Solar Terrestrial Probes Program Office, part of the Explorers and Heliophysics Project Division at NASA Goddard, manages the IMAP and Carruthers Geocorona Observatory missions for NASA’s Science Mission Directorate.
NASA’s Launch Services Program, based at NASA Kennedy, manages the launch service for the mission.
To learn more about IMAP, please visit:
https://www.nasa.gov/imap
-end-
Abbey Interrante / Karen FoxHeadquarters, Washington301-201-0124 / 202-358-1600abbey.a.interrante@nasa.gov / karen.c.fox@nasa.gov
Sarah FrazierGoddard Space Flight Center, Greenbelt, Md.202-853-7191sarah.frazier@nasa.gov

NASA Invites Media to Learn About New Missions to Map Sun’s Influence Read More »

woman shopping on amazon

Cybersecurity expert reveals simple trick to stop companies from tracking your online shopping

NEWYou can now listen to Fox News articles!
We’re conditioned to think our email address is harmless. Most of us think it’s just an ID, a way to get receipts and shipping updates, but that’s not it.Your email is the skeleton key to your online identity. It’s what companies use to build behavioral profiles, target ads, link purchases and, sometimes worse, facilitate fraud after a breach. And when you reuse the same email address everywhere, you make that key universal.To keep things private, I use an alias for online shopping to stay anonymous, cut down on spam and more. Let’s discuss what aliases are, why they matter and how they quietly turn the tables in your favor.Sign Up For My Free Cyberguy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.JOBS THAT ARE MOST AT RISK FROM AI, ACCORDING TO MICROSOFT A woman browses the Amazon website on her laptop Sept. 29, 2024. (Serene Lee/SOPA Images/LightRocket)How email aliases help you stay anonymous onlineEach time you enter your main email on a shopping site, you give that company a lasting way to connect your behavior across different platforms, devices and timeframes. They might hash or encrypt your email, but the behavioral patterns remain. You can still be tracked, but aliases interrupt that chain.Instead of sharing my actual email address, I create a unique one for each website. The emails still reach me through forwarding, but the company never sees my real address. That small change prevents them from linking my activity with other accounts or sites. It is not a perfect solution, but it adds just enough friction to disrupt the tracking systems.Every alias I use becomes a kind of tracker. If one starts getting spam, I know which site sold or lost my data. Most people don’t know where the breach happened, they just assume “it happens.” I take a different approach. When an alias starts getting unwanted emails, I do not try to unsubscribe or set up filters or waste time guessing. I simply disable the alias, and the problem is gone.HOW SCAMMERS TARGET YOU EVEN WITHOUT SOCIAL MEDIA A spam phishing email is displayed on a laptop screen March 21, 2022. Retail companies often sell shopper data, leading to unwanted spam and phishing messages. (Peter Dazeley)Stop companies from tracking you with email aliasesThe average e-commerce site uses between 15 and 30 third-party scripts, analytics trackers, ad pixels and behavioral beacons, according to a study. Even if the site itself is honest, its stack probably isn’t. Your email passes through layers of infrastructure, mailing tools, CRM platforms, shipping plugins. And all it takes is one misconfiguration or a careless developer for your data to end up in the wrong hands.An alias reduces the blast radius. If the site gets breached, your core identity remains untouched.Aliases don’t just protect privacy, they improve behavior. When I started using them, I found myself thinking more clearly about where I was signing up and why. The mental pause required to generate a new alias made me more deliberate. And it gave structure to the mess. I could set rules like all product warranties going to products@myalias.com, all newsletters to news@myalias.com.OVER 2B USERS FACE PHISHING RISKS AFTER GOOGLE DATA LEAKCreate email aliases for better online privacyAn alias alone isn’t enough to stay safe out there. You also need a secure email provider to start with. By creating email aliases, you can protect your information and reduce spam. These aliases forward messages to your primary address, making it easier to manage incoming communications and avoid data breaches. For recommendations on private and secure email providers that offer alias addresses, visit Cyberguy.com. A woman browses Best Buy on her smartphone while online shopping. (Serene Lee/SOPA Images/LightRocket)Kurt’s key takeawayWe’ve made progress when it comes to password hygiene. Many of us now use password managers and enable two-factor authentication, but when it comes to email, the habits haven’t changed much. Most people still rely on a single email address for everything, including shopping, banking, subscriptions, work and even family communication. That’s not just inefficient but also a security risk. Using email aliases is a simple way to fragment your digital identity. It adds complexity for attackers and reduces the chances of a single breach affecting multiple accounts.Would you still use your main email for everything if you knew it made you easier to track? Let us know by writing to us at Cyberguy.com.CLICK HERE TO GET THE FOX NEWS APPSign Up For My Free Cyberguy ReportGet my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide — free when you join my CYBERGUY.COM newsletter.Copyright 2025 CyberGuy.com.  All rights reserved.  

Cybersecurity expert reveals simple trick to stop companies from tracking your online shopping Read More »

astronaut group photo for downlink advisory aug 28

NASA, International Astronauts to Address Students from New York

NASA astronaut Jonny Kim and JAXA (Japan Aerospace Exploration Agency) astronaut Kimiya Yui will connect with students in New York as they answer prerecorded science, technology, engineering, and mathematics (STEM) questions aboard the International Space Station.
The Earth-to-space call will begin at 9:20 a.m. EDT on Friday, Sept. 5, and will stream live on the agency’s Learn With NASA YouTube channel.
Media interested in covering the event must RSVP by 5 p.m. Wednesday, Sept. 3, to Sara Sloves at: 917-441-1234 or ssloves@thecomputerschool.org.
The Computer School will host this event in New York for middle school students. The goal of this event is to extend learning by exposing students to the real-world experiences and engineering challenges of astronauts working and living aboard the International Space Station.
For nearly 25 years, astronauts have continuously lived and worked aboard the space station, testing technologies, performing science, and developing skills needed to explore farther from Earth. Astronauts communicate with NASA’s Mission Control Center in Houston 24 hours a day through SCaN’s (Space Communications and Navigation) Near Space Network.
Research and technology investigations taking place aboard the space station benefit people on Earth and lay the groundwork for other agency deep space missions. As part of NASA’s Artemis campaign, the agency will send astronauts to the Moon to prepare for future human exploration of Mars, inspiring the world through discovery in a new Golden Age of innovation and exploration.
See more information on NASA in-flight calls at:
https://www.nasa.gov/stemonstation
-end-
Gerelle DodsonHeadquarters, Washington202-358-1600gerelle.q.dodson@nasa.gov
Sandra JonesJohnson Space Center, Houston281-483-5111sandra.p.jones@nasa.gov

NASA, International Astronauts to Address Students from New York Read More »