
Taurikura Drive upgrade: More lanes, signals for growing Tauriko
The upgrade also integrates with future improvements along Whiore Ave as part of the SH29 Tauriko Enabling Works, which will provide a direct connection to SH29/Cambridge Rd and the future community at Tauriko West for buses, walking and cycling.
Tauriko Ward Councillor Marten Rozeboom said the project addresses the transport needs of the area before it grows further.
'We know activity in the area will grow with new housing at Tauriko West, the continued development of the Tauriko Business Estate and the expansion of Tauranga Crossing.
'Traffic volumes are already increasing in and around Tauriko, so we need to get this upgrade underway now.'
Following a thorough tender process, Fulton Hogan Ltd have been appointed to deliver the project on behalf of Tauranga City Council.
The works are expected to take up to 12 months to complete, the bulk by October 2025, before the busy Christmas retail period.
To complete the works as quickly as possible, they will be undertaken during the day and night and some weekends.
Traffic management will be in place, including lane closures and speed limits, but access to Tauranga Crossing and the BP service station and through to the other businesses in the Tauriko Business Estate will be maintained.
'We're working with Tauranga Crossing and BP to ensure disruption is reduced where possible, and with NZTA on how nearby infrastructure projects can align,' Rozeboom said.
Tauranga Crossing Limited Centre manager Janet Vincent said the shopping centre team is looking forward to seeing the work underway.
'This upgrade will improve access to our growing shopping centre, and it will provide easier and safer options for our shoppers to move around,' Vincent said.
'We've worked closely with the council on the design of the upgrade and will continue to do so in the construction phase, to help ensure the needs of our retailers, shoppers and suppliers are taken into account throughout.'
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

1News
3 days ago
- 1News
Christmas opening signalled for flagship New Zealand Ikea store
New Zealand's first Ikea store is set to open its doors at Auckland's Sylvia Park in time for the busy Christmas shopping season — with Kiwi Property Group working with Auckland Transport to manage the expected influx of visitors. Speaking at the company's annual general meeting, Kiwi Property chairperson Simon Shakesheff confirmed the Swedish retailer was targeting a Christmas launch at the Mt Wellington site, located next to Sylvia Park. "IKEA is likely to open around the Christmas trading period at the end of this year, and we look forward to the strength of their brand acting as a magnet to the Sylvia Park precinct." Shakesheff said the company anticipated "great interest" in Ikea and expected it would drive retail tourism to Sylvia Park. "We are cognisant of the impacts on traffic in the surrounding area, and Kiwi Property is working closely with Auckland Transport to develop a traffic mitigation plan." ADVERTISEMENT Public transport links would be key in mitigating congestion, with the train station, motorway and bus linkages all providing access to Sylvia Park, he said. "We've made sure that accessing Sylvia Park shopping centre is as seamless as possible, with pedestrian connectivity progressing well in the form of a covered walkway between the two sites." IKEA had initially announced in January 2019 it would open a New Zealand store "in the next few years", but this was delayed by the Covid-19 pandemic. Construction on the 34,000 square-metre store began in June 2023. The store would be three floors - the bottom level a carpark followed by two levels of retail - and have a restaurant and bistro featuring its famous meatballs. Work was also completed on an external warehouse near Auckland Airport in December last year. IKEA had initially announced in January 2019 it would open a New Zealand store "in the next few years", but this was delayed by the Covid-19 pandemic. Operating in 31 markets and founded in 1943, the IKEA brand was operated by several companies with different owners. The New Zealand operation was run by Ingka Group, which represented about 90% of IKEA stores. Mirja Viinanen, chief executive of IKEA in Australia and NZ, said the store would be "showcasing the latest design and home furnishing solutions to help create a better life at home".


Techday NZ
5 days ago
- Techday NZ
'Missed package? Scam fooling thousands
Package delivery scams are relentless, and no longer focus on shopping seasons and Christmas. NZ Post delivered more than 81.9 million courier parcels in the 12 months to 1 April 2024. Many Kiwis get too many packages to keep track of, and that's exactly what scammers are counting on. Delivery scams are evolving, and these days they can appear quite subtle. Look for these signs: Unprofessional layout and missing shipment details - The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. - The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. Suspicious email and links - Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. - Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. Urgent, pressuring language - The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. - The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. Custom payment requests – Even if it's just a small 'customs' fee, be cautious. New Zealand Customs does not contact individuals or businesses about paying customs duty. Imported goods are handled by licensed freight forwarders, not by NZ Customs. Below is an example. The email doesn't stand out particularly at first glance. And that's exactly why this example is so interesting: it strikes a balance between appearing legitimate and hiding the usual red flags often found in scam emails. One quick trick to check if an email is fake is to look at the sender's address. Does it really come from DHL or something odd like info@ Looking further into the email body, there's a button that clearly encourages the user to click and proceed. It's designed to appear as though it will take the recipient to DHL's official tracking page. The link actually goes to a site hosted on IPFS — a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag — this is not where you'd expect a legitimate DHL email to direct you. Since IPFS is compatible with modern browsers, it opens a landing page. The page doesn't display much information at all, but it personalises the scam by pre-filling the login field with the recipient's email address. That's a subtle but clever touch — it adds just enough legitimacy to convince some users to proceed. The site even blocks right-clicking so you can't inspect the code — a common trick scammers use to hide what they're really doing. The language selection links at the bottom are non-functional — clicking them does nothing. But most users won't bother to test those, so they serve a purely visual purpose: to make the site look more legitimate and avoid raising suspicion. At first glance, most of the code is dedicated to CSS styling — which is unusual, as this would typically be loaded from external files. Embedding so much CSS directly into the page is a strange choice and already raises some suspicion. But beyond the formatting, there are several indicators that strongly suggest this is a phishing site. The URL points to IPFS storage ( Real login portals (e.g., for Microsoft, Google, etc.) use official domains (like is a decentralised file storage system — no legitimate organisation will host login pages there. Form captures email and password with no backend: The form fields (email, password) do not submit anywhere obvious. Real login forms send credentials securely (HTTPS POST) to legitimate servers. Phishing forms either harvest the info silently or submit it to hidden malicious endpoints. Mix of languages links with no functionality: There are fake "language links" (Arabic, Czech, Danish, etc.) all pointing to the same broken IPFS page. On real sites, language selectors actually change the content dynamically. Poor HTML/CSS quality and broken elements: The code is poorly formatted, has broken inline styles, and excessive base64-encoded images. Real corporate web pages are carefully coded, fully polished, and use proper asset management (e.g., not massive inline blobs). The distribution of this scam shows New Zealand and Australia are real targets. Due to the generic nature of the landing page and the broad appeal of the phishing message, this scam can be deployed almost identically worldwide. This increases the attackers' chances of success by allowing them to trick users in multiple regions into handing over their credentials — which can then be repurposed for more targeted, high-value attacks. The threat is steadily increasing. The dips visible in the data typically correspond to weekends, suggesting that the most successful day to launch an attack is Monday — when people return to full inboxes and are still easing into the workweek. Aside from this pattern, the threat remains consistent and persistent. Gen Digital cybersecurity experts fully expect this scam, or variations of it, to continue appearing now and in the foreseeable future. Kiwis can protect themselves against these scams in five easy ways: Always check the email headers Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Examine the landing page Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Assess the design and formatting Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Watch for time pressure and manipulative language Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Do not share sensitive information Never give out personal or financial details in response to suspicious messages. Email scams aren't going away, but staying alert can keep you safe. Before you click, take a breath, check the sender, and when in doubt, go straight to the company's official website.


Scoop
5 days ago
- Scoop
'Missed Package?' Scam Fooling Thousands
Press Release – Gen Digital The link actually goes to a site hosted on IPFS a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag this is not where … Package delivery scams are relentless, and no longer focus on shopping seasons and Christmas. NZ Post delivered more than 81.9 million courier parcels in the 12 months to 1 April 2024. Many Kiwis get too many packages to keep track of, and that's exactly what scammers are counting on. Delivery scams are evolving, and these days they can appear quite subtle. Look for these signs: Unprofessional Layout and Missing Shipment Details – The email design is sloppy, and key information like a real pickup address and customer account number is missing — not what you'd expect from DHL or NZ Post. Suspicious Email and Links – Only an email address is shown (no real address), and the tracking link could redirect you to a phishing site. Urgent, Pressuring Language – The email tries to rush you into clicking quickly — classic tactic scammers use to trick people. Custom Payment Requests – Even if it's just a small 'customs' fee, be cautious. New Zealand Customs does not contact individuals or businesses about paying customs duty. Imported goods are handled by licensed freight forwarders, not by NZ Customs. Below is an example. The email doesn't stand out particularly at first glance. And that's exactly why this example is so interesting: it strikes a balance between appearing legitimate and hiding the usual red flags often found in scam emails. One quick trick to check if an email is fake is to look at the sender's address. Does it really come from DHL or something odd like info@ Looking further into the email body, there's a button that clearly encourages the user to click and proceed. It's designed to appear as though it will take the recipient to DHL's official tracking page. The link actually goes to a site hosted on IPFS — a system that makes it hard to take things down, which is exactly why scammers love it. While this makes it harder to take malicious content offline, it also raises a red flag — this is not where you'd expect a legitimate DHL email to direct you. Since IPFS is compatible with modern browsers, it opens a landing page. The page doesn't display much information at all, but it personalises the scam by pre-filling the login field with the recipient's email address. That's a subtle but clever touch — it adds just enough legitimacy to convince some users to proceed. The site even blocks right-clicking so you can't inspect the code — a common trick scammers use to hide what they're really doing. The language selection links at the bottom are non-functional — clicking them does nothing. But most users won't bother to test those, so they serve a purely visual purpose: to make the site look more legitimate and avoid raising suspicion. At first glance, most of the code is dedicated to CSS styling — which is unusual, as this would typically be loaded from external files. Embedding so much CSS directly into the page is a strange choice and already raises some suspicion. But beyond the formatting, there are several indicators that strongly suggest this is a phishing site. The URL points to IPFS storage ( Real login portals (e.g., for Microsoft, Google, etc.) use official domains (like is a decentralised file storage system — no legitimate organisation will host login pages there. Form captures email and password with no backend: The form fields (email, password) do not submit anywhere obvious. Real login forms send credentials securely (HTTPS POST) to legitimate servers. Phishing forms either harvest the info silently or submit it to hidden malicious endpoints. Mix of languages links with no functionality: There are fake 'language links' (Arabic, Czech, Danish, etc.) all pointing to the same broken IPFS page. On real sites, language selectors actually change the content dynamically. Poor HTML/CSS quality and broken elements: The code is poorly formatted, has broken inline styles, and excessive base64-encoded images. Real corporate web pages are carefully coded, fully polished, and use proper asset management (e.g., not massive inline blobs). The distribution of this scam shows New Zealand and Australia are real targets. Due to the generic nature of the landing page and the broad appeal of the phishing message, this scam can be deployed almost identically worldwide. This increases the attackers' chances of success by allowing them to trick users in multiple regions into handing over their credentials — which can then be repurposed for more targeted, high-value attacks. The threat is steadily increasing. The dips visible in the data typically correspond to weekends, suggesting that the most successful day to launch an attack is Monday — when people return to full inboxes and are still easing into the workweek. Aside from this pattern, the threat remains consistent and persistent. Gen cybersecurity experts fully expect this scam, or variations of it, to continue appearing now and in the foreseeable future. Kiwis can protect themselves against these scams in five easy ways: Always check the email headers Look at the sender's email address closely — is it from a legitimate domain you recognise? Official companies will never use suspicious or unfamiliar domains. Examine the landing page Does the page look like what you expected? If something feels off, it probably is. Be especially wary if you're redirected to an unfamiliar URL. Assess the design and formatting Most phishing emails are poorly designed. Look for inconsistent fonts, low-quality logos, or broken elements that a professional company would never send. Watch for time pressure and manipulative language Scammers often create a false sense of urgency — claiming your package will be returned or your account will be locked unless you act immediately. Take a moment to verify before clicking. Do not share sensitive information Never give out personal or financial details in response to suspicious messages. Email scams aren't going away, but staying alert can keep you safe. Before you click, take a breath, check the sender, and when in doubt, go straight to the company's official website. About Gen Gen (NASDAQ: GEN) is a global company dedicated to powering Digital Freedom through its trusted consumer brands including Norton, Avast, LifeLock, MoneyLion and more. The Gen family of consumer brands is rooted in providing financial empowerment and cyber safety for the first digital generations. Today, Gen empowers people to live their digital lives safely, privately and confidently for generations to come. Gen brings award-winning products and services in cybersecurity, online privacy, identity protection and financial wellness to nearly 500 million users in more than 150 countries. Learn more at