Vanessa May, Author at Techbest - Top Tech Reviews In Australia - Page 2 of 28

Queensland Government Eliminates CISO Position


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Update on Cyber Security Role in Queensland Government

Quick Overview

  • The CISO position in the Queensland government has been rebranded to general manager, cyber security.
  • Adam Smith is currently the acting general manager, cyber security.
  • This modification is in line with departmental title standardization.
  • The position continues to report to the Deputy Director-General, Data and Digital Government.
  • A $1 billion investment has been announced by the government to improve governmental systems.

Rebranding the Role: A Strategic Decision

The Queensland government has embarked on a strategic rebranding of its chief information security officer (CISO) role, selecting the title of general manager, cyber security. This transformation follows an extensive search for a qualified candidate to fill the role and fits into a wider departmental initiative to harmonize role titles.

Interim Management and Hiring Process

In June, Adam Smith, who was the deputy CISO, took over as the interim whole-of-government CISO after Rob Champion’s retirement. Smith will hold this role until a permanent candidate is chosen. The newly designated position of general manager, cyber security is presently listed on Queensland’s Smart Jobs website.

Consistency in Duties

Even though the title has changed, the duties linked to the CISO role remain unchanged. The general manager, cyber security will keep reporting to the Deputy Director-General, Data and Digital Government, assuring leadership continuity and strategic direction.

Major Investment in Digital Technology

Simultaneously with this leadership change, the Queensland government has revealed a significant $1 billion investment aimed at enhancing its whole-of-government systems. This initiative seeks to consolidate systems and funding across 19 departments, demonstrating a strong pledge to modernizing and securing governmental functions.

QLD government retires CISO position title

Conclusion

The choice made by the Queensland government to change its CISO title to general manager, cyber security signifies an adaptation to departmental naming practices and a dedication to preserving strong leadership in cyber security. The ongoing $1 billion investment in digital infrastructure further emphasizes the state’s commitment to advancing and securing its governmental processes.

Q&A Section

Q: Why was the CISO title changed to general manager, cyber security?

A:

The renaming is consistent with the titles used throughout the department and represents a strategic effort to unify and standardize government roles.

Q: Who is presently heading the cyber security initiatives in Queensland?

A:

Adam Smith is acting as the interim general manager, cyber security until a permanent successor is appointed.

Q: What effect will the $1 billion investment have on the systems of Queensland’s government?

A:

The funding aims to upgrade and integrate systems across 19 departments, enhancing efficiency, security, and technological advancements.

Q: Will the CISO’s responsibilities change with the new title?

A:

No, the duties will remain consistent, and the position will still report to the Deputy Director-General, Data and Digital Government.

Q: How does this rebranding impact the overall cyber security strategy?

A:

The rebranding forms part of a larger initiative to standardize roles and titles, ensuring clarity and uniformity in the government’s cyber security approach.

“Malicious ‘Glassworm’ Malware Distributes Through Compromised VS Code Extensions”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Glassworm Malware Intrusion on VS Code Plugins

Brief Overview

  • Glassworm malware has compromised a number of VS Code plugins.
  • The infection employs invisible Unicode characters to avoid detection.
  • More than 10,700 downloads compromised on the OpenVSX marketplace.
  • Malware functions via the Solana blockchain for command and control.
  • Attackers exploit alternative channels such as Google Calendar.
  • Ongoing threat with existing infrastructure and payload server.
  • Developers urged to review plugins and update credentials.

Grasping the Glassworm Malware Intrusion

Concealed malware intrusion on VS Code plugins

The Glassworm malware has surfaced as a considerable risk, targeting Microsoft Visual Studio Code plugins. Identified by Koi Security, this advanced worm utilizes invisible Unicode characters to embed harmful code, eluding both human oversight and detection tools. As of October 17, it had penetrated seven plugins on the OpenVSX marketplace, resulting in over 10,700 downloads.

How Glassworm Avoids Detection

By employing Unicode variation selectors, Glassworm’s code stays hidden from static scanners and human reviewers, resulting in developers unknowingly disseminating the malware. This stealthy method has outmaneuvered even GitHub’s diff view and syntax highlighting features.

Communication Using Blockchain

Glassworm utilizes the Solana blockchain for its command and control (C2) setup. It interprets base64-encoded data in blockchain memos to discover new payloads. The unchangeable nature of blockchain transactions creates an “unkillable infrastructure,” permitting attackers to refresh commands without concern of being removed.

Backup Channels and Payload Distribution

In addition to blockchain, Glassworm employs direct IP addresses and Google Calendar events as secondary channels. Malware traffic masquerading as legitimate Calendar events circumvents conventional security protocols. The Solana-connected server delivers an AES-encrypted payload, with decryption keys transmitted via HTTP headers, complicating interception efforts.

Propagation and Secondary Component: ZOMBI

The worm actively pursues credentials from npm, GitHub, OpenVSX, and cryptocurrency wallets to extend its reach. Glassworm’s secondary component, ZOMBI, transforms infected systems into proxy nodes, utilizing SOCKS proxies and WebRTC to evade firewalls. It also employs HVNC for discreet remote desktop access.

Ongoing Threat and Suggestions

Koi Security confirms that Glassworm’s infrastructure is still active, with operational payload servers and continuous data exfiltration. Developers are recommended to scrutinize their plugins and change any compromised credentials. Affected plugins include CodeJoy, l-igh-t.vscode-theme-seti-folder, among others.

Conclusion

The Glassworm malware intrusion underscores vulnerabilities within software supply chains, taking advantage of the invisibility of Unicode characters to conceal its existence. With an indestructible command infrastructure and advanced evasion tactics, Glassworm continues to pose a significant threat to developers globally.

Q&A

Q: What is Glassworm malware?

A: Glassworm is a malware worm that targets Microsoft Visual Studio Code plugins, using invisible Unicode characters to avoid detection.

Q: In what way does Glassworm evade detection?

A: It employs Unicode variation selectors to render its code invisible to both static scanning tools and human evaluators.

Q: What renders Glassworm’s command infrastructure unkillable?

A: It functions through the Solana blockchain, which is immutable, enabling it to modify commands without the risk of being terminated.

Q: How are developers impacted by Glassworm?

A: Developers unknowingly propagate malware through compromised plugins, resulting in potential data breaches and internal system compromises.

Q: What steps can developers take to safeguard themselves?

A: Developers should review their installed plugins, refresh exposed credentials, and stay alert against such intricate attacks.

Q: Is the threat from Glassworm still ongoing?

A: Yes, the infrastructure remains active, with operational payload servers and ongoing data collection efforts.

ESO’s Legendary Twisting Wall Face-off: An Unrivaled Community Challenge


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

The Elder Scrolls Online: The Writhing Wall Showdown

Quick Overview

  • Exciting community-driven event in The Elder Scrolls Online: The Writhing Wall Showdown.
  • Unlock the Eastern Solstice area by joining forces with your server.
  • Event consists of three stages: Supply and Defense, The Assault Begins, and Fall of the Writhing Wall.
  • Earn exclusive rewards such as the Wormwrithe outfit and Wall Breaker title.
  • Progress is unique to each server, encouraging rivalry between NA and EU servers.

The Fight for the Writhing Wall

There’s something significant happening throughout Tamriel, and this time it’s not merely another world event. The Fight for the Writhing Wall signals a new chapter for The Elder Scrolls Online (ESO), where complete server communities come together to unlock the next part of the narrative.

An Inclusive Battle

Launched this week and now active, this lengthy event directly relates to Update 48 and the Seasons of the Worm Cult storyline. These events culminate in opening the Eastern Solstice: a fresh area accessible only after your server engages, crafts, and collaborates to overcome the challenge.

In contrast to conventional ESO updates that simply show up after patch day, the Writhing Wall necessitates teamwork. Each server’s community must accomplish quests, gather materials, and repel Daedric invasions to progress through three specific phases:

  • Phase 1: Supply and Defense. Collect resources, protect siege camps, and thwart Coldharbour Daedra invading delves and public dungeons throughout Tamriel.
  • Phase 2: The Assault Begins. Take the battle to the Worm Cult. Anticipate stronger sieges, more frequent incursions, and the emergence of Ghishzor, a new Maldrith world boss.
  • Phase 3: Fall of the Writhing Wall. Collaborate to breach the Writhing Fortress public instance. Once any group achieves this, the Eastern Solstice is unlocked for the whole server.
ESO's Writhing Wall Showdown: Community Challenge
Explore a new zone, complete challenges, and unlock an entirely new area in the ESO Writhing Wall event.

Cultivating a Genuine Community Effort

When talking about this innovative approach, Mike Finnigan, Associate Design Director at ZeniMax, stressed the importance of encouraging server community collaboration. This event allows players to engage in their preferred playstyle, whether it’s crafting, PvE, or PvP, all contributing to the overall goal of the server. Each server’s progress is monitored independently, igniting friendly competition between NA and EU servers.

Incentives to Fight For

ESO players can acquire exclusive items like Wormwrithe outfit styles, the Fellowship of Stirk motif, and the Bone Caltrops skill style. Completing the final Writhing Fortress grants the sought-after ‘Wall Breaker’ title. Additional collectibles include the Wormwrithe Bear-Lizard mount and Haj-Mota pet fragments. Engaging in quests and daily rewards can further enhance players’ collections.

How Writhing Wall is Transforming ESO’s Future

Aside from the loot and battles, the Writhing Wall event signifies a change in ESO’s update rollout, granting players greater control over the introduction of new content. This aligns with the developers’ goal of integrating player feedback and presenting more dynamic, community-focused events in the future.

Will You Conquer the Wall?

The struggle for Solstice is more than just another in-game occurrence. It serves as a rallying point for players to unite, engage in their preferred styles of play, and drive their server towards triumph. Whether you’re vanquishing Daedra, crafting supplies, or defending siege camps, every action matters. Learn more about Battle for the Writhing Wall on the ESO blog.

Synopsis

The Writhing Wall Showdown in ESO represents a revolutionary community-driven event that invites players to join forces and unlock new content. With exclusive rewards and a new region at stake, server communities must work together to navigate several stages, marking a fresh chapter for the game.

Q: What is the Writhing Wall Showdown in ESO?

A: It is a multi-week, community-oriented event in The Elder Scrolls Online that challenges players to collaborate and unlock a new area, Eastern Solstice.

Q: How does the event develop?

A: Players are required to complete quests, gather materials, and fend off invasions across three distinct phases: Supply and Defense, The Assault Begins, and Fall of the Writhing Wall.

Q: What rewards are available for participants?

A: Rewards feature Wormwrithe outfit styles, the Fellowship of Stirk motif, Bone Caltrops skill style, and the exclusive ‘Wall Breaker’ title, among other prizes.

Q: Are players able to participate solo?

A: Yes, individual players can join in crafting, gathering, and hunting quests to contribute to the event.

Q: How is progress monitored?

A: Progress for each server is tracked independently, fostering competition between NA and EU servers to unlock the update first.

Q: What does this event mean for the future of ESO?

A: The event represents a shift towards more engaging, player-led content updates, allowing the community to influence the speed of new material.

X’s Recent Creator Payment Generating Excitement


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

X's Updated Creator Payouts Prompting Responses

Fast Overview

  • X has made revisions to its creator compensation program.
  • Qualified creators now have the opportunity to earn a one-time bonus of $10,000.
  • This initiative seeks to acknowledge creators who set off global trends.
  • There is a sense of uncertainty and displeasure among creators about the new eligibility requirements.

History of X’s Creator Payments

X initiated its creator payments program in February 2023 to incentivize content creators on its platform. The original program required creators to possess a Premium subscription, achieve over 5 million impressions within the last three months, and have more than 500 verified followers to become eligible.

Latest Updates and Feedback

This week, a creator named Zoomer, boasting 25,000 followers, encountered a surprising development. After a post garnered 173 million impressions, Zoomer initially received a payout of $1,500. However, prompted by X’s product head, Nikita Bier, Zoomer found an additional one-time $10,000 payment credited to his account.

This bonus, which was not a rectification of the algorithm but rather a fresh method to reward creators who ignite global trends, has elicited mixed responses from the creator community.

Clarifying the New Payout Standards

The ambiguity surrounding what qualifies as a ‘global trend’ has been a significant issue. Creators are unclear about whether they need specific engagement statistics or originality in their posts. Furthermore, there are worries about how these bonus payouts might affect the overall revenue pool for other creators.

While some view this as a motivation for innovation, the initial recipient of the bonus faced criticism for lack of originality, further heightening frustrations among committed creators.

Conclusion

X’s recent modifications to its creator payment program have generated considerable excitement. With the rollout of a one-time $10,000 bonus for creators who trigger global trends, the platform intends to foster creativity and uniqueness. Nonetheless, the vagueness regarding the criteria and allocation of these payments has resulted in discontent and demands for increased transparency from creators.

Q: What criteria must creators meet to be eligible for X’s creator payment program?

A: To be eligible, creators must have a Premium subscription, more than 5 million impressions in the last three months, and over 500 verified followers.

Q: How is the new $10,000 bonus allocated?

A: The bonus is given to creators who are considered to have sparked a global trend, although the specific criteria are still not well defined.

Q: What issues have creators brought up regarding the new payout system?

A: Creators are expressing concerns about the lack of clarity, undefined criteria for ‘global trends,’ and the potential effects on the overall revenue pool for other earnings.

Q: In what way does this alteration affect the platform’s overarching goal?

A: The change is designed to encourage creativity and enhance content on the platform, fitting X’s aim of minimizing regrettable user minutes.

Q: What made Zoomer’s bonus payment contentious?

A: Zoomer’s post, which received the bonus, was criticized for its lack of originality, as it closely resembled content found on a rival platform.

US Tariff Warning on China Cuts Billions from Wall Street and Crypto Markets


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • US tariffs on China prompt extensive market declines.
  • Nasdaq Composite, heavily weighted towards tech, declines by 3.6%.
  • Leading cryptocurrency values tumble along with tech stocks.
  • Renewed concerns about a trade war surface between the US and China.
  • Australian market is set for increased fluctuations.
  • Prices for consumer technology may rise as a result of tariffs.

Significant Impact on Tech Stocks

The US equity market faced a considerable drop as technology shares incurred heavy losses. The Nasdaq Composite decreased by 3.6%, with the S&P 500 and Dow Jones also experiencing setbacks. Key technology firms such as NVIDIA, AMD, Tesla, Amazon, and Apple were severely affected, triggering a widespread market impact.

Consequences of US tariffs on Wall Street and cryptocurrency markets

Cryptocurrency Impact

The digital currency market followed the stock market’s downward trajectory, with Bitcoin and Ethereum facing notable decreases in value. The growing connection between conventional and digital markets diminishes the risk diversification benefits that cryptocurrencies previously provided.

Trade War 2.0

The upheaval in the market was sparked by US President Donald Trump’s declaration of possible 100% tariffs on imports from China. This renewed apprehensions of a full-scale trade conflict, particularly after China enacted export limitations on rare earth minerals and initiated antitrust investigations against US firms.

Additional Challenges Beyond Tariffs

Factors such as disappointing corporate earnings, rising US bond yields, and a continuing government shutdown are also contributing to market unrest. These issues together create a difficult landscape for investors.

Implications for Australians

The ASX 200 is anticipated to be affected once trading resumes. Australian technology and mining companies reliant on China may endure notable fluctuations. A potential rise in consumer tech costs could further pressure the living expenses for Australians.

Future Outlook: Anticipation

Investors are currently in a state of ambiguity, awaiting clarity on whether the trade disputes will diminish or intensify. The global technology industry must stay alert, as political changes can disturb even the strongest growth trajectories.

Conclusion

The looming threat of US tariffs on China has resulted in substantial setbacks for both Wall Street and the cryptocurrency domain, with technology stocks and digital currencies facing the gravest repercussions. The foreseeable increase in consumer prices and market instability in Australia underscores the worldwide ramifications of these geopolitical conflicts.

Q&A Section

Q: What caused the recent market downturn?

A: The downturn was initiated by US President Donald Trump’s warning of possible 100% tariffs on imports from China, reigniting fears of a trade war.

Q: What has been the tech sector’s reaction to the tariff threats?

A: The tech sector faced a sharp drop, with significant losses reported by major companies like NVIDIA, AMD, Tesla, Amazon, and Apple.

Q: How are cryptocurrencies responding to the market decline?

A: Cryptocurrencies such as Bitcoin and Ethereum saw notable downturns, reflecting a heightened correlation between digital and traditional financial markets.

Q: What potential effects could the tariffs have on Australian consumers?

A: If the tariffs are enforced, the prices of tech items like smartphones and laptops may increase, impacting the cost of living in Australia.

Q: What is the current status of US-China relations?

A: US-China relations are strained, with both nations implementing economic actions that could escalate into a trade war.

Q: How might the ASX 200 react to the turmoil in global markets?

A: The ASX 200 is expected to see volatility, particularly in technology and mining sectors closely linked to China.

Optus Informs Government of Triple Zero Disruption via Wrong Email Address


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Optus Notification Blunder: Triple Zero Outage Alert Sent to Wrong Email

Quick Read

  • Optus dispatched Triple Zero outage notifications to an obsolete government email address, overlooked for over 24 hours.
  • The Australian Communications and Media Authority (ACMA) notified officials of the outage.
  • The correct email address was available, but Optus erroneously utilized the old one.
  • The communications department did not consider Optus’s notification procedure finalized.
Optus used wrong email address for Triple Zero outage alert

How the Notification Error Occurred

Optus sent vital alerts regarding a Triple Zero outage to a decommissioned government email address, causing a delay in response. The email remained unexamined for over 24 hours, only being found after the Australian Communications and Media Authority (ACMA) notified federal officials about the problem.

The Timeline of Events

The notifications were first sent on Thursday, September 18. However, federal communications officials were only informed of the incident on Friday, September 19, at 3:30 PM, after a tip from ACMA.

Government Response and Oversight

James Chisholm, deputy secretary of communications and media, stated that the email was routed to a defunct mailbox. This address had been superseded a week earlier, and Optus had been notified of the new email.

Optus’s IT Upgrade and Email Error

Optus had informed the department on September 12 about an IT upgrade designed to ensure notifications were directed to the correct address. Nevertheless, the alert about the outage was sent to the previous address.

Government Systems and Accountability

Sam Grunhard, first assistant secretary, mentioned that the new email address was provided to telecommunications companies on September 11. Optus successfully sent 272 notifications to the new address, yet the vital outage alert was misrouted.

Monitoring and Transition Issues

There was no verification whether the old mailbox had a forwarding feature to redirect emails to the new address, raising concerns about oversight during the transition. Chisholm emphasized that the notification was deemed incomplete due to the mistake.

Summary

Optus’s mistake in using the incorrect email address for emergency notifications caused a delay in the government’s response to a Triple Zero outage. This situation underscores the necessity of maintaining precise contact information and ensuring communication channels are adequately monitored throughout transitions.

Q: What was the primary issue with Optus’s notification?

A: Optus sent a significant outage notification to an outdated and unmonitored government email address, leading to a delay in response.

Q: How did the government learn of the outage?

A: The Australian Communications and Media Authority (ACMA) alerted federal communication officials, which led to the discovery of the missed email.

Q: Were there any measures in place to avoid such errors?

A: The government had notified telecommunications companies of the new email address, but the oversight during the transition did not confirm if the old address had forwarding systems to prevent missed notifications.

Q: How many notifications did Optus send successfully?

A: Optus correctly dispatched 272 notifications to the new email address.

NSW Government Contractor Exposes Flood Victims’ Data to ChatGPT through Excel Upload


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

NSW Data Breach Incident Involving ChatGPT

Summary Overview

  • A contractor from the NSW Reconstruction Authority uploaded confidential data to ChatGPT.
  • The incident impacted nearly 3000 individuals participating in the Northern Rivers Resilient Homes Program.
  • The exposed data comprised names, addresses, email addresses, phone numbers, and certain health records.
  • Efforts are ongoing to investigate the breach and inform those affected.
  • Steps have been taken to avert similar occurrences in the future.

Context of the Breach

NSW government contractor uploaded an Excel spreadsheet of flood victims' data to ChatGPT

The NSW Reconstruction Authority, which aims to support those affected by the 2022 floods, experienced a data breach when a contractor uploaded confidential information to ChatGPT. This event revealed personal data of around 3000 participants in the Northern Rivers Resilient Homes Program.

Specifics of the Breach

In March, a contractor uploaded an Excel document containing over 12,000 lines of data to ChatGPT. The breach went unnoticed initially and was made public several months later. Analysts from Cyber Security NSW are now examining the data to determine the scope of the breach.

Consequences for the Resilient Homes Program

The individuals affected were applicants to a program designed to assist those in flood-affected regions by either repurchasing homes, aiding in rebuilding expenses, or enhancing structural resilience. The breach included personal identification and health data, raising alarms regarding privacy and data integrity.

Actions Taken and Preventative Steps

The NSW Reconstruction Authority has undertaken measures to strengthen data security by reevaluating internal protocols and providing directives against the use of unauthorized AI platforms. They claim there is no proof of third-party access to the data, although oversight remains a complicated issue.

Conclusion

The data breach involving the NSW Reconstruction Authority underscores the dangers linked to utilizing public AI services like ChatGPT for managing sensitive information. The occurrence has initiated a reassessment of cybersecurity protocols to avert future breaches.

Q: What primarily caused this data breach?

A: The breach happened when a contractor submitted sensitive data to ChatGPT without authorization.

Q: How many individuals did this breach impact?

A: Up to 3000 individuals associated with the Northern Rivers Resilient Homes Program were impacted.

Q: What specific data was compromised?

A: The compromised information included names, addresses, email addresses, phone numbers, and certain personal and health details.

Q: What measures have been taken to prevent future breaches?

A: The authority has enhanced its internal systems, reviewed procedures, and issued guidelines to prevent the use of unauthorized AI platforms.

Q: Is there any indication that third parties accessed the data?

A: There is no indication of third-party access, yet monitoring public AI tools is inherently difficult.

Q: How is the NSW Reconstruction Authority managing communication with affected individuals?

A: They are carrying out a thorough analysis to ensure precise and complete notifications to all affected parties.

QBE Moves Cyber Leadership to the United States


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

QBE Insurance Group’s Tactical Shift in Cyber Leadership

QBE moves cyber leadership to the US

Brief Overview

  • QBE Insurance Group shifts its cyber security leadership operations to the United States.
  • Jim Christianson is named the new chief digital security and resilience officer.
  • The company is also seeking a director of cyber defence and operations based in Australia.
  • This restructuring occurs after the exits of key figures such as Andrew Dell and Sonya Crosby.

Advancing Global Cyber Security Strategy

ASX-listed QBE Insurance Group has undertaken a strategic transition of its cyber security leadership to the United States. This initiative is designed to foster a more internationally-focused technology function, improving QBE’s ability to handle and reduce cybersecurity threats on a global scale. Veteran Jim Christianson, with over ten years of experience at QBE, has been designated as the chief digital security and resilience officer, signifying a new phase in QBE’s cyber security approach.

Leadership Change

This transition follows the resignation of former CSO Andrew Dell, who joined Microsoft earlier this year. Christianson, who initially filled the position temporarily, is now confirmed in the role permanently. His appointment signifies QBE’s dedication to enhancing its digital security and resilience through experienced leadership.

Emphasis on Local Expertise

To enhance its Australian operations, QBE is also in the process of hiring a director of cyber defence and operations based in Australia. This newly created position is intended for a CISO-level executive and will report directly to Christianson. The chosen candidate will be instrumental in spearheading strategic and operational cybersecurity actions across the organization.

Recent Leadership Developments

The reorganization of QBE’s cyber security department aligns with the recent departure of chief data and analytics officer Sonya Crosby. Currently, data management duties are being managed by Scott Wynne, a seasoned data expert, while the company seeks a permanent successor.

Conclusion

The transfer of QBE Insurance Group’s cyber security leadership to the US emphasizes its commitment to a global technology vision. The appointment of Jim Christianson as chief digital security and resilience officer, coupled with new recruitment efforts, showcases QBE’s proactive stance on cyber security in light of recent leadership transitions.

Questions & Answers

Q: What prompted QBE to transfer its cyber security leadership to the US?

A: This decision is part of QBE’s initiative to cultivate a technology function with a global perspective, bolstering its capability to address cyber risks on an international level.

Q: Who is Jim Christianson?

A: Jim Christianson is a long-serving QBE employee who has been appointed as the new chief digital security and resilience officer.

Q: What responsibilities will the new Australia-based director of cyber defence and operations have?

A: The position entails overseeing the strategic and operational deployment of organization-wide cybersecurity strategies and reporting directly to Christianson.

Q: What transformations have taken place in QBE’s data management team?

A: Following the departure of chief data and analytics officer Sonya Crosby, Scott Wynne has taken on the temporary oversight of the data function as QBE looks for a permanent replacement.

Telstra Penalized $20.3M Due to Significant Cut in Belong NBN Upload Speeds


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Telstra’s $20.3 Million Penalty for NBN Upload Speed Decrease

Quick Overview

  • Telstra fined $18 million and mandated to pay $2.3 million in restitution.
  • Almost 9000 Belong customers impacted by decreased NBN upload speeds.
  • Australian Competition and Consumer Commission (ACCC) initiated legal proceedings.
  • Telstra did not notify customers about the speed reduction.
  • Compensation includes a $15 monthly credit for eligible affected customers.

Telstra’s Legal Repercussions for Belong NBN Speed Reduction

Telstra to pay $20.3m for mass cutoff of Belong NBN upload speeds

Context of the Situation

In late 2020, Telstra made a critical decision to reduce the upload speeds for its Belong NBN customers from 100/40Mbps to 100/20Mbps. This action impacted nearly 9000 customers and drew the scrutiny of the Australian Competition and Consumer Commission (ACCC).

ACCC’s Legal Measures

The Federal Court determined that Telstra violated Australian Consumer Law by failing to inform their customers of these changes. The absence of transparency prevented customers from evaluating whether the altered service met their requirements.

Restitution and Remediation

The court mandated Telstra to pay $18 million in fines and an additional $2.3 million for restitution. Affected customers are eligible for a monthly $15 credit for the duration of time they encountered reduced upload speeds. Telstra is contacting these customers through email to facilitate compensation.

Response from Telstra

Telstra has recognized the court’s ruling and expressed regret for not updating customers sooner. The company has collaborated with the ACCC to address the issue and has initiated measures to compensate the affected users.

Future Considerations

This case emphasizes the necessity of transparent communication from service providers and the essential role of regulatory bodies like the ACCC in safeguarding consumer rights.

Conclusion

Telstra’s $20.3 million penalty underscores the vital need for clear communication with consumers, particularly when service modifications affect their internet experience. The ACCC’s involvement guarantees that customers receive fair compensation, highlighting the significance of consumer protection laws.

Q&A

Q: What led to Telstra’s fine?

A: Telstra was fined for lowering Belong NBN upload speeds without notifying customers, which breached Australian Consumer Law.

Q: How many customers faced the speed reduction?

A: Nearly 9000 customers were impacted by the speed downgrade.

Q: What compensation can affected customers receive?

A: Eligible customers will be awarded a $15 credit for each month they were subjected to the downgraded plan.

Q: How is Telstra handling this situation?

A: Telstra has contacted affected customers to provide remediation and is collaborating with the ACCC to resolve the situation.

Q: What measures are in place to prevent similar issues in the future?

A: Telstra has pledged to enhance communication with customers regarding service modifications and is engaging in a formal process with the ACCC to ensure compliance.

Tesla’s Supervisory FSD Hits 1 Million Kilometers on Australian Roads


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Tesla’s Full Self-Driving (FSD) achieves 1 million kilometers in Australia.
  • Approximately 3,000 Tesla vehicles are thought to have played a role in this achievement.
  • FSD available for the latest Tesla Model 3 and Model Y featuring HW4.
  • Buy the FSD outright for A$10,100 or opt for a subscription soon at A$149/month.
  • World’s first continental circumnavigation using FSD by Harald Murphy.

Tesla’s FSD Achievement in Australia

Tesla's FSD achieves 1 million kilometers on Australian routes

Tesla’s Full Self-Driving (FSD) has reached an impressive landmark in Australia, completing 1 million kilometers since its launch. Australian Tesla drivers have enthusiastically adopted this pioneering technology, following a five-year anticipation since the first release of what was formerly called FSD Beta.

Launch and Reception

The initial version, V13.2.9, was first made available to a limited group in the early access program beginning August 29th. By September 18th, it became available to the wider public. Tesla owners with newer Model 3 or Model Y vehicles equipped with HW4 and the paid FSD software upgrade could utilize this functionality. While exact numbers are hard to pinpoint, it’s evident that a large percentage of Australian Tesla owners have adopted FSD.

Achieving 1 Million Kilometers

In merely 1.5 weeks, Tesla reported that over 1 million kilometers had been navigated on Australian roads with FSD (Supervised). Estimates indicate that around 3,000 Tesla cars contributed to this achievement, with enthusiasts likely accumulating more miles than the average.

Importance and Economic Influence

This landmark is not only indicative of Tesla’s technological capabilities but also marks an important financial success. As each vehicle may yield up to A$10,100 for FSD, Tesla has benefitted from an influx of approximately A$30 million. The software upgrade is a high-margin product, enhancing the profitability of Tesla vehicles.

Upcoming Enhancements and Subscription Service

Tesla is continually refining its software, with Elon Musk recently teasing new capabilities in V14, such as multi-story carpark support. The rollout of an FSD subscription model at A$149 per month is expected to entice more users, providing a more economical option compared to the upfront payment.

Groundbreaking Circumnavigation

A remarkable milestone was the world-first continental circumnavigation accomplished by Tesla enthusiast Harald Murphy, who traveled 13,577 kilometers around Australia using FSD for over 99.9% of the trip. This achievement highlights the strength and efficiency of Tesla’s FSD in varied and challenging conditions.

Pricing and Accessibility

FSD (Supervised) is offered for new Tesla Model 3 and Model Y vehicles and as an over-the-air upgrade for eligible HW4-equipped vehicles. This feature can be acquired outright for A$10,100, with a subscription option expected soon at A$149 per month.

Conclusion

Tesla’s Full Self-Driving (FSD) technology reaching 1 million kilometers on Australian roads is a noteworthy achievement, reflecting the local community’s confidence in autonomous technology. With exciting developments ahead and a subscription model in the pipeline, Tesla remains a frontrunner in self-driving technology innovation.

Q: What is Tesla’s Full Self-Driving (FSD)?

A: Tesla’s FSD is an advanced driver-assistance system that enables autonomous driving under supervision.

Q: How many Teslas contributed to the 1 million kilometers achievement?

A: About 3,000 Tesla vehicles are believed to have contributed to this milestone.

Q: How can I access Tesla’s FSD in Australia?

A: FSD is available for new Model 3 and Model Y vehicles with HW4 or as an upgrade for eligible existing vehicles. It can be purchased outright or subscribed to monthly soon.

Q: What are the future developments for Tesla’s FSD?

A: Tesla is set to introduce new features in V14, including multi-story carpark support, along with launching a subscription model for more flexible access.

Q: What is the cost of Tesla’s FSD?

A: The FSD feature can be obtained outright for A$10,100, while a forthcoming subscription service will be available at A$149 per month.