Matthew Miller, Author at Techbest - Top Tech Reviews In Australia - Page 36 of 151

Soundcore P30i by Anker Noise Cancelling Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

soundcore P30i by Anker Noise Cancelling Earbuds, Smart Noise Cancellation, Powerful Bass, 45h Playtime, 2-in-1 Case and Mobile Phone Stand, IP54, Wireless Headphones, Bluetooth 5.4 (Refurbished)

Researchers Discover Vulnerability in Bluetooth Headphones That Can Take Control of Smartphones


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Security Vulnerability Endangers Smartphones

Bluetooth security risk endangers smartphones

Quick Overview

  • Recent flaws in Bluetooth chips may jeopardize smartphones.
  • Airoha SoC found in numerous headphones has been identified as vulnerable.
  • Intruders could connect silently and listen in via microphones.
  • The RACE protocol is susceptible to being exploited for memory dumping and key extraction.
  • Devices from manufacturers like Sony and JBL are implicated.
  • Airoha has issued a software update to rectify the problem.
  • Users are urged to update their devices and eliminate outdated pairings.
  • Individuals at high risk should contemplate using wired headphones.

Identifying the Vulnerability

Experts from Germany’s Enno Rey Netzwerke (ERNW) have identified serious flaws in a commonly used Bluetooth system-on-a-chip (SoC). This vulnerability permits potential intruders to indirectly compromise smartphones by leveraging Bluetooth Classic and Bluetooth Low Energy connections, assuming they are in close proximity.

Covert Connection and Eavesdropping

The detected vulnerabilities enable attackers to silently connect to Bluetooth headphones and activate their microphones without user approval. This presents a major risk as attackers may overhear conversations and gather confidential information.

Exploiting the RACE Protocol

An additional critical element of the vulnerability is the exposure of the Remote Access Control Engine (RACE) protocol utilized in Airoha chips. By having access to this protocol, attackers can dump the permanent flash memory of headphones and extract digital link keys, allowing for unauthorized Bluetooth connections.

Effects on Mobile Devices

Once the keys are extracted, attackers can manipulate mobile phones, deceiving them into thinking they are interacting with a legitimate Bluetooth device. This vulnerability also makes it possible for them to summon voice assistants like Siri and Google Assistant to send texts, initiate calls, and execute various tasks.

Extensive Range of Impacted Devices

The Airoha SoC is frequently found in devices from notable brands such as Sony and JBL, exposing a wide array of headphones to these vulnerabilities. In contrast, Apple’s AirPods, which use a proprietary Bluetooth SoC, remain unaffected.

Mitigation Strategies and Suggestions

Airoha has been alerted and has provided an updated software development kit (SDK) to alleviate these vulnerabilities. Users are highly encouraged to promptly update their devices and clear any old or redundant Bluetooth pairings to minimize the risk of infiltration.

Specific Advice for High-Risk Individuals

For those in delicate roles, such as journalists, diplomats, and politicians, ERNW researchers recommend the use of wired headphones as a safer alternative to prevent possible attacks.

Conclusion

This recently discovered Bluetooth vulnerability emphasizes the necessity for regular software updates and cautious usage of wireless devices. Given the extensive array of at-risk devices, proactive actions are essential for protecting personal and sensitive information.

Q: What is the main vulnerability that has been identified?

A: The vulnerability enables attackers to quietly connect to Bluetooth headphones and turn on their microphones, allowing for potential eavesdropping.

Q: Which devices are impacted by this vulnerability?

A: Devices incorporating the Airoha SoC, including headphones from brands such as Sony and JBL, are affected. Apple’s AirPods are not at risk.

Q: What steps can users take to safeguard themselves?

A: Users should update their devices to the latest software, remove old Bluetooth pairings, and consider using wired headphones if they are at heightened risk.

Q: How did the researchers respond to the vulnerability?

A: The researchers notified Airoha, which subsequently released an updated SDK to address the vulnerabilities.

Q: Can attackers directly access smartphones through this vulnerability?

A: Indirectly, yes. By taking advantage of the Bluetooth connection, attackers can interact with the smartphone as though it were a trusted device.

Q: What is the RACE protocol, and why is it important?

A: The RACE protocol facilitates firmware updates and diagnostics within Airoha chips. Its exposure permits attackers to access memory and extract keys for unauthorized entry.

Tesla Enhances Warranty in Australia and New Zealand with 5-Year Unlimited Kilometer Protection


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Tesla launches a 5-year unlimited-kilometre warranty in Australia and New Zealand.
  • Applicable retroactively to vehicles delivered from 1 January 2026.
  • Commercial vehicles are covered for 5 years or 150,000 km.
  • The warranties for battery and drive units remain consistent and competitive.
  • Roadside Assistance and Mobile Tyre Service provide extra aid.
  • The expansion of the Supercharger network boosts EV uptake.

Coverage Under the New 5-Year Warranty

The revised Basic Limited Vehicle Warranty delivers comprehensive coverage, addressing essential factors like corrosion, paint longevity, and multimedia systems. The unlimited kilometre clause is applicable to vehicles used under standard conditions, especially beneficial for private users who travel long distances. For commercial applications, the warranty covers 5 years or 150,000 km, maintaining a competitive edge in this sector.

Understanding Commercial Use

Tesla classifies commercial use under its new warranty provisions to encompass vehicles utilized for rideshare, taxi operations, rental services, or courier activities. This category also includes driving schools, security fleets, tour companies, and emergency services. This definition aids businesses looking to add Tesla vehicles to their fleets.

Battery and Drive Unit Warranty Remains Competitive

While the general vehicle warranty has seen improvements, the Battery and Drive Unit Limited Warranty stays the same. For Model 3 and Model Y Rear-Wheel Drive variants, coverage lasts 8 years or 160,000 km, guaranteeing at least 70% battery capacity. Long Range or Performance versions come with an extended limit of 192,000 km over the same duration.

Tesla updates warranty in Australia and New Zealand with 5-year unlimited coverage

Commitment to the Australian Market

Since its introduction in Australia with the Roadster in 2011, Tesla has significantly grown its footprint. Thom Drew, Country Director for Australia & New Zealand, notes that the rollout of a 5-year unlimited kilometre warranty meets local market demands and aligns with Tesla’s overall strategy for the area, especially in light of the forthcoming Full Self-Driving (Supervised) release.

Tesla Australia & New Zealand is excited to lead with Global Firsts that transform the driving experience for our customers – like rolling out Full Self-Driving (Supervised) in the world’s first RHD market in 2026, and now launching a 5-year, unlimited kilometre new vehicle warranty for 2026. This update resonates with local market standards and fosters lasting trust in Tesla ownership. Thom Drew, Country Director, Tesla Australia & New Zealand.

Roadside Assistance and Mobile Tyre Service

Tesla’s 5-year Roadside Assistance operates around the clock, ensuring safety for EV owners. The Mobile Tyre Repair service is a notable offering, allowing for puncture fixes or full tyre replacements on-site. In case repairs cannot be performed roadside, Tesla provides a loaner wheel to ensure mobility while the damaged wheel is evaluated.

Leading Charging Infrastructure

The expansion of Tesla’s Supercharger network encourages EV adoption, with 60% of chargers accessible to non-Tesla models. A Supercharger can deliver up to 282 km of range in just 15 minutes, making charging stops efficient and convenient.

Significance for Australian EV Adoption

Previously, Tesla’s 4-year warranty faced criticism compared to other manufacturers. The new 5-year unlimited kilometre warranty for individual users eliminates a considerable obstacle, aligning with what Australian buyers expect. This decision may prompt other premium manufacturers to re-evaluate their warranty provisions.

For more details, visit Tesla Vehicle Warranty

Conclusion

Tesla’s new 5-year unlimited kilometre warranty boosts its attractiveness in Australia and New Zealand, matching market expectations and offering reassurance for purchasers. This move strategically adapts to local preferences, potentially influencing other brands to adapt similarly.

Q&A

Q: What modifications have been made to Tesla’s warranty in Australia and New Zealand?

A: Tesla has rolled out a 5-year, unlimited-kilometre New Vehicle Limited Warranty, superseding the earlier 4-year or 80,000 km cap.

Q: How is the new warranty applicable to commercial vehicles?

A: For commercial use, the warranty encompasses 5 years or 150,000 km, whichever comes first. This applies to rideshare, taxi services, and various commercial uses.

Q: What aspects of Tesla’s warranty offerings remain unchanged?

A: The Battery and Drive Unit Limited Warranty stays the same, offering 8 years or up to 192,000 km coverage, based on the model.

Q: How does Tesla’s Mobile Tyre Service function?

A: Tesla’s Mobile Tyre Service provides on-site puncture repairs or tyre replacements. If a roadside repair isn’t feasible, a loaner wheel can be supplied temporarily.

Q: What effect does the Supercharger network have on EV adoption?

A: Tesla’s Supercharger network, now partly accessible to non-Tesla vehicles, facilitates wider EV adoption by supplying fast-charging options throughout Australia.

AMAFACE Wireless Earbuds with Cool Design Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AMAFACE Wireless Earbuds,Bluetooth Earbuds with Cool Design Charging Case Bass Sound IPX5 Waterproof Sports Bluetooth Headphones with Mic Touch Control 36H Playtime

HUAWEI FreeBuds 5 TWS Bluetooth Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

HUAWEI FreeBuds 5 TWS Bluetooth Headphones, Ultra Magnetic, Continuous Curves for a Perfect Fit, Up to 30 Hours Battery Life, IPX4 Waterproof, Silver

AKG N5 Hybrid TWS Headphone, Black Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AKG N5 Hybrid TWS Headphone, Black

Baseus MC1 Pro Open Ear Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Baseus MC1 Pro Open Ear Headphones, Ear Clip with Impressive Sound, Adaptive Bass Enhancement, Bluetooth 6.0, Noise Cancelling for Calls, IP67, 40H Battery, 5.0g Buds – Black

NVIDIA’s Next-Gen Vera Rubin Platform Commences Full Production: Significant Enhancements in Computing, Energy Efficiency, and Water Consumption


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • NVIDIA unveils the Rubin platform, incorporating six newly coordinated chips.
  • This platform provides a performance increase of 5x compared to the former generation.
  • Rubin’s framework emphasizes extreme co-design along with efficiency.
  • Essential elements comprise the Vera CPU, Rubin GPU, and NVLink 6 Switch.
  • Partnership with Microsoft on the “Fairwater” AI superfactories revealed.
  • Rubin is set to drive next-gen AI with reduced costs and enhanced reliability.
  • A wide launch of the platform is planned for the latter part of 2026.

The Six-Chip Approach to Extreme Co-Design

The Rubin platform is built upon NVIDIA’s extreme co-design approach, merging both hardware and software into a cohesive stack. This setup includes the Vera CPU, Rubin GPU, and the NVLink 6 Switch, providing uninterrupted data flow without delays. Alongside the ConnectX-9 SuperNIC, BlueField-4 DPU, and Spectrum-6 Ethernet Switch, these components turn data centers into remarkably efficient AI factories, transforming raw data into actionable insights.

A Significant Advancement in Performance and Efficiency

The Rubin GPU’s performance is revolutionary, offering up to 5x the inference capability in comparison to the Blackwell generation. Notably, this was accomplished with just a 1.6x rise in transistor count, highlighting NVIDIA’s architectural creativity. This leads to a 10x reduction in the cost per inference token, greatly lowering the access threshold for businesses implementing advanced AI models.

A Closer Look at the Vera CPU and Rubin GPU

The Vera CPU, featuring tailored Olympus cores based on the Arm v9.2-A framework, manages the intricate data operations and logical processes essential for the Rubin GPUs. The Rubin GPU comes with eight layers of HBM4 memory, delivering 288GB of storage and 22 TB/s of data bandwidth, crucial for handling trillion-parameter models. HBM4 is essential for overcoming memory limitations, allowing for maximum throughput.

Empowering the Fairwater AI Superfactories

In partnership with Microsoft, NVIDIA is equipping the Fairwater AI superfactories with the Vera Rubin NVL72 rack-scale systems, scaling up to hundreds of thousands of Superchips. This collaboration seeks to establish the strongest AI infrastructure in the world, vital for training the upcoming generation of reasoning-capable models. Industry frontrunners like CoreWeave and Red Hat are gearing up to incorporate the Rubin platform into their frameworks.

The Season of Agentic AI and Reasoning

Rubin is crafted to facilitate agentic AI, empowering models to tackle complicated reasoning duties, perform research, and independently implement business strategies. The platform’s efficiency enables AI agents to function at a lower expense and higher dependability, making it viable for companies to continuously deploy AI workers without incurring substantial operational expenses.

Energy Efficiency and Networking Innovations

Despite the bolstered computational capacity, Rubin secures substantial gains in power efficiency. The Spectrum-6 Ethernet Switch and Spectrum-X systems provide a 5x enhancement in power efficiency. The implementation of advanced cooling technologies and photonics allows the NVL72 to sustain peak performance without thermal limitations. The BlueField-4 DPU further boosts system efficiency by offloading networking responsibilities.

Availability and Future Plans

NVIDIA intends for a wide rollout of the Rubin platform in the later part of 2026, continuing its annual cycle of innovations in architecture. While pricing will be customized, the emphasis lies in minimizing total ownership expenses by achieving greater performance with fewer GPUs. As the launch date nears, further details regarding the Olympus cores and NVLink 6 interconnect are expected.

NVIDIA's Rubin platform elevates AI performance

Conclusion

NVIDIA’s latest Rubin platform signifies a noteworthy architectural leap, merging six distinct chips for unmatched AI performance and efficiency. By utilizing extreme co-design, the platform not only amplifies computational strength but also improves energy efficiency and reduces operation costs. Partnering with industry giants, NVIDIA is establishing a new benchmark for AI infrastructure, paving the path for agentic AI and reasoning-driven models.

Q: What does the Rubin platform entail?

A: The Rubin platform is NVIDIA’s forthcoming AI supercomputer framework, featuring six coordinated chips aimed at high-efficiency data processing.

Q: In what ways does Rubin enhance performance compared to previous models?

A: Rubin achieves up to 5x the inference performance of the Blackwell generation while increasing the transistor count by only 1.6x, marking a notable efficiency enhancement and computational power improvement.

Q: What components are integral to the Rubin platform?

A: The platform encompasses the Vera CPU, Rubin GPU, NVLink 6 Switch, ConnectX-9 SuperNIC, BlueField-4 DPU, and Spectrum-6 Ethernet Switch, collaboratively working to optimize performance and efficiency.

Q: What is the importance of the Fairwater AI superfactories?

A: The Fairwater AI superfactories, developed in partnership with Microsoft, are designed to create the strongest AI infrastructure worldwide, vital for training sophisticated reasoning models.

Q: In what way does Rubin improve energy efficiency?

A: Rubin achieves a 5x enhancement in power efficiency through advancements including the Spectrum-6 Ethernet Switch, Spectrum-X systems, and state-of-the-art cooling technologies.

Q: When will the Rubin platform be accessible?

A: NVIDIA aims for a wide release of the Rubin platform in the latter half of 2026, aligning with its yearly cycle of architectural innovations.

Taiwan Endures Unyielding Cyber Assault: 2.6 Million Daily Chinese Intrusions in 2026


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cybersecurity in Taiwan: Addressing the Increasing Threats

Concise Overview

  • Chinese cyber intrusions targeting Taiwan reached an average of 2.63 million per day in 2026.
  • These intrusions are part of a “hybrid warfare” tactic that includes military exercises and misinformation.
  • Notable sectors impacted comprise energy, emergency response, and healthcare facilities.
  • Cyber operations frequently occur in line with political events and military trainings.
  • Science parks and semiconductor sectors are key targets.
  • Taiwan persists in rejecting Chinese claims of sovereignty.

Escalating Cyberattacks on Taiwan

In 2026, Taiwan witnessed a concerning rise in cyberattacks, averaging 2.63 million incidents daily. This marks a six percent increase from the prior year. The National Security Bureau of Taiwan indicates that these attacks are often aligned with China’s military drills, creating a complex “hybrid threat” aimed at undermining Taiwan’s stability.

Taiwan endures continuous cyber assault from China in 2026

The Hybrid Warfare Approach

China’s strategy regarding Taiwan encompasses more than mere cyberattacks; it integrates military drills, misinformation campaigns, and political coercion. This multifaceted approach seeks to pressure Taiwan into recognizing China’s sovereignty claims. Importantly, cyber operations frequently coincide with military activities, such as the 40 “joint combat readiness patrols” near Taiwan.

Affected Sectors and Methods

The rise in cyberattacks has notably influenced crucial sectors including energy, emergency response services, and healthcare. These attacks comprise distributed denial-of-service (DDoS) tactics aimed at disrupting essential services, along with man-in-the-middle strategies to intercept and acquire data. Taiwan’s semiconductor sector, an indispensable part of the global technology supply chain, is also targeted, with intruders seeking to acquire advanced technologies.

Political Consequences and Reactions

Cyberattacks tend to intensify during politically charged times, such as addresses by Taiwan’s president and vice president. In contrast, China denies any role in these attacks and upholds its position on Taiwan’s sovereignty. Nevertheless, Taiwan stands firm, asserting that only its citizens should determine the island’s future.

Conclusion

The cyber conflict between China and Taiwan underscores the intricate dynamics of contemporary geopolitical tensions. As Taiwan fortifies its cybersecurity initiatives, the global community remains vigilant regarding these developments, considering their implications for worldwide technology security and economic stability.

Q: Which sectors are primarily impacted by the cyberattacks?

A: Major sectors include energy, emergency services, hospital facilities, and science parks, especially within the semiconductor field.

Q: How do these cyberattacks integrate into China’s larger strategy?

A: The assaults are elements of a “hybrid warfare” strategy that blends military drills, misinformation, and political coercion to impose sovereignty over Taiwan.

Q: What measures does Taiwan take against these cyber threats?

A: Taiwan enhances its cybersecurity protocols and insists on its opposition to China’s sovereignty assertions, with backing from international partners.

Q: What makes Taiwan’s semiconductor industry a target?

A: The sector is critical for global technology supply chains, and assaults aim to pilfer advanced technologies to enhance China’s self-sufficiency and competitive edge.

Q: What is the relevance of the timing for these attacks?

A: The attacks often coincide with military drills and politically significant occasions, highlighting the cohesive nature of China’s strategy.

Q: Has China admitted to these cyberattacks?

A: China consistently refutes any involvement in cyberattacks, despite evidence pointing to organized activities.