Blog - Page 15 of 185 - Techbest - Top Tech Reviews In Australia

Vocus ISP Dodo’s Email System Compromised Last Friday


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Dodo, an ISP owned by Vocus, faced a security breach impacting 1600 email accounts.
  • SIM swapping targeted 34 Dodo Mobile accounts.
  • Email services for Dodo and iPrimus customers were temporarily halted.
  • Fraudulent activity has been reported to the authorities.
  • Customers encountered prolonged wait times to restore email access.
Dodo email system security incident

Email System Breach: What Occurred?

On October 17, 2023, Vocus-owned ISP Dodo suffered a major breach that led to unauthorized access to around 1600 email accounts. The breach was made public through a post on Dodo’s official Facebook page on Sunday, shortly after the incident occurred on Friday.

Consequences of the Breach

After the breach, a portion of customers were affected by SIM swapping, which impacted 34 Dodo Mobile accounts. This process involves a fraudster substituting a customer’s working SIM with a Dodo SIM bought at a retail location, effectively rerouting the customer’s mobile number to the new SIM.

Vocus’ Response

In reaction to the breach, Vocus halted email services for both Dodo and iPrimus customers and limited services for Commander customers. The company is actively collaborating with affected customers to undo the fraudulent SIM swaps and has enlisted the help of authorities to further investigate the matter.

Customer Experience

Customers who were affected by the breach were instructed to reach out to Dodo for help, especially to reset their email account passwords. However, many reported significant wait times, frequently extending to an hour, to regain access to their accounts.

Overview

The breach involving Dodo’s email system has underscored the weaknesses in email and SIM security among telecommunications providers. As the company endeavors to lessen the impact and avert future incidents, affected customers are advised to stay alert and secure their accounts without delay.

Q&A Session

Q: What actions should Dodo customers take if they believe their account is compromised?

A: Customers must promptly contact Dodo to reset their passwords and keep an eye on their accounts for any unusual activity.

Q: How can customers safeguard themselves against future breaches?

A: Customers are encouraged to create strong, unique passwords for their accounts and enable two-factor authentication wherever feasible.

Q: What does SIM swapping entail, and why is it a concern?

A: SIM swapping is a fraudulent scheme where a hacker shifts a victim’s mobile number to a different SIM card, allowing access to confidential information. It raises concern due to its potential to cause unauthorized transactions and data breaches.

Q: Are authorities involved in the investigation?

A: Yes, Vocus has informed authorities regarding the fraudulent activities, and investigations are currently in progress.

Q: What steps is Vocus undertaking to avert future incidents?

A: Vocus is closely monitoring the situation and likely has introduced additional security measures, although specific details haven’t been revealed.

Q: How long will Dodo customers experience email service disruptions?

A: The exact length of the service disruption hasn’t been indicated, but Vocus is striving to restore full services as promptly as possible.

ACCAN Calls for Real-Time, Integrated Outage Details


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

ACCAN Advocates for Immediate Outage Data

Brief Overview

  • ACCAN advocates for a centralized public register of telecom outages.
  • The proposal is designed to rebuild consumer trust with minimal financial or regulatory strain on telecom providers.
  • ATA contends that existing regulations are adequate and additional measures would create unnecessary bureaucracy.
  • Real-time notifications are proposed to avoid disjointed communication across various platforms.
  • Optus reported 272 incidents in a month, underscoring the necessity for improved consumer access to outage updates.

Overview

The Australian Communications Consumer Action Network (ACCAN) is advocating for a clear, centralized public register of communication service outages. This initiative comes after major disruptions, such as the failures of Optus’s emergency call services, which have undermined consumer trust in telecommunications firms.

Current Situation

Currently, telecommunications providers in Australia are required to comply with the Australian Communications and Media Authority’s (ACMA) standards for reporting outages. These rules mandate carriers to inform the public, stakeholders, and other service suppliers about outages through various channels including websites, social media, emails, SMS, and broadcast platforms.

ACCAN’s Initiative

ACCAN proposes a modification to the Telecommunications (Customer Communications for Outages) Industry Standard 2024 to incorporate a real-time updating public register. This system would unify outage information, offering consumers a singular, dependable source regarding network status and service interruptions.

Response from the Industry

The Australian Telecommunications Alliance (ATA), the leading lobby organization for telecom companies, opposes the proposition, asserting that current regulations are adequate. ATA’s CEO Luke Coleman argues that the existing system already provides timely updates to customers during outages and that ACCAN’s suggested register would simply add unnecessary complexity.

Example: Optus Outages

Recent Senate inquiries revealed that Optus had 272 reportable outages over a month-long period, bringing attention to the disjointed nature of current outage communication. ACCAN asserts that a centralized register would fill these communication gaps, ensuring consumers are better informed.

ACCAN advocates for real-time, unified access on outages

Conclusion

ACCAN’s initiative for a real-time public outage register aims to boost consumer trust in telecommunication services by providing a centralized information hub. While this proposal seeks to alleviate additional costs and regulatory demands, it is met with resistance from industry stakeholders who claim existing solutions are sufficient.

FAQ

Q: What does ACCAN propose for telecommunication service outages?

A: ACCAN proposes a centralized, real-time updating public register for communication service outages.

Q: Why is ACCAN advocating for a public register?

A: ACCAN believes that a public register will help restore consumer trust and provide a single, reliable source for outage details.

Q: What is the ATA’s view on this proposal?

A: The ATA maintains that the current regulations are sufficient and that ACCAN’s proposal would create unnecessary administration.

Q: How are outages currently communicated to consumers?

A: Outages are reported through a mix of channels, including websites, social media, emails, SMS, and broadcast media.

Q: Can you provide an example of recent outages that illustrate the issue?

A: Optus recorded 272 reportable outages from September 11 to October 8, highlighting the need for better communication.

Raycon Impact Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

ETRSAIRL Raycon Impact Earbuds Military-Grade Shockproof IP67 Bluetooth Earphones with Stereo Sound, 90 Hours Battery Life, Active Noise Cancellation (Black)

Cybercriminals Utilize F5 Devices to Compromise US Government Networks


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Threats from Nation-State Target F5 Equipment in the US

Summary

  • Unknown cyber threat actors are targeting US federal networks through vulnerabilities in F5 devices.
  • CISA issues an emergency directive to address risks and calls for immediate updates.
  • F5 verifies unauthorized access but assures no effect on operations.
  • Security experts are brought in to mitigate the threat and enhance security measures.
  • Concerns for national security hinder public notification of the breach.

Cyber Threats: A Continuous Issue

In a key update, officials from the US government have detected a persistent cyber threat aimed at federal networks. The actors behind the threat, suspected to be from a nation-state, are taking advantage of weaknesses in products from the cybersecurity firm F5. This event underscores the ongoing issue of cybersecurity threats that challenge governments and businesses globally.

Incident Details

The Cybersecurity and Infrastructure Security Agency (CISA) has launched an emergency directive following the revelation that hackers have breached F5’s systems. The threat actors have taken files, which include portions of F5’s source code and information on vulnerabilities. This information could potentially guide additional breaches of F5 devices and software, creating a serious risk for federal networks.

Cyber threats hitting government networks via F5 devices

Actions and Measures for Mitigation

Nick Andersen, the executive assistant director of cybersecurity at CISA, has instructed government agencies to recognize and update F5 devices present in their systems. He emphasized the critical nature of the situation, indicating that the risk encompasses all organizations utilizing these products. Although a breach occurred, F5 asserts that its operations are currently unimpeded, and the software development process has not been compromised.

Investigation and Security Actions

F5 identified the breach on August 9 and has since implemented extensive measures to control the threat. The company has enlisted the help of reputable cybersecurity firms such as CrowdStrike, Mandiant, NCC Group, and IOActive for their investigation. The breach affected data from a limited number of customers, who have been directly notified by F5.

National Security and Reporting

The US Department of Justice has sanctioned a delay in the public announcement of the breach until September 12 due to concerns regarding national security. This decision highlights the seriousness of the situation and the ongoing work to safeguard federal networks against such threats. At the same time, authorities in Britain have advised F5 users to promptly update their software.

Conclusion

The recent cyber threat aimed at F5 devices within US government networks is a stark reminder of the continuous cybersecurity challenges. With CISA and F5 taking firm measures to alleviate risks, it is vital for all organizations that utilize F5 products to act immediately and refresh their systems. The involvement of leading cybersecurity professionals underscores the complexity and severity of the threat.

Q: What specific vulnerabilities are targeted in the F5 devices?

A: The specific vulnerabilities have not been revealed to avoid further exploitation. However, F5 and CISA advocate for immediate updates to address these vulnerabilities.

Q: How is F5 ensuring the security of customer data after the breach?

A: F5 is enhancing its security protocols and infrastructure and has reached out directly to affected customers to manage the situation.

Q: What actions should organizations utilizing F5 products take to safeguard themselves?

A: Organizations are advised to quickly identify F5 devices in their networks and implement all critical security updates as instructed by CISA and F5.

Q: Is there any indication that the hackers have breached other sectors?

A: Currently, there is no evidence of breaches within US civilian agencies or other sectors, but the threat level remains for all organizations using F5 products.

Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones, In-Ear Headphones, Wireless Bluetooth 5.3 Wireless Headphones with 4 Mics, 2023 ENC Noise Cancelling Wireless Earbuds, 48H Deep Bass, IP7 Waterproof Earphones, LED Display, USB-C

Sigma Healthcare Employs Machine Learning in SAP to Improve Forecasting Abilities


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Concise Overview

  • Sigma Healthcare improves demand prediction via machine learning in SAP IBP.
  • Forecast precision enhanced by 5-10% initially, with an additional 10% from utilizing machine learning models.
  • SAP Joule, a generative AI assistant, anticipated to deliver more optimizations.
  • Collaboration with EY to refine the SAP IBP framework.
  • Company’s retail brands include Amcal and Chemist Warehouse.

Improving Prediction with Machine Learning

Sigma Healthcare has made considerable progress in refining its demand forecasting abilities by employing machine learning models within SAP’s Integrated Business Planning (IBP) platform. With the implementation of sophisticated technologies such as extreme gradient boosting and automated outlier correction, Sigma has effectively enhanced its inventory management and medication availability.

Sigma Healthcare employs ML in SAP for superior forecasting

Early Benefits and Additional Enhancements

Initially, Sigma Healthcare experienced a forecast precision improvement of 5-10% following the rollout of the response and supply planning module of SAP IBP. This module replaced traditional manual spreadsheet methods, allowing supply planners to dedicate more time to achieving accuracy.

Applying Machine Learning Models

Guided by Marcus Williams, Sigma’s operations planning team has employed machine learning models such as extreme gradient boosting to process extensive and intricate datasets, facilitating improved sales forecasting and inventory management. Automated outlier correction has played a key role in preventing data inaccuracies from impacting sales outcomes.

The Impact of Generative AI with SAP Joule

Sigma anticipates the integration of SAP Joule, a generative AI copilot, to further bolster its planning capabilities. The AI tool is expected to diminish problem-solving duration and enhance management of out-of-tolerance forecasts and safety stock challenges.

Maintaining Competitiveness through Technology

By staying current with quarterly upgrades of IBP and advancements in AI, Sigma strives to retain a competitive position in the pharmaceutical sector. The collaboration with EY has been crucial in optimizing the IBP realm, aiding in its achievements.

Conclusion

Sigma Healthcare’s strategic implementation of machine learning and AI within SAP’s IBP system has profoundly enhanced its demand forecasting and inventory management. The integration of advanced technologies and partnerships is likely to continue providing competitive benefits in the retail pharmacy domain.

Q: In what ways has Sigma Healthcare enhanced its forecast accuracy?

A: Sigma Healthcare has elevated its forecast accuracy by implementing machine learning models and SAP IBP, yielding an initial 5-10% enhancement with a subsequent 10% increase from advanced models.

Q: Which technologies are being utilized by Sigma Healthcare?

A: Sigma employs technologies such as extreme gradient boosting, automated outlier correction, and SAP Joule, a generative AI copilot, to heighten its forecasting efficiency.

Q: What function does SAP Joule serve in Sigma’s operations?

A: SAP Joule is anticipated to aid in reducing problem-solving timelines and improving forecasts, especially in managing out-of-tolerance instances and safety stock administration.

Q: With whom has Sigma Healthcare collaborated for optimization?

A: Sigma Healthcare has partnered with EY to refine its SAP IBP framework.

Q: What are some of Sigma Healthcare’s retail brands?

A: Sigma Healthcare’s retail brands consist of Amcal and Chemist Warehouse.

Q: What importance does extreme gradient boosting hold in Sigma’s strategy?

A: Extreme gradient boosting assists Sigma in managing vast datasets, enhancing sales forecasting and pinpointing inventory or delivery complications.

Microsoft Withdraws Certificates for Counterfeit Teams Installers Distributing Ransomware


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Cancels Certificates for Counterfeit Teams Installers

Quick Overview

  • Microsoft cancels more than 200 certificates related to counterfeit Teams installers.
  • The cybercrime collective, Vanilla Tempest, aimed at Teams users with ransomware.
  • Certificates from Trusted Signing, SSL.co, DigiCert, and GlobalSign were utilized.
  • Microsoft’s measures seek to diminish the efficacy of these ransomware operations.
  • Microsoft made the revocations public on LinkedIn and other social media outlets.

Vanilla Tempest’s Ransomware Initiative

Microsoft has implemented crucial measures to counter a ransomware threat entity, referred to as Vanilla Tempest, by revoking over 200 certificates utilized in their attack framework. This group, also recognized by cybersecurity experts as Vice Spider and Vice Society, initiated a campaign using counterfeit Microsoft Teams installers hosted on deceptively authentic malicious websites.

Microsoft cancels certs for counterfeit Teams installers dropping ransomware

Consequences of Certificate Cancellation

By canceling these digital certificates, Microsoft has complicated the efforts of Vanilla Tempest to spread ransomware disguised as legitimate files. The certificates that were revoked originated from Trusted Signing, SSL.co, DigiCert, and GlobalSign, which were used to authenticate the counterfeit installers and related tools.

Technical Aspects of the Attack

Upon executing the counterfeit .exe installers, a downloader would trigger the Oyster backdoor, eventually resulting in the deployment of the Rhysida ransomware. Apart from Rhysida, Vanilla Tempest has previously utilized several other ransomware variants, showcasing the group’s flexibility and level of threat.

Microsoft’s Preventive Actions

Microsoft’s prompt decision to cancel these certificates is vital in alleviating the threat posed by these cybercriminals. Announcements concerning these security actions were made publicly through LinkedIn and additional social media platforms, highlighting Microsoft’s pledge to cybersecurity.

Conclusion

In reaction to a notable ransomware threat targeting Microsoft Teams users, Microsoft has canceled over 200 certificates linked to counterfeit installers. This tactical move hampers the ability of Vanilla Tempest to conduct their malicious operations, thereby protecting users and organizations from potential data breaches and financial damages. The announcement signifies Microsoft’s continuous commitment to bolstering global cybersecurity initiatives.

Q: What was the principal tactic employed by Vanilla Tempest in their operations?

A: Vanilla Tempest employed counterfeit Microsoft Teams installers hosted on seemingly authentic malicious domains to deploy ransomware.

Q: How did Microsoft address the threat posed by these counterfeit installers?

A: Microsoft canceled over 200 certificates associated with the counterfeit installers, making it challenging for the malware to mimic legitimate files.

Q: What are the names of a few certificate authorities referenced in the article?

A: The certificates were from Trusted Signing, SSL.co, DigiCert, and GlobalSign.

Q: Which specific ransomware was highlighted as part of the attack?

A: The Rhysida ransomware was specifically highlighted, alongside other ransomware variants utilized by Vanilla Tempest.

Q: How did Microsoft publicize their security measures?

A: Microsoft publicized the cancellation of certificates through LinkedIn and various social media updates.

Honor Earbuds X6 with Charge Box White Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Honor Earbuds X6 with Charge Box White