Blog - Page 23 of 185 - Techbest - Top Tech Reviews In Australia

Singtel Asks for Patience While Optus CEO Confronts Difficulties


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Optus is currently under examination due to recent service disruptions and past events.
  • Singtel’s CEO highlights the need for patience while Optus CEO Stephen Rue implements changes.
  • Recent disruptions have impacted emergency call systems, leading to governmental action.
  • Optus has encountered serious obstacles, such as a significant cyber breach in 2022.
  • Optus is consulting with outside experts to evaluate its network strategies.

Optus Under Close Observation Due to Service Disruptions

Optus, a top telecom provider in Australia, is experiencing heightened scrutiny after recent failures in its emergency call services. These disruptions have brought up concerns regarding the company’s governance and operational oversight. The parent organization, Singapore Telecommunications (Singtel), is calling for patience as Optus CEO Stephen Rue embarks on a long-term strategy for transformation.

Singtel stresses the importance of patience as Optus CEO addresses challenges

Leadership Shifts and Obstacles for Optus

The consecutive outages have increased the strain on Optus, coming after a series of notable events, including a nationwide service failure and a major data breach. Stephen Rue, who assumed the CEO position in November 2024, was appointed to tackle these prevailing challenges. Singtel CEO Yuen Kuan Moon, currently in Australia meeting with local officials, reiterated that Optus’s transformation would require time.

Government Actions and Third-Party Review

The recent service interruptions have led to governmental measures from Australia. Communications Minister Anika Wells has urged Optus to recruit external advisors to independently assess the company’s network strategy. The objective is to avoid future outages, particularly those that disrupt essential emergency services.

Continued Effect on Optus’s Reputation

These occurrences have further harmed Optus’s image. The cyberattack in 2022 that affected millions of users’ data, combined with a $100 million fine for sales misconduct, has already damaged the firm’s reputation. The recent outages exacerbate the situation, culminating in the dismissal of former CEO Kelly Bayer Rosmarin and intensifying the pressure on the current leadership to effect prompt enhancements.

Recap

Optus is currently undergoing a significant transformation under CEO Stephen Rue, amidst difficulties such as recent service outages and historical challenges. The company is being closely monitored by its parent firm, Singtel, and the Australian government, with demands for outside assessments of its network plans to guarantee reliability and avert further interruptions.

Q: What recent problems have affected Optus?

A: Optus has experienced service outages impacting emergency calls and has a background of events like a nationwide failure and a data breach.

Q: What role does Singtel play in Optus’s current circumstances?

A: Singtel, as the parent organization, is promoting patience as the Optus CEO focuses on transforming the company.

Q: What actions has the Australian government taken concerning Optus?

A: The government has asked Optus to enlist external advisors to review its network strategies following the recent service disruptions.

Q: How has Optus’s reputation been influenced by recent incidents?

A: Optus’s reputation has suffered due to service outages, a cyber breach in 2022, and a substantial penalty for sales misconduct.

Q: Who is at the helm of Optus’s transformation efforts?

A: CEO Stephen Rue is leading the push for transformation at Optus since assuming the role in November 2024.

Q: What was the effect of the recent service outage?

A: The outage impacted emergency calls, affecting approximately 4500 individuals, and was associated with several fatalities.

Tesla’s Supervisory FSD Hits 1 Million Kilometers on Australian Roads


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Tesla’s Full Self-Driving (FSD) achieves 1 million kilometers in Australia.
  • Approximately 3,000 Tesla vehicles are thought to have played a role in this achievement.
  • FSD available for the latest Tesla Model 3 and Model Y featuring HW4.
  • Buy the FSD outright for A$10,100 or opt for a subscription soon at A$149/month.
  • World’s first continental circumnavigation using FSD by Harald Murphy.

Tesla’s FSD Achievement in Australia

Tesla's FSD achieves 1 million kilometers on Australian routes

Tesla’s Full Self-Driving (FSD) has reached an impressive landmark in Australia, completing 1 million kilometers since its launch. Australian Tesla drivers have enthusiastically adopted this pioneering technology, following a five-year anticipation since the first release of what was formerly called FSD Beta.

Launch and Reception

The initial version, V13.2.9, was first made available to a limited group in the early access program beginning August 29th. By September 18th, it became available to the wider public. Tesla owners with newer Model 3 or Model Y vehicles equipped with HW4 and the paid FSD software upgrade could utilize this functionality. While exact numbers are hard to pinpoint, it’s evident that a large percentage of Australian Tesla owners have adopted FSD.

Achieving 1 Million Kilometers

In merely 1.5 weeks, Tesla reported that over 1 million kilometers had been navigated on Australian roads with FSD (Supervised). Estimates indicate that around 3,000 Tesla cars contributed to this achievement, with enthusiasts likely accumulating more miles than the average.

Importance and Economic Influence

This landmark is not only indicative of Tesla’s technological capabilities but also marks an important financial success. As each vehicle may yield up to A$10,100 for FSD, Tesla has benefitted from an influx of approximately A$30 million. The software upgrade is a high-margin product, enhancing the profitability of Tesla vehicles.

Upcoming Enhancements and Subscription Service

Tesla is continually refining its software, with Elon Musk recently teasing new capabilities in V14, such as multi-story carpark support. The rollout of an FSD subscription model at A$149 per month is expected to entice more users, providing a more economical option compared to the upfront payment.

Groundbreaking Circumnavigation

A remarkable milestone was the world-first continental circumnavigation accomplished by Tesla enthusiast Harald Murphy, who traveled 13,577 kilometers around Australia using FSD for over 99.9% of the trip. This achievement highlights the strength and efficiency of Tesla’s FSD in varied and challenging conditions.

Pricing and Accessibility

FSD (Supervised) is offered for new Tesla Model 3 and Model Y vehicles and as an over-the-air upgrade for eligible HW4-equipped vehicles. This feature can be acquired outright for A$10,100, with a subscription option expected soon at A$149 per month.

Conclusion

Tesla’s Full Self-Driving (FSD) technology reaching 1 million kilometers on Australian roads is a noteworthy achievement, reflecting the local community’s confidence in autonomous technology. With exciting developments ahead and a subscription model in the pipeline, Tesla remains a frontrunner in self-driving technology innovation.

Q: What is Tesla’s Full Self-Driving (FSD)?

A: Tesla’s FSD is an advanced driver-assistance system that enables autonomous driving under supervision.

Q: How many Teslas contributed to the 1 million kilometers achievement?

A: About 3,000 Tesla vehicles are believed to have contributed to this milestone.

Q: How can I access Tesla’s FSD in Australia?

A: FSD is available for new Model 3 and Model Y vehicles with HW4 or as an upgrade for eligible existing vehicles. It can be purchased outright or subscribed to monthly soon.

Q: What are the future developments for Tesla’s FSD?

A: Tesla is set to introduce new features in V14, including multi-story carpark support, along with launching a subscription model for more flexible access.

Q: What is the cost of Tesla’s FSD?

A: The FSD feature can be obtained outright for A$10,100, while a forthcoming subscription service will be available at A$149 per month.

Optus Encounters Fresh Emergency Call Issues After Tower Disruption


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Optus Emergency Call Disruption: Tower Outage Issues

Brief Overview

  • Optus tower outage occurred in Dapto affecting emergency communications.
  • Event took place from 3am to 12.20pm on September 28.
  • Nine individuals were unable to contact emergency services.
  • Optus is being investigated following a related recent occurrence.

Optus Tower Outage Impacts Emergency Communications

Optus tower outage affects emergency communications

Optus has encountered yet another issue as a mobile phone tower outage in the Dapto region, south of Wollongong, left nine users unable to reach emergency services. The disruption occurred in the early hours of September 28, affecting calls, including those made to Triple Zero, from 3am until 12.20pm.

Optus has assured that all individuals who tried to access emergency services during this episode are safe. The telecommunications provider has apologized to the customers affected by the incident.

Recent Incidents and Inquiries

This event follows a comparable issue that took place the week before when a firewall upgrade caused a 13-hour outage impacting Triple Zero services across two states and one territory. Optus is presently subject to several inquiries regarding these disruptions.

A significant point of investigation is why calls were not diverted through alternative mobile networks during these events.

Conclusion

The recent Optus tower outage underscores persistent challenges within the Australian telecommunications system, especially regarding access to emergency calls. With investigations ongoing, the emphasis is on guaranteeing dependable emergency services for all Australians.

Q&A: Clarifying the Optus Tower Outage

Q: What led to the Optus tower outage in Dapto?

A: Optus stated there was an unspecified problem at a mobile phone tower location in the Dapto area that affected emergency calls.

Q: How many individuals were impacted by the outage?

A: Nine individuals were unable to reach emergency services due to the outage.

Q: What actions is Optus undertaking to resolve these concerns?

A: Optus is under investigation and is working to address network weaknesses and ensure reliable emergency access going forward.

Q: Why weren’t calls routed through other networks during the outage?

A: This is a primary question currently being examined, as rerouting might have reduced the effects of the outage.

Q: What transpired during the previous Optus emergency call disruption?

A: The earlier incident involved a firewall upgrade that caused a 13-hour interruption of Triple Zero services affecting numerous areas.

xinwld Bluetooth Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

xinwld Bluetooth Headphones, Wireless Bluetooth 5.3 in-Ear Headphones with 4 ENC Noise Cancelling Mic, Wireless Headphones Deep Bass Wireless Earbuds 40 Hours, IP7 Waterproof Earbuds, Green

GitHub Enhances npm Security After Shai-Hulud Worm Event


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

GitHub Strengthens npm Security After Shai-Hulud Worm Incident

Overview

  • GitHub is boosting npm security in response to recent breaches.
  • Mandatory two-factor authentication (2FA) is now required for local publishing.
  • Granular tokens enhance control over package accessibility.
  • A new Trusted Publishing method will replace API tokens.
  • Transition from TOTP to FIDO 2FA for improved security.
  • Changes will be rolled out gradually, with full support for developers.

GitHub’s Action Against npm Security Risks

Following the Shai-Hulud worm incident, GitHub has unveiled a comprehensive set of security enhancements aimed at protecting the npm ecosystem. This initiative arises in response to increasing worries regarding supply chain attacks on open-source repositories.

GitHub boosts npm security following Shai-Hulud worm incident

Launch of Two-Factor Authentication and Granular Tokens

A notable aspect of these measures is the enforcement of mandatory two-factor authentication (2FA) for local publishing. Moreover, GitHub is introducing granular tokens, enabling developers to accurately manage package and scope access. These tokens can be allocated to specific organizations, have expiration configurations, and be associated with particular IP address ranges.

Embracing Trusted Publishing and Advanced Authentication

GitHub is also adopting the Trusted Publishing authentication method, inspired by practices from the Python Software Foundation. This method will substitute API tokens in build pipelines and adheres to the OpenID Connect Standard. Developers can now utilize the WebAuthn API for authentication, providing a more secure alternative to TOTP codes.

Shift to FIDO 2FA and Future Directions

Classic legacy tokens and TOTP for 2FA are being gradually discontinued in favor of Fast Identity Online (FIDO) 2FA, which promises superior security. While GitHub has not detailed an exact timeline for these changes, they are committed to offering comprehensive documentation and support to ensure developers have a smooth transition.

Conclusion

GitHub’s proactive measures to enhance npm security reflect its dedication to preserving the integrity of the open-source environment. The rollout of 2FA, granular tokens, and alternative authentication methods aims to significantly reduce the risk of supply chain vulnerabilities. Developers are encouraged to remain informed and adjust to these changes to maintain the security of their projects.

Q: What led GitHub to strengthen npm security?

A: The recent Shai-Hulud worm incident and other supply chain threats exposed vulnerabilities in npm packages, prompting GitHub to take action.

Q: Why is two-factor authentication critical for npm?

A: The implementation of mandatory 2FA provides an additional security layer, minimizing the chances of unauthorized access to npm packages.

Q: In what way do granular tokens enhance security?

A: Granular tokens grant developers precise authority over package accessibility, allowing for limitations based on organizations, IP addresses, among others.

Q: What is Trusted Publishing, and why is it essential?

A: Trusted Publishing substitutes API tokens with a more secure authentication method, lowering the risk of token theft in build processes.

Q: Why is GitHub retiring TOTP for 2FA?

A: TOTP codes are susceptible to man-in-the-middle attacks, prompting GitHub’s shift to the more secure FIDO 2FA.

Q: Will developers receive assistance during these adjustments?

A: Indeed, GitHub intends to offer documentation, migration assistance, and support channels to aid developers throughout the transition process.

TOZO O2 Lightweight Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

TOZO O2 Lightweight Wireless Earbuds with Multi-Angle Adjustment, True Wireless Bluetooth 5.3 Headphones with Open Ear Design for Long-Lasting Comfort, Crystal-Clear Calls for Driving, Meeting

Ex-Microsoft Executive to Lead AI Advancement at Home Affairs


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Rishi Nicolai, an ex-Microsoft executive, has joined Home Affairs to lead AI advancements.
  • Nicolai’s responsibilities center on the integration of AI to enhance productivity in Home Affairs.
  • AI projects include chatbots and tools for sentiment analysis.
  • Home Affairs is boosting its AI utilization within the AWS infrastructure.

Rishi Nicolai Assumes Leadership at Home Affairs

Rishi Nicolai, who dedicated 13 years to Microsoft in various capacities, has been named the director of AI adoption at Home Affairs. His background as a Copilot behavioral specialist is expected to play a crucial role in advancing the department’s AI functions. Nicolai shared his excitement on LinkedIn, stating, “This next chapter is a powerful opportunity to lead transformative change, and I’m energised by the challenge of helping shape how AI can serve the public good with integrity and impact.”

AI Projects at Home Affairs

Home Affairs has launched various AI projects, highlighted during the AI Government Showcase in Canberra. One of these was a chatbot created with the open-source tool Ollama, aimed at modernizing the department’s legacy Java codebase. This chatbot was developed in only two weeks.

Another initiative comprised the use of Microsoft’s Phi-2 model to analyze APS census data and automate cultural surveys within the Australian Border Force. The model was subsequently upgraded to Phi-4 to assist with visa-related inquiries, underscoring the department’s intent to harness AI for operational enhancement.

Looking Ahead: AI Growth

In the future, Home Affairs intends to broaden its AI applications on the AWS platform. The department aims to refine AI models with more robust computational resources, indicating a strong plan for adopting AI technology.

Conclusion

The designation of Rishi Nicolai signifies a crucial advancement for Home Affairs in bolstering its AI capabilities. With an impressive history at Microsoft, Nicolai is poised to spearhead AI integration within the department, concentrating on initiatives that enhance productivity and operational effectiveness. As Home Affairs continues to investigate AI opportunities, its projects hold the potential to significantly impact the public sector.

Questions & Answers

Q: Who is Rishi Nicolai?

A: Rishi Nicolai is a previous Microsoft executive with 13 years of experience, recently appointed as the director of AI adoption at Home Affairs.

Q: What is the main focus of Nicolai’s role at Home Affairs?

A: Nicolai’s role concentrates on speeding up AI adoption to increase productivity within Home Affairs.

Q: What AI projects has Home Affairs launched?

A: Home Affairs has launched projects including a chatbot for legacy code updates and sentiment analysis tools employing Microsoft’s Phi-2 and Phi-4 models.

Q: How does Home Affairs plan to broaden its AI usage?

A: Home Affairs intends to expand AI usage on its AWS platform, refining models with more sophisticated computational infrastructure.

Q: What is the importance of the AI Government Showcase?

A: The AI Government Showcase demonstrated Home Affairs’ initial AI initiatives and its dedication to incorporating AI into public service functions.

TOZO Wireless Earbuds Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

TOZO Wireless Earbuds Bluetooth 5.3 Headphones Built-in ENC Noise Cancelling Mic, 55 Hrs Playtime App Customize EQ IPX8 Waterproof LED Digital Display Premium Sound Headset Enhanced Version (Black)

Cyber Compliance Frequently Overlooks Third-Party Risks, Identifly CSO Cautions


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Compliance Frequently Overlooks Third-Party Risks, Identifly CSO Alerts

Quick Overview

  • Organisations frequently emphasize checklists, overlooking vital third-party risks.
  • Thorough reviews are crucial to adapt to changing cyber threats.
  • Routine access evaluations and independent verification are key elements of effective cybersecurity agreements.
  • Cyber insurance requirements are altering contract stipulations.
  • Simplified contract formats can improve cybersecurity for smaller enterprises.

Third-Party Risks in Cyber Compliance

The Chief Strategy Officer at Identifly, Aaron Finnis, points out a common concern in cybersecurity enforcement—organisations tend to be focused on completing checklists, disregarding the significant issue of third-party risks. This negligence can result in serious vulnerabilities, particularly as businesses increasingly depend on external providers for various services.

Cyber compliance frequently overlooks third-party risks, warns Identifly CSO

Aaron Finnis, Identifly

Refreshing Cybersecurity Agreements

Finnis stresses the importance of Australian organisations revamping their cybersecurity contract evaluation approaches. Thorough reviews must validate service scopes and data handling practices, ensuring strict compliance with cyber controls.

Common Oversights in Cybersecurity Agreements

A notable oversight is the absence of processes for regulating vendor access to client assets. Frequently, vendors receive extensive initial access without further assessments or renewals, creating potential security threats.

Compliance and Practicality in Agreements

Although compliance standards are becoming more rigorous, they often overlook crucial third-party risks, including vendor locations and access methods. Finnis indicates that practical procedures aimed at genuinely reducing risks can be eclipsed by an emphasis on checklist completion.

The Effect of Regulatory Demands

With heightened regulatory demands like CPS 230, there is a clear trend towards one-time checklist assessments. However, Finnis cautions that these may not be adequate over time as organisations’ cyber statuses change, underscoring the need for regular and continuous evaluations.

SaaS Data Security Challenges

Standard contracts for SaaS applications such as Xero, HubSpot, and Salesforce typically provide limited negotiation flexibility, complicating the integration of clauses for timely incident communication and framework adherence.

Critical Contract Clauses

Response to incidents is vital, especially given the increasing emphasis on ransomware notifications. Finnis advocates for a contractual requirement for incident reporting within 48 hours of detection to enable prompt action by clients.

Balancing IT and Business Objectives

Current agreements often prioritize insurance and liability over enforcing essential controls. Finnis suggests using independent validation to confirm the efficacy of partner controls, ensuring they fulfill the requirements of boards and business management.

The Influence of Cyber Insurance

Cyber insurance prerequisites are progressively molding contract content. Organisations need to scrutinize coverage dimensions, exclusions, and compliance requirements to guarantee thorough protection.

Simple Contract Structures for Small Enterprises

For small enterprises, straightforward contract formats are crucial. Emphasizing key controls like transparent reporting and independent verification can greatly bolster security without added complexity.

Conclusion

Organisations must transition their emphasis from simply completing checklists to effectively managing third-party risks in cybersecurity agreements. Regular evaluations, independent verification, and strategic contractual provisions are essential for upholding strong cyber defenses. As regulatory demands and cyber insurance requirements evolve, businesses should modify their contract strategies to guarantee comprehensive protection and responsibility.

Q: How can organisations improve their management of third-party risks in cybersecurity?

A: By performing thorough reviews that verify service scopes and data management, and by instituting regular access evaluations and independent validation.

Q: What are some prevalent oversights in cybersecurity agreements?

A: Insufficient processes for managing vendor access and an inadequate focus on practical risk management are common oversights.

Q: Why are compliance standards often inadequate?

A: They may excessively concentrate on checklist completion, neglecting significant third-party risks and practical measures that mitigate risks.

Q: How are cyber insurance stipulations affecting agreements?

A: They are driving increased coverage expectations, and organisations should meticulously evaluate coverage scopes, exclusions, and compliance requirements.

Q: What should small enterprises prioritize in their cybersecurity agreements?

A: They should focus on simplicity, emphasizing critical controls such as transparent reporting and independent validation to effectively enhance security.

JBL Wave 200 True Wireless Earbuds White Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

JBL Wave 200 True Wireless Earbuds White