Blog - Page 46 of 185 - Techbest - Top Tech Reviews In Australia

ADHA Invites Proposals for Support of My Health Record and API Gateway


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

ADHA Digital Upgrade: My Health Record and API Gateway

Quick Overview

  • ADHA invites proposals for integrated support of My Health Record and API Gateway.
  • This project is part of a comprehensive digital infrastructure upgrade.
  • The tender represents the first competitive bidding for the $788 million contract in over ten years.
  • My Health Record is developed using Oracle technologies, supported by extensive user licences.
  • API Gateway, created by Deloitte, operates on Microsoft Azure and Red Hat OpenShift.
  • ADHA aims to enhance the digital health landscape in Australia.

Overview

The Australian Digital Health Agency (ADHA) is advancing with a bold initiative to merge My Health Record and API Gateway into a singular application support and maintenance agreement. This move is part of a larger strategy to revamp the country’s digital health infrastructure.

ADHA Invites Bids for My Health Record and API Gateway Support

Tender Announcement

ADHA has issued a tender request for services encompassing the technologies and platforms that underpin My Health Record and the API Gateway. This is the first occasion that the $788 million digital infrastructure contract, which has been with Accenture since 2012, is available for competitive bidding.

Technological Backbone

My Health Record is constructed on Oracle technologies, primarily featuring Oracle Database Enterprise Edition at its core. Oracle Access Manager, Splunk, and Symantec enhance its security features. Data storage and indexing are facilitated by Oracle Healthcare Data Repository and Oracle Health Sciences Information Manager. ADHA maintains 28 million perpetual Oracle user licenses for user engagement support.

User Access Points

Adobe Experience Manager supports key user access points, including the National Consumer Portal, National Provider Portal, and Administration Portal, offering vital interfaces for stakeholders.

The API Gateway

The API Gateway acts as a vital link for external stakeholders, accommodating 125 APIs of varied complexity. Redeveloped by Deloitte, it became operational in 2022. It is hosted on Microsoft Azure as well as on the Red Hat OpenShift platform, replacing an earlier Oracle gateway managed by Accenture.

Contract Specifications

Deloitte’s agreement for the API Gateway, commenced in July 2021, is valued at $50 million and is scheduled to conclude in December 2026. Questions arose regarding whether the new tender encompasses a distinct management scope.

Future Prospects

As ADHA embarks on a thorough transformation to modernise Australia’s digital health framework, the revamp of My Health Record is expected to be pivotal. ADHA CTO John Borchi highlighted that the tender signifies a vital opportunity to uphold Australia’s status as a world leader in digital health innovation.

Conclusion

ADHA is merging My Health Record and API Gateway support into a unified contract as part of a larger digital infrastructure upgrade. This tender opens up the $788 million contract to competitive bids for the first time in over a decade, with the goal of modernising and enhancing Australia’s digital health system.

Q: Why is the ADHA’s tender request important?

A: The tender request is significant as it initiates the first competitive bidding process for the $788 million digital infrastructure contract in over a decade, aiming to unify support for My Health Record and the API Gateway.

Q: What technologies are foundational to My Health Record?

A: My Health Record is constructed using Oracle technologies, which include Oracle Database Enterprise Edition, Oracle Access Manager, and various Oracle data management tools.

Q: What function does the API Gateway serve?

A: The API Gateway provides a channel for external stakeholders to interact with ADHA and supports 125 APIs of differing complexity, enabling integrated healthcare services.

Q: How is the API Gateway structured?

A: The API Gateway operates on Microsoft Azure and leverages the Red Hat OpenShift platform, having been redeveloped by Deloitte.

Q: What are the main objectives of ADHA’s digital infrastructure upgrade?

A: The upgrade aims to modernise Australia’s digital health framework, improve system functionalities, and sustain Australia’s leadership in digital health innovation.

Optus Launches ‘Expert AI’ to Transform Customer Service Experience


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Optus Unveils Expert AI for Enhanced Customer Support

Optus Introduces Innovative ‘Expert AI’ to Enhance Customer Support

Quick Overview

  • Optus introduces Expert AI to boost customer service efficiency.
  • Built on Google Cloud, it serves as a co-pilot for representatives.
  • Delivers real-time advice and automates backend processes.
  • Part of Optus’s continuous commitment to AI-driven solutions.

Optus Unveils Expert AI for Customer Support

Optus Expert AI: A Trailblazer in Customer Assistance

Optus has launched its latest development, ‘Expert AI’, aimed at assisting its frontline personnel by providing quicker and more effective customer service. This AI-driven assistant, created on the powerful Google Cloud platform, delivers real-time insights to address customer concerns efficiently.

How Optus Expert AI Operates

Real-Time Evaluation

Expert AI evaluates live customer interactions, including calls and chats, to promptly grasp the essence of the customer’s problem, facilitating rapid resolutions.

Contextual Assistance

Drawing from ongoing dialogues, the AI supplies Optus staff with on-screen prompts and recommendations, ensuring compliance with best practices.

Automated Processes

The system can carry out tasks such as accessing account information or processing requests independently, lessening manual duties and customer wait periods.

The Vision Inspiring the Technology

This project is part of Optus’s overarching plan to improve customer engagement by combining human talent with artificial intelligence. As stated by Jesse Arundell, Head of AI Solutions & Strategy at Optus, the firm has invested in AI technologies for more than five years to greatly enhance customer and employee experiences.

The Effect of Current AI Solutions

Optus’s Conversational AI Virtual Agents have already successfully managed over 2.2 million customer inquiries in the last year, achieving an average resolution time of below 120 seconds. This achievement underscores AI’s potential to transform customer service.

Expert AI’s Introduction and Availability

Optus Expert AI is presently accessible as an internal resource for Optus’s frontline personnel. Customers will experience improved service quality without incurring extra costs.

For further details, visit Optus Official Site.

Conclusion

Optus’s launch of Expert AI represents a notable advancement in utilizing artificial intelligence to enhance customer support. By integrating real-time insights and automation, Optus seeks to deliver a faster, more effective, and seamless customer experience. This venture aligns with Optus’s dedication to innovation and customer satisfaction.

Common Questions

Q: What is Optus Expert AI?

A: Optus Expert AI is an AI-driven assistant created to assist Optus’s frontline personnel by offering real-time insights and automating tasks to enhance customer service efficiency.

Q: In what ways does Optus Expert AI enhance customer service?

A: The AI examines live interactions to provide agents with real-time advice, suggests suitable responses, and automates backend functions, decreasing wait times and improving service quality.

Q: Will customers incur additional charges for using Optus Expert AI?

A: No, Optus Expert AI is an internal instrument for Optus staff, and customers reap the benefits of enhanced service without incurring extra costs.

Q: How does this initiative align with Optus’s broader goals?

A: This initiative is aligned with Optus’s strategy to harness AI for enhancing customer experiences, building on earlier investments in AI solutions to better service quality and efficiency.

“Scattered Spider Launches Fresh Ransomware and Social Engineering Strategies”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Scattered Spider has adopted novel ransomware and social engineering strategies.
  • DragonForce ransomware is now included in their resources.
  • New strategies involve impersonating staff to deceive IT support.
  • Remote access applications like AnyDesk and Teleport.sh are utilized to avoid detection.
  • The RattyRAT trojan improves their sustained access abilities.
  • Targets feature Snowflake data cloud and VMware ESXi servers.
  • Connections to the Com online criminal network are recognized.
  • The FBI cautions about a Com subgroup, Hacker Com, connected to ransomware-as-a-service.

Progression of Cyber Threats

The Scattered Spider collective, noted for its advanced cyber assaults, has bolstered its inventory with new ransomware and social engineering approaches, as reported by the Australian Cyber Security Centre (ACSC) and various Western entities.

Innovative Tactics and Approaches

Recently, Scattered Spider has begun employing DragonForce ransomware, utilized post data exfiltration for blackmail. Interaction with targeted entities takes place via The Onion Router (TOR), email, or encrypted messaging applications.

Data Exfiltration and Manipulation

This group transfers data to platforms like Mega.nz and Amazon S3. They have refined their social engineering methods, posing as personnel to influence IT helpdesks into resetting passwords and shifting MFA tokens.

Enhanced Tools for Concealment

Scattered Spider employs legitimate remote access tools such as AnyDesk and Teleport.sh to hide their activities. The Java-based trojan RattyRAT is also utilized to sustain undetected access.

Focusing on Cloud and Server Systems

The group aims at Snowflake data cloud for swift data exfiltration and encrypts VMware ESXi servers to heighten the urgency for ransom settlements. They create false user profiles and social media accounts to preserve access.

Advice for Organizations

To mitigate these threats, organizations are advised to implement phishing-resistant MFA, prohibit unauthorized software, and keep offline backups, as suggested by security agencies.

Connections to Criminal Syndicates

Scattered Spider is associated with the Com online criminal network, which recruits through channels like Roblox and Discord. A subgroup, Hacker Com, participates in ransomware-as-a-service and other illicit activities such as DDoS assaults and SIM swapping.

FBI Alerts

The FBI has circulated warnings regarding Hacker Com’s refined operations, which comprise selling technical support and engaging in violent retribution actions like “swatting.”

Conclusion

Scattered Spider’s progress in ransomware and social engineering strategies underscores the shifting cyber threat environment. Their ties to the Com network and advanced methods present substantial threats to organizations globally.

Q: What is DragonForce ransomware?

A: DragonForce is a variant of ransomware utilized by Scattered Spider for extortion following data breach.

Q: How does Scattered Spider execute social engineering?

A: They impersonate staff members to deceive IT helpdesks into changing passwords and transferring MFA tokens.

Q: What tools does Scattered Spider use for remote connectivity?

A: They leverage AnyDesk, Teleport.sh, and the RattyRAT trojan to maintain concealed access.

Q: Why is the Snowflake data cloud a target?

A: Snowflake enables Scattered Spider to perform large data queries quickly for exfiltration purposes.

Q: What constitutes the Com network?

A: It is an online criminal syndicate affiliated with Scattered Spider, recruiting via platforms such as Roblox and Discord.

Q: What measures has the FBI taken?

A: The FBI has issued warnings about Hacker Com’s advanced criminal enterprises, including ransomware-as-a-service.

JBL Wave Beam Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

JBL Wave Beam, JBL Deep Bass Sound, Comfortable fit, Up to 32 (8h + 24h) total hours of battery life with speed charging, Stay aware of your surrounding, Hands-free calls with VoiceAware, Black

Government Encourages Vulnerability Research, Notifies Insurers and Non-Profits


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Government Advocates for Vulnerability Research, Notifying Insurers and Non-Profits

Quick Summary

  • The Australian government is enhancing its cyber security strategy, transitioning to horizon two, with an emphasis on browser-level threat mitigation.
  • Possible governmental involvement in the cyber insurance sector to aid small and medium enterprises and non-profit organizations.
  • Conversations on synchronizing cyber regulations to elevate organizational cyber maturity.
  • Focus on data protection as artificial intelligence advances and handles an increasing volume of data.
  • Increased safeguarding and incentives for vulnerability researchers in Australia.
  • Augmented security protocols for non-profits to safeguard sensitive information.

Cyber Security Strategy: Shift to Horizon Two

Development of Australian government cyber security strategy

The Australian government is intensifying its efforts regarding its cyber security strategy, with a transition from horizon one to horizon two, covering the period from 2026 to 2028. This strategy revolves around six strategic ‘shields’ intended to strengthen Australia’s cyber defenses.

Possible Involvement in Cyber Insurance

The federal government is considering intervention in the cyber insurance landscape to make services more attainable for small enterprises and non-profit organizations. While insurance facilitates swift recovery from cyber incidents, accessibility is frequently hampered by financial barriers and technical prerequisites. The government seeks to enhance the availability of these products without disrupting the market.

Regulatory Talk

A discussion is being promoted to evaluate if the existing cyber regulations and compliance legislation have limited the cyber maturity of organizations. The government proposes possible amendments to consolidate these laws and enhance their effectiveness.

Emphasis on Data Transmission

As AI progresses, understanding data movement and access becomes imperative. The government has plans to bolster data security to mitigate risks that come with the rising use of AI across sectors.

Initiatives for Vulnerability Research

Acknowledging the significance of vulnerability researchers as vital assets, the government aims to provide improved protections and incentives for their contributions. This may include the establishment of a vulnerability disclosure program for secure reporting.

Enhancements to Browser-Level Security

In transitioning to a more intricate threat blocking approach, the government will concentrate on browser-level security to supplement current large-scale initiatives. This program intends to boost awareness and uptake of enhanced browser security features.

Fortifying Cyber Security for Non-Profits

Due to their dependence on volunteers and limited funding, non-profits encounter distinct obstacles in upholding cyber security. The government is prioritizing the enhancement of cyber resilience within this domain to secure sensitive data and preserve public confidence.

Conclusion

The Australian government’s advancement to horizon two of its cyber security strategy signifies a major leap forward in bolstering national cyber resilience. By concentrating on enhancing insurance access, regulatory reform, data security, and backing for vulnerability research, the strategy aims to strengthen defenses against emerging cyber threats.

Q&A

Q: What are the primary objectives of Australia’s updated cyber security strategy?

A:

The strategy is geared towards improving cyber resilience through enhanced threat mitigation, better access to cyber insurance, more streamlined regulations, and fortified data security protocols.

Q: In what ways will the government assist vulnerability researchers?

A:

The government plans to provide increased protections and incentives for researchers, potentially through a formal vulnerability disclosure initiative.

Q: What’s the significance of focusing on not-for-profits?

A:

Not-for-profits frequently struggle with resources necessary for adequate cyber security, rendering them susceptible. The government aims to bolster their capacity to secure sensitive data and uphold public trust.

Q: What transformations are anticipated in cyber insurance?

A:

The government might intervene to enhance the accessibility and affordability of cyber insurance for small businesses and non-profits, ensuring broader coverage and protection.

Google’s Gemini CLI Agent Represents a Concealed Malware Risk


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • The Gemini CLI agent from Google is prone to executing covert harmful commands.
  • The flaw was uncovered by security researcher Sam Cox.
  • This vulnerability entails inadequate validation, prompt injection, and confusing user experience.
  • Google has updated the status of the vulnerability to Priority 1, Severity 1.
  • Users are encouraged to upgrade to Gemini 0.1.14 for improved protections.
  • Activating sandboxing can thwart the attack, although it is not set as default.

Grasping the Gemini CLI Weakness

The Google Gemini CLI agent, built to connect with Google’s sophisticated AI language model using textual commands, has been identified to possess a critical vulnerability. Detected by Tracebit security researcher Sam Cox, this flaw permits the execution of harmful commands without the user’s knowledge.

The Detection Method

Cox found the vulnerability via a combination of inadequate validation, prompt injection, and misleading user interface. By inserting a prompt within a README.md file—along with a seemingly harmless Python script—Cox illustrated how credentials could be siphoned off using “env” and “curl” commands to a distant server.

Google’s Action Against the Risk

Initially rated as Priority 2, Severity 4, the vulnerability was reclassified by Google to Priority 1, Severity 1 following further investigation. This reassessment emphasizes the risk of major data breaches and unauthorized access.

Recommended User Measures

Users are strongly encouraged to update to Gemini 0.1.14, which offers new protections against shell code execution. Moreover, enabling sandboxing can provide additional defense to systems, though it is not automatically turned on during installation.

Mitigation Techniques

To reduce the threat posed by this vulnerability, users should promptly update their software and activate sandboxing. Sandboxing establishes an isolated environment that can prevent unauthorized code from impacting the host system.

Significance of Timely Updates

Continuous updates and prompt patching are essential for ensuring the safety of software utilities like the Gemini CLI. Users must remain alert and responsive to any security alerts from developers.

Risk posed by the Gemini CLI agent from Google

Conclusion

The Google Gemini CLI agent exhibits a serious security vulnerability that may enable silent operations of malicious commands. Uncovered by Sam Cox, this problem underscores the need for proper validation and thoughtful user interface design in terms of security. Users are advised to upgrade to the latest version and activate sandboxing for system protection.

Questions and Answers

Q: What is the Google Gemini CLI agent?

A: It serves as a text-oriented command interface meant to connect with Google’s AI large language model.

Q: How was the vulnerability identified?

A: The flaw was uncovered by security researcher Sam Cox through a series of improper validations, prompt injections, and a misleading user experience.

Q: What steps should users follow?

A: Users should upgrade to Gemini 0.1.14 and activate sandboxing to protect against possible threats.

Q: Why is sandboxing significant?

A: Sandboxing creates a separate environment that can stop harmful code from impacting the primary system.

Q: How did Google react to the vulnerability?

A: Google updated the classification of the vulnerability to Priority 1, Severity 1 and encouraged users to refresh their software.

Q: Is the vulnerability resolved in the latest edition?

A: The latest edition, Gemini 0.1.14, comprises protections against shell code execution.

Bluetooth Headphones Wireless in-Ear – Bluetooth 5.3 Hi-Fi Stereo Deep Bass Wireless Headphones Noise Cancelling CVC Wireless Earbuds 35 Hours Playtime 13 mm Driver Earphones Waterproof USB C Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones Wireless in-Ear – Bluetooth 5.3 Hi-Fi Stereo Deep Bass Wireless Headphones Noise Cancelling CVC Wireless Earbuds 35 Hours Playtime 13 mm Driver Earphones Waterproof USB C

Bunnings Tests AI Innovations to Improve Operations for 55,000 Staff


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AI Evolution at Bunnings

Brief Overview

  • Bunnings is utilizing AI to gain insights into and develop its workforce of 55,000 staff members.
  • Investment in Workday technology has increased significantly, providing new AI tools like the Skills Cloud.
  • AI is intended to establish clearer career paths and enhance employee retention.
  • Additional resources such as Talent Optimization and HiredScore aid in strategic recruitment.
  • AI chatbots have been introduced for operational inquiries, transitioning Bunnings’ culture towards self-service.

AI-Driven Workforce Development at Bunnings

Bunnings is adopting artificial intelligence (AI) to transform the management and understanding of its large workforce of 55,000 employees. This initiative aims to promote career growth and retain skilled individuals by providing clearer career paths within the organization.

Bunnings investigates AI to enhance employee management

Committing to Technological Progress

At a recent Workday Elevate summit, Jeff Rodway, Bunnings’ Head of Remuneration, People Systems, and Services, emphasized the company’s dedication to a “significant technology evolution” in its people and culture operations. This includes a major boost in investment in Workday, effectively doubling the array of AI tools available.

Central to this movement is the Workday Skills Cloud, driven by AI technology dubbed ‘Illuminate’. While still in its developmental phase, it has already produced promising outcomes in pilot initiatives.

Improving Employee Engagement

Bunnings is leveraging methods like Talent Optimization and HiredScore to ensure current employees are aligned with available positions and to cultivate talent pools for upcoming opportunities. This strategy is anticipated to greatly lessen the time and expenses linked to external recruitment.

Future objectives include incorporating advanced analytical tools such as People Analytics and Prism Analytics to provide deeper insights into the workforce, facilitating data-informed decision-making.

The Rollout of AI Chatbots

Beyond backend solutions, Bunnings is deploying AI chatbots to support employees with operational inquiries. This initiative represents a cultural shift towards self-service, empowering employees to seek information autonomously instead of depending on conventional interpersonal interactions.

Rodway acknowledges that while this transition is considerable, the ultimate aim is to boost operational efficiency and productivity via AI. The emphasis continues to be on fostering a more inclusive atmosphere and making informed management choices.

Conclusion

Bunnings is leading the way in incorporating AI technology into its operations, focusing on enhancing employee development and retention. Through strategic investments in platforms like Workday, Bunnings is improving its recruitment processes while cultivating a culture of innovation and self-service.

Q: What is the primary aim of Bunnings’ AI initiative?

A: The main goal is to better understand and develop the workforce, establishing career pathways and enhancing employee retention.

Q: How is Bunnings employing AI to improve its recruitment process?

A: Bunnings is utilizing resources like Talent Optimization and HiredScore to align current employees with available roles, decreasing the reliance on external hiring.

Q: What impact are AI chatbots having at Bunnings?

A: AI chatbots are transitioning the organizational culture towards self-service, enabling employees to address operational questions independently.

Q: What impact will AI have on Bunnings’ management strategies?

A: AI will facilitate more data-driven and inclusive management strategies, aimed at minimizing hiring times and enhancing operational efficiency.