Blog - Page 9 of 254 - Techbest - Top Tech Reviews In Australia

Powell Bluetooth Translator Earphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Powell Bluetooth Translator Earphones, Wireless Earbuds with Charging Box, Multifunctional Control, USB-C, Clear Sound, Black

German Intelligence Agency Warns Citizens of Russian APT28 Cyber Espionage Danger


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Espionage Alert: APT28 Targeting Global Infrastructure

Quick Overview

  • The Russian hacking group APT28 is executing cyberattacks on a worldwide basis.
  • Vulnerable TP-Link routers are being infiltrated to monitor vital targets.
  • The Federal Office for the Protection of the Constitution (BfV) has raised an alert in conjunction with international partners.
  • APT28 is associated with Russia’s military intelligence agency, GRU.
  • Past assaults in Germany have targeted the parliament and significant institutions.

APT28 Cyber Espionage: A Worldwide Threat

The Federal Office for the Protection of the Constitution (BfV) has issued a serious alert concerning cyberattacks carried out by the Russian state-associated hacker collective known as APT28. Often identified as “Fancy Bear,” APT28 has been linked to numerous prominent cyber espionage incidents.

German intelligence agency cautions against Russian cyber espionage threat from APT28

Exploiting Weaknesses in TP-Link Routers

APT28 has been taking advantage of security flaws in TP-Link internet routers to carry out espionage operations against military, governmental, and vital infrastructure entities. The BfV, in cooperation with Germany’s foreign intelligence agency, BND, and the US FBI, has detected thousands of compromised routers globally, with around 30 located in Germany.

Worldwide Consequences and Historical Incidents

The group’s actions are linked to Russia’s military intelligence agency, the GRU, heightening concerns about state-sponsored cybersecurity threats. In the past, APT28 has targeted Germany’s parliament, the centre-left SPD political faction, and air traffic control agencies, showcasing its ability to disrupt essential national services.

Conclusion

The espionage operations conducted by APT28 represent substantial risks to global safety, with compromised routers utilized to extract confidential information from important targets. International collaboration is essential in addressing these dangers and protecting critical infrastructure.

Q: What is APT28?

A: APT28, commonly known as “Fancy Bear,” is a hacking group associated with Russia’s military intelligence agency, GRU, recognized for its cyber espionage missions.

Q: What are the targets of APT28?

A: Targets of APT28 include military, governmental, and critical infrastructure sectors globally, utilizing infiltrated TP-Link routers to gather intelligence.

Q: How has Germany reacted to these cyber intrusions?

A: Germany’s BfV has released a public warning in collaboration with international partners, including the BND and US FBI, to alert and lessen the impact of APT28’s operations.

Q: What actions can be taken to guard against such cyber threats?

A: Keeping router firmware updated, applying strong security measures, and fostering international cooperation are vital strategies for protection against these cyber threats.

Q: Has APT28 engaged in similar activities previously?

A: Yes, APT28 has previously executed cyberattacks on Germany’s parliament and other significant institutions, illustrating a record of high-profile espionage efforts.

Q: Why is global cooperation crucial in combating cyber threats?

A: Cyber threats frequently cross international borders, making global collaboration vital for sharing intelligence, resources, and methods to effectively tackle these challenges.

Wireless Earbuds IPX7 Waterproof Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bluetooth Headphones, Wireless Bluetooth HiFi Stereo Sound, in-Ear Earphones with HD Microphone, Wireless Earbuds IPX7 Waterproof, Wireless Headphones 30 Hours Playtime, Touch Control for iPhone

Meta Introduces Revolutionary AI Model Developed by Superintelligence Team


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Meta’s Muse Spark AI Model: Advancing Superintelligence

Meta introduces Muse Spark AI model from superintelligence team

Brief Overview

  • Meta reveals Muse Spark, an innovative AI model from its superintelligence team.
  • The model is integral to Meta’s ambition to reclaim its AI dominance.
  • Initially launch on Meta AI application and website.
  • Future plans to incorporate Muse Spark into WhatsApp, Instagram, and Facebook chatbots.
  • Muse Spark is set to challenge AI leaders like Google and OpenAI.
  • Meta hints at future monetisation strategies through AI-based shopping features.

Meta’s Bold Move in AI

Meta Platforms has officially released Muse Spark, the first artificial intelligence model from its newly established superintelligence team. This action is part of Meta’s proactive approach to rival AI powerhouses such as Google and OpenAI, following a substantial US$14.3 billion ($20.3 billion) investment and strategic hires including Scale AI CEO Alex Wang.

The Muse Spark Model

Muse Spark is the first in a lineup of models, internally referred to as Avocado, aimed at revitalising Meta’s AI functions. Initially, this model will be available exclusively via the Meta AI app and website, with plans to transition from the Llama models that currently power chatbots on major platforms like WhatsApp and Instagram.

Evaluation and Performance

Although Meta has not revealed Muse Spark’s size, external assessments suggest its competitive capabilities. It demonstrates strong performance in language and visual comprehension, yet it falls short in coding and abstract reasoning. The model has secured fourth place on an AI testing index compiled by Artificial Analysis.

Future Vision: Plans Ahead

Meta CEO Mark Zuckerberg has voiced optimism regarding the model’s prospects, highlighting continuous enhancements. The company intends to launch larger iterations of Muse Spark and incorporate monetisation features via AI-enhanced shopping functionalities. These initiatives are aimed at boosting user engagement within Meta’s ecosystem.

Improved User Experience

Muse Spark is tailored to assist users with daily tasks, such as estimating caloric intake from a meal photograph or visualising a product within a home environment. The addition of a Contemplating Mode, which facilitates concurrent agent operation, heightens its reasoning abilities, akin to Google’s Gemini Deep Think and OpenAI’s GPT Pro.

Conclusion

The launch of Muse Spark by Meta signifies an important advance in its AI trajectory, endeavouring to reclaim its competitive vitality. With substantial funding and strategic foresight, Meta is ready to harness AI advancements to boost user interaction and pursue fresh monetisation opportunities.

Q: What is Muse Spark?

A: Muse Spark is Meta’s new AI model from its superintelligence team, crafted to contend with premier AI technologies.

Q: Where can Muse Spark be accessed?

A: Muse Spark is currently available on the Meta AI app and website.

Q: How does Muse Spark stack up against other AI models?

A: Muse Spark performs notably in language and visual understanding but shows weaknesses in coding and abstract reasoning.

Q: What are Meta’s intentions for Muse Spark?

A: Meta is planning to incorporate Muse Spark into its platforms and develop larger versions for extended applications and monetisation.

Q: What functionalities does Muse Spark provide?

A: Muse Spark features include calorie estimation from images and product visualisation, along with a Contemplating Mode for improved reasoning.

Q: How does Meta aim to monetise Muse Spark?

A: Meta plans to integrate AI-based shopping features within its platforms, guiding users to purchase items directly.

Unlock Complimentary MCA Access with Your NFTs!


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • The Museum of Contemporary Art Australia is now allowing NFTs for entry fees.
  • This unique offer is active from 13 to 27 April 2026 during the Data Dreams exhibition.
  • 95 tickets are on offer, representing the 95% of NFTs considered without financial value.
  • The Data Dreams exhibition highlights the contribution of AI to contemporary art.
  • It provides an insightful perspective on the relationship between technology and value.

Transforming Digital Fragments into Cultural Treasure

The Museum of Contemporary Art Australia (MCA) is ingeniously reinventing NFTs through its new program. By permitting NFTs as payment for entry to the Data Dreams: Art and AI exhibition, the MCA grants Australians the opportunity to exchange digital remnants for enriching cultural encounters. This initiative is innovative and serves as a commentary on the fleeting nature of digital art’s worth.

How to Trade Your NFT for Entry

From 13 to 27 April 2026, NFT owners may trade their digital possessions for entry tickets. The method is simple: visit the admissions desk, express your desire to pay with NFTs, and send the asset to the MCA’s designated wallet address. The museum welcomes NFTs from any blockchain, ensuring accessibility for all digital asset collectors.

What Awaits You at Data Dreams

Data Dreams: Art and AI is a pioneering exhibition that highlights AI’s creative capabilities. It features pieces like Fabien Giraud’s The Feral, an AI-generated film spanning a millennium, and Angie Abdilla’s Meditation on Country, which merges Indigenous wisdom with scientific exploration. Kate Crawford and Vladan Joler’s Anatomy of an AI System critically examines the framework underlying AI technologies.

A Thorough Exploration of the Machine Mind

The exhibition addresses intricate subjects, including the environmental effects of AI and the concealed human labor that supports technological systems. Trevor Paglen’s Adversarially Evolved Hallucinations and Hito Steyerl’s Mechanical Kurds question societal perceptions of surveillance and the role of AI.

Details to Note

Although NFTs can grant you entry, they will not be incorporated into the MCA’s collection. Rather, they serve a promotional function, blending digital and physical art experiences. Standard tickets are available for purchase, and MCA members, along with those under 18, can enter free of charge. Supported by Destination NSW, Data Dreams is a key event in the Sydney International Art Series.

Recap

The MCA’s initiative allowing NFT-for-entry is an intelligent convergence of technology and art, offering a new perspective on the significance of digital assets in a cultural framework. The Data Dreams exhibition encourages viewers to investigate the influence of AI on art, prompting reflection on the promises and realities of technology.

Q&A

Q: What is the duration of the NFT entry offer?

A: The offer is available from 13 April to 27 April 2026.

Q: Which blockchains are allowed for NFT entry?

A: The MCA accepts NFTs from any blockchain.

Q: How many tickets can I obtain through the NFT offer?

A: There are 95 tickets available, representing the 95% of NFTs now viewed as worthless.

Q: What is the central theme of the Data Dreams exhibition?

A: The exhibition investigates the convergence of art, technology, and value, with a particular focus on AI’s influence in contemporary art.

Q: Will my NFT become part of the MCA’s permanent collection?

A: No, the NFTs are only utilized for promotional objectives during this initiative.

Q: Are there alternative options for entry to the exhibition?

A: Yes, regular tickets can be purchased, and entry is free for both MCA members and guests aged 18 and younger.

Q: Is there a limitation on the number of NFTs I can use for entry?

A: The offer is restricted to one NFT per admission, with a total of 95 tickets available.

Bewinner Wireless Earbuds Gaming Earphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bewinner Wireless Earbuds Gaming Earphones, BT 5.2 Noise Cancelling Sports Earbuds with Mic, Cool Light Effects, Headphones with Charging Case for Gamer, Mobile Phone (Black)

FBI Acts: Remote Update of Personal Routers to Remove Russian GRU Spies


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

FBI’s Tactical Move: Remote Router Updates to Combat Russian Cyber Espionage

Brief Overview

  • The FBI executed remote patches on thousands of routers without the owners’ prior awareness.
  • Operation Masquerade focused on eliminating Russian GRU’s harmful DNS resolvers.
  • Devices from TP-Link and Mikrotik were compromised by Russian agents.
  • The FBI maintained normal operations of routers while eliminating threats.
  • Similar remote-update methods were previously implemented in 2021.
  • Security agencies recommend updating firmware and altering default credentials.
  • TP-Link disputes allegations of Chinese government influence.

Operation Masquerade: A Collaborative Initiative

The US Federal Bureau of Investigation (FBI) recently undertook an extraordinary measure by remotely updating thousands of privately held home and small office routers. This initiative was part of Operation Masquerade, a court-sanctioned effort aimed at removing Russian military intelligence agents, designated as GRU, from affected routers. These agents had been secretly capturing passwords and authentication tokens, creating a significant security risk.

FBI's remote router updates to combat Russian GRU espionage

Technical Implementation and Outcomes

Announced by the US Department of Justice (DoJ) and FBI, the operation entailed dispatching specific commands to previously compromised routers. These commands aimed to gather evidence of GRU activity and eradicate the harmful DNS resolvers they had installed. Russian intelligence operatives exploited weaknesses in routers to redirect user traffic to data-snatching sites.

The FBI utilized similar remote access techniques to substitute the malicious resolvers with legitimate ones managed by internet service providers. The operation was meticulously tested to confirm it did not disrupt the routers’ standard functionality. Users can undo changes by performing a factory reset on their routers.

The Fancy Bear Threat

The DoJ linked these Russian intrusions to a group identified as Fancy Bear, also known as Forest Blizzard, Sofacy, and APT 28. This group has a track record of exploiting TP-Link routers worldwide, modifying DNS configurations to reroute traffic to Russian-operated servers. The operation, labeled FrostArmada by Lumen’s Black Lotus Labs, affected over 18,000 routers across 120 nations.

Security Recommendations

Security professionals suggest several protective strategies for users, including applying firmware updates, checking DNS resolver configurations, and changing default device passwords. Additionally, disabling remote management interfaces accessible from the Internet is recommended to prevent future incidents.

TP-Link and the Global Router Industry

TP-Link, a significant entity in the home router market, found itself at the center of these breaches. Although the US Federal Communications Commission has announced a prohibition on importing new foreign-manufactured consumer routers due to security issues, TP-Link has defended its standing, claiming it has no affiliations with the Chinese government.

Conclusion

The FBI’s Operation Masquerade signifies a crucial advancement in combating cyber espionage conducted by Russian military intelligence. Through strategic remote updates, the FBI has managed to dismantle malicious set-ups without disrupting regular router operations. The initiative underscores the necessity of maintaining current security protocols and the continual fight against worldwide cyber threats.

Q&A

Q: How was the FBI able to remotely update routers without owner permission?

A: The FBI received court authorization, enabling them to send specific commands to compromised routers as part of Operation Masquerade.

Q: What vulnerabilities did Russian GRU take advantage of?

A: GRU exploited authentication bypass vulnerabilities to modify DNS settings in routers from TP-Link and Mikrotik, redirecting traffic to harmful sites.

Q: Can users revert the modifications made by the FBI?

A: Yes, users can revert the FBI’s changes by performing a factory reset on their routers.

Q: What steps can router owners take for self-protection?

A: Owners should apply firmware updates, check DNS resolver settings, change default passwords, and disable exposed remote management interfaces.

Q: How extensive was the GRU’s operation?

A: The FrostArmada campaign impacted over 18,000 routers across 120 countries, targeting both consumer devices and organizations.

Q: What is TP-Link’s perspective on the matter?

A: TP-Link has indicated that it has no connection to the Chinese government and is dedicated to preserving its reputation.

Defunc True Wireless Earbuds True Basic IPX4 Waterproof in-Ear Headphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Defunc True Wireless Earbuds True Basic IPX4 Waterproof in-Ear Headphones 5.0 Bluetooth Stereo Headphones Built-in Microphone, Automatic One-Step Pairing, Long Playtime & Charging Case (Blue)

Microsoft States New Windows Recall Bypass Is Not a Security Vulnerability


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Addresses Security Issues Related to Windows Recall Bypass

Microsoft Counters Windows Recall Security Concerns

Microsoft denies security flaw in Windows Recall bypass

Quick Overview

  • Microsoft defends the Recall feature in Windows 11 against purported security vulnerabilities.
  • Researcher Alexander Hagenah showcases a newly discovered bypass technique.
  • Microsoft asserts that this method functions within the security framework of Recall.
  • Recall integrates robust encryption and biometric verification mechanisms.
  • The security issues concern the vulnerability of the AIXHost.exe process.
  • Microsoft reasserts that there is no possibility of direct access to snapshots or encryption keys.

Context of Recall’s Security Apprehensions

Recall, an AI-enhanced capability in Windows 11, allows users to locate content on their devices, including sensitive information such as screenshots and browsing history. It came under fire in 2024 when researcher Alexander Hagenah uncovered weaknesses that permitted data extraction from an unprotected database. Microsoft halted the feature’s rollout and redesigned it, reintroducing it in April 2025.

Recent Bypass Discovery

Hagenah has recently pinpointed another vulnerability in the revamped Recall, claiming it enables complete content extraction from the AI tool’s SQLite database. This bypass occurs through the AIXHost.exe process, which lacks specific security restrictions and safeguards.

Microsoft’s Reaction

Microsoft disputes the notion that the bypass represents a security flaw, claiming it conforms to Recall’s established security schema. The corporation emphasizes its architectural design, which prevents any processes external to Virtualisation-Based Security (VBS) Enclaves from directly accessing encryption keys or snapshots.

Technical Perspectives

Recall’s security improvements comprise VBS enclaves, AES-256-GCM encryption, and Windows Hello authentication. Nonetheless, the AIXHost.exe process, essential for displaying the Recall timeline, operates beyond these secure enclaves, making it vulnerable to code injections without elevated privileges.

Conclusion

Microsoft asserts that the reported bypass concerning the Windows Recall utility does not constitute a security vulnerability, as it remains within the confines of the existing security architecture. In spite of concerns raised by researcher Alexander Hagenah, Microsoft reassures users that its infrastructure effectively curtails potential data leaks.

Q&A: Responding to Reader Queries

Q: What does the Windows Recall utility do?

A: Recall is an AI-powered feature in Windows 11 that aids users in searching and managing content, including screenshots and web history, on their devices.

Q: What was the newly identified vulnerability?

A: Researcher Alexander Hagenah discovered a technique to extract data from Recall’s SQLite database by taking advantage of the AIXHost.exe process, which has insufficient security protections.

Q: How has Microsoft reacted to the security concerns?

A: Microsoft maintains that the bypass is consistent with Recall’s documented security framework and does not constitute a security flaw, as it necessitates local user access and operates within existing protective measures.

Q: What safeguards are implemented for Recall?

A: Recall utilizes VBS enclaves, AES-256-GCM encryption, and Windows Hello biometric authentication to protect user information.

Q: Are there any dangers to users from this bypass?

A: Microsoft states that the bypass necessitates local access and functions within the outlined security framework, indicating minimal risk to users under typical circumstances.

Sennheiser TV Clear Earphones Review


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Sennheiser TV Clear Earphones, Wireless TV Headphones with Voice Intelligibility and Noise Cancellation, Ideal for Bluetooth-Enabled TVs, Without Transmitter