Australia Tech News - Techbest - Top Tech Reviews In Australia

Anthropic Introduces Groundbreaking AI Cybersecurity Project


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Anthropic AI Cybersecurity Effort

Quick Overview

  • Anthropic collaborates with leading tech firms to strengthen AI cybersecurity.
  • Project Glasswing rolls out “Claude Mythos Preview” for cybersecurity functions.
  • Partners involve Amazon, Microsoft, Apple, CrowdStrike, among others.
  • The initiative’s goal is to detect weaknesses in software systems.
  • Anthropic has allocated over $143 million in usage credits and contributions.
  • Discussions with the US government about AI capabilities are ongoing.

Collaborations with Tech Leaders

Anthropic has announced a fresh AI cybersecurity initiative through alliances with prominent technology corporations such as Amazon, Microsoft, and Apple. This collaboration enables select entities to test an enhanced AI model termed “Claude Mythos Preview” for cybersecurity defense.

Collaboration in Anthropic AI cybersecurity initiative with tech leaders

Project Glasswing

As part of “Project Glasswing,” organizations will utilize the forthcoming AI model for cybersecurity tasks. Participants in this initiative include not just Amazon, Microsoft, and Apple, but also CrowdStrike, Palo Alto Networks, Google, and Nvidia. This project aspires to significantly improve the cybersecurity sector by harnessing AI to uncover vulnerabilities across diverse software systems.

Effect on the Cybersecurity Sector

The announcement follows a report suggesting that Anthropic’s Claude Mythos could introduce security threats while providing advanced functionalities. This has influenced the stock values of cybersecurity firms such as Palo Alto Networks and CrowdStrike. At the latest RSA cybersecurity conference, the focus was on AI-driven cyberattacks and the adequacy of conventional security measures.

Dedication to Security and Cooperation

Anthropic disclosed in a blog entry that the Claude Mythos Preview has already pinpointed thousands of vulnerabilities in operating systems, web browsers, and other software applications. The company is broadening access to about 40 more organizations tasked with essential software infrastructure, paired with a substantial commitment of up to US$100 million (A$143 million) in usage credits and US$4 million in contributions to open-source security organizations.

Upcoming Prospects and Government Partnerships

Ongoing conversations between Anthropic and the US government underscore the promise and capabilities of their AI model. The primary aim is for users to securely implement Mythos-class models at scale. This initiative arises after prior instances where hackers took advantage of weaknesses in Anthropic’s Claude AI, impacting several international organizations. A recent study by IBM and Palo Alto Networks found that 67% of surveyed executives experienced AI-centric attacks in the previous year.

Conclusion

The new AI cybersecurity initiative from Anthropic is poised to reshape the industry by utilizing AI to identify and rectify software vulnerabilities. Through collaboration with prominent technology firms, the project seeks to bolster defensive cybersecurity strategies while promoting cooperation and innovation in the field. With major financial commitments and ongoing discussions with governmental bodies, Anthropic is establishing itself as a leader in AI-driven cybersecurity solutions.

Q: What is Project Glasswing?

A: Project Glasswing is an initiative by Anthropic allowing selected organizations to employ an advanced AI model dubbed “Claude Mythos Preview” for defensive cybersecurity tasks.

Q: Which major companies are part of this initiative?

A: The initiative involves major technology firms like Amazon, Microsoft, Apple, CrowdStrike, Palo Alto Networks, Google, and Nvidia.

Q: What are the main goals of the initiative?

A: The primary goals include enhancing cybersecurity by identifying software system vulnerabilities and facilitating the secure deployment of Mythos-class models at scale.

Q: What financial commitments has Anthropic made?

A: Anthropic has promised up to US$100 million (A$143 million) in usage credits and US$4 million in contributions to open-source security organizations.

Q: Has the Claude Mythos Preview shown effectiveness thus far?

A: Yes, the Claude Mythos Preview has discovered thousands of vulnerabilities across various software systems, highlighting its efficacy in improving cybersecurity.

Q: What is the importance of Anthropic’s discussions with the US government?

A: These discussions emphasize the potential impact and functionalities of Anthropic’s AI model, along with its alignment with government cybersecurity priorities.

Rest Super Enhances Employee Access to IT, HR, and Information


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Rest Super utilizes ServiceNow to improve employee access to HR and IT services.
  • The platform makes compliance with prudential regulations CPS 230 and CPS 234 more manageable.
  • AI and automation are essential for Rest Super’s operational transformation.
  • ServiceNow’s reusable models speed up application deployment and enhance the user experience.
  • Rest Super’s workforce expanded from 200 to 1100 employees within five years, indicating its growth.

Rest Super’s Evolution

Rest Super has initiated a major transformation, employing ServiceNow as a key platform to optimize employee access to IT, HR, and relevant information. This effort corresponds with Rest Super’s increase from 200 to 1100 employees over five years, underscoring its emphasis on growth and operational effectiveness.

Leveraging ServiceNow for Efficiency

ServiceNow acts as a ‘gateway’ for employees, streamlining access to information and organizational functions. Initially focused on IT service and operations management, the platform’s capabilities have broadened to cover integrated risk management and HR service delivery.

Compliance and Risk Oversight

Rest Super’s dedication to integrated risk management is in line with compliance initiatives concerning prudential standards CPS 230 and CPS 234. ServiceNow simplifies compliance documentation and oversight, thus lightening administrative responsibilities.

Accelerated Deployment and User Engagement

Applications developed on ServiceNow gain from reusable frameworks, allowing for quicker deployment and fostering user engagement. This groundwork has streamlined processes, assisting employees in effectively interacting with IT and HR services.

Adopting AI and Automation

Rest Super is investigating AI and automation to promote additional operational enhancements. A newly formed center of excellence backs this initiative, advocating for a grassroots method to AI integration and the examination of use cases.

Conclusion

Rest Super’s implementation of ServiceNow signifies a strategic approach to boost operational efficiency and compliance. With an emphasis on growth and innovation, the organization is poised to harness AI and automation during its ongoing transformation.

Q: What is the main aim of Rest Super’s transformation?

A: The main aim is to enhance employee access to IT and HR services while improving compliance and operational efficiency.

Q: How does ServiceNow enhance Rest Super’s operations?

A: ServiceNow streamlines access to information and service engagement, alleviates compliance pressures, and accelerates application deployment.

Q: What is the significance of AI in Rest Super’s strategy?

A: AI is used to innovate and enhance operational processes, focusing on practical use case exploration within the organization.

Q: How has the employee count at Rest Super changed lately?

A: Rest Super has increased its workforce from 200 to 1100, underscoring its notable growth and scaling initiatives.

Q: How does ServiceNow facilitate compliance obligations?

A: It simplifies the tracking and reporting of compliance with standards such as CPS 230 and CPS 234, minimizing administrative duties.

Q: What does the ‘gateway’ concept introduced by ServiceNow mean?

A: The ‘gateway’ concept offers a centralized access point for employees to interact with IT, HR, and other organizational resources.

Citigroup Leverages AI to Speed Up Account Openings and System Enhancements


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Citigroup’s AI Transformation in Banking

Brief Overview

  • Citigroup is implementing AI to boost productivity and optimize workflows.
  • AI has decreased document processing duration for account openings from one hour to just 15 minutes.
  • The bank aims to cut down on IT contractors, targeting a reduction to 20% by substituting them with in-house personnel.
  • Citigroup’s technological workforce currently encompasses 50,000 members.
  • AI solutions are being crafted and rolled out for uniform application throughout the organization.

AI: A Revolutionary Force in Banking

To enhance productivity and modernize its operations, Citigroup is adopting artificial intelligence (AI). The bank’s technology leader, Tim Ryan, has detailed how AI is reshaping the approach Citigroup takes towards account openings and system upgrades. Through the use of AI, Citigroup seeks to enhance its efficiency and streamline its operations.

Citigroup employs AI to accelerate account openings and modernize systems

The Influence of AI on Account Openings

AI technology has dramatically shortened the time needed for document processing in account openings. What used to take an hour can now be accomplished in just 15 minutes, showcasing the significant efficiency that AI introduces to banking operations. This progress is part of Citigroup’s larger initiative to phase out outdated software and improve customer interactions.

Moving from Contractors to In-House Teams

Citigroup is reforming its technology workforce strategy by lessening its dependence on outside IT contractors. A year prior, contractors made up roughly 50% of the bank’s tech workforce. The objective is to reduce this to 20%, and the bank is already on track to achieve this goal. This shift is in line with Citigroup’s aim to invest more in its own workforce, including plans to recruit thousands of software developers.

Adhering to Regulations and Managing Risks

Citigroup’s heightened investment in technology is also motivated by the need for regulatory compliance. Following consent orders from the Federal Reserve and the Office of the Comptroller of the Currency, Citigroup has a mandate to strengthen its risk management protocols and rectify regulatory data discrepancies. AI is key in fulfilling these compliance requirements by automating and refining processes.

AI Implementation Across Citigroup

Citigroup is prioritizing the deployment of standardized AI tools throughout its operations. This includes automating client and employee onboarding processes as well as fine-tuning “know your customer” regulations. The bank’s goal is to optimize its internal workflows and ensure a unified application of AI technology across the organization.

Conclusion

Citigroup’s integration of AI is redefining its operations, from expediting account openings to minimizing reliance on contractors. By concentrating on internal talent and regulatory adherence, Citigroup is positioning itself at the pinnacle of tech innovation in the banking industry. This strategic evolution not only improves productivity but also aligns with wider industry movements towards AI-based solutions.

Q: In what way has AI influenced account opening procedures at Citigroup?

A: AI has cut down document processing time from one hour to a mere 15 minutes, significantly improving efficiency.

Q: What is Citigroup’s plan for its technology workforce?

A: Citigroup’s plan is to lower its dependence on IT contractors to 20% and bolster its internal tech team.

Q: What drives Citigroup’s investment in AI technology?

A: The push for productivity enhancements and the need to comply with regulatory standards fuel investments in AI.

Q: How does AI contribute to regulatory compliance at Citigroup?

A: AI automates tasks to reinforce risk management practices and address data inaccuracies, thereby meeting regulatory obligations.

Q: Which processes is Citigroup automating with AI?

A: Citigroup is using AI to automate client and employee onboarding processes, as well as to refine “know your customer” policies.

German Intelligence Agency Warns Citizens of Russian APT28 Cyber Espionage Danger


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Espionage Alert: APT28 Targeting Global Infrastructure

Quick Overview

  • The Russian hacking group APT28 is executing cyberattacks on a worldwide basis.
  • Vulnerable TP-Link routers are being infiltrated to monitor vital targets.
  • The Federal Office for the Protection of the Constitution (BfV) has raised an alert in conjunction with international partners.
  • APT28 is associated with Russia’s military intelligence agency, GRU.
  • Past assaults in Germany have targeted the parliament and significant institutions.

APT28 Cyber Espionage: A Worldwide Threat

The Federal Office for the Protection of the Constitution (BfV) has issued a serious alert concerning cyberattacks carried out by the Russian state-associated hacker collective known as APT28. Often identified as “Fancy Bear,” APT28 has been linked to numerous prominent cyber espionage incidents.

German intelligence agency cautions against Russian cyber espionage threat from APT28

Exploiting Weaknesses in TP-Link Routers

APT28 has been taking advantage of security flaws in TP-Link internet routers to carry out espionage operations against military, governmental, and vital infrastructure entities. The BfV, in cooperation with Germany’s foreign intelligence agency, BND, and the US FBI, has detected thousands of compromised routers globally, with around 30 located in Germany.

Worldwide Consequences and Historical Incidents

The group’s actions are linked to Russia’s military intelligence agency, the GRU, heightening concerns about state-sponsored cybersecurity threats. In the past, APT28 has targeted Germany’s parliament, the centre-left SPD political faction, and air traffic control agencies, showcasing its ability to disrupt essential national services.

Conclusion

The espionage operations conducted by APT28 represent substantial risks to global safety, with compromised routers utilized to extract confidential information from important targets. International collaboration is essential in addressing these dangers and protecting critical infrastructure.

Q: What is APT28?

A: APT28, commonly known as “Fancy Bear,” is a hacking group associated with Russia’s military intelligence agency, GRU, recognized for its cyber espionage missions.

Q: What are the targets of APT28?

A: Targets of APT28 include military, governmental, and critical infrastructure sectors globally, utilizing infiltrated TP-Link routers to gather intelligence.

Q: How has Germany reacted to these cyber intrusions?

A: Germany’s BfV has released a public warning in collaboration with international partners, including the BND and US FBI, to alert and lessen the impact of APT28’s operations.

Q: What actions can be taken to guard against such cyber threats?

A: Keeping router firmware updated, applying strong security measures, and fostering international cooperation are vital strategies for protection against these cyber threats.

Q: Has APT28 engaged in similar activities previously?

A: Yes, APT28 has previously executed cyberattacks on Germany’s parliament and other significant institutions, illustrating a record of high-profile espionage efforts.

Q: Why is global cooperation crucial in combating cyber threats?

A: Cyber threats frequently cross international borders, making global collaboration vital for sharing intelligence, resources, and methods to effectively tackle these challenges.

Meta Introduces Revolutionary AI Model Developed by Superintelligence Team


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Meta’s Muse Spark AI Model: Advancing Superintelligence

Meta introduces Muse Spark AI model from superintelligence team

Brief Overview

  • Meta reveals Muse Spark, an innovative AI model from its superintelligence team.
  • The model is integral to Meta’s ambition to reclaim its AI dominance.
  • Initially launch on Meta AI application and website.
  • Future plans to incorporate Muse Spark into WhatsApp, Instagram, and Facebook chatbots.
  • Muse Spark is set to challenge AI leaders like Google and OpenAI.
  • Meta hints at future monetisation strategies through AI-based shopping features.

Meta’s Bold Move in AI

Meta Platforms has officially released Muse Spark, the first artificial intelligence model from its newly established superintelligence team. This action is part of Meta’s proactive approach to rival AI powerhouses such as Google and OpenAI, following a substantial US$14.3 billion ($20.3 billion) investment and strategic hires including Scale AI CEO Alex Wang.

The Muse Spark Model

Muse Spark is the first in a lineup of models, internally referred to as Avocado, aimed at revitalising Meta’s AI functions. Initially, this model will be available exclusively via the Meta AI app and website, with plans to transition from the Llama models that currently power chatbots on major platforms like WhatsApp and Instagram.

Evaluation and Performance

Although Meta has not revealed Muse Spark’s size, external assessments suggest its competitive capabilities. It demonstrates strong performance in language and visual comprehension, yet it falls short in coding and abstract reasoning. The model has secured fourth place on an AI testing index compiled by Artificial Analysis.

Future Vision: Plans Ahead

Meta CEO Mark Zuckerberg has voiced optimism regarding the model’s prospects, highlighting continuous enhancements. The company intends to launch larger iterations of Muse Spark and incorporate monetisation features via AI-enhanced shopping functionalities. These initiatives are aimed at boosting user engagement within Meta’s ecosystem.

Improved User Experience

Muse Spark is tailored to assist users with daily tasks, such as estimating caloric intake from a meal photograph or visualising a product within a home environment. The addition of a Contemplating Mode, which facilitates concurrent agent operation, heightens its reasoning abilities, akin to Google’s Gemini Deep Think and OpenAI’s GPT Pro.

Conclusion

The launch of Muse Spark by Meta signifies an important advance in its AI trajectory, endeavouring to reclaim its competitive vitality. With substantial funding and strategic foresight, Meta is ready to harness AI advancements to boost user interaction and pursue fresh monetisation opportunities.

Q: What is Muse Spark?

A: Muse Spark is Meta’s new AI model from its superintelligence team, crafted to contend with premier AI technologies.

Q: Where can Muse Spark be accessed?

A: Muse Spark is currently available on the Meta AI app and website.

Q: How does Muse Spark stack up against other AI models?

A: Muse Spark performs notably in language and visual understanding but shows weaknesses in coding and abstract reasoning.

Q: What are Meta’s intentions for Muse Spark?

A: Meta is planning to incorporate Muse Spark into its platforms and develop larger versions for extended applications and monetisation.

Q: What functionalities does Muse Spark provide?

A: Muse Spark features include calorie estimation from images and product visualisation, along with a Contemplating Mode for improved reasoning.

Q: How does Meta aim to monetise Muse Spark?

A: Meta plans to integrate AI-based shopping features within its platforms, guiding users to purchase items directly.

Unlock Complimentary MCA Access with Your NFTs!


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • The Museum of Contemporary Art Australia is now allowing NFTs for entry fees.
  • This unique offer is active from 13 to 27 April 2026 during the Data Dreams exhibition.
  • 95 tickets are on offer, representing the 95% of NFTs considered without financial value.
  • The Data Dreams exhibition highlights the contribution of AI to contemporary art.
  • It provides an insightful perspective on the relationship between technology and value.

Transforming Digital Fragments into Cultural Treasure

The Museum of Contemporary Art Australia (MCA) is ingeniously reinventing NFTs through its new program. By permitting NFTs as payment for entry to the Data Dreams: Art and AI exhibition, the MCA grants Australians the opportunity to exchange digital remnants for enriching cultural encounters. This initiative is innovative and serves as a commentary on the fleeting nature of digital art’s worth.

How to Trade Your NFT for Entry

From 13 to 27 April 2026, NFT owners may trade their digital possessions for entry tickets. The method is simple: visit the admissions desk, express your desire to pay with NFTs, and send the asset to the MCA’s designated wallet address. The museum welcomes NFTs from any blockchain, ensuring accessibility for all digital asset collectors.

What Awaits You at Data Dreams

Data Dreams: Art and AI is a pioneering exhibition that highlights AI’s creative capabilities. It features pieces like Fabien Giraud’s The Feral, an AI-generated film spanning a millennium, and Angie Abdilla’s Meditation on Country, which merges Indigenous wisdom with scientific exploration. Kate Crawford and Vladan Joler’s Anatomy of an AI System critically examines the framework underlying AI technologies.

A Thorough Exploration of the Machine Mind

The exhibition addresses intricate subjects, including the environmental effects of AI and the concealed human labor that supports technological systems. Trevor Paglen’s Adversarially Evolved Hallucinations and Hito Steyerl’s Mechanical Kurds question societal perceptions of surveillance and the role of AI.

Details to Note

Although NFTs can grant you entry, they will not be incorporated into the MCA’s collection. Rather, they serve a promotional function, blending digital and physical art experiences. Standard tickets are available for purchase, and MCA members, along with those under 18, can enter free of charge. Supported by Destination NSW, Data Dreams is a key event in the Sydney International Art Series.

Recap

The MCA’s initiative allowing NFT-for-entry is an intelligent convergence of technology and art, offering a new perspective on the significance of digital assets in a cultural framework. The Data Dreams exhibition encourages viewers to investigate the influence of AI on art, prompting reflection on the promises and realities of technology.

Q&A

Q: What is the duration of the NFT entry offer?

A: The offer is available from 13 April to 27 April 2026.

Q: Which blockchains are allowed for NFT entry?

A: The MCA accepts NFTs from any blockchain.

Q: How many tickets can I obtain through the NFT offer?

A: There are 95 tickets available, representing the 95% of NFTs now viewed as worthless.

Q: What is the central theme of the Data Dreams exhibition?

A: The exhibition investigates the convergence of art, technology, and value, with a particular focus on AI’s influence in contemporary art.

Q: Will my NFT become part of the MCA’s permanent collection?

A: No, the NFTs are only utilized for promotional objectives during this initiative.

Q: Are there alternative options for entry to the exhibition?

A: Yes, regular tickets can be purchased, and entry is free for both MCA members and guests aged 18 and younger.

Q: Is there a limitation on the number of NFTs I can use for entry?

A: The offer is restricted to one NFT per admission, with a total of 95 tickets available.

FBI Acts: Remote Update of Personal Routers to Remove Russian GRU Spies


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

FBI’s Tactical Move: Remote Router Updates to Combat Russian Cyber Espionage

Brief Overview

  • The FBI executed remote patches on thousands of routers without the owners’ prior awareness.
  • Operation Masquerade focused on eliminating Russian GRU’s harmful DNS resolvers.
  • Devices from TP-Link and Mikrotik were compromised by Russian agents.
  • The FBI maintained normal operations of routers while eliminating threats.
  • Similar remote-update methods were previously implemented in 2021.
  • Security agencies recommend updating firmware and altering default credentials.
  • TP-Link disputes allegations of Chinese government influence.

Operation Masquerade: A Collaborative Initiative

The US Federal Bureau of Investigation (FBI) recently undertook an extraordinary measure by remotely updating thousands of privately held home and small office routers. This initiative was part of Operation Masquerade, a court-sanctioned effort aimed at removing Russian military intelligence agents, designated as GRU, from affected routers. These agents had been secretly capturing passwords and authentication tokens, creating a significant security risk.

FBI's remote router updates to combat Russian GRU espionage

Technical Implementation and Outcomes

Announced by the US Department of Justice (DoJ) and FBI, the operation entailed dispatching specific commands to previously compromised routers. These commands aimed to gather evidence of GRU activity and eradicate the harmful DNS resolvers they had installed. Russian intelligence operatives exploited weaknesses in routers to redirect user traffic to data-snatching sites.

The FBI utilized similar remote access techniques to substitute the malicious resolvers with legitimate ones managed by internet service providers. The operation was meticulously tested to confirm it did not disrupt the routers’ standard functionality. Users can undo changes by performing a factory reset on their routers.

The Fancy Bear Threat

The DoJ linked these Russian intrusions to a group identified as Fancy Bear, also known as Forest Blizzard, Sofacy, and APT 28. This group has a track record of exploiting TP-Link routers worldwide, modifying DNS configurations to reroute traffic to Russian-operated servers. The operation, labeled FrostArmada by Lumen’s Black Lotus Labs, affected over 18,000 routers across 120 nations.

Security Recommendations

Security professionals suggest several protective strategies for users, including applying firmware updates, checking DNS resolver configurations, and changing default device passwords. Additionally, disabling remote management interfaces accessible from the Internet is recommended to prevent future incidents.

TP-Link and the Global Router Industry

TP-Link, a significant entity in the home router market, found itself at the center of these breaches. Although the US Federal Communications Commission has announced a prohibition on importing new foreign-manufactured consumer routers due to security issues, TP-Link has defended its standing, claiming it has no affiliations with the Chinese government.

Conclusion

The FBI’s Operation Masquerade signifies a crucial advancement in combating cyber espionage conducted by Russian military intelligence. Through strategic remote updates, the FBI has managed to dismantle malicious set-ups without disrupting regular router operations. The initiative underscores the necessity of maintaining current security protocols and the continual fight against worldwide cyber threats.

Q&A

Q: How was the FBI able to remotely update routers without owner permission?

A: The FBI received court authorization, enabling them to send specific commands to compromised routers as part of Operation Masquerade.

Q: What vulnerabilities did Russian GRU take advantage of?

A: GRU exploited authentication bypass vulnerabilities to modify DNS settings in routers from TP-Link and Mikrotik, redirecting traffic to harmful sites.

Q: Can users revert the modifications made by the FBI?

A: Yes, users can revert the FBI’s changes by performing a factory reset on their routers.

Q: What steps can router owners take for self-protection?

A: Owners should apply firmware updates, check DNS resolver settings, change default passwords, and disable exposed remote management interfaces.

Q: How extensive was the GRU’s operation?

A: The FrostArmada campaign impacted over 18,000 routers across 120 countries, targeting both consumer devices and organizations.

Q: What is TP-Link’s perspective on the matter?

A: TP-Link has indicated that it has no connection to the Chinese government and is dedicated to preserving its reputation.

Microsoft States New Windows Recall Bypass Is Not a Security Vulnerability


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Addresses Security Issues Related to Windows Recall Bypass

Microsoft Counters Windows Recall Security Concerns

Microsoft denies security flaw in Windows Recall bypass

Quick Overview

  • Microsoft defends the Recall feature in Windows 11 against purported security vulnerabilities.
  • Researcher Alexander Hagenah showcases a newly discovered bypass technique.
  • Microsoft asserts that this method functions within the security framework of Recall.
  • Recall integrates robust encryption and biometric verification mechanisms.
  • The security issues concern the vulnerability of the AIXHost.exe process.
  • Microsoft reasserts that there is no possibility of direct access to snapshots or encryption keys.

Context of Recall’s Security Apprehensions

Recall, an AI-enhanced capability in Windows 11, allows users to locate content on their devices, including sensitive information such as screenshots and browsing history. It came under fire in 2024 when researcher Alexander Hagenah uncovered weaknesses that permitted data extraction from an unprotected database. Microsoft halted the feature’s rollout and redesigned it, reintroducing it in April 2025.

Recent Bypass Discovery

Hagenah has recently pinpointed another vulnerability in the revamped Recall, claiming it enables complete content extraction from the AI tool’s SQLite database. This bypass occurs through the AIXHost.exe process, which lacks specific security restrictions and safeguards.

Microsoft’s Reaction

Microsoft disputes the notion that the bypass represents a security flaw, claiming it conforms to Recall’s established security schema. The corporation emphasizes its architectural design, which prevents any processes external to Virtualisation-Based Security (VBS) Enclaves from directly accessing encryption keys or snapshots.

Technical Perspectives

Recall’s security improvements comprise VBS enclaves, AES-256-GCM encryption, and Windows Hello authentication. Nonetheless, the AIXHost.exe process, essential for displaying the Recall timeline, operates beyond these secure enclaves, making it vulnerable to code injections without elevated privileges.

Conclusion

Microsoft asserts that the reported bypass concerning the Windows Recall utility does not constitute a security vulnerability, as it remains within the confines of the existing security architecture. In spite of concerns raised by researcher Alexander Hagenah, Microsoft reassures users that its infrastructure effectively curtails potential data leaks.

Q&A: Responding to Reader Queries

Q: What does the Windows Recall utility do?

A: Recall is an AI-powered feature in Windows 11 that aids users in searching and managing content, including screenshots and web history, on their devices.

Q: What was the newly identified vulnerability?

A: Researcher Alexander Hagenah discovered a technique to extract data from Recall’s SQLite database by taking advantage of the AIXHost.exe process, which has insufficient security protections.

Q: How has Microsoft reacted to the security concerns?

A: Microsoft maintains that the bypass is consistent with Recall’s documented security framework and does not constitute a security flaw, as it necessitates local user access and operates within existing protective measures.

Q: What safeguards are implemented for Recall?

A: Recall utilizes VBS enclaves, AES-256-GCM encryption, and Windows Hello biometric authentication to protect user information.

Q: Are there any dangers to users from this bypass?

A: Microsoft states that the bypass necessitates local access and functions within the outlined security framework, indicating minimal risk to users under typical circumstances.

Bendigo Bank Dismisses Requests to Reveal Outsourcing’s Effects on Employees


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Scrutiny on Bendigo Bank’s Outsourcing Choices

Quick Overview

  • Bendigo Bank is under pressure to reveal potential job reductions linked to outsourcing agreements.
  • The Finance Sector Union (FSU) projects impacts could affect nearly 1000 workers.
  • Collaborations with Infosys and Genpact are likely to affect IT and business functionalities.
  • Wider consequences expected across different departments such as agribusiness and customer service.
  • Outsourcing aligns with a broader shift among Australian banks towards AI and offshoring.

Outsourcing Agreements at Bendigo Bank

Bendigo and Adelaide Bank have recently engaged in two major outsourcing contracts, a seven-year arrangement with Infosys and a six-year agreement with Genpact, intended to boost their IT service provision and streamline processes. These collaborations are anticipated to impact several teams, although the bank has not clarified the complete scope of the changes.

Concerns and Responses from the Union

The Finance Sector Union (FSU) has voiced its worries regarding potential job cuts resulting from these outsourcing arrangements, estimating the effects could reach up to 1000 employees. The union’s efforts to obtain comprehensive details from the bank have been unsuccessful, escalating tensions.

Wider Consequences Across Departments

The FSU foresees the effects of these agreements extending beyond technology teams, impacting a broad array of operations, including agribusiness, lending, and customer service activities, among others. This extensive impact underscores the bank’s strategic pivot towards technological efficiency.

Transition to Technological Efficiency

Reflecting patterns observed in the Australian banking landscape, Bendigo Bank is prioritizing operational enhancements through technology integration. The bank’s focus on AI and process optimization corresponds with its earlier partnership with Google Cloud for Gemini AI solutions.

Summary

Bendigo Bank’s outsourcing to Infosys and Genpact has sparked substantial worries regarding job security. The lack of transparency has faced criticism from the Finance Sector Union, emphasizing a larger industry transition towards AI and offshoring to achieve operational efficiency.

Questions & Answers

Q: What are the significant concerns regarding Bendigo Bank’s outsourcing agreements?

A: The main concerns revolve around possible job reductions, with projections indicating effects on nearly 1000 employees across various departments.

Q: Which firms has Bendigo Bank partnered with for these outsourcing initiatives?

A: Bendigo Bank has joined forces with Infosys and Genpact for enhancements in IT service provision and process streamlining.

Q: How is the Finance Sector Union reacting to these agreements?

A: The FSU is demanding clarity on job impacts, raising alarms over the potential scale of job losses and broader operational consequences.

Q: Are other Australian banks adopting similar outsourcing and AI trends?

A: Indeed, other institutions like NAB and ANZ have also implemented job cuts and made changes to their technology operations, reflecting a trend towards AI and offshoring.

Q: What significance does AI hold in Bendigo Bank’s outsourcing strategy?

A: AI plays a crucial role, with Bendigo aiming for improvements in processes and operations, potentially utilizing AI technology from its collaboration with Google Cloud.

Bendigo Bank Progresses IT Revamp with Collaborations from Infosys and Genpact


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Bendigo Bank’s IT Evolution with Infosys and Genpact

Quick Summary

  • Bendigo Bank enters into a seven-year IT agreement with Infosys and a six-year contract with Genpact.
  • The partnerships are aimed at advancing IT service delivery and enhancing processes.
  • Changes to the workforce are anticipated, affecting both technology and business teams.
  • Bendigo Bank pledges to manage transitions thoughtfully and with dignity.

Revolutionary IT Collaborations

Bendigo and Adelaide Bank has initiated a major transformation of its technology operations, ushering in a new phase through its strategic alliances with Infosys and Genpact. The agreements, lasting seven and six years respectively, are poised to instigate considerable alterations within the bank’s IT framework.

Bendigo Bank IT evolution with Infosys and Genpact

Effects on Staffing

The bank has recognised that these collaborations will affect its technology and business sectors, although precise information on the degree of impact has not been revealed. CEO Richard Fennell emphasises the necessity of approaching these changes with compassion, acknowledging the difficult time for affected employees.

Infosys: Boosting IT Competencies

With the new agreement, Infosys is tasked with significantly enhancing Bendigo Bank’s IT service delivery. The partnership aims to bolster the bank’s skills in software development and artificial intelligence, fields in which Infosys has already shown significant proficiency.

Genpact: Improving Processes

Genpact, recognised for its capabilities in digital transformation, will concentrate on process improvement and delivery. This partnership is anticipated to elevate productivity and enhance risk management, aligning with Bendigo Bank’s strategic goals.

Conclusion

The partnerships between Bendigo and Adelaide Bank with Infosys and Genpact signify a transformative era in technology. While adjustments to the workforce are expected, the bank is dedicated to managing these shifts thoughtfully. The alliances are set to foster sophisticated IT service delivery and process improvement, laying a strong groundwork for future expansion.

FAQs

Q: What prompted Bendigo Bank to collaborate with Infosys and Genpact?

A: The partnerships seek to enhance IT service delivery, improve capabilities, and streamline processes, preparing the bank for prospective growth.

Q: What will be the impact of these partnerships on the bank’s workforce?

A: Workforce adjustments are anticipated, affecting technology and business teams, though specific details are still to be determined.

Q: What is Infosys’s role in the bank’s transformation?

A: Infosys will focus on improving IT service delivery and providing expertise in software development and artificial intelligence.

Q: How will Genpact contribute to Bendigo Bank?

A: Genpact will apply its expertise in process improvement and delivery, aiming to enhance productivity and strengthen risk management.

Q: What is the duration of the contracts with Infosys and Genpact?

A: The contract with Infosys is for seven years, and the agreement with Genpact is for six years.

Q: How does Bendigo Bank plan to manage workforce changes?

A: The bank is committed to managing transitions sensitively and respectfully, recognising the difficulties faced by impacted employees.