National Archives Identifies Four Critical Areas for AI Attention


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

National Archives Identifies Essential Areas for AI Attention

Quick Overview

  • The National Archives of Australia is prepared to implement AI across its operations.
  • AI testing is anticipated to wrap up by late 2026.
  • Primary AI focus areas: transcription, data description, access assessment, and search and discovery.
  • AI aligns with Strategy 2025-2030 for enhanced collection management.
  • $67 million funding received in 2021 for cyber security and record digitalization.

AI in Transcription

The initial area of focus for the National Archives is transcription. By converting digital records into text files, AI could greatly improve searchability, translation, and overall accessibility. This initiative aims to make Australia’s historical documents more available to the general public and researchers.

National Archives investigating AI for transcription and metadata administration

Improving Data Description

Enhancing metadata for records is another key focus. AI could assist in generating summaries, tagging, biometric identification, and image recognition. These developments are set to streamline data management and ensure records are reliably categorized and easily accessible.

Access Assessment

AI will also be employed for “access assessment” to evaluate data against exemption criteria specified in the Archives Act 1983 (Cth). This involves tools for peer evaluation, guardrail support, and keyword identification, ensuring sensitive data is managed appropriately.

Search and Discovery Enhancements

The potential influence of AI on the ‘search and discovery’ of digital media is profound. By evaluating AI models with publicly available records, the Archives intends to improve user engagement with their extensive collection, simplifying the process of finding relevant documents.

Conclusion

The National Archives of Australia is adopting AI technology to better manage its continuously expanding collection of digital records. By concentrating on transcription, data description, access assessment, and search enhancements, the Archives aims to boost accessibility and efficiently maintain its historical documents. Supported by significant government funding, these projects align with their Strategy 2025-2030 plan, intending to provide enriched access to Australia’s rich historical heritage.

Q&A Session

Q: When is the expected completion year for AI trials?

A: The AI trials are projected to conclude by the end of 2026.

Q: In what way will AI enhance transcription processes?

A: AI will transform digital records into text files, improving searchability, translation, and accessibility.

Q: What does data description entail in this context?

A: It encompasses creating and updating metadata for records, with AI aiding in summaries, tagging, and image recognition.

Q: How is AI utilized in access assessment?

A: AI tools will assess data against exemption criteria, facilitating peer review and keyword identification.

Q: What funding has the National Archives secured for these efforts?

A: In 2021, the Archives received $67 million from the federal government to improve cybersecurity and digitize records.

Q: How does AI support the Strategy 2025-2030 plan?

A: AI initiatives are in alignment with the plan’s objectives to enhance collection management and public access to records.

“Pixnapping Vulnerability Permits Android Applications to Capture 2FA Codes in Merely 30 Seconds”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Pixnapping Vulnerability: A Risk to Android Security

Brief Overview

  • Pixnapping permits harmful Android applications to swipe data without system permissions.
  • 2FA codes from Google Authenticator can be retrieved in under 30 seconds.
  • This flaw impacts Google Pixel models 6 through 9 but does not affect the Samsung Galaxy S25.
  • Pixnapping takes advantage of GPU.zip, a side-channel vulnerability in graphics processing.
  • Google has released a patch, with further updates anticipated in December.
  • Pixnapping’s source code will be made available on GitHub after the patch is implemented.

Pixnapping: An Emerging Security Concern for Android Users

Pixnapping exploit enables Android apps to rapidly access 2FA codes

What is Pixnapping?

Researchers have disclosed a novel attack named Pixnapping, which allows malicious Android applications to extract sensitive information from different apps without requiring any system permissions. This attack has been successfully demonstrated on Google Pixel devices, pulling 2FA codes from Google Authenticator in less than 30 seconds, along with data from applications like Signal and Gmail.

Device Vulnerability

Tests were executed on Google Pixel 6 through 9 models and the Samsung Galaxy S25. While Pixnapping was effective on Pixel devices, the Samsung Galaxy S25 remained secure due to elevated noise levels, illustrating the differences in device vulnerability.

Mechanism Behind Pixnapping

Pixnapping bypasses Android’s permission system by manipulating the graphical rendering mechanism to push sensitive pixels through graphics operations, leveraging the GPU.zip vulnerability. This tactic facilitates the extraction of pixel data, which can subsequently be reconstructed to obtain sensitive details like 2FA codes and emails.

Google’s Action and Future Updates

Google responded to the vulnerability by restricting blurring operations on applications, but researchers swiftly identified a workaround. Google plans to release more patches in December, emphasizing the continuous effort to secure Android devices against such threats.

Conclusion

Pixnapping poses a considerable security risk for Android users, showcasing how inventive exploitation of system APIs can circumvent standard security protocols. While Google has initiated efforts to address this vulnerability, users should remain alert and promptly update their devices to lessen potential dangers.

Q: What is Pixnapping?

A:

Pixnapping is a security flaw that enables malicious Android applications to pilfer sensitive information from other applications without requiring system permissions.

Q: How does Pixnapping operate?

A:

Pixnapping exploits Android’s rendering system to extract pixel data, utilizing the GPU.zip vulnerability to reveal sensitive information such as 2FA codes and emails.

Q: Which devices are impacted by Pixnapping?

A:

The vulnerability was effectively tested on Google Pixel models 6 to 9 but did not impact the Samsung Galaxy S25.

Q: Has Google taken steps to address the Pixnapping vulnerability?

A:

Google has released a patch to mitigate the issue, with additional updates expected in December to offer a more thorough solution.

Q: How can users safeguard against Pixnapping?

A:

Users are encouraged to promptly install Android updates and patches as they become available to defend against vulnerabilities like Pixnapping.

Q: Will Pixnapping have an impact on other platforms such as iOS?

A:

Currently, researchers have not explored the potential for similar attacks on iOS or alternative mobile platforms.

4 Key Tips for Taking Breathtaking Starry Night and Milky Way Images with Your Smartphone


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Select a premium smartphone with manual camera options for astrophotography.
  • Play around with ISO settings and exposure durations to achieve remarkable images of the night sky.
  • Use a tripod for steady long-exposure photography.
  • Pick a location far from light sources to reduce light pollution for clearer images of the stars.

The Ideal Smartphone

To take remarkable photos of starry nights and the Milky Way with your smartphone, begin with a solid mid-range or high-end device that possesses an excellent rear camera and a superior image sensor. Make sure the camera application supports manual adjustments like custom ISO settings and delayed shutter release. For instance, the Oppo Reno13 Pro 5G is an excellent option for this task.

Smartphone suitable for night sky photography

Optimal Camera Configuration

Modifying your camera configurations is vital for capturing the night sky. Experiment with various ISO values and exposure time based on your surroundings and lunar brightness. Consider the following:

  • 15-30 second exposure durations
  • 3-second timer to avoid camera shake
  • ISO settings between 250-1600, keeping it as low as feasible to retain image clarity
  • Direct the camera at different sections of the sky and horizon for artistic captures

These settings can assist in capturing distinctive scenes such as light trails from trucks on highways or tree outlines against a star-filled backdrop.

Sample night sky image using a smartphone

Stabilizing Equipment

A stable foundation is crucial for long-exposure images. Investing in a tripod, such as the Joby Gorillapod, guarantees that your smartphone stays motionless, which reduces blurriness and improves image clarity. Opt for a lightweight tripod if your focus is primarily on smartphone photography.

Tripod for stable astrophotography

Choosing the Right Spot

Locating a dark area is arguably the most crucial element of night sky photography. Dark Sky Parks, such as Warrumbungle National Park in Coonabarabran, are perfect due to their limited light interference. Such places significantly enhance your opportunities to capture the splendor of the Milky Way and a multitude of stars.

Ideal dark site for astrophotography

Conclusion

To create stunning night sky photography with your smartphone, concentrate on having the proper equipment, modifying your camera configurations, utilizing a tripod, and selecting an area with minimal light interference. With these suggestions, your astrophotography abilities can elevate significantly.

FAQs

Q: What kind of smartphone is best for capturing the night sky?

A: A solid mid-range or high-end smartphone equipped with a quality rear camera and manual controls is ideal for photographing the night sky.

Q: What settings should I utilize for night sky shots?

A: Test ISO levels between 250-1600 and exposure intervals of 15-30 seconds. Employ a 3-second timer to avoid camera shaking.

Q: Why is a tripod important for photographing the night sky?

A: A tripod steadies your smartphone during prolonged exposures, minimizing motion blur and enhancing picture clarity.

Q: How can I determine the best location for night sky photography?

A: Opt for a site with minimal light pollution, like a Dark Sky Park, to achieve clearer photographs of the stars and the Milky Way.

Q: Is it possible to capture night sky photos without a tripod?

A: While it’s feasible, maintaining stability for long exposures without a tripod is difficult, leading to potential motion blur.

Q: What can I do to reduce noise in my night sky images?

A: Keep the ISO as low as you can while ensuring adequate light intake. Experiment with varying ISO and exposure configurations to balance brightness and noise.

Australia-wide Photo License Recognition System Debuting in 2025


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

National Photo Licence Recognition System to Debut Across Australia in 2025

Quick Overview

  • Australia is set to introduce the National Driver Licence Facial Recognition Solution by late 2025.
  • Integration with the federal government’s Face Verification Service (FVS) is planned.
  • Initial implementation will take place in Western Australia, with plans for expansion to private entities next year.
  • The system’s goal is to tackle identity fraud while enhancing secure service access.
  • New legislative measures have been passed to support this initiative.
Australia's national photo licence recognition system set to launch in 2025

Introduction to the National Driver Licence Facial Recognition Solution

The Australian government is prepared to launch the National Driver Licence Facial Recognition Solution (NDLFRS) by the conclusion of 2025. This project, which has been in development for nearly ten years, will enable Australians to confirm their identity utilizing state or territory driver’s licences via the federal government’s Face Verification Service (FVS).

Pathway to Implementation

The NDLFRS has been under development since 2017, when leaders from federal, state, and territory governments consented to establish a centralized database of biometric profiles derived from facial images. This initiative, part of the Department of Home Affairs’ Identity Matching Services (IDMS), is created to streamline the sharing and access of identity information among agencies.

Technological and Legal Framework

The NDLFRS was constructed using a commercial facial recognition system from Cognitec Systems and was initially operated by NTT Digital. In December 2022, Fujitsu secured a $37-million contract to manage the platform until June 2026. Recent legislative updates have laid the groundwork needed for the system’s deployment, with the Identity Verification Services Bill 2023 and the Identity Verification Services (Consequential Amendments) Bill taking effect in December 2024.

Deployment and State Involvement

Western Australia will spearhead the deployment by providing its licence data for verification through the FVS by the end of 2025. Other states, such as Victoria and Tasmania, are aligning with the new legislative requirements to ensure their participation. The Attorney-General’s Department is actively collaborating with other jurisdictions to enable a nationwide launch.

Protecting Privacy and Security

The Office of the Australian Information Commissioner advocates for the legislative structure and highlights the necessity for robust enforcement and supervision. Privacy violations by participating agencies are now subject to enforcement under the Privacy Act, safeguarding individuals’ data.

Conclusion

The National Driver Licence Facial Recognition Solution is designed to boost identity security throughout Australia by allowing biometric verification through state and territory driver’s licences. As the system comes into operation, it promises to address identity fraud and simplify access to services, with Western Australia taking the lead on the initial rollout.

Q: What is the National Driver Licence Facial Recognition Solution?

A: It is a system that enables Australians to authenticate their identity using driver’s licences through the federal government’s Face Verification Service.

Q: When will the system be launched?

A: The system is projected to be live by the end of 2025.

Q: Which state will be the first to implement this system?

A: Western Australia is set to be the first state to provide its licence data for verification.

Q: What advantages does this system offer?

A: The system is intended to enhance identity security, curb identity fraud, and facilitate secure service access.

Q: What legislative measures support the NDLFRS?

A: The Identity Verification Services Bill 2023 and the Identity Verification Services (Consequential Amendments) Bill establish the legal framework for the system.

Q: How is privacy ensured under this system?

A: Enforcements under the Privacy Act help protect against privacy breaches by participating agencies, ensuring data security.

Q: Who oversees the operation of the NDLFRS?

A: The management of the platform is under Fujitsu, with a contract that lasts until June 2026.

Microsoft tightens restrictions on exploited legacy IE mode in Edge browser


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Enhances Security in Edge’s Internet Explorer Mode

Brief Overview

  • Microsoft’s Edge browser encounters security issues due to its legacy IE mode.
  • Malicious actors utilize social engineering to circumvent security improvements.
  • Some websites still operate in IE mode, relying on obsolete technologies.
  • Microsoft eliminates critical access points for IE mode to bolster security.
  • Questions remain regarding the Chakra vulnerability patch within IE mode.

Context on Internet Explorer and Edge

Microsoft’s Edge browser, built on the open-source Chromium framework, signifies a major advancement from the now-retired Internet Explorer (IE). Even though IE officially reached end-of-life status in June 2022, its legacy mode continues to function within Edge to accommodate older technologies that certain sites depend on, such as Microsoft ActiveX and Adobe Flash.

Security Issues with IE Mode

Legacy IE mode in Edge remains an attractive target for cybercriminals due to its inadequate architecture when compared to contemporary browsers. In recent times, cybercriminals have deployed social engineering strategies to take advantage of vulnerabilities in IE mode, notably a zero-day exploit in the Chakra JavaScript engine, which allows them to perform remote code execution and possibly gain total control over a user’s device.

Microsoft’s Approach to Security Threats

In response to these security challenges, Microsoft’s Edge security team has removed major entry points for enabling IE mode, including the toolbar button and context menu. Users are now required to activate IE mode on a per-site basis, enhancing security by minimizing unintentional activation.

Current Situation and Future Considerations

Though these modifications signify a positive advancement in securing Edge, uncertainties linger regarding the complete resolution of the Chakra vulnerability. Organizations that depend on IE mode must remain alert and ensure they implement any forthcoming updates from Microsoft to safeguard their networks.

Microsoft restricts exploited legacy IE mode in Edge browser

Conclusion

Microsoft’s modifications to Edge’s legacy IE mode are intended to improve browser security by curtailing automatic access to this vulnerable feature. While this initiative fortifies defenses against recent exploit tactics, ongoing diligence and updates are essential for users dependent on IE mode for compatibility purposes.

Q: What led Microsoft to implement these changes to Edge?

A: The alterations were triggered by security threats targeting IE mode, especially through social engineering and vulnerabilities in the Chakra JavaScript engine.

Q: What is the new process for activating IE mode?

A: Users are now required to manually turn on IE mode for each site, lowering the likelihood of accidental activation and improving security.

Q: Has the Chakra vulnerability in IE mode been fixed?

A: It is still uncertain whether Microsoft has completely resolved the Chakra vulnerability, underscoring the necessity for continuous updates and supervision.

Q: Who continues to use IE mode, and why?

A: IE mode is utilized by websites and applications that depend on outdated technologies like ActiveX and Flash, often due to the challenges associated with updating older systems.

Q: What steps should enterprises take to ensure security while utilizing IE mode?

A: Enterprises ought to remain up-to-date on Microsoft releases and promptly apply them, while also considering a transition away from legacy technologies when feasible.

For additional information, check out TechBest.

Initial Impression: Gozney Dome (Gen 2) Pizza Oven – Our First Thoughts


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • The Gozney Dome (Gen 2) pizza oven features dual pizza cooking with various fuel alternatives.
  • 40% larger than the previous model, perfect for entertaining at home.
  • Conveniently assembled stand with collapsible sides for easy storage and mobility.
  • Digital temperature regulation for accurate cooking results.
  • Accessories included to broaden cooking possibilities.
  • Offered in two colors, priced at A$2,999.00.

Design

The Gozney Dome (Gen 2) eclipses the size of a typical mailbox delivery. Weighing between 90-100kg, it necessitates careful transport, ideally in a vehicle like a Ford Ranger. This oven serves as a permanent installation in a backyard, paired with a durable metal stand featuring wheels for easy relocation. The stand’s collapsible wooden sides provide space-efficient storage, while the oven’s domed structure and digital interface indicate a serious cooking device.

Performance

During three testing sessions, the Gozney Dome (Gen 2) showcased remarkable temperature management, quickly reaching 400 degrees Celsius. A standout feature is its ability to cook two pizzas at once, though attention is needed for heat distribution. Rotating the pizzas ensures uniform cooking, delivering the desired crispy crust while preventing burnt toppings.

Features

The oven includes a detachable digital screen with a USB-C charging port. The flame control starts easily with a AAA battery, and optional wood or charcoal fuels provide flexibility. The design incorporates side tables for additional storage, enhancing the cooking experience for users.

Accessories

The array of included accessories is extensive, ranging from a stand to pizza peels and cutters. The Dome Mantel and Arch enhance its usability, while the professional-grade pizza cutter adds refinement. Each accessory elevates the cooking experience, making it both enjoyable and effective.

Price and Availability

Available in Bone and Off Black, the Dome (Gen 2) is set to launch on October 15th, with delivery anticipated within 28-30 days. With a price of A$2,999.00, it caters to serious cooks and hosts, providing durability and quality that warrant the investment.

Overall

Following extensive use, the Gozney Dome (Gen 2) stands out for its design, performance, and included accessories. While the price may be a consideration for some, the oven offers culinary enjoyment and fosters a newfound appreciation for outdoor cooking.

Summary

The Gozney Dome (Gen 2) pizza oven is an excellent choice for home chefs, featuring a generous cooking area, a variety of fuel options, and an elegant design. Its sturdy build and thoughtful accessories make it a worthwhile investment for any outdoor kitchen, though its premium pricing reflects its exceptional quality and versatility.

Q: What fuel options are available for the Gozney Dome (Gen 2) pizza oven?

A: The oven allows for gas, wood, or charcoal, providing flexibility in cooking styles and flavors.

Q: How many pizzas can the Gozney Dome (Gen 2) cook at the same time?

A: It can bake two pizzas at once, making it perfect for entertaining.

Q: Is the oven easy to transport?

A: Yes, the stand is equipped with wheels, allowing for easy repositioning despite its weight.

Q: What is the cost of the Gozney Dome (Gen 2) pizza oven?

A: It retails for A$2,999.00, reflecting its high quality and feature set.

Q: How fast does the oven reach cooking temperature?

A: The oven can exceed 400 degrees Celsius in mere minutes when using gas.

Q: Are there extra accessories included with the oven?

A: Yes, it comes with a variety of accessories such as pizza peels, a cutter, and more.

Fivetran and dbt Labs Reveal Significant Merger in Data Industry


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fivetran and dbt Labs Merge: A Transformative Change in Data Infrastructure

Brief Overview

  • Fivetran and dbt Labs reveal a notable merger within the data industry.
  • The unified organization targets an annual revenue of US$600 million.
  • Merger executed as an all-equity arrangement; valuation to be determined by the market.
  • Recent valuations for Fivetran and dbt Labs were US$5.6 billion and US$4.2 billion, respectively.
  • Emphasis on open infrastructure and compatibility for AI initiatives.
  • Completion of the merger is anticipated within a year.

Merger Background

In a remarkable development in the data infrastructure space, Fivetran and dbt Labs have declared their intention to merge. This combination is expected to generate a powerful organization with projected annual revenue close to US$600 million (approximately $920 million AUD). The arrangement is structured as a complete stock exchange, with the market determining the valuation, as noted by Fivetran CEO George Fraser.

Valuation and Management

Fivetran’s last valuation was US$5.6 billion in September 2021, while dbt Labs secured a valuation of US$4.2 billion during its Series D round in February 2022. Both firms have common investors such as Andreessen Horowitz, showcasing their robust market stance. After the merger, George Fraser will remain CEO and dbt Labs CEO Tristan Handy will assume the position of co-founder and president.

Strategic Significance

This merger represents a significant consolidation within the data tooling landscape, as organizations seek to augment their infrastructure for AI functionalities. The emphasis is placed on open infrastructure and interoperability, essential for businesses that want to effectively utilize their data in AI contexts.

Synergistic Technologies

Based in Oakland, California, Fivetran specializes in automated data transfer, facilitating the flow of data into central data repositories. In contrast, dbt Labs, located in Philadelphia, provides dbt, an open-source tool aimed at data transformation and preparation. Fraser estimates that a large portion of Fivetran’s customer base already employs dbt’s solutions, highlighting the alignment between their services.

Merger of data companies Fivetran and dbt Labs

Outlook

The newly established company plans to uphold dbt Core, the widely-used open-source variant of dbt Labs’ software, according to its existing licensing agreement. The merger aims to build a comprehensive platform that addresses enterprises’ data requirements, paving the way for possible public listing opportunities, even though an IPO is not in the immediate plans.

Conclusion

The merger of Fivetran and dbt Labs signifies a crucial moment in the data infrastructure landscape, aspiring to improve AI-driven data solutions through their collective expertise. With a commitment to open infrastructure and interoperability, the newly formed entity is ideally situated to tackle the evolving demands of contemporary enterprises.

Q: What is the main motivation behind the merger of Fivetran and dbt Labs?

A: The merger seeks to unify their technologies and expertise to offer a more holistic data infrastructure solution, particularly aimed at facilitating AI applications.

Q: How is the merger financially structured?

A: The merger is conducted as a complete stock exchange, with its valuation influenced by market dynamics.

Q: Will there be changes in leadership after the merger?

A: Yes, George Fraser will remain as CEO, while Tristan Handy will take on the role of co-founder and president of the merged organization.

Q: What is the anticipated impact on current users of Fivetran and dbt Labs?

A: Current users are expected to gain from a more cohesive platform that integrates Fivetran’s data movement capabilities with dbt’s data transformation features.

Q: What are the long-term objectives for the merged organization?

A: The entity aims to enhance its platform for enterprise data requirements and may contemplate a public listing in the future, although an IPO is not presently on the agenda.

Google Asserts Australian Age Verification Legislation ‘Incredibly Challenging’ to Implement


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

  • Australia will be the first nation to prohibit social media usage for those under 16 years old.
  • Google cautions about challenges in enforcement and limited effects on child safety.
  • Platforms to estimate age through AI and behavioral data rather than direct verification.
  • YouTube, regarded as a video-sharing service, is encompassed by the law.
  • The modification is intended to tackle mental health issues associated with social media usage.

Australia’s Trailblazing Initiative on Social Media Regulations

Australia is preparing to be the first country globally to impose a prohibition on social media for individuals below 16 years. This significant initiative, motivated by increasing worries over social media’s effects on youth mental health, is part of the Online Safety Amendment ratified in November 2024. The law requires social media firms to close accounts of minors by December 10.

Concerns from Google

Google has expressed notable apprehensions concerning the enforceability of this regulation. At a parliamentary inquiry on online safety policies, Rachel Lord, YouTube’s senior government affairs manager in Australia, emphasized the risk of “unintended consequences” and questioned the law’s capacity to improve online safety for minors. Google believes that although the law is well-meant, it might not fulfill its intended goals.

Challenges in Age Verification

Instead of needing direct age verification, the Australian legislation instructs social media platforms to utilize artificial intelligence and behavioral analytics to infer users’ ages. This strategy poses distinct challenges and raises concerns about the dependability and precision of such inferred information. Google contends that genuinely effective laws should bolster industry initiatives to safeguard children online without hindering their access.

Google addresses obstacles of Australian age verification regulation

YouTube’s Position

Previously exempted from the law due to its educational significance, YouTube has now been incorporated following grievances from other technology firms. Google argues that YouTube functions as a video-sharing platform, not a social media site, complicating its inclusion in the new regulations. This differentiation is vital as it affects how the platform will handle compliance and enforce age restrictions.

Finding a Balance Between Safety and Access

Google supports a balanced strategy that merges effective legislation with empowering parents and children through safety resources. Instead of entirely restricting access, the emphasis should be on providing guardians with the necessary tools to manage their children’s online activities. As the world observes Australia’s execution of this law, its consequences may shape international policy on online safety.

Conclusion

Australia’s innovative law to limit social media access for those under 16 has ignited substantial discussion. While aspiring to shield young users, the law’s dependence on AI for age estimation and its broader ramifications remain contentious. As technology companies like Google navigate these complexities, global attention turns to the law’s effects on digital safety and governance.

Q: What is the primary objective of Australia’s social media restriction legislation?

A: The main aim is to safeguard the mental well-being of youth by reducing their exposure to social media platforms.

Q: How does Google perceive the enforceability of this regulation?

A: Google regards the law as “highly challenging” to enforce due to the difficulties in reliably inferring user age through AI and behavioral analytics.

Q: Why was YouTube included in the legislation?

A: Although initially exempt, YouTube was added after feedback from other tech companies, despite Google’s claim that it is a video-sharing platform.

Q: What alternative measures does Google advocate for online safety?

A: Google recommends improving online safety tools and empowering parents to steer their children’s digital engagements instead of fully restricting access.

Qantas Verifies That Cybercriminals Have Unveiled Customer Information


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Qantas Data Leak: Cybercriminals Compromise Customer Data

Brief Overview

  • Qantas has acknowledged a July data leak that revealed confidential customer data.
  • More than a million customers had personal information accessed; an additional four million’s identities, including names and emails, were compromised.
  • The leak is associated with an external platform, reportedly Salesforce.
  • The hacker collective known as Scattered Lapsus$ Hunters is accountable for the data exposure.
  • Qantas is collaborating with cybersecurity professionals to assess the situation.

Qantas Data Leak: What Occurred?

Qantas Airways has confirmed that customer information taken during a cyber incident in July has been exposed by cybercriminals. This incident stands as one of the largest in Australia, impacting over a million customers whose sensitive data such as phone numbers, birthdates, and residential addresses were accessed. Furthermore, an extra four million customers had their names and email information breached.

Qantas data leak reveals customer data

Information on the Leak

This cyber incident is the most notable since the 2022 breaches affecting Optus and Medibank, which resulted in the implementation of compulsory cyber resilience regulations in Australia. Qantas reported that the data was taken through a third-party service, generally identified as Salesforce, with cybercriminals utilizing social engineering methods to obtain access.

Actions and Inquiry

Qantas is joining forces with specialized cybersecurity professionals to determine what information was part of the exposure. The airline has also secured a court order to avert any further access to or publication of the compromised data by third parties.

The Cybercriminal Group

The hacking group Scattered Lapsus$ Hunters is responsible for the data exposure, which transpired after the group imposed a ransom deadline that was not fulfilled. This group is recognized for employing advanced cyber tactics to infiltrate corporate networks.

Conclusion

The Qantas data leak serves as a significant reminder of the weaknesses inherent in digital systems and the necessity for strong cybersecurity practices. As investigations proceed, both customers and businesses are encouraged to stay alert and revise security measures to safeguard sensitive data.

Q: How many customers were impacted by the leak?

A: Over one million customers had sensitive data accessed, while an additional four million had their names and emails compromised.

Q: Which platform was allegedly involved in the leak?

A: The breach is widely believed to involve Salesforce, where cybercriminals utilized social engineering strategies to gain entry.

Q: Who is accountable for the data exposure?

A: The hacker group Scattered Lapsus$ Hunters is responsible for the data exposure.

Q: How is Qantas addressing the leak?

A: Qantas is collaborating with cybersecurity specialists to investigate the incident and has obtained a court order to prevent further data exposure or distribution.

Q: What measures can customers take following the leak?

A: Customers are advised to monitor their accounts for unusual activities, update passwords, and remain cautious regarding phishing attempts.

Macquarie Bank Partners with Google Gemini


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Macquarie Bank Leads AI Integration with Google Gemini

Quick Overview

  • Macquarie Bank is the inaugural Australian bank to implement Google’s Gemini Enterprise.
  • 99% of staff have finished AI training, with goals for complete integration in six months.
  • Gemini Enterprise seeks to boost productivity and enterprise processes with AI solutions.
  • The platform provides no-code development for easy AI integration.
  • The fee for Gemini Enterprise starts at $US30 per seat per month.
  • Macquarie intends to create over 30 AI-enhanced products by 2025.

Macquarie Bank’s Strategic Embrace of AI

Macquarie Bank has revealed its intentions to adopt Google’s newly introduced business AI platform, Gemini Enterprise, positioning itself as the first significant Australian bank to make this move. This effort is in line with the bank’s steadfast commitment to utilise Google’s cloud solutions, a partnership that has strengthened since 2019.

Macquarie Bank collaborating with Google Gemini

The Functionality of Gemini Enterprise

Gemini Enterprise, which debuted in the US, signifies Google’s latest initiative in AI designed to enable the development of AI agents within large organizations. The platform’s no-code, application-neutral design allows companies to enhance productivity via intuitive interfaces.

Training and Integration for Employees

With the aim of embedding AI into everyday operations within six months, Macquarie Bank has achieved 99% of its workforce completing a generative AI training program. Furthermore, 3,000 employees have participated in presentations of Gemini Enterprise, highlighting the bank’s dedication to equipping its personnel for this tech transition.

Financial Considerations and Pricing

Although Macquarie Bank has not revealed the exact expenses related to the implementation of Gemini Enterprise, there are indications of a price starting at $US30 per seat per month. Targeted at smaller enterprises, Gemini Business is offered at $US21 per user per month.

Prospective Advances in AI

Macquarie Bank possesses ambitious objectives to create over 30 AI-enhanced products and services by 2025. These efforts are intended to provide improved customer features, a seamless experience, and more dependable services, ultimately leading to greater customer interaction.

Conclusion

Macquarie Bank’s alliance with Google Gemini signifies a major advancement in AI integration within the Australian banking landscape. By harnessing Gemini Enterprise, the bank aims to elevate productivity, streamline processes, and enhance customer experiences.

Q&A Section

Q: What is Gemini Enterprise?

A: Gemini Enterprise is Google’s AI platform designed for generating AI agents for large organisations using a no-code, application-neutral framework.

Q: How is Macquarie Bank getting its employees ready for AI integration?

A: The bank has provided generative AI training for 99% of its employees and conducted demonstrations of Gemini Enterprise for 3,000 staff members.

Q: What are the anticipated costs of using Gemini Enterprise?

A: While Macquarie Bank’s specific costs remain undisclosed, reports indicate that Gemini Enterprise starts at $US30 per month per seat.

Q: What future initiatives does Macquarie Bank have with AI?

A: The bank aims to develop more than 30 AI-augmented products and services by 2025 to boost customer engagement and enhance service quality.

Q: How does Gemini Enterprise benefit organizations?

A: It offers a straightforward method to develop AI agents that enhance productivity and operational efficiency, tailored to the needs of the organization.

Q: What distinguishes Gemini Business from Gemini Enterprise?

A: Gemini Business is a variant of the platform designed for smaller businesses, with a more affordable cost per user at $US21 per month.