Australia Tech News - Page 15 of 109 - Techbest - Top Tech Reviews In Australia

ABC Unveils Data Repository as Element of Governance Revamp


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • ABC integrates data via Snowflake’s data warehouse.
  • A project in three phases aims to improve data governance.
  • The initiative emphasizes accountability and defined responsibilities.
  • ABC’s data governance scheme includes foundation, enablement, and embedment stages.
  • More than 4000 employees have been educated on data governance.
  • Future objectives entail “data governance by design” and automation.

ABC’s Data Transformation Journey

The ABC implements data warehouse amid governance restructure

Alison Burgis with Guillaume Jaudouin, Altis Consulting, at Gartner Data & Analytics Summit

Altis Consulting

Embracing a Cloud-Based Platform

The Australian Broadcasting Corporation (ABC) has made a crucial advancement in its data management plan by adopting Snowflake’s cloud-based data warehouse. This decision is part of a three-phase project intended to operationalise ABC’s data governance and offer a comprehensive view of its essential data assets.

Tackling Data Governance Issues

Although ABC had a data governance framework established, it faced significant challenges concerning data discoverability, quality, and accountability. Data was kept across numerous isolated platforms, complicating management processes. Furthermore, unclear accountability and differing levels of data governance maturity were recognized as major obstacles.

Organized Method for Data Governance

ABC’s governance effort is organized into three phases: foundation, enablement, and embedment. The foundation phase laid the groundwork for essential frameworks and accountability models, including a data governance council and a hub-and-spoke data operating model. This model encompasses 18 data owners tasked with lifecycle management within their areas and 15 stewards who serve as data custodians.

Advancements and Looking Ahead

After 18 months, the program has achieved all goals, promoting a cultural transformation within ABC. With 4000 employees trained in data governance, the broadcaster is now prioritizing the integration of governance practices by design and investigating automation possibilities in data quality monitoring.

Summary

ABC’s integration of data into Snowflake’s cloud-based data warehouse is a crucial aspect of its data governance reform. This initiative seeks to address current data governance challenges by creating a structured framework and accountability models. As the program evolves, ABC continues to weave governance practices into its daily functions, with future plans focused on proactive quality management and automation.

Q&A Session

Q: What was the primary objective of ABC’s data governance initiative?

A: The main objective was to operationalise data governance by establishing a centralized view of ABC’s data assets and confirming accountability and clear responsibilities throughout the organization.

Q: What were the primary challenges encountered by ABC in data governance?

A: ABC faced challenges including data discoverability issues, extended time-to-insight, lack of accountability, and varying degrees of data governance maturity.

Q: How is ABC organized to manage data governance?

A: ABC utilizes a hub-and-spoke data operating model, featuring a central governance council and distributed accountability among 18 data owners and 15 stewards.

Q: What future strategies does ABC intend for its data governance?

A: ABC aims to incorporate “data governance by design” within its operations and seek automation opportunities in data quality monitoring and metadata management.

Q: How many staff members have been acquainted with data governance at ABC?

A: More than 4000 employees have completed tailored introductions to data governance.

Review: DJI Power Battery 2000 – The Essential Gadget for Content Creators in 2025


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • DJI’s Power 2000 is a portable, stackable battery with a capacity of 2048Wh and an output of 3kW.
  • Its expandable design permits a total capacity of up to 22,528 Wh by linking several units together.
  • Perfect for content creators, featuring 4 AC outlets, 4 USB-C, and 4 USB-A ports.
  • Notable features include weather resistance, mobile app integration, and extremely rapid charging.
  • Offered in Australia for A$2,409 with bundle options for additional accessories.

Construction

The DJI Power Expansion Battery 2000 showcases a robust, scratch-resistant grey casing, embodying DJI’s renowned aesthetic found in their drones and gimbals. With dimensions of 448.5 × 225 × 234 mm and a weight of 13kg, the battery centralizes all ports on one side for convenient access. Built-in handles improve its portability, and the stackable structure provides a flat surface on top, ideal for resting devices while they charge. The Power Series Hand Truck facilitates the secure transport of multiple stacked units, while the optional 200W solar panel enables environmentally-friendly charging.

Functionality

The Power 2000 consistently delivers a power output of 3kW, making it ideal for power-hungry devices. Its LFP cells ensure long-lasting dependability, with the ability to charge from 0-80% in just 45 minutes. It can recharge a mobile phone 144 times or supply power to a projector for 18 hours, fulfilling various device energy requirements.

Attributes

DJI’s Power 2000 includes several features:

  • Stackable Structure: Connect multiple units for greater capacity without additional footprint.
  • Water Resistance: An IP54 rating guarantees functionality in harsh Australian environments.
  • SDC Ports: Quick charging for DJI drones and accessories, enabling solar and car charging.
  • App Connectivity: Bluetooth and Wi-Fi connectivity for remote management and updates.
  • Rapid Recharge: Achieves 80% charge in 55 minutes, promoting sustainable energy usage.
  • High Power Output: Stable 3000 W AC output for demanding appliances.
  • Quiet Functioning: Operates at 23-30 dB, suitable for quiet indoor settings.
  • Expandable Capacity: Accommodate up to ten units for a substantial 22,528 Wh capacity.
  • Safety Mechanisms: Intelligent BMS ensures protection against overcharging, deep discharging, and temperature issues.
  • UPS Mode: Can serve as an uninterruptible power source for essential devices.

Challenges and Prospects

Despite the numerous strengths of the DJI Power 2000, there are areas that could be improved. The absence of direct vehicle charging capabilities without extra accessories is a limitation, and the fixed-height handle on the trolley may restrict transportation ease. Enhancements in these aspects could improve user satisfaction.

Cost and Accessibility

Priced at A$2,409 in Australia, the Power 2000 represents a considerable investment but delivers significant advantages for campers and content creators. Bundle options offer savings on accessories, accommodating a variety of requirements and circumstances.

Conclusion

The DJI Power 2000 stands out as a reliable choice for those requiring dependable, scalable power solutions. It is perfect for content creators and adventurers alike, providing vital features for contemporary power demands, making it a wise investment for prolonged usage.

Recap

The DJI Power 2000 battery system presents a high-capacity, stackable solution for a range of power requirements, with attributes such as quick charging, weather resistance, and mobile app connection. While certain drawbacks exist, its advantages render it a practical tool for both personal and professional applications in Australia.

Q: Is it possible for the DJI Power 2000 to charge an electric vehicle?

A: While it can technically provide power, you’ll need a separate accessory for vehicle charging, as it doesn’t include the required grounding.

Q: What is the total capacity when multiple units are stacked?

A: You can stack up to ten units for a cumulative capacity of 22,528 Wh.

Q: How much time is required to recharge the battery?

A: The Power 2000 can charge to 80% in 55 minutes with AC input.

Q: Is this battery appropriate for off-grid applications?

A: Yes, its weatherproof design, solar charging functionality, and high capacity make it well-suited for off-grid situations.

Q: Are discounts available for acquiring accessories?

A: Yes, combo deals provide savings when purchasing the battery along with certain accessories.

Q: Does it facilitate remote monitoring?

A: Yes, the DJI Home app allows for remote oversight and control via Bluetooth and Wi-Fi.

Ex-Intelligence Officer Sentenced for Bitcoin Robbery from Silk Road 2.0 Manager


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Ex-Intelligence Officer Sentenced in Bitcoin Theft Case

Ex-intelligence officer jailed for stealing bitcoin from Silk Road 2.0 operator

Quick Overview

  • Ex-NCA officer imprisoned for stealing cryptocurrency from the operator of Silk Road 2.0.
  • Paul Chowles misappropriated 50 bitcoin, valued at over £4 million today.
  • Chowles utilized Bitcoin Fog to disguise the transaction.
  • The NCA originally suspected Thomas White, the initial operator.
  • Bitcoin valued at nearly £470,000 confiscated from Chowles.

Context on Silk Road 2.0

The Silk Road 2.0 platform arose as a successor to the first Silk Road, providing a venue for illegal dealings, such as drug trade and other unlawful items, after the FBI dismantled its predecessor in 2013. The British National Crime Agency (NCA) took Thomas White into custody in 2014 during its probe into this dark web marketplace.

The Theft and Investigation

Paul Chowles, a NCA intelligence officer, took advantage of his role to pilfer 50 bitcoin from Thomas White’s “retirement wallet.” Chowles subsequently sought to mask the origin of the funds by employing a cryptocurrency mixing service named Bitcoin Fog. Despite these measures, Chowles was ultimately apprehended and charged with theft, transferring criminal property, and concealing criminal property.

Court Proceedings and Sentencing

Chowles was brought before Liverpool Crown Court and entered a guilty plea for all charges. The stolen bitcoin was initially estimated at just below £60,000 during the theft in 2017, but its current worth is over £4 million. Chowles managed to realize close to £145,000 from his illegal activities prior to his arrest in 2022.

NCA’s Reaction and Misconduct

The NCA terminated Chowles for gross misconduct following his guilty plea. Initially, the agency speculated that Thomas White, who was sentenced in 2019, had accessed the bitcoin wallet. This assumption was negated after further investigation revealed Chowles’ direct involvement through documentation found in his notebooks.

Financial Consequences

The NCA confiscated bitcoin valued at nearly £470,000 from Chowles. Furthermore, the agency retrieved and liquidated the remaining 47 bitcoin from White’s wallet, aiding in a £1.5 million confiscation order placed on White.

Conclusion

This case underscores the weaknesses within law enforcement agencies regarding the management of digital currencies and highlights the necessity for strict internal controls to avert similar misconduct. The effective prosecution and sentencing of Paul Chowles act as a deterrent to the misuse of authority by individuals in positions of trust.

Q&A

Q: What is Silk Road 2.0?

A: Silk Road 2.0 was an illegal dark web platform that enabled the trade of drugs and other prohibited goods, following the closure of the original Silk Road by the FBI in 2013.

Q: How was Paul Chowles apprehended?

A: Paul Chowles was apprehended after an investigation uncovered usernames and passwords associated with Thomas White’s cryptocurrency accounts in Chowles’ possession.

Q: What is Bitcoin Fog?

A: Bitcoin Fog is a cryptocurrency mixing service that obscures the origin of bitcoin transactions, making it challenging to trace the source of the funds.

Q: What was the verdict in this case?

A: Paul Chowles received a sentence of five and a half years in prison after pleading guilty to charges of theft, transferring criminal property, and concealing criminal property.

Q: What became of the stolen bitcoin?

A: The NCA confiscated bitcoin valued at nearly £470,000 from Chowles, while the remaining 47 bitcoin in White’s wallet were sold to help fulfill a confiscation order.

Netflix greenlights live-action interpretation of the renowned video game franchise Assassin’s Creed


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Netflix has officially approved a live-action version of Assassin’s Creed.
  • The series will delve into the grand struggle between two mysterious factions.
  • Roberto Patino and David Wiener serve as creators and executive producers.
  • Collaboration between Ubisoft and Netflix commenced in 2020.
  • No specifics on the release date or casting have been revealed yet.
  • Netflix also intends to launch Splinter Cell: Deathwatch in the autumn of Australia.

Netflix and Ubisoft: A Fresh Chapter for Assassin’s Creed

Netflix greenlights live-action Assassin's Creed series

The cherished video game series Assassin’s Creed is poised to come to life in an exciting new live-action adaptation, thanks to a partnership between Netflix and Ubisoft. Enthusiasts of the franchise can anticipate an in-depth exploration of the timeless struggle between factions contending for dominion over humanity.

Creators and Executive Team

Emmy nominees Roberto Patino and David Wiener are leading the project, drawing on their skills from renowned series such as DMZ, Westworld, and Sons of Anarchy. Their participation guarantees an adrenaline-filled drama and suspense.

Plot and Themes

This series will center on the covert war between two formidable groups: one aiming to dictate mankind’s future, while the other is dedicated to guarding free will. Anticipate a voyage through significant historical moments as characters clash to determine the course of humanity.

Partnership and Production

This adaptation signifies the inaugural series to arise from the collaboration unveiled in 2020 between Ubisoft and Netflix. Although fans have been looking forward to updates, information such as the release timeline and casting remains undisclosed.

Upcoming Releases

Alongside Assassin’s Creed, Netflix is also preparing to introduce Splinter Cell: Deathwatch this autumn in Australia, providing additional entertainment for fans of Ubisoft’s adaptations available on the platform.

Summary

Netflix’s live-action adaptation of Assassin’s Creed aims to embody the spirit of the beloved video game series, probing into enduring themes of authority, identity, and human relationships. With a skilled team in charge and a strategic alliance with Ubisoft, the series is set to intrigue both long-time fans and newcomers alike.

Q&A Session

Q: Who are the creators of the live-action Assassin’s Creed series?

A: Roberto Patino and David Wiener are the creators and executive producers.

Q: What is the primary theme of the Assassin’s Creed series?

A: The series examines the struggle between two factions: one aiming to control humanity and the other fighting for free will, all set against historical contexts.

Q: When was the partnership between Ubisoft and Netflix announced?

A: The partnership was made public in 2020.

Q: Are there any other Ubisoft adaptations set to debut on Netflix?

A: Yes, Netflix intends to release Splinter Cell: Deathwatch in the autumn of Australia.

Worldwide Operation Aims at Infamous NoName057(16) Cybercriminal Organization


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Worldwide Operation Targets NoName057(16) Cybercrime Collective

Quick Overview

  • Global operation focuses on NoName057(16) hacking collective.
  • Arrest warrants released in Germany and Spain.
  • More than 4000 volunteers involved in cyber attacks through Telegram.
  • Europol and various nations join forces.
  • Alleged ties to pro-Russian actions.

Worldwide Crackdown on NoName057(16) Cybercrime Collective

Global operation against NoName057(16) cybercrime collective

Arrest Warrants Issued in Germany and Spain

Germany and Spain have issued warrants for the arrest of seven individuals believed to be part of the pro-Russian hacking collective NoName057(16). This group is implicated in initiating cyber attacks targeting critical infrastructure, defense contractors, energy firms, and governmental bodies.

International Cooperation

The arrest warrants form part of a larger global operation involving law enforcement and judicial entities from the US, France, Sweden, Italy, the Netherlands, Switzerland, and coordinated by Europol. German prosecutors oversaw searches in 24 locations associated with the group, including areas in Berlin and Bavaria.

The Role of Volunteers and Telegram

NoName057(16) allegedly utilized the Telegram messaging platform to enlist over 4000 volunteers who aided in distributed denial of service (DDoS) assaults. These participants offered their systems to saturate the servers of vital institutions.

Historical Context and Motivations

In recent years, NoName057(16) has gained notoriety for promoting Russian interests, executing cyberattacks in Ukraine as well as against European governmental and infrastructure websites. The group’s actions are thought to aim at swaying political and social decisions in Germany by capturing media attention.

Global Initiatives Against Cyber Threats

Europol disclosed that volunteers were attracted through Russian platforms, chat groups, social media, and gaming communities. Italian authorities reported that sympathizers were provided with target lists and required software to take part in the assaults. The organization had a command structure based in Russia and employed a botnet to enhance attack effects.

Summary

The international initiative against NoName057(16) highlights the global endeavor to confront cybercrime and safeguard critical infrastructure from assaults. The operation emphasizes the threats posed by organized hacking entities and the necessity for ongoing vigilance and collaboration among nations.

Q&A

Q: What was the goal of the cyber attacks launched by NoName057(16)?

A: The attacks sought to attract media attention and influence political and social choices in Germany.

Q: How were volunteers enlisted for the attacks?

A: Volunteers were recruited through Telegram, Russian platforms, chat groups, social media, and gaming communities.

Q: Which countries participated in the operation against NoName057(16)?

A: The operation included Germany, Spain, the US, France, Sweden, Italy, the Netherlands, Switzerland, and other European nations.

Q: What techniques did NoName057(16) employ to carry out attacks?

A: The group used distributed denial of service (DDoS) tactics, enlisting volunteers to saturate servers, and maintained a botnet to magnify the impact.

Q: Was there any financial motivation for the volunteers?

A: Reports indicate that the organization compensated with cryptocurrencies, implying some form of financial lure for participation.

Q: Are the suspects connected to the Russian government?

A: Prosecutors did not conclusively link the suspects to the Russian government, although the group’s actions are consistent with Russian interests.

OpenAI Introduces ChatGPT Agentic AI: Prepared to Recognize Its Influence?


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

OpenAI Unveils ChatGPT Agent: A Groundbreaking Step in AI Efficiency

Quick Overview

  • OpenAI introduces ChatGPT Agent, an assertive AI task manager.
  • The agent functions on a virtual system, performing intricate tasks autonomously.
  • Incorporates tools such as Visual Browser and Terminal Access for improved performance.
  • Safety protocols involve requiring user consent for vital actions and refusal training.
  • Accessible to paying Australian users, with plans starting at A$31 monthly.

Transforming Task Administration

OpenAI has launched its latest development, the ChatGPT Agent, crafted to elevate AI chatbots to unprecedented levels of productivity. This enhancement allows ChatGPT to independently oversee and perform tasks on a virtual platform, connecting the dots between ideas and execution.

Enabling Users with Enhanced Features

Leveraging current technologies like Operator, ChatGPT Agent merges AI’s conversational ability with functional features. Users can now assign tasks ranging from meal preparation to competitor assessment, while the agent preserves context and continuity.

Autonomous Spending with Safety Mechanisms

Though the agent can aid in online purchases, it presently requires user approval to complete transactions. Future developments may allow users to set budget limits, permitting the agent to process purchases seamlessly within those constraints.

OpenAI's ChatGPT Agent during checkout

Key Attributes of ChatGPT Agent

Visual Browser

This feature allows the agent to engage with websites through a graphical interface, handling actions such as clicking links and securely filling out forms.

Text-Based Browser

To enhance efficiency, the agent utilizes a text browser for quick data access and sorting, emphasizing reason-based queries.

Terminal Access

Equipped with virtual terminal capabilities, ChatGPT Agent can run code, manage files, and execute other technical functions directly.

Direct API Integration

The agent interfaces with APIs and services such as Gmail and GitHub, automating processes and aggregating data across platforms.

Dynamic Tool Selection

ChatGPT Agent identifies the most appropriate tools for tasks, transitioning seamlessly while retaining task history for precise results.

Collaborative Workflow

Users can engage with the agent throughout tasks, offering input and receiving updates on completion via a mobile application.

Editable Outputs

The agent produces editable documents such as spreadsheets and presentations, with beta capabilities for generating slides.

Safety Considerations and Availability

OpenAI prioritizes safety, necessitating user permissions for significant actions and training the agent for sensitive tasks. ChatGPT Agent is currently available to Australian subscribers, with pricing starting at A$31 per month for Plus subscriptions.

Conclusion

The introduction of ChatGPT Agent by OpenAI signifies a major leap in AI functionality, providing users with a multifaceted tool capable of not just responding but actively administering tasks. With an emphasis on safety and efficacy, this AI stands to make a significant impact on the Australian technology sector.

Q: What is ChatGPT Agent?

A: ChatGPT Agent is an enhanced AI solution from OpenAI that autonomously manages and executes tasks on a virtual platform.

Q: How does ChatGPT Agent ensure safety?

A: Safety protocols involve user approvals for transactions and training to navigate sensitive tasks, promoting responsible usage.

Q: What are some essential features of ChatGPT Agent?

A: Key features encompass Visual Browser, Terminal Access, Direct API Integration, and Collaborative Workflow, boosting productivity.

Q: Is ChatGPT Agent available in Australia?

A: Yes, it is currently accessible to Australian paying subscribers, with different pricing plans beginning at A$31 monthly.

Q: Can ChatGPT Agent make online purchases?

A: The agent can assist with online shopping but necessitates user approval to finalize any purchase, ensuring regulated financial transactions.

Q: How does ChatGPT Agent manage multiple tasks?

A: The agent employs dynamic tool selection and preserves task history to efficiently and accurately handle various tasks.

For further details, visit https://openai.com/index/introducing-chatgpt-agent/

Cloudflare Introduces Enhancements to Avert Future 1.1.1.1 DNS Interruptions


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cloudflare’s Tactical Enhancements to DNS System

Cloudflare’s Tactical Enhancements to DNS System

Cloudflare's planned upgrades to prevent DNS disruptions

Brief Overview

  • Cloudflare is enhancing its systems to avert future DNS disruptions.
  • A configuration mistake resulted in a worldwide outage of the 1.1.1.1 resolver.
  • The firm is shifting from outdated systems to a phased deployment strategy.
  • Upgrades emphasize adherence to data traffic management.
  • Prior outages were associated with issues in BGP routing.

Analyzing the Outage

Cloudflare, recognized for its strong internet infrastructure capabilities, is making robust efforts to prevent further service disruptions impacting its 1.1.1.1 DNS resolver. This initiative follows a major outage that affected users globally due to what seemed like a minor configuration alteration.

The Configuration Error and Its Consequences

The outage was linked to a configuration mistake that went undetected for a month. Engineers, while preparing for a new Data Localisation Suite (DLS) service, mistakenly incorporated network prefixes for the 1.1.1.1 resolver during the setup phase. This error was part of a BGP-related misconfiguration that hampered the DNS resolver’s availability.

Shift to New Deployment Strategies

Cloudflare is currently evolving from its outdated systems, which involved perilous deployment techniques, towards more trustworthy and modern deployment approaches. These adjustments aim to facilitate smoother, less intrusive updates across their worldwide network.

Past Occurrences and Insights Gained

Previous events, such as one in June of the prior year, underscored weaknesses related to BGP routing. The 1.1.1.1 resolver became inaccessible in various regions due to a mix of BGP hijacking and route leaks, prompting Cloudflare to reconsider its infrastructure deployment tactics.

Conclusion

The recent outage experienced by Cloudflare has led to a substantial revision of its deployment strategies, concentrating on incremental, phased implementations. This transition seeks to reduce threats tied to DNS resolver accessibility and uphold the integrity of internet routing protocols.

Q: What was the reason for the recent Cloudflare outage?

A: A misconfiguration concerning network prefixes for the 1.1.1.1 DNS resolver resulted in a global outage.

Q: How is Cloudflare tackling these challenges?

A: The organization is shifting away from outdated systems towards a more gradual, phased deployment strategy.

Q: What was the length of the outage?

A: The outage lasted about 62 minutes, impacting users across the globe.

Q: Has Cloudflare encountered similar problems in the past?

A: Yes, comparable events have transpired due to BGP routing problems, leading to further enhancements in infrastructure.

Q: What is the significance of BGP in these outages?

A: BGP is vital for internet routing, and mistakes can result in accessibility issues for DNS resolvers.

Q: What does the 1.1.1.1 DNS resolver represent?

A: Introduced in 2018, the 1.1.1.1 DNS resolver is utilized worldwide, processing trillions of queries.

Qantas Obtains Court Ruling to Prevent Third-Party Access to Compromised Information


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Qantas Airways Implements Legal Safeguards Post-Cyber Incident

Quick Read

  • Qantas Airways secures a temporary injunction in the NSW Supreme Court to prevent access to pilfered data.
  • 5.7 million customers’ records were jeopardized in a recent data leak.
  • No credit card, financial, or passport information was compromised.
  • Qantas partners with Australian federal bodies to probe the breach.
  • Comparable incidents were reported with Optus and Medibank in 2022.

Qantas Implements Legal Measures for Customer Data Protection

Qantas Airways has successfully secured a temporary injunction from the NSW Supreme Court, aimed at obstructing any unauthorized third-party access or dissemination of compromised customer data. This proactive legal step follows a recent cyber intrusion that exposed the personal details of 5.7 million customers, signifying one of Australia’s most substantial data breaches in recent memory.

Qantas secures court order to block third-party access to compromised data

Insights into the Cyber Breach

The breach, which took place earlier this month, allowed hackers to infiltrate a database filled with sensitive customer details. However, Qantas has reassured its customers that no credit card numbers, personal financial data, or passport information were part of the affected system, and thus remain secure.

Cooperation with Authorities

In response to the breach, Qantas is working closely with the Australian Federal Police, the National Cyber Security Coordinator, and the Australian Cyber Security Centre. These entities are actively looking into the criminal actions that led to the breach to thwart future incidents and maintain customer data security.

Context of the Breach

Australia has seen similar cyber incidents recently, especially with telecommunications leader Optus and health insurer Medibank in 2022. These occurrences underscore the increasing demand for rigorous cybersecurity protocols across various sectors.

Legal Trends

By pursuing a temporary injunction, Qantas aligns itself with a trend observed among other firms facing cyber threats. HWL Ebsworth, another recent target of hacking, has also turned to the courts for legal safeguards against cybercriminals.

Conclusion

Qantas Airways has taken a crucial step in legally protecting its clients’ data following a major cyber incident. By securing a temporary injunction, the airline aims to halt any unauthorized access to the compromised data. In collaboration with Australian authorities, Qantas is dedicated to a comprehensive investigation and ensuring effective cybersecurity protocols moving forward.

Q: What steps has Qantas taken in light of the data breach?

A: Qantas secured a temporary injunction to stop third-party access to stolen data and is collaborating with Australian authorities to investigate the breach.

Q: How many customers were impacted by the breach?

A: The breach affected the personal information of 5.7 million customers.

Q: Was any sensitive information accessed during the breach?

A: No credit card information, personal financial details, or passport information was accessed in the breach.

Q: Have there been similar incidents in Australia recently?

A: Yes, similar breaches occurred with Optus and Medibank in 2022.

Q: What measures is Qantas taking to ensure the security of data in the future?

A: Qantas is working with Australian federal authorities to investigate the breach and prevent future occurrences.

Q: What legal actions are corporations pursuing against cyber threats?

A: Companies such as Qantas and HWL Ebsworth are seeking temporary injunctions to legally restrict access to stolen data.

Tesla Finally Ready to Introduce FSD (Supervised) in Australia


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • Tesla’s Full Self-Driving (FSD) technology is expected to debut in Australia shortly.
  • FSD will be initially released for vehicles equipped with HW4.
  • This launch comes after partnerships with authorities in Australia and New Zealand.
  • Possible advantages include improved mobility for senior citizens.
  • Plans for retrofitting HW3 vehicles remain unresolved.

Tesla’s FSD Launch in Australia

The wait is nearly over as Tesla announces the impending arrival of Full Self-Driving (FSD) technology in Australia. This is a notable achievement for Tesla supporters and the autonomous driving sector nationwide.

Joint Efforts with Local Government

Tesla has been collaborating with regional authorities in both Australia and New Zealand to secure compliance and facilitate a smooth launch. According to Thom Drew, the Country Director for Australia & New Zealand, all regulatory obstacles have been cleared, and the final validation processes are in progress.

Initial Deployment for HW4 Vehicles

FSD will first roll out on vehicles outfitted with Tesla’s latest HW4 hardware. This includes the Tesla Model 3 and Model Y, which are being delivered to Australia from Shanghai, fully equipped with HW4.

Tesla Set to Launch FSD (Supervised) in Australia

Possible Effects on Australian Communities

The FSD technology has the potential to be groundbreaking, particularly for the senior demographic in Australia. It aims to provide mobility options for those who can no longer drive, thus alleviating social isolation and enhancing overall wellbeing.

Future Provisions for HW3 Owners

A significant number of Tesla owners in Australia possess HW3-equipped vehicles, leading to inquiries about the timeline for receiving FSD. Tesla has indicated that there are plans to develop an upgrade option for these vehicles, although specific details remain unconfirmed.

Conclusion

The launch of Tesla’s FSD in Australia is on the horizon, commencing with HW4-equipped vehicles. The rollout follows successful collaborations with local authorities and is expected to yield notable societal benefits, particularly in enhancing mobility for older Australians. The situation for HW3 vehicles continues to be of great interest.

Questions & Answers

Q: When will FSD launch in Australia?

A:

The precise launch date has not been disclosed, but it is anticipated to occur within the forthcoming weeks.

Q: Which Tesla models will be the first to receive FSD?

A:

Initially, FSD will be available for the Tesla Model 3 and Model Y equipped with HW4.

Q: What advantages does FSD offer to seniors?

A:

FSD provides improved mobility for seniors, minimizing social isolation and fostering independence.

Q: Is there a retrofit option for HW3 vehicles?

A:

Tesla has referenced plans for upgrading HW3 vehicles, but a confirmed timeline remains pending.

Defence’s Chief IT Architect Resigns


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Overview

  • Rob Doughty has been named the new CTO and CIO of the Department of Infrastructure.
  • This transition comes after a six-year period with Defence.
  • He takes over from Tony Castley, who has joined the Clean Energy Regulator.
  • Doughty is set to commence with the Department of Infrastructure on July 21.
  • The Department is embarking on a multi-year IT and cyber security overhaul.

Rob Doughty’s Appointment at the Department of Infrastructure

The Department of Infrastructure, Transport, Regional Development, Communications, Sports and the Arts is pleased to announce Rob Doughty as its new Chief Technology Officer (CTO) and Chief Information Officer (CIO). Doughty brings more than six years of experience from Defence and will oversee technology and cyber operations, reporting directly to CIO Jeff Goedecke.

Chief IT architect from Defence moves on

Leadership Change

Rob Doughty steps in for Tony Castley, who has moved to a position at the Clean Energy Regulator. The Department of Infrastructure has confirmed Doughty’s start date as July 21, signifying an important leadership transition in the IT sector.

Vision for IT Revamp

In his role as assistant secretary of the Strategy, Architecture and Cyber Security Branch, Doughty will play a vital role in the Department of Infrastructure’s plans for IT and cyber security transformation. This effort aims to modernize the department’s information systems, replace legacy technology, and mitigate technical debt.

Conclusion

Rob Doughty’s new appointment as CTO and CIO at the Department of Infrastructure represents a crucial moment in the department’s strategic IT overhaul. His experience from Defence is anticipated to bring substantial improvements in technology and cyber operations.

Q: What expertise does Rob Doughty bring to his new role?

A: Rob Doughty offers over six years of expertise from his tenure at Defence, where he was in charge of IT architecture.

Q: Who is Rob Doughty’s predecessor at the Department of Infrastructure?

A: He succeeded Tony Castley, who transitioned to the Clean Energy Regulator.

Q: When is Rob Doughty’s official start date in his new role?

A: He will officially join the Department of Infrastructure on July 21.

Q: What are the Department of Infrastructure’s objectives for IT transformation?

A: The department is planning a comprehensive IT and cyber security transformation to modernize its information landscape, upgrade outdated systems, and eliminate technical debt.

Q: To whom will Rob Doughty report in his new capacity?

A: He will report to the department’s CIO, Jeff Goedecke.

Q: What additional position will Rob Doughty hold?

A: He will also serve as the assistant secretary of the Strategy, Architecture and Cyber Security Branch.