Australia Tech News - Page 39 of 42 - Techbest - Top Tech Reviews In Australia

IAG Finds Equilibrium in Data Mesh Endeavor


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

IAG’s Balanced Approach to Data Mesh Deployment

IAG’s Intermediate Approach to Implementing Data Mesh

Quick Read

  • IAG has been a year into the implementation of a data mesh architecture.
  • The organization is utilizing Google Cloud and Confluent solutions.
  • The utilization of real-time data streaming is expanding within IAG.
  • Google Cloud Platform (GCP) serves as the cornerstone of IAG’s strategic data platform.
  • Confluent Cloud enables internal use cases for real-time streaming.

IAG’s Path to Implementing a Data Mesh

IAG is one year into adopting a data mesh architecture to further enhance the importance of data in its group operations and transformation initiatives. Burak Hoban, the executive manager of data platforms – data and risk, provided insights during the Confluent Data in Motion Tour 2024 event in Melbourne, expressing that IAG seeks to strike a balance in its data mesh journey.

IAG finds a "middle ground" in its pursuit of data mesh

Burak Hoban from IAG (left) with Rhett Pearson from Confluent (right) on-stage in Melbourne.

“We’ve already put that into practice, and we’re a year into the process,” Hoban mentioned. “My responsibility is to help expedite it.” Two key components of IAG’s data mesh include its strategic data and analytics platform, which utilizes Google Cloud services like BigQuery, alongside Confluent Cloud and connectors.”

Fundamental Tenets of Data Mesh

Data meshes are constructed based on several fundamental principles. These encompass treating data as a product, integrating data into a central repository while maintaining ownership and curation by “the domain team most acquainted” with the dataset, enabling self-service data access, and implementing universal standards for all data in use. Hoban noted that IAG had invested several years in establishing the essential components for a data mesh.

The use of real-time data is increasing.

IAG is beginning to identify more use cases for real-time streaming data throughout the organization. Hoban mentioned that the potential of real-time streaming and business eventing was acknowledged as early as 2017-18. Although some use cases did eventually surface, Hoban admitted that they were “slightly ahead of their time” overall.

Initial streaming implementations were internally constructed and overseen using Apache Kafka. However, as usage escalated, the insurer transitioned to a managed Kafka service via Confluent Cloud. This shift enabled Hoban and his team to collaborate more effectively with internal development and engineering teams, thereby boosting Kafka adoption.

“Kafka is beginning to take on a crucial role in our strategic platforms for the future,” Hoban remarked. He also hinted at a greater utilization of pre-built connectors provided by Confluent to access and stream data from different source systems.

Fully Committed to Google Cloud Platform (GCP)

At a Google Cloud Summit in Sydney in May, IAG’s Executive General Manager of Data, Risk, and Resilience, David Abrahams, shared additional insights about the insurer’s data platform built on GCP. Previously, the insurer had only mentioned its use of GCP in passing and had not discussed its architecture or decision-making process in detail.

“We possess a substantial amount of data that is crucial to our operations; however, due to our legacy systems, this data has become fairly fragmented and isolated,” Abrahams stated. IAG established Google Cloud as the cornerstone of its “strategic data and analytics platform.” This platform now utilizes Google Data Platform for advanced analytics, employing Vertex AI and machine learning on BigQuery.

The outcomes from this platform encompass the capability to craft more personalized experiences for customers and enable business teams to independently launch new models into production without requiring extra technical assistance.

Summary

IAG’s adoption of a data mesh architecture demonstrates its dedication to updating its data operations. Utilizing technology from Google Cloud and Confluent, IAG has established a framework that enables real-time streaming applications and self-service data access. This method improves customer experiences and grants internal teams increased independence in their data processes.

Q&A

A: Could you explain what a data mesh is?

A:

A data mesh is a design strategy that decentralizes data governance by considering data as a product. This allows domain-specific teams to manage and refine their datasets while following common guidelines.

Why did IAG opt for Google Cloud Platform?

A:

IAG selected Google Cloud Platform for its ability to provide a scalable and high-performance solution that could effectively handle its extensive, fragmented, and isolated data. This choice facilitates enhanced analytics and machine learning functionalities.

What function does Confluent Kafka serve in IAG’s strategic plan?

A:

Confluent Kafka enables IAG’s real-time streaming applications. It assists in synchronizing data across business tools, supports customer and policy migration processes, manages payment notifications, and helps develop real-time data products.

How has utilizing a managed Kafka model proven advantageous for IAG?

A:

By utilizing the managed Kafka model via Confluent Cloud, IAG has been able to free up its internal resources. This shift has enabled the team to concentrate on development and engineering activities, thereby increasing Kafka adoption throughout the organization.

Q: What are the advantages of IAG’s strategic data platform?

A:

IAG’s strategic data platform enhances customer experiences through greater personalization, allows business teams to independently deploy new models, and facilitates advanced analytics using Vertex AI and machine learning on BigQuery.

Q: What effect does real-time streaming have on IAG’s operations?

A:

Real-time streaming enables IAG to manage essential functions like generating pricing quotes or issuing policies effectively. Any downtime or problems with Kafka can severely affect these activities, underscoring its crucial importance.

The Australian Government Aims to Roll Out Public Safety Mobile Broadband by 2025-26


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Government Aims for Public Safety Mobile Broadband Implementation by 2025-26 | TechBest

Government Aims for Public Safety Mobile Broadband Deployment by 2025-26

Aussie Government Targets 2025-26 for Public Safety Mobile Broadband Rollout

Quick Read

  • The Australian government is targeting a nationwide deployment of a public safety mobile broadband (PSMB) service by the 2025-26 timeframe.
  • An RFI process has been started to collect information.
  • The PSMB will deliver essential data and video services to public safety organizations.
  • The service aims to boost communication among emergency responders and heighten their situational awareness.
  • Both newly established and already existing cellular infrastructure are being evaluated for the network.

Introduction

The Australian government plans to introduce a national public safety mobile broadband (PSMB) service by the 2025-26 financial year. This project is designed to greatly improve the communication abilities of public safety agencies throughout the country, offering vital data, video, and voice services during emergencies and critical situations.

Background and Importance

The PSMB project has been under discussion since 2009. However, it gained renewed momentum after a thorough review in 2022. According to the government, this initiative will represent the most significant advancement in communications for Australian public safety agencies in decades. The system is designed to provide fast, secure, and reliable communication capabilities, allowing near-instant access to crucial data and real-time analytics.

The Process of Requesting Information (RFI)

At the end of September, the government revealed that additional information regarding the forthcoming phases of the PSMB project would be published shortly. A task force formed in early 2023 has already begun a request for information (RFI) process. This preliminary stage is crucial for national planning and will aid in decision-making for both federal and state authorities.

The Request for Information (RFI) is particularly looking for feedback on creating a nationwide interoperable 4G communication network that accommodates data, video, and voice services for all public safety organizations. The goal is also to gather insights on how to merge this network with current voice services and other data networks.

Two-Staged Market Approach

The government has proposed a two-phase market strategy for acquiring the PSMB service. Initially, information will be collected via the RFI process. The following phase will consist of a formal tender process scheduled for the 2025-26 fiscal year. Telecommunications companies and other potential suppliers are required to engage in the RFI stage in order to qualify for later bidding.

Technological Considerations

A primary objective of the taskforce is to explore how 5G coverage can improve the PSMB service. The government is considering multiple operational models, ranging from a dedicated network to utilizing existing cellular infrastructure. The aim is to guarantee seamless integration and interoperability between various agencies and across state lines.

Summary

The Australian government’s bold initiative to implement a national public safety mobile broadband service by the years 2025-26 is poised to transform emergency response communications. By offering expedited, secure, and dependable data and video services, the PSMB will equip public safety agencies with essential tools for real-time analytics and enhanced situational awareness. As the preparations progress through a Request for Information (RFI) process, this project represents a crucial advancement in modernising Australia’s emergency communication infrastructure.

Q&A Section

What is the main objective of the PSMB service?

The main objective is to deliver essential data, video, and voice services to public safety agencies, improving their communication efficiency during emergencies and critical events.

When is the PSMB service set to be launched?

The government plans to implement the PSMB service by the 2025-26 fiscal year.

Q: What is the goal of the RFI process?

The goal of the RFI procedure is to collect essential data that will guide national strategy and decision-making for the PSMB initiative.

Q: Who must be involved in the Request for Information (RFI) phase?

Telecommunications companies and other providers aiming to bid on the PSMB project must join in the RFI stage to qualify for the subsequent formal tender process.

Q: In what ways will the PSMB service advantage public safety agencies?

The service will offer quick and secure communication features, allowing almost immediate access to essential data and real-time analysis, thus enhancing situational awareness and the efficiency of emergency responses.

What technologies are being evaluated for the PSMB network?

The taskforce is investigating the establishment of a national interoperable 4G network and examining how 5G coverage could further improve the service.

Explore TechBest for the latest updates on technology initiatives in Australia.

Australia Post Names New Chief Information Security Officer


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Australia Post Names New Chief Information Security Officer | TechBest

Australia Post Appoints New Chief Information Security Officer

Quick Read

  • Adam Cartwright will start as the Chief Information Security Officer (CISO) at Australia Post in August.
  • Cartwright formerly occupied top cyber security positions at Asahi Beverages, Commonwealth Bank of Australia (CBA), and ANZ Banking Group.
  • Glenn Stuttard leaves after 11 and a half years with Australia Post.
  • Stuttard intends to pause for a while before exploring new prospects.

Australia Post names its next CISO

Australia Post has revealed that Adam Cartwright will be stepping in as the new Chief Information Security Officer (CISO) beginning next month. Cartwright takes over from Glenn Stuttard, who is departing the organisation after more than 11 years of service. Stuttard’s exit signifies the conclusion of a notable chapter in Australia Post’s cyber security history.

Adam Cartwright’s Background

Adam Cartwright has a strong background in cyber security management and has joined Australia Post. Before this position, he was the Group General Manager of Cyber Security and Risk at Asahi Beverages. Cartwright has also served in significant roles like Deputy CISO at Commonwealth Bank of Australia (CBA) and Head of Cyber Security at ANZ Banking Group.

A spokesperson for Australia Post stated, “Adam will contribute extensive knowledge to Australia Post from his experience in cyber security across various sectors.”

Glenn Stuttard’s Departure

Glenn Stuttard, after serving Australia Post for 11.5 years, announced his resignation on LinkedIn last week. In his farewell message, Stuttard looked back on his journey with a sense of pride, highlighting the team’s achievements in protecting one of Australia’s most trusted brands. He also stated that he intends to “recharge before seeking new opportunities.”

Transition Period

The transition phase is anticipated to be seamless, with Cartwright taking over to uphold the strong security infrastructure founded during Stuttard’s tenure. Australia Post believes that Cartwright’s substantial experience will improve their cyber security practices even further.

Summary

Australia Post has named Adam Cartwright as the new Chief Information Security Officer, following Glenn Stuttard’s departure after 11.5 years of service. Cartwright’s broad expertise in cyber security within multiple sectors is anticipated to offer a new outlook on Australia Post’s security measures.

Q: Who has been appointed as the new CISO of Australia Post?

Adam Cartwright is set to begin his new role as Chief Information Security Officer at Australia Post next month.

What professional experience does Adam Cartwright have?

Adam Cartwright formerly served as the Group General Manager of Cyber Security and Risk at Asahi Beverages. Additionally, he held the roles of Deputy CISO at the Commonwealth Bank of Australia and Head of Cyber Security at ANZ Banking Group.

Why is Glenn Stuttard departing from Australia Post?

Glenn Stuttard is departing after 11.5 years at Australia Post to take a break and rejuvenate before seeking new opportunities.

How will this new leadership affect Australia Post?

The transition is anticipated to be seamless, as Adam Cartwright brings extensive expertise in cybersecurity to enhance Australia Post’s security framework.

When is Adam Cartwright scheduled to begin his position?

Adam Cartwright will begin his position as Chief Information Security Officer in August.

Germany plans to remove Huawei and ZTE equipment from its 5G core network.


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Germany plans to exclude Huawei and ZTE from its 5G network by 2029.

Germany’s Decisive Action: Removing Huawei and ZTE from 5G Network by 2029

Quick Read

  • Germany plans to remove Huawei and ZTE components from its 5G network by the year 2029.
  • The initiative seeks to bolster digital security in the largest economy in Europe.
  • The initial phase-out will begin with core network 5G data centers by 2026.
  • Huawei and China have condemned the decision, arguing that there is insufficient evidence of security risks.
  • Telecom operators such as Deutsche Telekom and Vodafone must adhere to the new regulations.
Germany's plan to exclude Huawei and ZTE from its 5G network by 2029

A New Agreement

Germany’s Interior Minister, Nancy Faeser, revealed a significant agreement with telecom companies to remove Chinese technology firms Huawei and ZTE from the nation’s 5G infrastructure by the year 2029. This decision is regarded as an essential step to ensure digital security within Europe’s biggest economy.

Why Omit Chinese Technology?

The arrangement comes after thorough talks between Germany’s interior ministry and key telecommunications companies like Deutsche Telekom, Vodafone, and Telefonica Deutschland. The main goal is to shield Germany’s vital infrastructure from possible security threats due to Chinese involvement.

China’s Response

The Chinese embassy in Germany has criticized the decision, calling it a “ruthless attempt” to stifle competition and advance German technology. They contend that there is no concrete evidence to support the allegations that Huawei equipment is a security risk.

Implementation Phases

The phase-out will be implemented in two phases. In the first phase, telecom operators must eliminate Chinese-made technology from the core network of 5G data centres by 2026. The second phase necessitates the removal of Chinese components, including antennas, transmission lines, and towers by 2029.

EU Security Measures

Germany has lagged somewhat in adopting the European Union’s security protocols for 5G networks. This recent agreement is perceived as an effort to better synchronize with EU-wide policies focused on improving digital security.

Reply from Telecommunications Providers

Telecom companies have traditionally opposed Berlin’s initiatives to eliminate Huawei, citing high expenses. Nonetheless, they now support the new policies. Huawei has condemned the decision, labeling it as a politicization of cybersecurity concerns.

Summary

Germany’s choice to remove Huawei and ZTE from its 5G network by 2029 is a strategic effort to improve digital security. Although China has objected to the decision, arguing there is no evidence of security threats, Germany is advancing with a gradual implementation plan that includes key telecom providers. This action brings Germany more in line with the European Union’s security protocols for 5G networks.

Why has Germany decided to exclude Huawei and ZTE from its 5G network?

The main objective is to enhance digital security and safeguard essential infrastructure against potential threats from Chinese influence.

Q: What stages are included in this exclusion plan?

A: The strategy will be executed in two phases: firstly, the extraction of Chinese technology from main network data centers by 2026, and secondly, the removal of components such as antennas and transmission lines by 2029.

Q: What has been China’s reaction to this decision?

The Chinese embassy in Germany has criticized this action, labeling it an effort to stifle competition and advance German technology. They assert that no substantial evidence has been provided to substantiate the claims of security risks.

Q: What are the opinions of German telecommunications companies regarding this proposal?

Initially hesitant due to the high expenses, major operators like Deutsche Telekom, Vodafone, and Telefonica Deutschland have now embraced the new regulations.

Is Germany in agreement with the European Union’s security policies?

Germany has lagged somewhat in adopting EU security measures for 5G networks but intends to better align with this new agreement.

What is Huawei’s response to these advancements?

Huawei has condemned the decision, describing it as the politicization of cybersecurity concerns without solid proof to substantiate claims of security risks.

Q: Is there likely to be any form of counteraction from China?

Interior Minister Nancy Faeser mentioned that she does not anticipate any backlash from China regarding the proposed restrictions on Chinese technology.

AT&T Discloses Significant Data Breach: 109 Million US Customer Accounts Affected


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

AT&T Data Breach: 109 Million US Customer Accounts Exposed

Quick Read

  • AT&T experiences a significant data breach, affecting 109 million customer accounts in the United States.
  • The data that has been compromised includes call and text records from the year 2022.
  • The FBI and the US Federal Communications Commission are conducting an investigation.
  • The security breach came after a ransomware attack on UnitedHealth Group in February.
  • AT&T has blocked the route of unauthorized access.

AT&T Data Breach: Current Information and Insights

AT&T Data Breach Affects 109 Million US Customers

The American telecommunications behemoth AT&T has disclosed a major data breach affecting the call and text records of approximately 109 million US customer accounts. This breach took place in April when the data was unlawfully extracted from a third-party cloud service.

Extent of the Violation

The breached data encompasses call and text records from May to October 2022 for virtually all AT&T cellular and landline clients. It’s essential to clarify that the content of these calls and texts, as well as personal details like social security numbers, were not part of the compromised information. Additionally, the records involve interactions from AT&T customers of mobile virtual network operators using AT&T’s wireless network.

Ongoing Investigations

The FBI is presently examining the breach, and at least one person has been detained. The US Federal Communications Commission is also conducting an investigation. The FBI and the US Justice Department cooperated with AT&T to handle the incident-response and exchange essential threat intelligence.

Delayed Public Disclosure

The US Justice Department requested a delay in the public announcement of the hack. AT&T discovered the breach on April 19, following claims by a hacker that they had illegally obtained and duplicated AT&T’s call logs from April 14 to April 25.

Previous Data Incidents

This breach is the most recent in a string of major cyber-attacks impacting a large number of Americans. In February, UnitedHealth Group’s Change Healthcare division experienced a ransomware attack that may have compromised the personal information of a third of the US population. Moreover, in March, AT&T looked into a data set that was released on the dark web, seemingly impacting about 7.6 million current account holders and 65.4 million former account holders. This data set appeared to originate from 2019 or earlier.

Potential Consequences and Future Actions

Although AT&T has sealed the breach of unauthorized access and does not think the data is accessible to the public, the company is still collaborating closely with federal investigators to ensure the ongoing security and privacy of its customers’ information.

Summary

The AT&T data breach has impacted about 109 million US customer accounts, revealing call and text records from 2022. The FBI and other federal agencies are currently investigating the incident, and AT&T has secured the breach’s source. This occurrence highlights the increasing necessity for strong cybersecurity measures to protect consumer data.

Q&A

Q: What type of information was affected in the AT&T security breach?

A:

The breached data encompasses records of calls and texts from May to October 2022 for almost all AT&T cellular and landline users. Nevertheless, it excludes the content of calls or texts and personal details such as social security numbers.

Who is currently looking into the AT&T data breach?

A:

The breach is being investigated by both the FBI and the US Federal Communications Commission. At least one person has been arrested in relation to the incident.

When did AT&T become aware of the breach?

A:

AT&T initially discovered the breach on April 19, when a hacker asserted that they had illicitly accessed and duplicated AT&T’s call logs from April 14 to April 25.

Q: Has AT&T implemented any measures to avoid future security breaches?

A:

Indeed, AT&T has addressed the point of unauthorized access and is collaborating closely with federal investigators to improve its cybersecurity protocols and safeguard customer information in the future.

“`

New Assassin’s Creed × MTG Set Introduces DeathTouch for Everyone!


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

New Assassin’s Creed and MTG Set Introduces DeathTouch for Everyone!

It’s the collaboration you’ve eagerly anticipated: magic meets assassins. Magic: The Gathering (MTG), a long-standing trading card game that debuted in the early 1990s, occasionally releases a collection known as Secret Lair.

These collections are joint efforts, transforming ordinary cards into unique modifications. Previous collaborations have featured Lord of the Rings, Street Fighter, Hatsune Miku, Dungeons & Dragons, and celebrations for occasions like Lunar New Year, International Women’s Day, and others. Now, our beloved assassins from various eras are part of the new set through a partnership with Assassin’s Creed.

New Assassin’s Creed packs include featured assassins.

The latest Assassin’s Creed Secret Lair partnership introduces a variety of famed characters from Ubisoft’s Assassin’s Creed series into Magic: The Gathering. This collection showcases heroes from all the major games, allowing you to assemble your own team of assassins. If you began with the initial trilogy like I did, you’ll spot familiar faces such as Desmond Miles, Ezio, and even Leonardo da Vinci.

Assassins featuring Desmond Miles, Initiate, Arno Dorian, Alexios, Edward Kenay, Shay Cormac, Haytham Kenway, and Shad Jun.
Some of my favorite assassins from the collection (Photo TechBest)

If you’ve experienced the newer Valhalla game, you’ll likely recognize Eivor. Additionally, there’s Kassandra from Assassin’s Creed Odyssey, among many other human assassins you can discover.

Other cherished aspects of Assassin’s Creed find their way into Magic: The Gathering.

The Magic: The Gathering set brings more than just assassins and human characters to evoke nostalgia. Within the array of legendary cards and creatures, you’ll find a variety of artifacts and spells inspired by the game. Some standout items include the Haystack, which phases out a creature you control, the Hookblade that gives a creature you control +1/+0 and flying, and Eagle Vision, which allows you to draw three cards. There are many more, but I’ll leave those for you to discover.

Cards in hand that include Swamp, Brotherhood, Hookblade Veteran (2 of), Tranquilize, Ezio Blade of Vengeance, and Auditore Ambush.
The cards showcase your favorite characters from the Assassin’s Creed games, including Ezio (Photo TechBest)

Common mechanics

Considering it’s an Assassin’s Creed-themed set, we made a joke at a recent Magic gathering that “every assassin would have deathtouch,” and we weren’t too far from the truth. Numerous assassins in the set possess abilities that you would deem crucial for assassin duties. Deathtouch is a skill that enables the creature to eliminate any opponent.

Australia is preparing to implement pioneering anti-scam legislation aimed at tech giants this year.


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

“`html

Australia’s Pioneering Anti-Scam Legislation Aiming at Technology Giants

Quick Read

  • Australia is set to implement legislation that requires internet companies to block scams.
  • Severe penalties for failing to comply could amount to $50 million or higher.
  • The ACCC and the treasury are seeking input from multiple industries to develop a code to combat scams.
  • Advertisements for cryptocurrency scams that use Andrew Forrest’s name have led to substantial financial losses.
  • Meta is facing a lawsuit for not effectively controlling misleading ads.
  • The recent legislation seeks to make technology giants responsible, which might lead to clashes with United States laws.
Australia to bring anti-scam law targeting internet giants this year

Australia’s New Anti-Fraud Legislation

By the end of the year, Australia intends to implement a pioneering law that will require internet companies to actively prevent the hosting of scams or risk substantial fines. The Australian Competition and Consumer Commission (ACCC), alongside the treasury department, is presently engaging with internet, banking, and telecommunications companies to develop a compulsory and enforceable anti-scam code.

The Importance of This Legislation

This action follows significant financial losses for Australians due to cryptocurrency scam advertisements featuring high-profile individuals such as mining tycoon Andrew Forrest. Forrest has initiated legal proceedings against Facebook’s parent company, Meta, in California, after failing to compel the company to take action within Australia. Government statistics show that Australians’ losses from scams have surged from $900 million in 2020 to $2.7 billion in 2023, reflecting a global trend worsened by the increased online activity driven by the pandemic.

Consultation with Industry and Code Creation

The ACCC and the Treasury seek to create an anti-scam code mandating internet platforms to take reasonable measures to safeguard users. This encompasses providing efficient complaint services. At present, only telecommunications providers in Australia are subject to specific anti-scam regulations.

Possible Disputes with Major Technology Companies

The enactment of this law might provoke another clash between Australia and major tech companies. Historically, internet platforms have depended on U.S. legislation that mostly absolves them from accountability. The ACCC has previously required internet firms to pay media organizations licensing fees for content links, causing Meta to contemplate blocking media content on Facebook in Australia. The new anti-scam legislation could exacerbate these tensions by imposing legal liability on these platforms.

Expected Implementation Timeline

“We anticipate the implementation of these measures throughout this period and by the end of the year,” stated ACCC chair Gina Cass-Gottlieb. The ACCC maintains that clear and enforceable legal requirements are essential. Non-compliance with these new regulations could lead to penalties of up to $50 million, triple the profit obtained from the misconduct, or 30 percent of the revenue at the time the violation took place.

Ongoing Legal Proceedings and Potential Consequences

The ACCC is taking legal action against Meta for not preventing the display of deceptive advertisements that include well-known Australians. Meta has been defending itself since March 2022, and the case remains in the pre-trial phase. Cass-Gottlieb contends that a compulsory code would lessen the reliance on “retroactive” and lengthy court procedures for enforcement.

Meta has chosen not to provide comments regarding the timing of the anti-scam code. However, the company has previously expressed a preference for a voluntary code, arguing that a mandatory code could result in a focus on compliance rather than innovation.

Summary

Australia is poised to implement a groundbreaking anti-scam legislation by year’s end, aimed at holding internet companies responsible for preventing scams. Both the ACCC and the treasury are engaging with different industries to develop a regulatory anti-scam code. This initiative is intended to combat the increasing financial losses due to scams in Australia but might result in additional disputes with major tech companies such as Meta.

What is the main goal of Australia’s new anti-scam legislation?

The main goal is to require internet firms to take preventive measures against hosting scams and to offer efficient complaint services, thereby safeguarding users.

What are the potential fines for businesses that do not comply?

Companies could be subject to penalties amounting to $50 million, triple the advantage obtained from the misconduct, or 30 percent of their revenue at the point of the violation.

Why might there be a possible conflict with U.S. laws?

U.S. regulations generally shield internet platforms from liability for content created by users, whereas Australia’s recent legislation seeks to make these platforms legally responsible.

What has driven this recent legislative proposal?

The rising financial losses resulting from scams during the pandemic, which led to Australians losing $2.7 billion between 2020 and 2023, spurred this legislative action.

Who is in charge of developing the anti-scam code?

The mandatory anti-scam code is being developed under the leadership of the Australian Competition and Consumer Commission (ACCC) and the treasury department.

Q: Which types of scams have been most common in Australia?

Cryptocurrency scam ads featuring high-profile individuals such as Andrew Forrest have been especially common, resulting in considerable financial losses for Australians.

How could this new legislation affect technological innovation?

Certain technology firms, such as Meta, contend that enforcing a compulsory anti-fraud code might compel them to emphasize adherence at the expense of innovation.

Q: When is the law anticipated to take effect?

The ACCC aims to implement the new anti-scam codes by the end of this year.

“`

Apple Allows Competitors to Utilize Tap-and-Go Payments in Significant Policy Change


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Apple Allows Rivals to Use Tap-and-Go Payments in Significant Policy Change

Apple Expands Tap-and-Go Payment Options to Include Competitors in Significant Policy Change

Apple opens tap-and-go payments to competitors in major policy shift

Quick Read

  • Apple is allowing competitors to use its tap-and-go mobile payment system.
  • Action driven by EU antitrust rules outlined in the Digital Markets Act (DMA).
  • Apple is subject to three investigations related to the DMA.
  • The European Commission’s decision mandates adherence for a decade.
  • Over 3000 banks and issuers across Europe provide Apple Pay.
  • The ruling permits developers to utilize Apple’s NFC technology.
  • The Norwegian application Vipps MobilePay is pleased with the decision.

The Apple and Digital Markets Act

The Digital Markets Act (DMA) seeks to create fair competition among major technology companies and provide users with more options. Apple is currently facing scrutiny through three active investigations. The company’s App Store policies and recent contractual terms for developers have been called into question. EU antitrust regulator Margrethe Vestager has stated that Apple has not yet adhered to these rules.

Opening NFC Technology

In a major policy change, Apple is set to grant access to its near-field communication (NFC) technology to competitors. This choice is the result of a four-year investigation conducted by the European Commission. Apple’s proposal will be effective for 10 years, enabling developers to create payment applications that use Apple’s NFC technology. The goal of this initiative is to enhance competition within the mobile wallet market.

Effects on European Programmers

Apple’s concessions will let European developers incorporate tap-and-go payments into a wide range of applications, such as car keys, transit systems, corporate badges, home keys, hotel keys, merchant loyalty/rewards, and event tickets within their iOS apps. This adjustment is anticipated to make Apple’s NFC technology more accessible and foster innovation among competitors.

Feedback from Industry Stakeholders

The Norwegian mobile payment application, Vipps MobilePay, which had previously raised concerns regarding Apple Pay’s limitations, embraced the recent change. This advancement permits Vipps MobilePay and other service providers to compete on an equal footing with Apple, potentially resulting in a wider array of consumer-friendly choices within the market.

EU Antitrust Penalties

In March, Apple encountered its inaugural EU antitrust fine—a substantial 1.84 billion euros (AUD 2.96 billion) for limiting competition from Spotify and other music streaming competitors through its App Store regulations. This penalty highlighted the EU’s dedication to addressing anti-competitive actions by major tech firms.

Microsoft’s Antitrust Settlement

Independently, Microsoft finalized an agreement with cloud services entity CISPE to resolve an antitrust grievance, therefore evading an EU probe. Vestager characterized this resolution as a “promising outcome,” mirroring the EU’s overarching strategy to encourage fair competition in the technology industry.

Summary

Apple’s choice to allow competitors access to its tap-and-go mobile payment system is a significant development in the technology sector, compelled by stringent EU antitrust laws. By granting rival developers access to its NFC technology, Apple aims to enhance competition and innovation within the mobile wallet market. This action aligns with the goals of the Digital Markets Act and illustrates the growing regulatory pressures on major tech firms to maintain a fair and competitive environment.

Q&A

Q: What led Apple to unlock its tap-and-go payments service?

A:

The decision was driven by continuous investigations and regulatory pressures from the EU under the Digital Markets Act (DMA), which seeks to promote fair competition among large technology companies.

Q: Could you explain what NFC technology is?

A:

NFC is an abbreviation for near-field communication. It facilitates contactless payments by enabling devices such as smartphones and smartwatches to interact with payment terminals when they are in close range.

How long will Apple’s proposal to make its NFC technology accessible remain effective?

A:

Apple’s proposal will remain in effect for a decade, allowing developers to utilize its NFC technology for creating payment apps.

How many banks and issuers are presently providing Apple Pay services in Europe?

A:

Presently, over 3000 banks and issuers across Europe provide Apple Pay as a payment method.

Q: What effect does this have on developers?

A:

This modification enables developers to develop and provide tap-and-go payment solutions utilizing Apple’s NFC technology, thus promoting competition and innovation in the mobile wallet industry.

Q: What penalty did the European Union impose on Apple?

A:

In March, Apple received a fine of 1.84 billion euros (equivalent to AUD 2.96 billion) from the EU due to its App Store policies, which were deemed to restrict competition from Spotify and other music streaming competitors.

What was the response of other companies to Apple’s decision?

A:

The Norwegian mobile payment application, Vipps MobilePay, expressed approval of Apple’s decision, as it enables them to compete fairly with Apple and other mobile wallet service providers in the market.

What role does Microsoft play in this situation?

A:

Microsoft and cloud services group CISPE have reached a settlement, resolving an antitrust complaint and sidestepping an EU investigation. This action forms part of wider regulatory efforts to maintain fair competition within the tech industry.

IT technician in defense sector and accomplice reportedly forwarded confidential documents to personal email addresses


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Defense IT Technician and Associate Reportedly Forwarded Confidential Documents to Personal Email

Defense IT Technician and Associate Accused of Sending Confidential Documents to Personal Email

Quick Read

  • An Australian Army IT technician and her partner have been accused of crimes related to espionage.
  • The duo is charged with transmitting sensitive Defense information to a personal email account.
  • The Australian Federal Police claim that they planned to provide the information to Russian officials.
  • Officials have announced that there is no current danger stemming from the incident.
  • The charges might increase if a direct connection to a foreign principal is proven.

Incident Overview

An information systems technician in the Australian Army and her partner have been accused of an espionage-related crime for allegedly sending sensitive Defense information from the woman’s account to a private email. The Australian Federal Police (AFP) indicated that the duo, who are Russian-born Australian citizens, planned to provide this information to Russian officials.

Citizenship Details

The woman became an Australian citizen in 2016, followed by her husband in 2020. This detail underscores their relatively recent incorporation into Australian society prior to the suspected espionage incidents.

Allegations

The AFP claims that the duo collaborated to acquire sensitive Defence information while the soldier was on extended leave. During this time, it is reported that she made undisclosed trips to Russia, both with and without her partner. Allegedly, while the man stayed in Australia, the woman directed him to log into her official work account and retrieve specific information, which he then sent to her private email account while she was in Russia.

Australian Defence IT technician and partner allegedly forwarded sensitive documents to private email

AFP photograph from the capture.

Security Concerns

The Federal Police claim that the accessed sensitive information pertained to Australia’s national security interests. Despite the seriousness of these claims, officials have reassured the public that there is no current threat from this incident and that no major compromise has been detected at this time.

Potential Increase in Charges

The Federal Police have indicated that the charges against the duo could be upgraded from “preparing for an espionage offence” to espionage if a direct evidential connection to a foreign principal is established in the future. This potential escalation highlights the seriousness of the situation and the ongoing nature of the investigation.

Investigation Details

AFP commissioner Reece Kershaw praised the counter foreign interference taskforce (CFITF) for their “exceptional determination and skill” in probing the alleged actions of the duo. The CFITF comprises the AFP, ASIO, and other Commonwealth partners, underscoring the joint effort required to tackle this security violation.

ASIO Statement

ASIO director-general Mike Burgess highlighted that this situation exemplifies the efforts of numerous countries to pilfer Australia’s secrets. He remarked, “Espionage is not just an outdated cold war concept. It harms our economy and undermines our strategic edge. It can lead to devastating real-world outcomes.”

Summary

This incident strongly emphasizes the persistent dangers associated with espionage. The purported activities of an Australian Army IT specialist and her companion reveal weaknesses in Defence systems and stress the need for rigorous security protocols. The concerted work of multiple Australian security agencies has played a crucial role in detecting and addressing this risk, ensuring that no major breach has taken place to date.

What accusations were made against the pair?

A:

The duo faced charges for an espionage-related offense, accused of allegedly transmitting sensitive Defense information accessed through the woman’s account to a private email with the intention of sharing it with Russian authorities.

Q: By what means did they purportedly acquire the confidential data?

A:

The AFP claims that while the woman was on extended leave and visiting Russia, she guided her partner on how to access her official work account and retrieve certain information to be sent directly to her personal email account.

Is there any current threat stemming from this incident?

A:

Authorities have confirmed that there is no current threat from this incident and no major compromise has been detected at this time.

Is it possible for the charges against them to increase?

A:

Indeed, charges may escalate from “preparing for an espionage offense” to espionage if conclusive evidence linking to a foreign principal is discovered later on.

What organizations took part in examining this case?

A:

The counter foreign interference taskforce (CFITF), comprising the AFP, ASIO, and various other Commonwealth collaborators, carried out the investigation.

What remarks did the director-general of ASIO, Mike Burgess, make regarding this case?

A:

Mike Burgess highlighted that various nations are attempting to steal Australian secrets, resulting in harm to the economy and a reduction in strategic benefits. He stressed that espionage can lead to severe real-world repercussions.

Samsung Galaxy Z Fold 6 Finally Addresses Its Major Flaw


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Samsung Galaxy Z Fold 6 Addresses Its Major Weakness at Last

Quick Read

  • The Samsung Galaxy Z Fold 6 now boasts a larger 6.3″ cover display.
  • The device is the thinnest and lightest in the Galaxy Z series.
  • Powered by the Snapdragon 8 Gen 3 Mobile Platform for improved performance.
  • Intelligent features for enhanced productivity, such as Note Assist and Composer.
  • Enhanced resilience with Armor Aluminum and Corning Gorilla Glass Victus 24.
  • Enhanced cooling solution featuring an expanded vapor chamber.
  • Available in Australia beginning July 31, with pre-orders starting from July 11.

Introduction

Samsung hosted their Galaxy Unpacked event for 2024 overnight, revealing several new hardware announcements. A standout was the Galaxy Z Fold 6, which tackles one of the main criticisms of the Galaxy Z Fold 5: the front display size.

Broader Cover Screen: A Game Changer

The Samsung Galaxy Z Fold 6 features a broader 6.3-inch cover screen, offering a more natural viewing experience. This enhancement ensures that content in apps is displayed more naturally, addressing the problem of the Fold 5’s excessively narrow front screen.

Samsung Galaxy Z Fold 6 Finally Tackles Its Biggest Flaw

Design and Durability

Samsung keeps pushing the boundaries in foldable technology, producing the thinnest and lightest Galaxy Z series to date. The symmetrical structure with straight edges gives it a refined appearance, and the updated cover screen ratio delivers a more natural bar-style viewing experience.

Designed for robustness, the Galaxy Z Fold 6 incorporates a dual rail hinge design bolstered by a reinforced folding edge. Improved layers on the primary display ensure durability, and the device is fortified with Armor Aluminum and Corning Gorilla Glass Victus 24 for increased protection.

Efficiency and AI Assimilation

The Galaxy Z Fold 6 and Flip 6 feature the Snapdragon 8 Gen 3 Mobile Platform, delivering outstanding performance in CPU, GPU, and NPU, specifically enhanced for AI tasks. The cooling system has been improved with a larger vapor chamber in the Fold 6 and, for the first time, a vapor chamber in the Flip 6.

Productivity Features

The Galaxy Z Fold 6 is equipped with AI-driven features designed to boost productivity.

  • Note Assist: Provides translation, summaries, and automatic formatting for meeting notes.
  • Composer: Generates text based on simple keywords for emails and social media posts.
  • S Pen Integration: Enhanced S Pen functionality with Galaxy AI, featuring Sketch to Image capability for generating AI-created images.

Enhanced Communication

Galaxy AI improves seamless communication on the Galaxy Z Fold 6. The distinct dual-screen design facilitates Interpreter mode, allowing easy translations across both screens. Live Translate provides instant phone call translations directly on your device.

Creative Tools

The AI-driven ProVisual Engine enhances creative potential on the Galaxy Z Fold 6. Photo Assist makes it easier to create professional-quality content, and Portrait Studio provides diverse portrait styles like 3D cartoon and watercolor. The Instant Slow-mo feature enables the creation of extra frames for smoother video playback.

Gaming Experience

The Galaxy Z Fold 6 enhances the gaming experience with its advanced chipset and expanded vapor chamber. Ray Tracing enables vibrant, realistic graphics on a brighter 7.6-inch display, offering a more immersive gameplay.

Technical Specifications

Spec Details
Main Screen 7.6-inch QXGA+ Dynamic AMOLED 2X Infinity Flex Display with a resolution of 2160 x 1856 and an adaptive refresh rate ranging from 1 to 120Hz.
Cover Screen 6.3-inch HD+ Dynamic AMOLED 2X Screen (2376 x 968), 120Hz variable refresh rate (1~120Hz)
Dimension & Weight Closed: 68.1 x 153.5 x 12.1mm; Open: 132.6 x 153.5 x 5.6mm; Mass: 239g
Cameras 10MP front-facing camera; 4MP camera beneath the display; triple rear camera setup (12MP ultra-wide, 50MP wide-angle, 10MP telephoto)
Processor Snapdragon 8 Gen 3 Mobile Processor for Galaxy
Memory and Storage 12GB of memory available with choices of 256GB, 512GB, or 1TB of internal storage
Battery 4,400mAh dual battery
OS Android 14 One UI 6.1.1
Sensors Capacitive fingerprint sensor (side), accelerometer, barometer, gyroscope, geomagnetic sensor, hall sensor, proximity sensor, light sensor.
Sims One Nano SIM card and one eSIM.
Colours Silver Shadow, Pink, Navy; Exclusive colors: Crafted Black, White

Availability

The Galaxy Z Fold 6, Z Flip 6, and Galaxy Buds3 series can be pre-ordered in Australia starting July 11, with general sales commencing on July 31. The Galaxy Z Fold 6 comes in Silver Shadow, Pink, and Navy. The Galaxy Z Flip 6 provides more color choices: Silver Shadow, Yellow, Blue, and Mint. Exclusive colors like Crafted Black, White, and Peach are available exclusively online at Samsung.com.

Summary

The Samsung Galaxy Z Fold 6 tackles key problems of its forerunner by incorporating a wider cover screen and upgraded functionalities aimed at productivity, communication, creativity, and gaming. Boasting increased durability and sophisticated AI integration, it establishes a new standard in the foldable smartphone industry.

Q&A Section

Q: What is the most notable improvement in the Samsung Galaxy Z Fold 6?

A: The most notable improvement is the larger front display screen (6.3 inches), offering a more comfortable viewing experience than the narrower screen of the previous model.

What enhancements has Samsung made to the durability of the Galaxy Z Fold 6?

Samsung has improved durability by integrating a dual rail hinge design, fortified with a strengthened folding edge, and utilizing Armor Aluminum along with Corning Gorilla Glass Victus 24 for additional protection.

Q: Could you list some of the productivity features on the Galaxy Z Fold 6 that are powered by AI?

Key AI-enhanced productivity tools feature Note Assist for translating and summarizing meeting notes, Composer for creating text from keywords, and improved S Pen integration for producing AI-generated images.

How does the Galaxy Z Fold 6 improve communication?

The device improves communication with features such as Interpreter mode for dual-screen translations and Live Translate for real-time phone call translations directly on your device.

What enhancements have been introduced to the gaming experience on the Galaxy Z Fold 6?

The gaming experience is enhanced by a robust chipset, an enlarged vapor chamber for superior cooling, Ray Tracing compatibility for more vibrant graphics, and a brighter display that reaches up to 2,600 nits.