Australia Tech News - Page 6 of 109 - Techbest - Top Tech Reviews In Australia

Get Ready for Action, Australia: ROG Xbox Ally and Ally X Handhelds Launch on 16 October


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • ROG Xbox Ally and Ally X handheld consoles are set to be released in Australia on 16 October 2025.
  • The new Handheld Compatibility Program guarantees game availability.
  • Enhanced shader loading and AI-driven functionalities elevate the gaming experience.
  • ROG Raikiri II Xbox Wireless Controller delivers exceptional accuracy.

ROG Xbox Ally and Ally X Handhelds Prepared for Australian Launch

The Australian gaming community is about to witness an exhilarating advancement as the ROG Xbox Ally and ROG Xbox Ally X handheld consoles are introduced on 16 October 2025. This news was officially revealed during the Xbox presentation at gamescom 2025, offering players the exciting possibility of taking their vast game collections with them wherever they go.

Handheld PC Gaming: A Revolutionary Phase

First presented at the Xbox Games Showcase earlier this year, the ROG Xbox Ally and Ally X transcend the concept of mere portable gaming devices; they signify a monumental progression into handheld PC gaming. These gadgets provide effortless access to games from Xbox, Battle.net, and other significant PC platforms, guaranteeing that gamers can enjoy play anytime, anywhere.

Handheld Compatibility Initiative

In support of these innovative devices, Xbox has launched the Handheld Compatibility Program. This program ensures that a greater number of games are instantly playable on your handheld device. Titles in your collection will feature tags such as “Handheld Optimised” or “Mostly Compatible,” simplifying the gaming experience by minimizing setup times.

Upgraded Gaming Features

The ROG Xbox Ally devices are furnished with cutting-edge features. The sophisticated shader delivery framework preloads game shaders as they are downloaded, allowing games to start up to ten times quicker while conserving battery life. Additionally, the ROG Xbox Ally X will soon gain AI-enhanced features like Automatic Super Resolution (Auto SR), which improves game visuals without the need for developer intervention, and highlight reels that document key gameplay moments for easy sharing.

Precision Play with ROG Raikiri II Controller

For gamers who favor classic control schemes, the ROG Raikiri II Xbox Wireless Controller serves as the perfect companion. Crafted by ASUS, this controller boasts features such as a 1000Hz polling rate in PC mode, anti-drift TMR joysticks, and dual-mode triggers, ensuring accuracy and dependability for all players.

Conclusion

As Australia eagerly awaits the launch of the ROG Xbox Ally and Ally X, these devices pledge to transform handheld gaming with their groundbreaking features and integrated game access. The Handheld Compatibility Program, alongside the advanced gaming improvements, positions these handhelds as essential items for dedicated gamers this holiday season.

Q: What is the launch date for the ROG Xbox Ally and Ally X in Australia?

A: The ROG Xbox Ally and Ally X will be officially available in Australia on 16 October 2025.

Q: What does the Handheld Compatibility Program entail?

A: It is a program initiated by Xbox to make more games available on handheld devices, designated as “Handheld Optimised” or “Mostly Compatible” in your game library.

Q: What are the primary features of the ROG Xbox Ally devices?

A: Primary features include advanced shader delivery for expedited game startups, AI-driven Automatic Super Resolution for enhanced visuals, and highlight reels for showcasing gameplay moments.

Q: What distinguishes the ROG Raikiri II Xbox Wireless Controller?

A: The controller offers a 1000Hz polling rate in PC mode, anti-drift TMR joysticks, and dual-mode triggers, ensuring high precision and reliability.

Serco Connects Varied Workforce through ServiceNow-Enabled Platform


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fast Overview

  • Serco introduces the Serco Connect application to enhance contractor connectivity throughout Australia.
  • This application utilizes the ServiceNow platform and incorporates Sysintegra’s ZertID tool.
  • With Serco Connect, employees can submit leave requests, view payslips, log support inquiries, and complete training requirements.
  • About 75% of Serco’s workforce is engaged in mobile and site-specific roles.
  • The application tackles disconnection issues and simplifies HR and IT workflows.

Overview of Serco Connect

Serco has launched its cutting-edge technology, Serco Connect, a mobile application intended to close the communication gap among its widespread contractor workforce in Australia. This strategic initiative seeks to improve connectivity and optimize operations for employees spread across various locations.

Serco facilitates connections for a dispersed workforce through a ServiceNow-supported platform

Capabilities and Features

The Serco Connect application, developed on the ServiceNow platform, offers an extensive array of functionalities. Employees can now submit leave applications, retrieve payslips, report support issues, and fulfill essential training modules from a single interface. This development represents a major enhancement over conventional isolated systems.

Integration with ServiceNow

The fundamental functionality of the application is anchored in its integration with the ServiceNow platform. This supports management of access, identity lifecycle oversight, and governance administration, guaranteeing smooth operations.

Sysintegra’s Contribution to Development

Sysintegra, a specialist in digital identity and access management, was instrumental in the platform’s creation. Its proprietary identity tool, ZertID, provides single sign-on capabilities, allowing employees to effortlessly utilize their contracted company credentials.

Tackling Workforce Issues

During the ServiceNow World Forum in Sydney, Jamie Shields, Serco Asia Pacific’s platform owner for ServiceNow, pointed out that the app’s creation was a direct response to workforce feedback. Numerous employees expressed feelings of disconnection from the organization due to their assignments at various sites and sectors.

Enhancing Service Access

The distributed nature of Serco’s workforce, with around 75% in mobile and site-based positions, created notable difficulties. Routine tasks like checking leave balances or reviewing payslips were often tedious and required HR involvement. The new application streamlines these tasks, enhancing efficiency and reducing time spent.

Joint Development Initiative

The application’s successful rollout in six weeks underscores the collective efforts of Serco’s HR, IT, and cybersecurity teams. Shields underscored the significance of grasping the business challenge and striving for a solution that authentically meets workforce demands.

Conclusion

Serco Connect signifies a major advancement in connecting and empowering Serco’s workforce across Australia. By utilizing ServiceNow and the knowledge of Sysintegra, Serco has tackled critical disconnection issues and optimized HR and IT processes, boosting operational efficiency and employee contentment.

Q: What is the main purpose of the Serco Connect application?

A: The app enables Serco employees to apply for leave, check payslips, log support requests, and complete training modules all from one platform.

Q: How does the app combat employee disconnection?

A: By integrating with ServiceNow and utilizing Sysintegra’s ZertID, the app allows employees to connect with Serco’s systems using their contracted company credentials, thus alleviating feelings of disconnection.

Q: What portion of Serco’s workforce is mobile and site-based?

A: About 75% of Serco’s workforce is engaged in mobile and site-specific roles.

Q: Who were the primary collaborators in the application’s development?

A: The app’s development was a cooperative effort among Serco’s HR, IT, and cybersecurity teams, as well as digital identity expert Sysintegra.

Q: How long was needed to launch the Serco Connect app?

A: The application was created and launched within a six-week period.

Union’s request for compensation arrangements poses a risk to Australia’s AI industry.


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Brief Overview

  • The Tech Council of Australia (TCA) and the Australian Council of Trade Unions (ACTU) examine compensation frameworks for AI-generated content utilization.
  • The agreement has ignited discussion regarding its potential effect on Australia’s AI industry.
  • The Media, Entertainment & Arts Alliance (MEAA) describes it as a milestone in their ‘Stop Creative Theft’ initiative.
  • Apprehensions emerge that this initiative could impede AI progress and investment.
  • MEAA’s requests include the establishment of an AI Act, clarity, and safeguards for Indigenous intellectual property.
  • Possible repercussions for fields such as healthcare, education, and environmental stewardship.

Union Requests and AI Growth

The Tech Council of Australia (TCA) has disclosed a preliminary accord with the Australian Council of Trade Unions (ACTU) to investigate compensation frameworks for content employed in training artificial intelligence systems. This arrangement, unveiled during the Albanese government’s productivity summit, seeks to tackle ethical issues but has faced backlash for possibly obstructing Australia’s AI aspirations.

Unions in the creative sector, spearheaded by the Media, Entertainment & Arts Alliance (MEAA), regard the announcement as a notable success in their ‘Stop Creative Theft’ campaign. MEAA Chief Executive Erin Madeley has emphasized the necessity of recognizing the rights of creatives whose creations have been utilized without approval or remuneration.

Potential hindrance to Australia's AI sector

Challenges of Burdensome Requirements

Although the agreement aims to engage unions in negotiating fair compensation, it risks introducing cumbersome requirements that could inhibit AI progress. The MEAA’s requests encompass an all-encompassing AI Act, transparency in data handling, obligatory labeling of AI-generated materials, a tax on major technology firms, protections for Indigenous intellectual property, and regulations against unauthorized digital reproductions.

Such regulations could impose substantial compliance burdens on tech firms, discouraging investment and delaying AI implementation. This might impact domains like healthcare, education, and environmental management, where AI enhances efficiency and innovation.

Possible Effects on Creative Sectors

The agreement also fails to recognize the ways AI enriches creative industries by automating mundane tasks, allowing artists and journalists to concentrate on more valuable endeavors, and democratizing content creation. Enforcing sweeping restrictions based on unverified allegations of “theft” could splinter the market, placing Australia at a disadvantage compared to global players that promote free AI advancement.

Conclusion

The initial agreement between the TCA and ACTU to consider compensation frameworks for AI content utilization has provoked considerable discussion. While aiming to resolve ethical dilemmas, this move poses a threat to Australia’s AI development and innovation. Creative unions, including the MEAA, celebrate it as a substantial achievement, yet the danger of increased compliance costs and regulatory overreach could hinder investment and progress in vital industries. A balanced strategy is essential to ensure that AI can flourish without excessive restraints.

Questions & Answers

Q: What is the intent behind the TCA and ACTU agreement?

A: The agreement seeks to investigate compensation models for content utilized in AI training, addressing ethical issues and labor rights.

Q: What criticisms have been raised against the agreement?

A: Detractors claim it may create burdensome requirements that could stifle AI growth and investment in Australia.

Q: What are the key demands of the MEAA?

A: The MEAA’s demands include an AI Act, transparency, mandatory labeling, levies on tech companies, and Indigenous IP protections.

Q: How could the agreement influence critical sectors in Australia?

A: Elevated compliance costs and excessive regulation could deter investment, impacting sectors like healthcare, education, and environmental management where AI promotes innovation.

Q: What are the implications for the creative sector?

A: Overregulation could disrupt the market and restrict the benefits AI offers by automating tasks and enabling higher-value endeavors.

Q: What should be the focus going forward?

A: A balanced approach that protects innovation and allows AI to thrive without unnecessary obstacles is vital.

Chemist Warehouse Employs AI to Enhance HR Inbox Administration


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Chemist Warehouse Utilizes AI for Improved HR Productivity

Brief Overview

  • Chemist Warehouse employs AI to address HR questions for its 30,000 employees and store operators.
  • The AI tool, AIHRA, automates the creation of responses for HR inquiries.
  • AIHRA connects with information sources such as Fair Work Australia for precise data.
  • The AI tool saves the HR team roughly 1950 hours each year.
  • AIHRA was created in collaboration with Microsoft partner Insurgence AI utilizing Microsoft Azure.
  • Chemist Warehouse is concentrating on AI governance and swift value extraction.

AI-Driven HR Productivity at Chemist Warehouse

AI improves HR inbox handling at Chemist Warehouse

Image credit: Chemist Warehouse/Microsoft.

Chemist Warehouse, a prominent discount pharmacy chain, has transformed its human resources (HR) functions by implementing an artificial intelligence (AI) system known as AIHRA in its shared email inbox. This groundbreaking initiative, launched at the beginning of 2025, seeks to streamline HR inquiries from its large workforce of 30,000 employees and store operators by automating the preliminary drafting of responses.

The Development of AIHRA

AIHRA, fondly called “she” by the HR team, has undergone considerable growth since its launch. Initially dubbed ‘baby AIHRA’, it has advanced to ‘intern AIHRA’, demonstrating its capability to address a wider variety of HR-related issues such as leave requests, probation oversight, and performance conversations. This development reflects the continuous enhancements made during the year.

Integration and Capabilities

AIHRA is crafted to integrate flawlessly with external data sources, including Fair Work Australia. This connection guarantees that the AI system can access contemporary award documents and enterprise bargaining contracts, along with internal guidelines. Within half a minute of receiving an inquiry, AIHRA formulates a response, which is then evaluated by an HR advisor before dispatch, ensuring both rapidity and precision.

Efficiency and Time Savings

The introduction of AIHRA has resulted in notable time savings for Chemist Warehouse’s HR advisory team. By handling up to 300 email inquiries each week, the AI system is projected to save the team around 1950 hours annually. This efficiency empowers the HR advisors to concentrate on more complicated and urgent assignments.

Strategic Implementation of AI

Created in partnership with Microsoft affiliate Insurgence AI, AIHRA utilizes Microsoft Azure AI Foundry and the Power Platform. Chemist Warehouse is dedicated to a structured approach to AI, balancing governance with immediate business advantages. This strategy includes a scalable AI governance model that aligns with the organization’s long-term objectives while achieving quick successes across various business segments.

Conclusion

Chemist Warehouse’s strategic application of AI in HR inbox management illustrates the potential of technology to boost operational efficiency. By automating repetitive tasks, the pharmacy chain not only conserves time but also enables its HR team to focus on more strategic projects. This example underscores the significance of AI integration in contemporary business practices, establishing a benchmark for others to emulate.

Q: What is AIHRA and what is its purpose?

A: AIHRA is an AI-based system utilized by Chemist Warehouse to automate the initial drafting of responses to HR inquiries, incorporating data sources to guarantee accurate and efficient information delivery.

Q: What amount of time does AIHRA save the HR team each year?

A: AIHRA is estimated to save the HR advisory team around 1950 hours yearly by automating standard email query responses.

Q: What technologies were used to develop AIHRA?

A: AIHRA was developed in collaboration with Microsoft partner Insurgence AI, utilizing Microsoft Azure AI Foundry and the Power Platform.

Q: How does AIHRA guarantee the accuracy of its responses?

A: AIHRA connects with third-party data sources such as Fair Work Australia to access current award documents and agreements, ensuring that the provided information is correct and relevant.

Q: What is the strategic strategy of Chemist Warehouse regarding AI implementation?

A: Chemist Warehouse is implementing a structured approach to AI, emphasizing scalable governance and immediate business impact, focusing on high-feasibility, high-value use cases for rapid victories aligned with long-term goals.

“Could Tesla Autopilot V14 Be the Beginning of Integrating AP and FSD Next Month?”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Elon Musk reveals Tesla Autopilot V14 is scheduled for release next month.
  • This will be the first occasion where Autopilot’s version matches that of Full Self-Driving (FSD).
  • The change may indicate a transition towards an all-encompassing AI model for Autopilot.
  • Expected enhancements include a more seamless driving experience and minimized phantom braking.
  • Autopilot V14 might facilitate activation on roads without markings.
  • Tesla owners in Australia are looking forward to the FSD launch amidst ongoing trials.

Could Tesla Autopilot V14 Signal the Integration of AP and FSD Next Month?

Elon Musk has recently unveiled plans for Tesla Autopilot V14, which is set to debut next month. This development is notable as it’s the first time that Autopilot and Full Self-Driving (FSD) share the same version identification. The news has ignited enthusiasm regarding potential advancements for Tesla owners who do not have FSD.

Possible Transition to End-to-End AI

Traditionally, Tesla’s Autopilot has relied on an older code structure, lagging behind the end-to-end neural network model of FSD. The launch of ‘Tesla Autopilot V14’ indicates a potential switch to FSD’s codebase with certain functions disabled for Autopilot. This shift could boost Autopilot’s efficiency, tackling prevalent problems such as phantom braking by enhancing the AI’s ability to perceive and navigate its surroundings.

Smoother and More Trustworthy Features

This update may render aspects of Tesla’s software stack, including smart summon, autopark, and navigate on autopilot, more fluid and dependable. This change would allow Tesla to concentrate on honing AI models through training data instead of relying on human-written code.

Challenges and Hardware Enhancements

Musk has pointed out that FSD V14 will substantially increase the count of model parameters, presenting challenges for older Tesla vehicles equipped with HW3 hardware. While there is an assurance to provide hardware updates for these models, a timeline remains unspecified.

Capabilities on Unmarked Roads

Another fascinating prospect with Autopilot V14 is the ability to activate the system on unmarked roads, a feature previously noted internationally with FSD. For users in Australia, this could provide greater adaptability in navigating unmarked routes, enhancing the driving experience.

Expected Performance Advances

Owners anticipate that phantom braking will be diminished or eradicated, as observed with the latest FSD V13 iterations. The forthcoming version is expected to deliver heightened performance by a considerable margin.

Tesla Autopilot V14 merging AP and FSD

FSD Launch in Australia

Even after displaying FSD in Melbourne and Sydney, Tesla owners in Australia are still waiting for its launch. Tesla’s Country Director confirmed that testing is nearing completion, but the software has yet to be released to the public. The anticipated V14 launch could explain this holdup, as Tesla may prefer to roll out the latest version directly to new markets.

Conclusion

The forthcoming launch of Tesla Autopilot V14 could signify a pivotal change toward integrating Autopilot with FSD, utilizing a cohesive end-to-end AI framework. This update holds promises for smoother operations, fewer complications like phantom braking, and potential additional features such as navigating unmarked roads. Tesla owners in Australia remain optimistic about the FSD rollout as the launch of V14 approaches.

Q&A

Q: What is noteworthy about the Tesla Autopilot V14 announcement?

A: It marks the initial occasion where Autopilot’s version number coincides with Full Self-Driving (FSD), indicating a possible integration of the two systems.

Q: In what ways might Autopilot V14 enhance the driving experience?

A: The update might result in smoother driving and lesser phantom braking by implementing an end-to-end AI model similar to FSD.

Q: Will Autopilot V14 permit driving on unmarked roads?

A: There is a chance that Autopilot V14 could enable driving on unmarked roads, providing users with more flexibility.

Q: What is causing the delay in the FSD rollout in Australia?

A: Tesla might be postponing the release until the V14 is launched to directly introduce the most recent version in fresh markets, including Australia.

Q: What difficulties are anticipated with the new FSD V14?

A: The increase in model parameter counts may create challenges for older Tesla vehicles equipped with HW3 hardware, resulting in potential upgrade needs.

Q: How could this update influence Tesla’s software framework?

A: Features such as smart summon, autopark, and navigate on autopilot are projected to be more fluid and reliable.

Microsoft pledges to finalize the transition to quantum-resistant cryptography by 2033


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft’s Initiative for Quantum-Resistant Cryptography

Quick Overview

  • Microsoft intends to finalize its shift to quantum-safe encryption by 2033, ahead of the 2035 international deadline.
  • Scalable quantum computing presents dangers to existing encryption techniques, potentially endangering digital security.
  • Microsoft’s methodology encompasses a three-step incorporation of quantum-safe cryptography within its offerings.
  • The company partners with worldwide standards organizations to guarantee global compatibility of quantum-safe standards.
  • Microsoft’s Majorana 1 quantum processor signifies a major advancement in its journey towards quantum safety.

Recognizing the Quantum Threat

As quantum computing technology evolves, it has the capability to undermine current cryptographic systems. Microsoft cautions that forthcoming scalable quantum computers could dismantle existing public-key cryptography, threatening digital signatures, authentication processes, and identity validation.

Microsoft’s Proactive Strategy

Microsoft is devoted to shifting all its products and services to quantum-resistant cryptographic techniques by 2033. This initiative is driven by the anticipated power of quantum computing and the possibility of the “Harvest Now, Decrypt Later” (HNDL) attack method, wherein encrypted information could be retained now and decrypted later when quantum capabilities advance.

Three-Step Transition Strategy

Microsoft’s transition plan is organized into three stages:

Stage 1: Foundational Security

The initial stage includes the incorporation of post-quantum cryptography algorithms into SymCrypt, Microsoft’s main cryptographic library, ensuring uniform security across platforms like Windows, Azure, and Microsoft 365.

Stage 2: Core Infrastructure

The second stage is centered on upgrading core infrastructure services, including authentication and key management systems, to accommodate quantum-safe encryption.

Stage 3: Complete Integration

The concluding stage aims to apply quantum-safe measures throughout all Microsoft services, facilitating early adoption of these capabilities by 2029 and establishing them as defaults where feasible.

Working Together for Global Standards

Microsoft is collaborating with essential regulatory and technical organizations like the National Institute of Standards and Technology (NIST), Internet Engineering Task Force (IETF), and International Organization for Standardization (ISO) to establish consensus on quantum-safe encryption standards. This cooperation guarantees global compatibility and a smooth transition to new cryptographic standards.

Overview

Microsoft is making substantial efforts to protect its services against impending quantum computing threats. By outlining a thorough transition to quantum-resistant cryptography, the company is establishing a proactive benchmark in the tech sector. With strategic alliances and staged implementations, Microsoft is prepared to spearhead the effort in preserving digital security in the quantum age.

Q: Why is Microsoft prioritizing quantum-resistant cryptography at this time?

A:

Microsoft seeks to counteract potential future threats from quantum computing that may undermine current encryption techniques. By taking early action, they can facilitate a seamless transition and uphold security standards.

Q: What does the “Harvest Now, Decrypt Later” scenario entail?

A:

This concept involves malicious actors saving encrypted data today with the plan to decrypt it later when quantum computers are capable of breaching existing encryption mechanisms.

Q: What is the functioning of Microsoft’s three-step approach?

A:

The method includes embedding quantum-safe cryptography into foundational security elements, upgrading the core infrastructure, and thoroughly integrating these strategies across all services.

Q: What is the role of global standards organizations in this transition?

A:

These organizations assist in aligning quantum-safe encryption standards internationally, ensuring interoperability and a cohesive transition to new cryptographic techniques.

Q: What importance does Microsoft’s Majorana 1 quantum processor hold?

A:

The Majorana 1 processor symbolizes a critical leap in Microsoft’s quantum research, bolstering the company’s wider objectives in attaining quantum-safe cryptography.

Kanye West Unveils Memecoin (YZY), Soars to $3 Billion Before Plummeting Amid Internal Turmoil


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Kanye West's Memecoin YZY Launches and Crashes

Quick Read

  • Kanye West, now referred to as Ye, debuts memecoin YZY on the Solana blockchain.
  • YZY’s market capitalization skyrocketed to US$3 billion before plummeting amid insider turmoil.
  • Initially, 94% of YZY’s total supply was held by insiders, prompting fears of market manipulation.
  • YE Pay and YZY Card enhance YZY’s functionality beyond being merely a meme.
  • Within 24 hours, the memecoin’s market cap fell below US$1 billion.
  • Critics alleged that the venture might be a potential “rug pull” scheme.
  • The launch sparked legal issues and a backlash on social networks.

Kanye West Steps into Cryptocurrency With YZY

Kanye West, now recognized as Ye, has embarked on a journey into cryptocurrency with the introduction of his memecoin, YZY. The announcement was made through a post on X, presenting the coin as an innovative financial concept tied to his Yeezy label. However, the launch quickly became one of the most disputed crypto events since Hawk Tuah.

Technical Overview of YZY

YZY is developed on the Solana blockchain, selected for its rapidity and economical nature, making it a preferred choice for memecoins. Most trading takes place on the Meteora decentralized exchange. Even with a liquidity pool established, early worries surfaced regarding its capacity for swift exits.

Supply and Allocation

The aggregate supply of YZY is limited to 1 billion tokens. The distribution approach aimed to discourage sniping, yet it was unsuccessful. An innovative anti-sniping mechanism was applied, employing 25 contract addresses with one being randomly selected for the official YZY. Nevertheless, 94% of the supply was initially in the hands of insiders, including a multisig wallet controlling 87%, which raised concerns.

Connected Tools

In addition to the coin, Kanye launched YE Pay, a cryptocurrency payment processor that promises lower fees for businesses. Furthermore, the YZY Card enables users to utilize YZY and USDC in transactions worldwide. These features place YZY within a larger ecosystem, although its success depends on sustaining value and trust.

Price Boom and Collapse

YZY saw a dramatic increase, surging by over 1,000% in just 40 minutes from the launch, hitting a market capitalization of US$3 billion (A$4.5 billion). This increase drew a large number of traders. However, within a day, the value of the coin decreased by 66%, reducing the market cap to below US$1 billion. Currently, YZY is trading at approximately US$0.86 per token, with a market cap of US$258 million (A$387 million).

The Emerging Controversy

What started as a buzz soon unraveled into controversy, with claims of insider trading and biased distribution. The single-sided liquidity pool on Meteora allowed insiders to retain control, leading to allegations of prospective “rug pull” strategies. Investigations indicated that a small number of wallets gained a substantial profit, while more than 56,000 users incurred losses.

Legal Escapes and Reactions

The project’s terms encompass a class action waiver, transferring potential legal responsibilities to users. Social media platforms were filled with claims of scams and rug pulls. This situation underscores the dangers of celebrities initiating memecoins, often resulting in monetary losses for supporters and tarnishing reputations.

Conclusion

Kanye West’s venture into the cryptocurrency market with the YZY memecoin rapidly became contentious. Despite an initial valuation surge, insider conflicts and distribution challenges led to a notable decline. The complexities of the launch and the following backlash serve as a cautionary tale for celebrities entering the digital currency landscape.

Q: What is YZY?

A: YZY is a memecoin launched by Kanye West, built on the Solana blockchain, intended to offer a new financial concept tied to his Yeezy brand.

Q: Why did YZY’s value crash?

A: YZY’s value crashed due to allegations of insider trading, unfair distribution, and concerns of potential manipulation, leading to a dramatic drop in market cap.

Q: What tools are associated with YZY?

A: Associated tools include YE Pay, a crypto payment processor, and YZY Card, allowing users to spend YZY and USDC globally.

Q: What legal concerns arose from the YZY launch?

A: The project’s terms include a class action waiver, leading to backlash and accusations of shielding against lawsuits if the venture fails.

Q: How was the YZY distribution model intended to work?

A: The distribution model was designed to deter snipers by using 25 contract addresses, with one randomly chosen for the official YZY, but it failed to prevent insider control.

Q: How has the public reacted to YZY?

A: The public reaction has been largely negative, with accusations of scams and manipulation, resulting in significant financial losses for many traders.

AI Browsers Prone to Scams and Phishing, Security Professionals Caution


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AI Browsers Prone to Fraud and Phishing, Experts in Security Warn

AI Browsers Succumb to Fraud and Phishing Attempts

Quick Read

  • AI browsers such as Comet have weaknesses against fraud and phishing.
  • Research by Guardio called “Scamlexity” evaluated AI vulnerabilities.
  • While AI browsers can automate processes, they lack human skepticism.
  • It’s essential to incorporate security protocols into AI browsing systems.
AI browsers susceptible to fraud and phishing, researchers in security reveal

The Weaknesses of AI Browsers

Agentic artificial intelligence (AI) web browsers, which are created to carry out tasks independently, are demonstrating a high level of vulnerability to fraud and phishing, as indicated by a report from Guardio, a consumer security firm. The study, referred to as “Scamlexity,” showcases the naivety of AI browsers when confronted with both traditional and novel cyber threats.

Guardio’s “Scamlexity” Study

Guardio’s investigation concentrated on the Comet browser developed by Perplexity.ai, featuring agentic AI abilities that enable it to automate intricate online tasks, such as comparing prices and adding products to shopping carts. Despite its sophisticated capabilities, Comet imposes certain restrictions for security purposes, like not inputting personal or payment details.

Evaluating AI Vulnerabilities

Guardio devised scenarios to examine how AI browsers like Comet react to counterfeit ecommerce and phishing websites, along with prompt injection assaults. In one scenario, Comet was deceived into processing a purchase on a counterfeit Walmart site, acquiring an Apple Watch. In another instance, Comet was duped by a phishing email that presented itself as a task from Wells Fargo Bank, leading to the input of user credentials on a fraudulent login interface.

AI Browsers and Security Hazards

The weaknesses observed in AI browsers stem from their design, which emphasizes user experience and lacks the skepticism inherent in human judgment. AI systems generally exhibit excessive trust and execute commands devoid of context, rendering them susceptible to exploitation.

Requirement for Integrated Security Protocols

Guardio underlines the critical need for incorporating established security measures such as phishing detection, URL reputation assessments, domain spoofing notifications, and malware file scanning into the decision-making frameworks of AI browsers.

Industry Reaction

Perplexity, the firm behind the Comet browser, recognizes the security issues underscored by Guardio, highlighting the significance of seriously addressing these vulnerabilities instead of dismissing them.

Conclusion

AI browsers, despite providing sophisticated autonomous features, are exposed to fraud and phishing attempts due to their intrinsic trust and absence of human-like skepticism. Guardio’s “Scamlexity” study reveals notable security threats, accentuating the necessity for integrated security measures to protect AI browsing activities.

FAQs

Q: What are AI browsers?

A: AI browsers are web browsers that utilize artificial intelligence technologies to carry out tasks independently for users.

Q: What vulnerabilities do AI browsers have?

A: AI browsers are susceptible to fraud and phishing attempts due to their inclination to trust readily and lack human skepticism.

Q: How did Guardio assess AI browsers?

A: Guardio executed tests with scenarios involving false ecommerce and phishing websites, as well as prompt injection attacks, to evaluate AI vulnerabilities.

Q: What security protocols are necessary for AI browsers?

A: Security protocols such as phishing detection, URL reputation assessments, and domain spoofing warnings need to be built into AI browsers’ decision-making systems.

Q: What has been the industry’s response to AI browser vulnerabilities?

A: Companies such as Perplexity acknowledge the security issues and emphasize the importance of addressing these vulnerabilities with seriousness.

Microsoft restricts China’s entry to cyber early warning system


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Implements New Cybersecurity Restrictions Against Chinese Entities

Brief Overview

  • Microsoft has limited access to its cyber early warning system for specific Chinese companies.
  • This decision follows accusations of China’s participation in a hacking operation targeting SharePoint servers.
  • Some cybersecurity analysts believe there may be a leak within Microsoft’s Active Protections Program (MAPP).
  • Microsoft is taking measures to safeguard the information provided to its partners from being misused.

A Detailed Examination of Microsoft’s Cybersecurity Measures

Microsoft restricts Chinese access to cyber early warning system

In a pivotal action, Microsoft has restricted several Chinese organizations from accessing its early warning system for cybersecurity threats. This move comes amid allegations that the Chinese government was linked to a recent hacking campaign aimed at Microsoft’s SharePoint servers.

Reasons Behind the Restrictions

The restrictions respond to last month’s extensive hacking attempts on SharePoint servers. Microsoft and various cybersecurity experts have implicated Beijing in these attempts, raising alarms regarding a possible leak from Microsoft’s Active Protections Program (MAPP), which is intended to alert security vendors, including those in China, about potential cyber threats in order to enhance their defenses.

What is Proof-of-Concept Code?

Microsoft has chosen to cease the distribution of “proof-of-concept code” to selected Chinese companies. Although designed to aid cybersecurity professionals in bolstering their systems, this code can also be exploited by hackers to exploit defenders’ vulnerabilities.

Beijing’s Response and Microsoft’s Measures

Despite Beijing’s denial of any role in the hacking events, Microsoft has enacted preventive measures. The company recognizes the risk that information shared with its partners could be misused and has adopted known and confidential strategies to mitigate this risk.

Microsoft’s Inquiry and Future Actions

Microsoft has not revealed specific information about the companies impacted by these restrictions or the progress of its investigation into the hacking events. Nonetheless, the company has reiterated its dedication to evaluating participants and suspending or terminating relationships with any that breach their contractual obligations, particularly those against engaging in offensive cyber operations.

Conclusion

Microsoft’s choice to restrict access for certain Chinese companies to its cyber early warning system underscores the ongoing tensions and challenges present in the global cybersecurity landscape. With allegations of hacking and potential vulnerabilities, the technology leader is taking decisive actions to safeguard its systems and ensure its information remains secure.

Questions & Answers

Q: Why did Microsoft limit access for companies in China?

A: Microsoft implemented restrictions following accusations that Chinese organizations participated in hacking efforts against its SharePoint servers.

Q: What is the Microsoft Active Protections Program (MAPP)?

A: MAPP is a program that alerts security vendors globally about cybersecurity threats ahead of the general public, enabling them to enhance their protective measures.

Q: What is proof-of-concept code, and why does it matter?

A: Proof-of-concept code simulates the operations of malicious software, assisting cybersecurity professionals in fortifying their systems, but it can also be misappropriated by hackers.

Q: How has Beijing reacted to the hacking accusations?

A: Beijing has refuted any claims of involvement in the hacking events aimed at Microsoft’s SharePoint servers.

Q: What measures is Microsoft taking to prevent the misuse of its information?

A: Microsoft is employing both known and confidential strategies to avert misuse while conducting ongoing reviews of participants to identify contractual violations.