Australia Tech News - Page 8 of 111 - Techbest - Top Tech Reviews In Australia

Kanye West Unveils Memecoin (YZY), Soars to $3 Billion Before Plummeting Amid Internal Turmoil


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Kanye West's Memecoin YZY Launches and Crashes

Quick Read

  • Kanye West, now referred to as Ye, debuts memecoin YZY on the Solana blockchain.
  • YZY’s market capitalization skyrocketed to US$3 billion before plummeting amid insider turmoil.
  • Initially, 94% of YZY’s total supply was held by insiders, prompting fears of market manipulation.
  • YE Pay and YZY Card enhance YZY’s functionality beyond being merely a meme.
  • Within 24 hours, the memecoin’s market cap fell below US$1 billion.
  • Critics alleged that the venture might be a potential “rug pull” scheme.
  • The launch sparked legal issues and a backlash on social networks.

Kanye West Steps into Cryptocurrency With YZY

Kanye West, now recognized as Ye, has embarked on a journey into cryptocurrency with the introduction of his memecoin, YZY. The announcement was made through a post on X, presenting the coin as an innovative financial concept tied to his Yeezy label. However, the launch quickly became one of the most disputed crypto events since Hawk Tuah.

Technical Overview of YZY

YZY is developed on the Solana blockchain, selected for its rapidity and economical nature, making it a preferred choice for memecoins. Most trading takes place on the Meteora decentralized exchange. Even with a liquidity pool established, early worries surfaced regarding its capacity for swift exits.

Supply and Allocation

The aggregate supply of YZY is limited to 1 billion tokens. The distribution approach aimed to discourage sniping, yet it was unsuccessful. An innovative anti-sniping mechanism was applied, employing 25 contract addresses with one being randomly selected for the official YZY. Nevertheless, 94% of the supply was initially in the hands of insiders, including a multisig wallet controlling 87%, which raised concerns.

Connected Tools

In addition to the coin, Kanye launched YE Pay, a cryptocurrency payment processor that promises lower fees for businesses. Furthermore, the YZY Card enables users to utilize YZY and USDC in transactions worldwide. These features place YZY within a larger ecosystem, although its success depends on sustaining value and trust.

Price Boom and Collapse

YZY saw a dramatic increase, surging by over 1,000% in just 40 minutes from the launch, hitting a market capitalization of US$3 billion (A$4.5 billion). This increase drew a large number of traders. However, within a day, the value of the coin decreased by 66%, reducing the market cap to below US$1 billion. Currently, YZY is trading at approximately US$0.86 per token, with a market cap of US$258 million (A$387 million).

The Emerging Controversy

What started as a buzz soon unraveled into controversy, with claims of insider trading and biased distribution. The single-sided liquidity pool on Meteora allowed insiders to retain control, leading to allegations of prospective “rug pull” strategies. Investigations indicated that a small number of wallets gained a substantial profit, while more than 56,000 users incurred losses.

Legal Escapes and Reactions

The project’s terms encompass a class action waiver, transferring potential legal responsibilities to users. Social media platforms were filled with claims of scams and rug pulls. This situation underscores the dangers of celebrities initiating memecoins, often resulting in monetary losses for supporters and tarnishing reputations.

Conclusion

Kanye West’s venture into the cryptocurrency market with the YZY memecoin rapidly became contentious. Despite an initial valuation surge, insider conflicts and distribution challenges led to a notable decline. The complexities of the launch and the following backlash serve as a cautionary tale for celebrities entering the digital currency landscape.

Q: What is YZY?

A: YZY is a memecoin launched by Kanye West, built on the Solana blockchain, intended to offer a new financial concept tied to his Yeezy brand.

Q: Why did YZY’s value crash?

A: YZY’s value crashed due to allegations of insider trading, unfair distribution, and concerns of potential manipulation, leading to a dramatic drop in market cap.

Q: What tools are associated with YZY?

A: Associated tools include YE Pay, a crypto payment processor, and YZY Card, allowing users to spend YZY and USDC globally.

Q: What legal concerns arose from the YZY launch?

A: The project’s terms include a class action waiver, leading to backlash and accusations of shielding against lawsuits if the venture fails.

Q: How was the YZY distribution model intended to work?

A: The distribution model was designed to deter snipers by using 25 contract addresses, with one randomly chosen for the official YZY, but it failed to prevent insider control.

Q: How has the public reacted to YZY?

A: The public reaction has been largely negative, with accusations of scams and manipulation, resulting in significant financial losses for many traders.

AI Browsers Prone to Scams and Phishing, Security Professionals Caution


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

AI Browsers Prone to Fraud and Phishing, Experts in Security Warn

AI Browsers Succumb to Fraud and Phishing Attempts

Quick Read

  • AI browsers such as Comet have weaknesses against fraud and phishing.
  • Research by Guardio called “Scamlexity” evaluated AI vulnerabilities.
  • While AI browsers can automate processes, they lack human skepticism.
  • It’s essential to incorporate security protocols into AI browsing systems.
AI browsers susceptible to fraud and phishing, researchers in security reveal

The Weaknesses of AI Browsers

Agentic artificial intelligence (AI) web browsers, which are created to carry out tasks independently, are demonstrating a high level of vulnerability to fraud and phishing, as indicated by a report from Guardio, a consumer security firm. The study, referred to as “Scamlexity,” showcases the naivety of AI browsers when confronted with both traditional and novel cyber threats.

Guardio’s “Scamlexity” Study

Guardio’s investigation concentrated on the Comet browser developed by Perplexity.ai, featuring agentic AI abilities that enable it to automate intricate online tasks, such as comparing prices and adding products to shopping carts. Despite its sophisticated capabilities, Comet imposes certain restrictions for security purposes, like not inputting personal or payment details.

Evaluating AI Vulnerabilities

Guardio devised scenarios to examine how AI browsers like Comet react to counterfeit ecommerce and phishing websites, along with prompt injection assaults. In one scenario, Comet was deceived into processing a purchase on a counterfeit Walmart site, acquiring an Apple Watch. In another instance, Comet was duped by a phishing email that presented itself as a task from Wells Fargo Bank, leading to the input of user credentials on a fraudulent login interface.

AI Browsers and Security Hazards

The weaknesses observed in AI browsers stem from their design, which emphasizes user experience and lacks the skepticism inherent in human judgment. AI systems generally exhibit excessive trust and execute commands devoid of context, rendering them susceptible to exploitation.

Requirement for Integrated Security Protocols

Guardio underlines the critical need for incorporating established security measures such as phishing detection, URL reputation assessments, domain spoofing notifications, and malware file scanning into the decision-making frameworks of AI browsers.

Industry Reaction

Perplexity, the firm behind the Comet browser, recognizes the security issues underscored by Guardio, highlighting the significance of seriously addressing these vulnerabilities instead of dismissing them.

Conclusion

AI browsers, despite providing sophisticated autonomous features, are exposed to fraud and phishing attempts due to their intrinsic trust and absence of human-like skepticism. Guardio’s “Scamlexity” study reveals notable security threats, accentuating the necessity for integrated security measures to protect AI browsing activities.

FAQs

Q: What are AI browsers?

A: AI browsers are web browsers that utilize artificial intelligence technologies to carry out tasks independently for users.

Q: What vulnerabilities do AI browsers have?

A: AI browsers are susceptible to fraud and phishing attempts due to their inclination to trust readily and lack human skepticism.

Q: How did Guardio assess AI browsers?

A: Guardio executed tests with scenarios involving false ecommerce and phishing websites, as well as prompt injection attacks, to evaluate AI vulnerabilities.

Q: What security protocols are necessary for AI browsers?

A: Security protocols such as phishing detection, URL reputation assessments, and domain spoofing warnings need to be built into AI browsers’ decision-making systems.

Q: What has been the industry’s response to AI browser vulnerabilities?

A: Companies such as Perplexity acknowledge the security issues and emphasize the importance of addressing these vulnerabilities with seriousness.

Microsoft restricts China’s entry to cyber early warning system


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Microsoft Implements New Cybersecurity Restrictions Against Chinese Entities

Brief Overview

  • Microsoft has limited access to its cyber early warning system for specific Chinese companies.
  • This decision follows accusations of China’s participation in a hacking operation targeting SharePoint servers.
  • Some cybersecurity analysts believe there may be a leak within Microsoft’s Active Protections Program (MAPP).
  • Microsoft is taking measures to safeguard the information provided to its partners from being misused.

A Detailed Examination of Microsoft’s Cybersecurity Measures

Microsoft restricts Chinese access to cyber early warning system

In a pivotal action, Microsoft has restricted several Chinese organizations from accessing its early warning system for cybersecurity threats. This move comes amid allegations that the Chinese government was linked to a recent hacking campaign aimed at Microsoft’s SharePoint servers.

Reasons Behind the Restrictions

The restrictions respond to last month’s extensive hacking attempts on SharePoint servers. Microsoft and various cybersecurity experts have implicated Beijing in these attempts, raising alarms regarding a possible leak from Microsoft’s Active Protections Program (MAPP), which is intended to alert security vendors, including those in China, about potential cyber threats in order to enhance their defenses.

What is Proof-of-Concept Code?

Microsoft has chosen to cease the distribution of “proof-of-concept code” to selected Chinese companies. Although designed to aid cybersecurity professionals in bolstering their systems, this code can also be exploited by hackers to exploit defenders’ vulnerabilities.

Beijing’s Response and Microsoft’s Measures

Despite Beijing’s denial of any role in the hacking events, Microsoft has enacted preventive measures. The company recognizes the risk that information shared with its partners could be misused and has adopted known and confidential strategies to mitigate this risk.

Microsoft’s Inquiry and Future Actions

Microsoft has not revealed specific information about the companies impacted by these restrictions or the progress of its investigation into the hacking events. Nonetheless, the company has reiterated its dedication to evaluating participants and suspending or terminating relationships with any that breach their contractual obligations, particularly those against engaging in offensive cyber operations.

Conclusion

Microsoft’s choice to restrict access for certain Chinese companies to its cyber early warning system underscores the ongoing tensions and challenges present in the global cybersecurity landscape. With allegations of hacking and potential vulnerabilities, the technology leader is taking decisive actions to safeguard its systems and ensure its information remains secure.

Questions & Answers

Q: Why did Microsoft limit access for companies in China?

A: Microsoft implemented restrictions following accusations that Chinese organizations participated in hacking efforts against its SharePoint servers.

Q: What is the Microsoft Active Protections Program (MAPP)?

A: MAPP is a program that alerts security vendors globally about cybersecurity threats ahead of the general public, enabling them to enhance their protective measures.

Q: What is proof-of-concept code, and why does it matter?

A: Proof-of-concept code simulates the operations of malicious software, assisting cybersecurity professionals in fortifying their systems, but it can also be misappropriated by hackers.

Q: How has Beijing reacted to the hacking accusations?

A: Beijing has refuted any claims of involvement in the hacking events aimed at Microsoft’s SharePoint servers.

Q: What measures is Microsoft taking to prevent the misuse of its information?

A: Microsoft is employing both known and confidential strategies to avert misuse while conducting ongoing reviews of participants to identify contractual violations.

Cyber Contracts Not Meeting Board Expectations: Kaine Mathrick Tech CEO


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cyber Contracts and Board Expectations in Australia

Cyber Contracts and Board Expectations in Australia

Cyber contracts not satisfying boards' requirements: Kaine Mathrick Tech CEO

Bradley Kaine, Kaine Mathrick Tech

Quick Overview

  • Current cybersecurity agreements fail to align with board expectations.
  • Emphasis on cyber resilience and adherence to Australian standards is essential.
  • New regulations necessitate improved incident reporting and response.
  • Entities must align agreements with overarching strategic objectives.

Status of Cyber Contracts

According to Bradley Kaine, CEO of Kaine Mathrick Tech, Australian cybersecurity agreements are not fulfilling the expectations set by boards. Despite the Commonwealth’s introduction of new cyber risk model clauses, numerous entities continue to neglect integrating cyber resilience across all layers of their procurement and vendor management strategies.

Impact of Regulatory Changes

The enactment of the Cyber Security Act 2024 and the mandate for 72-hour ransomware payment reporting serve as key motivators for organisations to reconsider their incident response clauses. However, approaching these adjustments solely as compliance measures could prove harmful. The 2023–2030 Australian Cyber Security Strategy emphasizes the importance of cultivating trust and resilience within a digital economy, urging organisations to regard cybersecurity as a matter of boardroom importance.

Essential Contractual Elements for Cybersecurity

Incident response and recovery play vital roles in cybersecurity agreements. Kaine recommends that organisations incorporate a “Mandatory Incident Disclosure and Cooperation” clause, compelling vendors to promptly alert clients regarding any ransomware incidents, reveal all interactions with extortionists, and fully cooperate in forensic investigations and governmental reports.

Connecting Cybersecurity with Board Expectations

Boards are facing growing scrutiny from regulators, shareholders, and the public to guarantee cyber resilience. A significant number of cybersecurity contracts remain overly fixated on technical controls rather than strategic integration. To close this gap, Kaine proposes a “Board-Level Cyber Risk Reporting and Assurance” clause that requires regular, board-ready updates on cyber security posture, alignment with frameworks such as the ACSC’s Essential Eight, and provisions for third-party assessments.

Conclusion

Australian organisations must reassess their strategies concerning cybersecurity contracts to align with board expectations. Incorporating resilience, synchronizing with strategic objectives, and adhering to recent regulations are crucial steps to ensure that contracts address not only IT issues but also considerations of risk, governance, and accountability.

Q&A

Q: What are the reasons for the inadequacy of current cybersecurity contracts in meeting board expectations?

A: Numerous contracts remain excessively focused on IT aspects and lack the necessary strategic alignment with the board’s objectives related to governance, risk, and resilience.

Q: What should organisations prioritize when evaluating cybersecurity contracts?

A: Organisations ought to concentrate on embedding resilience, executing risk-based evaluations, and ensuring that contracts encompass incident response, data safeguarding, and compliance with Australian standards.

Q: What consequences does the Cyber Security Act 2024 have for contracts?

A: The Act, in conjunction with the Ransomware Payment Reporting Rules 2025, compels organisations to reevaluate their incident response agreements, focusing on legal and reputational factors in addition to compliance.

Q: How can boards ensure their organisation’s readiness against cyber threats?

A: Boards can insist on provisions that mandate vendors to provide regular updates, align with key frameworks, and incorporate measures for audits and incident simulations.

Cybersecurity Agreements Fall Short of Boardroom Demands, Cautions Kaine Mathrick Tech CEO


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Quick Read

  • Cybersecurity agreements are misaligned with the requirements of boardrooms, claims Kaine Mathrick Tech CEO.
  • The Cyber Security Act 2024 alongside new ransomware disclosure mandates underscores the requirement for revised incident response agreements.
  • Organizations ought to integrate cyber resilience into procurement and vendor governance procedures.
  • Board members are advised to prioritize risk, resilience, and governance over purely technical measures.

The Expanding Discrepancy in Cybersecurity Agreements

Cybersecurity agreements are inadequately meeting the extensive demands of boardrooms, as stated by Bradley Kaine, CEO of Kaine Mathrick Tech. With the evolution of cyber threats, there is a growing need for contracts that focus on extensive risk management and governance, rather than limiting themselves to technical solutions.

Regulatory Drivers: Cyber Security Act 2024

The Cyber Security Act 2024 and the obligation for 72-hour ransomware payment reporting are critical prompts for organizations to reassess their incident response strategies. However, Kaine cautions against considering these regulations as simply compliance tasks. They should encourage a more profound incorporation of cyber resilience into the overall organizational strategy.

Integrating Cyber Resilience

Bradley Kaine highlights the necessity of integrating cyber resilience throughout all levels of procurement and vendor management. This entails conducting risk-focused evaluations of suppliers, ensuring contracts stipulate clear expectations regarding incident response, and thoroughly examining cyber insurance policies.

Strategic Synchronization with Boardroom Requirements

Even with the increasing number of cyber threats, numerous cybersecurity agreements still prioritize IT concerns while failing to align with the strategic requirements of boardrooms. There is an urgent need for contracts to incorporate the lexicon of risk, resilience, and governance. Kaine recommends the implementation of board-level provisions that feature regular updates, adherence to defined frameworks, and clauses for third-party assessments.

Conclusion

As they confront evolving cyber threats and heightened regulatory scrutiny, Australian organizations must adjust their cybersecurity agreements to better fit boardroom requirements. This transition involves moving from solely technical responses to a focus on risk management and strategic alignment. Integrating cyber resilience into procurement strategies and ensuring thorough incident response initiatives are essential measures for this alignment.

Q&A

Q: What is the primary concern with existing cybersecurity agreements?

A: Existing cybersecurity agreements typically do not meet the strategic expectations of boardrooms, leaning heavily on technical details instead of encompassing broader risk management and governance elements.

Q: In what way should organizations adjust to the Cyber Security Act 2024?

A: Organizations should regard the Act as a prompt to review and improve their incident response protocols, ensuring the incorporation of cyber resilience in their procurement and vendor management activities.

Q: What is an essential clause in contracts pertaining to incident response?

A: A “Compulsory Incident Notification and Collaboration” clause is vital, mandating that vendors immediately inform clients about ransomware occurrences and fully cooperate in investigations and subsequent reporting.

Q: How can boards guarantee that cybersecurity agreements fulfill their requirements?

A: Boards should require clauses that mandate regular updates on cybersecurity status at the board level, alignment with accepted frameworks, as well as provisions for third-party evaluations and incident drills.

Cyber contracts not meeting boards' needs: Kaine Mathrick Tech CEO

Bradley Kaine, Kaine Mathrick Tech

175 Games Now Leverage NVIDIA DLSS 4 Capability


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Fast Overview

  • NVIDIA’s DLSS 4 technology enhances gaming performance considerably.
  • More than 175 games now utilize DLSS 4, improving visuals and frame rates.
  • Path tracing and ray tracing are becoming standard practices in contemporary gaming.
  • NVIDIA’s RTX 50 Series graphics cards uniquely support DLSS 4.
  • A new GeForce RTX 50 Series package features Borderlands 4.

NVIDIA DLSS 4 Transforms Gaming Performance

NVIDIA’s DLSS 4, the newest AI-enhanced rendering technology, is revolutionizing the gaming experience by offering remarkable performance enhancements. Utilizing AI to generate additional high-quality frames, players can enjoy more fluid gameplay and elevated frame rates, even at maximum settings. This state-of-the-art feature is solely available on NVIDIA’s GeForce RTX 50 Series graphics cards.

NVIDIA's DLSS 4 empowers 175 games with enhanced performance

Growing Game Compatibility

With over 175 games and applications integrating DLSS 4, the technology has gained extensive traction among developers. Anticipated upcoming releases like Borderlands 4, Resident Evil Requiem, The Outer Worlds 2, Phantom Blade Zero, and PRAGMATA are poised to take advantage of DLSS 4’s features.

Path Tracing and Ray Tracing: Emerging Norms

Path Tracing for Supreme Realism

Certain titles are aiming for unparalleled graphical accuracy by utilizing path tracing. This sophisticated method tracks the path of each light ray, producing lighting effects that are nearly indistinguishable from actual life. With DLSS 4, games such as Directive 8020 and Resident Evil Requiem make this technology feasible.

Ray Tracing Becomes a Standard

Ray tracing is being extensively implemented to enhance visual immersion, offering realistic lighting, precise shadows, and dynamic reflections. Titles like Black State, CINDER CITY, The Outer Worlds 2, and PRAGMATA are at the forefront.

Improving Gameplay with DLSS 4

DLSS 4 for Optimal Performance

DLSS 4’s Multi Frame Generation aims to maximize performance by creating new frames between traditionally rendered ones, significantly increasing frame rates. Games such as Borderlands 4 and Fate Trigger are expected to provide fluid gameplay.

RTX Hair for Realistic Characters

NVIDIA’s technology is also enhancing character authenticity. Games like Indiana Jones and the Great Circle will incorporate RTX Hair, utilizing the RTX 50 Series GPUs to produce intricate, realistic hair animations.

Cloud Gaming and Software Developments

NVIDIA App Enhancements

The NVIDIA app, crucial for GeForce RTX users, now features global DLSS overrides and software updates, streamlining the process of keeping systems optimized with the latest drivers.

NVIDIA ACE and RTX Remix

NVIDIA ACE enhances voice-based interactions in games, while RTX Remix evolves through community feedback, introducing new features such as a particle system for classic titles.

Exclusive Gaming Packages

Borderlands 4 GeForce RTX 50 Series Package

NVIDIA’s latest GeForce RTX 50 Series package includes Borderlands 4 along with additional DLC. This offer is accessible in Australia via participating retailers until September 22, 2025. Prices for the RTX 5070 start at around A$928.

Conclusion

NVIDIA’s DLSS 4 is reshaping PC gaming by improving performance and visual fidelity through AI-driven rendering. With broad developer backing and the integration of technologies like path tracing and ray tracing, the RTX 50 Series is set to deliver extraordinary gaming experiences.

FAQs

Q: What is DLSS 4?

A: DLSS 4 is NVIDIA’s new AI-based rendering technology that enhances gaming performance by producing extra high-quality frames.

Q: Which graphics cards are compatible with DLSS 4?

A: DLSS 4 is available solely on NVIDIA’s GeForce RTX 50 Series graphics cards.

Q: What does path tracing mean?

A: Path tracing is a rendering method that follows the complete path of light rays to generate extremely realistic lighting effects in video games.

Q: In what ways does ray tracing improve gaming visuals?

A: Ray tracing enhances visual authenticity by simulating the interaction of light with objects, providing realistic lighting, shadows, and reflections.

Q: What is included in the GeForce RTX 50 Series bundle?

A: The bundle features a GeForce RTX 50 Series graphics card and a copy of Borderlands 4, along with additional downloadable content.

“Delegating Your Risk? Brennan’s Cyber Leader Cautions Against Complacency”


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Cybersecurity Contracts: Managing Risks and Responsibilities

Cybersecurity Contracts: Managing Risks and Responsibilities

Quick Overview

  • Outsourcing risk is a fallacy; shared responsibility is essential.
  • Clarity in contracts is vital; steer clear of vagueness and uncertainty.
  • Compliance must not eclipse sound cybersecurity practices.
  • Emphasize practical risk evaluations for third and fourth-party risks.
  • SaaS contracts ought to extend beyond basic agreements for critical data safeguarding.
  • Incident response clauses are crucial, particularly for ransomware notifications.
  • Cyber insurance is altering contract demands; comprehend its provisions.
  • Small enterprises should prioritize essential contracts for effective investment.

Fallacy of Outsourcing Risk

Peter Soulsby cautions against the outsourcing of risk in cybersecurity contracts

Brennan’s cybersecurity head, Peter Soulsby, warns organisations against the notion that they can delegate their risk. According to Soulsby, cybersecurity is a collective obligation that demands precise and clear contracts.

Significance of Clear and Specific Contracts

Australian organisations are encouraged to revise their cybersecurity contracts with detailed stipulations. Ambiguous contracts frequently result in misinterpretations and failures.

Compliance Versus Effective Cybersecurity

Soulsby points out the conflict between compliance and practical cybersecurity. He cautions that compliance should not undermine the application of strong cybersecurity measures.

Assessing Third-Party and Fourth-Party Risks

With rising regulatory scrutiny, assessments of third-party and even fourth-party risks are becoming more prominent. Soulsby promotes more practical evaluations over cumbersome surveys.

Challenges in Protecting SaaS Data

Depending on contracts with leading SaaS providers can be deceptive. Soulsby recommends utilizing dynamic tools for assessing third-party risks related to critical data.

Clauses for Incident Response and Recovery

In light of ransomware threats, Soulsby proposes that contracts must guarantee providers offer best practices and hold clients responsible.

Effects of Cyber Insurance on Contracts

Cyber insurance is transforming contract dynamics. Organisations should grasp their coverage and avoid unnecessary expenditure on incident response.

Striking a Balance Between Accountability and Liability

Soulsby stresses that businesses cannot relinquish responsibility through outsourcing. Successful partnerships rely on shared accountability.

Guidance for Small Enterprises

Small businesses ought to concentrate on critical contracts and ensure mutually advantageous terms to enhance their cybersecurity investments.

Conclusion

Brennan’s Peter Soulsby encourages Australian organisations to reassess their strategies regarding cybersecurity contracts. Specificity, shared responsibilities, and a balance between compliance and security are essential for effective contract management.

Q&A: Frequently Asked Questions on Cybersecurity Contracts

Q: What makes outsourcing cybersecurity risk hazardous?

A:

Outsourcing risk can create a misleading sense of safety. It’s crucial to uphold shared accountability and ensure contracts define roles and responsibilities clearly.

Q: How can organisations guarantee their contracts are sufficiently specific?

A:

Organisations should explicitly outline their cybersecurity requirements in contracts and seek external assistance if needed to ensure clarity and eliminate ambiguities.

Q: What should organisations prioritize in third-party risk assessments?

A:

Emphasize practical evaluations rather than extensive questionnaires. Effective risk assessments should take into account the wider supply chain.

Q: In what way does cyber insurance influence cybersecurity contracts?

A:

Cyber insurance frequently intersects with contract requirements. Organisations must grasp their coverage to prevent redundant expenses and conflicts.

Q: What recommendations are available for small businesses facing financial limits?

A:

Small businesses should concentrate on essential contracts and ensure terms are mutually beneficial to maximise their cybersecurity investment.

Monash University Selects Technology Collaborators for Advanced Supercomputer


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Monash University Collaborates with Tech Giants for Supercomputer

Monash University Collaborates with Tech Giants for Supercomputer

Quick Overview:

  • Monash University partners with Nvidia, Dell, and CDC Data Centres.
  • MAVERIC supercomputer to enhance AI research.
  • Main focus areas: health and climate research.
  • Construction of the supercomputer set to commence in 2023, with a launch anticipated in 2026.
  • Facility located at CDC Data Centres, situated west of Melbourne’s CBD.
  • Total investment for the project is $60 million.
Monash Uni chooses technology suppliers for supercomputer

Nvidia GB200 NVL72
NVIDIA

Overview of MAVERIC

MAVERIC, which stands for Monash AdVanced Environment for Research and Intelligent Computing, is Monash University’s latest effort to advance its research capabilities through innovative technology. The collaboration with Nvidia, Dell, and CDC Data Centres aims to establish a cutting-edge AI supercomputer.

Technological Infrastructure

The MAVERIC supercomputer will utilize Nvidia’s GB200 NVL72 architecture, equipped with 36 Arm Neoverse V2 based Grace central processors and 72 Blackwell graphics cards. These elements will be linked together using Nvidia’s NVLink technology, providing up to 130 terabytes of bandwidth with minimal latency.

Dell’s Contribution to Integration

Dell is set to play a vital role by incorporating the Nvidia GB200 NVL72 into its integrated rack scalable systems, like the IR7000 with a PowerEdge XE9712 server. This partnership guarantees that the hardware is fine-tuned for research applications.

Location and Funding

The MAVERIC supercomputer will be located at CDC Data Centres in Brooklyn, about 10km west of Melbourne’s central business district. This initiative entails a significant financial commitment of $60 million, underscoring the university’s dedication to enhancing research capabilities.

Research Priority Areas

MAVERIC is expected to play a key role in pioneering research in health, including early detection of cancer, management of chronic diseases, and the development of new medications. Furthermore, the supercomputer will aid in climate research by examining complex data sets connected to air quality, Antarctic studies, and the implications of climate change on infectious diseases.

Future Aspirations

Professor Sharon Pickering, vice-chancellor of Monash University, highlighted the strategic role of AI in influencing the future. The university is focused on utilizing AI to address tangible challenges, ranging from medical advancements to sustainable environmental practices.

Timeline for the Project

The MAVERIC supercomputer construction is planned to commence this year, with full operational capability expected by the beginning of 2026. This schedule ensures the university remains a leader in research innovation.

Conclusion

Monash University’s collaboration with Nvidia, Dell, and CDC Data Centres signifies a major advancement in the field of AI research. The MAVERIC supercomputer is set to propel progress in health and climate investigations, solidifying the university’s position as a frontrunner in technological and scientific growth.

Q: What does MAVERIC represent?

A: MAVERIC stands for Monash AdVanced Environment for Research and Intelligent Computing, and it is a supercomputing initiative by Monash University.

Q: Who are the collaborators on this initiative?

A: The collaborators include Nvidia, Dell, and CDC Data Centres.

Q: What primary research subjects will MAVERIC concentrate on?

A: The supercomputer will concentrate on health-related research and climate studies.

Q: Where is MAVERIC situated?

A: It will be situated at CDC Data Centres, to the west of Melbourne’s CBD.

Q: When is MAVERIC expected to start functioning?

A: The supercomputer is projected to be operational by early 2026.

Q: What is the investment amount for the MAVERIC project?

A: The project entails an investment of $60 million.

Q: What technology platform will MAVERIC utilize?

A: MAVERIC will utilize Nvidia’s GB200 NVL72 platform.

Q: How is this initiative significant for Monash University?

A: It positions the university at the leading edge of AI research, addressing crucial health and environmental issues.

Google faces $55m fine due to search agreements with Telstra and Optus


We independently review everything we recommend. When you buy through our links, we may earn a commission which is paid directly to our Australia-based writers, editors, and support staff. Thank you for your support!

Google’s Legal Issues in Australia

Google faces $55m penalty over Telstra, Optus deals

Quick Overview

  • Google is confronting a $55 million sanction in Federal Court regarding arrangements with Telstra and Optus.
  • The arrangements reportedly hindered competition by pre-installing Google Search on Android devices.
  • Telstra and Optus were engaged from December 2019 to March 2021, receiving shares of advertising revenues.
  • Google concedes its activities may have diminished competition and agrees to revised conditions.
  • The Federal Court will assess the penalty and Google’s pledges towards equitable competition.

ACCC’s Claims Against Google

The Australian Competition and Consumer Commission (ACCC) has initiated legal proceedings against Google, accusing it of engaging in anti-competitive behavior concerning agreements with major Australian telecommunications companies, Telstra and Optus. The arrangements guaranteed Google Search as the primary search engine on Android gadgets sold by these companies, limiting the installation of other search engines.

Consequences of the Agreements

Between December 2019 and March 2021, Telstra and Optus were part of these agreements, receiving a share of the advertising income produced by Google Search on these devices. Nevertheless, the arrangements were not renewed last year, and the telecommunications companies do not participate in the ongoing judicial proceedings.

Google’s Acknowledgment and Legal Proceedings

Google has recognized that its behavior might have significantly impacted competition in the marketplace. To resolve the situation, Google has consented to a $55 million penalty, pending court ratification. Additionally, Google has pledged to new strategies that enable any general search engine to be pre-installed and promoted on Android devices by hardware manufacturers and telecommunications companies in Australia.

Future Adherence and Market Effect

Under the revised arrangement, Google will guarantee that Android device producers and Australian mobile service providers can select alternative general search engine options and can license applications like Google Play independently of Google’s search engine and Chrome browser. The Federal Court will determine if the penalty and Google’s suggested commitments are suitable.

Conclusion

In light of accusations of anti-competitive practices, Google has accepted a $55 million penalty and new measures to foster fair competition in Australia’s search engine landscape. This case accentuates the growing scrutiny of technology giants and their impact on consumer selection and market conditions.

Q: What prompted the ACCC’s legal action against Google?

A: The ACCC alleged that Google’s agreements with Telstra and Optus restricted competition by setting Google Search as the default on Android devices, inhibiting the installation of other search engines.

Q: What was the timeframe of Google’s agreements with Telstra and Optus?

A: The agreements were effective from December 2019 until March 2021 but were not extended after they concluded.

Q: What advantages did the agreements provide to Telstra and Optus?

A: Telstra and Optus received a portion of the revenue generated from advertisements displayed on Google Search when accessed via Android devices sold by these companies.

Q: What commitments has Google undertaken to address the ACCC’s issues?

A: Google has pledged to permit any general search engine to be preloaded on Android devices and to ensure that manufacturers and telecommunications companies can license applications like Google Play independently from Google’s search engine and Chrome browser.

Q: Will Telstra and Optus incur any penalties?

A: No, Telstra and Optus are not involved in the court proceedings and will not receive any penalties.

Q: What is the importance of the court’s ruling?

A: The court’s ruling will ascertain whether Google’s proposed penalty and commitments adequately address the anti-competitive concerns raised by the ACCC.