|
How It Works
So basically, you don’t need a Google Nest device if your TV is on 😂 Ep348
0 Comments
What Is Promptware?
What Can It Do?
How to Stay Safe
Ep348 Image created by AI
What the "Everything else" feature does:
Try it! Wallet -> tap + -> Select Everything else -> scan your Driver’s License or something. If you don’t have it yet, it’s coming soon 🙂 Ep348 Image Source: https://wallet.google/
Enhanced Content Discovery: Gemini can help you find content in new ways, such as asking for a recap of a show's previous season, or describing a show you can't remember the name of (e.g., "What's that new hospital drama everyone's talking about?"). Beyond Entertainment: The new AI assistant isn't just for TV and movies. It can answer general knowledge questions, help with homework, find recipes, and even show related YouTube videos to help you learn a new skill. Hands-Free Interaction: Some new TVs with built-in far-field microphones and sensors can allow you to interact with Gemini without a remote, similar to a smart speaker. So if you have a Google TV Streamer Box or maybe a TCL TV 🙂 you are in the box seat for some AI help in the entertainment space. Ep348 Image created by AI
The Rise of a Global Threat Cybercriminals have turned the QR code into a new weapon. They can easily print fake QR code stickers and place them over legitimate ones on public surfaces like parking meters, train stations, or even utility bills. They rely on the victim being in a hurry, with the urgency of a payment or transaction overriding their caution. When the unsuspecting user scans the fraudulent code, they are redirected to a malicious website designed to steal personal information, download malware, or trick them into making an unauthorized payment. This low-effort, high-return tactic is gaining traction as traditional email phishing campaigns become less effective. A study by the cybersecurity platform KeepNet Labs found that 26% of all malicious links are now sent via QR code. The appeal for criminals is the ease with which the scam operates and the user's inability to verify the destination URL just by looking at the code. Why We Fall for It A significant factor contributing to the success of quishing is user trust. A global study by Malwarebytes found that 70% of iPhone users have scanned a QR code to begin or complete a purchase, compared to 63% of Android users. The researchers suggest that the high trust in their devices may cause some users to let down their guard. The same study found that 55% of iPhone users and 50% of Android users believe their devices can keep them safe from cyber threats, highlighting a pervasive and dangerous overconfidence. Experts warn that even stylized QR codes with company logos can be easily copied by cybercriminals, creating a false sense of security. Attackers can even use these codes to infiltrate critical networks or distribute remote access Trojans (RATs), a type of malware that allows hackers full access to a device. As a result, quishing isn't just a risk for consumers; it's a threat to corporate and government security. The Cat-and-Mouse Game of Security The battle against quishing is an ongoing one. Some institutions, like the Children's Museum of Indianapolis, are fighting back by using stylized QR codes and regularly inspecting them for tampering. At the same time, researchers like Professor Gaurav Sharma at the University of Rochester are working on developing "smart" QR codes with built-in security features. However, as a cybersecurity professional noted, "QR codes weren’t built with security in mind; they were built to make life easier." This makes them a perfect tool for scammers. As long as attackers can easily compromise legitimate documents and public surfaces by simply pasting a fake QR code over a genuine one, the onus remains on the user. The best defense is to exercise caution: avoid scanning unwanted or unexpected QR codes, and if you must, always check to see if your phone's camera app displays the full URL before you click on it. Ep347 Image Source: Licensed by Google
If you use AI much, followup suggestions can be both a blessing and a curse, depending on your state of mind 🙂 Good news is there is usually a way to turn it off. Gemini ChatGPT Ep347 Image Source: Screenshot taken by MITE Radio
Enter the “Heat It”—a tiny, absurdly clever dongle that plugs into your smartphone’s USB-C or Lightning port. It’s a heat-based itch obliterator, and it operates on a principle that feels both ancient and futuristic: apply some warmth to a bug bite, and watch the misery melt away. The device heats up to a precise 52 degrees, a temperature that's just hot enough to make your brain go, "Whoa, what's that?" before it decides to forget all about the itching. The feeling is a fleeting sting, a moment of "Ouch, but in a good way," followed by a zen-like calm as the swelling subsides and the itch vanishes into thin air. This is not just a gadget; it's a statement. It’s a tiny, unassuming hero for the modern age. It scoffs at bulky creams and sprays, laughs in the face of calamine lotion, and fits on your keychain like a silent, powerful guardian against the tiny terrors of summer. You can throw it in your backpack, attach it to your keys, or even wear it on a necklace if you want to make a truly bold fashion statement. The “Heat It” is a testament to human ingenuity and our endless quest to solve life's most ridiculous problems with the most ridiculous solutions. AU$30 Ep347 This image is used under the Fair Use provision for the purpose of review and commentary.
Source: https://www.justheatit.com.au/
Here's a breakdown of the key changes: New and Upgraded Speed Tiers NBN is accelerating the speeds of its three highest residential wholesale speed tiers and introducing a new, even faster option. The specific changes for eligible plans are:
Eligibility and Connection Types The speed upgrades are not available for all NBN connections. To be eligible, you must have one of the following connection types:
If you are on an eligible plan and have an FTTP or HFC connection, the speed upgrade will likely happen automatically and at no extra cost. Retail service providers (RSPs) will be rolling out the changes from mid-September 2025. What if I'm not eligible? If you are on a different connection type, such as Fibre to the Node (FTTN) or Fibre to the Curb (FTTC), your speeds will not be automatically upgraded. However, NBN is running a free "Fibre Connect" program that allows many FTTN and FTTC customers to upgrade to an FTTP connection at no standard installation cost. To get the upgrade, you will need to order a plan with a speed tier of 100 Mbps or higher from a participating provider. Other Important Considerations
Ep347 Image created by AI
Here are 6 quickies: 1 Screen brightness. They are big screens and chew through batteries 2. Location services 3. Wireless when using local apps or not connected 4. Notifications - vet them 5. Background app refresh rather than always on 6. Screen lock time or press sleep when you’re not actually using it. Also check Battery Usage in Settings to see the heavy hitting apps. Ep346 Image created by AI
While many in the tech sphere were anticipating another smart fork or a drone that folds laundry, Be CoolMen has opted to address a problem a little closer to home—specifically, the one 37 degrees Celsius problem. The device, which looks like a jockstrap that’s been upgraded by a team of futuristic engineers and a fashion designer with a penchant for medical equipment, uses thermoelectric cooling to stabilize temperatures. “We’ve optimized for a sedentary lifestyle,” said a Be CoolMen spokesperson, speaking from a standing desk. “Our data shows that men, especially those who work in tech, spend a lot of time on their butts. And that’s a tragedy for sperm. So we thought, why not turn your crotch into a mini-fridge? It’s a game-changer.” The company’s press release boasts that the device is made from "certified antibacterial materials" and can "track usage data" for physicians, turning a once-private health matter into a potential conversation starter at your next family reunion. Early reviews are in, and they are, as expected, a mixed bag. One test subject, a tech blogger named Chad, said, "It feels like a tiny air conditioner for my junk. It's oddly refreshing. My test results haven’t changed, but my confidence in a crowded elevator has.” Another reviewer simply wrote, “My wife says I’m spending too much time with my ‘smart undies.’” The COOLMEN device is part of a larger trend in tech to solve a vast array of human problems, real or imagined. From smart socks that monitor your running form to app-controlled water bottles that tell you when you’re thirsty, the tech industry has made it clear that no human function is too mundane to be "optimized." Be CoolMen is currently in talks to integrate the device with popular fitness trackers and social media, so users can soon post their sperm motility score to their Instagram story, or challenge their friends to a "sperm count-off" on a leaderboard. “It's not just a medical device,” said the spokesperson, adjusting his own undergarment. “It's a lifestyle.” Ep346 Image Source: https://becoolmen.com/
"It's like having a little tutor and best friend all rolled into one," says one parent, showcasing her daughter's new "Proxima Bear." "The interactions are surprisingly genuine, and my daughter absolutely adores it." However, the warm feelings quickly turn to questions about data privacy. Every conversation and every shared secret generates a trove of data, raising serious concerns about what happens to that information. Privacy advocates worry that if not handled carefully, this data could pose significant risks. Developers are racing to address these fears, implementing safety features like:
Despite these efforts, consumer watchdogs remain concerned. "We've seen how quickly privacy policies can change and how vulnerable cloud data can be to breaches," warns one expert. "The emotional bond children form with these toys could make them particularly susceptible to exploitation if safeguards aren't rock-solid." As these AI companions become a household staple, the debate intensifies. The challenge is to design a future where the innovation of AI doesn't come at the cost of safety, privacy, and the very innocence it seeks to enhance. The line between a comforting friend and a data-collecting device is a delicate one, and society is just beginning to figure out where to draw it. Ep346 Image created by AI
Remember that game you downloaded for five minutes in 2017? Or that third-party photo editor you used once for a single profile picture? While you may have long since deleted them from your phone, there's a good chance they still have access to your Google account data. This silent app invasion is a pervasive digital threat, and it's a security risk many people aren't even aware of. When you sign in to a third-party app or service using your Google account, you're granting it a specific set of permissions. These permissions can range from viewing your basic profile information to accessing your Gmail, Google Drive, or Calendar data. The problem is, even after you delete the app, that access often remains active in your Google account settings, leaving a digital back door open for potential security breaches. This isn't about malicious hacking, but rather a simple oversight in our digital lives. As we download and discard apps, we create a growing list of services with active access to our most private information. This list is a goldmine for data brokers and a significant point of vulnerability if one of these services were ever compromised. How to Reclaim Your Digital Privacy The good news is that taking back control of your data is a straightforward process, you just need to know where to look.
This quick audit is a vital step in maintaining your online security. Regularly reviewing and revoking permissions for old and unused apps can significantly reduce your digital footprint and protect your personal information from falling into the wrong hands. It's a small task that offers a huge return on your digital peace of mind. Ep346 Image Source: Screenshot taken by MITE Radio
What, why, how, I hear you ask? The "White Phase": The key idea is a "white phase" where autonomous vehicles effectively take temporary control of traffic management at an intersection. This system relies on AVs' ability to communicate wirelessly with each other and with the traffic signal system. Signaling to Human Drivers: When enough AVs are detected approaching an intersection, the white light would illuminate. For human drivers, the instruction during this "white phase" is simple: "Follow the car in front of you." This means if the car ahead (which would ideally be an AV coordinating with the system) proceeds, you proceed; if it stops, you stop. The specific color "white" isn't strictly necessary, as long as the signal is clearly distinguishable and doesn't create confusion with existing red, yellow, or green meanings. AV Coordination: During the white phase, the AVs themselves would coordinate their movements to optimize traffic flow through the intersection. They would essentially become "mobile traffic controllers," using their collective computing power and real-time data to make rapid, efficient decisions on who goes when. This distributed control aims to reduce delays, fuel consumption, and improve overall travel times for all vehicles, not just AVs. Benefits for Mixed Traffic: The simulations conducted by the researchers show significant benefits even with a relatively low percentage of AVs on the road. For instance, delays dropped by 70% when 30% of vehicles were AVs, and even a 10% AV presence led to noticeable reductions in delays. This system is designed to work in "mixed traffic streams," where both human-driven and autonomous vehicles share the road. Impact on Traditional Lights: When there aren't enough AVs to activate the white phase, or if the AV system is not active, the traditional red, yellow, and green traffic lights would function exactly as they do now. Red still means stop, green still means go. What could possibly go wrong 🙂 Ep345 Image created by AI
Malwarebytes Mobile Security for Android offers several features to help protect against phishing messages and other scams. The key features for this type of threat are its Anti-Phishing Alerts and a newer, AI-powered tool called Scam Guard.
How it Works The app works by continuously monitoring your device and its activity. For phishing links, it checks the URLs you're about to visit against a database of known malicious sites. If a link in a message is identified as suspicious, Malwarebytes will warn you before you can proceed to the site. The Scam Guard feature goes a step further by providing a way for you to actively check things you are unsure about. This is particularly useful for scams that don't involve a malicious link but instead try to manipulate you into giving up information or money. Free vs. Premium While some basic features like a manual virus scan may be available for free, a premium subscription is required for real-time protection, which is what is needed for the anti-phishing alerts and web protection. The Scam Guard feature is also available as part of the Malwarebytes Mobile Security app. In addition to phishing and scams, the Malwarebytes Android app also provides:
Ep345 Image Source: Malwarebytes
Bayley, like many of us, recounts the common struggle of cycling through partially used batteries, often storing them for recycling or "just in case." The real headache, he notes, comes when a device unexpectedly dies, forcing a frustrating trial-and-error search for a viable replacement. His solution? A surprisingly effective "bounce test." Here's how to perform this quick test at home:
The Key Observation: The magic lies in how the battery reacts upon impact:
This simple physical reaction provides a quick and clear indicator of a battery's remaining charge, saving precious time and effort. It's a handy piece of everyday science that can help anyone quickly sort through their battery stash, ensuring you grab a good one when you're in a pinch. So next time you're unsure, just drop it and watch. Ep345 Image created by AI
You can't manually force the update, so you'll need to wait until the ESU wizard appears on your PC. The deadline to sign up for this extended support is October 13, 2025, so there's still plenty of time. While Microsoft is slowly rolling out the option to extend support, it has been more aggressive with full-screen reminders urging users to upgrade to Windows 11. End of Free Windows 10 Support: After October 2025, Windows 10 will no longer receive free security updates. Options for Extended Support: Microsoft offers three options, two of which are free, to extend security updates for another year. The ESU Wizard: Users must wait for the "Enroll now (ESU)" wizard to appear in their Windows Update settings to choose one of these options. Slow Rollout: The ESU wizard has been available since late July 2025 but is being rolled out gradually, and many users still don't have it. Lack of User Control: Users cannot manually force the update and must wait for Microsoft to release the wizard to their PC. Ample Time to Enroll: The registration deadline for extended support is October 13, 2025, providing plenty of time. Aggressive Upgrade Reminders: Microsoft is actively showing full-screen notifications to Windows 10 users, urging them to upgrade to Windows 11. Deceptive Messaging: These full-screen reminders often make the "Upgrade to Windows 11" button prominent while making the "Keep Windows 10" option small and difficult to find. Ep345 Image created by AI
Just as we've come to accept that our voice assistants might be listening for commands and pushing ads our way, it's time to extend that scrutiny to every app on our phone. Many apps, even seemingly innocuous ones, can demand excessive access to your device's features and data. The Hidden Dangers of Over-Permissive Apps When you grant an app permission to access your microphone, camera, contacts, or location, you're opening a door. While some permissions are essential for an app's core functionality (e.g., a camera app needs camera access), many others are not. Granting unnecessary permissions can lead to:
Cybersecurity experts frequently find that many apps request far more permissions than they actually need. It's a common practice for developers to cast a wide net, and for users to click "Allow" without fully understanding the implications Check Settings -> Security and Privacy (Android and Apple) -> Permission Manager. You can then tap Camera and see what apps have access and change/update. Also check Location, Microphone, Contacts, Calendar, etc… Ep344 Image created by AI
How does it all work? If your phone and the caller’s phone are connected to the phone network via 4G or 5G, then your phone will receive an “invite” from the caller and it should ring. Why would it not ring?
Ep344 Image created by AI
In a significant move to safeguard consumer privacy, the Information Commissioner's Office (ICO) has released new guidance for manufacturers of smart home appliances, aiming to rein in what some describe as "disproportionate surveillance" by everyday gadgets. The guidance comes after an investigation by consumer champion Which? uncovered alarming data collection practices by certain smart devices, including air fryers, smart TVs, and smartwatches. With an estimated four out of five people in the UK owning at least one smart appliance, the new rules are designed to protect a vast segment of the population from potentially intrusive data collection. The Which? investigation highlighted several concerning instances. Three air fryers, manufactured in China were found to record audio on owners' phones without a specified reason and some were observed sending personal data to Chinese servers, although this was noted in their respective privacy notices. The new guidance mandates that manufacturers and developers adopt a "data protection by design and default" approach. Smartwatches and fitness trackers are also explicitly covered by the new guidance, with the ICO advising extra caution for "special category data" like a user's BMI or fertility information. The Which? study found that the Huawei Ultimate smartwatch requested nine "risky" phone permissions, more than any other device in the investigation. These risky permissions typically include access to precise location, audio recording capabilities, stored files, or the ability to view all other installed apps. Huawei has stated that all requested permissions have a justified need, and there is no suggestion of illegal behavior by any of the companies mentioned in the study. Australian Context: A Similar Path Towards Stronger Protections The UK's proactive stance on smart device privacy resonates strongly in Australia, where similar concerns about data collection and security have been growing. While Australia does not have an identical regulatory body to the ICO, the Office of the Australian Information Commissioner (OAIC) plays a key role in upholding privacy rights under the Privacy Act 1988 (Cth). Significantly, Australia has recently introduced its own legislative measures to address these issues. The Cyber Security Act 2024 (Cth), which received Royal Assent in November 2024, is a landmark piece of legislation that includes provisions for mandatory minimum cyber security standards for smart devices. These "Cyber Security (security standards for smart devices) Rules 2025" are set to come into effect on March 4, 2026. These Australian rules will require manufacturers and suppliers of internet-connectable products intended for consumer use to comply with specified security standards. Key requirements include:
The OAIC has also been actively engaged in promoting "privacy by design" for all digital products, including AI systems, and has issued guidance emphasizing transparency, accuracy, and the need for informed consent, particularly for sensitive personal information collected by IoT devices. Ep344 Image created by AI
Welcome back to our weekly dip into the wonderfully weird world of "The Tech Absurd"! As we Aussies brace ourselves for those crisp (okay, maybe just slightly less scorching) winter evenings, we've stumbled upon a gadget that promises to keep your mitts toasty, even if your fashion choices lean more "singlet and shorts" year-round: the Dnaleao Rechargeable Hand Warmers.
Resembling a rather chunky portable battery pack – because apparently, the pinnacle of hand-warming tech involves looking like you're charging your phone in your palm – these little gadgets pack a surprising punch. With three temperature modes ranging from a mild "slightly less chilly" 95°F to a "feels like you're gently cradling a freshly baked potato" 130°F, you can customize your hand-warming experience. And with a claimed 12-hour battery life from their 4,000mAh cells, you could theoretically keep your hands warm from sunrise to sunset... or at least until you inevitably misplace one in the depths of your backpack. The real absurdity, however, lies in the sheer convenience. Simply grip the warmer to use it. That's it. No frantic rubbing, no awkward glove adjustments, just instant, rechargeable warmth. And when you're done feeling like you've captured a tiny piece of the Outback sun in your hand, just tuck it into your trouser pocket. Because nothing says "stylish adventurer" quite like having two slightly oblong bulges radiating heat from your lower half. So, whether you're battling the frosty air on your morning commute, braving a chilly Bunnings snag sizzle, or just determined to master the art of typing with fingers that haven't turned completely blue, the Dnaleao Rechargeable Hand Warmers offer a techy, if slightly peculiar, way to say "not today, frostbite!" Ep343 Image Source: https://amazon.com
These platform-based password management tools have come a long way from being simple browser autofill features. They've evolved into surprisingly capable, often cross-platform, solutions designed to simplify our digital lives. The Upside: Convenience and Integration For many users, the appeal of these free options is undeniable. They come with several compelling advantages:
The Downside: Limitations and Niche Use Despite their growing capabilities, these built-in managers do come with certain limitations, particularly when compared to dedicated, paid password management services:
So, Should You Use Them? The verdict largely depends on your digital habits. For users who are not particularly tech-savvy, or those with relatively simple online needs and a strong preference for staying within a single ecosystem (e.g., an all-Apple household or someone who lives entirely in Google's cloud), these platform-based password managers are a perfectly viable and secure solution. They offer a significant upgrade over reusing simple passwords or writing them down. However, for individuals who frequently switch between different operating systems or browsers, manage a high volume of complex online accounts, or require advanced features like secure sharing or password auditing, a dedicated, paid password manager might offer a more robust, versatile, and ultimately more secure experience. Ultimately, the best password manager is the one you actually use consistently to generate and store strong, unique passwords. Ep343 Image created by AI
The conventional methods for recycling e-waste, which contains valuable yet hard-to-recover elements like tantalum, gallium, and indium, are often costly, hazardous, and environmentally taxing. These critical minerals, vital for our smartphones, laptops, and advanced electronics, frequently end up in landfills or are processed using methods that pose serious health risks. Enter the humble microwave, repurposed for a much grander task. Researchers, notably a team at West Virginia University with support from DARPA (the U.S. Department of Defense's advanced research agency), are developing a method that uses microwaves to selectively heat specific components within shredded e-waste. By mixing the waste with a carbon-based material, microwaves can precisely activate a chemical reaction that transforms compounds into pure, reusable metals. This process boasts impressive purity levels (over 97% for tantalum) and significantly reduces the need for harsh chemicals, energy consumption, and waste generation. The implications are vast, not just for environmental sustainability but also for national security by ensuring a domestic supply of vital materials. Beyond metals, microwaves are also showing promise in plastic recycling. New techniques are employing microwave irradiation to pretreat tough plastics like PET (polyethylene terephthalate) bottles, making them far more accessible to enzymes. This combination dramatically accelerates the breakdown of plastics into their base components, allowing for more efficient and higher-yield recycling. Furthermore, this innovative microwave technology extends to solar panel recycling. Microwaves can selectively heat silicon components within solar panels, softening the protective plastic coating and allowing for easier de-lamination and recovery of valuable materials without high temperatures or corrosive chemicals. These advancements represent a significant leap forward in our quest for a circular economy. By harnessing the power of microwaves, we're not just finding cleaner ways to recycle; we're unlocking valuable resources from what was once considered waste, paving the way for a more sustainable and resource-independent future. I guess we just need to find a way to sustainably power it! Ep342 Image created by AI
According to cybersecurity firm Bitsight, these cameras are broadcasting video feeds that can be accessed without any form of authentication, encryption, or even the most basic password protection. This means anyone with the right tools or knowledge can potentially view private spaces and activities. The United States appears to be a major hub for this vulnerability, with nearly 14,000 potentially exposed cameras. The states with the highest concentrations of these unsecured devices include California, Texas, Georgia, and New York. Bitsight's Cyber Threat Intelligence team has unearthed evidence suggesting that these unsecured feeds are a hot topic in dark web forums. Cybercriminals are reportedly discussing and sharing methods, tools, and techniques to gain unauthorized access to these video streams. Worse still, access to these unprotected cameras is being bought and sold, highlighting the lucrative nature of exploiting such privacy breaches. Australia is not immune to this widespread issue. Cybersecurity experts and government bodies here frequently warn that many Internet of Things (IoT) devices, including security cameras in Australian homes and businesses, are deployed with inadequate security, often relying on weak or default passwords. This leaves them wide open to exploitation. Actual instances of unsecured camera footage being accessed in Australia have been reported. For example, a rug shop in Cairns was found to be live-streaming its camera footage to a site linked to Russian hackers. Similarly, a mechanic was alerted that his activities were being streamed live online to a compromised website during a home service call. These incidents underscore the tangible risk to privacy and security posed by unsecure camera setups. This incident serves as a stark reminder of the critical importance of cybersecurity best practices, particularly when setting up internet-connected devices. Users of security cameras, whether for personal or business use, must ensure their devices are properly secured with strong, unique passwords, encryption where available, and limited external access to prevent becoming part of this widespread privacy nightmare. Ep342 Image created by AI
While it might not enhance the way you throw, the Tosy RGB flying disc is undeniably a feast for the eyes. At its core, it's a familiar flying disc, perfect for those backyard games and camping adventures with friends and family. However, its secret weapon is a dazzling array of 108 RGB LEDs, capable of emitting a staggering 16.7 million colors. Yes, you read that right – 16.7 million. Because apparently, your backyard frisbee toss just wasn't doing enough to prepare you for a rave. The beauty of the Tosy disc isn't just aesthetic; it brings new possibilities to your outdoor play. Traditional flying disc games, especially those requiring precise throws and catches like Ultimate Frisbee, are often limited to daylight hours because, well, you need to see the disc! But with the Tosy flying disc, the darkness becomes your arena. Its brilliant illumination allows you to keep the game going long after the sun has set, turning your backyard into a dynamic, glowing playground. No more frantic searches for a lost disc in the bushes – unless it's gone really far, in which case, at least it'll look cool while it's missing. So, if you're looking to add a truly unique, visually spectacular element to your outdoor recreation, or just want to make sure your frisbee stands out in a crowd (and in the dark), the Tosy RGB Flying Disc might just be the "absurd" tech gadget you never knew you needed. After all, why just throw a disc when you can throw a disco? Ep342 Image created by AI
The coordinated sting resulted in the arrest of 32 individuals globally. Authorities also seized significant data, including over 100 GB of information, and took down more than 20,000 malicious IP addresses and domains linked to infostealer activities. Furthermore, 41 servers supporting these illicit operations were confiscated. "Operation Secure" has been instrumental in protecting countless individuals from financial fraud and identity theft. As a direct result of the operation, 216,000 victims have been notified that their data was compromised, enabling them to take protective measures. Infostealer malware poses a significant threat, covertly infiltrating systems to siphon off sensitive information such as banking credentials, passwords, browser history, and even cryptocurrency wallet information. This global threat has a tangible impact in regions like Australia, where recent reports indicate over 30,000 Australian banking passwords were harvested by infostealers between 2021 and 2025, affecting customers of major banks and even superannuation funds. Cybersecurity experts note that these modern infostealers are increasingly capable of bypassing multi-factor authentication (MFA) by stealing session cookies, presenting a critical challenge for both individuals and organisations. The Australian Signals Directorate (ASD) has repeatedly warned of this "silent heist" accelerating into 2024, emphasizing its role as a precursor to more significant cyber incidents. The success of "Operation Secure" highlights the critical importance of international cooperation in combating cybercrime and safeguarding digital security on a global scale. Perhaps we can breathe a tad easier now… at least for a little while. Ep342 Image created by AI
|
AuthorDelve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today! Archives
June 2025
Categories
All
|