In a significant move to safeguard consumer privacy, the Information Commissioner's Office (ICO) has released new guidance for manufacturers of smart home appliances, aiming to rein in what some describe as "disproportionate surveillance" by everyday gadgets. The guidance comes after an investigation by consumer champion Which? uncovered alarming data collection practices by certain smart devices, including air fryers, smart TVs, and smartwatches. With an estimated four out of five people in the UK owning at least one smart appliance, the new rules are designed to protect a vast segment of the population from potentially intrusive data collection. The Which? investigation highlighted several concerning instances. Three air fryers, manufactured in China were found to record audio on owners' phones without a specified reason and some were observed sending personal data to Chinese servers, although this was noted in their respective privacy notices. The new guidance mandates that manufacturers and developers adopt a "data protection by design and default" approach. Smartwatches and fitness trackers are also explicitly covered by the new guidance, with the ICO advising extra caution for "special category data" like a user's BMI or fertility information. The Which? study found that the Huawei Ultimate smartwatch requested nine "risky" phone permissions, more than any other device in the investigation. These risky permissions typically include access to precise location, audio recording capabilities, stored files, or the ability to view all other installed apps. Huawei has stated that all requested permissions have a justified need, and there is no suggestion of illegal behavior by any of the companies mentioned in the study. Australian Context: A Similar Path Towards Stronger Protections The UK's proactive stance on smart device privacy resonates strongly in Australia, where similar concerns about data collection and security have been growing. While Australia does not have an identical regulatory body to the ICO, the Office of the Australian Information Commissioner (OAIC) plays a key role in upholding privacy rights under the Privacy Act 1988 (Cth). Significantly, Australia has recently introduced its own legislative measures to address these issues. The Cyber Security Act 2024 (Cth), which received Royal Assent in November 2024, is a landmark piece of legislation that includes provisions for mandatory minimum cyber security standards for smart devices. These "Cyber Security (security standards for smart devices) Rules 2025" are set to come into effect on March 4, 2026. These Australian rules will require manufacturers and suppliers of internet-connectable products intended for consumer use to comply with specified security standards. Key requirements include:
The OAIC has also been actively engaged in promoting "privacy by design" for all digital products, including AI systems, and has issued guidance emphasizing transparency, accuracy, and the need for informed consent, particularly for sensitive personal information collected by IoT devices. Ep344 Image created by AI
0 Comments
The coordinated sting resulted in the arrest of 32 individuals globally. Authorities also seized significant data, including over 100 GB of information, and took down more than 20,000 malicious IP addresses and domains linked to infostealer activities. Furthermore, 41 servers supporting these illicit operations were confiscated. "Operation Secure" has been instrumental in protecting countless individuals from financial fraud and identity theft. As a direct result of the operation, 216,000 victims have been notified that their data was compromised, enabling them to take protective measures. Infostealer malware poses a significant threat, covertly infiltrating systems to siphon off sensitive information such as banking credentials, passwords, browser history, and even cryptocurrency wallet information. This global threat has a tangible impact in regions like Australia, where recent reports indicate over 30,000 Australian banking passwords were harvested by infostealers between 2021 and 2025, affecting customers of major banks and even superannuation funds. Cybersecurity experts note that these modern infostealers are increasingly capable of bypassing multi-factor authentication (MFA) by stealing session cookies, presenting a critical challenge for both individuals and organisations. The Australian Signals Directorate (ASD) has repeatedly warned of this "silent heist" accelerating into 2024, emphasizing its role as a precursor to more significant cyber incidents. The success of "Operation Secure" highlights the critical importance of international cooperation in combating cybercrime and safeguarding digital security on a global scale. Perhaps we can breathe a tad easier now… at least for a little while. Ep342 Image created by AI
Launched in 2022, ANZ Plus has already onboarded over one million customers, steadily building out new features and products. A key upcoming innovation for the platform is the rollout of fully password-less web banking, promising a more secure and streamlined online experience. The ambitious long-term goal is to run the entire retail bank on Plus by 2029, a move that will encompass not only the six million existing ANZ customers but also the 1.2 million customers recently acquired from Suncorp Bank. For existing ANZ customers, the migration to the Plus platform will be a gradual process over the coming years, though a precise timeline for individual customers has not yet been provided. However, ANZ has reassured customers that vital details such as existing BSB and account numbers, credit card numbers, and direct debits will be retained, aiming for an experience akin to a seamless app upgrade. ANZ Plus offers a suite of modern banking tools designed to help customers manage their finances more effectively. These include smart saving features like "roundups" (where spare change from transactions is saved) and predictions for upcoming bills, moving towards a more proactive and digitally-driven banking experience. So if you’re an ANZ customer, be ready for the change. Ep341 Image created by AI
The most noticeable change for many will be the personalised homepage, tailoring content to individual user preferences and habits. Complementing this, the Store's search function has become far more intelligent and intent-aware, leveraging signals like app updates and ratings to deliver more relevant results and better address language-specific nuances. For users in the United States, (and soon to be released everywhere) a standout addition is the integration of Copilot, now accessible directly from product pages to answer questions as you browse. Discovery is also getting a major uplift. A new “Discover More” section on product pages will surface related content, helping users find complementary apps and games. Furthermore, new product page badges will clearly indicate apps boasting AI features and those specifically optimized for the new generation of Copilot+ PCs, making it easier to identify cutting-edge software. Beyond new features, Microsoft has made substantial strides in performance and reliability. The Store now launches an impressive two times faster than it did just six months ago, and installation reliability and speed have seen significant improvements. Gamers will particularly appreciate the new ability to install individual components for games, offering greater control over downloads. Everyday conveniences include faster in-app rating dialogs and a new field on product pages indicating when an app or game was last updated, providing crucial transparency for users. Perhaps one of the most streamlined features is the ability to install apps directly from Windows Search. Users can now search for an app or game from the Windows search bar, and if available in the Store, quickly initiate the installation without needing to fully open the Store application. These comprehensive updates underscore Microsoft's ongoing commitment to refining the Windows experience, making the Microsoft Store a faster, more intuitive, and more secure hub for digital content. Ep340 Image created by AI
While schools commonly deploy robust firewalls and content filters to block social media, chat apps, and unauthorized websites, the integrated collaboration tools within popular productivity suites like Microsoft 365 often slip through the cracks. These features, designed for legitimate co-editing and project work, allow users to chat in real-time within a shared document or spreadsheet. "We first noticed it when a teacher caught two students giggling while 'working' on a shared history project," explained one school IT administrator, who requested anonymity due to the sensitive nature of the discovery. "On closer inspection, their 'edits' were minimal, but the chat pane was filled with rapid-fire messages discussing everything from weekend plans to exam answers. Our usual filters don't flag internal chat within a Word document as 'social media' traffic." The technique is simple yet ingenious. Students create a new, often meaningless, Word document or Excel spreadsheet, then share it with their intended recipient(s) within the school's network. Once the document is open, they use the built-in chat function (often found in the top right corner, usually with a speech bubble icon) to exchange messages. Because the communication is embedded within a Microsoft application and routed through the school's legitimate network traffic for Microsoft 365 services, it largely goes undetected by standard web filters looking for external chat applications. The messages are typically ephemeral, as the chat history might only persist as long as the document is open or within a recent activity log. However, for quick, real-time exchanges during class, it proves to be a surprisingly effective loophole. Ep339 Image created by AI
This service leverages the advanced "direct to cell" capabilities of new SpaceX Starlink satellites. While only 25-30 percent of Australia currently boasts traditional mobile coverage, Telstra's new offering aims to bridge this vast communication gap. How do you turn it on?..."As long as your phone has a direct line of sight to the sky, your phone will show 'Telstra SpaceX' as the mobile network, with a Satellite icon in the signal strength area" This seamless connection allows Telstra customers on an upfront plan to send text messages to any Australian mobile number, regardless of their location, from the remotest outback to the most isolated coastal stretches. The service's initial rollout is exclusively for the latest Samsung Galaxy S25 with the newest software update. However, hints from testing in the USA suggest broader device compatibility is on the horizon, with older Samsung phones, recent iPhones (from the last 3-4 years), Google devices, and Motorola's foldable Razr potentially gaining access via future software updates and Telstra network validation. Telstra's move places it ahead in the satellite-to-phone race in Australia. While Optus had an earlier deal with SpaceX, certification delays allowed Telstra to swiftly capitalize on the technology. Vodafone is also reportedly testing similar capabilities with an alternative satellite provider (I think Lynk Global and AST SpaceMobile) While the service is currently limited to SMS, making it unsuitable for Triple Zero emergency calls, its implications for safety and connectivity are immense. Users can now communicate with friends and family from previously unreachable areas, offering peace of mind for adventurers, remote workers, and residents alike. Looking ahead, Telstra plans to introduce voice calling capabilities in 2026, with slow data access for messaging applications also on the roadmap. For a nation defined by its vast and often uninhabited landscapes, Telstra Satellite Messaging represents a revolutionary leap forward, fundamentally altering how Australians connect in the bush, on remote roads, and in any location far from traditional mobile towers. Ep338 Image created by AI
The first line of defense for your email, social media, and other online accounts is often woefully inadequate as we are generally not implementing good password hygiene. Make them long and strong… and… if there’s a MFA option, use it! Two-factor authentication adds an extra layer of security beyond just your password. When you log in, in addition to entering your password, you'll need to provide a second piece of verification, such as a code sent to your phone via text message. This dramatically increases security, as even if a criminal manages to guess or steal your password, they still can't access your account without that second factor. 2FA works by providing a critical second layer of security before someone can access an account. This can be done through an authenticator app, SMS message, hardware security key or biometric verification (using facial scans, eye scans or fingerprints). These verification factors are often time-sensitive, ensuring they cannot be reused. By reducing reliance on passwords alone, 2FA effectively protects against phishing and other common cyber threats, making it a simple yet powerful tool for enhancing online security. How to Set Up 2FA Securely Most online platforms, including email and social media, offer the option to set up 2FA. Look for it in your account's "Settings," "Security," or "Privacy" sections. You can typically choose between receiving codes via email, SMS, or using a dedicated authenticator app. Pick an option that is easily accessible for you. When you attempt to log in, you'll either receive a text or email with a 2FA code, or an alert from your authenticator app requiring you to enter a code. This crucial step locks out attackers, even if they have access to your email, and significantly deters automated or mass attacks. Can You Still Be Hacked with 2FA? While 2FA makes it significantly harder for cybercriminals to breach your accounts, it's not entirely foolproof. Not all 2FA methods offer the same level of security. Text message codes, for instance, are considered less secure than other methods because criminals can sometimes intercept these codes or even trick phone network employees into creating a SIM card with your number. "While 2FA offers an important layer of protection against credential theft and breaches, not all 2FA methods are equally secure – SMS-based codes can be intercepted by bad actors, so authentication apps offer stronger protection," Using two-factor authentication makes it more difficult for hackers to get into your account. It’s still worth ensuring that all passwords are strong, secure and unique – particularly for your email account, as criminals can use this to reset other passwords. Use a password manager app to store passwords, making it easier to use unique passwords for each account. And even if you use 2FA, stay alert, "2FA alerts on a smartphone can serve as a critical warning sign that your account’s credentials have been compromised, providing an opportunity to update your password before the account is breached." Ep336 Image created by AI
Many antivirus programs are doing a lot of work scanning everything you open and access, this can cause your PC to slow down while it does all thai work. Smart App Control’s job is to do the preliminaries and determine if a file is safe without needing to engage with the AV software to check the file. This should reduce a significant amount of system overhead and your PC should run smoother as a result. The added advantage of Smart App Control is that malware files can be pro-actively intercepted before they are executed. Antivirus programs on the other hand often don’t respond until after a threat has been detected. The upshot: This could be good, but keep your existing AV software for the time being. The catch: You may need to do a fresh install of Windows 11 to activate this new feature. Ep333 Image created by AI
If you have a Pixel 6 series or newer, including the Pixel Tablet and Pixel Fold, there’s a comprehensive suite of UI changes across various core elements of the Android system. If you are eager for a first look, you can enroll your compatible devices in the Android Beta Program. Dubbed the "Material 3 Expressive" update, this is far more than just a cosmetic tweak. It brings a holistic approach to Android's visual language, emphasizing fluidity, personalization, and a more intuitive interaction model. Key highlights include:
Ep332 Image created by AI
The Bad News: Underdark.ai's follow-up report indicated that a sample of the purported data for sale included recent 2025 2FA SMS logs. This leaked information seemingly contained one-time access codes sent to users, along with message content, delivery status, metadata, routing costs, and crucially, phone numbers. The potential exposure of even this limited data understandably caused alarm among Steam users. The Good News: Valve, the company behind Steam, has stepped forward to address these concerns, and their statement offers a significant sigh of relief. According to Valve, none of the leaked data was ever linked to Steam accounts. Their investigation revealed that the exposed information consisted of older text messages containing one-time codes, which are only valid for a brief 15-minute window, along with the associated phone numbers. Crucially, Valve explicitly stated that the leaked data did not include any association between these phone numbers and Steam accounts, passwords, payment information, or other personal data. Furthermore, Valve reassured users that these old text messages cannot be exploited to compromise Steam accounts. They also highlighted the existing security measures in place, such as email and Steam secure message confirmations for any SMS-based email or password changes. The Bottom Line: While the news of any data leak is unsettling, Valve's swift response and clarification offer a considerable silver lining. Steam users can take comfort in knowing that their sensitive account information appears to be safe. However, this incident serves as a potent reminder to remain vigilant about online security. Valve strongly recommends that all Steam users who haven't already done so set up the Steam Mobile Authenticator, providing an even more secure method for account protection and communication about account safety. It's also crucial to treat any unsolicited account security messages with suspicion. So, while a potential crisis was averted, the importance of proactive security measures remains paramount for all Steam users. Ep331 Image created by AI
This move effectively signals the gradual sunsetting of Google Assistant, with Gemini poised to become the default assistant experience for Android users across their various devices. The integration of Gemini promises a more natural and less robotic interaction, leveraging the power of AI to understand and respond to a broader array of user requests. For Wear OS users, Gemini's arrival, announced alongside Wear OS 6, will see it take over the assistant functionalities. This integration will allow users to perform tasks directly from their wrist, such as setting reminders, saving important information like gym locker numbers, and retrieving details about restaurants mentioned in emails – all without needing to reach for their phones. The AI-powered assistant is expected to offer more intuitive voice interactions and a greater capacity to understand complex commands. The automotive experience via Android Auto is also set for a significant upgrade with the introduction of Gemini. Beyond standard assistant features, Gemini in the car will be capable of finding charging stations along a route for electric vehicle users. Notably, it will also integrate with messaging apps to summarize incoming messages and even translate replies before they are sent, a particularly useful feature for drivers who need to communicate safely while on the road. Furthermore, the "Gemini Live" feature will offer a more conversational AI companion for longer commutes, allowing users to engage in more natural dialogue. Gemini on Android Auto will also provide personalized news summaries, with the option to exclude specific topics like sports, and even offer synopses of books. …And, Google TV will also benefit from Gemini's integration, serving as a more intelligent assistant for content discovery. Users will be able to ask for ultra-specific recommendations for shows and movies across various streaming services. While Google TV already functions as a smart home hub, it remains unclear whether the initial Gemini integration will extend to controlling smart home devices. Google's strategy appears to be tailoring the Gemini experience to each specific device category. While the mobile app offers a full chatbot experience, the Wear OS and Google TV versions seem to focus more on traditional assistant functionalities with AI enhancements and app integration. Android Auto, on the other hand, will feature the comprehensive Gemini Live support for more interactive in-car assistance. The rollout of Gemini across these platforms is expected to occur over the coming months, marking a significant step in Google's ambition to make AI a more integrated and seamless part of the user experience across the entire Android ecosystem. This transition signifies the end of the road for Google Assistant as the primary AI helper on these devices, paving the way for the more advanced and versatile capabilities of Gemini. Ep330 Image created by AI
While the company assured customers that usable payment or card details and account passwords were not compromised, the theft of contact information and order history still poses a risk of identity fraud. M&S Chief Executive Stuart Machin stated in a letter to customers that "unfortunately, some personal customer information has been taken," but added that "Importantly, there is no evidence that the information has been shared." However, security experts warn that the hackers responsible could still share or sell the stolen data as part of their attempts to extort M&S. The retailer has not disclosed the number of customers affected but confirmed that all website users have been informed via email. The incident has also been reported to the relevant authorities, and M&S is working with cyber security specialists to monitor for any potential misuse of the stolen data. The ongoing disruption is reportedly costing M&S a significant £43 million per week in lost sales, according to analysis from Bank of America Global Research. Online orders on the M&S website and app have been suspended since April 25th, and the company has yet to provide a timeline for when normal service will resume. In response to the data breach, M&S will be prompting customers to reset their account passwords "for extra peace of mind." The retailer has also urged customers to be vigilant against potential phishing attempts, warning that they "might receive emails, calls or texts claiming to be from M&S when they are not." M&S emphasized that they will never contact customers asking for personal account information like usernames or passwords. The impact of the cyber attack is also being felt by investors, with shares in M&S reportedly down by around 12% over the past month. As the retailer continues to work on restoring its online operations and managing the fallout from the data theft, customers are advised to remain vigilant and follow the guidance provided by M&S to protect themselves from potential scams. Ep329 Image created by AI
A logical use of AI one would think. This will help with the language barrier as well as thick accents, but the enhancements are only one sided. It won’t help the foreigners understand the Aussie accents and lingo. Clearly there would be preference for Australian-based call centres, but this is a smart move using smart technology. Teleperformance, a major player in the call centre industry, have not publicly confirmed which Australian companies are currently using the accent modification technology. Nevertheless, sources indicate that Teleperformance is in discussions with organisations across various sectors, including banking and finance, transport and logistics, gaming and tech, telecommunications, education, and healthcare. This suggests a potentially widespread adoption of AI-powered accent neutralisation in customer service interactions across Australia in the near future. This makes me nervous in the hands of cyber criminals but I’m not sure if this is the chicken or the egg. Ep328 Image created by AI
In theory, once payment is made, the gates should automatically open, allowing the customer to exit. If the system detects that items may not have been paid for, the gates will remain closed. Coles states that team members are available in the self-checkout area to manually open the gates for customers who have paid or who were just browsing and did not make a purchase. There are a number of concerns around customer frustration, false imprisonment, technical glitches (of course), accessibility concerns, general safety concerns and more… I questioned a staff member while I was waiting at the closed gate and she explained that the cameras pick up a customer as they enter the self checkout zone and assign an identifier which then follows the person to the checkout, monitors the transaction and payment then flags the gate that this person can leave. I asked if facial recognition was used and the answer was, um, I don’t think so. Given the recent backlash with Kmart, Bunning and Good Guys using facial recognition, I hope Coles have found a better way to track customers. The (Office of the Australian Information Commissioner ) OAIC launched formal investigations into Kmart and Bunnings due to concerns about their facial recognition practices. As of now, there haven't been similar investigations announced regarding Coles' self-checkout gates specifically related to facial recognition, likely due to Coles' denial of its use. Ep327 Image created by AI
Interestingly, this seemingly trivial etiquette isn't without its proponents within the AI community. Some architects, like Microsoft's design manager Kurtis Beavers, suggest that using polite language can actually influence the AI's responses, fostering more respectful and collaborative outputs. The logic here is that these "prediction machines," as they're sometimes called, learn from the patterns in our prompts, potentially mirroring the level of politeness they receive. A Microsoft memo even suggests that generative AI tends to reflect the professionalism and clarity present in the user's input. A recent survey indicated that a significant majority of US users, around 67 percent, admit to being courteous with their chatbots. While some believe it's simply "the right thing to do," a smaller fraction humorously cite concerns about a future AI uprising as their motivation. Regardless of the reasons behind our digital politeness, the environmental impact of AI is a growing concern. A study by the Washington Post in collaboration with researchers highlighted that even generating a short, 100-word email consumes a measurable amount of electricity. Extrapolate that to the countless lengthy prompts we feed AI chatbots daily, and the energy consumption becomes substantial. The reality is that the data centers powering these AI marvels already account for roughly two percent of global energy consumption, a figure expected to surge as AI becomes more integrated into our lives. So, the next time you're tempted to thank your AI assistant, perhaps consider the broader implications. Perhaps a more direct approach, or even handling the task yourself, might be a more environmentally conscious choice. It's a thought-provoking reminder that even our seemingly small digital interactions carry real-world consequences. Ep326 Image created by AI
Initially launched with the Google TV Streamer last year, Google opened up a preview program allowing users with older hardware to test drive the convenient smart home control center. Now, it appears the feature has officially launched, with reports surfacing over the past 24 to 48 hours of users accessing the Home Panel on various devices, from older Chromecast units to integrated Google TV sets like those from Hisense. The Home Panel seamlessly integrates with your Google Home ecosystem. Once the update hits your device, a simple access gesture (likely bringing up an overlay on the right side of your TV screen) will reveal a dashboard to manage your Google Home-compatible smart devices. This includes everything from adjusting your smart thermostat and checking your video doorbell feed to controlling security cameras, managing speaker volume, and dimming your smart lights. Mirroring the functionality offered by competitors like Apple's tvOS and Amazon's FireOS, the Google TV Home Panel will also display smart home notifications. Imagine seeing a notification pop up on your TV screen when someone rings your Nest Doorbell – a convenient way to stay informed without interrupting your viewing. The widespread availability of the Home Panel is tied to a recent software update for Google TV devices. Upon powering on your updated Chromecast or Google TV, you should encounter a prompt asking to set up the Home Panel. However, this pop-up will likely only appear if you have smart home devices already linked to your Google account. It's crucial to note that the Google account on your streaming device must be the same one connected to your Google Home setup for the Home Panel to function. Additionally, the feature will only be accessible on primary Google accounts and not on children's profiles. This update is also a positive sign for owners of older Chromecast devices, even those that have been discontinued with no new models on the horizon. The rollout of the Home Panel demonstrates Google's commitment to continuing feature updates and improvements for its existing user base. For those invested in the Google smart home ecosystem, this free upgrade transforms your TV into a central control hub, making managing your connected devices easier and more integrated than ever before. Keep an eye out for the software update on your Google TV or Chromecast with Google TV – a smarter home experience on your biggest screen is just around the corner. Ep325
So, it’s time to do an audit of your existing passwords, cut out the fluff and strengthen things up a bit. Here are some essential password tips for everyone:
Ep324 Image created by AI
The Ministry of Education in Beijing outlined that the AI lessons will be integrated into existing subjects where relevant, or offered as standalone classes. The curriculum will be carefully tailored to suit the cognitive abilities of different age groups. Younger students can expect to engage with simple, interactive tasks designed to introduce basic AI concepts, while older students in high school will delve into more complex topics, potentially including machine learning principles and the ethical considerations surrounding AI development. Education Minister Huai Jinpeng, in a press conference held earlier today, underscored the transformative power of artificial intelligence and its profound potential to reshape society across various sectors. He stated that this early introduction to AI will equip the next generation with crucial skills and a foundational understanding necessary to navigate and contribute to an AI-driven future. Minister Huai also announced the forthcoming release of a national AI education white paper, which will provide detailed guidelines and frameworks for the implementation of this nationwide program. "Artificial intelligence is no longer a futuristic concept; it is rapidly becoming an integral part of our daily lives," Minister Huai asserted. "By making AI education mandatory from a young age, we are not only fostering a generation of AI-literate citizens but also cultivating the future innovators and leaders who will propel China to the forefront of this critical technological frontier." This bold step by China reflects a growing international recognition of the importance of AI literacy. Several other nations, including the United States and Italy, have also begun incorporating AI into their educational frameworks, albeit with varying approaches and scope. However, China's move to make AI education compulsory for all students marks a significant escalation in these global efforts. The announcement has sparked a range of reactions from educators, parents, and technology experts. While many applaud the initiative as a forward-thinking strategy to prepare students for the demands of the 21st century, some have raised questions about the readiness of teachers and the availability of suitable educational resources across the vast Chinese education system. The government has assured that comprehensive teacher training programs and the development of high-quality AI education materials are being prioritized to ensure the successful implementation of this ambitious program. All eyes will be on China - at least for now. Ep323 Image created by AI
How it Gets In:
These criminals send out fake emails that look like they're about legal problems or copyright issues. These emails are written in the language of the person they're trying to trick. Inside the email is a link to download what looks like a normal computer program. But this program has a hidden passenger: the ResolverRAT virus. Once you click the link and download this fake program, it secretly injects the virus into the computer's memory. This is like sneaking the secret agent in through the back door without anyone noticing. Why It's Hard to Catch: This virus is clever because it doesn't install itself in the usual way on your computer's hard drive. Instead, it lives only in the computer's short-term memory, making it harder for security programs to find it. It also uses a sneaky trick with the way computer programs handle resources, kind of like hiding messages in plain sight. This helps it avoid being flagged as suspicious by regular security software. The virus is also designed to be confusing. It uses complicated methods to hide what it's doing, and it can even tell if it's being watched by security experts. What it Does: Once inside, ResolverRAT can stick around by secretly adding itself to different parts of your computer's settings, so it starts up every time you turn on your computer. It also tries to connect to the criminals' computers at random times, making it harder to track when it's sending information back to them. If the criminals want it to do something, like steal files, the virus can handle multiple tasks at once without crashing. It can even break down big files into smaller pieces to send them without raising suspicion. It's also smart enough to make sure the internet connection is working before sending anything. Who's at Risk: So far, this virus has been seen in attacks targeting people in countries like Italy, Czech Republic, India, Turkey, Portugal, and Indonesia. This means it's a global problem that could spread to more countries. What This Means for You: Even if you don't work at a hospital or drug company, this shows that criminals are always finding new and sneaky ways to attack computers. It's a reminder to be very careful about clicking links or downloading files from emails you don't trust. For hospitals and drug companies, this is a serious warning to beef up their computer security and teach their staff how to spot these kinds of tricky emails. They need to be extra careful to protect important information and ensure their systems are safe. Ep322 - Image by AI
The Initial Hurdles:
When Windows 11 debuted, its strict hardware requirements, particularly the TPM 2.0 module and modern processor mandates, created a significant barrier for many users. Perfectly functional older machines were deemed incompatible, leading to widespread frustration. As Windows 10 adoption remained dominant, it became clear that the hardware limitations were hindering the widespread transition to the new operating system. A Change of Heart: However, with Windows 10's end-of-life, Microsoft has adopted a more accommodating approach. Recognizing the value of older, reliable PCs, the company has relaxed its hardware requirements, allowing these machines to finally upgrade to Windows 11. Why This Matters:
Microsoft's decision represents a positive shift, balancing technological advancement with user accessibility. By broadening the reach of Windows 11, the company is ensuring a more inclusive and secure computing environment for all. Ep321 - This image is used under the Fair Use provision for the purpose of review and commentary. Source: https://www.microsoft.com/en-au/windows/windows-11
The Trio of Transformation:
These three upcoming models indicate a clear shift in Apple's strategy. While the company will undoubtedly continue to release standard iPhone models with incremental updates, the flagship releases are set to become showcases of groundbreaking design and technology. This renewed focus on innovation aligns with comments from Apple's hardware head, John Ternus, who described upcoming iPhone models as "the most ambitious in the product's history." What This Means for Consumers: The prospect of ultra-thin designs, foldable displays, and radical new aesthetics is sure to generate excitement among iPhone users. After years of relatively similar designs, Apple appears ready to push the boundaries of smartphone technology. This strategic shift could also have significant implications for the broader smartphone market, potentially prompting competitors to innovate and accelerate their own development cycles. The Question Remains: Are you excited about Apple's upcoming new iPhone models? The company is making bold claims, and the next few years will show if they can deliver on the hype. Ep320 - Image by AI and representative of a standard iPhone, not release 17.
What Are Google Play System Updates?
These updates are crucial for delivering features like Android 12’s Privacy Dashboard, the expanded Find My Device network, Theft Detection Lock, and improvements to Play Protect. They allow Google to bypass manufacturer delays and push updates directly to users. The Hidden Update Problem Despite their importance, Google Play system updates are often buried within Android settings. On Pixel devices, they're found under "Settings > Security & privacy > System & updates," separate from the main software update section. Many users are unaware of their existence, leading to significant delays. A recent poll indicated that 21% of users have no idea what these updates are. "On my Pixel 7, my daily driver, where the main software is up to date with the March security patch, the Play system was lagging on a February release. I updated it to the March release and then once more with a more recent March release. And I’m very diligent about this! Imagine if I wasn’t." one user reported. Why the Secrecy? The reason behind Google's lack of transparency remains a mystery. The separation of update menus and the absence of clear notifications contribute to the problem. The very name, "Google Play system updates," is misleading, as many updates have little to do with the Play Store. The core issue is the lack of user notification. Google could easily implement a simple alert when a Play system update is available, but they choose not to. As a result, updates often remain pending until a device restart, which many users perform infrequently. This lag defeats the purpose of Project Mainline, which aimed to deliver updates promptly. How to Check for Updates To check for Google Play system updates:
Regularly checking for these updates is crucial to ensure your device is secure and up-to-date. The Bottom Line Google's failure to adequately inform users about Play system updates is a significant oversight. While the updates are designed to streamline and improve Android, their hidden nature undermines their effectiveness. Until Google addresses this issue, Android users must remain vigilant and proactively seek out these essential updates… every month. Ep319 - Images by MITE Radio (screenshots)
Rappe, who uses MFA on all his other accounts, found this lack of security "pretty strange for a large company." Just weeks later, AustralianSuper was hit by a cyberattack affecting approximately 600 of its 3.4 million members.
Another customer, Sunny Sardana, a retiree in Perth, also reported raising the issue of MFA with AustralianSuper last year. He was told that it wasn't necessary for account logins, only for "high-risk transactions" like withdrawals. "I was flabbergasted," Sardana said. "They said actually they didn't feel it was necessary, and they had other ways of stopping people from accessing things, such as getting your money out — that's where the real security came in." Cyber experts have identified the attacks as "credential stuffing," a relatively unsophisticated form of fraud that exploits stolen usernames and passwords. They emphasized that MFA is a crucial safeguard against such attacks. AustralianSuper has reportedly pledged to reimburse affected customers from fund reserves, including a pensioner who lost $406,000. However, the fund has not responded to specific questions from the ABC regarding the security concerns raised by customers. Other super funds, such as HostPlus and Rest, have also been impacted by the recent cyberattacks. HostPlus stated that their safeguards, including MFA, prevented any financial losses. Rest reported that while no funds were stolen, the personal details of 8,000 members were accessed. Australian Retirement Trust and Hesta reported they were not affected. The incident has highlighted the vulnerability of the multi-trillion-dollar superannuation industry and prompted calls for urgent implementation of robust security measures, particularly MFA. The Financial Services Council had previously recommended mandating MFA systems for superannuation companies by July 2026. As members like Erle Williams, who saw a significant drop in his account balance, anxiously await explanations, the incident raises serious questions about the security protocols of Australia's super funds and the trust placed in them by millions of Australians. Legal experts have also pointed out that financial service providers who fail to exercise due care can face civil claims under the ASIC Act. Ep318 - Image by AI
Effective immediately, Apple Maps will display over 250 dual place names for cities and towns, alongside land borders for Indigenous protected areas and reserves. Users will also see the traditional owners of various regions, presented without delineating specific land boundaries. This initiative extends beyond Maps, with Indigenous place names now integrated into applications such as Weather, Find My, and even third-party apps like Qantas, enabling seamless search and display of dual names. A unique feature of this update allows Indigenous groups to contribute to their representation by submitting community photos and creating place cards, enhancing awareness and understanding. This comprehensive overhaul draws from a wide range of sources, including local language holders, regional and urban language centres, and Aboriginal Land Trusts, with data corroborated by the Australian Institute of Aboriginal and Torres Strait Islander Studies (AIATSIS). "Sharing our story and deep connection to the land is a meaningful moment for our community – a testament to our resilience, history, and vision for the future," said Rodriguez Pindiying, a member of the Mam-ada-werre community. "This isn’t just about geography; it’s about preserving our culture and ensuring Mamadawerre’s legacy for generations. Through Apple, we have the rare privilege of sharing our heritage on a global stage, reminding the world that no matter how distant we may seem, our connection to the land, to each other, and to the world is universal." The update, which is not optional for users and cannot be turned off, brings Australia and New Zealand in line with Canada and the United States, where Apple introduced similar Indigenous land recognition in 2023. With Apple Maps boasting a global audience of approximately 500 million users, the impact of this initiative is far-reaching. "Technology companies communicate to millions and millions of users in ways that have just become second nature for most people," said Steve De Roy, Anishinaabe man and co-founder of the Firelight Group in Canada. "The ability to be able to see Indigenous lands elevated on those platforms becomes really powerful." In New Zealand, Apple collaborated closely with Indigenous cartographers and iwi (Māori tribes) to develop detailed place cards and map icons. "For Tūhourangi, this partnership with Apple Maps is more than just a technological collaboration," said Annie Balle, from Tūhourangi iwi. "It reflects our role as kaitiaki (caretakers), ensuring the protection and accurate representation of our cultural heritage. By bringing our stories to a global audience, we can uphold our narratives, safeguard our data sovereignty, and demonstrate how Indigenous knowledge and technology can work together to promote cultural understanding and sustainability." This landmark update by Apple Maps represents a significant step towards acknowledging and celebrating the rich cultural heritage of Indigenous peoples in Australia and New Zealand, fostering greater understanding and respect on a global scale. Ep 317 - This image is used under the Fair Use provision for the purpose of review and commentary. Source: https://www.apple.com/au
The groundbreaking study, published in the journal Scientific Reports, reveals that a simple "smell test," using odor labels on a card, can effectively distinguish between cognitively normal older adults and those with mild cognitive impairment. This non-invasive and cost-effective approach could revolutionize early screening for neurodegenerative diseases.
The research involved participants sniffing various scents and then completing tasks that tested their ability to discriminate between smells, identify them, and remember them later. Crucially, the tests were designed to be completed independently at home. The results were striking: older adults with mild cognitive impairment consistently performed worse on odor identification and memory tasks compared to their cognitively healthy peers. This reinforces the growing understanding that olfactory dysfunction, or a decline in the sense of smell, can be an early indicator of neurodegenerative diseases. "Early detection of cognitive impairment could help us identify people who are at risk of Alzheimer’s disease and intervene years before memory symptoms begin," explained senior author Dr. Mark Albers from Massachusetts General Hospital and Harvard Medical School. "Our goal has been to develop and validate a cost-effective, noninvasive test that can be performed at home, helping to set the stage for advancing research and treatment for Alzheimer’s." The study also demonstrated the test's versatility, proving effective in both English and Spanish and showing consistent results whether or not a research assistant observed the participant. This suggests the test's potential for widespread use across diverse populations. Dr. Albers, who helped found Aromha, the company that produces the specific smell test used in the research (the Aromha Brain Health Test), and his team are now investigating how smell loss might signal various conditions, including Alzheimer's, Parkinson's, and traumatic brain injury. While the results are promising, the researchers emphasize the need for further studies. Future research will focus on tracking participants over longer periods and incorporating traditional neuropsychological testing to determine if the smell test can reliably predict the development of more significant cognitive decline. "Our results suggest that olfactory testing could be used in clinical research settings in different languages and among older adults to predict neurodegenerative disease and development of clinical symptoms," Dr. Albers stated. Funded by the National Institutes of Health, this research marks a significant step towards more accessible early screening methods, potentially enabling earlier intervention and better management of cognitive health. Ep 315 - Image by AI |
AuthorDelve into the world of MITE Radio through our captivating blogs. From music and tech to community news, our articles offer fresh perspectives and behind-the-scenes glimpses. Stay informed, connect with our community, and explore MITE Radio in a new way today! Archives
June 2025
Categories
All
|