HOTTEST

Prakhar Khanna/ZDNETFollow ZDNET: Add us as a preferred source More

Kerry Wan/ZDNETPixel phones have an excellent reputation for smart software, but battery life has been a common complaint with Google’s smartphones. Thankfully, that same smart software is now improving battery life and longevity, though many features aren’t set up for maximum endurance out of the box. I’ve found that a handful of features can dramatically improve how long your Pixel lasts, both in a single day and over the long haul.Also: I’ve owned every Google Pixel flagship phone since the first – here’s why 2025 will be differentHere are the battery tweaks I rely on with my Pixel, and how you can set them up for the best results.1. Use Battery Saver and Extreme Battery Saver modes More

Australia clocked one cybercrime report every 7 minutes in the past year, with ransomware proving to be the “most destructive” threat. State actors also remain a persistent threat for agencies such as the Australian Bureau of Statistics, which personal information on the local population makes it an attractive target. The country saw an almost 13% increase in the number of reported cybercrime cases to more than 76,000 last year, according to the Annual Cyber Threat Report 2021-2022 released by Australian Cyber Security Centre (ACSC). This meant there was one reported case every 7 minutes, up from every 8 minutes in the last financial year, the government agency said. Its annual report contains insights from the Australian Federal Police, Australian Criminal Intelligence Commission, Australian Security Intelligence Organisation, Defence Intelligence Organisation, and Department of Home Affairs.ACSC pointed to ransomware, in particular, as the most damaging, with all sectors in the local economic directly impacted by such attacks last year, where 447 ransomware cases were reported. This figure was a 10% drop from the previous year, but the report surmised that ransomware remained significantly underreported, especially amongst victims who opt to pay a ransom.The education and training sector recorded the most ransomware incidents, moving up from being fourth place the year before, and alongside four others in the top five sectors accounted for 47% of all reported ransomware attacks. “Top-tier ransomware groups are continuing to target Australian ‘big game’ entities–organisations that are high profile, high value, or provide critical services,” ACSC said. “While global trends indicate a decline in ‘big game’ targeting and a shift towards targeting small and midsize businesses (SMBs), that change has yet to be seen in Australia.”State actors a persistent threat amidst geopolitical tensionsWhat it had witnessed in the past year, though, were persistent attempts from state actors looking to access sensitive data, including personally identifiable information, to support their government’s intelligence requirements. Deputy Prime Minister and Minister for Defence Richard Marles said: “We are currently witnessing deteriorating strategic circumstances in our region and globally, including a military buildup unseen since World War II, and expanding cyber and grey zone capabilities are of particular concern.”The Australian Bureau of Statistics, for instance, is an attractive target as it holds personal information on the local population, according to the report. Prior to the national census which was conducted in August 2021, the ACSC said it held threat intelligence briefings with the bureau and assessed cyber activities against the agency. It also conducted a review of the bureau’s systems, which included a source code review, penetration testing to identify vulnerabilities, and analysis to detect malicious activities that might already be in the system. ACSC said it not find any indication of malicious activities and critical cybersecurity recommendations were resolved by the bureau before the census was conducted. While this ran without cybersecurity incident or service disruption, the cybersecurity agency noted that cyber was increasingly the domain of warfare. It pointed to Russia’s use of malware to remove data and shut down computers in Ukraine. It also highlighted a July 2021 incident in which Australia attributed the exploitation of Microsoft Exchange vulnerabilities to China’s Ministry of State Security. The Five Eyes advisory in November 2021 also confirmed an Iranian state actor had exploited the same vulnerabilities. ACSC warned that Indo-Pacific dynamics were fuelling the risk of a crisis and cyber operations were likely to be used by states to challenge the sovereignty of others.”These actors do not just want classified information. They also want to understand who we are, how we connect with each other, and what values we hold,” the Australian agency said. “In some cases, they may seek to pre-position in strategic networks to prepare for coercive or disruptive activity against us.”The report further pointed to Australia’s critical infrastructures, which continued to face potential threat from state actors as well as cybercriminals looking to cause disruptions. “Critical infrastructure encompasses the physical facilities, communication networks, and information and operational technologies that provide essential services,” ACSC said. “A sustained disruption in one part of the critical infrastructure ecosystem has knock-on effects elsewhere in the economy, and could ultimately lead to harm or loss of life, as seen internationally as a consequence of ransomware attacks on health services.”It noted that CS Energy’s corporate network in November last year was targeted by Russia-aligned Conti ransomware group. The Queensland electricity generator, which produces 10% of electricity for the national electricity market, had cut the external online connection to its network after detecting the ransomware attack and initiated business continuity procedures. ACSC said 95 cyber incidents, or about 8% of all cyber incidents it responded to last year, had involved critical infrastructuresAmongst other key findings in its report this year, the security agency estimated that AU$98 million ($62.74 million) was lost to business email compromise incidents, with an average AU$64,000 lost per report. The average cost per cybercrime report for small businesses also climbed to more than AU$39,000, while this figure clocked at AU$88,000 for medium businesses and more than AU$62,000 for large businesses. More than 25,000 calls were made to the country’s cyber security hotline, or an average 69 per day, up 15% from the previous year.Fraud, online shopping, and online banking were the leading cybercrime categories, accounting for 54% of all reported incidents.Marles noted: “This [ACSC] report maps how threat actors across the world have continued to find innovative ways to deploy online attacks, with supply chains used to penetrate cyberdefences of governments and organisations in many countries, including Australia.”Reporting cybercrime is vital for us to build a threat picture that can prevent others from falling victim to the ransomware syndicates and cybercriminals. The best cyberdefence is informed by the best intelligence,” the minister added. The government is seeking stiffer financial penalties for serious or repeated data privacy breaches, pushing maximum fines of up to AU$50 million ($31.57 million). The move comes amidst a spate of cybersecurity incidents that compromised customer data, including Optus and Medibank. RELATED COVERAGE More

Trend Micro has announced the launch of its first Australian Cloud One regional data centre in Sydney.The launch means all of Trend Micro’s SaaS services are now locally hosted in Australia in an Amazon Web Services data centre.Speaking to ZDNet, Trend Micro ANZ VP Ashley Watkins explained the move would better serve local customers, especially government and ASX100 companies that are bound by strict compliance and data sovereignty policies. “What has become clear is that our customers love our Cloud One product, but what was really clear about that feedback was, we want it to also be able to have it locally please because we are governed by requirements, be they regulatory, be they be policy-based requirements … so we’re really answering the call of our customers,” he said.At the same time, Watkins acknowledged the decision to host its services locally was timely given the increase in digital transformation projects across Australia.Trend Micro SaaS services offered to Australian companies historically have been stored in the United States. The launch of its first Sydney region is expected to be one of many globally for Trend Micro, including “several” across Asia-Pacific.
The last time the security giant invested in the Australian market was when it picked up the Australian-based cloud security posture management firm Cloud Conformity for $70 million in 2019.At the time, the company touted the move would help address commonly overlooked security issues caused by cloud infrastructure misconfigurations.As part of the acquisition, all Cloud Conformity staff joined the company, which Watkins has now since grown. “We’ve retained [all the staff] and we’ve now more than tripled the Conformity team, from R&D to services. It’s a huge space globally for Trend Micro that has been running that business out of Australia,” he said.Related Coverage More

MF3d/Getty Images For more years than I care to recall, Linux users have hated NVIDIA, the world’s leading Graphics Processing Unit (GPU) company. Why? Because years after all the other companies open-sourced their drivers, NVIDIA refused to do so. Nor would it give the Linux kernel developers the data they needed to build open-source drivers […] More
Internet of Things
Samsung Spotlights Next-generation IoT Innovations for Retailers at National Retail Federation’s BIG Show 2017
That’s Fantasy! The World’s First Stone Shines And Leads You to The Right Way
LG Pushes Smart Home Appliances To Another Dimension With ‘Deep Learning’ Technology
The Port of Hamburg Embarks on IoT: Air Quality Measurement with Sensors




