logo
‘Exercise caution': Major warning issued to Aussies travelling to Bali after drownings, methanol poisoning incidents

‘Exercise caution': Major warning issued to Aussies travelling to Bali after drownings, methanol poisoning incidents

News.com.au2 days ago

Aussie tourists planning to jet away to a favourite holiday getaway destination have been urged to 'exercise a high degree of caution' after a number of high-profile incidents.
An update from the federal government's Smartraveller website advises tourists to practice caution when visiting Indonesia, especially Bali.
It follows a review of the latest travel advice by the government-run site last week.
'Australians have drowned in coastal areas, due to rough seas and strong rip currents at popular tourist beaches including in Bali. Many beaches are unpatrolled,' the update reads.
The update also warns travellers on drinks that 'may be spiked or mixed with toxic substances'.
'Be alert to the potential risks around drink spiking and methanol poisoning through consuming alcoholic drinks,' it read.
'Cases of methanol poisoning in drinks have previously been reported in Indonesia, including in Bali and Lombok'.
This comes days after a 23-year-old's 'suspicious' death while on holiday in Bali was reported.
Last year, two teens also died from methanol poisoning in Laos, in an incident that shocked the nation and highlighted recent cases in South-East Asia.
The website has also advised foreign tourists to read the Bali Provincial Government's 'Do's and Don'ts' advice before travelling, as well as understanding visa conditions and entry and exit requirements.
'Indonesian authorities have strict standards for damaged passports, and travellers have been refused entry into Indonesia with a damaged passport,' it said.
'Water damage, minor tears or rips to the pages can be considered damaged'.
They also cautions against disrespect of local law and culture.
'Offensive behaviour that fails to respect local culture, religion, places of worship, and traditional ceremonies can lead to criminal penalties and/or deportation.'

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Strip clubs to education hubs hacked in password grab
Strip clubs to education hubs hacked in password grab

The Advertiser

time2 hours ago

  • The Advertiser

Strip clubs to education hubs hacked in password grab

More than 2300 business websites, including dozens in Australia, have been compromised and used to steal consumers' information as part of a year-long, "highly orchestrated phishing campaign", a security firm warns. Almost 80 small and medium-sized Australian businesses have been hacked in the operation, with the websites targeted ranging from a children's education provider to three Queensland strip clubs. Australian online security firm CyberCX revealed details of the attack on Tuesday after alerting compromised businesses, and warned consumers to take care when following website instructions, including completing CAPTCHAs. The details come weeks after several superannuation firms were targeted in a co-ordinated online attack and less than a year after 12.9 million Australians had private information stolen from health provider MediSecure. In a paper called DarkEngine detailing the campaign, CyberCX said it discovered a group had compromised at least 2353 websites since June 2024, including 79 from Australia, 50 from the United Kingdom, and 34 from Canada. The online criminals targeted hundreds of websites using "search engine optimisation poisoning" to publish hacked versions of a commonly used website management tool, the report said. This allowed them to install malicious code on the websites, including fake CAPTCHA features ordinarily used as a security measure to identify website visitors. The effort and resources put into the phishing campaign suggested the criminals behind it were highly motivated, CyberCX intelligence and public policy director Katherine Mansted said, and would sell whatever credentials they could steal. "They're quite omnivorous - there are sex shops through to kids' education websites," she said. "What their objective is here is to compromise as many ordinary citizens' computers as possible for the purposes of financially motivated crime." Stolen credentials such as personal information, logins and passwords had become the leading cause of online attacks, Ms Mansted said, taking over from email phishing attempts. "What we're seeing is an ongoing professionalisation and industrialisation of the cybercrime ecosystem," Ms Mansted told AAP. "I'd love to say that by outing this particular campaign the harm is stopped but it's not, as this is just an example of what we're seeing more and more of." Individuals who might have had their details stolen in the Dark Engine campaign should change their passwords, employ a password manager, and use multi-factor authentication on accounts when possible. Website visitors should also carefully scrutinise CAPTCHA features that look unprofessional, appear in a pop-up window, or ask users to copy code into a computer's command prompt. Stolen passwords were also used to break into 10 AustralianSuper accounts in April in a theft that cost $750,000, National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness confirmed in May. More than 2300 business websites, including dozens in Australia, have been compromised and used to steal consumers' information as part of a year-long, "highly orchestrated phishing campaign", a security firm warns. Almost 80 small and medium-sized Australian businesses have been hacked in the operation, with the websites targeted ranging from a children's education provider to three Queensland strip clubs. Australian online security firm CyberCX revealed details of the attack on Tuesday after alerting compromised businesses, and warned consumers to take care when following website instructions, including completing CAPTCHAs. The details come weeks after several superannuation firms were targeted in a co-ordinated online attack and less than a year after 12.9 million Australians had private information stolen from health provider MediSecure. In a paper called DarkEngine detailing the campaign, CyberCX said it discovered a group had compromised at least 2353 websites since June 2024, including 79 from Australia, 50 from the United Kingdom, and 34 from Canada. The online criminals targeted hundreds of websites using "search engine optimisation poisoning" to publish hacked versions of a commonly used website management tool, the report said. This allowed them to install malicious code on the websites, including fake CAPTCHA features ordinarily used as a security measure to identify website visitors. The effort and resources put into the phishing campaign suggested the criminals behind it were highly motivated, CyberCX intelligence and public policy director Katherine Mansted said, and would sell whatever credentials they could steal. "They're quite omnivorous - there are sex shops through to kids' education websites," she said. "What their objective is here is to compromise as many ordinary citizens' computers as possible for the purposes of financially motivated crime." Stolen credentials such as personal information, logins and passwords had become the leading cause of online attacks, Ms Mansted said, taking over from email phishing attempts. "What we're seeing is an ongoing professionalisation and industrialisation of the cybercrime ecosystem," Ms Mansted told AAP. "I'd love to say that by outing this particular campaign the harm is stopped but it's not, as this is just an example of what we're seeing more and more of." Individuals who might have had their details stolen in the Dark Engine campaign should change their passwords, employ a password manager, and use multi-factor authentication on accounts when possible. Website visitors should also carefully scrutinise CAPTCHA features that look unprofessional, appear in a pop-up window, or ask users to copy code into a computer's command prompt. Stolen passwords were also used to break into 10 AustralianSuper accounts in April in a theft that cost $750,000, National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness confirmed in May. More than 2300 business websites, including dozens in Australia, have been compromised and used to steal consumers' information as part of a year-long, "highly orchestrated phishing campaign", a security firm warns. Almost 80 small and medium-sized Australian businesses have been hacked in the operation, with the websites targeted ranging from a children's education provider to three Queensland strip clubs. Australian online security firm CyberCX revealed details of the attack on Tuesday after alerting compromised businesses, and warned consumers to take care when following website instructions, including completing CAPTCHAs. The details come weeks after several superannuation firms were targeted in a co-ordinated online attack and less than a year after 12.9 million Australians had private information stolen from health provider MediSecure. In a paper called DarkEngine detailing the campaign, CyberCX said it discovered a group had compromised at least 2353 websites since June 2024, including 79 from Australia, 50 from the United Kingdom, and 34 from Canada. The online criminals targeted hundreds of websites using "search engine optimisation poisoning" to publish hacked versions of a commonly used website management tool, the report said. This allowed them to install malicious code on the websites, including fake CAPTCHA features ordinarily used as a security measure to identify website visitors. The effort and resources put into the phishing campaign suggested the criminals behind it were highly motivated, CyberCX intelligence and public policy director Katherine Mansted said, and would sell whatever credentials they could steal. "They're quite omnivorous - there are sex shops through to kids' education websites," she said. "What their objective is here is to compromise as many ordinary citizens' computers as possible for the purposes of financially motivated crime." Stolen credentials such as personal information, logins and passwords had become the leading cause of online attacks, Ms Mansted said, taking over from email phishing attempts. "What we're seeing is an ongoing professionalisation and industrialisation of the cybercrime ecosystem," Ms Mansted told AAP. "I'd love to say that by outing this particular campaign the harm is stopped but it's not, as this is just an example of what we're seeing more and more of." Individuals who might have had their details stolen in the Dark Engine campaign should change their passwords, employ a password manager, and use multi-factor authentication on accounts when possible. Website visitors should also carefully scrutinise CAPTCHA features that look unprofessional, appear in a pop-up window, or ask users to copy code into a computer's command prompt. Stolen passwords were also used to break into 10 AustralianSuper accounts in April in a theft that cost $750,000, National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness confirmed in May. More than 2300 business websites, including dozens in Australia, have been compromised and used to steal consumers' information as part of a year-long, "highly orchestrated phishing campaign", a security firm warns. Almost 80 small and medium-sized Australian businesses have been hacked in the operation, with the websites targeted ranging from a children's education provider to three Queensland strip clubs. Australian online security firm CyberCX revealed details of the attack on Tuesday after alerting compromised businesses, and warned consumers to take care when following website instructions, including completing CAPTCHAs. The details come weeks after several superannuation firms were targeted in a co-ordinated online attack and less than a year after 12.9 million Australians had private information stolen from health provider MediSecure. In a paper called DarkEngine detailing the campaign, CyberCX said it discovered a group had compromised at least 2353 websites since June 2024, including 79 from Australia, 50 from the United Kingdom, and 34 from Canada. The online criminals targeted hundreds of websites using "search engine optimisation poisoning" to publish hacked versions of a commonly used website management tool, the report said. This allowed them to install malicious code on the websites, including fake CAPTCHA features ordinarily used as a security measure to identify website visitors. The effort and resources put into the phishing campaign suggested the criminals behind it were highly motivated, CyberCX intelligence and public policy director Katherine Mansted said, and would sell whatever credentials they could steal. "They're quite omnivorous - there are sex shops through to kids' education websites," she said. "What their objective is here is to compromise as many ordinary citizens' computers as possible for the purposes of financially motivated crime." Stolen credentials such as personal information, logins and passwords had become the leading cause of online attacks, Ms Mansted said, taking over from email phishing attempts. "What we're seeing is an ongoing professionalisation and industrialisation of the cybercrime ecosystem," Ms Mansted told AAP. "I'd love to say that by outing this particular campaign the harm is stopped but it's not, as this is just an example of what we're seeing more and more of." Individuals who might have had their details stolen in the Dark Engine campaign should change their passwords, employ a password manager, and use multi-factor authentication on accounts when possible. Website visitors should also carefully scrutinise CAPTCHA features that look unprofessional, appear in a pop-up window, or ask users to copy code into a computer's command prompt. Stolen passwords were also used to break into 10 AustralianSuper accounts in April in a theft that cost $750,000, National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness confirmed in May.

Urgent call for type-O blood donations amid shortages
Urgent call for type-O blood donations amid shortages

The Advertiser

time2 hours ago

  • The Advertiser

Urgent call for type-O blood donations amid shortages

Australians with O-type blood are being asked to roll up their sleeves as storages hit their lowest point since 2023. An extra 9500 donations of O positive and O negative blood donors are needed in the next seven days to ensure Lifeblood can continue to meet patient needs across the country. Lifeblood executive director Stuart Chesneau said O-type blood supplies are at their lowest level since October 2023. This is because of high rates of people rescheduling or cancelling their appointments since June 2024, he said. "Every day, we issue close to 10,000 blood transfusions and medications to hospitals around the country to meet patient demand and we can't do it without people donating," Mr Chesneau said. He said O positive and O negative are the blood types most frequently ordered by hospitals and can both be used in emergency situations. O negative is considered an 'universal blood type' and is often stocked in ambulances and rescue helicopters for patients whose blood type is unknown. Less than seven per cent of the Australian population is O negative, making it one of the rarer blood types, however its versatility means it makes up 16 per cent of the blood ordered by hospitals. But donations of O positive are equally as important. "What many people don't know is that O positive is as safe as O negative for the majority of emergency transfusions," he said. "Some 40 per cent of people in Australia have O positive blood, meaning they too can help save lives in emergency situations. "We're asking people of all blood types who are feeling healthy and well, especially those with O-type blood, to make an appointment." A blood donation appointment takes about an hour, with the donation itself only lasting up to 10 minutes. Australians with O-type blood are being asked to roll up their sleeves as storages hit their lowest point since 2023. An extra 9500 donations of O positive and O negative blood donors are needed in the next seven days to ensure Lifeblood can continue to meet patient needs across the country. Lifeblood executive director Stuart Chesneau said O-type blood supplies are at their lowest level since October 2023. This is because of high rates of people rescheduling or cancelling their appointments since June 2024, he said. "Every day, we issue close to 10,000 blood transfusions and medications to hospitals around the country to meet patient demand and we can't do it without people donating," Mr Chesneau said. He said O positive and O negative are the blood types most frequently ordered by hospitals and can both be used in emergency situations. O negative is considered an 'universal blood type' and is often stocked in ambulances and rescue helicopters for patients whose blood type is unknown. Less than seven per cent of the Australian population is O negative, making it one of the rarer blood types, however its versatility means it makes up 16 per cent of the blood ordered by hospitals. But donations of O positive are equally as important. "What many people don't know is that O positive is as safe as O negative for the majority of emergency transfusions," he said. "Some 40 per cent of people in Australia have O positive blood, meaning they too can help save lives in emergency situations. "We're asking people of all blood types who are feeling healthy and well, especially those with O-type blood, to make an appointment." A blood donation appointment takes about an hour, with the donation itself only lasting up to 10 minutes. Australians with O-type blood are being asked to roll up their sleeves as storages hit their lowest point since 2023. An extra 9500 donations of O positive and O negative blood donors are needed in the next seven days to ensure Lifeblood can continue to meet patient needs across the country. Lifeblood executive director Stuart Chesneau said O-type blood supplies are at their lowest level since October 2023. This is because of high rates of people rescheduling or cancelling their appointments since June 2024, he said. "Every day, we issue close to 10,000 blood transfusions and medications to hospitals around the country to meet patient demand and we can't do it without people donating," Mr Chesneau said. He said O positive and O negative are the blood types most frequently ordered by hospitals and can both be used in emergency situations. O negative is considered an 'universal blood type' and is often stocked in ambulances and rescue helicopters for patients whose blood type is unknown. Less than seven per cent of the Australian population is O negative, making it one of the rarer blood types, however its versatility means it makes up 16 per cent of the blood ordered by hospitals. But donations of O positive are equally as important. "What many people don't know is that O positive is as safe as O negative for the majority of emergency transfusions," he said. "Some 40 per cent of people in Australia have O positive blood, meaning they too can help save lives in emergency situations. "We're asking people of all blood types who are feeling healthy and well, especially those with O-type blood, to make an appointment." A blood donation appointment takes about an hour, with the donation itself only lasting up to 10 minutes. Australians with O-type blood are being asked to roll up their sleeves as storages hit their lowest point since 2023. An extra 9500 donations of O positive and O negative blood donors are needed in the next seven days to ensure Lifeblood can continue to meet patient needs across the country. Lifeblood executive director Stuart Chesneau said O-type blood supplies are at their lowest level since October 2023. This is because of high rates of people rescheduling or cancelling their appointments since June 2024, he said. "Every day, we issue close to 10,000 blood transfusions and medications to hospitals around the country to meet patient demand and we can't do it without people donating," Mr Chesneau said. He said O positive and O negative are the blood types most frequently ordered by hospitals and can both be used in emergency situations. O negative is considered an 'universal blood type' and is often stocked in ambulances and rescue helicopters for patients whose blood type is unknown. Less than seven per cent of the Australian population is O negative, making it one of the rarer blood types, however its versatility means it makes up 16 per cent of the blood ordered by hospitals. But donations of O positive are equally as important. "What many people don't know is that O positive is as safe as O negative for the majority of emergency transfusions," he said. "Some 40 per cent of people in Australia have O positive blood, meaning they too can help save lives in emergency situations. "We're asking people of all blood types who are feeling healthy and well, especially those with O-type blood, to make an appointment." A blood donation appointment takes about an hour, with the donation itself only lasting up to 10 minutes.

Strip clubs to education hubs hacked in password grab
Strip clubs to education hubs hacked in password grab

West Australian

time3 hours ago

  • West Australian

Strip clubs to education hubs hacked in password grab

More than 2300 business websites, including dozens in Australia, have been compromised and used to steal consumers' information as part of a year-long, "highly orchestrated phishing campaign", a security firm warns. Almost 80 small and medium-sized Australian businesses have been hacked in the operation, with the websites targeted ranging from a children's education provider to three Queensland strip clubs. Australian online security firm CyberCX revealed details of the attack on Tuesday after alerting compromised businesses, and warned consumers to take care when following website instructions, including completing CAPTCHAs. The details come weeks after several superannuation firms were targeted in a co-ordinated online attack and less than a year after 12.9 million Australians had private information stolen from health provider MediSecure. In a paper called DarkEngine detailing the campaign, CyberCX said it discovered a group had compromised at least 2353 websites since June 2024, including 79 from Australia, 50 from the United Kingdom, and 34 from Canada. The online criminals targeted hundreds of websites using "search engine optimisation poisoning" to publish hacked versions of a commonly used website management tool, the report said. This allowed them to install malicious code on the websites, including fake CAPTCHA features ordinarily used as a security measure to identify website visitors. The effort and resources put into the phishing campaign suggested the criminals behind it were highly motivated, CyberCX intelligence and public policy director Katherine Mansted said, and would sell whatever credentials they could steal. "They're quite omnivorous - there are sex shops through to kids' education websites," she said. "What their objective is here is to compromise as many ordinary citizens' computers as possible for the purposes of financially motivated crime." Stolen credentials such as personal information, logins and passwords had become the leading cause of online attacks, Ms Mansted said, taking over from email phishing attempts. "What we're seeing is an ongoing professionalisation and industrialisation of the cybercrime ecosystem," Ms Mansted told AAP. "I'd love to say that by outing this particular campaign the harm is stopped but it's not, as this is just an example of what we're seeing more and more of." Individuals who might have had their details stolen in the Dark Engine campaign should change their passwords, employ a password manager, and use multi-factor authentication on accounts when possible. Website visitors should also carefully scrutinise CAPTCHA features that look unprofessional, appear in a pop-up window, or ask users to copy code into a computer's command prompt. Stolen passwords were also used to break into 10 AustralianSuper accounts in April in a theft that cost $750,000, National Cyber Security Co-ordinator Lieutenant General Michelle McGuinness confirmed in May.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store