logo
#

Latest news with #BEC

France joyride for delegation as driver licence backlog soars
France joyride for delegation as driver licence backlog soars

The Citizen

time2 days ago

  • Automotive
  • The Citizen

France joyride for delegation as driver licence backlog soars

About 600 000 licences were waiting to be printed, with many applicants having to wait months for their cards. As the country battles with only one driver's licence card machine, a seven-person transport department delegation enjoyed a trip to France to examine an expensive smart-card machine owned by a company bidding for a tender, although the device was not present during the visit. This comes as almost 600 000 South Africans wait for their new driving-licence cards produced by a machine plagued by constant breakdowns. Licence delegation The delegation, comprising five bid-evaluation committee (BEC) members and two technical advisers, could not explain why they had chosen to visit France instead of either the Czech Republic or Greece. There are only two sites where the machine, which prints blank polycarbonate cards, could be viewed, according to The Sunday Times. Instead, they looked at an 'unrelated' machine owned by the company. Runaround According to the paper, after two days in France, the delegation moved on to Amsterdam for a site visit to inspect a second machine that would personalise the cards in a process whereby security features and the card owner's personal details and biometrics are embedded in them. However, the company had claimed in its bid document that its machine could be viewed only in Morocco or Burkina Faso. ALSO READ: The driver's licence machine is fixed, but another problem remains While it is unclear if transport department officials examined the correct printer, an investigation by the auditor-general (AG) found that two members of the delegation did not even view the machine. Response Transport Department spokesperson Collen Msibi told The Citizen on Monday that procuring a new driving-licence card machine was now on hold owing to the declaratory order application and could not comment on the trip to France and the Netherlands, as the matter was before the courts. 'I can confirm that it is indeed the department that approached the court for a declaratory order. We can not comment any further since the matter is already in court. We shall await the outcomes of court proceedings.' According to the publication, the transport department's acting director-general, Mathabatha Mokonyama, said in his founding affidavit that the delegation had been unable to explain why they went to France rather than the Czech Republic. Efforts to buy a new printer have been underway since 2021, but have been fraught with missteps. Licence machine South Africa's only driver's licence card printer has been plagued by breakdowns. The machine has been out of order since January, resulting in a significant backlog in issuing driver's licences. Few to no cards have been issued since the start of the year. In July, Transport Minister Barbara Creecy said her department struck an agreement with the Government Printing Works to provide a backup if the existing fault-prone machine is out of service. Irregularities Creecy said the AG found irregularities in the procurement process of the new driver's licence card machine. 'It is a matter of public record that the department has taken a self-review application on this matter to the courts. The old card machine is currently fixed, and we are hard at work to clear out the printing backlog of licence cards.' ALSO READ: Driver's licence expired while printing machine is broken? Here's what you should do Legal battle In March, Creecy instructed her department to file a high court application for a declaratory order regarding the R400 million tender for a driving licence card machine. This was after the AG identified irregularities over the preferred bidder Idemia's South Africa contract. In September last year, the transport department appointed French multinational identity technology company Idemia as the preferred bidder for the multimillion-rand tender to procure a new driver's licence printing machine. Idemia blow However, a week before Idemia was selected, it was dealt a blow, with Airports Company South Africa (Acsa) cancelling a deal that would have seen the French company provide technology like self-boarding gates at nine South African airports. Audit In September 2024, Creecy instructed the AG to expedite and widen the audit scope for the new driving licence card procurement process after new evidence emerged of alleged serious irregularities in the decision to make Idemia the preferred bidder. According to the report, the AG identified instances of non-compliance with the required procurement processes. The AG also found that the identified instances of non-compliance were due to the DLCA's inadequate budget analysis, which is part of the demand management process. 'Bids are not being evaluated according to the evaluation criteria as per the bid specifications and scoring is inconsistent during the bid evaluation process.' Old machine The existing licence card printing machine is 26 years old and has experienced almost 160 breakdowns, which have become more frequent. The transport department told the Sunday Times that 539 947 licences were waiting to be printed, with many applicants having to wait months for their cards. ALSO READ: I renewed my driving licence, it was a breeze and stress-free

JBIET, BEC hold Orientation Day ceremony
JBIET, BEC hold Orientation Day ceremony

Hans India

time6 days ago

  • Science
  • Hans India

JBIET, BEC hold Orientation Day ceremony

Hyderabad: The Orientation Day 2025 ceremony for the newly admitted first-year students of J.B. Institute of Engineering & Technology (JBIET) and Bhaskar Engineering College (BEC) was hosted at MNR Auditorium in the city on Wednesday. The event aimed to familiarize students with the institutions' academic culture, teaching and learning process, academic calendar, student activity center, student clubs, training and placement opportunities, marking the beginning of their professional journey. The program was graced by Prof. V. Balakista Reddy, Chairman, Telangana Council of Higher Education (TGCHE), as the Chief Guest, and HG Sonar Gauranga Das of ISKCON, Hyderabad, as the Guest of Honor. J.V. Krishna Rao, Secretary, JBES, spoke about the extensive academic activities, the growth of JBES over the last 26 years, infrastructural development, the JB Institute of Inventors Association of India, student participation at the national level in sports and co-curricular facilities offered at JBES, and extended a warm welcome to the new students. In his keynote address, Prof. V. Balakista Reddy encouraged students to embrace curiosity, critical thinking, and innovation to meet global challenges. He informed students they should focus on digital technology; regular attendance is directly proportional to results. Students should follow the academic calendar meticulously in order to flourish in their careers. HG Sonar Gauranga Das of ISKCON, Hyderabad, inspired them with a message on ethics, values, and holistic growth. Prof. Ch. Sanjay, Director, JBES, focused mainly on global attributes of engineers, saying engineering graduates need a strong combination of technical excellence, cross-cultural awareness, and industry readiness. Dr. P.C. Krishnamachary, Principal, JBIET; Dr. Sumagna Patnaik, Principal, BEC; the Principal of Bhasker Engineering College; and Sri. Vijay Rao, Campus Administrator, JBGEI, also addressed the gathering. The event also featured informative sessions on anti-ragging measures by Dr. J. Kartigeyen, Dean of Student Affairs, JBIET; career readiness & placements by Dr. Md. Asif, TPO, JBIET; entrepreneurship opportunities through JBIIAI by Dr. Anoop Kumar Shukla; and examination guidelines by Dr. P. Srinivasa Rao, Controller of Examinations, JBIET. The program concluded with a vote of thanks by Dr. Md. Salauddin, Dean of Academics, JBIET. The day not only welcomed the new batch into the JBES family but also set the tone for their academic and personal growth in the years ahead.

NZ industrial gas crisis: Rising costs force businesses to cut operations
NZ industrial gas crisis: Rising costs force businesses to cut operations

NZ Herald

time11-08-2025

  • Business
  • NZ Herald

NZ industrial gas crisis: Rising costs force businesses to cut operations

'On average, prices have surged more than 100% in the past five years, with a quarter of businesses surveyed now paying $25 or more per gigajoule,' Schirr said. Most businesses surveyed (80%) have contracts expiring by 2027, creating a narrow window for necessary transitions to alternative energy sources, she said. 'If we do nothing, a major de-industrialisation crisis could escalate in the next two years, having serious and devastating consequences for suppliers and customers of gas-using businesses.' Schirr said only some businesses can transition to alternatives. 'More than 40% of businesses surveyed say transitioning to alternative fuels is not commercially viable within the next five years, with a further 20% uncertain,' she said. 'Even with a phase-out period of 15 years, only 75% of all respondents were confident of being able to transition. 'The remainder say that switching may be possible if barriers are removed – including the prohibitive cost of conversion, lack of proven alternative technologies, uncertainty about commercial viability and the high cost or difficulty of upgrading on-site supply infrastructure.' The BEC and Optima believe that for industries able to transition, a joint industry and government plan for a managed reduction and transition away from industrial gas supply is needed, aiding industries in adopting alternative technologies. Schirr urged the Government to 'use all the levers at its disposal' to help free up gas supplies and get more gas out of the ground. Increased investment in developing gas fields short-term was desperately needed to reduce the shortfall in supply, she said. 'For investors to feel confident, there needs to be bipartisan agreement, providing important stability and certainty.' The Government is in the throes of reversing the previous Labour Government's 2018 ban on oil and gas exploration in and has set aside a $200 million contingency fund to aid exploration. The last significant offshore gas discovery was Pohokura, off the Taranaki coast, in 2000. Jamie Gray is an Auckland-based journalist, covering the financial markets, the primary sector and energy. He joined the Herald in 2011.

Exclusive: Garrett O'Hara on Mimecast's AI fight against cyber risk
Exclusive: Garrett O'Hara on Mimecast's AI fight against cyber risk

Techday NZ

time08-08-2025

  • Business
  • Techday NZ

Exclusive: Garrett O'Hara on Mimecast's AI fight against cyber risk

In a world where cyberattacks are growing more sophisticated and frequent, organisations are increasingly focusing on what Garrett O'Hara calls the "most unpredictable element in security" - humans. Speaking during a recent interview, Garrett O'Hara, Senior Director of Solutions Engineering for APAC at Mimecast, explained how artificial intelligence (AI) is now being deployed to manage and mitigate human risk at scale. "Human risk is anything people can do that exposes an organisation to risk, either by accident or intent," he said. "Most of the time, it's not malicious - it's tiredness, deadlines, or someone trying to do their job more efficiently." He pointed out that employees often unintentionally bypass security policies under pressure. "They might upload sensitive documents to a personal drive just so they can work from home, not realising the huge risk that introduces," he added. AI tools, while offering productivity benefits, have also opened new doors for attackers. "We're seeing employees use tools like ChatGPT to summarise documents or create presentations, not realising they're potentially uploading sensitive corporate data to third-party platforms," he said. On the flip side, O'Hara said AI is a vital asset in the fight against these new types of threats. "AI is incredibly good at detecting patterns and threats that traditional methods might miss. For example, analysing URLs for slight variations that indicate a phishing attempt or identifying AI-generated scam emails." He described how phishing campaigns have become almost indistinguishable from genuine communications. "The old advice about bad grammar or strange formatting doesn't apply anymore. With AI, attackers are producing flawless emails in seconds," he said. "But the good news is that AI on the defensive side is just as powerful." Mimecast's platform uses AI throughout its stack, from sandboxing and behavioural analysis to identifying language markers in emails associated with business email compromise (BEC). "We look for those AI fingerprints - which often show up in machine-generated messages," he explained. For example, if there was an email that simulates a CEO urgently requesting staff to buy gift cards - a common BEC tactic - Mimecast's AI can intercept it. "Instead of an employee reacting to that urgency, we use AI to throw bubble wrap around them, flagging the threat before any action is taken," he said. Trust in AI is still an issue, however. "It's a double-edged sword," O'Hara acknowledged. "There's hype fatigue in cybersecurity - zero trust, now AI. And the problem is when vendors slap 'AI' onto everything, it erodes trust." He noted that some vendors rely solely on AI, which leads to high false positive rates and overburdened security teams. "AI is probability-based. Without cross-checking, it can trigger too many false alarms, and analysts burn out sifting through them," he said. "Our platform uses a layered approach - AI decisions are supported by additional checks across other systems, improving accuracy." Mimecast has gone a step further by achieving ISO certification for ethical use of AI, addressing concerns about bias and data misuse. "Transparency matters. You need to understand how the model works, especially if it goes off track," he said. "That's why we plan for machine unlearning - to rollback models if they learn something they shouldn't." Looking ahead, O'Hara envisions a future where AI acts as a sort of digital guardian angel. "Imagine a Clippy-like assistant - but useful - that knows your role, your habits, and quietly keeps you safe behind the scenes," he said. He also discussed how application programming interfaces (APIs) play a crucial role in integrating Mimecast's human risk platform with other systems. "We pull in data from HR, endpoint and identity platforms to paint a picture of risk - right down to the individual level," he explained. "If someone's on notice or switching roles, their risk profile changes. APIs help us adapt protection accordingly." Importantly, AI in cybersecurity is no longer just about detection and defence. Mimecast also uses it for prediction and prevention. "With data from 44,000 companies and billions of emails daily, our AI tools can identify emerging threats early and act before damage is done," he said. "That's where we're moving - from reactive to proactive security." But for smaller organisations, predictive security can seem out of reach. "The average Australian SMB doesn't have the budget or capacity for that level of protection," he noted. "We offer it as a service - so they benefit without the overhead." As for the future of cybersecurity training, O'Hara predicts a shift from generic instruction to highly tailored behavioural nudges. "Instead of monthly sessions, we'll see hyper-contextual, AI-generated interventions in the moment," he said. "That's the power of AI - it knows how to reach each individual in a way that resonates." He added that balancing automation with human oversight remains a key concern. "Right now, most organisations use automation to assist - not replace - analysts. And that's wise," he said. "False positives can grind a business to a halt if something like Salesforce gets blocked. But as AI improves, that balance will shift." Ultimately, he believes that the most exciting developments are still unknown. "I'm genuinely excited by what we don't yet see coming," he said. "AI has unlocked possibilities that feel like magic." And while security teams dream of AI replacing their most tedious tasks, O'Hara points out there's a long way to go. "If AI can act like Cinderella's godmother - guiding users to return home just before the stroke of midnight - then we're on the right track," he said.

Phishing kits & AI drive surge in email attacks on firms
Phishing kits & AI drive surge in email attacks on firms

Techday NZ

time05-08-2025

  • Business
  • Techday NZ

Phishing kits & AI drive surge in email attacks on firms

VIPRE Security Group has released its Q2 2025 Email Threat Landscape Report, presenting findings based on its continuous monitoring and analysis of global cybersecurity trends. Phishing kits dominate attacks The report indicates that 58% of phishing sites now use unidentifiable phishing kits. These kits are increasingly customised or obfuscated, making them very difficult for defenders to detect or analyse, and often leveraging artificial intelligence to reduce costs. Notable kits cited include Evilginx (20%), Tycoon 2FA (10%), 16shop (7%), with a further 5% attributed to other generic offerings. Such phishing kits are described as untraceable, with the report stating that they "can't easily be reverse-engineered, tracked, or caught." This trend underscores a shift toward more sophisticated and hard-to-combat forms of phishing campaigns. Manufacturing sector remains primary target For the sixth consecutive quarter, the manufacturing sector continues to be the most targeted industry for email-based cyberattacks, accounting for 26% of all reported incidents. These attacks include business email compromise (BEC), phishing, and malspam. The retail sector follows at 20%, with healthcare comprising 19% of recorded attacks for Q2 2025. VIPRE notes that this distribution aligns with trends identified over the previous year. Scandinavia targeted by BEC schemes The report reveals a marked increase in BEC attacks targeting Scandinavian executives. While English-speaking executives still represent the largest group targeted by BEC emails (42%), a substantial portion target Danish (38%), with Swedish and Norwegian executives representing a combined 19%. Language and localisation in attack emails are on the rise. Danish is used in 11.9% of BEC scam attempts, Swedish in 3.8%, and Norwegian in 1.5%. The report attributes the targeting of native languages to the fact that many corporate communications, particularly in HR, finance, and executive functions, still take place in local tongues despite high English proficiency in the region. Impersonation remains the main BEC tactic, with 82% of scams involving the impersonation of CEOs and executives. Directors and managers account for a further 9%, HR staff for 4%, IT staff for 3%, and school heads for 2%. Lumma Stealer observed as top malware Lumma Stealer has become the most observed malware family during Q2 2025, the report states. It is typically delivered via malicious .docx, .html, or .pdf attachments, or through phishing links hosted on services such as OneDrive and Google Drive. The malware's accessibility stems from its availability as "Malware-as-a-Service" (MaaS), benefiting from active development support and competitive pricing. This broadens its appeal to both experienced and novice cybercriminals. Bait and persuasion techniques Financial incentives were the most common lure in malicious emails, accounting for 35% of samples. Messages feigning urgency comprised the second most frequent tactic at 25%, followed by account verification and update requests (20%), travel-related themes (10%), package delivery notifications (5%), and legal or HR notices (5%). Cybercriminals continued to use open redirect mechanisms for phishing, with 54% of attacks masking malicious destinations via links on marketing, tracking, or even security platforms. Compromised websites delivered 30% of phishing links, and URL shorteners were used in 7% of incidents. PDFs remain the dominant file format for malicious attachments at 64%, with a rising proportion now containing embedded QR codes to facilitate attacks. Exploitation mechanisms after delivery In the final stage of attacks, cybercriminals rely on exploitation mechanisms such as HTTP POST to remote servers, accounting for 52% of observed cases, with email exfiltration reported in 30%. "It's clear what the threat actors are doing – they are outsmarting humans through hyper-personalised phishing techniques using the full capability of AI and deploying at scale," Usman Choudhary, Chief Product and Technology Officer, VIPRE Security Group, says. "Organisations can no longer rely on standard cybersecurity processes, techniques, and technology. They need comprehensive and advanced email security solutions that can help them to deploy like-for-like defenses – at the very least – if not help them stay a step ahead of the tactics used by cybercriminals." The report draws on intelligence gathered by VIPRE Antivirus Lab through continual analysis of email threats.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store