Second-Largest Telco In Australia Encounters Cyberattacks

Must Read

Optus, the second-largest telco in Australia, has confirmed that it was the target of a “malicious” cyberattack.

The attack happened last September and affected Optus’s email and network systems. Optus says that no customer data was compromised in the attack.

In the company’s statement, Bayer Rosmarin said, “We are devastated to discover that we have been subject to a cyberattack that has resulted in the disclosure of our customer’s personal information to someone who should not see it.”

“Optus has also notified key financial institutions about this matter,” the company’s statement further continued.

Optus is working with authorities to investigate the incident. The company claimed to have “implemented additional security measures” to protect its systems.

This is the latest in a string of cyberattacks targeting Australian businesses and organizations. In June, the Reserve Bank of Australia (RBA) was forced to shut down its payment systems after a sophisticated cyberattack.

And in July, the University of Melbourne confirmed that it had been hit by a cyberattack that compromised the personal information of more than 100,000 students and staff.

These attacks come as the Australian government prepares to introduce new legislation that would give law enforcement and intelligence agencies more extraordinary powers to tackle cybercrime.

The proposed laws would allow authorities to access encrypted data and force companies to hand over customer data when requested.

Critics say, “These measures would weaken security and privacy and lead to the mass surveillance of Australians.”

But the government insists that the new laws are necessary to protect Australians from the growing threat of cybercrime.

These attacks also highlight the need for businesses and organizations to improve their cybersecurity defences. Cybercriminals are becoming more sophisticated, and their attacks are becoming more damaging. Businesses and organizations must invest in solid cybersecurity measures to protect themselves from these threats.

- Advertisement -spot_img
Latest News
- Advertisement -spot_img

More Articles Like This

- Advertisement -spot_img