Latest threats 14 Nov 2024 Identity theft Learn about how identity theft can affect you and how to keep your personal information secure. 10 Nov 2023 Account compromise Account compromise is when criminals get unauthorised access to your email, banking, or other accounts. 10 Nov 2023 Malware Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks. All threats Title AudienceIndividuals & familiesSmall & medium businessesOrganisations & Critical InfrastructureGovernment Sort by Sort byDate updated (new to old)Date updated (old to new)Title (A-Z)Title (Z-A) Items per page 6121824- All - 14 Nov 2024 Identity theft Learn about how identity theft can affect you and how to keep your personal information secure. 10 Nov 2023 Malware Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks. 10 Nov 2023 Account compromise Account compromise is when criminals get unauthorised access to your email, banking, or other accounts. 02 Nov 2023 Quishing Quishing is a form of phishing attack that uses QR codes instead of text-based links in phishing emails, digital platforms or on physical items. Quishing is a social engineering technique used by scammers and malicious cyber threat actors to trick their victims into providing sensitive personal information or downloading malware onto their devices. 30 Aug 2023 Data breaches Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as data breaches or data spills. 21 Apr 2023 Scams Online scams cost Australians millions of dollars each year and anyone can be targeted. Cybercriminals often use familiar brands and logos to make themselves seem reliable. Pagination Page 1 Next page ›› Alerts and Advisories Advice and guidance News and media Programs Publications Reports and statistics Glossary Threats