Ensuring you understand and practice good cyber security is the best way to combat cyber threats. Here you will find information about common online security risks, with simple advice on what you can do to protect yourself and your family. Cryptomining Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions. The miners are then rewarded with a small amount of cybercurrency. Data spill Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as data breaches or data spills. Denial of Service A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic. Hacking Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour. Identity theft Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person's photograph. Malicious insiders Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems. It does not include well-meaning staff who accidentally put your cyber security at risk or spill data. Malware Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks. Phishing - scam emails Phishing is a way that cybercriminals steal confidential information, such as online banking logins, credit card details, business login credentials or passwords/passphrases, by sending fraudulent messages (sometimes called ‘lures’). Ransomware Ransomware is a type of malicious software (malware) that makes your computer or its files unusable unless you pay a fee. It can get onto your device in the same way as other malware or a virus. Scams Online scams cost Australians millions of dollars each year and anyone can be targeted. Online scams are often sophisticated and realistic looking messages, making them difficult to spot. Web shell malware Malicious web shells are a type of software uploaded to a compromised web server that enable remote access to an attacker. While web shells may be benign, their use by cyber adversaries is becoming more frequent due to the increasing use of web-facing services by organisations across the world.
Cryptomining Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions. The miners are then rewarded with a small amount of cybercurrency.
Data spill Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as data breaches or data spills.
Denial of Service A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic.
Hacking Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.
Identity theft Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person's photograph.
Malicious insiders Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems. It does not include well-meaning staff who accidentally put your cyber security at risk or spill data.
Malware Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks.
Phishing - scam emails Phishing is a way that cybercriminals steal confidential information, such as online banking logins, credit card details, business login credentials or passwords/passphrases, by sending fraudulent messages (sometimes called ‘lures’).
Ransomware Ransomware is a type of malicious software (malware) that makes your computer or its files unusable unless you pay a fee. It can get onto your device in the same way as other malware or a virus.
Scams Online scams cost Australians millions of dollars each year and anyone can be targeted. Online scams are often sophisticated and realistic looking messages, making them difficult to spot.
Web shell malware Malicious web shells are a type of software uploaded to a compromised web server that enable remote access to an attacker. While web shells may be benign, their use by cyber adversaries is becoming more frequent due to the increasing use of web-facing services by organisations across the world.