You can view all our threats from this page. Use the filters below to filter by audience type, title and summary and the sort options to sort for the most recently updated or published content.
23 Jun 2020
Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions, and the miners are then rewarded with a small amount of cybercurrency.
01 Jul 2018
Sometimes personal information is released to unauthorised people by accident, or as the result of a security breach. These are known as a data breaches, or data spills.
22 May 2020
Dating and romance scams
Scammers often approach their victims on legitimate dating websites before attempting to move the 'relationship' away from the safeguards that these sites put in place, for example, by communicating through other methods such as email, where they can more easily manipulate victims.
Denial of Service
A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic.
19 May 2020
Scammers impersonate charities all year round, often seeking fake donations in response to real disasters or emergencies.
21 May 2020
Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.
18 May 2020
Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person's photograph.
If you’re looking to invest money, make sure you’re aware of the warning signs of investment scams online so you don’t lose your hard earned money.
Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems. It does not include well-meaning staff who accidentally put your cyber security at risk or spill data.
Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks.
Phishing - scam emails
Phishing is a way that cybercriminals steal confidential information such as online banking logins, credit card details, business login credentials, passwords/passphrases, by sending fraudulent messages (sometimes called ‘lures’).
Ransomware is a type of malicious software (malware) that makes your computer or its files unusable unless you pay a fee. It can get onto your device in the same way as other malware or a virus.
Remote access scams
Remote access scams (also known as technical support scams) usually involve scammers contacting people over the phone to get access to their computers and to steal their money.
24 Feb 2020
Scammers pretend to be real businesses online by setting up fake websites that look like genuine online stores or by creating advertisements on legitimate sites to trick you into clicking on them.
Threat-based impersonation scams
Threat-based impersonation scams are common and can be traumatic for the victim. Typically, scammers pretend to be from a well-known trusted business, government department or organisation and they threaten you into handing over your money or personal details.
Unexpected money scams
There are different types of unexpected money scams, but they all promise the lure of some greater reward.
23 Apr 2020
Web shell malware
Malicious web shells are a type of software uploaded to a compromised web server to enable remote access by an attacker. While web shells may be benign, their use by cyber adversaries is becoming more frequent due to the increasing use of web-facing services by organisations across the world.
Australian Cyber Security Hotline
1300 CYBER1(1300 292 371)