(1300 292 371)
You can view all our threats from this page. Use the filters below to filter by audience type, title and summary and the sort options to sort for the most recently updated or published content.
08 Jul 2020
Ransomware is a type of malicious software (malware) that makes your computer or its files unusable unless you pay a fee. It can get onto your device in the same way as other malware or a virus.
23 Jun 2020
Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal data or sabotage your systems. It does not include well-meaning staff who accidentally put your cyber security at risk or spill data.
Phishing - scam emails
Phishing is a way that cybercriminals steal confidential information, such as online banking logins, credit card details, business login credentials or passwords/passphrases, by sending fraudulent messages (sometimes called ‘lures’).
Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks.
Cryptocurrency mining (cryptomining) uses the processing power of computers to solve complex mathematical problems and verify cybercurrency transactions, and the miners are then rewarded with a small amount of cybercurrency.
22 May 2020
Dating and romance scams
Scammers often approach their victims on legitimate dating websites before attempting to move the 'relationship' away from the safeguards that these sites put in place, for example, by communicating through other methods such as email, where they can more easily manipulate victims.
Remote access scams
Remote access scams (also known as technical support scams) usually involve scammers contacting people over the phone to get access to their computers and to steal their money.
Denial of Service
A distributed denial of service (DDoS) attack is an attempt to make an online service unavailable by overwhelming it with traffic.
21 May 2020
Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.
19 May 2020
Scammers impersonate charities all year round, often seeking fake donations in response to real disasters or emergencies.
Threat-based impersonation scams
Threat-based impersonation scams are common and can be traumatic for the victim. Typically, scammers pretend to be from a well-known trusted business, government department or organisation and they threaten you into handing over your money or personal details.
If you’re looking to invest money, make sure you’re aware of the warning signs of investment scams online so you don’t lose your hard earned money.
18 May 2020
Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person's photograph.
24 Feb 2020
Unexpected money scams
There are different types of unexpected money scams, but they all promise the lure of some greater reward.
Scammers pretend to be real businesses online by setting up fake websites that look like genuine online stores or by creating advertisements on legitimate sites to trick you into clicking on them.
01 Jul 2018
Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as a data breaches or data spills.
1300 CYBER1(1300 292 371)