Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Latest threat advice

Scammer calling

Phone scams

Aug 14, 2018 - There are many ways scammers try to get your information or money over the phone. They will usually pretend to be from a well-known organisation, such as a government agency, a utilities provider, Australia Post, a bank or the police. They can be incredibly convincing.
Leaked exploits

Malware

Aug 14, 2018 - Malware (short for 'malicious software') is software that cyber criminals use to harm your computer system or network. Cyber criminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks. Cyber criminals use malware for different reasons, most commonly to steal your confidential information, hold you to ransom or install damaging programs onto your device without your knowledge. Malware can get onto your device or system when you visit an untrustworthy website or download an infected file via an email or a portable device,…
Identity theft

Identity theft

Aug 14, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice.
Email scam

Email scams

Aug 14, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice.
Router targetted privacy

Secondary targeting

Aug 13, 2018 - Cyber adversaries will target the weakest link. If they are trying to target a network but it has strong cyber security, they will move to what's called secondary targeting. In secondary targeting, the adversary will try to compromise other networks that might be easier to target and hold the same information, are connected to their target network, or can provide information they can use to compromise the target network.
Ransomware

Ransomware

Aug 13, 2018 - Ransomware is a type of malware that denies access to files or computer systems until a ransom is paid. Ransomware can get onto your device in the same way as other malware or a virus, for example by visiting unsafe or suspicious websites, opening emails or files from someone you don't know, clicking on 'malicious' links in social media and peer-to-peer networks.
Phishing

Phishing

Aug 13, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia. These messages can be sent via email, SMS, social media, instant messenger or phone call. They can look extremely sophisticated and convincing, replicating legitimate messages from reputable senders. As well as featuring official-looking logos and disclaimers, phishing emails typically include a 'call to action' to trick us into giving out our most sensitive personal information, from passwords to bank details.
Digital trade

Malicious insiders

Aug 13, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice.
MSPs

What should an MSP do?

Jul 1, 2018 - MSPs have a responsibility to their customers to protect their data and notify them of breaches and compromises. MSPs should implement best practice cyber security and be transparent when a compromise occurs, including by sharing what steps they are taking to remediate and mitigate the risk of a compromise reoccurring. MSPs may also have legal obligations under the Notifiable Data Breaches Scheme if personally identifiable information has been breached.
Drupal 8 logo

Vulnerability in the Drupal content management system

Jul 1, 2018 - The ACSC has become aware of a critical vulnerability in the Drupal content management system. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. Drupal assesses this vulnerability as critical. If you are using a version of Drupal prior to 7.58 or 8.51, the ACSC recommends that you upgrade immediately as per Drupal's advice.