Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Latest threat advice

Scammer calling

Phone scams

Aug 14, 2018 - There are many ways scammers try to get your information or money over the phone. They will usually pretend to be from a well-known organisation, such as a government agency, a utilities provider, Australia Post, a bank or the police. They can be incredibly convincing. . What are phone call scams? There are many ways scammers try to get your information or money over the phone. They will usually…
Leaked exploits

Malware

Aug 14, 2018 - Malware (short for 'malicious software') is software that cyber criminals use to harm your computer system or network. Cyber criminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks. Cyber criminals use malware for different reasons, most commonly to steal your confidential information, hold you to ransom or install damaging programs onto your device without your…
Identity theft

Identity theft

Aug 14, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. . Based on the advice of the AFP , What is identity theft? Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. Even…
Email scam

Email scams

Aug 14, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. . What are email scams? Criminals use email to manipulate or trick you into unintentionally sharing personal information, financial details, or money. These 'malicious actors' will use different tactics to trick you…
Router targetted privacy

Secondary targeting

Aug 13, 2018 - Cyber adversaries will target the weakest link. If they are trying to target a network but it has strong cyber security, they will move to what's called secondary targeting. In secondary targeting, the adversary will try to compromise other networks that might be easier to target and hold the same information, are connected to their target network, or can provide information they can use to compromise the target network…
Ransomware

Ransomware

Aug 13, 2018 - Ransomware is a type of malware that denies access to files or computer systems until a ransom is paid. Ransomware can get onto your device in the same way as other malware or a virus, for example by visiting unsafe or suspicious websites, opening emails or files from someone you don't know, clicking on 'malicious' links in social media and peer-to-peer networks. . What is ransomware? Ransomware…
Phishing

Phishing

Aug 13, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia. These messages can be sent via email, SMS, social media, instant messenger or phone call. They can look extremely sophisticated and convincing, replicating legitimate messages from reputable senders. As well as featuring official-looking logos and disclaimers…
Digital trade

Malicious insiders

Aug 13, 2018 - The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. . What is a malicious insider? Malicious insiders can be employees, former employees, contractors or business associates who have legitimate access to your systems and data, but use that access to destroy data, steal…
Drupal 8 logo

Vulnerability in the Drupal content management system

Jul 1, 2018 - The ACSC has become aware of a critical vulnerability in the Drupal content management system. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised. Drupal assesses this vulnerability as critical. If you are using a version of Drupal prior to 7.58 or 8.51, the ACSC recommends that you upgrade immediately as per Drupal's advice. .
Digital processing

Phishing - Large organisations

Jul 1, 2018 - Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia. These messages can be sent via email, SMS, social media, instant messenger or phone call. They can look extremely sophisticated and convincing, replicating legitimate messages from reputable senders. . What is phishing? Phishing is a…