Latest threat advice

Common threat types

Common threat types The cyber threat to Australian individuals and organisations is undeniable, unrelenting and continues to grow. You could be a target even if you don’t think the information held on your networks is valuable, or that your business … read more

Phishing

What is phishing? Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia. These messages can be sent via email, SMS, social media, instant messenger or … read more

Phishing

What is phishing? Phishing is a method of stealing confidential information by sending fraudulent messages to a victim. It is one of the most prevalent scams reported in Australia. These messages can be sent via email, SMS, social media, instant messenger or … read more

Business email compromise

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is business email compromise? Business email compromise (BEC) is an online … read more

Dating and romance scams

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. The below is based primarily on the advice of the NSW Police. What are dating … read more

Distributed denial of service

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is a distributed denial of service attack? A distributed denial of service … read more

Email scams

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What are email scams? Criminals use email to manipulate or trick you into … read more

Identity theft

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. The below is based primarily on the advice of the Australian Federal Police. … read more

Malware

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is malware? Malware (short for ‘malicious software’) is … read more

Phone scams

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What are phone call scams? There are many ways scammers try to get your … read more

Unauthorised cryptomining

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is unauthorised cryptocurrency mining? Cryptocurrency mining … read more

Malicious insiders

The Australian Cyber Security Centre provides you with up-to-date advice on current threats and vulnerabilities, as well as guidance on mitigation and cyber security best practice. What is a malicious insider? Malicious insiders can be employees, former … read more