Hacking Hacking occurs when a scammer gains access to your personal information by using technology to break into your computer, mobile device or network. Identity theft Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits. Phishing Phishing scams are attempts by scammers to trick you into giving out your personal information such as your bank account numbers, passwords and credit card numbers. Remote access scams Remote access scams try to convince you that you have a computer or internet problem and that you need to buy new software to fix the problem. Related news Rental scams targeting more Australians during pandemic 21 Sep 2020 National Scams Awareness Week: 'This is Not Your Life' 17 Aug 2020 Scams target all sections of Australian society including CALD and Indigenous communities 25 Jun 2020 Business email compromise scams cost Australians $132 million 23 Jun 2020 Scams cost Australians over $630 million 22 Jun 2020
Hacking Hacking occurs when a scammer gains access to your personal information by using technology to break into your computer, mobile device or network.
Identity theft Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
Phishing Phishing scams are attempts by scammers to trick you into giving out your personal information such as your bank account numbers, passwords and credit card numbers.
Remote access scams Remote access scams try to convince you that you have a computer or internet problem and that you need to buy new software to fix the problem.
Scams target all sections of Australian society including CALD and Indigenous communities 25 Jun 2020