Hacking

Hacking occurs when a scammer gains access to your personal information by using technology to break into your computer, mobile device or network.

Common examples of hacking methods

  • Ransomware & malware - the scammer tricks you into installing software that allows them to access your files and track what you are doing on your computer.
  • Exploiting security weaknesses – weaknesses can include reused and easily guessed passwords, out of date anti-virus software, and unsecured WiFi and Bluetooth connections.

Once scammers have hacked your computer or mobile device they can access your personal information, change your passwords, and restrict access to your system. They will use the information they obtain to commit fraudulent activities, such as identity theft or they could obtain direct access to your banking and credit card details.

Warning signs

  • You are unable to log in to your computer or mobile device, or your email, social media and other online accounts.
  • You notice new icons on your computer screen, or your computer is not as fast as it normally is.
  • Files on your computer have been moved or deleted.
  • Pop-up boxes start appearing on your computer screen. These may offer to help 'fix' your computer, or a simply have a button that says ‘close’.
  • You have an unexpectedly large phone data or internet bill.
  • You notice that amounts of money go missing from your bank account without any explanation.

Protect yourself

  • Always keep your computer security up to date with anti-virus and anti-spyware software, and a good firewall. Only buy computer and anti-virus software from a reputable source.
  • Use your security software to run a virus check if you think your computer’s security has been compromised. If you still have doubts, contact your anti-virus software provider or a computer specialist.
  • Secure your networks and devices, and avoid using public computers or WiFi hotspots to access or provide personal information.
  • Choose passwords and PINs that would be difficult for others to guess, and update them regularly. Do not save them to your phone or on your computer.
  • Do not open attachments or click on links in emails or social media messages you’ve received from strangers – just press delete.
  • Be wary of free downloads and website access, such as music, games, movies and adult sites. They may install harmful programs without you knowing.
  • Do not use software that auto-completes online forms.
  • Visit Stay Smart Online for tips on how to protect your personal and financial information online.

Have you been scammed?

If you think you have provided your account details, passport, tax file number, licence, Medicare or other personal identification details to a scammer, contact your bank, financial institution, or other relevant agencies immediately.

We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible.

We also provide guidance on protecting yourself from scams and where to get help.

Spread the word to your friends and family to protect them.

More information

Identity theft

Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.

Phishing

Phishing scams are attempts by scammers to trick you into giving out your personal information such as your bank account numbers, passwords and credit card numbers.

Malware & ransomware

Malware tricks you into installing software that allows scammers to access your files and track what you are doing, while ransomware demands payment to ‘unlock’ your computer or files.

From the web