Hacking occurs when a scammer gains access to your personal information by using technology to break into your computer, mobile device or network.

 

On this page

 

Common examples of hacking methods

  • Malware tricks you into installing software that allows scammers to access your files and track what you are doing, while ransomware demands payment to 'unlock' your computer or files.
  • Exploiting security weaknesses – weaknesses can include reused and easily guessed passwords, out of date anti-virus software, and unsecured WiFi and Bluetooth connections.
  • Payment redirection scams – if you are a business, a scammer posing as one of your regular suppliers will tell you that their banking details have changed. They will provide you with a new bank account number and ask that all future payments are processed accordingly. The scam is often only detected when your regular supplier asks why they have not been paid. Example: John updated supplier details and it ended up costing thousands.

Once scammers have hacked your computer or mobile device they can access your personal information, change your passwords, and restrict access to your system. They will use the information they obtain to commit fraudulent activities, such as identity theft or they could obtain direct access to your banking and credit card details.

Warning signs

  • You are unable to log in to your computer or mobile device, or your email, social media and other online accounts.
  • You notice new icons on your computer screen, or your computer is not as fast as it normally is.
  • Files on your computer have been moved or deleted.
  • Pop-up boxes start appearing on your computer screen. These may offer to help 'fix' your computer, or a simply have a button that says ‘close’.
  • You have an unexpectedly large phone data or internet bill.
  • You notice that amounts of money go missing from your bank account without any explanation.
  • You suspect that your mobile phone number has been ported without your consent, after you notice that your phone is showing 'SOS only' where the reception bars usually appear.

Protect yourself

  • Always keep your computer security up to date with anti-virus and anti-spyware software, and a good firewall. Only buy a computer and anti-virus software from a reputable source.
  • Use your security software to run a virus check if you think your computer’s security has been compromised. If you still have doubts, contact your anti-virus software provider or a computer specialist.
  • Secure your networks and devices, and avoid using public computers or WiFi hotspots to access or provide personal information.
  • Choose passwords and PINs that would be difficult for others to guess, and update them regularly. Do not save them on your phone or computer.
  • Do not open attachments or click on links in emails or social media messages you’ve received from strangers – just press delete.
  • Be wary of free downloads and website access, such as music, games, movies and adult sites. They may install harmful programs without you knowing.
  • Do not use software that auto-completes online forms.

Have you been scammed?

If you think you have provided your account details, passport, tax file number, licence, Medicare or other personal identification details to a scammer, contact your bank, financial institution, or other relevant agencies immediately.

We encourage you to report scams to the ACCC via the report a scam page. This helps us to warn people about current scams, monitor trends and disrupt scams where possible.

We also provide guidance on protecting yourself from scams and where to get help.

Spread the word to your friends and family to protect them.

More information

 

Identity theft is a type of fraud that involves using someone else's identity to steal money or gain other benefits.
Phishing scams are attempts by scammers to trick you into giving out your personal information such as your bank account numbers, passwords and credit card numbers.

 

 

 

Is this page useful?