Common threats

Explore a range of common cyber security threats — find out how they work, how to prevent them, and what to do if they happen to you.

2019 05 16 MTP 0646

Common Threats

COVID-19 vaccine scams

Scammers will use any opportunity to try to trick and manipulate people into giving out their personal or financial deta

Asset77738 Credit Chris Sisach Exp 20.08.2020

Common Threats

SIM swapping attacks

A SIM swap attack (also known as SIM porting or SIM hijacking) is where an attacker tricks a mobile phone service provid

CERT TEC 180518 WEB 265

Common Threats

Information leak

An information leak is when your private information gets released without your permission. This can happen through an i

Asset77525 Credit Chris Sisarich Exp 30.08.21

Common Threats

Spam

The term 'spam' refers to emails, SMS texts or faxes from an individual, or a company, that you didn’t ask to receive. I

CERT STREET 180621 WEB 1

Common Threats

Objectionable material

The term 'objectionable material' usually relates to any publication that deals with subjects like sex, horror, crime, c

CERT HOME 180616 WEB 17

Common Threats

Cyber bullying

Cyber bullying relates to any kind of bullying, harassment or abuse that’s carried out online, for example through socia

CERT STREET 180621 WEB 38

Common Threats

Online child abuse

This is any kind of abuse of a child that happens on the internet.

CERT TEC 180518 WEB 8

Common Threats

Online identity theft

Online identity theft is when someone gets personal information from another person, and uses it for their own gain.

CERT STREET 180621 WEB 46

Common Threats

Denial-of-service

Denial-of-service (DoS) attacks aim to restrict or impair access to a computer system or network. They typically target

CERT TEC 180518 WEB 143

Common Threats

Phishing

Phishing is a type of email scam. The sender pretends to be a trustworthy organisation — like a bank or government agenc

2019 05 16 MTP 0646

Common Threats

Ransomware

Ransomware is a type of malicious software that denies a user access to their files or computer system unless they pay a

CERT TEC 180518 WEB 166

Common Threats

Unauthorised access

The term 'unauthorised access' describes the act of directly — or indirectly — accessing information online without auth

CERT TEC 180518 WEB 299

Common Threats

Scams and fraud

Online scams are intended to manipulate or trick people into giving away their personal details, financial details, or m