The practice of protecting systems, networks, and data from digital attacks by using a combination of technologies, processes, and controls
What is Cyber Security
Cybercriminals use this technique to impersonate individuals or entities you recognize, like family, friends, or businesses. This tactic preys on your trust, making it harder to distinguish deception from reality and leaving you vulnerable to scams.
What is spoofing?
This happens when unsuspecting crypto currency investors buy in, the token’s price surges rapidly then scammers sell off their holdings.
what is Pump and Dump
A broad term that refers to the scams used by criminals to exploit a person’s trust in order to obtain money directly or obtain confidential information to enable a subsequent crime.
What is a social engineering scam
Synthetic media where images, videos, or audio are manipulated using AI to create realistic but fake representations of people or events
What is Deep fake
A type of long-term con where scammers build trust with victims through fake online personas, often posing as romantic interests or financial advisors.
What is Pig Butchering?
Is a fraudulent offer that tricks someone into giving money for a fake or non-existent investment opportunity that promises high returns with little to no risk.
What is an Investment Scam?
A type of social engineering scam where cybercriminals trick users into executing malware by disguising it as a CAPTCHA verification.
A Fake CAPTCHA Attack
A cyberattack where attackers use stolen username and password combinations from data breaches to gain unauthorized access to user accounts on other platforms
What is Credential Stuffing ?
A type of social engineering attack which combines "SMS" (short message services, better known as texting) and "phishing."
What is Smishing?
Is a security method that requires users to provide two or more forms of verification before gaining access to an account or system. It’s one of the most effective ways to protect against unauthorized access—even if your password is stolen.
What is MFA ?
A cyber threat where attackers use malicious QR codes to trick users into revealing sensitive information.
Quishing
Malware disguised as a legitimate generative AI application, which, once installed, can steal sensitive information
What is a Trojan?
Is a phone-based cyberattack where cybercriminals exploit the phone by posing as a trustworthy or authoritative source during a phone call.
What is Vishing?
A secure, encrypted digital tool that stores and manages your login credentials, allowing you to access all your accounts with one master password.
what is Password Vault?
Criminals hack into email systems to gain information about corporate payment systems, then deceive company employees into transferring money into their bank account.
Business Email Compromise
Is the development of computer systems that can perform tasks typically requiring human intelligence, such as speech recognition, decision-making, and visual perception.
What Artificial intelligence?
These are communication platforms, often online, where scammers promote fraudulent schemes, attempt to steal personal information, or trick victims into sending money.
What is called scam channels
Is a type of cyberattack where hackers use stolen usernames and passwords to try and access other accounts, banking on the fact that many people reuse the same login details across multiple sites.
What is Credential Stuffing?
Is a federal law that governs how personal information is handled by certain organizations and government agencies in Australia.
The Australian Privacy Act