Log in to view details about your AARNet services, including usage reports
Log in to send files of any size, quickly and securely
Browse answers to frequently asked questions about our products and services
Check the current performance status for our services
Fast local access to popular international open-source content
Check to see if a web address is on-net
What are the multiple types of phishing attacks, how they work, and how to protect yourself from them.
Cyber security is everyone’s responsibility and it’s important to take steps to safeguard both your personal and company information. In this blog post we’ll explain several types of phishing attacks, how they work, and how to protect yourself from them.
Like phishing, vishing, smishing and quishing aim to trick you into providing your personal or financial information or installing malware on your devices. These attacks can have serious consequences, such as identity theft, fraud or data breaches.
Phishing is where attackers send emails that look like they come from a legitimate source like a bank or government agency. These emails usually contain a link or attachment that directs you to a fake website or downloads malicious software on your device. The goal is to get you to enter your login credentials, credit card details or other sensitive information.
Vishing is a type of phishing that uses voice calls instead of emails. Attackers call you and pretend to be someone you trust such as a customer service representative, a tax officer or police officer. They may ask you to verify your identity, confirm a transaction or pay a fine. They may also try to persuade you to visit a fraudulent website or download a malicious app.
Smishing is a type of phishing that uses text messages (SMS) instead of emails. Attackers may send you texts that look like they come from legitimate sources, such as your bank, your mobile service provider, or a delivery service. These texts may contain a link or a code that directs you to a fake website or installs malware on your device. The goal is to get you to enter your login credentials, credit card details or other sensitive information.
Quishing is a type of phishing that involves tricking someone into scanning a QR code using a mobile device. These QR codes appear legitimate, like the ones found on product packaging, social media, flyers and brochures or in public spaces. These malicious QR codes may redirect you to fraudulent websites. Like other types of phishing the goal is to obtain your personal or financial information or install malware on your device.
The best way to protect yourself from phishing, vishing, smishing and quishing attacks is to be vigilant and cautious when receiving any communication that asks you to take an urgent action or provide information. Here are some steps that you can take to protect yourself from these attacks:
Phishing, vishing, smishing and quishing are serious threats that can compromise your personal and company security and privacy. By following these tips, you can reduce the risk of becoming a victim of these attacks and protect yourself from cybercriminals.
Stay safe online: https://www.cyber.gov.au/acsc/cyber-security-awareness-month-2022
IDCare (available in Australia and NZ): https://www.idcare.org/
Have I Been Pwned: https://haveibeenpwned.com/
Report a scam: https://www.scamwatch.gov.au/report-a-scam
Report a cybercrime: https://www.cyber.gov.au/acsc/report
Virus Total: https://www.virustotal.com/gui/home/url
Experian: https://www.experian.com.au/consumer/request-a-ban
Equifax: https://www.equifax.com.au/lp/protect-your-identity
Illion: https://www.illion.com.au/illion-au-ban-request-application-form/
James Veitch: This is what happens when you reply to spam email | TED Talk