Spear phishing is a targeted cyberattack toward a specific individual or organization with the end goal of receiving confidential information for fraudulent purposes
Published: ·
These are the most common phishing email examples with tips on how to identify and avoid them.
Published: ·
Phictionary is a guide to phishing attacks with a dictionary twist that exposes real-life examples of scams to help people proactively identify fraudulent communications.
Published: ·
Are you active on social media? You could be a target for social media phishing attacks designed to steal your private information.
Published: ·
Clone phishing is a technique that scammers use to steal your information. Our guide describes how it works, gives examples, and teaches you how to prevent it.
Published: ·
There are scammers pretending to sell and buy across digital marketplaces. Learn how to spot common Facebook Marketplace scams so you can avoid them.
Published: ·
Gen Threat Labs researchers reported that scammers have been exceedingly active, innovating new techniques and exploiting AI capabilities.
If you receive a suspicious email claiming to be from the ATO and featuring a Norton logo, please do not click any links, open attachments or respond to the sender. Forward the entire email to the Australian Taxation Office via ReportEmailFraud@ato.gov.au
Want more?
Follow us for all the latest news, tips, and updates.