Australian based Managed IT support offices in Melbourne, Sydney and Brisbane
Powernet Colour a VITG Company POS

The Little Black Book of Scams

Brought to you by the Australian Government's ACCC, The Little Black Book of Scams is designed to protect Australian's against cybercrime through education.

Technology plays an important and powerful role in protecting Australian's against cyber crime, stopping or identifying an attack before it can get through your doors. However, technology can't always protect one of the biggest vulnerabilities, human error. Cyber criminals are clever in how they launch attacks and often, it can be very difficult to tell the difference between a malicious email or website and a legitimate one! Check out our introduction to cyber security training to learn more. 

The Little Black Book of Scams details not only cyber crime, but all types of scams. It takes you through how scams are built, executed and how to protect yourself. Here you will find a summary if the book. 

Every year, scams cost Australians, businesses and the economy hundreds of millions of dollars and cause emotional harm to victims and their families. 
- The ACCC, Little Black Book of Scams

Types of Scams

The book goes through 11 specific types of scams dating and romance scams, investment scams, threat and penalty scams, unexpected money scams, identity theft, online shopping, classifieds and auction scams, prize and lottery scams, scams targeting computers and mobile devices, job and employment scams, charity and medical scams and finally, business scams.

Most scams follow the same pattern and once you understand this, the tricks of the scammer become easier to spot.
- The ACCC, The Little Black Book of Scams

The Anatomy of a Scam 

Broken into three components, the anatomy of a scam goes through how a scam is usually built. Understanding this can make it easier to identify them. 

1. The Approach: Delivery Method 
Online, over the phone, at your door

When scammers approach you it will always come with a story designed to make you believe a lie. The scammer will pretend to be something they are not, a government official, an expert investor, a lottery official or even a romantic admirer. To deliver these lies to you, scammers will use a range of communication methods.

2. Communication and Grooming  
If you give them a chance to talk to you, they will start using tricks in their scammers’ toolbox to convince you to part with your money.

3. Spending The Money 
Sometimes the biggest clue you will have that it is a scam is the way the scammer asks you to pay.

Protecting Yourself

Be alert to the fact that scams exist
When dealing with uninvited contacts from people or businesses, whether it’s over the phone, by mail, email, in person or on a social networking site, always consider the possibility that the approach may be a scam. Remember, if it looks too good to be true, it probably is.

Know who you’re dealing with
If you’ve only ever met someone online or are unsure of the legitimacy of a business, take some time to do a bit more research. Do a Google image search on photos or search the internet for others who may have had dealings with them.

Do not open suspicious texts, pop-up windows or emails—delete them.
If unsure, verify the identity of the contact through an independent source such as a phone book or online search. Don’t use the contact details provided in the message sent to you.

Keep your personal details secure 
Put a lock on your mailbox and shred your bills and other important documents before throwing them out. Keep your passwords and pin numbers in a safe place. Be very careful about how much personal information you share on social media sites. Scammers can use your information and pictures to create a fake identity or to target you with a scam.

Beware of unusual payment methods
Scammers often ask for payment by wire transfers, preloaded cards and even Google Play, Steam, or iTunes cards and Bitcoin. These are nearly always a sign that it is part of a scam.

Keep your mobile devices and computers secure
Always use password protection, don’t share access with others (including remotely), update security software and back up content. Protect your WiFi network with a password and avoid using public computers or WiFi hotspots to access online banking or provide personal information.

Choose your passwords carefully
Choose passwords that would be difficult for others to guess and update them regularly. A strong password should include a mix of upper and lower case letters, numbers and symbols. Don’t use the same password for every account/profile, and don’t share your passwords with anyone.

Beware of any requests for your details or money.
Never send money or give credit card numbers, online account details or copies of personal documents to anyone you don’t know or trust. Don’t agree to transfer money or goods for someone else: money laundering is a criminal offence.

Be careful when shopping online.
Beware of offers that seem too good to be true, and always use an online shopping service that you know and trust. Think twice before using virtual currencies (like Bitcoin)—they do not have the same protections as other transaction
methods, which means you can’t get your money back once you send it.

Scammers take advantage of the busy nature of many businesses to swindle them.
- The ACCC, The Little Black Book of Scams

What to do When You Suspect a Scam

If you suspect cyber crime activity but you're not sure, you can always call us, our Cyber Security Team can look into it for you. 

To read the full book, head over to the ACCC website.

Subscribe to our newsletter for the latest technology tips & tricks.

Recent Articles

Tags

Categories

Search the Powernet blog

Getting the most out of Microsoft Teams, our top 10 tips

Getting the most out of Microsoft Teams, our top 10 tips

What is Microsoft Teams? Microsoft Teams is a valuable workplace tool, keeping employees connected and organised. It drives productivity and […]

Read more
Empowering Efficiency: The Rise of Business Process Automation

Empowering Efficiency: The Rise of Business Process Automation

Staying ahead of the technological curve in today’s fast paced landscape is essential. The concept of engaging a vCIO has […]

Read more
The Australian Cybersecurity Centre and the FBI's Joint Advisory #stopransomware

The Australian Cybersecurity Centre and the FBI's Joint Advisory #stopransomware

Who Are Play Ransomware? Play is a group of hackers that are responsible for extortion and ransomware attacks on government […]

Read more

We are well awarded

Reach our team

We’re always happy to help you find the right solutions to your IT and technology needs. Here are some ways to contact us.

Give us a call

Chat with our team to discover the best IT solutions for your organisation.
1300 892 692

Our locations

Melbourne CBD

Level 15 / 565 Bourke Street, Melbourne VIC 3000

Eastern Melbourne

Level 2 / 74 Doncaster Road, Balwyn North VIC 3104

Geelong Region

East 4/13-35 Mackey Street, North Geelong VIC 3215

Sydney

U18 / 23-31 Bowden Street,
Alexandria NSW 2015
(02) 8214 8855

Brisbane

7/9 Archimedes Place, Murarrie QLD 4172

Send us an enquiry

cross