How scammers may approach you
Scammers are always looking for new ways to take advantage of people who aren't paying attention and get their personal information, especially their bank information. Their plan is to use trusted channels you normally use to send you dodgy deals, sketchy links, and impersonated content. Learn how they contact you through these channels, so you know what to look out for.
Beware of emails that appear to have originated from a familiar and reliable source, such as a bank. They may ask for personal information to verify identity, request payment, or process a refund. These emails can look very real, making them hard to spot. Email scams are also referred to as "phishing" scams.
SMS
These text messages seem to be from trustworthy people, such as government agencies, businesses you use, and family or friends. They trick you into giving up personal information, often including a link or phone number to contact them. SMS scams are also referred to as "smishing" scams.
Phone
Callers pretend to be from trusted places like banks or government offices. They convince you to share personal or financial details by making false claims about your account, threatening legal action, or offering rewards. Telephone scams are also referred to as "vishing" scams.
QR codes
Scammers using QR codes try to fool you into scanning a code with your phone. After that, the QR code takes users to a bogus website that could ask for personal information, download a virus, or run ransomware (spy software). QR code scams are also referred to as "quishing" scams.
Device access
Scammers pose as tech support to trick you into granting them remote access to your computer or devices. They may claim to help your device run faster, increase storage, or troubleshoot non-existent issues, but their true intention is to install spyware and steal personal and financial information.
Applications
Scam apps often imitate trending apps and require excessive permissions. While in the app store, it may ask to access your calendar, camera, contacts, location, microphone, phone, SMS, storage, and device sensors (biometrics) before it can download. Additionally, the app may prompt you to connect to your bank or social media accounts, potentially stealing login and password information.
Social media
Scammers will try to impersonate us, our friends, family, and famous idols on social media by using the personal information available on our profiles to deceive and manipulate us. The opportunity to use our interests to entice us with bogus goods, low prices, lightning-fast delivery, and a way to make direct contact with you in order to steal your money or personal information is limitless.
Websites
Scammers use imitation websites with familiar navigation and brand promotion to gain our trust. Scam websites often mimic familiar sites, use trusted brands, fake reviews, spoof influencer ads, and post photos of products from past buyers. They will also offer limited stock and time-limited deals, so you don't have doubts or time to suspect the site is fake or do your own research.
In person
These scams take advantage of our trust and desire to support the community by posing as charities or selling bogus products or services. Scammers may steal personal information from forms, copy credit card numbers, and offer cash only transactions. These scams can make us feel pressured to make on the spot decisions, hesitant to ask for time to do research, and uneasy about questioning someone's honesty face to face.
Report a scam
Report a scam to Scamwatch the National Anti-Scam Centre and help stop scams, protect others, and get support.
Contact ID Support NSW
If you believe your personal information has been stolen, used, or accessed without your knowledge or consent, our advisors can simplify the process and guide you through protecting your identity, accounts, and devices.
Once you send us a request, we’ll do our best to reply within one business day.
Call our advisors on 1800 001 040 Monday to Friday between 9am and 5pm (Sydney time).
Interpreter services are available on request.