Welcome to Cyber Intel & Info (CII)


"Don't get hacked, get smart" - Liam R. (Founder of CII)


This site is your guide to staying safe online. Simple, practical tips and tools to protect your privacy and strengthen security.

Quick Answers to Common Cyber Questions

Explore simple explanations and practical steps about scams, data theft, privacy, and more.

scam prevention illustration

Have you been scammed? Here are 5 actions to recover.

Author profile photo - Liam December 24, 2023   

Edited Jan 8, 2024

1) Act fast: If money is involved, contact your bank or card provider immediately to report the scam and freeze transactions. If not, notify the company or service where you first noticed the scam.


2) Get assistance: IDCARE (Australia/NZ) can help you make a recovery plan for free. Call 1800 595 160 or visit their website. If your bank isn't helpful, you can complain to the Australian Financial Complaints Authority.


3) Warn others: Report the scam to Scamwatch and, if appropriate, to the police.


4) Be extra watchful: Scammers often target victims again. Be cautious of anyone offering to help recover lost money or data—these are usually more scams.


5) Get support: If you're struggling, talk to a financial counsellor (free and confidential) or reach out to friends and family.


"Australia is a soft target for scammers because we don't have the laws and systems in place to prevent scams from taking place." – Consumer Action Law Centre

Cybercrime caused over $3 trillion in damages globally in 2015, and this number is rising.

Protecting your data helps protect your friends, family, and community.

security illustration

Can anything online really be secure?

Author profile photo - Liam January 10, 2024   

Edited Jan 12, 2024

Let's first look at the most common ways that online security and users privacy is breached.

The single biggest cause for data leaks, hacks and privacy breaches is phishing. Individuals and companies alike are a constant target for this cost effective and successful form of malicious action.


Phishing

In simple terms, phishing is when a threat actor pretends to be a trusted entity (e.g. a friend or a financial institution) so you perform some action (e.g. click a hyperlink) so that they can illegally obtain information from you. The ‘fishing’ metaphor refers to the concept of getting a user (you) on the hook and then reeling you in so they can get what they are after, which is typically private data.



These attacks almost always originate in an email or an instant message. Thankfully, it is easier to avoid falling victim to these hacks or scams than people think.

Continue Reading

How to avoid being phished?

Always look closely at the communication and check for any spelling or grammatical errors in the content. Check for errors in the domain names (URL) or email addresses (e.g. @gmall.com rather than @gmail.com). Think twice before clicking any links, if in doubt delete email or message immediately.

Cyber criminals often use threats that your security has been compromised or you’ve lost access to an account and they add a sense of urgency to have you miss the details. If you notice any of these signs always err on the side of caution and delete the communication. Never click on links (URLs) unless absolutely certain they are legitimate.


Now lets take a look at the next two most common malicious actions taken or tools inflicted on users: malware and malicious smartphone apps.


Malware

Malware is hostile software that is there to compromise a system and steal data.

Such programmes perform functions like deleting data, modifying systems, secretly tracking user activity and more. Typically malware finds its way onto a device by users clicking on unknown links or installing pirated software, which leads to the downloading of these harmful programmes. Malware is usually categorised as either a virus, trojan, spyware or keylogger.


How do you safeguard your private data (and finances!) from malware?

First, use legitimate and highly rated anti-virus software. Next make sure automatic updates are enabled for your device’s operating system and for all your applications. This is so you get all security patches that are sent with any new updates. Never download any fake, pirated, or untrusted software as there is a decent chance it contains malware.



Malicious Apps

Malicious Apps are any apps downloaded onto a device that has malicious code, which runs without the users knowledge or consent. The common misconception that all apps available on Google Play or Apple’s App Store are safe and secure, is completely false.

A good example were apps that enabled your smartphone to act as a torch while actually extracting private data in the background before they were removed. The sophisticated illegal apps sometimes go as far as taking full control of your accounts (including finances), gaining access to the microphone and camera and can take full remote control of all your data. They can then steal, encrypt, or delete your private data. Sometimes they simply stay hidden to read and copy the data at will. This is not something anyone would want.


How do we spot and avoid these apps?

Always check the permissions before downloading an app and verify the developer is known. Check the reviews and ratings of the app seem legitimate. Avoid downloading any app if it has only a few downloads or reviews (e.g. less than several thousand). Never download apps from third party app stores or download pirated apps. Lastly, as always, if you are in any doubt, do not download the app, or if have, then delete it immediately from your device(s).



So how do we stay secure?

Be informed - this is why this very website exists. Follow the above tips - the goal is that they become habits that you eventually perform subconsciously. Being aware of phishing, malware, malicious apps and the tips above already gives you an advantage that most people don’t have.

Also, being aware of the hackers psychology. By this I mean to understand that they are looking for easy targets for efficient use of their time to get data or money. If you are harder than other targets in reach, they will move on before they even try. This is great, as deterrent to attempt is the best difference against any cyber crime.

I trust you have learnt something from this article and good luck out there!

poem background

Poem on Cyber Security

Author profile photo - Liam January 12, 2024   

Edited Jan 16, 2024

Cyber security is a must,
For when online there’s little to trust.
You should protect your data and devices,
To avoid the risks of cyber crises.


Security is a fortress that's hard to breach,
To keep your data out of reach.
It's like a lock that's hard to pick,
A code that's hard to crack or trick.


It's like a shield that's always there,
To protect you, with good software.
It's working hard to keep you safe,
From hackers that come from any place.


Online security can be compared to a fight,
But a battle is not always won by might.
You can respect the rights and rules of others,
Standing proud with your cyber brothers.


So, don't be scared of cyber threats,
Just keep your guard up and no regrets.
Stay safe and secure, my cyber friend,
For your security is ready to defend.

Continue Reading for another Poem


Zach & Jack


There once was a hacker named Jack
Who tried to break into a bank
But he then met his match
In a security eng named Zach
Who foiled his plan with a prank


Zach had detected Jack's intrusion
And so sent him a fake solution
So Jack thought he'd succeeded
But in fact he'd been defeated
And then had to face legal prosecution


Author Info


blog

Liam

A cyber security enthusiast and seasoned engineer, committed to making the digital world safer, one tip at a time. Dedicated to demystifying cyber threats for all.



Stay secure out there.