Post

Cyber Security Awareness Month: Week 3 - Outsmart Scams, Think Before You Click, and Detect Deepfakes

Cyber Security Awareness Month: Week 3 - Outsmart Scams, Think Before You Click, and Detect Deepfakes

Why it matters

Scams are no longer just clumsy emails full of spelling mistakes. Today’s cybercriminals use AI‑powered tools to create convincing emails, text messages, phone calls, and even fake videos or voice recordings (“deepfakes”). These can be so realistic that they trick even the most cautious among us.

In 2024–25, Australians reported a cybercrime every six minutes, with millions of dollars lost to scams. The more realistic the scam, the more important it is to pause, verify, and protect yourself.


Protect yourself: Step‑by‑step review using the indicators

For situations involving unverified contacts, callers, or other unsolicited approaches.

  1. Pause before you act
    • Email/SMS/Chat: Do not click links, open attachments, reply, or forward.
    • Calls/Video: Do not share information, approve payments, or install software during the interaction.
  2. Scan for urgency or pressure
    • Red flags: “Pay now,” “account will be closed,” “confirm within 2 hours,” “keep this confidential.”
    • Action: Slow down. Scammers manufacture urgency to bypass your judgement.
  3. Check the source details
    • Email:
      • Sender domain: Hover the “From” address; look for misspellings or look‑alike domains (e.g., paypa1.com).
      • Links: Hover to reveal the true destination; it should exactly match the official domain.
    • SMS:
      • Number: Random or international numbers, or messages that move a conversation from a verified thread to a new number.
      • Links: Shortened or odd‑looking links.
    • Call/Voicemail:
      • Caller ID: Blocked, private, or spoofed to resemble a known organisation.
      • Callback numbers: Don’t trust numbers given in the message; independently look up the official number.
    • Video/Social:
      • Account: Is it verified/official? New account? Low history?
      • Context: Unexpected contact or off‑brand style.
  4. Check the content carefully
    • Language and tone: Generic greetings (“Dear Customer”), unusual phrasing, spelling errors, or a tone that doesn’t match previous messages.
    • Requests: Passwords, PINs, MFA codes, remote access, gift cards, crypto, invoice changes, or bank detail changes.
    • Attachments/links: Unexpected PDFs/ZIPs/Docs; URLs that don’t match the visible text.
    • Deepfake clues (for video/voice): Lip‑sync lag, odd blinking, inconsistent lighting/shadows, audio glitches or robotic tone, sudden uncharacteristic behaviour.
  5. Verify independently (second channel)
    • Contact the organisation or person using a number/address you find yourself (official website, saved contact, past invoice). Not the details in the message.
    • Cross‑check: Search exact phrases online; many scam templates are widely reported.
    • Workplace: Follow your internal verification and reporting process.
  6. Decide and act
    • Safe: No red flags and verification checks out > proceed as normal.
    • Suspicious: One or two red flags > do not interact! Verify further or ask IT/Security, contact company through offical means.
    • Malicious: Multiple red flags or failed verification > report using the tools below, then delete/block.
  7. Report and remove
    • Use built‑in reporting: Outlook/Gmail phishing report; forward SMS to 7226 (Telstra).
    • Report officially: Lodge a report at ReportCyber.
    • Then: Delete the message, block the sender, and, if at work, notify your security team.

Pro tips

  • Type, don’t tap: For banking/government/work, manually type the website or search with Google/Bing instead of using links in the message.
  • MFA code rule: Never share MFA codes or approve prompts you did not initiate.
  • Screenshots: Report messages with your phish report button to your security team, or capture evidence before deleting to aid reporting and training with screenshots.

Top indicators of phishing attempts

IndicatorWhat it looks likeWhy it’s suspiciousWhat to do
Urgency or threats“Your account will be closed in 24 hours” / “Pay now to avoid legal action”Designed to make you panic and act without thinkingPause; verify via official contact channels
Unfamiliar or altered sender addresssupport@paypa1.com vs support@paypal.comLook‑alike domains trick you into trusting the senderHover to reveal the true domain; compare with official site
Generic greetings“Dear Customer”Legit organisations usually use your nameTreat as a red flag and verify
Unexpected attachments or linksRandom PDFs/ZIPs/Docs or “View invoice” linksMalware or credential‑harvesting pagesDon’t open; confirm with the sender first
Spelling/formatting errorsAwkward phrasing, mixed fontsCommon in mass scams or poor translationsCombine with other signs; do not rely on this alone
Mismatched URLsText shows www.bank.com but hover shows bank-login-secure.comVisible link differs from the destinationType the address manually instead
Requests for sensitive infoPasswords, PINs, MFA codes, ID scansLegit orgs won’t ask via email/SMSReport to ReportCyber and delete

Top indicators of deepfakes

IndicatorWhat it looks likeWhy it’s suspiciousWhat to do
Lip‑sync mismatchMouth slightly out of sync with speechImperfect alignment gives fakes awayRequest a follow‑up call/meeting on a known channel
Unnatural blinking/expressionsToo much/little blinking; stiff micro‑movementsModels miss natural facial cuesCompare with known genuine footage
Weird lighting/shadowsInconsistent shadows or light directionAI struggles with realistic light physicsInspect multiple frames for consistency
Audio glitches/robotic toneDistortion, flat intonation, odd pausesVoice cloning artifactsVerify using a known phone number
Sudden tone/behaviour changeUnusual urgency or phrasing from a known contactPossible impersonationCross‑check via a second channel
No verifiable contactNo matching phone/email on official sitesAvoids traceable channelsIndependently look up contact details

Top tools to report and block phishing

ToolWhat it doesHow to use it
ReportCyber (Australian Government)Report cybercrime including phishing/scams/ID theftVisit https://www.cyber.gov.au/report > select type > submit > keep reference number
Outlook “Report Phishing”Sends to Microsoft or your Security Team. Helps protect other usersSelect email > Report > Phishing
Gmail “Report phishing”Alerts Google to block similar emails globallyOpen email > ⋮ More > Report phishing
SMS to 7226 (Telstra)Reports scam texts to your mobile provider for blockingForward the suspicious SMS to 7226 (free on most networks)

Tip: Report fast. Quick reporting helps providers & Security Teams block campaigns for everyone.


Not every message is what it seems.
Pause. Check. Protect.


This post is licensed under CC BY 4.0 by the author.