skip to log on skip to main content
VoiceOver users please use the tab key when navigating expanded menus
Article related to:

How to protect yourself

Hacking: What it is and how to protect yourself

Security specialist

2026-02-12 05:30

Estimated reading time
6 min

Key points

  • Hacking involves cybercriminals gaining access to your email, social and banking accounts or your devices to steal data or money.

  • Being hacked can happen to the best of us, but there are some obvious signs that you’ve been hacked, such as your device running unusually slow or you’re missing files.

  • Using a strong, unique password or passphrase, installing antivirus software, and backing up your files regularly are some effective measures you can take to help protect yourself from a potential hack.

While watching fictional hackers on screen might be entertaining, dealing with a real-life hack is anything but fun.

Cyberattacks can disrupt lives, damage businesses, and compromise sensitive information in ways that are anything but entertaining. Whether you're running a company or simply browsing online, understanding the basics of hacking is essential.

We’ll run through what hacking is, how a hacker might gain access to your accounts and devices, signs you’ve been hacked, and what you can do to protect yourself and your business from online threats. 

 

What is hacking?

A hack occurs when a cybercriminal gains unauthorised access to your computer system, phone, tablet, or online network.

It can be as simple as someone breaking into your email account without permission by finding out your password or as sophisticated as someone gaining remote access to your computer and locking your entire business out of essential systems.

Nicholas Walsh, ANZ Cybercrime Specialist, says, “Widespread access to the Internet has changed our society in many positive ways, but this progress has also given rise to a new generation of criminals who use sophisticated techniques and technology to attack everyday people.”

Hackers will often use malware (software that can infiltrate your systems to steal information or sabotage systems) or ransomware (software designed to block you out of your systems until payment is made to the hacker) to access your computer, device, or accounts. 

 

How do hackers access your devices and accounts?

Hackers use a variety of techniques to gain unauthorised access to your devices, including:

  • Phishing attacks: Cybercriminals may send fake emails or texts that look real, asking you to click a link or enter your login details.

  • Malware and viruses: You might accidentally download harmful software from a link, email attachment, or website. This can give hackers control of your device.

  • Public Wi-Fi: Free Wi-Fi in places like cafes or airports can be unsafe. Hackers can set up fake networks to steal your information. If you enter private information on websites while using their network, you risk exposing your data.

  • Weak or reused passwords: Simple or reused passwords make it easier for hackers to guess and get into your accounts.

  • Outdated software: If your apps or operating system aren’t updated regularly, hackers can take advantage of known security flaws. Software updates often include important security fixes that protect your device from cyber threats. Keeping your system up to date is one of the easiest ways to stay safe online.

  • Outdated security systems: If your device’s operating and security systems aren’t updated regularly, hackers can exploit known gaps. Most system updates include security enhancements that eliminate these gaps and protect you from hackers, so it’s best to always stay up to date.

  • Fake tech support scams: Scammers may call or message you pretending to be from a trusted company, offering help while secretly trying to access your device.

  • Data breaches: If an online company you use gets hacked, your login details might be exposed and sold online to hackers on the dark web. The dark web is a series of hidden web pages often used by cybercriminals that are inaccessible through regular search engines. You can visit www.haveibeenpwned.com to check if your email address has been exposed in any data breaches.

 

10 signs that you might have been hacked

  1. Unusual account activity: You notice logins from unfamiliar locations, password reset emails you didn’t request, or messages sent from your account that you didn’t write.

  2. You’re locked out of accounts: If your password no longer works and recovery options have been changed, someone may have taken control of your account.

  3. Your device is slower than usual: Sudden drops in performance, freezing, or crashing could indicate malware running in the background.

  4. Pop-ups and strange ads: Unexpected pop-ups, especially ones asking you to download software or enter personal details, may be a sign of infection.

  5. New apps or files you didn’t install:. If you see unfamiliar apps, files, or browser extensions, your device may have been compromised.

  6. Unexplained charges or transactions:: Unexpected purchases or bank activity could mean your financial information has been stolen.

  7. Disabled security software: Your antivirus or firewall is turned off without your knowledge, or you’re unable to update it.

  8. Redirected web traffic: You’re being sent to strange websites when you try to visit familiar ones.

  9. Battery drains quickly: Malware can run silently in the background, using up system resources and draining your battery faster than normal.

  10. Family and friends receive unusual messages from you: If people report getting unusual emails, texts, or social media messages from you, your account may be compromised.

 

How to help protect yourself from being hacked

While you can never be completely safe from hackers, there are several ways to keep security tight in your online life.

  • Ensure your passwords are sophisticated (including special characters, capitals and numbers), don’t write them down anywhere, and change them regularly. Alternatively, consider using a passphrase instead.

  • Enable multi-factor authentication (MFA) for extra layers of security.

  • Keep your anti-virus software updated on computers, phones and tablets.

  • Never click on links or open attachments from unexpected emails or messages.

  • Don’t use public Wi-Fi unless you have verified with the venue that it is the correct link. Do not enter or access personal or sensitive data on public networks, even when using a trusted service.

  • Keep track of your bills and bank statements; contact your bank or service provider immediately if you notice any unusual activity.

  • Only download games or apps from trusted sources, like those verified by your device's official app store.

  • Disable software on your device that auto-fills forms with your details.

  • Keep backups of all critical files and data. This way, if your account is compromised, the hacker might not be able to extort you.

  • Use a virtual private network (or VPN). A VPN encrypts your data (making it harder to hack) and hides your IP address (making it harder to track your online activities). This form of encryption makes it safer to access the internet no matter what device you use.

 

What to do if you’ve been hacked

The Australian Signals Directorate (ASD) recommends that you take these immediate actions if you have been hacked:

  • Disconnect from the internet.

  • Scan for viruses.

  • Change your passwords.

  • Tell your family, friends and colleagues to be wary of any unusual requests they get from you (such as asking them to transfer you money).

Security tip: Consider implementing a credit ban so that credit reporting agencies cannot access personal information in your consumer credit file. 

 

Who can you contact if you’ve been hacked?

  • Report the scam to the Australian Signals Directorate’s ReportCyber portal. This resource is there for reports of scams where money or personal information has been lost.

  • Help others by reporting to Scamwatch to help them prevent future losses, monitor trends and educate the population about emerging threats.

  • You can also contact IDCare, a not-for-profit organisation providing support to those experiencing identity and cyber security concerns.

  • Contact your bank immediately if you have shared personal or financial information.

  • If you’re an ANZ customer, you can report fraud or suspicious activity in multiple ways, such as through the ANZ app or by calling us
anzcomau:content-hubs/security/protect-yourself
Hacking: What it is and how to protect yourself
ANZ
Security specialist
2026-02-12
/content/dam/anzcomau/images/security-hub/how-to-protect-yourself/what-is-hacking-banner-1200x800.jpg

Be cyber-safe and savvy

Let’s ensure your security systems are fighting fit and ready to protect you from hacking attacks.

Let’s get cyber-safe

 

The information set out above is general in nature and has been prepared without taking into account your objectives, financial situation or needs. Before acting on the information, you should consider whether the information is appropriate for you having regard to your objectives, financial situation and needs. By providing this information ANZ does not intend to provide any financial advice or other advice or recommendations. You should seek independent financial, legal, tax and other relevant advice having regard to your particular circumstances.

Top