• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

Cybersecurity & Risk Management Specialists

Menu
  • Home
  • Industries
      • Aviation
      • Defence & Defence Industry
      • Government
      • Health & Hospitals
      • Corrections and Detention
      • Maritime
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • Research and Education Industry
      • Telecommunications
      • Utilities
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Pandemic Planning
      • Electronic Security
      • IT Disaster Recovery Plan
      • Security Consultants
      • CCTV and Security Cameras
      • Duress Alarms
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Solutions
    • banner-menuUnisys Solutions
    • CTO-Blog-110619-Header-GraphicLookingGlass Solutions
    • menu-bg-2Dell Technologies (RSA) Solutions
    • Sightline-Visualization-menuSightline Solutions
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Melbourne Man Falls Prey To iPhone Hackers

You are here: Home / Security News / Melbourne Man Falls Prey To iPhone Hackers

A Melbourne man was shocked to discover he had been hacked, become a victim of identity theft, and had his every online movement tracked, after he had his iPhone checked at a local Apple store. After he noticed some unusual activity occurring on his iPhone and Mac, he was advised by the store that he was part of a family sharing plan.  “You’re the child and there’s a parent,” the Apple employee told him. This gave the ‘parent’ the ability to monitor his actions and block him from using certain apps on his phone through parental controls.

He financially lost $9500, almost lost another $10,000, his smart TV, security cameras, credit cards, AfterPay, tax returns and even his Tesla car were all hacked. He had suspected that someone was monitoring his screens, and he is certain that his information has now been put up on the dark web.

Each time he wants to send an email, a Pegasus Spyware warning appears on his screen. Apple has returned $300 in compensation, and they are still trying to find a way to resolve the issue.

However, two years later, he has been unable to shake the cyber criminals behind this scam, and suspects it originated from someone he met on a dating app.

The identity theft is so extreme that he has received a Commonwealth Victims Certificate to show to government agencies and financial institutions to help manage his situation.

Best Practices To Avoid Identity Theft & Cybercrime

  • Keep software up to date
  • Practise good password management
  • Avoid phishing scams
  • Avoid clicking unrecognised links
  • Safeguard Protected data
  • Install antivirus/anti malware protection
  • Back up your data

Ramifications of Cybercrime

In the last year, more than 5.3 million Australians experienced cybercrime.

And Australians spent a whopping 27 million hours trying to resolve the issue at an average of 5.1 hours for each Australian, according to the 2022 Norton Cyber Safety Insights Report.

Cyber-attacks can damage a person or business’s reputation, and erode the trust your customers have for you, which in return can lead to loss of customers and loss of sales.

The financial impact of a data breach is one of the most hard-hitting consequences that organisations and individuals will have to deal with. Costs can include compensating affected customers, setting up incident response efforts, investigating the breach, investment into new security measures, legal fees, as well as the regulatory penalties that can be imposed for non-compliance with the GDPR (General Data Protection Regulation).

Our Melbourne team provide the best cyber-threat management to protect against any cyber threats. Contact one of our staff members in the Team for a chat today.

Author: Mahdi Kobeissi, Agilient Consultant

Tweet
Share

Security News cyber attacks,  cybercrime,  cybersecurity,  GDPR,  hacked,  hacking,  identity theft,  malware,  Melbourne

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2022 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692