1 00:00:00,920 --> 00:00:03,240 Speaker 1: This is gem Nation with jenes. 2 00:00:04,519 --> 00:00:04,800 Speaker 2: Well. 3 00:00:04,960 --> 00:00:07,640 Speaker 3: Last week, Optus revealed that the data of nine point 4 00:00:07,720 --> 00:00:12,879 Speaker 3: eight million Australians had been breached. This has understandably send 5 00:00:12,920 --> 00:00:16,240 Speaker 3: Optus and their customers into a panic about what personal 6 00:00:16,320 --> 00:00:19,760 Speaker 3: information these hackers have obtained and how they'll use it. Well. Now, 7 00:00:19,800 --> 00:00:22,040 Speaker 3: the hackers have demanded that Optors paid one point five 8 00:00:22,040 --> 00:00:26,560 Speaker 3: million dollars ransom in cryptocurrency, otherwise they will leak the 9 00:00:26,680 --> 00:00:30,680 Speaker 3: customers data Australia is leading tech expert Trevor Long joins 10 00:00:30,720 --> 00:00:31,720 Speaker 3: US Now to explain more. 11 00:00:31,720 --> 00:00:36,400 Speaker 1: Hello Trevor, Good morning Trevor. So how do. 12 00:00:36,520 --> 00:00:39,400 Speaker 3: Could this information be used? What information for starters do 13 00:00:39,440 --> 00:00:41,320 Speaker 3: they have? I assume it's your date of birth, it's you, 14 00:00:41,479 --> 00:00:45,200 Speaker 3: it's your name, your personal banking details, perhaps you know what. 15 00:00:45,120 --> 00:00:48,200 Speaker 1: Everything but your banking details in your password. Because normally 16 00:00:48,200 --> 00:00:50,720 Speaker 1: when there's a hack, I'd be like, look, change your password, 17 00:00:50,840 --> 00:00:52,760 Speaker 1: change credit card number, You'll be fine. But in fact 18 00:00:52,760 --> 00:00:55,800 Speaker 1: they've got you likely your data, birth, your address, your 19 00:00:55,840 --> 00:01:00,240 Speaker 1: phone number, your driver's license number. And I've this this 20 00:01:00,480 --> 00:01:03,520 Speaker 1: alleged hacker and they're ransom. They have to provide a 21 00:01:03,600 --> 00:01:05,479 Speaker 1: kind of sample of the data when they make a 22 00:01:05,480 --> 00:01:08,240 Speaker 1: claim like this. I've obtained that data and I've looked 23 00:01:08,240 --> 00:01:10,800 Speaker 1: at it, and I've spoken to people in the data, 24 00:01:11,000 --> 00:01:14,480 Speaker 1: and they have never been breached before. And it is 25 00:01:14,720 --> 00:01:18,520 Speaker 1: they're legit driver's licenses, so it's your identity. And the 26 00:01:18,520 --> 00:01:21,319 Speaker 1: thing is they can apply for credit on your behalf. 27 00:01:21,440 --> 00:01:25,040 Speaker 1: They could get loans, but more importantly, over the next 28 00:01:25,160 --> 00:01:28,360 Speaker 1: months and years, they will scam you. They will spam 29 00:01:28,440 --> 00:01:31,520 Speaker 1: you with emails that look so legitimate because they know 30 00:01:31,640 --> 00:01:34,039 Speaker 1: your birthday, they know where you live. You think it's 31 00:01:34,040 --> 00:01:37,720 Speaker 1: a trusted contact, but actually it's a scammer trying to 32 00:01:37,720 --> 00:01:38,520 Speaker 1: get more from you. 33 00:01:38,880 --> 00:01:42,640 Speaker 3: Oh what a mess. And also if that can ruin 34 00:01:42,680 --> 00:01:46,440 Speaker 3: your credit rating, all kinds of things for implications for years. 35 00:01:46,560 --> 00:01:48,440 Speaker 1: That's right, And the credit ratings, I think the biggest 36 00:01:48,480 --> 00:01:51,440 Speaker 1: risk because there's not something we have real time knowledge of. 37 00:01:51,920 --> 00:01:54,160 Speaker 1: So if you're in the market for a home loan 38 00:01:54,160 --> 00:01:55,920 Speaker 1: in a year from now and you apply and they go, 39 00:01:55,960 --> 00:01:58,200 Speaker 1: hang on a minute, you've defaulted on a ten thousand 40 00:01:58,200 --> 00:02:00,240 Speaker 1: dollars credit card. You're like, what are you talking? I 41 00:02:00,280 --> 00:02:02,320 Speaker 1: didn't apply for a credit card. It's going to take 42 00:02:02,400 --> 00:02:05,640 Speaker 1: you a long time to recover from that. And so 43 00:02:05,800 --> 00:02:09,640 Speaker 1: that's the challenge is hidden identity fraud that we have 44 00:02:09,720 --> 00:02:10,960 Speaker 1: to fear the most right now. 45 00:02:11,080 --> 00:02:13,120 Speaker 2: So one point five million dollars that doesn't seem like 46 00:02:13,120 --> 00:02:15,840 Speaker 2: a lot of money. If Optis just paid this and 47 00:02:16,680 --> 00:02:19,480 Speaker 2: made it go away, but then the hackers would just 48 00:02:19,560 --> 00:02:20,720 Speaker 2: keep coming back, wouldn't. 49 00:02:20,400 --> 00:02:22,720 Speaker 1: They Exactly you were to go away. Do you trust 50 00:02:22,800 --> 00:02:25,639 Speaker 1: someone who's hacked data to give them a million bucks 51 00:02:25,800 --> 00:02:28,440 Speaker 1: us and then give you the data and not give 52 00:02:28,440 --> 00:02:31,560 Speaker 1: it to anyone else. It's unlikely. So look, Optus is 53 00:02:31,600 --> 00:02:34,400 Speaker 1: working with the Australian Federal Police on this. Let's hope 54 00:02:34,400 --> 00:02:36,240 Speaker 1: they get some information about the person, but it doesn't 55 00:02:36,320 --> 00:02:38,960 Speaker 1: change the fact that the data is likely to be 56 00:02:39,120 --> 00:02:42,160 Speaker 1: shared on the internet and sold. For example, you'll if 57 00:02:42,160 --> 00:02:44,600 Speaker 1: they say if Optis doesn't pay, they will sell it 58 00:02:44,680 --> 00:02:47,600 Speaker 1: either in fall or in chunks. Your personal information is 59 00:02:47,639 --> 00:02:51,120 Speaker 1: worth three hundred dollars, they will sell your information for 60 00:02:51,120 --> 00:02:54,560 Speaker 1: three hundred dollars and they'll sell it in chunks of thousands. 61 00:02:54,720 --> 00:02:56,760 Speaker 1: And so you know, that's the point where we all 62 00:02:56,760 --> 00:02:58,359 Speaker 1: start getting scammed and that information. 63 00:02:58,680 --> 00:03:01,120 Speaker 2: So what can we actually do? This sounds inevitable as 64 00:03:01,160 --> 00:03:05,440 Speaker 2: far as so obviously every email you get now because 65 00:03:05,480 --> 00:03:07,280 Speaker 2: I was with Optus and I flicked over to tell 66 00:03:07,280 --> 00:03:10,920 Speaker 2: Stra a few years ago, but I'm thinking that and. 67 00:03:11,000 --> 00:03:13,480 Speaker 1: Jonesie, that's another point. It's anyone who was or is 68 00:03:13,480 --> 00:03:16,600 Speaker 1: it Opti customer from twenty seventeen until now, and my 69 00:03:16,680 --> 00:03:20,239 Speaker 1: information is from around May twenty seventeen. The thing is vigilance. 70 00:03:20,280 --> 00:03:23,399 Speaker 1: That's really all I can advise. So those emails, those 71 00:03:23,400 --> 00:03:26,000 Speaker 1: text messages are received. We're all very alert now about that, 72 00:03:26,080 --> 00:03:28,520 Speaker 1: and it's great, But speak to everyone in your life, 73 00:03:28,560 --> 00:03:31,760 Speaker 1: your neighbors, your elderly parents, Let them know to be 74 00:03:31,919 --> 00:03:36,040 Speaker 1: hyper vigilant about emails. They get that seem to be familiar, 75 00:03:36,280 --> 00:03:38,360 Speaker 1: they seem to know who you are. They're the ones 76 00:03:38,360 --> 00:03:40,320 Speaker 1: that are going to be the most likely to scam 77 00:03:40,360 --> 00:03:42,480 Speaker 1: you and risk you. And also just keep your eye 78 00:03:42,520 --> 00:03:45,560 Speaker 1: on bank details and that credit report. Do a credit 79 00:03:45,600 --> 00:03:47,839 Speaker 1: report now, and then do another one in a little while, 80 00:03:47,880 --> 00:03:50,280 Speaker 1: and if you're really worried, put a ban on your 81 00:03:50,320 --> 00:03:53,800 Speaker 1: credit so that people can't apply for credit in your name. 82 00:03:54,120 --> 00:03:57,280 Speaker 3: Wow, is this Optus's fault? Were they too lax with 83 00:03:57,320 --> 00:03:58,000 Speaker 3: their information? 84 00:03:58,880 --> 00:04:01,360 Speaker 1: We don't know exactly what happen yet, but according to 85 00:04:01,400 --> 00:04:03,040 Speaker 1: the hacker, and you know, you can only believe so 86 00:04:03,120 --> 00:04:06,320 Speaker 1: much at this point, this information wasn't even authenticated, which 87 00:04:06,320 --> 00:04:08,560 Speaker 1: means they didn't even need to hack it, they just 88 00:04:08,720 --> 00:04:09,160 Speaker 1: found it. 89 00:04:09,440 --> 00:04:13,040 Speaker 2: Wow, we have to put a stop at Amanda's credit cards. 90 00:04:13,080 --> 00:04:15,520 Speaker 2: Some crazy spending being going on that thing. 91 00:04:15,600 --> 00:04:18,920 Speaker 3: If you can't trust any information, any emails or anything, 92 00:04:19,040 --> 00:04:21,080 Speaker 3: a lot of that stuff is valid stuff that you 93 00:04:21,120 --> 00:04:23,359 Speaker 3: should be receiving, and now you won't trust anything. 94 00:04:24,120 --> 00:04:26,320 Speaker 1: No, And I think unfortunately that's the world we live 95 00:04:26,360 --> 00:04:28,000 Speaker 1: in where you need to second guess everything. And so 96 00:04:28,080 --> 00:04:30,559 Speaker 1: if you get an email and it looks legitimate, anything 97 00:04:30,640 --> 00:04:34,080 Speaker 1: that absolutely just don't click click links in the email, 98 00:04:34,320 --> 00:04:36,719 Speaker 1: go to the website of that company or ring that company, 99 00:04:36,960 --> 00:04:40,080 Speaker 1: and then whatever it is they're asking you will become clear. 100 00:04:40,320 --> 00:04:43,440 Speaker 1: But do not click links in emails, especially when they 101 00:04:43,480 --> 00:04:46,280 Speaker 1: feel familiar, because that information may have been attained to 102 00:04:46,440 --> 00:04:47,200 Speaker 1: hacks like these. 103 00:04:47,440 --> 00:04:50,919 Speaker 2: Trevor, You're always great. Head to EFTM dot com for 104 00:04:51,000 --> 00:04:53,560 Speaker 2: all of Trevor Long's tech advice. Thank you for joining 105 00:04:53,600 --> 00:04:55,160 Speaker 2: us my man pleasure guys. 106 00:04:55,240 --> 00:04:55,920 Speaker 3: Thanks Trevor,