Spotting the Fake: Phishing, Smishing & AI in 2026
Technology can't stop every threat. Learn how to spot the subtle signs of a phishing email before you click that link.
The Human Firewall
You can buy the most expensive firewall in the world, but if an employee clicks a malicious link or scans a rogue QR code, the attackers are in.
In 2026, phishing is no longer just about “typos and bad grammar.” Generative AI has given scammers perfect English, and deepfake technology allows them to clone your CEO’s voice. The era of “obvious” scams is over.
The New Reality: AI & Emotional Manipulation
Scammers now use AI to create hyper-personalized messages. They don’t just want your password; they want you to act fast and stop thinking.
- The Trigger: “URGENT: Payroll failed.”
- The Trap: “Click here to fix it before 5 PM.”
Rule #1: If an email, text, or call makes you feel scared or rushed, stop immediately. That emotion is the attack.
Part 1: Mobile Threats (The Small Screen)
We guard our laptops but trust our phones. Attackers know this.
1. Smishing (SMS Phishing)
Texts are dangerous because you can’t “hover” over the link to see where it goes.
- The Scam: “AusPost: Delivery failed. update address here.” or “Hi Mum, lost my phone, WhatsApp me on this number.”
- The Defense: Never click a link in a text from a service provider. Go to the official app or website directly.
2. Quishing (QR Code Phishing)
A QR code is just a link you can’t read. Hackers are now pasting malicious QR sticker overlays on parking meters and embedding them in PDF invoices to bypass email filters.
- The Defense:
- Don’t Scan Blindly: Never scan a QR code in an unsolicited email or on a public sticker that looks tampered with.
- Check the Preview: Modern phones show a URL preview when scanning. If paying for parking at
sydney-council.gov.au, ensure the link doesn’t go topay-parking-now.xyz.
Part 2: The AI Revolution (Deepfakes & Voice)
1. The “Deepfake Boss” Call
AI can clone a voice from a 3-second sample found on LinkedIn. You might receive a call from the “CFO” asking for a wire transfer. It sounds exactly like them.
- The Defense: Establish a “Safe Word” or Process.
- “If we ever need to move money urgently, we verify it on the internal chat app, not just by voice.”
2. The Solution: The “3-Second Check”
Before clicking or scanning, pause for 3 seconds:
- Source: Is this the confirmed sender? (Check the actual email address, not the display name).
- Context: Did I expect this? (Why is the CEO emailing me about iTunes gift cards?)
- Destination: Where does the link go? (Long-press on mobile to preview).
Part 3: Reporting (Your Duty)
In the age of NIST CSF 2.0 and the Privacy Act, silence is dangerous.
1. Feed the Engine
Don’t just delete a phishing email. Report it. Use the “Report Phishing” button in Outlook or Gmail. This trains the AI filters to protect your colleagues from the same attack.
2. The 72-Hour Rule
If you did click and enter credentials, you haven’t just made a mistake; you may have triggered a Notifiable Data Breach.
- Action: Disconnect from Wi-Fi and call IT immediately.
- Why: Under 2026 laws, your company may have a strict 72-hour window to assess and report the breach to the OAIC. Hiding it puts the entire business at risk of massive fines.