Current Monthly Bill
Current No of Lines


Communications Fraud is the use of telecommunications products or services with no intention of payment. Fraud negatively impacts everyone from both our residential and commercial customers.
The CFCA Global Fraud Survey in 2009 revealed that an estimated $72 - 80 billion USD were attributed to Communications Fraud of which $23 Billion were due to identity/subscription theft, $15 Billion to PABX/Voicemail Hacking and $4.5 billion to Premium Rate Service Fraud.
M1 Telecom Internet is dedicated to minimising the risk of fraud from impacting our customers. The information below is provided as a "value add service" to educate YOU and help reduce the risk of your business or personal account being actioned by fraudsters.
Fraudsters and criminals are becoming increasingly cunning and sophisticated and are using technology or your good nature to separate you from your hard earned cash.

  • 1. General Housekeeping
  • 2. Our Liability to Affected Customers
  • 3. More Information

Scams involving stealing people's identity and using these to commit crime are sweeping the world and unfortunately have also arrived in Australia. These fraudsters can potentially steal money from your bank on-line by remotely stealing your login and password from your computer. Please be wary of any unexpected phone calls (or texts) especially if the caller is asking you for personal information such as usernames and passwords.
NextgTelecom internet takes your online security seriously. It is our aim to raise awareness and to try to help you, our customer, keep up to date with the latest scams that could be potentially harmful to you.


Phishing (pronounced: fishing) scams are exactly as the word describes. Fraudsters are fishing for your personal information in order to use your legitimate credentials to commit fraud. Typically, phishing involves sending an email to a user falsely claiming to be a genuine company or venture. The bogus company will then attempt to scam the user into surrendering private information that will be used for identity theft. The email may direct the user to visit a website where they are asked to update personal information, such as passwords, credit card, and bank account details that the legitimate organisation already holds. Where the web site is part of a scam, the web site is only set up only to steal the user's information.

There are currently various forms of hoax emails in circulation that claim to be sent out by NextgTelecom Internet or NextgTelecom Internet asking customers to disclose theirpersonal or account information. Although these requests may seem genuine, NextgTelecom Internet would never send out an email asking you to disclose any personal information, such as your password or bank account details. Below is one example of a phishing hoax email recently sent to some of our customers. Please be aware that there are a number of forms of hoax emails in circulation and some hoax emails may look differently to this.

Smishing uses mobile phone text (SMS) messages to deliver the "bait" to get you to divulge your personal information. The "hook" (the method used to actually "capture" your information) in the text message may be a web site URL, however it has become increasingly more common to see a phone number that connects to an automated voice response system. Vishing/Social engineering is the criminal practice of using social engineering over the telephone, most often using features facilitated by Voice over IP (VoIP) to steal sensitive information such as credit card numbers for financial benefit. Vishing, is a combination of "voice" and "phishing" and exploits the public trust in landline telephones. Vishing is typically used to steal credit card numbers or other information used in identity theft schemes from individuals.


E-mail spoofing is forgery of an e-mail identity. In effect the message is made to appear to have originated from someone or somewhere other than the actual source. In much the same way as the phishing example email to our customers (above), the fraudsters change (spoof) the email identity to try to create the appearance of authenticity and to make you believe that the email has actually been sent from a company that you interacted with. Not so! In the same way, some distributors of spam (electronic junk mail) use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations.


Malware (malicious-software) is mainly associated with the emerging problem of 'zombie' or 'bot' computers – computers that have become compromised through the secret installation of programs that enables them to be controlled remotely for illegal and harmful activities, such as identity theft, DDOS (Direct Denial of Service) attacks, dissemination of spam and hosting of illegal content, such as pornography. NextgTelecom Internet are part of the AISI (Australian Internet Security Initiative) for ACMA. For more information on this initiative, please refer to


There is an emerging trend of hackers using Wi-Fi connections to steal sensitive information. Wi-Fi is wireless networking - the ability to connect to a network or computer using radio signals (as opposed to network cabling). It's faster and ideal for home or office connectivity. NextgTelecom Internet encourages all customers using Wi-Fi modems of the importance of securing your wireless modem using a WEP key to stop hackers accessing your network.
A WEP key is a security code used on some Wi-Fi networks. A WEP key allows a group of devices on a local network (such as a home network) to exchange encoded messages with each other while hiding the contents of the messages from easy viewing by outsiders.


Is your computer and personal information protected from viruses and spyware?
If so, is your computer security up to date? It is recommended that you download the latest security updates on a daily basis. A computer virus is a program that is designed to cause destruction and chaos. In some cases a computer virus may totally disable a computer. Antivirus software can better safeguard your computer against malicious threats.
Often viruses are spread via an email attachment. When the attachment is opened the virus is released onto the recipient's computer. If you receive an email and an attachment from an unknown source, we suggest that you do not open it, but delete it immediately. If you are ever in doubt about the legitimacy of an email or file, again we suggest that you delete it. NextgTelecom Internet does not endorse the use of any particular security products, however, to assist you, we have listed below links to some sites that may assist you with your internet security requirements:


1. Hackers – unauthorised access to your PABX, voicemail or communications systems. Fraudsters who may be motivated by the thrill, notoriety gained, the challenge, havoc they can cause or simply for monetary reasons.
2. Phreakers – could be a hacker, but generally motivated by attaining free calls, service or access (billed to you).
3. Call sellers – those that make a living from stealing your communication services and selling them off to their own customers at your cost.


This industry-wide problem has increased in recent years, impacting businesses that own or operate Customer Premises Equipment (CPE), typically PABX, VoIP and voicemail systems which fraudsters can access undetected and make outbound calls both domestically and/or internationally. Just as the prudent person secures their home to prevent becoming a victim of burglary, some simple prevention strategies below may result in an attempted attack on your company phone systems being prevented. The costs associated escalate very quickly. NextgTelecom Internet have investigated cases that led to tens of thousands of dollars in just 24 hours. NextgTelecom Internet's investigations have detected a list of international number ranges which have been suppressed at network level due to confirmed cases of compromised PABX's that were compromised externally where the numbers have used to dial out.


"IRSF" is a form of traffic inflation or flooding whereby an international revenue share provider obtains a number, or range of numbers designated as a premium rate service (PRS) which allow callers to access some form of entertainment service/feature, such as mobile ringtones, screensavers, horoscope readings etc, usually 190X numbers in Australia and more notoriously 900 numbers in the US. Each call to a PRS generates profit for both the revenue share provider and the content provider, ranging anywhere between 30% and 80% of the net tarrif. Fraudsters have been known to enter into arrangements with the PRS content providers, with the purpose of flooding traffic to them using various methods, most commonly via hacking PABX, VoIP or Voicemail and programming the extension to automatically dial the PRS number.


1. Dispose of confidential in-house documents with sensitive material such as employee names, phone numbers, access codes, etc., which cannot be retrieved by "dumpster-diving" thieves looking for access into your phone systems.
2. Make sure you, or someone from your company review your NextgTelecom Internet monthly account closely and on a regular basis to immediately identify unusual activity early. It is your duty of care to do this.
3. Do not allow casual visitors to your business unsupervised access to your telephone(s).


In accordance with our contractual agreement with you, you are liable to NextgTelecom Internet for all charges incurred on your account. It is your responsibility to ensure that your PABX is secure. NextgTelecom Internet will not take responsibility for any misuse, fraudulent or otherwise, of your privately maintained PABX that results in financial or other detriment to you.
If you think you've been defrauded, contact NextgTelecom Internet Support or your NextgTelecom Business Account Manager immediately, the appropriate service centre or the Police or one of the relevant agencies listed below.

Bigger Faster & Stronger

Find out what our 3G expansion means for you

Compare Our Plans

See how our plans compare to the other guys’

Common Questions

How do i keep my number?

How do i Sign up for Amber Alerts

What's so great abouot your network