
Common Threats
Text message scams
Text message (SMS) scams are when a scammer will use an initial text message sent directly to you to gain financial deta
Text message (SMS) scams are when a scammer will use an initial text message sent directly to you to gain financial deta
Scammers will use any opportunity to try to trick and manipulate people into giving out their personal or financial deta
A SIM swap attack (also known as SIM porting or SIM hijacking) is where an attacker tricks a mobile phone service provid
An information leak is when your private information gets released without your permission. This can happen through an i
The term 'spam' refers to emails, SMS texts or faxes from an individual, or a company, that you didn’t ask to receive. I
The term 'objectionable material' usually relates to any publication that deals with subjects like sex, horror, crime, c
Cyber bullying relates to any kind of bullying, harassment or abuse that’s carried out online, for example through socia
This is any kind of abuse of a child that happens on the internet.
'Malware' refers to any kind of malicious software designed to damage or harm a computer system.
Online identity theft is when someone gets personal information from another person, and uses it for their own gain.
Denial-of-service (DoS) attacks aim to restrict or impair access to a computer system or network. They typically target
Phishing is a type of email scam. The sender pretends to be a trustworthy organisation — like a bank or government agenc
Ransomware is a type of malicious software that denies a user access to their files or computer system unless they pay a
The term 'unauthorised access' describes the act of directly — or indirectly — accessing information online without auth
Online scams are intended to manipulate or trick people into giving away their personal details, financial details, or m