
Common Threats
SIM swapping attacks
A SIM swap attack (also known as SIM porting or SIM hijacking) is where an attacker tricks a mobile phone service provid
A SIM swap attack (also known as SIM porting or SIM hijacking) is where an attacker tricks a mobile phone service provid
An information leak is when your private information gets released without your permission. This can happen through an i
The term 'spam' refers to emails, SMS texts or faxes from an individual, or a company, that you didn’t ask to receive. I
The term 'objectionable material' usually relates to any publication that deals with subjects like sex, horror, crime, c
Cyber bullying relates to any kind of bullying, harassment or abuse that’s carried out online, for example through socia
This is any kind of abuse of a child that happens on the internet.
Online identity theft is when someone gets personal information from another person, and uses it for their own gain.
Denial-of-service (DoS) attacks aim to restrict or impair access to a computer system or network. They typically target
Phishing is a type of email scam. The sender pretends to be a trustworthy organisation — like a bank or government agenc
Ransomware is a type of malicious software that denies a user access to their files or computer system unless they pay a
The term 'unauthorised access' describes the act of directly — or indirectly — accessing information online without auth
Online scams are intended to manipulate or trick people into giving away their personal details, financial details, or m