Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource CyberByte – October 2025

CyberByte – October 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs on our devices has become second nature. However, this same convenience can make us a target for cybercriminals who use scams, fake apps, and phishing tactics to steal personal and financial information. Falling victim to such fraud can leave individuals feeling anxious, deceived, and unsure where to turn for help.

We strongly encourage anyone affected by online fraud or suspicious activity to report it immediately. Doing so ensures you are not facing the situation alone and helps authorities take action against those responsible.

While technology continues to enhance our daily lives, it’s important to stay alert and remember that being online can expose us to risk if we don’t take steps to protect ourselves.

Related resources

Social Engineering Guidance

This guide explains how criminals manipulate people – rather than systems – to gain access to information or control. It explores common tactics like impersonation, urgency and exploitation of trust and then provides practical steps for recognising and resisting such […]

Read more Social Engineering Guidance in modal dialog

How to get cyber essentials certified IASME

NCSC Cyber Essentials Partner the IASME consortium can help your organisation undertake Cyber Essentials certification or if you want to know how you can become a Certification Body. 

Read more How to get cyber essentials certified IASME in modal dialog
Back to top of the page