Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource Cryptocurrency Scam Guidance

Cryptocurrency Scam Guidance

This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical advice on both spotting warning signs and protecting yourself.

The guide is designed to help you stay safe in the fast‑moving world of crypto and recognise when things may be too good to be true.

Related resources

CyberByte – September 2025

This month’s CyberByte is focused on a type of online Blackmail, referred to as sextortion, which is when a cybercriminal threatens to reveal or create sensitive or embarrassing information about the victim unless the victim meets their demands. This places the victim under […]

Read more CyberByte – September 2025 in modal dialog

ScotlandIS Clusters

Clusters promote economic growth through leveraging the innovation and business potential of a region; generating new employment opportunities, new products and services, new companies, new R&D activities and new patents. Find out more information about the clusters in Scotland.

Read more ScotlandIS Clusters in modal dialog

Remote Access Fraud

The use of remote access software in committing crime online is not very wellknown, let alone how easily criminals use this method to attack unassumingvictims. Remote access scams occur where online business and individual accounts arecompromised by cyber criminals and […]

Read more Remote Access Fraud in modal dialog

Cyber Essentials Certificate Search

The IASME Cyber Essentials Certificate Search is to verify the Cyber Essentials and Cyber Essentials Plus certification of an organisation. Use this to check whether an organisation holds Cyber Essentials certification to support supplier assurance.

Read more Cyber Essentials Certificate Search in modal dialog

Data Breach Guidance

The guide explains what a data breach is – when personal or sensitive information is accessed, lost or disclosed without authorisation – and how it might affect you. It then outlines clear steps you can take if your details have […]

Read more Data Breach Guidance in modal dialog
Back to top of the page