Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource CyberByte – October 2025

CyberByte – October 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs on our devices has become second nature. However, this same convenience can make us a target for cybercriminals who use scams, fake apps, and phishing tactics to steal personal and financial information. Falling victim to such fraud can leave individuals feeling anxious, deceived, and unsure where to turn for help.

We strongly encourage anyone affected by online fraud or suspicious activity to report it immediately. Doing so ensures you are not facing the situation alone and helps authorities take action against those responsible.

While technology continues to enhance our daily lives, it’s important to stay alert and remember that being online can expose us to risk if we don’t take steps to protect ourselves.

Related resources

GCHQ Certified Training

The NCSC Certified Training scheme is designed to assure high quality cyber security training courses delivered by experienced training providers. You can access a range of cyber security training offered either in-house for your organisation, online or in the classroom.

Read more GCHQ Certified Training in modal dialog

10 Steps to Cyber Security

This guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.

Read more 10 Steps to Cyber Security in modal dialog

Sextortion Guidance

Sextortion is sexual extortion where the victim is exploited through threat of the exposure of intimate images and is usually for financial gain or as a means of controlling behaviour. Police Scotland have provided information and advice on how to […]

Read more Sextortion Guidance in modal dialog

Executive Education Training: Cyber Security

This programme provides CEOs, Directors and Non-Executive Directors with frameworks and best practice for managing cyber security-related risk, separate from the specialised IT infrastructure typically associated with this topic. Course content includes lectures and highly interactive discussions, as well as […]

Read more Executive Education Training: Cyber Security in modal dialog

Social Media Marketplace Fraud Guide

This guide highlights how fraudsters exploit social media marketplaces to trick users into buying or selling items that either don’t exist or aren’t as advertised – whether that’s goods, tickets or other services. It outlines what to watch out for, […]

Read more Social Media Marketplace Fraud Guide in modal dialog
Back to top of the page