Cyber Crime

1
  • Level 1 - No technical knowledge required
  • Level 2 - Moderately technical
  • Level 3 - Technical
Find other resources of level 1
Find other resources of type PDF Download resource CyberByte – October 2025

CyberByte – October 2025

This month’s CyberByte focuses on a growing online threat linked to our increasing reliance on digital wallets – often referred to as “digital pickpocketing.” As our lives become more digitally connected, the convenience of storing payment cards, tickets and IDs on our devices has become second nature. However, this same convenience can make us a target for cybercriminals who use scams, fake apps, and phishing tactics to steal personal and financial information. Falling victim to such fraud can leave individuals feeling anxious, deceived, and unsure where to turn for help.

We strongly encourage anyone affected by online fraud or suspicious activity to report it immediately. Doing so ensures you are not facing the situation alone and helps authorities take action against those responsible.

While technology continues to enhance our daily lives, it’s important to stay alert and remember that being online can expose us to risk if we don’t take steps to protect ourselves.

Related resources

10 Steps to Cyber Security

This guidance aims to help organisations manage their cyber security risks by breaking down the task of protecting the organisation into 10 components. It is aimed at medium to large organisations that have someone dedicated to managing the organisation’s cyber security.

Read more 10 Steps to Cyber Security in modal dialog

GCHQ Certified Training

The NCSC Certified Training scheme is designed to assure high quality cyber security training courses delivered by experienced training providers. You can access a range of cyber security training offered either in-house for your organisation, online or in the classroom.

Read more GCHQ Certified Training in modal dialog

Cryptocurrency Scam Guidance

This guide offers a clear overview of how cryptocurrencies function, explains why they are attractive to fraudsters and sets out the common types of scams (such as investment schemes, imposter frauds and romance scams) that misuse crypto‑assets. It includes practical […]

Read more Cryptocurrency Scam Guidance in modal dialog
Back to top of the page