Cyberstalking/Harassment
This involves using digital communication technologies (such as emails, messaging apps, or social media) to harass, monitor, or stalk someone. It’s not a one-off incident but repeated behaviour intended to frighten, intimidate, or distress the victim. Examples include sending threatening messages, spreading rumours online, tracking someone’s online presence, or trying to gain access to private accounts. In severe cases, cyberstalking can escalate to offline harassment.
Denial-of-Service (DoS) Attacks
A DoS attack tries to overload a system, website, or server with too many requests so that it becomes too slow or completely unavailable to legitimate users. A more powerful version is called a Distributed Denial of-Service (DDoS) attack, where multiple computers (often hijacked by malware) flood the target at the same time. These attacks can cause major disruptions for businesses, governments, and online services.
Hacking
This is when someone gains unauthorised access to a computer, system, or network. Hackers often do this by exploiting software vulnerabilities, using stolen passwords, or tricking people into giving them access. Once inside, they might steal data (like bank details), install malware, deface websites, or use the system to launch other attacks. Not all hackers are criminals — some are “ethical hackers” who test security systems but in everyday use, the term usually refers to malicious activity.
Identity Theft
This happens when a criminal steals someone’s personal information — such as names, addresses, National Insurance (NI) numbers, bank account details, or credit card numbers — and uses it to commit fraud. This could mean opening new credit accounts in the victim’s name, making unauthorised purchases, or even applying for loans. Victims often don’t know until they see unusual bank charges or are denied credit due to debts they didn’t create.
Ransomware
This is a type of malware that blocks or encrypts files on a victim’s computer so they can’t access their own data. The attacker then demands payment (often in cryptocurrency) to “unlock” it. Ransomware can spread through infected email attachments, malicious downloads, or compromised websites. High profile cases have affected hospitals, schools, and even national infrastructure. Paying the ransom doesn’t guarantee recovery, and in many cases, victims remain locked out.
Sim Cloning/Sim Swap Fraud
Sim cloning is when an attacker gains physical access to the target’s SIM card and then copies the number onto another sim card. The attacker can use this to access the victim’s texts, phone calls, and location data. From that point, they can read your text messages to get information about you, scam your contacts by posing as you, or receive 2-Factor Authentication (i.e. you login via username and password onto a site, then they text you a code your phone to make it more secure-logging in on 2 devices).
Social Engineering
Instead of hacking computers, attackers manipulate people directly into handing over sensitive information. They create convincing scenarios — for example, pretending to be a bank official, a delivery company, or even a colleague — and ask for details like login credentials, bank numbers, or personal data. Phishing emails, phone scams, and fake websites are all examples. Social engineering works because it exploits human trust rather than technical weaknesses





