Phishing is a social engineering technique used by cyber criminals to fraudulently obtain sensitive information by impersonating a legitimate individual or reputable organisation in digital communication. Phishing can come in the form of emails, messages and websites.
Impersonation is a fraudulent technique used by cyber criminals, pretending to be from a trusted organisation. Once they have gained your trust, they trick you into revealing your personal information and/or sending them money.
Malware is an intrusive software developed by cyber criminals to steal data and damage computers, networks, and servers.
A compromised or hacked device is where cyber criminals have unauthorised access to your device(s), such as your phone or computer. More often than not, taking action on your part, such as downloading a malicious app, clicking on a malicious link, or using an unsecured public Wi-Fi are some of the several ways cyber criminals install dangerous malware and gaining access to your device(s).
We hope to use cookies to better understand your use of this website. This will help improve your future experience of accessing this website. For detailed information on the use of cookies and how to revoke or manage your consent, please refer to our < privacy policy >. If you click the confirmation button on the right, you will be deemed to have agreed to use cookies.