Indonesian
Online Gender-Based Violence

The internet has transformed our ability to obtain information, communicate with others, express our views, share our experiences and engage in conversations about any topic of our choice. Technology has made it possible to reach...

Coronavirus & You

Right now, safeguarding ourselves, our loved ones, friends and colleagues from COVID-19 (Coronavirus) is uppermost in people’s minds, here and around the world. After all, this is an unprecedented situation which warrants...

Fake News

In this era of relatively ungoverned social media, a multitude of online news channels and sponsored stories, exposure to fake news has become an everyday occurrence....

Oversharing

Oversharing information affects far more of us than we might think. Whether you’ve shared a seemingly innocent photo of your friends or family – or unwittingly given away details of your banking or passport details – you...

Tax Scams

Fraudulent phishing emails claiming to be issued by the tax office and demanding payment or notifying you of a refund, have been in existence for some years. They are still as, if not more, popular with scammers....

Online Abuse

Social media has made it very easy for us to communicate quickly and easily with family, friends and acquaintances, as well as sharing experiences and letting others know of our opinions and beliefs. These opinions and beliefs...

Blackmail emails

There has been a sharp increase in the incidence of emails threatening to expose the recipient to everybody in their contacts list, for viewing pornographic online content unless a fee is paid. The emails claim that the sender...

Hate Content

Whilst the internet enables us to communicate quickly, easily and with a wide group of people at the same time, it also makes it easier to spread hateful opinions and material, seemingly with relative anonymity and little...

Property Fraud

Property fraud occurs when fraudsters sell or mortgage your property without your consent. Property is usually the most valuable asset you own and can be sold and mortgaged to raise money. It is therefore an attractive target for...

Motor Insurance Fraud (Ghost broking)

Motor insurance fraud, also known as ‘ghost broking’, occurs when organised crime groups or individuals pose as genuine insurance brokers in order to commit fraud. They deceive you into buying cheap motor vehicle insurance...

Recovery Room Scams

Victims of investment scams are increasingly vulnerable to other investment scams, follow-up scams and recovery room fraud....

Online Radicalisation

Radicalisation by extremist groups or individuals can be perpetrated via a number of means: face-to-face by peers, in organised groups in the community and, increasingly, online. Their targets are individuals or groups of people...

Call Recording Services

A number of websites have sprung up offering call recording services, whereby calls you make to an organisation can be recorded and stored, so that you can prove what was said in the conversation in the event of disputes. You...

Non-Consensual Dissemination of Intimate Images

Non-consensual dissemination of intimate images  is the practice of uploading online explicit images – specifically photos and videos – of ex-partners (or even current partners) without their consent. The images are...

Pension Fraud

Pensions are important and often very significant assets that people rely on so that they may live comfortably in later life. However, like with any valuable asset they can be the target for illegitimate activities, scams or...

Social Engineering

When talking about online safety and security, ‘social engineering’ means the act of manipulating or tricking people into certain actions including divulging personal or financial information … a kind of confidence trick....

Webcam Blackmail

Webcam blackmail usually involves people being lured into taking off some or all of their clothes in front of their webcam, only to be told that you have been recorded and that the video will be posted online and/or shown to the...

Ratting – Remote Access Trojans

You use your computer or mobile device for many everyday private or confidential tasks, which is why it is essential to take precautions to protect it from viruses and spyware. One type of spyware becoming increasingly common is...

Payday Loans

Payday loans let you borrow relatively small amounts of money for a short period – from a few days up to a month, until you get paid the following month. Available from internet sites and high street shops, payday loans can be...

Cyberstalking

Stalking and harassment have always existed, but since the growth of the internet, it has become easier for those who carry it out to do so either as an extension of their existing activities, or purely online. This persistent...

Money Muling

As criminals seek more sophisticated ways of concealing the proceeds of their illegal activity, the practice of money muling is becoming increasingly commonplace....

Preventing Identity Theft

Identity theft is a method used to carry out criminal activity, involving unauthorised use of your name and personal details to either steal from you, or commit a crime in your name. Identity theft can be carried out either...

Spam & Scam email

email is both an excellent communication tool and also a way that companies can inform you about their latest products and services. However, email is frequently used to deliver unwanted material which is at best, annoying and at...