What is Cyber Crime?

Cybercrime refers to two related but distinct categories of illegal activity: cyber-dependent crimes, which rely entirely on technology (like hacking or malware attacks), and cyber-enabled crimes, where digital tools are used to amplify traditional offenses such as fraud or identity theft.

Cyber

Cyber-dependent crime involves offences that rely entirely on computers, networks, or digital systems. These crimes can’t happen without technology. Examples include hacking, launching malware, or disrupting online services.

Abstract green matrix code background with binary style.

DDOS ATTACKS

Cybercriminals can crash websites by flooding them with traffic from multiple sources—a tactic known as a Distributed Denial of Service (DDoS) attack. To do this, they build large networks of infected computers, called botnets, by secretly installing malware on users’ devices. Once the site is overwhelmed and offline, attackers may exploit vulnerabilities to break in and steal data.

PHISHING

Phishing is a type of online scam where criminals impersonate trusted sources—like banks or companies—to trick you into revealing personal or financial information through fake emails, texts, or websites.

Close-up of a fishing lure hanging against a clear blue sea backdrop, ideal for outdoor and fishing themes.
Close-up of hands typing on a laptop displaying cybersecurity graphics, illuminated by purple light.

RANSOMWARE

Ransomware is a type of malicious software that locks or encrypts your files, systems, or entire network, making them inaccessible. Criminals then demand a ransom—often in cryptocurrency—in exchange for a decryption key or promise to restore access. These attacks can target individuals, businesses, hospitals, or even government agencies.

SOCIAL ENGINEERING

Social engineering is a tactic used by criminals to manipulate people into giving away sensitive information. They often pose as trusted figures—like customer service reps or police officers—via phone or email to gain credibility. Their goal is to trick victims into revealing usernames, passwords, or personal data, which can then be sold or used to open fraudulent accounts.

 

These scams can also happen in person. Criminals may leave infected USB drives in public places or watch over someone’s shoulder as they enter login details. Staying alert and cautious is key to protecting your information.

 

You’re the First Line of Cyber Defence

Vibrant multicolored source code displayed on a computer screen, depicting programming and web development concepts.

Update Your Software

Whether it’s your phone, laptop, game console or even your smart fridge, regular software updates are essential. These updates fix security flaws that hackers could exploit, so staying current helps protect your devices and personal data from cyber threats.

Eyeglasses reflecting computer code on a monitor, ideal for technology and programming themes.

Create Back-Ups

If you lose access to your files due to a cyberattack, having a backup means you’re not at the mercy of criminals. You can safely wipe your device and restore everything from your backup—no ransom, no panic.

chain, security, metal, iron, metal chain, chain link, metallic, iron chain, protection, barrier, chain, chain, chain, chain, chain

Think Before You Click

Many scams begin with fake emails or texts designed to trick you into clicking a link and sharing your bank details.

Legitimate banks and financial institutions will never ask you to confirm sensitive information this way. Even if the message looks real, don’t trust it. If you're unsure, contact your bank directly using a verified phone number from an official letter, their website (typed manually into your browser), or a trusted source like the phone book.

A smartphone displaying various social media icons held in a hand, showcasing modern communication apps.

Check Your Digital Footprint

Weak privacy settings make it easy for cybercriminals to collect personal info, impersonate you, or manipulate you through fake profiles. Keep your accounts private and visible only to trusted contacts to stay safe online.

Close-up view of a mouse cursor over digital security text on display.

Use Three Random Words

Use a different password for every account and store them securely in your browser or a password manager. Build passwords using three random words—like shared-yellow-pizza—and strengthen them with numbers or symbols, such as 2sharedyellowpizza!!

Chain-locked book, phone, and laptop symbolizing digital and intellectual security.

Turn on 2-Step Verification for your email

2-Step Verification (2SV) gives you twice the protection so even if cyber criminals have your password, they can't access your email. 2SV works by asking for more information to prove your identity. For example, getting a code sent to your phone when you sign in using a new device or change settings such as your password.

CYBER PROJECTS

Young Cyber Security Ambassadors

The young cyber security ambassador (YCSA) programme is an educational volunteering programme to inform young people aged 12-17 years around cyber security and positive online behaviours.

Cyber Switch Up

Cyber Switch Up is a digital & cyber skills competition aimed at students aged 11-18 years in Key Stages 3, 4 and 5. Open to students in all secondary schools and colleges across the Yorkshire & the Humber region. Free to participate Online qualifier, which can be completed in school or at home.


Cyber Blue Line

Cyber Switch Up is a digital & cyber skills competition aimed at students aged 11-18 years in Key Stages 3, 4 and 5. Open to students in all secondary schools and colleges across the Yorkshire & the Humber region. Free to participate Online qualifier, which can be completed in school or at home.


Cyber Spotlight VR

The cyber spotlight virtual reality (VR) programme is aimed to enhance understanding of cybercrime prevention through a series of learning environments.

Scroll to Top