Threats

Common online security risks and advice on what you can do to protect yourself.

Threats

Common online security risks and advice on what you can do to protect yourself. 

Identity theft

Identity theft is when a cybercriminal gains access to your personal information to steal money or gain other benefits. They can create fake identity documents in your name, get loans and benefits or apply for real identity documents in your name, but with another person’s photograph.

 

System and network threats

There are many threats to the security of your systems, network, and data. These can range from technical threats like unauthorised cryptomining, to individual threats like malicious insiders.

 

Business email compromise

Business email compromise (BEC) is a form of targeted phishing, or spear phishing. Criminals target organisations and try to scam them out of money or goods. They also target employees and try and trick them into revealing important business information. 

Data spill

Sometimes personal information is released to unauthorised people by accident or as the result of a security breach. For example, an email with personal information can be sent to the wrong person, or a computer system can be hacked and personal information stolen. These are known as data breaches or data spills.

 

Other Cyber Threats

If you think you’ve been scammed, don’t feel embarrassed or helpless. Head to our Report & Recover page for steps you can take quickly to protect yourself from further harm, report the scam, or seek assistance if you’ve been the victim of identity theft. 

Malware

Malware (short for 'malicious software') is software that cybercriminals use to harm your computer system or network. Cybercriminals can use malware to gain access to your computer without you knowing, in targeted or broad-based attacks.

Ransomware

Ransomware is a common and dangerous type of malware. It works by locking up or encrypting your files so you can no longer access them. A ransom, usually in the form of cryptocurrency, is demanded to restore access to the files. Cybercriminals might also demand a ransom to prevent data and intellectual property from being leaked or sold online.

Hacking

Hacking refers to unauthorised access of a system or network, often to exploit a system’s data or manipulate its normal behaviour.

Scams

Scams are a common way that cybercriminals compromise your online accounts. Scammers’ goal is to trick you into paying money or giving away your personal information. They will use email, text messages, phone calls or social media, and often pretend to be a person or organisation you trust.

Securing your devices

Criminals are also using telephone deception to carry out financial frauds – they will call victims pretending to work for a hospital or medical clinic, claiming that a relative of the victim has fallen sick with the virus and request payments for medical treatment.

In many cases, the fraudsters impersonate legitimate companies, using similar names, websites and email addresses in their attempt to trick unsuspecting members of the public, even reaching out proactively via emails and messages on social media platforms.

Been Scammed?

Recover Your Lost Funds

If you’ve been caught out by a financial or online scam, then you’re not alone. Millions of dollars are lost every year to scams of all kinds, and often, the victims believe there’s nothing they can do to get their money back. Here at Payback Ltd, we work tirelessly on behalf of our clients to track down their stolen funds and the scammers themselves. To date, we have retrieved tens of thousands of pounds for those who have fallen foul of an online financial scam.

Our team of experts has in-depth experience with many different types of scams and know precisely the process and avenues to follow to reclaim money that’s been lost to them. From CFD cons to Ponzi schemes to social media scams, we have the know-how to successfully pursue the cases we take on to deliver justice for our clients. We are also pleased to provide a range of helpful resources and guides to help you avoid getting entangled in a scam in the future.

 

Scams we helped our clients recover from

Have you been Hacked?Find out what to do

Scroll to Top