Skip main navigation

GDPR

In this video, you’ll explore how the European Union regulates data privacy through the General Data Protection Regulation (GDPR). You will learn more about: data privacy rights the main rules …

Social media

In this video, you’ll explore how social media platforms are used to spread malware and expose user information to hackers and scammers. You will learn more about how to recognise …

Password management

In this video, you’ll explore various ways users can ensure that they are signing into websites safely by effectively managing usernames and passwords. You will learn more about: how to …

Banking Trojan

In this video, you’ll explore Banking Trojan attacks and how hackers can use malicious code to access and deplete bank accounts. You will learn more about how a computer or …

Instant messaging

In this video, you’ll explore how instant messaging services such as Skype, WhatsApp, Telegram and LinkedIn are used in cyberattacks. You’ll examine the social engineering methods used in instant messaging …