What does the NCSC think of password managers? – NCSC Site

Android password screen

People keep asking the NCSC if it’s OK for them to use password managers (sometimes called password vaults). If so, which ones? Who should use them – private citizens, small businesses, massive enterprises? And how should people use them? Is it safe to put all your crucial passwords into a password manager, and forget trying to remember any at all?

This is a big topic, so we’re chunking it up. This blog explains what I think about password managers in general, and how I use them myself. This might be helpful if you’re an individual deciding whether and how to use a password manager for your personal use. If you’re looking for business use, this blog post won’t hold all the answers you need (look out for more from the NCSC on this soon).

Should I use a password manager?

Yes. Password managers are a good thing.

They give you huge advantages in a world where there’s far too many passwords for anyone to remember. For example:

  • they make it easy for you to use long, complex, unique passwords across different sites and services, with no memory burden
  • they are better than humans at spotting fake websites, so they can help prevent you falling for phishing attacks
  • they can generate new passwords when you need them and automatically paste them into the right places
  • they can sync your passwords across all your devices, so you’ll have them with you whether you’re on your laptop, phone or tablet

All these things are full of win. They reduce security friction – making security easier and more convenient.  If security is difficult, tedious, appears to add no value or gets in the way of the main task we’re trying to do, then we tend to find (insecure) ways around it. And then we end up less protected.

Well, that all sounds great. Where’s the catch?

You might be thinking “If password managers are this good, why haven’t you recommended them before now?”

Well, they do have some drawbacks:

  • Password managers are attractive targets in themselves. They’ve been successfully attacked in the past, and realistically they will be again. So all your passwords could get stolen in one go.
  • If you forget the master password for your password manager, you will not be able to get back in. You will have to try and access all your accounts individually, or recreate/reset them from scratch. This will hurt.
  • You can’t use them for everything. Some service providers (such as certain banks) don’t support the use of password managers. If you tell them you’ve put your banking passwords into one (or written them down in any way at all) they might not give you your money back if you are the victim of cyber crime. If your bank is one that takes this stance, you’ll need to think about how you’re going to manage critical passwords without writing them down. On the brighter side, this is much easier to do once you’ve got most of your passwords out of your head and into the password manager.

Should I use a browser-based password manager?

Many web browsers now come with password managers built in, and they can be a very good choice. They are very convenient to use, as they are fully integrated with the web browser – so they know when you’re on a website that needs a password, and they just pop up and do their thing. You don’t even have to remember a separate master password. So feel free to use the built-in password manager, provided that:

  1. You keep your web browser up-to-date.
  2. You have some kind of access control on your device such as a PIN/password/biometric…two things you should be doing anyway!

One drawback with browser-based password managers is that your passwords may not automatically sync between all your devices if these use different operating systems. So, if you have a Windows laptop, an iPad and an Android smartphone, your passwords may not follow you around everywhere – unless you use the same web-browser on all your devices and log into it. Also, if more than one person uses a device on the same user profile, they would all have access to the same password-protected content. You may not want that.

Should I use a standalone password manager?

Compared to browser-based managers, standalone password managers tend to do a better job of keeping your passwords available to you on all your different devices, no matter what platform they’re on. They give you a little more control over when and where you use your passwords, as you get to press a button to say ‘I want to use the password please’, rather than the web page in the browser requesting one when it feels like it.

Importantly, with a standalone password manager you do have to create and remember a long master passphrase (unlike with a browser-based one). Standalone password managers may also include more advanced features, such as:

  • notifications about compromised websites
  • flagging up reused or weak passwords
  • prompting you to change old passwords*
  • helping you change passwords for some websites, by integrating with your browser
  • multi-factor authentication

How do I do this, then?

As with many things, there are lots of different ways of going about this. This is what I do myself:

  1. First, try and cut down the number of passwords in your life, and reduce how much you rely on those passwords to prove who you are. Use multi-factor authentication or single sign-on where available. For infrequently-used passwords, use a password reset mechanism when you need to log in (instead of making any attempt to recall or store the password). But take really good care of the email account that the password reset emails are sent to.
  2. Consider biometrics. Fingerprint readers on smartphones are generally good enough to protect your phone and the data on it, and they are very usable. So feel free to use them. Turn on encryption (if it’s not already on) for extra protection.
  3. Decide whether to use a browser-based or a standalone password manager. Personally, I use both, for different things.
  4. If you use a standalone password manager, make its master passphrase the best you possibly can. We suggest a passphrase rather than a password as it’s much easier to make it really long, and adding length gives much more protection than adding complexity. Make it hard for someone who knows you to guess in 20 attempts, and make it totally different from any password or passphrase you’ve ever used anywhere else.
  5. Memorise your passphrase. Yes, you really do have to, sorry! If it helps, write it on a piece of paper until it’s firmly lodged in your memory. Keep the piece of paper very safe, and destroy it when you’ve memorised the password.
  6. Don’t put any work passwords into your personal password manager unless you’ve got permission from your employer.

Finally, think about how important each password is to you for each account. If someone discovered this password, would it result in

  • your life being ruined?
  • your bank refusing to refund any losses?

If the answer to either is ‘yes’, then I wouldn’t put it in a password manager. For these cases, a password shouldn’t be the only thing that the security of your account rests on. So look at extra defences such as multi-factor authentication.

For other, less important accounts, having the password stolen might be massively inconvenient, but there would be no real permanent damage done. Passwords for these accounts should be OK to go into your password manager.

Some accounts have very low value. For instance, an online forum that requires a password, but doesn’t actually hold any personal information you care about. These passwords can be stored in a password manager without a second thought.

A future without passwords?

Long-term, I think the success of password managers shows  – yet again –  that password-based authentication has outstayed its welcome. Passwords are supposed to be ‘something you know’, but now we’re saying the best way to manage them is not to know them (because your password manager knows them all for you). Passwords have taken us a long way, but now it’s really time to move on.

The NCSC is working to help us all reduce our reliance on passwords, and to move towards a future where we make greater use of better, more secure, more usable authentication mechanisms instead. In the meantime, we’re also working on some guidance on how best to use password managers in organisations – look out for this soon.

Password managers are a good thing – for now. But we hope not forever.

Source: What does the NCSC think of password managers? – NCSC Site

Cyber Safe Warwickshire – Cyber Criminals are Sending Victims Passwords In New Sextortion Scam

Cyber criminals are sending victims their own passwords in an attempt to trick them into believing they have been filmed on their computer watching porn and demanding payment. Action Fraud has provided the following information and advice. 

There have been over 110 of reports made to Action Fraud from concerned victims who have received these scary emails.

In a new twist not seen before by Action Fraud, the emails contain the victim’s own password in the subject line. Action Fraud has contacted several victims to verify this information, who have confirmed that these passwords are genuine and recent. The emails demand payment in Bitcoin and claim that the victim has been filmed on their computer watching porn.

An example email reads:

“I’m aware, XXXXXX is your password. You don’t know me and you’re probably thinking why you are getting this mail, right?

Well, I actually placed a malware on the adult video clips (porno) web site and guess what, you visited this website to experience fun (you know what I mean). While you were watching video clips, your internet browser started out working as a RDP (Remote Desktop) with a key logger which gave me access to your display screen as well as web camera. Just after that, my software program gathered every one of your contacts from your Messenger, Facebook, and email.

What did I do?

I made a double-screen video. First part shows the video you were watching (you have a nice taste omg), and 2nd part displays the recording of your webcam.

Exactly what should you do?

Well, I believe, $2900 is a fair price tag for our little secret. You’ll make the payment by Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).


(It is cAsE sensitive, so copy and paste it)


You now have one day to make the payment. (I have a special pixel within this email message, and now I know that you have read this e mail). If I do not receive the BitCoins, I will definately send out your video recording to all of your contacts including close relatives, co-workers, and many others. Nevertheless, if I receive the payment, I’ll destroy the video immidiately. If you need evidence, reply with “Yes!” and I will send your video to your 10 friends. It is a non-negotiable offer, therefore do not waste my time and yours by responding to this message.”

Suspected data breach

Action Fraud suspects that the fraudsters may have gained victim’s passwords from an old data breach.

After running some of the victim’s email addresses through ‘Have i been pwned?’, a website that allows people to check if their account has been compromised in a data breach, Action Fraud found that almost all of the accounts were at risk.

Last month, fraudsters were also sending emails demanding payment in Bitcoin, using WannaCry as a hook.

How to protect yourself

  • If you receive one of these emails, delete it and report it to Action Fraud.
  • Don’t be rushed or pressured into making a decision: paying only highlights that you’re vulnerable and that you may be targeted again. The police advise that you do not pay criminals.
  • Secure it: Change your password immediately and reset it on any other accounts you’ve used the same one for. Always use a strong and separate password. Whenever possible, enable Two-Factor
  • Do not email the fraudsters or make the payment in Bitcoin.
  • Always update your anti-virus software and operating systems regularly.
  • Cover your webcam when not in use.

You can also find out more information about Sextortion on our advice page here

Source: Cyber Safe Warwickshire – Cyber Criminals are Sending Victims Passwords In New Sextortion Scam

Contactless payment security, concerns and considerations | lovemoney.com

Contactless payments offer a fast and easy way to pay for goods in-store, but is it really as safe as they claim, and how can you keep yourself safe when using contactless?

The big contactless payment fraud myth

Many banks and consumers assume that contactless fraud is where money is stolen from your contactless card directly. It’s a theory seemingly backed up on social media every few months with images (as below, from Tumblr) and warnings posted of supposed fraudsters carrying Chip & PIN machines, stealing from seemingly oblivious members of the public.While this sounds, in principle, like a valid concern, it would be incredibly difficult for criminals to operate such a machine without being noticed almost immediately.

There are myths about how easy contactless card fraud can be carried out (Image; Tumblr)

Chip & PIN machines need to be registered with a payment vendor and linked to a bank account before they can be used to charge cards – like how you need to register your mobile phone’s SIM card with a network before you can make a call. Since every transaction is monitored for fraudulent activity, and applying for such a device is a lengthy process with many safeguards to stop fraudulent uses, it’d be incredibly risky for any criminal to do this without drawing an incredible amount of attention to themselves.

Contactless “skimming” is a fraud risk

Contactless payment fraud image (Image: Shuttrstock)

While there may be no hard evidence of contactless based fraud, this doesn’t take into consideration if card details are stolen via contactless for later use – better known as “skimming”. Using widely available technology, or even a smartphone app, criminals can wirelessly read data from your contactless card without charging you a penny. In most cases, the data includes the full 16-digit card number, the card type (Visa, MasterCard, or similar), the issuing bank, the expiry date, the card owner’s name, and in some cases (worryingly) a mini-bank statement. With this data, it’s possible for criminals to create a cloned card with the original card details for use at older ATMs, shops, or even websites with poor security checks. Alternatively, they could simply collect thousands of card details with the intention of selling them on to the highest bidder. As there’s no financial transaction taking place, there’s no record of how many times it’s been read wirelessly, where it was read, by whom, and what their motive was.

Lost and stolen cards can still work months after cancelling

Contactless card fraud: hackers can use cancelled cards (Image: Shutterstock)

When contactless payments were first rolled out, concerns were raised about pickpockets and thieves being able to use a stolen card, without verification, to make high-value purchases. Reporting a card lost or stolen, and reporting any suspicious activity on your bank statement immediately should theoretically block that card from being used fraudulently. However, there have been mixed reports from members of the public that their cards continued to work long after being reported as lost or stolen. Banks have complex security limitations in place to detect fraudulent contactless transactions, but consumers should keep an eye on their bank statements and flag transactions they don’t recognise immediately – even if the card has been cancelled. You should also keep an eye on your credit report for suspicious transactions.

What about ApplePay and Google Wallet?

Apply Pay and Google Wallet: how safe are they? (Image: Apple, Google, loveMONEY)

When contactless payments first made their debut on smartphones concerns were raised about the security of card details being stored on, and transmitted from, a smartphone. The initial fear was that instead of a malicious person reading card details wirelessly from a wallet – which tends to reside in a limited number of secluded places, such as a pocket or a bag – they could read them from a phone – an item we tend to carry more publicly. Fears surrounding this potential threat quickly subsided, however, as the technology was showcased to only work in the specific context of paying for goods. In the case of ApplePay, for example, card details are only transmitted when the phone detects a Chip & PIN machine that is requesting payment, it requires either a passcode, or thumbprint, to complete the transaction, and the 16-digit card number transmitted is semi-randomised per transaction. These features give contactless payments via a phone another level of security in cases where the phone is either stolen, or a receipt is dropped at the point-of-sale terminal displaying the full card number.

Keep yourself safe from contactless fraud

Contactless payments offer a convenient way for consumers to pay for goods but, like most technology, come with a handful of security concerns that everyone should be aware, but not scared, of. With that in mind, here are some top tips to help keep yourself safe from contactless-based fraud:

  • RFID-blocking wallets, or a few sheets of thick tinfoil, will block any wireless signal from leaving your wallet without your knowledge;
  • Some banks offer non-contactless cards to their customers, but you have to ask. Contactless is very much the standard issue these days;
  • Using systems like ApplePay and Google Wallet give an extra level of security when paying and don’t transmit your card details without your consent;
  • Report any cards that are lost or stolen immediately to your bank, and keep an eye on your bank statement for suspicious transactions.

Source: Contactless payment security, concerns and considerations | lovemoney.com

Cyber Safe Warwickshire – Over 100,000 Scam Calls To Elderly Blocked In A Year

 The success comes as a result of a scheme which gave vulnerable and elderly people devices which block the phone calls. More than 100,000 scam phone calls to the vulnerable and elderly have been blocked in a year, as a result of a £500,000 project, announced by Prime Minister Theresa May last April, saw 99% of unwanted calls halted. Thousands of devices were given to people at risk, including those with dementia. Between May 2017 and April 2018 108,918 calls were not accepted. The devices will not allow recorded messages, silent calls and calls from numbers not pre-identified by the homeowner. Eight in 10 had felt worried and 60 per cent felt threatened or scared. After the blockers were installed this fell to 17 per cent and 10 per cent.

Trading Standards’ Louise Baxter said: “Nuisance phone calls have a huge impact on emotional and physical health, not to mention financial losses.

Digital Minister Margot James said: “We are determined to end the plague of nuisance calls ruining elderly and vulnerable people’s lives. Only last month we laid out plans to make bosses of rogue companies personally liable for up to £500,000 if their firm breaks the law.”

It is estimated that over five years the 1,500 call blockers given out will save consumers and taxpayers £18million.


  • If it sounds too good to be true it probably is
  • Never give out your bank details or send money unless you are certain you can trust the person who has contacted you
  • If you receive a sales call you have not requested, be suspicious
  • Neither your bank or the police would collect a bank card, ask for your PIN or come to your home to collect financial paperwork
  • You shouldn’t have to pay money to receive a prize
  • You shouldn’t have to pay money via Ukash or Western Union to claim mis-sold PPI
  • If you are put under pressure to make an immediate decision be suspicious and politely decline
  • Computer firms do not make unsolicited calls to help fix your computer
  • Register with the telephone preference service on 0845 070 0707 to block unwanted calls
  • If you’re still concerned, consider installing call blocking technology to reduce nuisance calls

Source: Cyber Safe Warwickshire – Over 100,000 Scam Calls To Elderly Blocked In A Year

Nude selfies: a parents’ guide – subtitled

Teenagers tell us that sharing sexual pictures and videos is not unusual. It can be risky but don’t panic, there are steps you can take if things get out of control.

f you’ve found out your child has shared a revealing pic or video, don’t panic. There are plenty of ways to stop things getting out of hand.

Watch these short films for advice on what to do next:

Understanding why

It’s important to keep things in perspective and plan how to talk to your child. Remember, however stressed and anxious you are feeling, they are probably feeling more so. Watch this film to find out how one parent coped.

Nude Selfies: Understanding Why – subtitled

Talking to your child

It’s a good idea to have ongoing conversations with your child about sex and relationships including nude selfies. It might be a bit embarrassing at first but this film suggests some ways to start it off.

Nude Selfies: Talking to your child – subtitled

When should I be worried?

Young people share nude selfies for different reasons and in different ways, and some situations are less risky than others. This film will help you risk-assess your child’s situation. 

Nude Selfies: When should I be worried? – subtitled

Where to get help

Find out about organisations which can help you and your child.

Nude Selfies: Where to get help – subtitled

New Sentencing Guidelines For Revenge Porn, Stalking & Harassment

People found guilty of repeatedly uploading revenge porn will face the toughest punishments when new sentencing guidelines come into force.

It is the first time the Sentencing Council for England and Wales has given instructions to courts on dealing with those who humiliate others by uploading private sexual images and videos.

They also include guidelines for stalking and harassment cases.

The offence of disclosing private sexual images without consent – known as “revenge porn” – was introduced in 2015 and carries a maximum sentence of two years.

In 2016/17, there were 465 prosecutions for the offence in England and Wales.

What The Guidelines Suggest:

  • Offenders who repeatedly post explicit material after it has already been taken offline should receive the harshest sentences, there is a trend of some offenders doing this.
  • Those who set up fake social media accounts to embarrass their targets will also face stronger punishments, as they show “significant planning” has gone into the offence, says the council.

Also covered are a range of “intimidatory” offences, including stalking and harassment.

In these cases, tougher sentences are recommended by the council if there are aggravating factors, such as:

  • abusing a position of trust
  • sending grossly violent material to the victim
  • impacting others, such as children.

Coercive Control

The guidelines also take into account the crime of controlling or coercive behaviour in an intimate or family relationship – which can see offenders facing up to five years in jail.

This was introduced as an offence in December 2015 to tackle repeated domestic abuse, such as controlling victims over social media, spying on them online, stopping them from socialising or stopping their access to money.

The guidelines say that behaviour that results in debt or homelessness will be a possible aggravating factor, meaning a stronger sentence.

The guidelines will come into force on 1st October 2018.

Help & Support

Record number of fake HMRC websites deactivated – GOV.UK

HMRC has removed more than 20,000 malicious websites during the past year, but warns people to stay alert to the threat from online fraudsters.


New figures show that HM Revenue and Customs (HMRC) requested a record 20,750 malicious sites to be taken down in the past 12 months, an increase of 29% on the previous year.

Despite a record number of malicious sites being removed, HMRC is warning the public to stay alert as millions of taxpayers remain at risk of losing substantial amounts of money to online crooks. The warning comes as Scam Awareness month, run by Citizens Advice, draws to a close.

HMRC has brought in cutting edge technology to tackle cyber-crime and target fraudsters. However, the public needs to be aware and report phishing attempts to truly defeat the criminals. Today (30 June 2018), ministers are urging people to take action to protect themselves as well.

Genuine organisations like banks and HMRC will never contact people out of the blue to ask for their PIN, password or bank details. So people should never give out private information, download attachments, or click on links in emails and messages they weren’t expecting.

People should forward suspicious emails claiming to be from HMRC to phishing@hmrc.gsi.gov.uk and texts to 60599.

They can also contact Action Fraud on 0300 123 2040 to report any suspicious calls, or use its online fraud reporting tool.

Treasury Minister Mel Stride MP, the Financial Secretary to the Treasury, said:  “The criminals behind these scams prey on the public and abuse their trust in government. We’re determined to stop them. HMRC is cracking down harder than ever, as these latest figures show. But we need the public’s help as well. By doing the right thing and reporting suspicious messages you will not only protect yourself, you will protect other potential victims.”

The most common type of scam is the ‘tax refund’ email and SMS. HMRC does not offer tax refunds by text message or by email.

HMRC has also been trialling new technology which identifies phishing texts with ‘tags’ that suggest they are from HMRC, and stops them from being delivered. Since the pilot began in April 2017, there has been a 90% reduction in people reporting spoof HMRC-related texts. This innovative approach netted the cyber security team with the Cyber Resilience Innovation of the Year Award in the Digital Leaders (DL100) Awards.

In November 2016, the department implemented a verification system, called DMARC, which allows emails to be verified to ensure they come from a genuine source. The system has successfully stopped half a billion phishing emails reaching customers.

HMRC has also saved the public more than £2.4 million by tackling fraudsters that trick the public into using premium rate phone numbers for services that HMRC provide for free. Scammers create websites that look similar to HMRC’s official site and then direct the public to call numbers with extortionate costs. HMRC has successfully challenged the ownership of these websites, masquerading as official websites, and taken them out of the hands of cheats.

HMRC is working with the National Cyber Security Centre to further this work and extend the benefits beyond HMRC customers.

Source: Record number of fake HMRC websites deactivated – GOV.UK

45 Second Video Could save You a Bundle! New Video Extols Benefits of Online Checks for Used Car Buyers – Warwickshire News

Want to avoid spending hours and hours and sometimes thousands of pounds sorting out used car purchase problems? 45 seconds may be all it takes!

A new 45 second video supported by Warwickshire County Council Trading Standards is promoting the benefits of using free and low cost online tools to check out used cars before you buy.

Warwickshire Standards receives more complaints about used car purchases than almost anything else and these often involve consumers buying vehicles that look great on the forecourt or in a picture, but hide a host of problems under the bonnet!

Janet Faulkner, Head of Warwickshire Trading Standards said:

“If you’re not a car expert, buying a used car can sometimes seem like a bit of a lottery. Our new video explains the checks you can make before you buy a used car, including many free and low cost online checks you can make from the comfort of your own home. All you usually need is the vehicle’s registration number and sometimes the make and model. So, before you buy, take 45 seconds to watch our video, it could prove to be the best car buying decision you make.”

The video can be viewed on YouTube here. It describes the simple checks consumers can make before they buy a used vehicle.

These include:

The Government’s MOT history website provides detailed information of a car’s MOT history and tells you if your vehicle is subject to a recall: https://www.check-mot.service.gov.uk

This Government website has information on the tax/SORN status of the vehicle, year of manufacture, date first registered, engine size and colour: https://www.vehicleenquiry.service.gov.uk/

There are also commercial websites that will tell you, without charge, if the vehicle has been stolen or imported. For a few pounds you can get further information including whether there is any outstanding finance on the car or if the vehicle has ever been written off or scrapped.

Warwickshire residents wishing to make a complaint about a vehicle they have purchased can do so by contacting Warwickshire Trading Standards via the Citizens Consumer Advice Helpline on 03454 04 05 06.

Source: 45 Second Video Could save You a Bundle! New Video Extols Benefits of Online Checks for Used Car Buyers – Warwickshire News

Met Police chief: Social media leads children to violence

The UK’s top police officer has blamed social media for normalising violence and leading more children to commit stabbings and murders. Met Police commissioner Cressida Dick told the Times social media sites “rev people up” and make street violence “more likely”. Fatal stabbings in England and Wales are at their highest levels since 2011.

 What can parents do about social media leading children to violence?

Parents can remind the children and young people in your care that…

  • Smartphones are everywhere. It is really easy for someone to take a photo or video of a young person involved in something spontaneous like a fight and share it with others online. This can have a permanent effect on their online and offline reputation. How would the video or image be viewed by a future employer or university recruiter?
  • Drama between friends can seem so important at the time, but in a few weeks, they’ll look back and won’t remember why they were so concerned about it.
  • If they hear plans of a fight, or something similar, spreading across their social media feeds, they should let an adult know about it. They won’t get into any trouble.
  • It can be easy to get irate and self-righteous on social media and become caught up in an unhealthy group mentality. It could be because of someone’s comment that they found offensive, or to fight for a collective cause. But things aren’t always as they seem – often comments only seem offensive after being taken out of context, for example.
  • When you’re part of a group, it’s easy to join sides and become aggressive. Advise your child that things can quickly escalate and move into the territory of group attacking or bullying.
  • Young people should be encouraged to think before they post on social media, and be reminded that silly comments they’ll probably regret in the future can have a permanent effect on their online reputation.

What If your child has been involved?

  • If you find out your child has been involved in a fight, the first thing you’ll worry about is whether they’re physically OK. After you’ve established that, you’ll need to have a serious conversation with them about why they got into a fight. Try not to seem too accusatory, or upset, as this may prevent them from opening up to you. As always, making sure all lines of communication are kept open is a priority with this kind of issue.
  • If there is footage of your child in a fight – whether they’re the perpetrator, or the one being targeted – it isn’t something you want online for other people to see. Find out who posted the content, and ask them to take it down. If the incident is linked to school, they can help you do this. If the person who posted the content is unknown, contact the social media platform to ask them to take it down. Find out how here (link is external).
  • It may be that you can’t control the spread of the footage. If that is the case, support your child. As with all bad experiences, there are lessons to be learnt. Make a plan together of how they will avoid situations like this in the future. Good plans usually focus on getting rid of negative influences and avoiding high risk situations. Discuss with them how they can spend more time on positive friendships and activities.
  • If your child sees this sort of content on social media and tells you about it, remind them that this sort of violence is never acceptable, even if it is a joke or prank and the chances are that somebody has got hurt. Encourage them to always report the content to their school, as well as the social media network they’re using. Instagram in particular has a very strong stance against bullying.
  • Both resorting to physical aggression as a way of dealing with a problem, or fighting just for the ‘fun’ of it, may point to a deeper emotional issue. You may want to ask them if there’s anything else in their lives that’s worrying them. Remind them that it’s very important they find other ways of dealing with problems, such as communication, negotiation and compromise, as carrying this violent behaviour into adulthood could get them into serious trouble in the future.

You may feel your child needs professional help with anger or other problems. Young Minds has some good advice (link is external) on anger, aggression and violence in young people and what parents can do to help their children.

Be aware of callers claiming to be from Police Station and asking for bank card details.

Officers have responded to several reports of a caller claiming to have arrested suspects who were in possession of bank cards belonging to the victims, before asking for confirmation of their card details.

If you or your family get a phone call like the ones we’ve described, hang up – do not provide any personal details or hand anything over and call police on 101. You can also report it to Action Fraud at www.actionfraud.police.uk or 0300 123 2040.