ⓘ This page has been translated using artificial intelligence.
Cybersecurity is becoming increasingly important, because you may be familiar with this scenario: ‘Click here to pay your customs duties,’ your smartphone informs you. You are expecting an international parcel, so you enter your credit card details. Shortly afterwards, your bank blocks your card due to cyber fraud. The NCSC receives up to 1,700 cyber incidents(opens in new tab) reported to it every week – over half of which are attempted fraud. On this page, you can find out what cyber threats exist and why this topic concerns you too.
Go directly to topic
Share this page
Cybersecurity: Protect your digital world
Think you're not interesting enough for hackers? We're afraid we have to disappoint you. Cybercriminals may not be interested in you as a person, but they are interested in your valuable data. They sell it on the dark web or use your digital identity to phish your friends and relatives in your name – often without you even noticing.
According to the Federal Statistical Office (FSO)(opens in new tab), almost 60,000 digital crimes were committed in 2024. That equates to around seven crimes per hour. The number of unreported cases is likely to be significantly higher. Why is this figure so high?
One of the main reasons may be the digital footprint we often leave behind on the internet without thinking: a photo posted on Instagram conveys metadata (e.g. your location). A team photo in the background of a video on TikTok can reveal which club you are involved in (and therefore what your interests are). Or comments on X can reveal information about your values or even personal data such as your full name.
We are also more connected than we think: our smartphones not only store photos, but also locations, contacts and payment details. Laptops often know all our passwords. And Wi-Fi routers are the inconspicuous gateway to the vast digital world. Be aware of all these sources of information, because hackers specifically search for them.
Cybercriminals often use a tried-and-tested strategy: they feign trust in order to manipulate you. They pretend to be friends or family (grandparent scam & shock calls) or feign intimacy (romance scam).
Their goal is to get you to click on malicious links, disclose personal information or transfer money. This method is called social engineering. It works because it exploits our human psychological weaknesses.
Because cybercriminals usually target personal data such as login details when phishing, your digital identity can quickly become a multiplier in the spread of phishing traps or malware (we explain what malware is here) in the event of a cyber incident.
If your email account is affected, for example, hackers may write to your contacts in your name. Or they may have incoming emails automatically forwarded to them in order to obtain further personal data from you. If you also use your laptop for work and it has been infected with malware, the cyber incident suddenly also affects your business – and thus all company data.
In short: if you get hit, others usually get hit too. Hackers want exactly that – you probably don't.
Your personal responsibility when it comes to cyber security is crucial: do you still write your passwords on a Post-it note and stick it to your computer, or do you store them securely in your head or in a password manager? Do you always choose the same password for convenience, or do you consciously use a different one each time you log in to increase your security? Smartphones should be protected with a PIN so that all your data is not freely available if your phone is stolen.
As you can see, being mindful of your digital security and remaining sceptical when asked for data is your best protection. Technical measures such as a password manager can help: you don't have to remember all your passwords, but they are still kept safe. However, the responsibility for using such secure tools lies entirely with you: there are no excuses(opens in new tab) for not protecting your privacy and your devices.
Protect yourself and others to prevent cyber attacks.
Cybercriminals are constantly coming up with new tricks to get hold of your data or money. Here we explain the most common threats so that you can better recognise them in future and protect yourself against them.
As mentioned above, cybercriminals often use social engineering to achieve their goals. Effective attacks against you can take various forms, ranging from fake emails and manipulated websites to fraudulent phone calls.
Cybersecurity: What is phishing?
Cyber attacks often begin with phishing – usually via email, but by no means exclusively. You can also encounter phishing via text message (known as smishing) or on websites. Be aware that cybercriminals are creative too: QR codes in public places can be covered up and lead to fake websites, for example. So stay alert in your everyday life – not just when you're sitting at your laptop. The basic principle is always the same: cybercriminals use manipulative text to try to get you to click on a malicious link that infects your devices with malware or shares your personal information with cybercriminals.
They often combine urgency with apparent authority – for example, a supposed security check by your bank. This stirs up fear: ‘Your account will be blocked’ to get you to take action. Fake official documents are also popular: fake court and official notices or password-protected folders containing malware or ransomware.
Phishing: 305 of 1,322 reported cyber incidents in week 28/2025(opens in new tab)
Cybercriminals also use the telephone for their schemes. In vishing (short for voice phishing), fraudsters often pretend to be employees of government agencies, banks or IT support services. They want to persuade you to take out paid subscriptions that you apparently absolutely need, or to obtain your personal data.
A special variant of this mostly international telephone scam is wangiri (Japanese for ‘one ring and hang up’), also known as the one-ring scam. The fraudsters call you, let it ring once and then hang up immediately – in the hope that you will call them back. The catch? Your return call often incurs high charges.
Another form of telephone fraud is shock calls: someone calls you and puts you under pressure by pretending that a family member has been involved in an accident or arrested. According to their reasoning, you will be confused and frightened and easily transfer money to them without thinking, for example to pay the alleged bail or buy supplies for the hospital stay.
AI can also play a role: cybercriminals may record your voice during a harmless phone call with you and then use AI to imitate it. This allows them to call your relatives or friends to ask for money in your name and with your voice.
Calls on behalf of fake authorities: 162 of 470 reported fraud attempts in calendar week 28/2025(opens in new tab)
Malware is the umbrella term for malicious software that cybercriminals secretly install on your device. The aim of cybercriminals is to gain access to more of your data or your system, or to take complete control of it.
Particularly unpleasant in this context is ransomware – a type of digital blackmail. The malware encrypts your data and renders it unusable. There are different types of ransomware: sometimes it only pretends to encrypt your data or locks your screen.
Only after you pay a ransom do the cybercriminals promise to release your data again. But can you trust them? Even after paying, there is no guarantee that you will get your data back.
Malware often finds its way onto your device through phishing emails, infected USB sticks or downloads from unsafe sources (e.g. dubious online shops). Once installed, it works in secret and is usually difficult to detect – until it is too late.
You can find out more about ransomware at Swisscybersecurity.net(opens in new tab).
A data leak occurs when personal information is unintentionally made public, usually through hacker attacks on companies or insecure databases. You sometimes hear about this in the media.
Cybercriminals can then use the personal information obtained in this way for identity theft: they impersonate you in order to conclude contracts in your name, demand money from your friends or make online purchases.
SIM swapping is a specific form of identity theft. This involves fraudsters attempting to gain (temporary) control of your mobile phone number. This allows them to bypass two-factor authentication via text message, for example, and gain access to your online accounts.
Fake online shops lure customers with incredibly cheap offers. However, these apparent bargains often turn out to be scams: either you receive inferior goods or nothing at all – but your payment details are in the hands of cybercriminals.
How can you recognise fake online shops? Missing contact details or a suspicious URL are good indicators. But so are low prices, poor translations or payment in advance only – and no reviews or only fake reviews that are always the same. Copied product images are also a warning sign.
Incidentally, fraudulent online shops (online shops for branded products are particularly popular) spread very quickly on social networks: a pretty picture, a great price – but the attractive bait quickly leads to an expensive disappointment.
You can find out more about fake online shops and how to recognise them at swisscybersecurity.net(opens in new tab)
Fraudulent web shop: 24 of 470 reported fraud attempts in calendar week 28/2025(opens in new tab)
Spam refers to unwanted emails that are sent out in bulk. In addition to annoying advertising, spam emails can also contain malicious attachments or links to phishing sites.
Spam filters intercept many of these messages, but cybercriminals try to circumvent them in specific ways. For example, they use current events, personalise their requests or use deceptively genuine sender addresses to make their messages appear authentic and convincing.
Spam: 420 of 1,322 reported cyber incidents in week 28/2025(opens in new tab)
Spoofing means ‘disguise’ and refers to the falsification of identity in the digital space. Hackers forge IP addresses or email sender addresses, for example, to make themselves appear trustworthy.
An example? You receive an e-mail that appears to be from your bank. In reality, however, the sender address is fake. At first glance, everything looks genuine to you – until you take a closer look.
Many cyber attacks are based on spoofing. This makes it difficult to distinguish between genuine and fake messages.
Pharming has nothing to do with the pharmaceutical industry, but is a rather rare but insidious method used by cybercriminals to redirect you to fake websites. Hackers manipulate the DNS settings (essentially the ‘address book’ of the internet) with viruses or Trojan horses. What does that mean?
Here's another example: you enter a correct web address (e.g. your bank's login page), but instead you end up on a fake page that looks deceptively real. Because you don't suspect fraud, you enter your login details there – and they end up directly with the cybercriminals. Unlike phishing, you don't even have to click on a suspicious link – the redirection happens automatically.
So always stay alert and double-check: is the URL in the input window really correct? If your browser informs you of certificate errors or insecure connections, take it seriously. It is best to always go to the official website, e.g. your bank's, to log in (not via a direct link from your Google search results).
Fortunately, pharming is relatively rare and usually targets companies rather than private individuals.
The NCSC provides information on other cyber threats: NCSC
Are you aware of the online threats your company is constantly exposed to? Test your knowledge in our new security quiz and expand your expertise at the same time.
Even though the basic phishing and fraud mechanisms remain the same, cybercriminals are constantly refining their camouflage mechanisms. Unfortunately, AI is also helping them and creating a new generation of cybercrime with deepfakes.
With new technical capabilities, hackers are able to tailor their cyber attacks more closely to individual users (and thus achieve greater proximity and familiarity). This can make it easier for you to fall for their tricks. The good news is that with strong passwords, careful handling of your personal data and common sense, you can stay relatively safe.
Shortly before the holiday season, cybercriminals like to send fake emails on behalf of airlines or hotels. These emails contain information about alleged booking confirmations, cancellations or urgent payment issues. You already know their goal: to get you to enter your credit card details.
More and more often, these messages also contain genuine content, such as copied content from original websites or emails. For example, they may contain flight numbers or hotel names from current offers – perhaps even ones you have recently booked.
Therefore, always check the sender's address and the URL of the linked page to expose any fraud. Sometimes the scams are also optimised for mobile devices – in which case the desktop view may reveal even more details.
Deepfake profiles are becoming increasingly common on social networks. Cybercriminals use AI deepfakes or face swaps to create fake profiles for real people (usually well-known personalities). They use these profiles to advertise expensive gifts or exclusive products – and yes, you guessed it – to steal your payment details when you make a purchase. (Especially with celebrity profiles, it's worth paying attention to the verification features offered by many platforms.)
The modern grandparent scam is also nasty: cybercriminals record your voice and use AI to imitate it in order to demand urgent financial help from your relatives. The emotional manipulation combined with the familiar voice makes this scam particularly dangerous.
The days of broken English in phishing emails or generic salutations such as ‘Dear Sir or Madam’ are gradually coming to an end. Instead, you receive fully personalised messages with your real name and correct amounts from actual transactions. Creepy?
Yes and no, because there are often explainable reasons for this: hackers know your details, for example, through data leaks, because they have hacked into your inbox or by digging through your digital footprint on the internet and social networks.
If you receive emails with such personalised information, it is best to check whether automatic forwarding is stored in your email account and, if so, delete it and change your login details immediately.
QR codes can be very practical – but because the URL stored in them is not immediately visible to the eye, they are also susceptible to manipulation. That's why it's particularly important to be careful with public QR codes (e.g. on parking meters or charging stations), as these could have been covered with fake QR codes.
Check carefully before scanning them: do the codes look like they have been stuck on or damaged? If you have scanned the QR code and are asked for your credit card or personal details, take a close look at the URL.
Cybercrime has long since ceased to be a problem solely for businesses. Almost everyone owns a smartphone, laptop or smartwatch. This means that private individuals, especially families, also provide a gateway for hackers. Concerns about our children offer hackers a wide emotional target.
Discord, Roblox and Steam – gaming platforms are popular with children and young people. But anonymous chat forums also harbour dangers: not all players have good intentions. And that doesn't just mean cybergrooming.
Cybercriminals also use these platforms to spread phishing links. For example, they pretend to be helpful fellow players and share supposedly useful tools and cheats – which in reality contain malware.
swisscybersecurity.net recently reported on how cybercriminals reactivate expired Discord invitations and misuse(opens in new tab) them to direct their victims to fake sites.
Our recommendation
Talk to your children and explain to them why they should never click on links from unknown people or disclose personal information in such forums.
Social media has become an integral part of everyday life for many families. But be careful when making new friends: as described above, accounts that appear very genuine may also be fake, created with the help of AI. Or hackers may have stolen your login details and are using an existing account to gain your trust.
If you have a public profile, it is crucial to be mindful of your digital footprint: what pictures do you post? What additional information do you provide? Important: just because you can provide information doesn't mean you have to. Cybercriminals can use any information on the internet for their own purposes – be aware of this.
Our recommendation
It is best not to share your location publicly, and certainly not in real time. (Especially if you are on holiday and perhaps sharing holiday photos on social media at the same time – this is like an invitation to burglars.) Check your privacy settings regularly. Explain to your children what information is best kept private and how they can do this.
Baby monitors, surveillance cameras, Alexa and co. – smart home devices are extremely practical and make life more convenient. But they are also small computers that can be hacked. Unsecured or insufficiently secured devices can be easily controlled by cybercriminals, for example to switch cameras on or off or to listen in on conversations. Here, too, the aim is to collect personal information.
Our recommendation
Change your passwords for your smart home devices regularly and follow the recommendations for strong passwords. Keep your device software up to date and check whether each device really needs to be connected to the internet. If so, you can use PortSelfScan from iBarry(opens in new tab) to test whether the publicly accessible IP address of your home network is secure.
Watson reported on the topic: Hundreds of Swiss webcams stream intimate images unprotected onto the internet(opens in new tab) (27 June 2025).
The grandparent scam is one of the oldest scams around – and unfortunately, it still works. Scammers usually call elderly people and pretend to be their grandchild, nephew or niece. They tell them about an emergency and insist that they need money. Modern variants use AI-generated voices to make the deception even more convincing. Shock calls are also popular, as we discussed in our article on vishing.
Our recommendation
Keep a cool head – and simply hang up. Under no circumstances should you send money or disclose payment details. Instead, call the person in question directly on a number you know. If this person is unavailable, contact other family members to verify the information. Incidentally, reputable authorities never ask for money or valuables over the telephone.
On SRF's Espresso programme, an expert explains why we humans are so susceptible to scams such as the grandparent scam(opens in new tab).
Online dating is part of everyday life today. But cybercriminals shamelessly exploit people's longing for love. They create fake profiles with attractive photos and spend weeks or months building an emotional connection with you. Once you trust them, they invent an emergency and ask you for money.
AI can also play a role here: to create and optimise profiles or analyse your social media. This helps cybercriminals find topics of conversation that you will respond to.
Our recommendation
We don't want to take away the joy of online dating, because the digital world offers you wonderful opportunities to meet new people. However, it's best not to listen only to your heart, but also to your gut feeling, and never let yourself be pressured, even if you're wearing rose-tinted glasses: If a person never wants to meet you, always has strange excuses when you want to video chat, or asks you for money, these are warning signs.
In its current campaign(opens in new tab), Swiss Crime Prevention is drawing attention to romance scams. iBarry also provides information on the topic and advises you on what to do if you have fallen victim to a romance scam(opens in new tab).
Why do people go to such lengths to develop sophisticated scams or spend hours programming fake websites? The answer is complex – but ultimately it usually boils down to quick money, political convictions or personal goals.
And the internet, with its apparent anonymity, further encourages cybercrime. This is because it makes it possible to reach many people with little effort. In addition, the barriers to entry have fallen with services such as ransomware-as-a-software (yes, you can also buy hacker software as a service on the darknet). So today, you no longer need to be an IT expert to commit fraud online.
Money is and remains the main motive for most cybercriminals. In recent years, completely new business models have developed for them: from classic credit card fraud to ransomware extortion and fake online shops. The profit margins are often enormous: a ransomware attack can earn the blackmailer millions in just a few days, while the development costs of the malware remain minimal. Unfortunately, digital crime has thus become a lucrative full-time job.
But not all cybercriminals are after money. Hacktivists (a combination of hackers and activists) use their skills to spread their political messages, for example. Sometimes they also protest against companies or governments, attacking their websites, publishing stolen documents or paralysing entire systems. In doing so, they aim to undermine trust in these institutions, cause chaos and thus potentially create a breeding ground for their own ideologies.
Industrial espionage must also be mentioned in this context: this involves stealing trade secrets or research results in order to weaken competitors and strengthen one's own position. This can also occur in politics. This form of cybercrime is designed to function over the long term and to operate in secret. It therefore often remains undetected for years.
Of course, personal motives such as revenge, frustration or the need for recognition can also be behind cyber attacks. Such attacks are emotionally motivated and often less well thought out than more professional operations. However, they are usually more destructive because the perpetrators are prepared to cause considerable damage. Recognition within the hacker community can also be a possible motivation for finding security vulnerabilities.
And we have already mentioned it a few times on this page: your personal data is valuable. When profiling, cybercriminals collect specific information: what do you buy, where do you live, who are your friends, what are your political views? They use this information to create a profile of you so that they can then target your weaknesses or preferences. The more information they have about you, the more credible their attacks (or the attacks of their customers) will be.
The increase in cyber incidents and their shift to the internet is striking. This is confirmed by current figures from the NCSC, which we have compiled here.
(1) Source: Swisscybersecurity.net(opens in new tab)
(2) Source: National Cyber Security Centre NCSC(opens in new tab)
(3) Source: Federal Statistical Office(opens in new tab)
We have compiled further information and content on the topic of ‘AI video generators’ here.
Staying safe online – webcam spying.
Staying safe online – fake accounts.
Marcel is a trainer at Swisscom. He is available to answer any questions you may have about cybersecurity.
Trainer at Swisscom