AI-Generated Deepfake Scams
Deepfake technology allows scammers to impersonate anyone through realistic fake video and audio. Learn how to verify identity when you cannot trust what you see or hear.
AI-Powered Social Engineering
Artificial intelligence is giving criminals new tools to create highly personalised, convincing social engineering attacks that are far harder to detect than traditional scams.
Common Online Scams and How to Spot Them
Online scams are constantly evolving, but the tactics behind them follow recognisable patterns. Understanding these patterns is your best defence.
Controlling Who Sees Your Posts
Understanding and adjusting who can see your posts is one of the most effective ways to protect your privacy on social media.
Creating Strong Passwords
Weak passwords remain one of the top reasons accounts get compromised. Discover how to build passwords that are both strong and memorable.
Credential Stuffing: Why Reusing Passwords Is Dangerous
Credential stuffing is an automated attack where criminals use stolen username and password combinations from one breach to access your accounts on other platforms.
The Dangers of Sharenting: Protecting Your Family Online
Every photo, birthday post, and school-gate selfie builds a digital dossier of your child. Understanding the risks of sharenting protects your family.
Dealing with Inappropriate Content
Learn how to handle and report inappropriate content you may encounter on our platform.
Deepfakes: How to Spot Manipulated Media
Deepfakes are AI-generated or AI-manipulated images, videos, and audio recordings designed to look and sound authentic. Knowing how to spot them is an increasingly important skill.
Digital Footprints: What Employers and Universities Look For
Your digital footprint follows you into job interviews and university applications. Knowing what recruiters look for puts you in control.
Doxxing: What It Is and How to Protect Yourself
Doxxing is the malicious exposure of someone's private information online. Understanding how it happens is key to preventing it.
Fake Customer Support Scams
Scammers impersonate customer support agents to steal credentials and install remote access software. Learn how to verify genuine support contacts.
What to Do If You Feel Unsafe During a Meetup
If you feel unsafe during an in-person meeting with someone from an online platform, there are immediate steps you can take to protect yourself.
Your Rights Under GDPR and Data Protection Laws
UK data protection laws give you powerful rights over your personal data. Understanding these rights allows you to take control of how organisations collect, use, and store your information.
General Online Safety
What are some things I can do for my online safety and privacy in general?
Handling Online Meeting Requests
Learn how to safely handle requests for in-person meetings from online contacts.
Handling Unknown Friend Requests
What should I do if somebody I don't recognize sends me a friend request?
How Data Brokers Collect and Sell Your Information
Data brokers are companies that collect, compile, and sell personal information about individuals, often without their knowledge or meaningful consent.
How to Document and Report Abuse
Proper documentation makes your report stronger and more actionable. Learn the right way to capture and preserve evidence of online abuse.
How to Respond to Online Harassment
Online harassment can escalate quickly. Knowing the right steps to take protects you and strengthens any future reports or legal action.
Investment and Cryptocurrency Scams
Investment scams promise extraordinary returns with minimal risk. Understanding their mechanics is the best way to protect your money.
Job and Recruitment Scams
Fraudulent job offers exploit people searching for work. Learn to distinguish genuine opportunities from scams designed to steal your money or personal data.
Keeping Your Devices and Apps Updated
Software updates do more than add new features. They patch critical security vulnerabilities that attackers actively exploit.
Location Sharing Risks: Using Local Discovery Without Exposing Your Address
Local discovery features connect you with people and events nearby, but sharing your location carelessly can expose your home address and daily routine.
Managing Your Digital Footprint
Your digital footprint is the trail of data you leave behind every time you use the internet. Managing it proactively protects your privacy and reputation.
Marketplace and Payment Scams
Marketplace scams exploit trust between buyers and sellers. Know the tactics so you can trade safely on KF.Social.
Minor Safety and Privacy
What should I know about the safety and privacy of minors?
Oversharing on Social Media
Sharing too much on social media can expose you to burglary, identity theft, and social engineering. Knowing what not to post is just as important as knowing what to share.
Pig Butchering Scams
Pig butchering scams are sophisticated, long-term investment frauds that begin with friendly contact on social platforms and end with devastating financial losses.
Platform-Specific Safety
What should I know about the safety of my account on KF.Social?
Profile Privacy Best Practices
Your profile is the first thing people see on social media. Configuring it with privacy in mind reduces your exposure to data harvesting, impersonation, and unwanted contact.
QR Code Scams (Quishing)
Fraudulent QR codes can redirect you to malicious websites or trigger unwanted payments. Know how to verify a QR code before you scan it.
Recognising Advanced Online Grooming
Grooming does not stop at age 13. Older teens face sophisticated tactics including fake mentors, career opportunities, and financial manipulation.
Recognising Cyberbullying
Cyberbullying takes many forms, from exclusion and trolling to harassment campaigns. Knowing the signs is the first step to addressing it.
Recognising Phishing Emails and Messages
Phishing attacks trick people into revealing passwords, financial details, and personal data. Knowing the warning signs is your strongest defence.
Reverse Image Search and Identity Theft
Reverse image search tools can reveal whether your photos are being used on fake profiles or fraudulent websites. Knowing how to use them is an important step in protecting your identity.
Romance Scams: When Feelings Are Weaponised
Romance scammers build emotional connections to exploit trust. Learn to recognise their tactics before feelings cloud your judgement.
Running Safe Community Events and Group Meetups
Planning a community event or group meetup through KF.Social? Follow these practical steps to ensure everyone has a safe and enjoyable experience.
Safe Browsing Habits for Social and Marketplace Users
Safe browsing habits protect your personal data and financial information when using social platforms and online marketplaces.
Safe Offline Meetups: A Guide for Young Adults
Meeting someone from the internet in person is exciting, but preparation is essential. These practical tips keep you safe without taking away the fun.
How to Safely Meet an Online Friend in Person
Meeting an online friend in real life can be rewarding, but preparation is everything. Follow these practical steps to stay safe.
Safety When Hiring a Service Provider to Your Home
Inviting a service provider into your home requires trust. These practical steps ensure you stay safe when booking through the KF.Social Marketplace.
Secure Payments: Protecting Your Financial Information Online
Online marketplace transactions require vigilance. Learn how to protect your financial information and recognise fraudulent payment requests.
Sextortion and Image-Based Abuse
Sextortion is a form of blackmail involving intimate images. Knowing how it works and where to report it can protect you from further harm.
Sextortion Targeting Young People
Sextortion scams specifically target young people using shame and fear. Understanding the tactics used against you is the strongest defence.
SIM Swapping Attacks Explained
A SIM swapping attack allows criminals to take control of your phone number, intercepting calls and messages, including the verification codes that protect your accounts.
Smishing: SMS Phishing Attacks
Smishing is a form of phishing that uses text messages to trick you into clicking malicious links, sharing personal information, or downloading harmful software.
Subscription Traps and Dark Patterns
Subscription traps and dark patterns use deceptive design to trick you into paying for services you did not intend to buy. Know your rights and how to fight back.
The Rise of Synthetic Identity Fraud
Synthetic identity fraud combines real and fabricated personal information to create entirely new identities that can pass verification checks.
Talking to Your Teen About Safe App Usage
Taking away the phone does not work for a 16 year old. Building trust through honest conversation does.
What Teens Should Know About the Law and Digital Media
Being under 18 does not exempt you from the law. Forwarding an explicit image, making online threats, and harassment all carry real legal consequences.
Trolling vs Harassment: Knowing the Difference
Trolling can be irritating, but harassment is a crime. Understanding where the line falls empowers you to respond appropriately.
Two-Factor Authentication Explained
Two-factor authentication adds a critical second layer of protection to your accounts. Learn the different methods available and how to set them up.
Understanding App Permissions
Every time an app requests permission to access your camera, microphone, location, or contacts, it is asking for a level of trust. Understanding what each permission allows is essential.
Using the KF.Social Marketplace Under 18
The KF.Social Marketplace has specific rules for users under 18. Understanding them keeps you safe and ensures a smooth experience.
How to Verify Someone's Identity Before a Meetup
Before meeting someone from an online platform in person, take practical steps to confirm they are who they claim to be.
Voice Cloning Scams
Modern AI can clone a person's voice from as little as three seconds of audio. Criminals are using this technology to impersonate family members and trusted contacts in phone scams.
What Is Identity Theft and How to Prevent It
Identity theft occurs when someone uses your personal information without your consent, typically for financial gain. Understanding how it works is the first step to protecting yourself.
What to Do After a Data Breach
If your personal data has been exposed in a breach, taking swift action can significantly limit the damage. Follow these steps to protect yourself immediately.
What to Do If Your Account Is Compromised
If you suspect your account has been compromised, acting quickly is critical. Follow these steps to regain control and protect your data.