Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

7 horrible forms of cyber harassment

Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types.

Back in the day, I didn’t know that I was harassing someone when I threw a comment on a post to attract the attention of other people. All I wanted to do was fetch as many replies as possible and it became fun. Today I want us to look at the different forms of cyber harassment that manifest in media so that we are aware of what we are doing and as well look for ways to overcome once faced with the scenario

Trolling; A form of Cyber harrasment

Trolling is a form of cyber harassment that involves making uncalled-for comments on social media to attract the attention of others who will come and offer the same comments. Imagine Peter shared a post of his wife and then someone mentioned this comment ” Wife without exercise makes poor bedroom activity and then the rest followed with additional comments to spice up the conversation. It sounds interesting but it isn’t funny to the victim at all.

cyberstalking

I have been a victim of cyberstalking so many times and sometimes I wonder about the guts that some people have. This is repeated harassment of someone using social media platforms, and the internet. I remember someone from an international group, insulting me repeatedly because I didn’t reply to their messages on time. I became ugly to them though i knew I wasn’t ugly. Stalking may sometimes seem positive because some people deliberately just woo you online and promise to take it offline because you have refused to abide.

Online impersonation

Have you ever got a friend request from an account that seems to be for a celebrity yet it is not? Someone deliberately decides to label themselves as someone else to harass, intimidate, or get favors. We have heard of people pretending to be sick and soliciting money from fake accounts

Revenge porn

This is one of the most common types of cyber harassment. Someone decides to post pornographic pictures of another person as a form of revenge. This is normally done by exes(Is that the plural of ex). An ex typically threatens to release your nude pictures because you have refused to continue dating him and when he releases, the shame that covers you is horrible

Swatting

Swatting is when someone releases the address of another person to harm them by making a fake call. Swatting is common among political figures. Someone releases the address of another politician who is launching a campaign somewhere and alerts the police that the politician is plotting a troublesome move. If the person is found guilty of spreading false information, they can be charged to court or even be imprisoned

Doxxing

This is the act of publishing someone’s information online to make other people hurt them. Someone may publish information about a woman cheating on her husband and even release the photographs. The rest will go ahead and abuse her or even call her a bitch

catfishing

This is when someone posts a fictitious identity in the name of starting a relationship. This is very common in dating sites. Not all the people on dating sites look like they look. Some profile pictures are feck, other body types are feck as well. Someone skinny posts a picture of a muscular man so tall yet he barely has a muscle

The internet is full of all categories of people but one key thing is taking caution while using it because we can not avoid it

Prevent adware attacks with these 5 useful tips

Adware has a high potential of harming your computer as well as destroying every information you hav…

How to recover a hacked Whatsapp Account; 2 ways

Hello, it has been a long time sharing with you something about digital security. During the time I …

10 reasons why your linkedin account was restricted

Are you wondering why your LinkedIn account was restricted? LinkedIn is a good platform for networki…

Can anyone hack google photos?: 5 answers

Google Photos is a feature of your Google account. The question ” Can anyone hack Google Photo…

6 secure browsing practices to adopt in 2025 for safer online experiences

Secure browsing practices are key to ensuring that internet users do not fall prey of cyber threats …

10 ways to know it is Vishing; a famous phishing scam nowadays

Vishing is the act of scammers using malicious calls to gather information or money from their victi…

6 Tips for preventing PayPal Scam

Preventing PayPal scam is crucial in this error where there is too much malicious activity being don…

1 2 3 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *