Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

7 horrible forms of cyber harassment

Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types.

Back in the day, I didn’t know that I was harassing someone when I threw a comment on a post to attract the attention of other people. All I wanted to do was fetch as many replies as possible and it became fun. Today I want us to look at the different forms of cyber harassment that manifest in media so that we are aware of what we are doing and as well look for ways to overcome once faced with the scenario

Trolling; A form of Cyber harrasment

Trolling is a form of cyber harassment that involves making uncalled-for comments on social media to attract the attention of others who will come and offer the same comments. Imagine Peter shared a post of his wife and then someone mentioned this comment ” Wife without exercise makes poor bedroom activity and then the rest followed with additional comments to spice up the conversation. It sounds interesting but it isn’t funny to the victim at all.

cyberstalking

I have been a victim of cyberstalking so many times and sometimes I wonder about the guts that some people have. This is repeated harassment of someone using social media platforms, and the internet. I remember someone from an international group, insulting me repeatedly because I didn’t reply to their messages on time. I became ugly to them though i knew I wasn’t ugly. Stalking may sometimes seem positive because some people deliberately just woo you online and promise to take it offline because you have refused to abide.

Online impersonation

Have you ever got a friend request from an account that seems to be for a celebrity yet it is not? Someone deliberately decides to label themselves as someone else to harass, intimidate, or get favors. We have heard of people pretending to be sick and soliciting money from fake accounts

Revenge porn

This is one of the most common types of cyber harassment. Someone decides to post pornographic pictures of another person as a form of revenge. This is normally done by exes(Is that the plural of ex). An ex typically threatens to release your nude pictures because you have refused to continue dating him and when he releases, the shame that covers you is horrible

Swatting

Swatting is when someone releases the address of another person to harm them by making a fake call. Swatting is common among political figures. Someone releases the address of another politician who is launching a campaign somewhere and alerts the police that the politician is plotting a troublesome move. If the person is found guilty of spreading false information, they can be charged to court or even be imprisoned

Doxxing

This is the act of publishing someone’s information online to make other people hurt them. Someone may publish information about a woman cheating on her husband and even release the photographs. The rest will go ahead and abuse her or even call her a bitch

catfishing

This is when someone posts a fictitious identity in the name of starting a relationship. This is very common in dating sites. Not all the people on dating sites look like they look. Some profile pictures are feck, other body types are feck as well. Someone skinny posts a picture of a muscular man so tall yet he barely has a muscle

The internet is full of all categories of people but one key thing is taking caution while using it because we can not avoid it

5 easy tips for hacked Facebook account recovery

Are you currently having a hacked Facebook account or are worried about your account being hacked in…

How to safely open a suspicious link

Suspicious links could lead to the theft of information or even cause severe damage to your device. …

7 dangerous types of phishing attacks

There are various types of phishing attacks. However, in this article, we will determine the most co…

16 effective ways of fighting phishing

Phishing has become a famously practiced evil in the current day internet. Today I just want to give…

7 great tips for WordPress backend protection

When it comes to how to wordpress backend protection, every developer has their method. The success …

5 severe horrible dangers of location sharing in Africa

It is a common trend for us to get so excited about places, events, clothes, and everything. With th…

1 2 3 4 5 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *