Contact for a training/ support in digital safety

Use a pseudonym if you are not comfortable with submiting your real name

7 horrible forms of cyber harassment

Cyber harassment is one most common types of harassment in the present day. It is hard to know whether we are facing or we are being the implementors of cyberharassment when we don’t even know the types.

Back in the day, I didn’t know that I was harassing someone when I threw a comment on a post to attract the attention of other people. All I wanted to do was fetch as many replies as possible and it became fun. Today I want us to look at the different forms of cyber harassment that manifest in media so that we are aware of what we are doing and as well look for ways to overcome once faced with the scenario

Trolling; A form of Cyber harrasment

Trolling is a form of cyber harassment that involves making uncalled-for comments on social media to attract the attention of others who will come and offer the same comments. Imagine Peter shared a post of his wife and then someone mentioned this comment ” Wife without exercise makes poor bedroom activity and then the rest followed with additional comments to spice up the conversation. It sounds interesting but it isn’t funny to the victim at all.

cyberstalking

I have been a victim of cyberstalking so many times and sometimes I wonder about the guts that some people have. This is repeated harassment of someone using social media platforms, and the internet. I remember someone from an international group, insulting me repeatedly because I didn’t reply to their messages on time. I became ugly to them though i knew I wasn’t ugly. Stalking may sometimes seem positive because some people deliberately just woo you online and promise to take it offline because you have refused to abide.

Online impersonation

Have you ever got a friend request from an account that seems to be for a celebrity yet it is not? Someone deliberately decides to label themselves as someone else to harass, intimidate, or get favors. We have heard of people pretending to be sick and soliciting money from fake accounts

Revenge porn

This is one of the most common types of cyber harassment. Someone decides to post pornographic pictures of another person as a form of revenge. This is normally done by exes(Is that the plural of ex). An ex typically threatens to release your nude pictures because you have refused to continue dating him and when he releases, the shame that covers you is horrible

Swatting

Swatting is when someone releases the address of another person to harm them by making a fake call. Swatting is common among political figures. Someone releases the address of another politician who is launching a campaign somewhere and alerts the police that the politician is plotting a troublesome move. If the person is found guilty of spreading false information, they can be charged to court or even be imprisoned

Doxxing

This is the act of publishing someone’s information online to make other people hurt them. Someone may publish information about a woman cheating on her husband and even release the photographs. The rest will go ahead and abuse her or even call her a bitch

catfishing

This is when someone posts a fictitious identity in the name of starting a relationship. This is very common in dating sites. Not all the people on dating sites look like they look. Some profile pictures are feck, other body types are feck as well. Someone skinny posts a picture of a muscular man so tall yet he barely has a muscle

The internet is full of all categories of people but one key thing is taking caution while using it because we can not avoid it

6 useful steps for installing The Tor browser on your computer

Tor browser is one of the most famous anonymity tools used by at-risk groups of people. Anonymity is…

4 crazy reasons for viewing search history

When it comes to google accounts being safe, we shouldn’t limit the level of precaution we mus…

6 great sure don’ts of password management

Password mismanagement has often led to loss of vital information; at risk populations have faced su…

7 effective steps for creating public and private keys for encrypting and decrypting email messages; end to end encryption

In the previous week, I made a video that takes you through the steps of encrypting and decrypting e…

STEPS FOR SETTING UP MAILVELOPE: AN APP FOR EMAIL ENCRYPTION

It is amazing how far we have come with encryption. I believe if you came across my past posts on en…

Symmetric vs Asymmetric encryption: 2 Definitions

Symmetric vs asymmetric encryption plays a great role in choosing the best type of encryption for da…

1 3 4 5 6 7

About author

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *