• Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions
Flyy Tech
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs
  • Camera
  • Audio
No Result
View All Result
Flyy Tech
No Result
View All Result

Protecting teens from sextortion: What parents should know

flyytech by flyytech
September 29, 2022
Home Security
Share on FacebookShare on Twitter


Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online

The digital world has provided countless opportunities for youngsters that their parents never experienced. It helped kids stay in touch with each other during the dark days of pandemic-era lockdowns. And now that the world is opening up again, the allure of the digital world remains undimmed. But the online world also exposes children to dangers that their parents never encountered when they were young.

For example, recent years have seen an alarming rise in sextortion cases, including those targeting teens. In 2021, the FBI claimed to have recorded over 16,000 complaints in the first seven months of the year alone. Many more victims may be too ashamed to come forward.

It’s time parents and caregivers wised up to the risks facing their kids online, and learned some best practice tips for mitigating them.

What is sextortion?

As the name suggests, sextortion is a kind of blackmail where a threat actor tricks or coerces a victim into sharing sexually explicit images or videos of themselves and then threatens to release the material unless the victim either pays them or agrees to send more such photos or videos.

This crime is not to be confused with sextortion scams, where threat actors send emails claiming to have installed malware on the victim’s computer that allegedly enabled them to record the individual watching pornography. They include personal details such as an old email password obtained from a historic data breach in order to make the threat – almost always an idle one – seem more realistic. The sextortion scam email phenomenon arose from increased public awareness of sextortion itself, with cryptocurrencies allowing an easy and somewhat anonymous payment method.

In recent months, the FBI has issued multiple warnings of an increase in sextortion cases where victims have been befriended online by individuals masking their true identity before being tricked into sending explicit images or videos of themselves to the crooks. The victims then faced demands for more such material (or more money) or else the content would be released to the victim’s friends and family.

#StopSextortion
Say NO to:
🚫Sending compromising photos
🚫Moving conversations to other platforms
🚫Online threats or blackmail attempts
Say YES to:
✅Talking with your kids/friends about #sextortion
✅Reporting suspicious behavior
https://t.co/OkfB24fcMi
Hear from SSA Ferron: pic.twitter.com/gzFDfhY4kr

— FBI Baltimore (@FBIBaltimore) August 30, 2022

Worryingly, children and young adults are increasingly the target for sextortion attacks – they are more credulous and therefore easier for attackers to trick. And in many cases, the latter want specifically to obtain compromising images of youngsters for their own gratification.

It’s a threat that can target both sexes. While there are many examples of prolific extortionists targeting girls, the FBI also warned recently of a steep increase in sextortion incidents targeting teenage boys.

What’s the impact of sextortion?

It goes without saying that the prospect of having nude images or videos circulated to friends and family can cause severe emotional and mental trauma for the victims. Children caught up in attacks are often too ashamed or afraid to seek help from friends, parents or teachers. They might try to accede to the extorter’s request, only to dig themselves a deeper hole as the attacker demands more photos or money.

Unfortunately, these incidents can in some cases end tragically:

  • Even back in 2016, the UK’s National Crime Agency (NCA) claimed at least four suicides had been linked to sextortion cases, which it said were vastly under reported.
  • In May 2022, a 17-year-old killed himself after a cyber-criminal tried to extort him for thousands of dollars.
  • In June 2022 something similar happened to another 17-year-old boy in Manitoba, Canada, after he was approached on Snapchat.
  • Just weeks ago, a US man was sentenced to 18 years behind bars after blackmailing a high school boy he had approached online into having sex with him on three occasions and recording the acts on video.

How can I protect my child from sextortion?

Such incidents will horrify most parents. But as tempting as it is to try and restrict internet usage or access to specific sites, creating an atmosphere at home of honesty and mutual trust will be more effective in the long run.

Parents and caregivers need to first understand the dangers themselves, and then share their insight in a non-judgemental way with their kids. Two-way communication is essential. Youngsters need to feel like they can come to their parents for help if they get embroiled in a sextortion case.

If that’s the case, here’s a short list of best practice steps to work through with your child:

  • Cease all communication with the extorter
  • Don’t pay them anything
  • Save as much evidence as possible, including screenshots of messages or saved images
  • Report to the police and the relevant online platform

The good news is that if the extorter has tried to share the content online, most reputable social media sites will have policies to take it down. And police action is having an impact. Just weeks ago, Interpol scored a win when it dismantled a sextortion ring that had made an estimated US$43,000 out of its victims in Asia.

Prevention is better than cure

Yet prevention is always the best course of action here. While most sextortion threats today involve social engineering rather than information stealing malware, it pays to take steps to mitigate the threat from both. To help protect your child, chat to them about the danger and about the simple steps they can take to keep clear of it. They include basics like:

  • Stay cautious online: people are not always who they say they are
  • Set your social media accounts to private
  • Don’t send any videos or pictures to someone you haven’t met in real life
  • Never share intimate photos or videos of yourself or anyone else – you have no control over what happens with the images or videos afterwards
  • Ignore messages from strangers and be wary of anyone wanting to move the conversation to another platform – such efforts also happen to be one of the warning signs of a romance scam
  • Come to me whenever you think you’ve been targeted by an online predator

At the same time, it’s never a bad time to consider reminding them of the importance of using strong and unique passwords, using reputable security software, and avoiding to click on links or download attachments in unsolicited messages.

To learn more about more dangers faced by children online as well as about how technology can help, head over to Safer Kids Online.

Why not also watch ‘Hey PUG‘, ESET’s new animated series teaching kids to recognize online threats?





Source_link

flyytech

flyytech

Next Post
Microsoft Edge Now Gives Desktop Apps a Native Feel

Microsoft Edge Now Gives Desktop Apps a Native Feel

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended.

CISA Adds Microsoft .NET Vulnerability to KEV Catalog Due to Active Exploitation

CISA Adds Microsoft .NET Vulnerability to KEV Catalog Due to Active Exploitation

August 14, 2023
Zscaler’s Cloud-Based Cybersecurity Outages Showcase Redundancy Problem

Zscaler’s Cloud-Based Cybersecurity Outages Showcase Redundancy Problem

October 31, 2022

Trending.

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

Image Creator now live in select countries for Microsoft Bing and coming soon in Microsoft Edge

October 23, 2022
Shop now. Pay later. on the App Store

Shop now. Pay later. on the App Store

February 25, 2023
How To Install Tiny11 for Arm64 on Raspberry Pi 4

How To Install Tiny11 for Arm64 on Raspberry Pi 4

February 19, 2023
Lian Li Galahad II Trinity Performance 240 AIO Review: Raising the Bar

Lian Li Galahad II Trinity Performance 240 AIO Review: Raising the Bar

September 19, 2023
Hackers behind MGM cyberattack thrash the casino’s incident response

Hackers behind MGM cyberattack thrash the casino’s incident response

September 16, 2023

Flyy Tech

Welcome to Flyy Tech The goal of Flyy Tech is to give you the absolute best news sources for any topic! Our topics are carefully curated and constantly updated as we know the web moves fast so we try to as well.

Follow Us

Categories

  • Apple
  • Applications
  • Audio
  • Camera
  • Computers
  • Cooking
  • Entertainment
  • Fitness
  • Gaming
  • Laptop
  • lifestyle
  • Literature
  • Microsoft
  • Music
  • Podcasts
  • Review
  • Security
  • Smartphone
  • Travel
  • Uncategorized
  • Vlogs

Site Links

  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms & Conditions

Recent News

Reducing Warehouse Disruptions with Cycle Counting

Reducing Warehouse Disruptions with Cycle Counting

September 30, 2023
EKWB Unveils $449 Waterblock For The Sony PlayStation 5

EKWB Unveils $449 Waterblock For The Sony PlayStation 5

September 30, 2023

Copyright © 2022 Flyytech.com | All Rights Reserved.

No Result
View All Result
  • Home
  • Apple
  • Applications
    • Computers
    • Laptop
    • Microsoft
  • Security
  • Smartphone
  • Gaming
  • Entertainment
    • Literature
    • Cooking
    • Fitness
    • lifestyle
    • Music
    • Nature
    • Podcasts
    • Travel
    • Vlogs

Copyright © 2022 Flyytech.com | All Rights Reserved.

What Are Cookies
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT