How to protect yourself from online harassment
Don’t wait for an online harassment campaign to unfairly target you or a loved one. Take these proactive steps today to stay safe.
Read moreDon’t wait for an online harassment campaign to unfairly target you or a loved one. Take these proactive steps today to stay safe.
Read moreThis week on the Lock and Code podcast, we speak with Leigh Honeywell about the cybersecurity defenses to online harassment.
Read moreCredit to Author: David Ruiz| Date: Mon, 18 Nov 2019 15:47:58 +0000
Those who install stalkerware with the intent to monitor, control, harass, or otherwise abuse their victims typically get away with it, avoiding legal penalty even if there’s plenty of evidence to suggest their guilt. Categories: Tags: Al FrankenComputer Fraud and Abuse ActcyberstalkcyberstalkingDepartment of JusticeDistrict Attorneydomestic abusedomestic abuse survivordomestic abuse survivorsdomestic violencfbiFederal Wiretap ActFrankenFTCJackie’s LawMobileSpyNational Network to End Domestic ViolenceNNEDVNSO Grouponline harassmentOperation Safe HorizonPhoneSheriffSenator Al FrankenstalkerwarestalkingStealthGenieTeenSafeUS AttorneyUS Federal Trade CommissionwhatsappWiretap |
The post Stalkerware’s legal enforcement problem appeared first on Malwarebytes Labs.
Read moreCredit to Author: Jovi Umawing| Date: Fri, 14 Jun 2019 19:09:39 +0000
Twitter, like any social network, is faced with the challenge of addressing cyberbullying. And trolls have been abusing the platform’s Lists feature to home in on targets. But have no fear: There are ways to protect users from social attacks, and Twitter is moving to make itself a safer place. Categories: Tags: block togethercyberbullyingonline harassmenttrollingtwitter block chaintwitter list abuse |
The post Trolls abuse Twitter Lists to collate their targets appeared first on Malwarebytes Labs.
Read moreCredit to Author: Malwarebytes Labs| Date: Fri, 16 Jun 2017 15:00:52 +0000
Misconceptions abound when it comes to cyberbullying. In this post, we’ll identify six of these “myths” and then explain why they’re worth discrediting. Categories: Tags: child security onlinecyberbullyingmisconceptionsmythsonline bullyingonline harassmentteen security |
The post Tackling the myths surrounding cyberbullying appeared first on Malwarebytes Labs.
Read more