By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
10alert.com10alert.com
  • Threats
    • WordPress ThreatsDanger
    Threats
    A cyber or cybersecurity threat is a malicious act that seeks to damage data, steal data, or disrupt digital life in general. Cyber threats include…
    Show More
    Top News
    All You Need to Know About APTs
    8 months ago
    Avoid infection by dangerous Onion ransomware aka CTB-Locker
    8 months ago
    How Kaspersky Internet Security protects from ransomware
    8 months ago
    Latest News
    Triangulation: Trojan for iOS | Kaspersky official blog
    2 days ago
    Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
    2 days ago
    Safeguards against firmware signed with stolen MSI keys
    4 days ago
    WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
    4 days ago
  • Fix
    Fix
    Troubleshooting guide you need when errors, bugs or technical glitches might ruin your digital experience.
    Show More
    Top News
    What’s included in the ‘Battle of Shadow and Light’ update for Halo 5: Guardians
    8 months ago
    How to fix printer spooler problems on Windows 10
    8 months ago
    How to fix error 0x80004005 starting VirtualBox VM on Windows 10
    8 months ago
    Latest News
    How automatically delete unused files from my Downloads folder?
    4 months ago
    Now you can speed up any video in your browser
    4 months ago
    How to restore access to a file after EFS or view it on another computer?
    4 months ago
    18 Proven Tips to Speed Up Your WordPress Site and Improve SEO | 2023 Guide
    5 months ago
  • How To
    How ToShow More
    Dynamic data collection with Zaraz Worker Variables
    Dynamic data collection with Zaraz Worker Variables
    1 day ago
    Reduce latency and increase cache hits with Regional Tiered Cache
    Reduce latency and increase cache hits with Regional Tiered Cache
    2 days ago
    Cloudflare is deprecating Railgun
    Cloudflare is deprecating Railgun
    2 days ago
    What is two-factor authentication | Kaspersky official blog
    5 days ago
    Acer refreshes Windows 11 PCs for work and play: Swift Edge 16 and Predator Triton 16
    1 week ago
  • News
    News
    This category of resources includes the latest technology news and updates, covering a wide range of topics and innovations in the tech industry. From new…
    Show More
    Top News
    How to delete all empty folders on Android?
    8 months ago
    How to come up with a signature using an online service?
    8 months ago
    How to turn on screen text on iOS?
    8 months ago
    Latest News
    How to add CPU, GPU, RAM widgets on Windows 11
    2 days ago
    How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
    5 days ago
    How to enable Taskbar End Task option to close apps on Windows 11
    5 days ago
    How to check USB4 devices specs from Settings on Windows 11
    5 days ago
  • Glossary
  • My Bookmarks
Reading: What is sextortion, and how can we protect ourselves and our children?
Share
Notification Show More
Aa
Aa
10alert.com10alert.com
  • Threats
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
  • Threats
    • WordPress ThreatsDanger
  • Fix
  • How To
  • News
  • Glossary
  • My Bookmarks
Follow US
Wordpress Threats

What is sextortion, and how can we protect ourselves and our children?

Vitus White
Last updated: 7 October
Vitus White 4 years ago
Share
5 Min Read

Blackmail is a crime as old as time, and modern technology has helped it — like so many other things — explode. Criminals relieve their victims of money in a great variety of ways, but hacking communications such as text messages and webcams brings ruthless efficiency to a highly personal type of crime called sextortion.

Sextortion: A threat for everybody, teenagers in particular

Sextortion, or sexual blackmail, consists of a threat to reveal intimate information about a victim unless the victim pays money to the extorter. In this connected, digital age, the information might include snippets of sexual text messages (sexts), intimate photos, even videos. The crooks typically demand money, but sometimes they’re after more compromising material — send more or I’ll expose you.

Perhaps the most interesting thing about sextortion is that the vast majority of victims are teenagers — not a demographic known for having a lot of money to throw around. But teens do make excellent victims for sextortion.

The teenage years are a time for figuring out how to find and cultivate new kinds of relationships — and generally without a reliable road map. Teens are also beginning to forge their own paths and question authority, but they have yet to develop an adult’s understanding of consequences.

The result can be a cybercriminal’s dream: Lots of information that should be kept extremely secure but isn’t, belonging to people who are emotionally vulnerable and easily shamed. Perhaps that is why an estimated 70% of the victims are teenagers. Most victims are female, as well, although being a male adult is no protection.

Securing intimate activities: Don’t let your spicy stories leak online – https://t.co/He4AOM43ur #privacy pic.twitter.com/s9xz7k1fdS

— Kaspersky Lab (@kaspersky) September 3, 2015

The perpetrators may hack accounts or try worming their way into a potential victim’s favor and get her to send incriminating material directly. The next step is threatening to make the info public.

Victims obey. They are often ashamed and afraid of public condemnation, and asking for help means revealing secrets they are desperate to keep. And teens are very vulnerable. Sextortion can lead to serious psychological trauma or even suicide attempts.

As with so many issues affecting teenagers, communication is key, and communication may present a challenge. However, it is also a technological problem, and we have some tips that can help keep you and your teenager safe.

Yet another reason you should put some tape over your webcam https://t.co/aWULG4gxU8 #scary #reality #TV pic.twitter.com/ob4reqq2E9

— Kaspersky Lab (@kaspersky) April 28, 2016

Protect yourself and your kids from sextortion

1. Understand that anything you share online can be made public, and explain that point to your teen. It could be published by hackers or the trusted recipient — or someone who hacked the trusted recipient’s computer or phone — once something is online it is sharable. Chatting with strangers amps up the risk, but generally, consider anything you send online public and readable by everyone from your best friend to your teachers to your grandparents.

2. Practice good cybersecurity. Use strong passwords and two-factor authentication to help protect your social networks, messaging programs, and e-mail. Always run up-to-date security software. Note that Kaspersky Internet Security protects your webcam from unauthorized access.

We've got your cam covered. No tape required https://t.co/l4CXrJxxiw pic.twitter.com/J5dvn6bwSJ

— Kaspersky Lab (@kaspersky) June 23, 2016

3. Stay alert and learn about new threats. Crimes such as sextortion are everybody’s problem. Share information about threats — forewarned is forearmed.

4. Talk to your kids about Internet scams and cybercriminals. Yes, it can be hard to speak about sex and sextortion with your kids, but they need to know. Find out how their school handles cybersecurity and cybersafety education — perhaps they have some helpful materials about discussing this issue at home.


Source: kaspersky.com

Translate this article

TAGGED: Authentication, Phishing, SASE, Security, Software, Threat, Threats
Vitus White October 7, 2022 September 30, 2019
Share this Article
Facebook Twitter Reddit Telegram Email Copy Link Print

STAY CONECTED

24.8k Followers Like
253.9k Followers Follow
33.7k Subscribers Subscribe
124.8k Members Follow

LAST 10 ALERT

Dynamic data collection with Zaraz Worker Variables
Dynamic data collection with Zaraz Worker Variables
Apps 1 day ago
How to add CPU, GPU, RAM widgets on Windows 11
News 2 days ago
Reduce latency and increase cache hits with Regional Tiered Cache
Reduce latency and increase cache hits with Regional Tiered Cache
Apps 2 days ago
Cloudflare is deprecating Railgun
Cloudflare is deprecating Railgun
Apps 2 days ago
Triangulation: Trojan for iOS | Kaspersky official blog
Threats 2 days ago

Recent Posts

  • Dynamic data collection with Zaraz Worker Variables
  • How to add CPU, GPU, RAM widgets on Windows 11
  • Reduce latency and increase cache hits with Regional Tiered Cache
  • Cloudflare is deprecating Railgun
  • Triangulation: Trojan for iOS | Kaspersky official blog

You Might Also Like

Dynamic data collection with Zaraz Worker Variables
Apps

Dynamic data collection with Zaraz Worker Variables

1 day ago
Cloudflare is deprecating Railgun
Apps

Cloudflare is deprecating Railgun

2 days ago
Threats

Triangulation: Trojan for iOS | Kaspersky official blog

2 days ago
Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Wordpress Threats

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)

2 days ago
Show More

Related stories

How to Use Cloudflare to Secure Your WordPress Site
How To Starting Chrome from the command line
How to fix error 0x80070057 in Chrome?
Windows 10 How To Disable Slide to Shutdown
Windows search not working (FIX)
How to watch movies and TV series for free on Kinopoisk?
Previous Next

10 New Stories

Wordfence Intelligence Weekly WordPress Vulnerability Report (May 22, 2023 to May 28, 2023)
Safeguards against firmware signed with stolen MSI keys
WPDeveloper Addresses Privilege Escalation Vulnerability in ReviewX WordPress Plugin
How to create virtual drive (VHD, VHDX, Dev Drive) on Windows 11
How to enable Taskbar End Task option to close apps on Windows 11
How to check USB4 devices specs from Settings on Windows 11
Previous Next
Hot News
Dynamic data collection with Zaraz Worker Variables
How to add CPU, GPU, RAM widgets on Windows 11
Reduce latency and increase cache hits with Regional Tiered Cache
Cloudflare is deprecating Railgun
Triangulation: Trojan for iOS | Kaspersky official blog
10alert.com10alert.com
Follow US

© 10 Alert Network. All Rights Reserved.

  • Privacy Policy
  • Contact
  • Customize Interests
  • My Bookmarks
  • Glossary
Go to mobile version
adbanner
AdBlock Detected
Our site is an advertising supported site. Please whitelist to support our site.
Okay, I'll Whitelist
Welcome Back!

Sign in to your account

Lost your password?