MADRID, 30 Nov. (Portaltic/EP) –
Extortion for disseminating personal content obtained through ‘sexting’ and the installation of spy apps on the victim’s ‘smartphone’ are two of the eight most common types of cyberviolence, as detailed by the company specialized in cybersecurity and management of critical environments S2 Grupo.
Coinciding with the International Information Security Day which takes place this Wednesday, the company S2 Group has shared eight types of actions that are commonly repeated in cases of cyberviolence, with the intention of raise awareness about digital violence, which has become one of the “big problems” of the network.
These actions affect, above all, those vulnerable people such as women who suffer cases of gender violence or minors. For this reason, the cyberviolent behaviors must be known and taken into account in order to take action and be protected both physically and digitally.
Specifically, one of the most common types of violence is cyber extortion for ‘sexting’which consists of the dissemination of both real and fake intimate images of the victim, in such a way that ridicules with sexual or vexatious content. In this sense, it is recommended do not send compromising personal images or private to any user, but, in the event that this occurs, it must be Report to the Police immediately.
Another of the types of violence in the digital world that is currently being used the most is control of the victim through digital access to their computer or ‘smartphone’. This is done by installation of programs or spy apps on the devices of the criminal’s target.
The objective of installing this type of program is to have control over everything the victim does, their location, their conversations through various messaging systems, their social networks, etc. In these cases, if the affected person discovers that a program of this type has been installed on their device, they should resort to a computer technical team to eliminate it.
However, a preventive measure suggested by S2 Grupo is Do not let anyone manipulate personal devices. In this way, it will be more difficult to allow this type of ‘software’ to be installed.
On the other hand, the cyberbullyingas in the non-digital field, is one of the most used ways to use violence and publicly insult people. This aspect is enhanced by the social networks and it is very common in youth environments, although it happens more and more in all ages.
The effects of cyberbullying can be very harmful, since various aspects of the victim’s personal life are attacked at the same time and it is a way of spreading this harmful behavior, as well as humiliation, quickly through social networks. As possible solutions, these facts must be reported on the website or social network where they happen If the problem persists, it must also be reported to the Police.
Following this thread, the dissemination of recordings harassing the victim It is another of the techniques to exercise violence in digital environments. In these cases, the offender in addition to harassing and assaulting to the victim in real life, he records it for broadcast and mockery on the internet.
It is a ‘modus operandis’ in which the victim is denigrated and the attacker flaunts his actions, so once again, must be reported to the authorities so that action can be taken against these behaviors.
Another of the aspects that stalkers use for cyberviolence is the identity theft in digital environments. This form of violence is based on using another person’s identity to participate in chat rooms or other settings under the victim’s name.
Normally, these are contexts where offensive comments are made and the victim is placed in complex and demeaning positions in front of other users. In this regard, from S2 Grupo they remember that profiles can be reported so that they can be eliminated.
In the same way, the wrongdoers also register the victim on unwanted websites as a form of violence. In this way, the affected person is discharged without authorization and, usually, on websites or applications where it can be ridiculed. For example in dating or sexual content apps.
If this happens, the victim must unsubscribe page or app in question and contact the website to report said practiceas well as report the problem if it persists, according to what S2 Grupo has said.
In relation to the above, the cyberbully also resorts to the creation of fake profiles with the real name of the victim in which he dedicates himself to detailing intimacies, post false information insulting or even post sexual offers with his name. These actions place the aggrieved person in a condition of great vulnerability and, in the same way, it is necessary to Report fake profiles created so they can be removed.
Finally, criminals use another technique which is to give register the victim’s email to receive spam. The cybercriminal registers the email of the person he wants to violate on portals so that he becomes the target of spam and unknown contacts. The way to stop it is mark those emails as spam and request to unsubscribe from those websitesas explained by the company S2 Grupo.
“Knowing the types of cyber violence can help us both to educate the little ones so that they can make good use of social networks and digital environments, such as for name cyberbullying actions that can occur and that, at first, we may not even be aware that they are“, has stated in this regard the managing partner of S2 Grupo, Miguel A. Juan.