Bustle Facebook Stalking Could Lead to Depression, Says Somewhat Unsurprising Study Bustle You probably won't be surprised to hear that yet another study has found that Facebook stalking can lead to feelings of depression — but this latest bit of...
According to a study by the Crime Victims' Institute at Sam Houston State University, college students are at higher risk for stalking than the general public, but are less likely to report the crime to police.
In a new study, researchers explored and compared the experiences of people who had been victims of stalking or cyberstalking (harassing or threatening via the Internet).
Jennifer Perry's insight:
Stalking is a difficult crime for outsiders to understand. The idea that someone is so obsessed they will invest inordinate amount of time, energy and money just to watch your life is lets face it bizarre - but it is happening to people every day.
Digital-Trusts Top Tips for playing safe with your newest toy!
Fun, exciting and essential as they are smartphones have become a major target for a wide variety of criminals who can put malware on them to try and steal personal information, monitor, spy and track victims via their own phones. Aside from abusers it can also be an irresistible temptation for partners, friends or colleagues to snoop on texts, contacts and photos.
We are a nation of mobile phone lovers, so a new smartphone is top of many people’s Christmas wish list. It’s a great time to get to know a new phone because over the holidays we have more time to spend figuring out these complicated, multi-functional devices. Whilst you are getting to know the fun and practical functions of your new mobile it’s also the ideal opportunity to give it and your personal data stored inside it real protection from snoopers right from the get-go.
Today’s smartphones are a life enhancing essential, mobile phone, camera, a computer that gives you Internet access, apps and music and video player. They also contain a huge amount of our important information, photos and contacts. We have come to rely on our phones so much that we don’t even memorise our friend’s or family’s phone number anymore, because your phone is always close to hand. Definitely devices worth seriously protecting.
Jennifer Perry, CEO of Digital-Trust, a new organisation set-up to help victims of digital abuse and intrusion, said “We have victims who have had their phones compromised by an ex-partner who then used their phone to post awful messages on their Twitter, or contact their friends and family and send abusive text or even worse - intimate pictures. It is far better to secure your phone when you first get it and start off with better security habits, then deal with an incident later”. She adds “Setting up your new phone to secure your data and privacy not only helps you to be safer but it will also make your battery last much longer, which is a real bonus”.
Now you have a new mobile, it’s also worth really thinking about what are you going to do with the old one? You may want to pass it to someone, or sell it, but you don’t want to pass along all your contacts, old text and photos as well.
David Benford, Director of Blackstage Forensics who are cybercrime advisors and specialists in digital forensics said, “The amount of data left on old mobile phones is astonishing. I’ve examined phones where not only did they not delete all their online account login details but also left credit card details and photos. That information in the wrong hands could cause both reputational and financial damage”.
Ten Steps to Secure Android and iPhones:
1. Play with your phone – spend time learning about its features to through the security and privacy options on your new phone, not just once but also after you load apps see what changes.
2. Lock your screen – Use a password, pin, finger print or pattern to lock your screen and anyone picking up your mobile and reading text, contacts and viewing your photos.
3. Control your network connections Turn off location, wifi, Bluetooth, location services and NFC when you aren’t using it. With practice it will be easy to do and it will help stop data from leaking and save your battery too!
4. Install security software on your phone. Yes, even iPhones get nasty viruses. Security software also comes with extra useful features such app locking, whitelists, remote wipe your phone if it is stolen.
a. Security products Android: Avast, McAfee or Kaspersky
b. Security products iPhone: Avira, Avast or Intego
5. Use a password manager. This is an application that will generate, secure and save your passwords. Use a password manager that syncs with all your devices so have access to all your online accounts whether you are on your pc or mobile
a. Password managers available on both Android and iPhone: LastPass or Keepass
6. Set-up two step authentication on Google, iTunes, iCloud, Facebook and any other app that will allow you. Two step authentication means that in order to change settings in the future it will send you a text code which makes it much more difficult for people to hack your online accounts.
7. Turn off geotagging on photos When you take a photo with a smartphone it puts data on the photo to say exactly where it was taken. If you send the photo with that in it, anyone seeing can find out where it was taken and therefore possibly where you are too. You will find an option to turn off geotags under your Location or Camera settings
8. Turn off Screen notifications besides draining your battery, it will flash updates on your screen from your email and other updates which can disclose information you would rather keep private.
9. Free Wifi can be risky because while you’re connected to the wifi, people can snoop on your device. So if you are using a free wifi service use a VPN (virtual private network) service which creates a secure connection online and keep your passwords and information safe.
a. VPN products for Android and iPhone: Tunnelbear, HideMyAss and Hotspot Shield
10. Don’t use social media apps whilst location services is switched on, otherwise your exact location can be shared automatically with other users and make you vulnerable
Extras for Android
· Disable app downloads from unknown sources Go to the security under settings menu of any standard Android device. There is a check box that enables and disables installing ‘unofficial’ apps. You want to disable it so you don’t get unwanted malware.
· Use a permission or privacy apps whenever you install an app it asks permission to use your data. It is supposed to be in order to run the app, but often it also gathers far more. Permission apps will allow you to which apps are spying on you and help you manage your permissions.
Android permission apps: SnoopWall Privacy App or Clueful Privacy Advisor
Getting rid of you old phone safely
Are you planning to pass or sell your old phone? You will want to make sure you are only passing on the phone and not access to your accounts or photos.
· Back up all your data, including contacts
· Remember to remove the SIM card and any external storage such as a microSD card
· Keep the serial number of the phone on file for your records.
Iphone: Deleting information off the iPhone is easy and thorough:
Go to Settings > General > Reset > Erase all Content and Settings
Android phones: a reset can still leave data on your phone that can be recovered. If you have an Android phone you should encrypt your phone and then do a factory reset.
Go to Settings > Encrypt phone > go back to Settings > backup & reset > reset phone
Thanks to a cyberbullying law in Illinois, spying on students and prying into their digital privacy is legal; it's a crime to refuse to hand over students' social media passwords if the school wants them.
I've started passively collecting examples of items and products that trivialize stalking. I don't seek out this stuff, it seems to be just out there in the world. Greeting cards, coffee mugs and so much more....
Microsoft today is rounding out its portfolio of apps for iOS with a new program called Snipp3t. The awkwardly named free app is essentially Microsoft's solution for stalking celebrities like Justin Bieber, Katy Perry, and Miley ...
Jennifer Perry's insight:
Apps like this means that every celebrity has to have a digital strategy to deal with enthusiastic and down right dangerous fans.
Sharing your scoops to your social media accounts is a must to distribute your curated content. Not only will it drive traffic and leads through your content, but it will help show your expertise with your followers.
How to integrate my topics' content to my website?
Integrating your curated content to your website or blog will allow you to increase your website visitors’ engagement, boost SEO and acquire new visitors. By redirecting your social media traffic to your website, Scoop.it will also help you generate more qualified traffic and leads from your curation work.
Distributing your curated content through a newsletter is a great way to nurture and engage your email subscribers will developing your traffic and visibility.
Creating engaging newsletters with your curated content is really easy.