Begin typing your search...
‘Cheat’ fraudsters on line with help of cyber safe girl
The booklet is filled with examples and scenarios that portray 15 possibilities where girls could be vulnerable to cyber crimes.
Chennai
Cyber safety begins by being cautious of suspicious looking e-mails to protecting phone numbers in places such as phone recharge centres where miscreants frequently gather contact information of unsuspecting victims. These and many more such guidelines are highlighted in a cyber safety booklet created by cyber security expert Ananth Prabhu G and entrepreneur-cum-social activist Vivek Shetty.
Titled ‘Cyber Safe Girl - Beti Ko Bachao, Cyber Crime Se’ (Save Your Daughter From Cyber Crimes), the booklet is filled with esamples and scenarios that portray 15 possibilities where girls could be vulnerable to cyber crime.
The content of the booklet was created after the authors discussed the subject with police officers, including senior IPS officers like Roopa D from Karnataka, and S Murugan, joint director, DVAC, from Tamil Nadu.
Speaking about the initiative, Murugan, said, “The idea was to create awareness on cyber safety. We helped the authors to perfect their presentation. The content in their booklet can be used by people across the country. It is doing well on social media and may get included in the schoolcurriculum.”
HIGHLIGHTS FROM THE BOOKLET
Dating websites
Women can be emotionally manipulated by smooth talkers on dating sites. Any private pictures or texts that they send to probable dating companion on such sites are fair games for unscrupulous persons who can then blackmail them.
Social trolling
Social trolling is posting inflammatory messages or visuals about a person or organisation in an online community with the express purpose of causing humiliation or nuisance to the object of trolling.
Profile hacking
Profile hacking happens when your email or social networking site is accessed by a probable stalker who then take over it and use it to manipulate.
Mobile recharge shop
A mobile recharge shop is a place where the scamsters or criminals can access one’s phone number because the user will have to give the phone number to recharge vendor. This number is then misused to call or text and exploit besides emotionally manipulate.
Keylogger
Keylogger is a malicious programme that may be installed in the victim’s computer for recording the user’s keystrokes to steal password and other sensitive information. A criminal, using the keylogger, can collect all login details and other sensitive information.
Ransomware
It is another type of malicious software that threatens to publish victim’s data or perpetually block access to it unless a ransom is paid. It gains access to victim’s data through landing in one’s email as an attachment.
Cyberstalking
Cyberstalking is the use of the internet or other electronic means to stalk or harass another by misusing information uploaded on the social network.
Picture morphing
Morphing the face of a person to the body of another (usually nude) and publishing it to blackmail or intimidate a person.
SMS and Call spoofing
Unless one does the online shopping keeping the guidelines in mind, one can become the victim of SMS or call spoofing from fake websites. There are apps that enable a person with criminal intent to change’s one’s number and voice to impersonate.
Online games
Girls who are vulnerable to loneliness, low self-esteem, and clinical depression can fall prey to dangerous online games, like the notorious ‘Blue Whale’, that may become addictive and further harm them.
Job call letter
Websites offering jobs need to be checked for veracity and authenticity because of the possibility of fake offers demanding money or personal appearance. Such emails need to be double checked and verified before one responds and acts on the instruction given in the mail.
Camera hacking
Camera hacking happens when photographs of a person are taken without consent, through malware that got downloaded with an attachment. Phones with no camera guard can be exploited for such criminal activities.
The booklet also talks about revenge porn, voyeurism, cyberbullying, webcam misadventures, etc.
Visit news.dtnext.in to explore our interactive epaper!
Download the DT Next app for more exciting features!
Click here for iOS
Click here for Android
Next Story