This is a kind of harassment that involves the use of digital tools like GPS trackers, or social engineering scams to gain access to a target. The perpetrator aims to stalk and harass the target. The reasons behind cyberstalking can vary from a sinister desire to intimidate, blackmail or just simply harass.
Cyberstalking is often accompanied by blackmail, doxxing, identity theft and sometimes physical threats.
Examples of Cyberstalking
- The attacker can use catfishing to trick the victim into divulging sensitive personal details.
- The attacker can install stalkerware on the target’s device.
- The hacker can carry out tracking, and monitoring the target’s activities and locations.
- The attacker can hijack the target’s webcam to spy on them.
- Here, the attacker can use Bluetooth trackers like Apple Air tags to maintain surveillance of the victim.
Staying safe from cyberstalking
- Reduce the amount of personal information you post online and regularly review the privacy settings.
- Avoid tagging your actual location on social media.
- Use unique passwords and avoid repeating passwords.
- Set up two-factor authentication on your account.
- Avoid opening any emails from unfamiliar senders, and don’t click any suspicious links and attachments.
- Stay protected online with a VPN.
How to deal with cyberstalking
- Document the attack, make a record of the calls, inappropriate messages, and any other types of interaction to serve as evidence.
- Report the act and the perpetrator on the platform where they have chosen to execute the harassment.
- Ensure to block any account you suspect of stalking and avoid interacting with them.
- If all else fails, report the stalker to the authorities.
- Locate support groups and organizations set up to help survivors of cyberstalking.