This is a kind of harassment that involves the use of digital tools like GPS trackers, or social engineering scams to gain access to a target. The perpetrator aims to stalk and harass the target. The reasons behind cyberstalking can vary from a sinister desire to intimidate, blackmail or just simply harass. 

Cyberstalking is often accompanied by blackmail, doxxing, identity theft and sometimes physical threats.

Examples of Cyberstalking

  • The attacker can use catfishing to trick the victim into divulging sensitive personal details.
  • The attacker can install stalkerware on the target’s device.
  • The hacker can carry out tracking, and monitoring the target’s activities and locations.
  • The attacker can hijack the target’s webcam to spy on them.
  • Here, the attacker can use Bluetooth trackers like Apple Air tags to maintain surveillance of the victim.

Staying safe from cyberstalking

  • Reduce the amount of personal information you post online and regularly review the privacy settings.
  • Avoid tagging your actual location on social media.
  • Use unique passwords and avoid repeating passwords.
  • Set up two-factor authentication on your account.
  • Avoid opening any emails from unfamiliar senders, and don’t click any suspicious links and attachments.
  • Stay protected online with a VPN.

How to deal with cyberstalking

  • Document the attack, make a record of the calls, inappropriate messages, and any other types of interaction to serve as evidence.
  • Report the act and the perpetrator on the platform where they have chosen to execute the harassment. 
  • Ensure to block any account you suspect of stalking and avoid interacting with them.
  • If all else fails, report the stalker to the authorities.
  • Locate support groups and organizations set up to help survivors of cyberstalking.