Cyberbullying of Children is a Heartbreaking Problem that Parents Have a Role in Preventing

Cyberbullying — like plain “old fashioned” bullying — is a heartbreaking to see, especially when it is directed at innocent children. There are many things that can lead to it and there are many things that can help minimize it. I do not pretend to have all of the answers and, you can bet, if I thought I did, I would share them with the world.

See these Tips for Parents to Help Keep Kids Safe Online

But, there is one thing I do know and that is that parents have a very big role in helping to keep kids from bullying others and in helping to protect their own children from bullying. I use the words “helping to keep” and “helping to protect” as recognition that there is no single solution to this problem — but if we can help make it better, than that is a good place to start.

In this interview with Ken Molestina @cbs11ken on DFW CBS 11 @CBSDFW, we discuss some of the issues surrounding cyberbullying and you will notice that my advice keeps coming back to the parents, for a reason: We as parents are the first line of defense when things involve our children and there is no technology, service, app, or other person who can take our place.

How Parents Can Help Prevent Cyberbullying of Children

Here are several helpful resources to learn more about cyberbullying and how to help protect against it:

CyberBullying.gov provides extensive resources for parents and answers to questions such as:

  • What is Cyberbullying?
  • Cyberbullying Tactics
  • Preventing Cyberbullying
  • Warning Signs a Child is Being Cyberbullied or is Cyberbullying Others
  • What to Do When Cyberbullying Happens
  • Digital Awareness for Parents
  • Establishing Rules
  • Tips for Teachers
  • Reporting Cyberbullying

The Cyberbullying Research Center provides a very nice .pdf graphic listing these 10 tips for teens to preventing cyberbullying:

  1. Educate Yourself
  2. Protect Your Password
  3. Keep Photos “PG”
  4. Never Open Unidentified or Unsolicited Messages
  5. Log Out of Online Accounts
  6. Pause Before You Post
  7. Raise Awareness
  8. Setup Privacy Controls
  9. “Google” Yourself
  10. Don’t Cyberbully Others

“Hacked” Facebook Account — or Cloned?

Dear friends who keep talking about “hacked Facebook accounts”:

When there is an account that is pretending to be your account on Facebook (or other social media platforms) that is sending friend requests to others, in most cases, this does not mean that your account has been “hacked” (i.e., inappropriately accessed by someone other than you).

In most cases, nothing has happened to your account. Rather, someone is attempting to “clone” your account by making a new account that appears to be you by using your information and pictures. When this happens, your account has not been “hacked”!

If this happens to you, go to the profile pretending to be you and report it to Facebook. The pictures below show you how to do it.

Given all of the hysteria about this right now, just do not accept new request from people on Facebook immediately and let them sit for a while — give it a few days before accepting them because if the account is reported to Facebook and then taken down, the illegitimate friend request will disappear.

If you’re interested to learn more about the real “Facebook Hack”, you can listen to these radio segments where I discussed it:

Did hackers record you watching porn? New scam using key elements of phishing and shame hacking

Cybercriminals are using yet another new twist on the old email phishing attack: they email people claiming to have infected porn sites with malware that allowed them to take over the recipient’s webcam and record them sitting at their computer watching porn and if they don’t pay up, the video is going public. I discuss this new method of attack in the video above and you can learn more details about how they do it in this article: Don’t Fall for This Scam Claiming You Were Recorded Watching Porn

For people who know they have never watched porn on their computers, this probably isn’t too effective. For everyone else, this threat of public shaming can be a powerful motivation to comply with the extortion demand.

This is another example of what I have often described as shame hacking, the use, or threatened use, of purportedly hacked data for embarrassing or extorting people by threatening to expose such compromising data if they do not comply with the demands made of them.

Shame hacking is one more way that cybercriminals have learned to monetize the fruits of their criminal actions and represents an increasing trend for how hacked information can and will be used in many ways. I have blogged about other cases where hackers have relied on shame hacking for profit.

Dallas / Fort Worth CBS News station in Dallas / Fort Worth did a story about this latest attack and invited Shawn Tuma on to explain more about it. See story here.

If you are the victim of shame hacking or any other type of cybercrime, you can easily report it online at the FBI’s Internet Crime Complaint Center (IC3).

GDPR, snooping tech, and data privacy — what does this all mean? Shawn Tuma explains

The EU’s GDPR, devices and services snooping on our privacy, and data privacy law – what does this all mean?

Shawn Tuma explains to CW33’s Morning Dose why the EU’s General Data Protection Regulation (GDPR) can be a positive step in the long run for simplifying data security and data privacy when compared to the multitude of different federal, state, and local laws in the United States.

Shawn Tuma discusses on The Michelle Mendoza Show on Seattle’s 820 AM, The Word

 

The EU’s GDPR, attorney Shawn Tuma discusses on the Steve Gruber Show

 

See also: INTEGRATING AMAZON’S “REKOGNITION” TOOL WITH POLICE BODY CAMERAS — SHAWN TUMA DISCUSSES ON CW33 MORNING DOSE

______________________

Shawn Tuma (@shawnetuma) is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.

Integrating Amazon’s “Rekognition” Tool with Police Body Cameras — Shawn Tuma Discusses on CW33 Morning Dose

There has been an outcry over law enforcement using Amazon’s “Rekognition” facial recognition tool and integrating it with their body cameras for nearly real-time identification capabilities. CW33’s Morning Dose had cybersecurity and data privacy attorney Shawn Tuma on as a guest to discuss this issue, as seen on this video:

 

Here is another story with additional commentary by Tuma (2:01 mark):

 

See also:  The EU’s GDPR, devices and services snooping on our privacy, and data privacy law – what does this all mean? Shawn Tuma discusses on The Michelle Mendoza Show on Seattle’s 820 AM, The Word

 

______________________

Shawn Tuma (@shawnetuma) is an attorney with an internationally recognized reputation in cybersecurity, computer fraud, and data privacy law. He is a Cybersecurity & Data Privacy Attorney at Scheef & Stone, LLP, a full-service commercial law firm in Texas that represents businesses of all sizes throughout the United States and, through its Mackrell International network, around the world.