Date First Published: 5th June 2023
Topic: Cybersecurity
Subtopic: Threats To Systems, Data & Information
Article Type: Computer Terms & Definitions
Difficulty: MediumDifficulty Level: 4/10
Learn more about what cyberstalking is in this article.
Cyberstalking is a form of stalking that happens electronically over the internet or on a mobile phone. The anonymity of online communication has made it easy for cyberstalkers to persistently harass, threaten, and stalk individuals, groups, and organisations over the internet with unwanted attention and not leave them alone, sometimes without being detected. Cyberstalkers often rely on public sources of information to track people down and find out as much information as they can to target them for threats and follow them in a way that makes them feel uncomfortable or harassed.
Cyberstalking can come in so many forms. Below are 15 examples of cyberstalking:
There are two main types of cyberstalking, which are direct and indirect cyberstalking.
The terms cyberstalking and cyberbullying are sometimes used synonymously, but cyberstalking is not the same thing as cyberbullying. Cyberstalking is a type of cyberbullying and they both take place electronically over the internet or on a mobile phone. However, cyberstalking is more focused on the use of the internet to stalk or keep a tab on someone else. On the other hand, cyberbullying is a wider term referring to general, intentional, and persistent behaviours designed to emotionally harm or intimidate someone on the internet.
There is no single way to completely prevent cyberstalking, but there are some ways to prevent it. Below are five steps you can take to avoid becoming a victim of cyberstalking:
The first and most important step to avoid becoming a victim of cyberstalking is to avoid posting your personal information, like your real name, physical address, phone number, email address, your school, or your workplace in a public place and limit the amount of information you share online. If you post any personal information online, anyone can easily access it and use it against you. Being a victim of cyberstalking will be far less likely if you avoid revealing your personal information. Most cyberstalkers already know some information about their victims to target them for harassment and they often start by Googling their targets and finding out everything they can.
Cyberstalkers may try to trick you into installing spyware on your computer so that they can track your actions and trace your IP address. Strong antivirus software can often detect any attempts to install spyware before it actually infects your computer.
Cyberstalkers can exploit vulnerabilities in operating systems and software to install malware on your computer to track your activities and gather data about you. An example of a vulnerability is a drive-by download, which unknowingly downloads and installs things on a computer without the user's permission or knowledge. Updates can fix bugs and vulnerabilities discovered by other users, including drive-by downloads.
Using strong passwords will reduce the risks of unauthorised access to your accounts. Cyberstalkers sometimes try to hack into accounts to post spam or false information in the victim's name and obtain their personal information to stalk them online. Also, don't leave devices unattended as it is easy for someone to install spyware without you knowing, even if you have only been away for a few minutes.
Using public Wi-Fi, like Wi-Fi in airports and coffee shops to enter sensitive information, like financial details is unsafe as it is accessible to anyone without any restrictions and they could eavesdrop on your communications to capture your personal information, which can be used to stalk you online.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection