Catching the Catfish

Image result for catfishing cyber'

True Cat-fishing Story

Make sure you check out https://www.intouchweekly.com/posts/catfish-murders-158410/ for information on cat fishing murder stories occurring all over the United States.

List of Things to Watch Out For

  • Fast progressing relationship
  • Never show their face
  • Ask for money
  • Travel for work
  • Sparse social media usage

Common Questions . . . Answered!

 What is cat fishing? Cat fishing is when someone is lured in to a relationship online via a fake profile or identity.

What are the potential dangers? Potential dangers are things such threats, money, sexual assault, or even possibly murder.

Could you become the victim of cat fishing? If the proper precautions are not take anyone is vulnerable to a cat fishing attack.

Why is cat fishing called cat fishing? It is called catfish, because like the actual fish the attacker will disguise their self as someone or something else.

Meme Culture

What Is Meme Culture?

The meme culture is a new sector within the 21st century, otherwise known as the age of millennial’s. These memes are often for comedic purposes, but more commonly they are based off offensive topics.

The fascination with memes often stems from a search for comedy used to bring up self esteem and have a better day. The word “meme” was coined from an evolutionary biologist Richard Dawkins, derived from the Greek word “mimeme”.

Going Viral!

This video went viral because it was children doing something funny. The purpose of this video is humor, which is the main factor in virility of videos on the internet.

In conclusion, videos can go viral for a broad array of reasons. The posts that go viral are normally, humorous content, painful content, or top search niches.

See you next week, thanks!

Cyber Blogs Worth Following!

Image result for hackers

Blog Choice #1

The Top Cyber Security Blogs and Websites of 2019 is my top choice of a blog which is definitely follow worthy. This website does not layout a boring formatting, they but different things all around the page rather than in paragraph form. It helps keep your attention and to make you keep reading.

Check out their most recent post “Pauls Security Weekly” to learn more over at https://onlinedegrees.sandiego.edu/top-cyber-security-blogs-websites/ .

Blog Choice #2

“Station X-Cyber security” is my second choice of a phenomenal blog site. It has a good overall color scheme, and provides a lot of information in small, separated sections.

Check out their most recent post “Enable DNS” to learn more over at https://www.stationx.net/blog/ .

Survey Says . . .

Image result for cyberbullying statistics 2019

I chose to create a survey on the topic of cyber bullying. I feel that a survey on this topic will not only give readers a chance to anonymously share their feeling and express their emotions, but for me to learn more about it from direct victims of cyber bulling. As well as to gain a deeper look into how it affects people all around us.

Below is a link to take a one of a kind survey, to express your emotions, and your answers WILL be kept confidential.

https://pollev.com/surveys/QNG1TgktENmsW2h28wkcP/respond

Thanks and see you next week!

Mobile Scams

Image result for mobile scams

What is Social Engineering?

The use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society. Encompasses a broad spectrum of malicious activity.  The use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.

Mobile Phishing Attacks!

This is a type of social engineering attack usually used to steal user information, including login credits and credit card numbers. It happens when an attacker, disguised as a trusted entity, makes a victim into opening an email, instant message, or text message.

https://info.phishlabs.com/blog/rise-mobile-social-engineering-phishing-attacks

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

Phishy Situation

Image result for miley cyrus

In 2017, 24 year old Miley Cyrus was the victim of a celebrity hacking scandal. Her nude images were stolen and posted anonymously on a website called Celeb Jihad. Miley could have taken several measures two prevent this attack. She should have not taken the explicit images in the first place. She could take proper precautions and use much more complex passwords. She could also upgrade her social media team to more knowledgeable members.

Thanks for reading and check out the links below for additional information!

https://www.elle.com/uk/life-and-culture/culture/news/a35201/miley-cyrus-becomes-latest-victim-of-cyber-hacking-nude-photos/

https://us.norton.com/internetsecurity-online-scams-how-to-protect-against-phishing-scams.html

Digital Footprint

Image result for digital footprint

Why is digital safety important?

Digital safety is one of the most important things a teen can learn about in modern day society. They may come across issues such as cat fishing, trying to get personal information like addresses, social security numbers, and bank information. If a person can learn the proper precautions to avoid being physical, emotional, social, or mental damage. There is very simple things to do like stay off the internet all together and use very complex passwords with a very broad array of characters.

How to stay safe with digital communication ?

There is quite a few ways to increase your safety when communicating digitally. As stated above, there is very simple things to do like stay off the internet all together and use very complex passwords with a very broad array of characters. You can also limit your posts per week to cut down in the chances you take, as well as have a trusted adult review your posts before you upload them to ensure they don’t reveal too much information.

Bonus : Viral Posts

Sure, if your posts goes viral you may get the money or attention you need. However, virality makes a post go to more people than its original intended audience, making it a high risk thing in relation to personal security via digital communication.

The link provided below will talk about 4 dangers of digital communication and 8 tips to avoid them.

https://seapointcenter.com/four-dangers-of-digital-communication/

Thank you for tuning and in and see you next week, thanks a lot!

All About a Cyber Syrian Bombing!

This video is a small, raw unedited piece of footage of a Syrian nuclear reactor getting an airstrike attack from Israeli government in September of 2007.

What is the purpose of a cyber attack ?

The purpose or motive of a cyber attack is different most of the time and may vary, it could be because of hatred from person to person, or it could be as simple as wanting money or even to do disable an entire operation.

What damage can be caused through a cyber attack?

An immense amount of damage can be caused from things like bankruptcy and identity theft, to depression, or even the explosion of an entire facility like in my example.

What is the difference of a cyber war over a traditional war?

I personally don’t think there is much difference other than the weapons used. For example a cyber attack that shuts down all power in an area stops lighting, clean water etc, meaning just as many deaths if not more.

Design a site like this with WordPress.com
Get started