Cyber bullying: Nip it in the bud

Don’t over-share, don’t get into an altercation, collect evidence—a few ways to stop online bullies from browbeating you
——————
On 8 May, when Salman Khan was granted bail by the Bombay high court in a 2002 hit-and-run case, New Delhi-based author Sreemoyee Piu Kundu wrote an angry post on her Facebook timeline, coming down heavily on the actor and the judiciary. The outburst went viral, was shared, liked, commented upon and carried by a website as an open letter and then published as a post on various websites. All without her permission. By the next morning, Kundu had over 6,000 abusive messages in her “Others” folder on Facebook, threatening her with rape, and abusing her parents and family. “I was taken aback. After a while, I stopped blocking and stopped reading the messages,” says Kundu on phone. On 11 May, Facebook blocked her account. “A thousand of these mob reported to Facebook that my post was violating community standards or that my account was fake,” says Kundu. She didn’t want to complain to the Cyber Crime Cell of the police as “most of these accounts were fake and would be deleted”. Ignoring the messages, she approached Facebook, proved that her account is not fake and got it reopened. The faceless mob of bullies continues to send her messages.
Not many people talk about it, but most have faced online bullying or seen it happen. “Cyber bullying is a serious issue with 50% of the Indian youth having experienced it in one form or another,” says Venkat Krishnapur, vice-president of engineering—consumer and mobile at computer security company McAfee, part of Intel Security. According to a 2014 study by McAfee, which examined the online behaviour and social networking habits of 1,422 Indians in the 8-17 age group, 66% of youngsters had either been cyber-bullied or had witnessed others being bullied online. The report defines cyber bullying as any act of teasing, insulting, harassing, stalking, intimidating or abusing someone over the Internet with the help of technology (personal devices) or digital platforms such as social media.
“Fake profiles, impersonation, misuse of compromising photographs and information are the most common ways a bully can harass you,” says Rakshit Tandon, security consultant at not-for-profit Internet and Mobile Association of India. “Other ways include identity hacking, writing obscene content on anonymous public or confession pages about you, or writing defamatory statements for individuals.” If someone is sharing your personal information, or spreading lies about you on community pages, or morphing your photographs, etc., to hit out at you, you’re being bullied.
Repeated online bullying can result in psychiatric or psychological problems like depression and suicidal tendencies. “Cyber bullying can cause mood swings, self-esteem issues, appetite and sleep loss, stress, affect family life, even disrupt relationships,” says Manju Mehta, professor, clinical psychology, All India Institute of Medical Sciences, New Delhi.
A 2012 survey of 25 countries, released by technology company Microsoft, placed India at No.3 in instances of cyber bullying. “We don’t take cyber bullying seriously enough as a nation,” says Debarati Halder, managing director of Centre for Cyber Victim Counselling, Tirunelveli, Tamil Nadu. Halder, who sees about 90 cases related to cyber bullying in a month, says the number of complaints are so low that we think it’s not happening. “But it’s happening everywhere and to everyone.”
One of the reasons might be that it’s hard to convict anyone under our current laws, says Vakul Sharma, a New Delhi-based advocate in Supreme Court who specializes in cyber laws. He says there is no exact definition of cyber bullying under the Indian Penal Code (IPC) or the Information Technology (IT) Act. Earlier, these cases were booked under Section 66A of the IT Act but that was revoked in March. Sharma says there should be a provision related to cyber bullying in the IT Act.
If you want to avoid being bullied online, here are some things you can do.

Report and block

Immediately report an offensive post to the administrator of the website, social networking site or video-sharing site and get the photograph, video or post blocked. Once you’ve done that, block the person immediately too. “Don’t counter argue, abuse or get into a shouting match,” says Halder. “Just shut off the person from your social networks.”

Don’t share everything

The 2014 McAfee report found that 92% of Indian youngsters indulged in risky online behaviour, including over-sharing or posting details like email, phone or home address.
Learn to control the information you post on social media, says Ponnurangam Kumaraguru, assistant professor and founding head of Cybersecurity Education and Research Centre at the Indraprastha Institute of Information Technology in New Delhi. “Avoid posting any personal information or compromising photographs on public forums.”
============
First published in Mint. Read the complete article here.

Shield your Android

Is your ‘droid’ device protected against increasingly devious virus attacks? If not, here are some life-savers

 

droid--621x414

Of all the new threats against mobile operating systems in the second half of 2013, 97% were targeted against Android, according to the “Threat Report” released by security research firm F Secure Labs in March. It doesn’t end there. According to the report, India tops the list in reporting Android malware.

Given that 93% of Indian mobile Internet users are on Android, according to research firm International Data Corp., that’s not surprising. “Android is the most popular and widely used operating system worldwide, with over a million new devices being activated every day,” says Ritesh Chopra, country manager (India) at software security firm Symantec Corp. “When it (Android) gave smartphone users more freedom to install software from outside their official marketplace, it also opened the doors to malware authors, who have spent years honing their techniques,” he adds.

In a February report, Symantec stated that on an average, 272 new malware variants and five new malware families targeting Android were discovered every month in 2013. “These threats can steal your personal and financial information, track you, send premium-rate SMS messages, and display intrusive adware,” says Chopra.

Android has been designed with multilayered security to anticipate and tackle malware attacks on it as well as attacks on third-party apps in its official marketplace. But what Google didn’t anticipate was the illegitimate marketplaces on the Internet.

“Today, it’s Android’s compromised versions of legitimate apps that have become a problem,” says Sriram Raghavan, security and forensics consultant, Secure Cyber Space, a firm that helps businesses secure their Web presence. These versions are available on unregulated third-party Android marketplaces, or free versions of paid apps that can be downloaded from anywhere and installed. They work exactly like the paid app but with a slight difference; they have an innocuous additional code inserted in them, a malware. Raghavan believes security apps might offer at best limited protection.

Once the malware is inside your system, it can do anything, from getting access to voicemail, call logs, notifications, user passwords for apps, or even sending SMSes. “You can update your software but some malwares are smart and update with the operating system,” says New Delhi-based cyber security expert Dominic K. The best protection against malware is to disable apps downloaded from unknown or unauthenticated sources.

“Trust only the Google play app store or the device manufacturer’s online store,” says Raghavan. Also, never connect to open or unknown Wi-Fi networks and remember to install an authenticated remote wipe or lock app in the unlikely event that the device is stolen or lost. Plus, always lock your screen when the device is inactive. And of course, choose one of the apps we list here to better protect your device.

McAfee Antivirus and Security

Other than scanning the apps you install and checking your phone constantly for malware, the 4.0 version of McAfee updated in March, can wipe off your data and restore it from a backup if the phone is stolen.

Read more at: http://www.livemint.com/Leisure/3iY6fBN4guORlkzJ6LETnI/Shield-your-Android.html?utm_source=copy