{"id":20505,"date":"2020-03-05T16:40:48","date_gmt":"2020-03-05T21:40:48","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20505"},"modified":"2022-04-27T14:54:55","modified_gmt":"2022-04-27T18:54:55","slug":"sextorsion","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/sextorsion\/","title":{"rendered":"What Are Sextors?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Do you know what sextors are? Also known as virtual rape, the term sextortion is the result of the combination of the words &#8220;sex&#8221; and &#8220;extortion.&#8221; Characterized as a kind of cyber crime, \u201csextorting\u201d is when someone maliciously has access to third party personal materials &#8211; such as \u201cnudes\u201d and intimate videos &#8211; and threatens to post them on the Internet in exchange for money or favors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cMost of the time, blackmail is done by people close to the victim or who she has had some kind of intimate relationship with, such as an ex-boyfriend. But the crime can also be committed by hackers who gain access to the user&#8217;s cell phone or computer.\u201d Explains Emilio Simoni, director of dfndr lab, PSafe&#8217;s digital security lab.<\/span><\/p>\n<h2><b>Women Are the Main Victims<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Virtual rape is growing and becoming increasingly common on the internet. According to the experts, 40.9% of sextortion victims are girls and women, who can suffer serious consequences from exposure, such as embarrassment, financial damage, and even depression. This is because cybercriminals disclose the victim&#8217;s intimate content to people in their social life, such as friends and family.<\/span><\/p>\n<h2><b>How Do Sextors Strike?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cybercriminals are always aware of new user behaviors in the digital world. They see the vulnerabilities of their potential victims as opportunities to create new attacks. Therefore, Simoni stresses that you need to be aware of what sextors are and how are the various tactics used to apply it.<\/span><\/p>\n<h2><b>Social Engineering<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Social engineering is widely used in sextortion. It is the main method that scammers use to gain trust and persuade someone. \u201cThis kind of strategy is advantageous to the perpetrator because it is much easier to convince people to relinquish their data and intimate content than to have the trouble of hacking it,\u201d says Simoni. After getting the content, the hacker starts asking for amounts of money not to disclose the compromising materials. The victim, being emotionally vulnerable, gives in to blackmail more easily.<\/span><\/p>\n<h2><b>Phishing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This type of practice is characterized by sending emails with flashy headlines that are hard to ignore. Some of these emails may contain fake offers or giveaways and upon access, the victim is hacked. \u201cThese attacks are often used by hackers because they go viral quickly, as victims unknowingly share the scam with their friends,\u201d Simoni says.<\/span><\/p>\n<h2><b>Scammers<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Fake profiles are not new, and you have probably interacted with some. Photos and videos are constantly being targeted by malicious people, and with scammers, it&#8217;s no different. Scammers use social engineering and usually try the romantic approach. Therefore, too attractive profiles, such as successful, widowed, and sometimes claiming to be handsome military men, may conceal a false identity.<\/span><\/p>\n<h2><b>What Measures Are Needed to Protect Yourself?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Shame, lack of knowledge, and fear are the main weapons of criminals. The dfndr lab experts have come up with some steps to keep your intimate life safe on the internet.<\/span><\/p>\n<ol>\n<li><b>Don\u2019t send photos or personal content over the internet<\/b><\/li>\n<li><b>The internet allows scammers to remain anonymous, so don&#8217;t believe everyone you know online<\/b><span style=\"font-weight: 400;\">. Be wary of people approaching you through social networks, especially if they ask for financial help or access to information or photos of you.<\/span><\/li>\n<li><b>If you often access your email from your phone, increase your attention.<\/b><span style=\"font-weight: 400;\"> There are cyber attacks designed exclusively to infect smartphones, so it\u2019s vital to remain aware. \u201cIdeally, use an antivirus that offers complete protection. Dfndr security, for example, sends you alerts whenever you receive or access a malicious link, a phishing scam, or if there\u2019s an attempt to clone your WhatsApp, \u201dexplains Simoni. <a href=\"https:\/\/go.onelink.me\/U4Bc?pid=MKT_BLOG_US&amp;amp;c=sextorsion\"><strong>You can download dfndr security for free here.<\/strong><\/a><\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li><b>Enable security mechanisms such as two-factor authentication. <\/b><span style=\"font-weight: 400;\">So even if a hacker finds your password, they still won&#8217;t be able to access your important accounts.<\/span><\/li>\n<li><b>It\u2019s very important to report cases of sextors that happen to people you know or to you directly.<\/b><span style=\"font-weight: 400;\"> Appeal to Internet companies such as social networks, and Google to remove content that violates privacy and is online harassment. If you are a victim, always report the crime to the local and authoriites and review state cyber-stalking and cybercrime laws. There are avenues for you take action.\u00a0<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Understand what sextors are, how it happens, and how to protect yourself from this increasingly growing virtual crime.<\/p>\n","protected":false},"author":83,"featured_media":20519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[12395],"class_list":["post-20505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-sextorsion"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20505"}],"version-history":[{"count":7,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20505\/revisions"}],"predecessor-version":[{"id":20539,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20505\/revisions\/20539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20519"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}