Majority of people cyberbully rather than in person mainly for this reason.
Why is it is easier than bullying the victim face-to-face.
When you join a public hotspot and the person in control of the hotspot uses your connection to the hotspot to steal your information.
What is fake hotspotting?
Used to spread e-mail spam and launch distributed denial-of-service (DDoS) attacks.
What are Botnets?
Law officials are involved in less than 1 in 5 cases of cyberbullying. The reason this is happening because teens and children do not do this.
What is tell an adult?
By looking over your shoulder as you type, thieves can glean your passwords, account information, and other sensitive information.
What is shoulder surfing?
Malware that is often disguised as legitimate software.
What is a Trojan horse?
This is one of the extreme effects of cyberbullying.
What is suicide?
When a person sends an email saying you won a prize or money.
What is a Nigerian prince?
Controlled under remote direction to perform criminal tasks, as well as infect other computers with viruses.
What are Zombies?
This is the most common device for cyberbullying.
What is a cell phone?
Thieves sift through garbage for receipts with credit card information, medical forms with social security numbers, or other documents with personally identifiable information (PII).
What is dumpster diving?
Records instant messages, e-mail, and any information you type at any time using your keyboard.
What is a Keylogger?
List at least two examples of cyberbullying.
Mean texts and emails, rumors spread by social networking, embarrassing pictures, etc.
When you plug your phone into a public outlet that has been tampered with to steal all of your information from your phone.
What is juice jacking?
Malware computer programs that replicate themselves in order to spread to other computers.
What are worms?