Smartphone or Tablet Hacked
If you use public Wi-Fi or USB power charging stations at airports, hotels, and
locations, make sure to use a VPN when using public Wi-Fi, and always make sure
to use a
USB data blocker...
This is a form of blackmail in which sexual information or images are used to extort sexual favors or cash from the victim. Social media and text messages are often the source of the sexual material and the threatened means of sharing it with others.Read More
Reporting App specific Cyber Incident
Do you know of someone who has been abused / being abused online?
Are you a victim of online abuse?
Learn how to report App specific cyber incidents by clicking on the App logo
Radicalization is a process by which individuals, often young people, move from supporting moderate mainstream views, to supporting extreme ideological views.Young people may be vulnerable to a range of risks as they pass through adolescence. They may be exposed to new influences and potentially risky behavioursRead More
ONLINE SCREEN TIME BALANCE
Screen time can offer children opportunities to learn and develop new skills at a touch of a button but like anything, too much of it can have a negative effect on their well being.Read More
Sharenting is the overuse of social media by parents to share content based on their children, such as baby pictures or details of their children's activities. Sharing could leave children exposed to Online Child Sexual Exploitation and Abuse (OCSEARead More
SELF-GENERATED SEXUALLY EXPLICIT IMAGES AND MATERIALS INVOLVING CHILDREN (SEXTING)
Children and young people have always had to deal with issues such as making friends, maintaining friendships, and dealing with first romantic relationships. However, the addition of Internet, technology and social media has transformed simple coming of age issues into overwhelming.Read More
SEXUALISED IMAGES USED IN REVENGE (REVENGE PORN)Social media allows people to create and share information, ideas, photos and other forms of expression, however social media and Internet technologies may also be used to sexually harass or blackmail others.Non-consensual disclosure of sexual images, or informally “revenge porn,” defines self-generated images and materials (usually intimate or sexually explicit) that are shared. Read More
Cyber grooming is when someone (often an adult) befriends a child online and builds an emotional connection with future intentions of sexual abuse, sexual exploitation or traffickingThe main goals of cyber grooming are: to gain trust from the child, to obtain intimate and personal data from the child (often sexual in nature—such as sexual conversations, pictures, or videos.Read More