“Doxing” is the name given to the practice of “stealing” or using public information on the Internet about a user or company with the aim of using it negatively and thereby attacking, discrediting, humiliating, harassing or even its reputation blackmail.
Those who practice “doxing” use public information on social networks against any user
It is an increasingly common practice that takes advantage of the fact that users are increasingly sharing more information publicly on all types of social networks. Users who do “doxing” do not have to be professional cybercriminals, but who can intentionally misuse the information available on social networks, are no longer limited to receiving information from Facebook. Instagram and other networks.
You can also practice “doxing” by taking care of the fingerprint, the online trail everyone leaves on the Internet when they visit a photo, post a comment on a news portal, or make an online purchase.
Those who practice “doxing” with bad intentions can collect all this information and publish it on the Internet, for example, even by lying and misrepresenting the data, with a negative purpose such as incriminating you or firing you from your job will or have your professional reputation in question.
How do I avoid becoming a victim of “doxing”?
The main thing is to be aware that any act performed on the Internet involves leaving a trail of information. For example, if you put a user’s name on Google, you’ll get links to their social media accounts, comments they’ve made on internet forums, and other information like their work, academic records, and more. All of this data could be used by a person who practices “doxing” to harass their victim.
It is difficult to control all of the information that is circulated about yourself on the Internet, especially if it is deliberately made public or provided by another person, agency or institution. However, there are some measures that can be taken to “protect” access to personal information as much as possible if you do not want someone to use it for illegal purposes. They would be the following:
-Configure social media accounts as private so that the information is no longer available to anyone. Security should also be increased and who is given access or is not strictly controlled.
– Pay attention to the personal information that you upload to these platforms: avoid giving addresses, telephone numbers, email addresses and other personal data.
– Check the websites you visit and do not enter any strange or dubious service sites that do not offer a guarantee of security. This will prevent you from falling victim to “malware”, computer viruses that steal information from the devices on which they are installed. like computers or smartphones.
– Install security tools like antivirus and strengthen passwords for access to any online service.
– Keep up to date with all the tricks, techniques, and brands most commonly used to steal data and information from cyber criminals to be vigilant when an email or WhatsApp message is received that may be suspicious is.