Tag Archives: cell phones

Tip #22 Cyberbullying: How to Get Help

Screen Shot 2015-10-26 at 4.14.40 PM

 

Cyberbullying doesn’t end at high school graduation. It can continue in college, too. You’d think that people who bully would grow out of this behavior, but college is a high-stress place. Tiffs between ex-boyfriends and ex-girlfriends can spiral out of control. Rifts among roommates or between athletic teams and individual players at other schools can escalate to the virtual world.

One common arena for cyberbullying is social media. Facebook, Twitter, Instagram, and other services provide easy opportunities for students to spread negativity and put personal vengeances into action. Cyberbullying can also happen via email, text messages, and embarrassing images and videos posted online.

Negative emotions and fear grow and take on a life of their own through manifestation on the Internet, as seen most tragically with the cyberbullying situation that involved Rutgers student Tyler Clementi in fall 2010. Mental and emotional-based cyberbullying acts may set the stage for other acts of aggression, such as physical bullying or even school shootings.

If you are a witness of cyberbullying, speak out for the victim and try to put an end to it. If you don’t feel comfortable doing that, or if you are the victim and don’t feel safe speaking up, contact a trusted authority, such as a parent or school official, who can help put an end to the bullying. For more signs and prevention of cyberbullying, see this government website on cyberbullying.

At Fordham University, we maintain an office that specifically handles complaints about discrimination, which may involve acts of cyberbullying. Other supports include the University’s Integrity Hotline. Fill out a report about cyberbullying, and it will be directed to the appropriate office–be it the University Information Security Office, the Office of Public Safety, or somewhere else–for addressing your situation.

Finally, if you have engaged in cyberbullying, it can be helpful to talk to a counselor or trusted adult to help you sort out the reasons behind this behavior. Fordham has resources for that, too.

By Nicole Kagan, Fordham IT News Editor.

Tip #18 Are You SURE You Want to Download that App?

Image: Ad for Kodak Instamatic Camera. Life Magazine, Sept. 17, 1965, p.64.

Image: Ad for Kodak Instamatic Camera. Life Magazine, Sept. 17, 1965, p. 64.

A Snapchat notification twinkles out at you from the phone. It’s midterms week and you’re craving a break from studying. Before you can open up the (probably very funny) “snap” your best friend sent you, an ad for something called SnapNSave pops up. “Save and view snaps as many times as you like,” reads the app’s description. You think to yourself, What a great idea!

But little do you know, the Snapchat you’re about to save will be hacked and exploited like the other 500Mb of photos that were just stolen by this app.

Legitimate third-party applications can offer entertainment or functionality. But use caution when you decide to enable any application on a device. Avoid applications that seem too good to be true, or significantly change the operation of a trusted app. Also, adjust your settings to limit the amount of information an application can access.

Read more about third-party app risks in this article from FireEye.

By Nicole Kagan, Fordham IT News Editor

Tip #14 First It Was Phishing, Now It’s Smishing

Example of a phishing text and how the consumer handled it using Twitter.

Example of a phishing text and how the consumer handled it using Twitter.

On another (very important) note, another phishing technique lures consumers by using text messages containing URLs and phone numbers. Such a message  usually asks for one’s immediate attention, and requires one to respond or click on the URL.

Oftentimes, the message will come from a “5000” number instead of an actual phone number. This indicates the text message was sent via email to one’s cell phone, rather than from another cell phone.

So don’t turn into another stolen cell phone statistic. Or a consumer who’s been tricked. Regardless of what you’re doing, make sure your cell phone is secure and keep an eye out for odd, seemingly “phishy” text messages.

If you think you’ve received a phishing message, contact IT Customer Care immediately: 718-817-3999 or HelpIT@fordham.edu.

Read more about cell phone safety in Tip #11.

 

Tip #11 Cell Phone Theft

Cell Phone Theft

Image: “Numbers of stolen cell phones growing fast around the country,” The Droid Guy

 

 

Thousands of cell phones are stolen and infiltrated every month. Even some Fordham students have been victims of this crime. Once a cell phone is hacked, the thief has access to a huge amount of personal information. So take heed! Follow these practical measures to avoid becoming a target.

  • Use your phone’s security lock code to create a unique pass code.
  • Disable bluetooth on your phone if not in use.
  • Make sure to only unlock the phone when you need to use it.
  • Do not lend your mobile phone to strangers on the pretext of an emergency situation. They may slip away with it before you know it.
  • Immediately report a lost or stolen phone to your service provider and to the police, and insist on an acknowledgment.
  • If you are a member of the Fordham community, report your theft to IT Customer Care at 718-817-3999 or HelpIT@fordham.edu
  • When not in use, keep your phone out of sight—in your pocket, backpack, or handbag.
  • Do not, by any means, leave your cell phone unattended.
  • Avoid disclosing the relationship between you and the people in your contact list. Avoid using names like “Home,” “Honey,”Hubby,” “Mom,” or “Dad.” Criminals might attempt to contact these individuals to extract more of your personal information.

Make sure your phone is secure. And if you get some weird-sounding texts from a friend or family member, get in touch with them in some other way before you respond.

For more information about cell phone theft, read “How to Deter Smartphone Thefts and Protect Your Data” from CTIA, the Wireless Association.