Instagram Aims To Prevent Sextortion

Instagram has introduced a series of new safety features aimed at stopping people from being able to screenshot or screen-record images and videos intended to be viewed once, as part of "ongoing efforts" to prevent sextortion on the platform.

Meta, the owner of Instagram, has recently announced features that are aimed at protecting teenagers from being tricked into sending intimate images to scammers and blackmailed over them.

In particular teenagers under 18 also won't be able to immediately view nude imagery sent to them via direct message. Instead, the image will be blurred and accompanied by a warning detailing the risks of sending sensitive images.

The safety changes are part of a broader campaign by Instagram designed to help teenagers and parents more easily spot sextortion scams.A previously tested tool that blurs nude images in messages, and hides the follower and following lists of users from potential sextortion accounts, will also be made permanent.

The crime typically takes place on social media platforms, typically when an extortionist pressures a teenager they've just contacted or befriended into sending explicit imagery of themselves. The criminal then frequently uses that content to demand money in exchange for keeping the images private.

These features come as the UK's communications watchdog Ofcom says that social media firms will be fined if they don’t keep children safer.  

Globally, law enforcement agencies have reported a rise in the number of sextortion scams taking place across social media platforms. The UK's Internet Watch Foundation said in March 2024 that 91% of the 2023 sextortion reports related to boys.

These new tools will include preventing the ability to screenshot images and videos sent in Instagram messages with its "view once" or "allow replay" mechanisms. This can be selected by users when sending an image or video in Direct Messages. This will also apply to the Web version of Instagram.

Meta said its new safety features and campaign are designed to build on tools already available to teens and parents on the platform. It will also hide people's followers and following lists from potential sextortion accounts.

The campaign follows Instagram’s work with the National Center for Missing and Exploited Children and Thorn, a nonprofit organisation for defending children against sexual abuse.

It comes a month after the platform put out “Instagram Teen Accounts,” with a host of changes for young users.  The teenage accounts are now private by default for all users younger than 18, who must manually accept new followers and can only be messaged, tagged or mentioned by people they follow.  

Instagram also announced an educational video campaign shared with millions of users in the US, UK, Canada and Australia, along with collaborations with popular celebrities, creators and parent creators.

BBC     |     Fox 8     |     Mashable     |     The Hill     |     Instagram     |     Keighley News


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Internet Archive Attacked By Pro-Palestinian Hackers
DDoS Attacks Against Japan »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Applause

Applause

Applause provides real-world software testing for functionality, usability, accessibility, load, localization and security.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

BitSight Technologies

BitSight Technologies

BitSight transforms how companies manage information security risk with objective, verifiable and actionable Security Ratings.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Threatspan

Threatspan

Threatspan is a cybersecurity firm helping shipping and maritime enterprises achieve and maintain nautical resilience in an age of increasing cyber threats.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

VIRTIS

VIRTIS

VIRTIS' mission is to provide today's leading organizations peace of mind that their entire digital network perimeter is safe from hackers and data breach.

LogicGate

LogicGate

The LogicGate Risk Cloud™ is an agile GRC cloud solution that combines powerful functionality with intuitive design to enhance enterprise GRC programs.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

The PenTesting Company

The PenTesting Company

The PenTesting Company is owned and operated by offensive security professionals. Penetration Testing is essentially all we do.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Appranix

Appranix

Appranix delivers Cloud App Resilience with app-centric entire cloud resources backup, restore, and cross-region disaster recovery.

PDQ

PDQ

PDQ helps IT professionals to manage and organize hardware, software, and configuration data for Windows- and Apple-based devices.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Cyber Dagger

Cyber Dagger

Cyber Dagger is a cybersecurity company driven by a mission to protect digital infrastructures and close the cybersecurity skills gap.