Instagram Aims To Prevent Sextortion

Instagram has introduced a series of new safety features aimed at stopping people from being able to screenshot or screen-record images and videos intended to be viewed once, as part of "ongoing efforts" to prevent sextortion on the platform.

Meta, the owner of Instagram, has recently announced features that are aimed at protecting teenagers from being tricked into sending intimate images to scammers and blackmailed over them.

In particular teenagers under 18 also won't be able to immediately view nude imagery sent to them via direct message. Instead, the image will be blurred and accompanied by a warning detailing the risks of sending sensitive images.

The safety changes are part of a broader campaign by Instagram designed to help teenagers and parents more easily spot sextortion scams.A previously tested tool that blurs nude images in messages, and hides the follower and following lists of users from potential sextortion accounts, will also be made permanent.

The crime typically takes place on social media platforms, typically when an extortionist pressures a teenager they've just contacted or befriended into sending explicit imagery of themselves. The criminal then frequently uses that content to demand money in exchange for keeping the images private.

These features come as the UK's communications watchdog Ofcom says that social media firms will be fined if they don’t keep children safer.  

Globally, law enforcement agencies have reported a rise in the number of sextortion scams taking place across social media platforms. The UK's Internet Watch Foundation said in March 2024 that 91% of the 2023 sextortion reports related to boys.

These new tools will include preventing the ability to screenshot images and videos sent in Instagram messages with its "view once" or "allow replay" mechanisms. This can be selected by users when sending an image or video in Direct Messages. This will also apply to the Web version of Instagram.

Meta said its new safety features and campaign are designed to build on tools already available to teens and parents on the platform. It will also hide people's followers and following lists from potential sextortion accounts.

The campaign follows Instagram’s work with the National Center for Missing and Exploited Children and Thorn, a nonprofit organisation for defending children against sexual abuse.

It comes a month after the platform put out “Instagram Teen Accounts,” with a host of changes for young users.  The teenage accounts are now private by default for all users younger than 18, who must manually accept new followers and can only be messaged, tagged or mentioned by people they follow.  

Instagram also announced an educational video campaign shared with millions of users in the US, UK, Canada and Australia, along with collaborations with popular celebrities, creators and parent creators.

BBC     |     Fox 8     |     Mashable     |     The Hill     |     Instagram     |     Keighley News


If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Internet Archive Attacked By Pro-Palestinian Hackers
DDoS Attacks Against Japan »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Vanguard Integrity Professionals

Vanguard Integrity Professionals

Vanguard Integrity Professionals is an independent provider of enterprise security software solutions that address complex security and regulatory compliance challenges.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

SRI International

SRI International

SRI International is a research institute performing client-sponsored R&D in a broad range of study areas including computing and cybersecurity.

Secusmart

Secusmart

Secusmart provide highly secure and encrypted speech and data communication solutions.

NRD Cyber Security

NRD Cyber Security

NRD Cyber Security create a secure digital environment for countries, governments, and organisations and implement cybersecurity resilience enhancement projects around the world.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

Signal Sciences

Signal Sciences

Signal Sciences Web Protection Platform (WPP) provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Secude

Secude

SECUDE is an established global security solutions provider offering innovative data protection for SAP users.

e-Lock

e-Lock

e-Lock services include IT security consulting and training, security systems integration, managed security and technical support.

Sphonic

Sphonic

Sphonic provides regulated institutions of any size a powerful compliance & risk platform to quickly and securely onboard new customers and manage ongoing AML and Fraud & Risk trends.

Crypto4A Technologies

Crypto4A Technologies

Crypto4A quantum-ready cybersecurity solutions significantly improve protection for Cloud, loT, Blockchain, V2X, government and military application deployments.

ReFirm Labs

ReFirm Labs

ReFirm Labs provides the tools you need for firmware security, vetting, analysis and continuous IoT security monitoring.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Cutting Edge Technologies (CE Tech)

Cutting Edge Technologies (CE Tech)

CE Tech is a Next Generation Technology Partner providing advanced technology infrastructure solutions through partnerships with leading technology providers.

Transparity Cyber

Transparity Cyber

Transparity Cyber is dedicated to cybersecurity. As part of the Transparity Group we’re an established name in the Microsoft Cloud landscape, with a focus on cybersecurity excellence.