Doxxing, The Internet and How You Can Lock Down Your Data

By on

There exists, in this world of ours, a term describing the public release of a person’s identity against their will online. It’s called doxxing—Internet-speak for publishing docs, or documents—and it has quickly gone from an obscure Internet term to a tool for digital intimidation. And it can be quite nasty.

Those seeking the identity of someone online with whom they disagree for either ideological or political reasons often employ doxxing. For example, a recent scandal in the video game community compelled a mob of gamers to dox Zoe Quinn. Quinn was publicly harassed and abused for publishing a video game that deals with the issues of depression and, according to her aggressors, for allegedly having an affair with a video game journalist. Personal details including her phone number were released. She received sexually explicit phone calls. Personal details like her home address were released as well. She fled her home fearing for her safety.

So, yes, doxxing, though rare for many, can be a frightening and potentially dangerous affair.

That said, how would one protect oneself from doxxing? Outside of living in the woods without an Internet connection, it’s best to start with one of the most popular tools cybercriminals use for doxxing: data brokers.

A data broker is exactly what it sounds like: a service online that collects data, assembles the data into readable parts, and sells the data to a buyer. For doxxing, data brokers often collect different pieces of information, like names on social networks, phone numbers associated with a household and addresses to construct a profile of a person. Most of the time they’re accurate. And for $20, more or less, a person can buy the data detailing someone else’s life.

But it doesn’t have to be that way. Most data brokers have an opt-out program to remove your information from their servers. Computerworld’s Ken Gagne has written an excellent breakdown of how to remove your sensitive information from data broker websites (in most cases it only requires you to fill out a few forms).

Hackers don’t exclusively use data brokers to dox people online. In most cases, hackers can identify a person by simply conducting an online search for their name and any social media and forum accounts associated with it. From there it’s a simple process of piecing together a portrait of the victim. They can also conduct a search on WhoIs.com to identify the owner of any particular website.

But the methods behind doxxing depend on one crucial point: easily available information. You can, with a good deal of diligence, make things very difficult for the would-be doxxers out there. Here are some tips:

  • Use as little personal information as possible. The most important aspect of keeping yourself safe online is to know where your information is stored, and how easily-accessible it is. To cut down on the easy access part, minimize your social media profiles to only essential details and set your profiles to private. You should also consult the Computerworld article referenced above for a list of websites that may contain your private information (and details for removing it).
  • Use at least two emails. Use a different email account for different types of websites to make doxxing a more difficult endeavor for hackers. Using one account for social media and another for gaming or other online activities can reduce the odds that your name becomes associated with any single handle.
  • Bear malware in mind. Not many doxxers employ malware to expose victims, but hackers do, and they’re often after the same prize: your data. Protect yourself from hackers with comprehensive security for all of your computers, smartphones and tablets with McAfee LiveSafe™ service.

 

GaryNasdaq_NCSA_Conference_panel small

 

Categories: Consumer Threat Notices
Tags: , , ,

Leave a Comment

Similar articles

For anyone who asks what happens during the tween through teen years, the best answer is probably, “What doesn’t happen?!” Just so you know, I’ve been there, done that, and got the T-shirt. And I survived. My kids were the first generation to grow up on social media. Like most teens in the mid-2000s, they ...
Read Blog
Cybercriminals seem to get more and more sophisticated with their attacks, and phishing scams are no different. The McAfee Labs team has observed a new phishing campaign using a fake voicemail message to trick victims into giving up their Office 365 email credentials. During the investigation, the team has found three different phishing kits being ...
Read Blog
The topics parents need to discuss with kids today can be tough compared to even a few years ago. The digital scams are getting more sophisticated and the social culture poses new, more inherent risks. Weekly, we have to breach very adult conversations with our kids. Significant conversations about sexting, bullying, online scams, identity fraud, ...
Read Blog