
From Outrage to Insight: What the Hunter Moore Case Reveals About Online Abuse
The rise and fall of Hunter Moore is often told as a story of shock value, notoriety, and eventual legal consequence. But focusing only on
Learn about the topics that matter to the BTH Staff and Community as they write about their personal life and interests in an honest and casual way.

The rise and fall of Hunter Moore is often told as a story of shock value, notoriety, and eventual legal consequence. But focusing only on

There was a time when reporting multiple posts from an account would actually make a difference. You could flag eight, ten, maybe a dozen pieces

There are few things more British than quietly tolerating linguistic nonsense until, one day, we collectively snap and rename it properly. “Influencer” had its moment

There’s a very specific modern behaviour that seems almost too mundane to question. A scroll, a pause, a follow. Another one. And another. A feed

Most cyber threats do not begin with code. They begin with people. Phishing and social engineering rely on a simple truth: it is often easier

Technology has reached a stage where it can fabricate images, videos, and audio so convincingly that distinguishing reality from fiction is increasingly difficult. Deepfakes, digitally

Doxxing turns personal data into leverage. It is not just about information being found, it is about information being used. Names, addresses, workplaces, phone numbers

Online stalking rarely arrives with a dramatic entrance. It does not announce itself as danger. It slips in quietly, often disguised as attention, concern, or

Romance fraud is a form of exploitation that thrives on human trust. It is not a reflection of gullibility; rather, it is a calculated manipulation

Scammers are a part of modern life, lurking in emails, text messages, phone calls, and even social media. They rely on speed and distraction, hoping