Suppose, you receive a threatening email from someone saying and claiming that they have installed malware on your computer and captures video of you while using adult sites. What would you probably do? Well, there are a lot of options available to deal with all such circumstances that have been categorized under cyber extortion or blackmailing. You can read on the internet about various active scammers out there, Ilan Tzroya is one among them who is a well-known scammer in current time. Here, in this article, we will discuss effective tips to deal with cyber blackmailing. What should you do when receiving an online blackmail? You need to be calm and ignore the ransom It is genuine to get upset when you receive a threatening mail. Don’t get panic and make yourself identical that it is just a scam and nothing else. The sender can’t install any kind of malware on your computer and they do not have any kind of images that might be offending for you when goes viral. You need to keep calm and just ignore their demands of asking for ransom. Change your password If your current password is mentioned somewhere in the email then it’s the time to change your password. Make sure not to use the same password for multiple accounts, wherever possible enable two-factor authentication. The password you are using must be unique which must comprise of letters, symbols and special characters. Check your credentials Scammers usually get your credentials in a data breach. You have the facility to check out whether your account was involved in the data breach, there are a lot of websites that provide you the facility of checking credentials. Those websites can be easily found on the internet. Dealing with cyber extortion Cyber and webcam scams involve simple extortion approach to cheat people and demand money. In case you receive such as threatening email, just ignore the ransom demand and check whether the email is actually involved a data leak. Always keep the fact in mind that the sender of email can’t access your intimate information or media, they are just trying to create fear in the receiver in order to get their demand met. Conclusion It is worth ignoring the email until the scammer states that they have hijacked your password via a key-logger and prove their claim. If so, consider this to be a cyber crime and report to the regional police.