background preloader

The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them

The Five Biggest Threats to Your Kids’ Privacy, and What You Can Do About Them
Remember back in school, when your teachers warned that everything you did would go on your permanent record? It turns out your teachers have become right. That permanent record is the Internet. It’s hard to be a fully functioning adult in 2014 and not leave behind a digital trail. Now imagine how hard it is for your kids, who have never known a world where the net did not exist. From the moment they emerge from the womb, they’re generating data, which is then eagerly absorbed and stored by Internet companies, government agencies and some evil no-goodniks. Despite federal laws prohibiting the collection of data from children under the age of 13, dossiers are constantly being created about your kids, whether it’s Google capturing their search histories, advertisers creating profiles of their interests, or their grandparents tagging photos of them on Facebook. Canadian Singles Find New Ways To Meet UrthBox Healthy Snack Boxes. Math Practice - Ages 5-15 Questions, complaints, kudos?

https://www.yahoo.com/tech/the-five-biggest-threats-to-your-kids-privacy-and-79062872970.html

Net Threats Experts say liberty online is challenged by nation-state crackdowns, surveillance, and pressures of commercialization of the Internet As Internet experts look to the future of the Web, they have a number of concerns. This is not to say they are pessimistic: The majority of respondents to this 2014 Future of the Internet canvassing say they hope that by 2025 there will not be significant changes for the worse and hindrances to the ways in which people get and share content online today. And they said they expect that technology innovation will continue to afford more new opportunities for people to connect. Still, some express wide levels of concern that this yearning for an open Internet will be challenged by trends that could sharply disrupt the way the Internet works for many users today as a source of largely unfettered content flows. The Net Threats These Experts Fear

10 ways schools are teaching internet safety "The student’s job is to figure out which website is the hoax. After students have looked at all three websites and figured out which one is the hoax, they share what they found with their classmates," says one reader in describing a hands-on lesson. As internet use has become a daily part of most students’ lives, students must know how to protect themselves and their identity at all times—especially when teachers and parents aren’t there to help them. Teaching students about internet safety has been important for as long as the internet has existed, but it’s in the spotlight this year in particular as schools get ready to apply for 2012 eRate discounts on their telecommunications services and internet access. That’s because applicants must amend their existing internet safety policies by July 1, 2012, to include information about how they are educating students about proper online behavior, cyber bullying, and social networking sites.

Bank Hackers Steal Millions via Malware Photo PALO ALTO, Calif. — In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by customers who appeared lucky to be there at the right moment. How to Protect Your Computer from Hackers, Spyware and Viruses This article has been inspired by a situation I ran into while visiting a cousin in India. Since I’m in the IT field, she asked me to take a look at her computer since it was acting “funny”. The “funny” part was that the computer would automatically restart whenever you tried to install ANY software onto it or download any program from the Internet. The first thing I noticed was that there was no anti-virus software installed on the computer, so my first goal was to install an anti-virus program and check for viruses. But of course, the virus that was already on the computer would not let me install or download anything! Smart virus!

Identity Theft Statistics: Information You Must Know That can't happen to me. This is how many people feel about identity theft...until it happens to them. Identity theft is on the rise and can happen to anyone, including you. Malware Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.[1] Malware is defined by its malicious intent, acting against the requirements of the computer user, and does not include software that causes unintentional harm due to some deficiency. The term badware is sometimes used, and applied to both true (malicious) malware and unintentionally harmful software.[2] In law, malware is sometimes known as a computer contaminant, as in the legal codes of several U.S. states.[6][7] Spyware or other malware is sometimes found embedded in programs supplied officially by companies, e.g., downloadable from websites, that appear useful or attractive, but may have, for example, additional hidden tracking functionality that gathers marketing statistics. Purposes[edit] Malware by categories on 16 March 2011.

Computer Virus Information What is a computer virus? Think of a biological virus – the kind that makes you sick. It’s persistently nasty, keeps you from functioning normally and often requires something powerful to get rid of it. A computer virus is very similar. Designed to relentlessly replicate, computer viruses infect your programs and files, alter the way your computer operates or stop it from working altogether. It’s estimated that the Conficker virus infected more than 10 million computers in 2009. How to Tell if your Cell Phone is Being Tracked, Tapped or Monitored by Spy Software - SpyzRus.net There are a few signs that may help you find out if your cell phone has spy software installed and that it is being tracked, tapped or monitored in some way. Quite often these signs can be quite subtle but when you know what to look out for, you can sometimes find out if your cell phone is being spied on. This article series will deal with How to Find installed Spy Phone Software and then How to Remove Spy Software followed by How to Secure your Cell Phone. This guide should help for all types of Smartphone including Android and for the iPhone there are a few extra tips.

Which nation-state is behind the sophisticated, stealthy Regin malware? Symantec Security Response has discovered a new malware called Regin which, they say, "...displays a degree of technical competence rarely seen and has been used in spying operations against governments, infrastructure operators, businesses, researchers, and private individuals." This back-door trojan has been in use, according to the security company, since at least 2008, and has stayed under the radar since. The level of quality and the amount of effort put into keeping it secret convinces Symantec that it is a primary cyberespionage tool of a nation state. Regin is a multi-stage attack, each stage but the first encrypted and none by themselves especially revealing about the overall attack.

BitTorrent Piracy Doesn’t Effect US Box Office Returns, Study Finds A new academic paper by researchers from the University of Minnesota and Wellesley College has examined the link between BitTorrent downloads and box office returns. Contrary to what's often claimed by the movie industry, the researchers conclude that there is no evidence that BitTorrent piracy hurts US box office returns. Internationally, there is a link between downloads and revenues, which the researchers attribute to long release windows. Privacy, security threats in the 'Internet of Things' If HIPAA is helpless in protecting information on fitness trackers, and voice-controlled TVs, smart thermostats and Internet-accessible appliances do almost nothing to ensure privacy, what will the convenience of connected things eventually cost consumers? The Federal Trade Commission warned last month about the serious privacy and data security risks, noting that the number of Internet-connected devices will double, to 50 billion, by 2020. We chatted with Shaun Murphy, a former Department of Defense communication systems security consultant who this year is launching PrivateGiant, an online-security firm. He says the threat is potentially greater than personal information giveaways on Facebook and other social media.

Apple iOS Now Targeted In Massive Cyber Espionage Campaign Attack campaign tied to Russia now zeroing in on mobile user's iPhones, iPads. An extensive and sophisticated cyber espionage operation targeting mainly Western military, government, defense industry firms, and the media, now has a new weapon: a spyware app for Apple iPhones and iPads. Operation Pawn Storm, which has been tied to Russia by at least one security research firm, is using a specially crafted iOS app to surreptitiously steal from the mobile device text messages, contact lists, pictures, geo-location information, WiFi status of the device, lists of installed apps and processes -- and to record voice conversations, according to new Trend Micro research. "The Cold War has returned in cyberspace, and Apple has become the gateway to western elites," says Tom Kellermann, chief cyber security officer with Trend Micro. "Pawn Storm has evolved to now incorporate proximity attacks against Western victims." "We found two malicious iOS applications in Operation Pawn Storm.

How can I protect my Windows PC against malware? I have just ordered a Windows PC based on your recommendation, and now ask for your advice on anti-spyware and virus protection software for it. Any help you could offer me would be greatly appreciated. Mary Mass-market malware is a numbers game, played mostly with familiar off-the-shelf exploit kits (EKs). Most of the victims are people who don't install updates to plug security holes not just in Windows but also in Oracle's Java, Adobe Flash, Adobe Reader, and other widely-used programs. They're people who either don't run anti-virus software and firewalls, or don't keep virus signatures up to date.

Citation: Tynan, Dan (2014). The five biggest threats to your kids’ privacy, and what you can do about them. Retrieved from by estherpepin Mar 9

Related: