While you may not be interested in online gaming yourself, the simple fact of the matter is that your children are. Mobile games and online gaming have become one of the most loved activities of 9-16 year olds. In fact, gaming is even more popular than spending time on Facebook! This makes sense when you consider that online and mobile games run the gamut from sports, to missions, to interactive/group games, and often not only serve as a form of entertainment, but also help children to explore a range of interests while learning about teamwork.
Old chaps, my, my, it has been a while since we last chatted. I’ve decided to come out of my undercover research assignment for BullGuard to share some of my thoughts on how you can protect your personal data and your children on social networks.
This internet security report has been brought to you by the FBI. They recently revealed that photo-sharing programs are the new scam. Cybercriminals have spread their evil claws and thieving ways to yet another aspect of our internet usage. They are setting up fake photo-sharing websites and luring you in.
It’s a very different world out there; the one our children are growing up in is certainly not the same world we grew up in. Technology has evolved quite dramatically, and as a result, we, as parents, often find ourselves unprepared for some of the most important conversations we need to be having with our children.
Europe is taking control of the internet. The Council of Europe is promoting an internet that is safe, and all-inclusive. As we all know, the internet offers many opportunities and has changed all of our lives for the better, but as we all also know, it is not without its risks. The goal of the new Council of Europe is to use the internet to promote democracy and cultural diversity, all while combating cybercrime.
Heavily funded, mass scale hacking operations might look impressive and expensive, but they’re not nearly as sophisticated as they’d have us believe. Recently, IBM released a study that announced most hackers use pretty common techniques to gain access to organizations and to steal their data.
Web browsers are a gate open to the internet. Although we may not realize it, we rely extensively on the use of web browsers to read emails or local news, to check the weather forecast or to manage our financial resources.
Malware can sit dormant on your smartphone for some time before it is activated and before you become aware of it. Researchers have found that the triggers may be as simple as music and light. Just by pulling out your phone and interacting with it in a cinema could trigger the malware into activation mode, via built-in sensors such as the microphone, camera, vibration sensor or magnetic field monitors. In other words, it’s not just your emails and internet access that makes your mobile susceptible to malware attacks.
If you’ve got children, they want to be on Facebook. And for most of those children, online social networking is a reflection of their offline lives; however, for some, just as in their offline lives they sometimes can struggle to resolve their problems or conflicts. This struggle can manifest itself in negative ways online, amplifying and perpetuating the issues; and this is when harassment, cyberbullying and exposure to inappropriate content can happen.
They’re in cahoots! Reveton malware developers have added keylogging to their ransom demands. This new addition acts as a backup tactic in situations when victims refuse to pay up when held at ransom. Microsoft discovered this tactic in late-May and reportedly, this new method is distributed using the Blackhole Exploit Kit.