FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayYour RSS feeds

Parents: Are Your Kids Ignoring the Danger of Dating Apps?

By: McAfee

Technology has permeated almost every aspect of our lives, including our romantic involvements. This is especially evident in the increasing prevalence of dating apps among teenagers. While these platforms can offer exciting opportunities for meeting new people and exploring romantic interests, they also present a considerable risk, especially to a vulnerable age group.

As a parent, you might feel caught in a dilemma. On one hand, you want to respect your teen’s privacy and independence. On the other, you worry about the potential dangers lurking behind these digital platforms. This article aims to shed light on the risks associated with teenage use of dating apps and offers practical advice on how to navigate this tricky territory.

The Appeal of Dating Apps for Teens

Before we delve into the potential harm associated with dating apps, it’s important to comprehend why they are increasingly popular among teenagers. Essentially, these platforms provide an easy and convenient way for teens to connect with others, particularly during a pandemic when physical interactions are limited.

Moreover, dating apps may seem enticing due to their perceived freedom and anonymity. They allow teens to explore their own identities and relationships without the immediate scrutiny or judgment inherent in offline social settings. Such apps also hold the promise of romance and excitement, feeding into the natural curiosity and development of adolescents.

The Dangers of Dating Apps

While dating apps can help in forging connections, they also have a darker side that cannot be ignored. One of the main issues is that they often cater to an adult audience, exposing teenagers to mature content and interactions they might not be equipped to handle. This could include explicit sexual content, cyberbullying, or even predatory behavior.

Further, many apps do not verify users’ ages, making it easy for older individuals to interact with younger users – a practice that can potentially lead to grooming and exploitation. While some might argue that ‘age is just a number,’ when it comes to online safety, even a few years can make a significant difference. A 19-year-old chatting with a 14-year-old might not seem like a big deal, but when you factor in the vast differences in maturity and life experience, the dynamic becomes more concerning.

Dig Deeper: AI Goes Dating: McAfee Study Shows 1 in 3 Men Plan to Use Artificial Intelligence to Write Love Letters this Valentine’s Day

The Implications of Online Privacy and Data Security

In addition to the immediate dangers of inappropriate content and interactions, the use of dating apps also raises serious concerns about online privacy and data security. These platforms usually require a significant amount of personal information from users — everything from their name and location to personal preferences and pictures.

This data can be misused, leading to identity theft, online stalking, or other forms of cybercrime. Also, once information is shared online, it becomes almost impossible to completely erase it. A seemingly innocent picture or remark can resurface years later, potentially affecting future career prospects or personal relationships.

How to Protect Your Kids Against the Dangers of Dating Apps

Dating apps have become increasingly prevalent, opening up new avenues for meeting people. While these platforms can be a way to connect, they also pose potential dangers, especially for young users. As a parent, it’s crucial to be proactive in safeguarding your kids from the risks associated with dating apps. This guide will provide you with essential tips and insights on how to protect your children and educate them about responsible online behavior, ensuring their safety in the world of digital dating:

Navigate the Digital Landscape Through Communication

Confronting your teen about the risks of dating apps can be a daunting task, especially if you are met with resistance or the classic “You just don’t understand” retort. So, how can you approach this subject effectively? One of the most crucial steps is to maintain open lines of communication.

Encourage your teen to share their experiences online, and assure them that they can come to you with their concerns or fears without judgment. Regularly discussing online safety might seem repetitive, but it is a crucial aspect of ensuring your child is well-equipped to navigate the online world safely and responsibly.

Remember, banning or strictly controlling internet use might seem like the easiest solution, but it can backfire by causing your teen to become more secretive or rebellious. Instead, strive to cultivate an environment where your teen feels comfortable discussing their online activities, helping them understand the potential risks and consequences.

McAfee Pro Tip: Balancing screen time and healthy device use is a constant challenge for parents. While devices connect kids to identity and peer acceptance, they also open the door to issues like cyberbullying, predators, risky behavior, and self-image struggles. We advise you to find and identify the right time to implement parental controls. 

Teach responsible Online Behavior

The next step after open communication is teaching responsible online behavior. It is essential to educate our children on the basic principles of online safety. This includes understanding privacy settings, the dangers of sharing personal information, and the importance of reporting any suspicious activity.

Moreover, explaining the permanence of internet actions can help teens grasp the seriousness of their online conduct. Highlight real-life examples of individuals who have faced the consequences due to inappropriate online behavior to drive your points home.

Be Informed and Updated

If your child is using or is interested in using dating apps, it’s crucial to do your homework. Familiarize yourself with the apps they are using or are curious about – download them, explore their interfaces, and understand their privacy settings. This will help you create a natural dialogue about their usage and will empower you to offer guidance on their functionality and potential risks. For instance, some apps may have location-sharing features that might be dangerous, while others might have robust reporting systems against harassment or bullying.

Then, open a conversation about these apps. Discuss the benefits and dangers of using them, reinforcing the principles of responsible online behavior. This discussion should cover what information should never be shared (like home address or school location), the importance of reporting inappropriate behavior, and the potential emotional implications of engaging romantically with strangers online. By maintaining an approachable and non-judgmental attitude, your teen is more likely to listen and take your advice seriously.

Dig Deeper: New Global McAfee Cyberbullying Report Reveals Children Now Regularly Face Threats of Racism and Physical Harm Online

Implement Safety Measures

While education and open conversation are the foundation of promoting online safety, sometimes, they might not be enough. In such cases, it might become necessary to put certain restrictions in place, which can be done in collaboration with your teen. These could include setting time limits for app usage, employing parental control software, or checking the age restrictions for each app. You could also encourage your teen to only use apps with verified users.

However, these restrictions should not be imposed without discussion. It is important to involve your teen in the decision-making process, explaining your concerns and hearing their point of view. By treating them as partners in their online safety, you not only empower them to make wise decisions but also foster a sense of responsibility towards their online behavior.

Building Resilience

Finally, building resilience in your teenager is an invaluable tool in navigating the online world. Dating apps can amplify feelings of rejection, comparison, and inadequacy. Regularly reminding them that their online interactions do not define their worth can help cultivate a healthy online attitude. You should reassure them that it’s okay to turn down advances or stop conversations that make them feel uncomfortable.

Encouraging them to keep their real-world connections strong and to participate in offline activities can also help in grounding their sense of self-worth outside of the digital realm. This resilience will not only safeguard them within the online dating scene but is a life skill that can be applied in all aspects of their lives.

Dig Deeper: A Safer Internet for You, Your Family, and Others Too

Final Thoughts

As parents, we find ourselves in uncharted territories, navigating a digital landscape that we did not experience in our adolescence. But with open communication, education, implementing safety measures, and building resilience, we can help our teens explore these platforms safely. Remember, the goal is not to control every aspect of their online life but to guide and empower them to make responsible choices. After all, we are not just raising children, but future adults. It might seem daunting and even overwhelming at times, but together, we can equip them with the tools they need to stay safe in the online world.

Ensuring your child’s online safety is vital, and McAfee is here to help you safeguard them against the dangers of social media platforms and dating apps. Empower yourself with online safety – opt for McAfee for a more secure and protected online experience.

The post Parents: Are Your Kids Ignoring the Danger of Dating Apps? appeared first on McAfee Blog.

Valentine’s Alert: Don’t Let Scammers Break Your Heart or Your Bank Account

By: McAfee

As with any major holiday or special occasion, Valentine’s Day is unfortunately not immune to scammers looking for an opportunity to exploit unsuspecting individuals. Their deceitful acts can break hearts and bank accounts. In this article, we spotlight some common Valentine’s Day scams, offer tips on how to protect yourself and navigate this romantic day with confidence and caution.

The Unromantic Side of Valentine’s Day

Valentine’s Day is a time when love is in the air. It’s a time to express your feelings for that special someone in your life, or perhaps even embark on a new romantic journey. But while you’re busy planning that perfect dinner or choosing the ideal gift, there’s an unromantic side to the day that you should be aware of – the potential for scams.

Scammers, always looking for new ways to trick people into parting with their money, use the heightened emotions of Valentine’s Day to their advantage. They prey on the unwary, the love-struck, and even the lonely – anyone who might let their guard down in the quest for love or the pursuit of the perfect gift. And in our increasingly digital world, these unscrupulous individuals have more ways than ever to reach potential victims.

Dig Deeper: AI Goes Dating: McAfee Study Shows 1 in 3 Men Plan to Use Artificial Intelligence to Write Love Letters this Valentine’s Day

Recognizing Common Valentine’s Day Scams

Knowledge is power, as the saying goes, and that’s certainly true when it comes to protecting yourself from scams. By understanding the types of scams that are common around Valentine’s Day, you can be better prepared to spot them – and avoid falling victim.

One of the most common Valentine’s Day scams is the romance scam. Scammers, often posing as potential love interests on dating websites or social media, manipulate victims into believing they are in a romantic relationship. Once they have gained their victim’s trust, they ask for money – perhaps to pay for a flight so they can meet in person, or because of a sudden personal crisis. These scams can be emotionally devastating, and they can also result in significant financial loss.

Dig Deeper: Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving

Another popular scam around Valentine’s Day involves online shopping. With many people seeking the perfect gift for their loved ones, scammers set up fake websites that appear to sell everything from jewelry to concert tickets. After making a purchase, the unsuspecting victim either receives a counterfeit product or, in some cases, nothing at all. Additionally, these sites may be designed to steal credit card information or other personal data.

Phishing scams are also common. In these scams, victims receive emails that appear to be from a legitimate company – perhaps a florist or a candy company – asking them to confirm their account information or to click on a link. The goal is to steal sensitive information, such as credit card numbers or login credentials.

How to Keep Your Heart and Your Wallet Safe

While the existence of these scams is unquestionably concerning, the good news is that there are steps you can take to protect yourself. Valentine’s Day should be a celebration of love, not a source of stress and worry.

One of the most important is to be aware that these scams exist and to be cautious when interacting with unfamiliar people or websites. If something seems too good to be true, it probably is.

When shopping online, make sure the website you are using is secure, and consider using a credit card, which offers greater protection against fraud compared to other forms of payment. Be wary of emails from unknown sources, especially those that ask for personal information or urge you to click on a link.

For shopping scams, it’s recommended to do research on any unfamiliar online retailer before making a purchase. Look for reviews or complaints about the retailer on independent consumer websites. If the website is offering items at a price that seems too good to be true, it likely is. Also, consider the website’s URL. A URL that begins with ‘https://’ indicates that the website encrypts user information, making it safer to input sensitive information than on websites with ‘http://’ URLs.

Forewarned is forearmed, and having advanced strategies to detect and avoid scams is also a strong line of defense. When it comes to online dating, be sure to thoroughly vet any potential romantic interests. This involves doing a reverse image search of profile photos, which can quickly reveal if a picture has been stolen from another online source. Additionally, be aware of red flags such as overly-flattering messages or requests to move the conversation to a private email or messaging app.

McAfee Pro Tip: If you’re considering using one of these for a bit of dating beyond a dating app or simply to stay connected with family and friends, the key advice is to do your homework. Look into their security measures and privacy policies, especially because some have faced security issues recently. For more information, take a look at this article on video conferencing to ensure you can keep hackers and uninvited guests away when you’re chatting.

How to Report a Scam and What to Do If You Fall Victim to One

If you come across a scam or fall victim to one, it’s crucial to report it to the appropriate authorities. This helps law enforcement track down scammers and alert others to the scam. In the U.S., you can report scams to the Federal Trade Commission through their website. If the scam involves a financial transaction, also report it to your bank or credit card company. They may be able to help recover your funds or prevent further losses.

Additionally, take steps to protect yourself after falling victim to a scam. This could involve changing passwords, monitoring your financial accounts for unusual activity, or even freezing your credit. It can also be beneficial to alert your friends and family to the scam, both to protect them and to gain their support and assistance in dealing with the aftermath of the scam.

Dig Deeper: How To Report An Online Scam

Don’t Let Scammers Ruin Your Valentine’s Day

The unfortunate reality is that scammers are ever-present and always looking for new ways to exploit unsuspecting victims. However, by being informed, cautious, and proactive, you can significantly decrease your chances of falling victim to a Valentine’s Day scam. Whether you’re looking for love or shopping for the perfect gift, remember to always prioritize your safety and security.

And if you do encounter a scam, take comfort in knowing that you’re not alone and there are resources available to help. McAfee’s blogs and reports are just some of them. By reporting scams to the authorities, you’re doing your part to help stop scammers in their tracks and protect others from falling victim. Remember, Valentine’s Day is a day for celebrating love, not for worrying about scammers. Stay safe, stay informed, and don’t let a scammer ruin your Valentine’s Day.

Remember to always stay vigilant. Protect your heart and your bank account, and make sure your Valentine’s Day is filled with love and happiness, not regret and frustration. Don’t let scammers break your heart or your bank account – on Valentine’s Day or on any other day.

The post Valentine’s Alert: Don’t Let Scammers Break Your Heart or Your Bank Account appeared first on McAfee Blog.

End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying

By: McAfee

Bullying is a pervasive problem in our society, occurring in schools, workplaces, online, and even within families. It can cause immense physical and emotional pain, leading to decreased self-esteem, increased anxiety, and even suicide in extreme cases. Given its severe potential consequences, it’s critical for every one of us to take steps to end the hate and stomp out bullying.

This article explores 10 ways in which you can stand up against bullying, ranging from individual actions to community-based initiatives. Remember, each effort counts. Together, we can create a world where respect, kindness, and acceptance rule over hate and intimidation.

Understanding Bullying

Before we delve into the various ways to combat bullying, it’s important to first understand what it is. The World Health Organization defines bullying as “repeated exposure to negative actions from one or more individuals.” These actions may involve physical aggression, verbal abuse, intentional exclusion, public humiliation, or harmful manipulation.

Understanding the nature and effects of bullying is the first step in combating it. Recognizing the signs of bullying is essential in identifying victims or perpetrators. Those who are bullied often exhibit signs such as unexplained injuries, poor performance or attendance at school or work, changes in eating habits, or sudden loss of friends. On the other hand, those who bully often exhibit increased aggression, difficulty accepting responsibility for their actions, and a constant need to dominate or control others.

1. Educate Yourself

Education is a powerful tool in the fight against bullying. By educating yourself about different forms of bullying, its impact, and why it happens, you can better understand the reasons behind these harmful behaviors and approaches to address them. Learn about not just physical and verbal bullying, but also cyberbullying, sexual bullying, prejudicial bullying, and relational aggression.

There are plenty of resources available that can help increase your understanding of bullying. Anti-bullying organizations offer detailed information on different types of bullying, how to identify them, and ways to prevent them. Books and documentaries can also provide personal narratives and insights into the effects of bullying, giving you a deeper understanding of its impact on individuals.

2. Awareness-raise

After educating yourself about bullying, the next step is to raise awareness. By spreading the word about bullying and its harmful effects, you can bring this issue to the forefront of more people’s minds. This can be achieved through discussions, presentations, social media campaigns, or organizing events focused on bullying prevention.

Bullying often thrives on silence and ignorance. By bringing the issue to light, you empower victims, bystanders, and even bullies to change their behaviors and attitudes. Remember, change starts with awareness. The more people know about the issue, the more they can do to help combat it.

Dig Deeper: What You Do Now To Protect Your Child From Cyberbullying

3. Showcase Empathy

Empathy is a powerful weapon against bullying. By empathizing with the victim, you are not only providing emotional support but also validating their feelings and experiences. It can help them feel less isolated and more confident to stand up against the bully.

Showing empathy also extends to those who bully. It’s essential to understand that bullies often act out due to their own difficulties. Demonstrating empathy doesn’t mean condoning their actions, but rather understanding their problems and helping them seek the needed support. It also means helping them realize the harm they’re causing and encouraging them to change their patterns of behavior.

Dig Deeper: Digital Strategies to Safeguard Your Child from Upsetting and Violent Content Online

4. Be a Good Role Model

Good behavior is often emulated. Thus, being a good role model can have a significant effect on how others treat people around them. Show respect, kindness, and understanding in your everyday interactions, and stand up against any form of intimidation or humiliation you witness.

If you’re in a position of authority (like a parent, teacher, or manager), your role modeling has an even greater impact. Show how conflicts can be resolved calmly and respectfully, and do not tolerate any form of bullying. This not only creates a positive environment but also teaches others about the importance of respectful interactions.

Dig Deeper: Helping Kids Think Critically About Influencers They Follow Online

5. Encourage Open and Honest Communication

Encouraging open and honest communication can empower victims and bystanders to speak up against bullying. Many times, children and even adults are afraid to express their feelings or fear being dismissed or ridiculed. By promoting a safe and open communication environment, you can help them voice their concerns and experiences without fear of judgment or backlash.

Remember, communication goes both ways. While it’s important to encourage victims and bystanders to speak up, it’s equally crucial for parents, teachers, and friends to listen actively and offer support, guidance, and intervention if necessary.

6. Stand Up and Speak Out

Don’t be a silent bystander. If you witness bullying, stand up and speak out against it. Bystander intervention can make a significant difference, as it can deter the bully and comfort the victim. It can also encourage other bystanders to take action. But always ensure your own safety before intervening. If you fear a violent reaction, you should report the incident to a trusted adult or authority figure instead.

Speaking out against bullying also means challenging discrimination and prejudice whenever you encounter them. Whether it’s racism, sexism, homophobia, or any other form of bias, these attitudes often underpin bullying behavior. By challenging them, you’re helping to create a more inclusive and respectful society.

Dig Deeper: Instagram Takes Huge Step to Filter Bullies, Become a Kinder Social Hub

7. Reach Out to Victims

If you know someone who is a victim of bullying, reach out to them. Let them know that they’re not alone and that you’re there to support them. Encourage them to report the bullying, and offer to accompany them if they’re anxious about doing so. You can also help by listening to their experiences, validating their feelings, and providing advice or resources for coping with bullying.

Remember, bullying can have a deep psychological impact on its victims. They may be struggling with issues like anxiety, depression, or low self-esteem. So, your support can make a real difference to their mental well-being. If you’re worried about a victim’s mental health, urge them to seek help from a mental health professional.

8. Report Bullying Incidents

If you witness or experience bullying, report it to a trusted adult or authority figure. This could be a teacher, school principal, HR manager, or police officer, depending on the context. Many victims of bullying fear retaliation and so, don’t report their experiences. However, reporting can initiate the process of addressing the issue and holding the bully accountable.

When reporting bullying, it’s important to be specific about what happened. Include details like who was involved, when and where it occurred, what was said or done, and whether there were any witnesses. If the bullying is happening online, take screenshots as evidence. Remember, your report can help protect not only you but also other potential victims.

9. Support Anti-Bullying Organizations and Programs

There are many organizations and programs dedicated to preventing bullying and supporting victims. You can support these initiatives in various ways, such as by donating money or time, participating in their events, or spreading the word about their work. By doing so, you can contribute to their efforts to create a bully-free world.

These anti-bullying organizations and programs often provide resources for education, prevention, and intervention, as well as support services for victims. Their work is crucial in raising awareness about bullying, teaching people how to stand up against it, and giving victims the help they need to recover.

Here are some notable anti-bullying organizations and programs:

10. Practice Self-Care

If you’re a victim of bullying, it’s essential to practice self-care. Bullying can take a toll on your mental and physical health, but taking care of yourself can help you cope with its effects. This could involve activities like exercising, meditating, journaling, or spending time with loved ones. It could also involve seeking help from a mental health professional.

Self-care is equally important for those supporting victims. Standing up against bullying is a daunting task, and it can leave you feeling stressed or overwhelmed. So, make sure to take care of your own well-being too. Remember, you can’t pour from an empty cup.

Final Thoughts

Bullying is a grave issue that affects countless individuals worldwide. Its impacts can be devastating, leading to physical, emotional, and psychological harm. However, each one of us can play a crucial role in combating bullying. By educating ourselves, raising awareness, demonstrating empathy, being good role models, encouraging communication, standing up against bullying, reaching out to victims, reporting incidents, supporting anti-bullying initiatives, and practicing self-care, we can contribute to creating a world free from bullying. Remember, every effort counts. Together, with McAfee, we can end the hate and stomp out bullying.

The post End the Hate: 10 Ways to Stand Up and Help Stomp Out Bullying appeared first on McAfee Blog.

AI & Your Family: The Wows and Potential Risks

By: McAfee

When we come across the term Artificial Intelligence (AI), our mind often ventures into the realm of sci-fi movies like I, Robot, Matrix, and Ex Machina. We’ve always perceived AI as a futuristic concept, something that’s happening in a galaxy far, far away. However, AI is not only here in our present but has also been a part of our lives for several years in the form of various technological devices and applications.

In our day-to-day lives, we use AI in many instances without even realizing it. AI has permeated into our homes, our workplaces, and is at our fingertips through our smartphones. From cell phones with built-in smart assistants to home assistants that carry out voice commands, from social networks that determine what content we see to music apps that curate playlists based on our preferences, AI has its footprints everywhere. Therefore, it’s integral to not only embrace the wows of this impressive technology but also understand and discuss the potential risks associated with it.

Dig Deeper: Artificial Imposters—Cybercriminals Turn to AI Voice Cloning for a New Breed of Scam

AI in Daily Life: A Blend of Convenience and Intrusion

AI, a term that might sound intimidating to many, is not so when we understand it. It is essentially technology that can be programmed to achieve certain goals without assistance. In simple words, it’s a computer’s ability to predict, process data, evaluate it, and take necessary action. This smart way of performing tasks is being implemented in education, business, manufacturing, retail, transportation, and almost every other industry and cultural sector you can think of.

AI has been doing a lot of good too. For instance, Instagram, the second most popular social network, is now deploying AI technology to detect and combat cyberbullying in both comments and photos. No doubt, AI is having a significant impact on everyday life and is poised to metamorphose the future landscape. However, alongside its benefits, AI has brought forward a set of new challenges and risks. From self-driving cars malfunctioning to potential jobs lost to AI robots, from fake videos and images to privacy breaches, the concerns are real and need timely discussions and preventive measures.

Navigating the Wows and Risks of AI

AI has made it easier for people to face-swap within images and videos, leading to “deep fake” videos that appear remarkably realistic and often go viral. A desktop application called FakeApp allows users to seamlessly swap faces and share fake videos and images. While this displays the power of AI technology, it also brings to light the responsibility and critical thinking required when consuming and sharing online content.

Dig Deeper: The Future of Technology: AI, Deepfake, & Connected Devices

Yet another concern raised by AI is privacy breaches. The Cambridge Analytica/Facebook scandal of 2018, alleged to have used AI technology unethically to collect Facebook user data, serves as a reminder that our private (and public) information can be exploited for financial or political gain. Thus, it becomes crucial to discuss and take necessary steps like locking down privacy settings on social networks and being mindful of the information shared in the public feed, including reactions and comments on other content.

McAfee Pro Tip: Cybercriminals employ advanced methods to deceive individuals, propagating sensationalized fake news, creating deceptive catfish dating profiles, and orchestrating harmful impersonations. Recognizing sophisticated AI-generated content can pose a challenge, but certain indicators may signal that you’re encountering a dubious image or interacting with a perpetrator operating behind an AI-generated profile. Know the indicators. 

AI and Cybercrime

With the advent of AI, cybercrime has found a new ally. As per McAfee’s Threats Prediction Report, AI technology might enable hackers to bypass security measures on networks undetected. This can lead to data breaches, malware attacks, ransomware, and other criminal activities. Moreover, AI-generated phishing emails are scamming people into unknowingly handing over sensitive data.

Dig Deeper: How to Keep Your Data Safe From the Latest Phishing Scam

Bogus emails are becoming highly personalized and can trick intelligent users into clicking malicious links. Given the sophistication of these AI-related scams, it is vital to constantly remind ourselves and our families to be cautious with every click, even those from known sources. The need to be alert and informed cannot be overstressed, especially in times when AI and cybercrime often seem to be two sides of the same coin.

IoT Security Concerns in an AI-Powered World

As homes evolve to be smarter and synced with AI-powered Internet of Things (IoT) products, potential threats have proliferated. These threats are not limited to computers and smartphones but extend to AI-enabled devices such as voice-activated assistants. According to McAfee’s Threat Prediction Report, these IoT devices are particularly susceptible as points of entry for cybercriminals. Other devices at risk, as highlighted by security experts, include routers, and tablets.

This means we need to secure all our connected devices and home internet at its source – the network. Routers provided by your ISP (Internet Security Provider) are often less secure, so consider purchasing your own. As a primary step, ensure that all your devices are updated regularly. More importantly, change the default password on these devices and secure your primary network along with your guest network with strong passwords.

How to Discuss AI with Your Family

Having an open dialogue about AI and its implications is key to navigating through the intricacies of this technology. Parents need to have open discussions with kids about the positives and negatives of AI technology. When discussing fake videos and images, emphasize the importance of critical thinking before sharing any content online. Possibly, even introduce them to the desktop application FakeApp, which allows users to swap faces within images and videos seamlessly, leading to the production of deep fake photos and videos. These can appear remarkably realistic and often go viral.

Privacy is another critical area for discussion. After the Cambridge Analytica/Facebook scandal of 2018, the conversation about privacy breaches has become more significant. These incidents remind us how our private (and public) information can be misused for financial or political gain. Locking down privacy settings, being mindful of the information shared, and understanding the implications of reactions and comments are all topics worth discussing. 

Being Proactive Against AI-Enabled Cybercrime

Awareness and knowledge are the best tools against AI-enabled cybercrime. Making families understand that bogus emails can now be highly personalized and can trick even the most tech-savvy users into clicking malicious links is essential. AI can generate phishing emails, scamming people into handing over sensitive data. In this context, constant reminders to be cautious with every click, even those from known sources, are necessary.

Dig Deeper: Malicious Websites – The Web is a Dangerous Place

The advent of AI has also likely allowed hackers to bypass security measures on networks undetected, leading to data breaches, malware attacks, and ransomware. Therefore, being alert and informed is more than just a precaution – it is a vital safety measure in the digital age.

Final Thoughts

Artificial Intelligence has indeed woven itself into our everyday lives, making things more convenient, efficient, and connected. However, with these advancements come potential risks and challenges. From privacy breaches, and fake content, to AI-enabled cybercrime, the concerns are real and need our full attention. By understanding AI better, having open discussions, and taking appropriate security measures, we can leverage this technology’s immense potential without falling prey to its risks. In our AI-driven world, being informed, aware, and proactive is the key to staying safe and secure.

To safeguard and fortify your online identity, we strongly recommend that you delve into the extensive array of protective features offered by McAfee+. This comprehensive cybersecurity solution is designed to provide you with a robust defense against a wide spectrum of digital threats, ranging from malware and phishing attacks to data breaches and identity theft.

The post AI & Your Family: The Wows and Potential Risks appeared first on McAfee Blog.

5 Ways to Safeguard Your Child’s Instagram Bio

By: McAfee

Keeping your child safe online is a growing concern for many parents. Instagram, a popular social media platform among tweens and teens, is no exception. Despite privacy settings that can effectively limit who sees your child’s posts, their Instagram bio nonetheless remains public by default. This leaves an opening through which those with ill intentions can glean personal information about your child. However, there are ways you can help safeguard your child’s Instagram bio and enhance their online safety. Here are 5 tips to consider:

1. Approve Your Child’s Profile Picture

The first step towards protecting your child’s online identity on Instagram starts with their profile picture. This image is the face your child presents to the world, and unfortunately, it can sometimes attract unwanted attention. As such, it’s crucial that you approve your child’s profile picture. Make sure that the photo does not in any way make your child look older than their age. For instance, if your child is 13, their photos should reflect their age and not make them look 20.

Moreover, it’s important to ensure that their chosen profile picture is not suggestive or revealing. It’s worth noting that what may seem normal to your child might come off as suggestive to others. As a parent, you need to hold your ground and make the final decision on what constitutes an appropriate profile picture.

Dig Deeper: McAfee Survey: Parents Share Pictures of Their Kids Online, Despite Understanding the Risks Involved

2. Edit Bio or Omit Entirely

Another critical step to safeguarding your child’s Instagram bio is to carefully oversee its contents. While it’s tempting for your child to share personal information such as their age, hometown, school, favorite sports team, etc., these can potentially serve as breadcrumbs for predators. By piecing together these nuggets of data, it’s easy for individuals with ill intentions to form a complete picture of your child’s life. Therefore, it’s best to either completely omit these details or edit the bio in a way that it does not divulge any personal information.

Teach your child about digital privacy and the dangers of sharing too much online. Explain that while it may seem like sharing a tidbit about their favorite band or TV show is harmless when combined with other pieces of information, it can end up providing a clear window into their personal life.

Dig Deeper: Oversharing: Are You Ignoring Your Child’s Privacy When You Post Online?

3. Do not Allow Links in Bio

Often, Instagram users will add a link to their bio that directs to another social media platform, an email address, or some other online platform. While this might seem like a simple way of connecting different aspects of their online presence, it can, unfortunately, also provide potential predators with additional ways to access your child’s personal information.

Therefore, do not allow your child to include any links in their Instagram bio. By limiting the information available about your child online, you make it harder for anyone to trace or track them, thereby enhancing their online safety.

4. Turn off Geo-Tagging/Location-based Services for Instagram

The Geo-Tagging feature on Instagram allows users to add their exact location to their posts. While this might seem like a fun and harmless feature to your child, it can unfortunately put them at risk. Predators can use this feature to track your child’s routines, activities, and even their real-world location. This is why it’s crucial to turn off Geo-Tagging/Location-based services on your child’s Instagram account.

Dig Deeper: What Are the Risks of Geo-Location?

Teach your child that it’s not safe to share their location online. Make sure they understand that leaving the location feature enabled can potentially allow strangers to figure out where they live, go to school, or hang out. You can turn off this feature by going to the settings in the Instagram app and turning off the location services. Remind your child not to manually add their location to posts. If they need to share their location, they should do it privately and only with trusted friends or family.

5. Let Them See You Monitoring

One of the most effective ways to ensure your child’s online safety is to stay involved and keep a close eye on their online activity. While this might seem like an invasion of your child’s privacy, it’s crucial to remember that as a parent, your number one priority is keeping your child safe. Let them know that you’ll be checking their Instagram account regularly, and make sure they’re aware of the potential risks they face online.

Studies show that about 50% of teens would change their online behavior knowing their parents are watching. Digital safeguards are an essential part of maintaining online safety. Make it a regular habit to browse your child’s Instagram and monitor their posts, their followers, and the people they follow. This can help you to quickly pick up on anything suspicious and take necessary action.

McAfee Pro Tip: Although parental controls can play a significant role in nurturing positive online behaviors, it’s vital for these tools to work in tandem with a devoted and actively involved parent who is enthusiastic about guiding their children through the digital world. Explore how parental controls can contribute to the development of healthy habits.

Final Thoughts

Ensuring your child’s online safety requires a combination of education, open discussion, and vigilant monitoring. Profile pictures should be age-appropriate, and their bio free from personal details or links. Location services should be switched off for Instagram to avoid sharing real-world locations. Finally, a regular check of their Instagram account helps to keep a tab on their online activity. Remember, safeguarding your child’s Instagram bio is not about controlling them but rather, it’s about protecting them from potential online threats.

By taking these steps to safeguard your child’s Instagram bio, you not only protect them but also teach them the importance of online safety and the steps they can take themselves. In the age of growing digital threats, it is crucial to stay vigilant and proactive in protecting our children online.

The post 5 Ways to Safeguard Your Child’s Instagram Bio appeared first on McAfee Blog.

What is Roblox and is It Safe for Kids?

Roblox, an online platform that hosts millions of user-created games, has become increasingly popular among young people. Its reported 150 million users can not only play games but also design their own, share them with the online community, and even earn money if their creation becomes popular. This has made Roblox an exciting and engaging platform for kids and teens, many of whom have the site downloaded on their phone, tablet, PC, or Xbox.

What sets Roblox apart from traditional gaming platforms is its social networking aspect. Users can chat, meet up, and even host private events like birthday parties. During the quarantine period, Roblox became a vital tool for social interaction, providing a virtual space for users to host private birthday parties and other social gatherings.

Dig Deeper: Study: Fortnite Game Becoming the Preferred Social Network for Kids

Is Roblox Safe for Kids: Understanding the Risks

Like many other online platforms, Roblox poses certain safety concerns that parents need to be aware of. While Roblox itself is not inherently unsafe, its open chat feature and the potential for contact with strangers can pose risks. It’s therefore crucial for parents to take time to optimize parental controls, monitor their child’s usage, and engage in open dialogue about online safety.

One major concern is the potential for contact with strangers. Although the “Chat & Party” feature allows easy communication between users, it also opens up the possibility for unwanted contact. Adjusting settings to restrict strangers from friending an account is one step towards ensuring a safer experience for your child on Roblox.

Potential Safety Issues on Roblox

1. Online predators

Online predators can be a real concern when children use platforms like Roblox, which allow for social interactions and communication with other users. These individuals often use deception and manipulation to exploit the anonymity provided by online platforms. They may create fake profiles and pretend to be fellow players or peers to gain a child’s trust. Once trust is established, they might engage in inappropriate conversations, request personal information, or attempt to groom children for more harmful activities. 

2. Cyberbullying

Alongside the potential risk of contact with strangers, several other safety concerns exist on Roblox. One significant concern is cyberbullying. As users can join any game at any time, the platform could be a breeding ground for online bullying. Parents should discuss with their children how to handle inappropriate chats and comments, and they should be aware of how to report any rule violations on the forum.

3. Scams and phishing attempts

Online scams and phishing attempts are also prevalent risks that can compromise a child’s safety and digital well-being. Children should be educated about the common tactics employed by scammers and phishers, which can include fraudulent free Robux offers, fake giveaways, and deceptive messages asking for personal information or account credentials. 

4. Inappropriate content

Roblox’s user-generated content may contain inappropriate content, ranging from harmless to violent and sexual themes or characters. Hence, it becomes crucial for parents to monitor their child’s activities and block any mature games through settings.

5. In-app currency

Another security concern on Roblox is its in-app currency, Robux. Robux can be used by children to purchase game accessories such as pets, clothes, and weapons. However, this can lead to significant charges if not limited or monitored properly. Parents need to set limits for purchases or adjust the settings on Roblox to prohibit in-app purchases.

Dig Deeper: How To Get Your Head Around Your Kids’ Online Gaming Life

Roblox’s Security Measures

Fortunately, Roblox offers several ways for parents to monitor their child’s activity. By accessing your child’s login information, you can view their activity history, including their chat, games played, friends list, and items purchased. Furthermore, if your child is under 13, make sure their birthdate is correct in the system, as Roblox automatically filters chat and game content for younger users. 

The best way to ensure your child’s safety on Roblox, or on any online platform, is through open conversation, constant monitoring, and setting boundaries. Encourage your child to share their online experiences with you, and don’t forget to join in the fun by playing their favorite Roblox games together.

Ensuring Safety and Security on Roblox

Like every other online platform, Roblox comes with certain safety and security concerns. Roblox is safe for children, provided that parents take the necessary precautions, optimize parental controls, and closely monitor their child’s activities on the forum. Especially in a gaming community that attracts children, it becomes essential to keep an eye on the conversations happening across the globe.

Various potential safety concerns have been reported on Roblox. One of the significant issues is the connection with strangers. The forum’s chat feature can be accessed easily and is available on almost every page of the site. This allows possible predators to target their victims using the chat feature. In addition, the “Chat & Party” window can be accessed by any user, which opens the possibility of being targeted by predators.

Roblox offers additional security measures to ensure the safety of the children. Parents can view their child’s activity history, including private and group chats, friends list, games played, games created, and items purchased, by having their login information. Furthermore, setting the correct birth date is crucial as Roblox itself filters chats and game content for users under 13. Roblox has a separate login for parents of younger children, allowing them to view all activities.

Open and honest conversations about personal choices and potential risks online are the best ways to keep the child safe on any online platform, including Roblox. Encouraging children to share their online experiences and playing their favorite games alongside them ensures their safety and also makes the experience enjoyable for both.

McAfee Pro Tip: While parental controls can certainly assist in fostering positive online habits, it is crucial for these tools to be coupled with a dedicated and engaged parent who is eager to guide their children through the digital landscape. Know how parental controls can create good habits.

Final Thoughts

Roblox is a fantastic platform for children to play, create, and share games while also socializing with their friends. However, it poses potential safety risks like connection with strangers, cyberbullying, inappropriate content, and unmonitored in-app purchases. Therefore, parents must take the necessary precautions like optimizing parental controls, closely monitoring their child’s activities, blocking mature games, and discussing with their children the potential risks and ways to deal with them.

The best way is to have open and honest conversations with the children about their online experiences and to enjoy the games alongside them. The combination of parental controls and open communication fosters a balanced and secure online experience, allowing your children to make the most of their time on Roblox while staying protected.

The post What is Roblox and is It Safe for Kids? appeared first on McAfee Blog.

Why Taking Your Teen’s Phone Away Doesn’t Work Anymore

By: McAfee

If you are the parent of a tween or teen, you know the challenge of setting and following through with consequences. You’ve worked hard to establish ground rules, but human nature and the sometimes rocky road to maturity guarantees your child will push, step, and even leap outside the agreed-upon lines. If you are like many parents, your first instinct is to restrict the thing they love the most, which is communication with their peers and the dependence they have on their phones.

The Loss of Family Dynamics

There are a few problems with taking away your teen’s phone, the first of which, you know well: Taking their phone is hard on you as well because you’ve become just as dependent on instant communication via the phone as they have. Too, if your teen drives a vehicle or is away from home for the day, the phone adds a layer of safety to the family dynamic.

The Alternative Communication Grid

The second hurdle — which you may or may not realize — is that with or without their phones, most teens have created an alternative communication grid that ensures there’s barely a hiccup if anyone gets a phone taken away. To clarify: This post is not an ‘us against them’ post, or an ‘outsmart them’ strategy, it’s simply a dose of reality that may influence and inform everyday parenting decisions.

Dig Deeper: Should You Use Near-Field Communications?

A few ways kids can maintain their social life without their phones include:

Laptop or PC

Because schools now require kids to be online to get assignments via internal assignment platforms and email, your child will likely ask you to log onto his or her laptop or family PC to do homework. In doing that, they will also quietly log on to their favorite apps SnapChat, Twitter, or Instagram account, and talk to friends non-stop. Solution: Monitor homework time.

McAfee Pro Tip: Our children who have grown up in the digital age are deeply immersed in smartphone culture. Even if you desire to disconnect and return to a simpler way of life, it would be quite challenging to achieve this while ensuring that your child remains academically competitive with their peers. Get smarter about phones and homework time with our tips.

Ipad and tablets

Kids will also be asked to read or do an assignment via the iPad or tablet; you can’t cut them off from learning, right? Wrong. They can again download their favorite social apps as well as chat apps they hope you know nothing about, such as Kik Messenger. Solution: Monitor homework and TV time.

Borrowed phones and iPods

I hate to make it sound like your kids are part of the teen tech mafia, but they keep their old phones for a reason. While that old iPhone and Android may be without phone service, the social and texting apps on them can still be used—and you can bet they are. Solution: 1) If you are restricting your smartphone, you need to take away the iPod (music) as well 2) Be upfront. Ask your kids if they’ve borrowed a phone 3) Check backpacks for rogue phones. 

Dig Deeper: The Privacy Problems with Mobile Messaging Apps

Game Systems and TV

Gaming systems have chat and messaging that kids use all the time. In addition, social media and television are now overlapping, so all of the apps you get on your phone can be easily accessed via most TVs. Solution: 1) Go to the network settings on your TV and password protect it 2) Monitor media 3) Take away all media in addition to the phone.

Dig Deeper: How To Get Your Head Around Your Kids’ Online Gaming Life

Private Messaging

Everything seems quiet on the posting front. You’ve checked, and your child is not posting on Facebook, Instagram, or Twitter, and you have their phone, so Snapchat is out, right? Not so much. If your kids are logging on to their apps via any of the devices listed above, chances are they know better than to post in the public stream. What they will be doing is using the private messaging of Twitter, Instagram, and Snapchat (accessed via other devices) as an alternative way to text and communicate without feeling the loss of their personal smartphone.

Alternative Discipline Approaches

So what’s the alternative to taking your child’s tech as a consequence? If you know the loopholes listed above, tech restriction is still an option (even though your child will be clearly annoyed with your roadblocks). If your child is over 16 and loves the freedom of driving, that restriction is always an excellent option.

Experts agree: Strong ground rules and equally strong communication provide the best discipline. If family rules are vague or brought up only when your child messes up (i.e., grades, responsibilities, or behavior), he or she will have a tough time staying on track. Look for empowering opportunities for your child to take responsibility for his or her mistakes.

Empowering Responsibility

In truth, the only way to ensure appropriate behavior both online and offline is to teach your kids about personal responsibility. This is the key aspect of parenting that sets your child up for success in the real world. The ability to manage themselves, especially when it comes to online activities, is an invaluable life skill that they will bring with them into adulthood. The best way to teach responsibility is to model it. Show them through your actions and decisions that you are worthy of their respect, and they will follow suit.

Teens need to be taught how to behave responsibly online, how to protect their privacy, avoid scams, and how to deal with cyberbullying. They need to understand the consequences of inappropriate behavior online. One good way to teach them about cyber ethics is to have regular discussions about these topics. Create an open environment where they feel comfortable to share their experiences and concerns. Then, guide them on how to respond appropriately to these situations.

The Importance of Communication

Communication is the cornerstone of a healthy relationship between parent and child. As a parent, it’s important to create an atmosphere of trust, openness, and respect. Regular discussions about proper digital etiquette and responsible internet behavior are key. Make time to discuss what your teen is doing online, who they are communicating with, and what type of content they are sharing. Be open about your expectations and why they are in place. If they understand why the rules exist, they will be more likely to follow them.

Consistent communication also enables you to keep up with the rapidly changing digital landscape teens navigate daily. By maintaining an open dialogue, you will be more attuned to the latest apps, games, and social media platforms your teen is using. This way, you can stay informed about developments that might affect your teens’ online safety.

Dig Deeper: 10 Easy Ways to Build Up Your Family’s Online Security

The Power of Trust

Trust is a two-way street. While it’s important that your child trusts you as a parent, it’s equally important for you to demonstrate trust in them. This means giving them some level of freedom and privacy online, while also making it clear that you expect them to act responsibly. Trusting your teens to make good decisions online shows them respect which encourages them to validate your trust.

However, trust is not about blind faith. It’s about setting boundaries and expectations and then allowing your teen to prove they can stay within those boundaries. When trust is breached, it’s important to discuss why it happened, the consequences, and how it can be rebuilt. Trust building is a process, and it takes time and consistency.

Final Thoughts

Managing your teen’s digital life can be challenging, but with open communication, respect, trust and a strong focus on personal responsibility, you can navigate this digital world together. Ultimately, the goal isn’t to control your teen’s every online interaction. Rather, it’s to equip them with the knowledge, skills, and values they need to navigate the increasingly complex digital landscape safely and responsibly. Removing a teen’s phone may seem like an easy solution, but it’s far more effective to guide them toward responsible digital citizenship.

Take the step to safeguard your teen’s digital journey today, and empower them to thrive in the digital age, all while providing you with the control and confidence you need as a parent. Explore McAfee’s parental controls now and create a secure and nurturing digital environment for your teens.

The post Why Taking Your Teen’s Phone Away Doesn’t Work Anymore appeared first on McAfee Blog.

Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone

By: McAfee

Given the climate surrounding COVID-19, many of us have had to substitute in-person social interactions with virtual communication. For parents, this includes organizing virtual playdates, hangouts, and video chats for their kids. While this provides an excellent solution for children to continue interacting with their peers, it has also opened up a new avenue for potential risks and dangers. It is imperative to ensure these virtual platforms are safe for all involved. In this article, we will provide some essential strategies for maintaining a secure and enjoyable online social environment for everyone.

The Rise of Tech and Cyber Crimes

The advent of technology has significantly transformed the way we communicate and interact with each other. However, as with any great invention, it also comes with potential risks and dangers, especially for kids who may not fully comprehend the implications of their online activities. With cyberbullying, online predators, and inappropriate content being just a few of the digital risks, it is crucial to establish robust safety measures when kids engage in online social activities such as virtual playdates, hangouts, and video chats.

In this article, we will explore the different ways parents and caregivers can keep these activities secure and fun. By understanding the risks involved, staying informed on the latest developments in online safety, and taking actionable steps, everyone can navigate the digital world safely and confidently.

How to Keep Everyone Safe from the Dangers of Virtual Communication

Navigating the potential pitfalls of online interaction requires proactive measures and informed strategies. Let’s take a look at these tips on how to safeguard everyone from the inherent dangers of virtual communication, promoting a secure and positive digital experience for all.

Awareness and Understanding of Potential Risks

The first step in ensuring a safe online environment for children is understanding the potential risks and how they can be mitigated. Internet safety is not just about blocking and filtering inappropriate content; it’s also about educating ourselves and our children on how to behave responsibly online and understanding the potential repercussions of our digital footprint.

Online activities, especially those involving video chats, can expose children to various risks, including cyberbullying, identity theft, and exposure to inappropriate content. These risks can have devastating consequences on a child’s mental health, self-esteem, and overall well-being. As such, it is vital for parents and caregivers to have regular conversations about these potential dangers with their children. It’s also crucial to ensure that children feel comfortable expressing any concerns or reporting any uncomfortable situations they encounter online.

Dig Deeper: Messenger Rooms: New Video Chat Option is Fun But Has Risks

Choosing the Right Platforms and Tools

The market is flooded with countless communication platforms, each with its features, safety measures, and potential loopholes. As a parent, choosing the right tool for your child’s online activities can be quite overwhelming. Not all platforms are created equal, and while some prioritize user safety and provide robust parental controls, others may not provide the same level of security.

When choosing a platform for your child’s virtual playdates or hangouts, consider aspects like age restrictions, privacy settings, and whether the platform allows parental controls. Additionally, evaluate the platform’s reputation regarding safety – a quick internet search can provide insights into any security issues or breaches the platform may have had in the past. Remember, the goal is to create a safe and enjoyable online experience for children. 

Implementing Privacy Settings and Parental Controls

One of the essential ways to ensure online safety for kids is by properly setting up privacy settings and parental controls on the communication tools they use. These settings can limit what information is shared and with whom, restrict access to certain content, and even set time limits for usage. Parental controls are a fantastic way of managing and monitoring your child’s online activities without being overly intrusive.

However, it’s important to note that these controls and settings are not foolproof. They should be used in conjunction with open communication and education about online safety. It’s essential to explain to children why these measures are in place, rather than just imposing them. They are more likely to follow these guidelines if they understand their purpose. 

McAfee Pro Tip: Parental controls are effective in monitoring children, but nothing beats proactive digital parenting. Managing digital parenting doesn’t need to be daunting, especially when you approach it step by step. Know how parental controls and digital parenting can help create good habits.

Building Guidelines for Safe Online Communication

Establishing clear guidelines for online communications is another critical aspect of ensuring a secure online environment for kids. These guidelines should be age-appropriate and cover aspects like sharing personal information, accepting friend requests, and how to behave respectfully online.

It’s also important to educate kids on the permanence of their online activities. Once something is shared online, it can be difficult, if not impossible, to completely remove it. They should understand the potential impact of their online behavior on their future, such as college admissions or job opportunities. Encouraging safe and responsible online behavior can go a long way in mitigating many of the potential risks associated with online communication.

Dig Deeper: Teens’ Online Behavior Can Get Them in Trouble

Following Virtual Playdates Etiquettes

In addition to safety measures, it’s also important to establish some etiquette for virtual playdates to ensure they are enjoyable and respectful for everyone involved. These guidelines should include respecting others’ time, muting when not speaking to avoid background noise, and understanding when to use the chat feature versus when to speak up.

It’s also important to discuss how to handle disagreements or misunderstandings that may arise during these virtual gatherings. Encourage kids to express themselves respectfully and listen to others’ perspectives. Remind them that it’s okay to disagree with someone but that it should be done in a respectful and kind manner.

Monitoring Screen Time

Depending on the age of your child, you may need to monitor the amount of time they spend on virtual activities. It’s easy for kids to lose track of time when they are engrossed in a fun virtual playdate or hangout. Setting and enforcing time limits can help prevent screen addiction and ensure your child has a balanced life with ample time for physical activities, schoolwork, and offline social interactions.

To make this process easier, you can use the built-in screen time management features available on most devices or utilize third-party apps that provide more detailed monitoring and control. Talk to your child about the importance of balancing online and offline activities. Make sure they understand that these limits are set out of concern for their well-being, not as a form of punishment.

Teaching Kids to Treat Others Respectfully

Just like offline interactions, teaching kids to be respectful in their digital communications is crucial. They should understand that the same rules of kindness and respect apply, whether they’re interacting with others face-to-face or through a screen. Cyberbullying is a significant concern for many parents, and teaching children to treat others respectfully can help mitigate this risk.

Encourage your child to empathize with others by imagining how they would feel if the roles were reversed. Foster an online culture of acceptance, understanding, and respect by setting a positive example through your own online interactions. Remember, kids often emulate the behavior they see around them.

Dig Deeper: 5 Digital Family Values to Embrace to Make the Internet a Better Place

Promoting Open Communication

Open communication is the key to any successful relationship, and this holds true for your relationship with your child. Encourage them to talk to you about their online experiences, both good and bad. This can help you identify any potential problems before they escalate and provide guidance on how to handle various situations.

Ensure your child feels comfortable coming to you with any issues or concerns they may have. Make it clear that you’re there to help, not to chastise them for making mistakes. Remember, the online world can be a confusing and intimidating place for kids, and they need to know they have a trusted adult to turn to when they need help navigating it.

Staying Up-to-Date with the Latest Online Safety Tips

The online world is constantly evolving, so staying up-to-date with the latest safety tips is crucial. Regularly check reliable online safety resources and learn about the latest threats, trends, and best practices. This can help you prepare for and mitigate potential risks before they impact your child.

Consider joining online communities where parents share tips and advice about online safety. These platforms can be a great source of information and support as you navigate the digital world with your child. Remember, knowledge is power, and the more informed you are, the better you can protect your child.

Final Thoughts

In conclusion, ensuring online safety during virtual playdates, hangouts, and video chats involves a combination of selecting the right communication platforms, using privacy settings and parental controls, establishing guidelines for online communications, and promoting open, respectful interactions. As parents and caregivers, it’s essential to remain vigilant and proactive in teaching our children about online safety.

However, it’s equally important to remember that our ultimate goal isn’t to eliminate all online risks but to create a balance where our kids can enjoy the benefits of the virtual world while being mindful of its potential pitfalls. By employing the strategies discussed in this article, you can provide a safe and enjoyable online environment for your child, fostering their growth and development while ensuring their safety.

The post Keeping Virtual Play Dates, Hangouts, and Video Chats Safe for Everyone appeared first on McAfee Blog.

Understanding and Protecting Yourself from SMiShing

By: McAfee

SMiShing, a term from ‘SMS phishing’, is a growing cyber threat that is as dangerous, if not more, than its sibling, “Phishing.” While the terms may seem comical, the repercussions of falling victim to these scams are no laughing matter. In an increasingly digital age, cybercriminals are taking advantage of our reliance on technology to steal personal information and leverage it for malicious purposes. This article provides an in-depth explanation of SMiShing, how it works, and, most importantly, how you can protect yourself from it.

In essence, SMiShing is a deceptive practice where scammers send fraudulent text messages masquerading as reputable institutions, aiming to dupe recipients into clicking on a link, calling a number, or providing sensitive personal information. The risk with SMiShing is that mobile users tend to trust their SMS messages more than their emails, making it an effective scamming tool. The best line of defense is awareness and understanding of what SMiShing is, how it operates, and the protective measures you can take against it.

Unpacking SMiShing

The term ‘SMiShing’ is a concatenation of ‘SMS’ (short message service) and ‘Phishing’. The latter is a cybercriminal strategy, where scammers send emails that impersonate legitimate organizations with the aim of luring victims into clicking links and/or entering their login data or credentials. The word ‘Phishing’ is a play on the word ‘fishing’, depicting the tactic of baiting victims and fishing for their personal information.

SMiShing is a variant of phishing, a social engineering tactic where scammers resort to sending text messages instead of emails. These messages are engineered to appear as though they’ve been sent by legitimate, trusted organizations, leading the recipient to either click on a link or respond with their personal details. The transition from emails to text messages signals a shift in cybercrime trends, as scammers exploit the trust users place in their text messages, as opposed to their scrutiny of emails.

Dig Deeper: What Is Smishing and Vishing, and How Do You Protect Yourself?

How SMiShing Works

Cybercriminals use sophisticated technology that allows them to generate cell phone numbers based on area codes. These phone numbers include a cell carrier’s provided extension, plus the last four random numbers. Once these phone numbers are generated, the scammers utilize mass text messaging services to disseminate their SMiShing bait, much like casting a large fishing net hoping to snare unsuspecting victims. A simple online search for “mass SMS software” will yield numerous free and low-cost programs that facilitate mass texting, revealing the ease with which these scams can be carried out.

Dig Deeper: What You Need to Know About the FedEx SMiShing Scam

SMiShing has proven to be effective mainly because most people have been conditioned to trust text messages more than emails. Moreover, unlike emails accessed on a PC, text messages do not allow for easy link previewing, making it risky to click on links embedded within the texts. The links either lead to malicious websites intended to steal data or prompt the download of keyloggers, tools that record every keystroke on your device, facilitating the theft of personal information. Alternatively, some SMiShing texts may trick recipients into calling specific numbers which, when dialed, incur hefty charges on the victim’s phone bill.

Recognizing the Threat

The first step towards protecting yourself against SMiShing is recognizing the threat. Cybercriminals often capitalize on the victim’s lack of understanding about how these scams work. They prey on the recipient’s trust in their text messages and their curiosity to view links sent via SMS. By understanding how SMiShing works, you are able to spot potential scams and protect yourself against them.

Typically, SMiShing messages are crafted to impersonate familiar, reputable organizations such as banks, utility companies, or even government institutions. They often induce a sense of urgency, pushing the recipient to act swiftly, leaving little to no time for scrutiny. The messages may alert you of suspicious activity on your account, a pending bill, or offer incredible deals that seem too good to be true. Any SMS message that prompts you to click on a link, call a certain number, or provide personal information should be treated with suspicion.

More often than not, recognizing an SMiShing scam relies on your observational skills and your ability to spot the tell-tale signs. One common red flag is poor grammar and spelling. Although this is not always the case, several SMiShing scams tend to have mistakes that professional communications from reputable institutions would not.

Another sign is that the message is unsolicited. If you didn’t initiate contact or expect a message from the supposed sender, you should treat it with suspicion. Additionally, reputable organizations usually employ a secure method of communication when dealing with sensitive information; they would rarely, if ever, ask for personal data via SMS.

Pay attention to the phone number. A text from a legitimate institution usually comes from a short code number, not a regular ten-digit phone number. Also, check whether the message uses a generic greeting instead of your name. Finally, use your common sense. If an offer seems too good to be true, it probably is. Also, remember that verifying the legitimacy of the text message with the supposed sender can never harm.

Many of these signs can be subtle and easy to overlook. However, staying vigilant and taking the time to scrutinize unusual text messages can save you from falling victim to SMiShing.

Dig Deeper: How to Squash the Android/TimpDoor SMiShing Scam

Protecting Barriers Against Psychological Manipulation

Psychological Manipulation is a critical aspect of this cyber threat, involving the art of exploiting human psychology and trust to trick individuals into revealing sensitive information or engaging in harmful actions. Even individuals with the intelligence to steer clear of scams might become vulnerable if the psychological manipulation is exceptionally compelling.

Smishing attackers employ a range of social engineering techniques that tap into human emotions, including fear, curiosity, and urgency. They often impersonate trusted entities or use personalized information to lower recipients’ guard and establish trust. The use of emotional manipulation and emotional triggers, such as excitement or outrage, further intensifies the impact of these attacks. Recognizing and understanding these psychological tactics is paramount for individuals and organizations in fortifying their defenses against smishing, empowering them to identify and resist such manipulative attempts effectively.

Dig Deeper: Social Engineering—The Scammer’s Secret Weapon

Protecting Yourself from SMiShing

Arming yourself with knowledge about SMiShing and its modus operandi is the initial line of defense. Once you comprehend the nature of this scam, you are better equipped to identify it. However, understanding alone is not enough. There are several practical measures that you can adopt to safeguard your personal information from SMiShing scams.

At the top of this list is exercising caution with text messages, especially those from unknown sources. Resist the impulse to click on links embedded within these texts. These links often lead to malicious websites engineered to steal your data or trigger the download of harmful software like keyloggers. Do not respond to text messages that solicit personal information. Even if the message seems to originate from a trusted entity, it is always better to verify through other means before responding.

Furthermore, be wary of text messages that create a sense of urgency or evoke fear. SMiShers often manipulate emotions to spur immediate action, bypassing logical scrutiny. For instance, you may receive a message supposedly from your bank alerting you about a security breach or unauthorized transaction. Instead of panicking and clicking on the provided link, take a moment to contact your bank through their officially listed number for clarification.

There is also the option of using comprehensive mobile security applications. These apps provide an array of features such as text message filtering, antivirus, web protection, and anti-theft measures. Applications like McAfee Mobile Security can significantly enhance your defense against SMiShing attacks and other cyber threats.

McAfee Pro Tip: Try McAfee Mobile Security’s scam protection. It scans the URLs within your text messages to enhance your online safety. If a suspicious or scam link is detected, it will send an alert on Android devices or automatically filter out the problematic text. Additionally, it actively blocks potentially harmful links in emails, text messages, and social media if you happen to click on them by mistake, adding an extra layer of protection to your online experience.

Final Thoughts

SMiShing is a serious cyber threat that aims to exploit the trust that individuals place in their text messages. By impersonating reputable organizations and creating a sense of urgency, scammers try to trick recipients into providing personal information or clicking on malicious links. Protecting oneself from SMiShing involves understanding what it is, recognizing the threat, and adopting effective protective measures. These include being cautious of unsolicited text messages, refraining from clicking on links within these texts, and using comprehensive mobile security applications. Additionally, being aware of the red flags, such as poor grammar, unsolicited messages, and requests for sensitive information via SMS, can help in detecting potential scams. In an increasingly digital age, staying vigilant and proactive is the best way to protect your personal information from cybercriminals.

The post Understanding and Protecting Yourself from SMiShing appeared first on McAfee Blog.

Keeping Kids Safe from Online Threats

As a parent and a professional in the cybersecurity industry, I am incredibly aware of the importance of online safety, particularly as it relates to children. Despite vast improvements in technology and cybersecurity, the reality is that kids lack the resources and knowledge to protect themselves against the multitude of threats that exist online. The majority of domestic tech devices, such as personal computers and smartphones, only have basic consumer antivirus software, if any at all. This puts children at significant risk of falling victim to cyber threats like malware and phishing attacks.

However, the risks children face online aren’t limited to just these digital threats. The internet, in all its vastness, also exposes our children to many other potential dangers, from online predators in gaming environments to unrestricted internet usage in their downtime. This guide is geared towards educating and providing effective strategies for parents and other concerned individuals to ensure the online safety of children.

Dig Deeper: Reports of Online Predators on the Rise. How to Keep Your Kids Safe.

The Current State of Kids’ Online Safety

Recent statistics from Pew Research Center found that 46% of U.S. teenagers aged 13 to 17 have encountered at least one of six different cyberbullying behaviors. Among these behaviors, name-calling is the most prevalent, with 32% of teens reporting that they have been subjected to offensive name-calling online or on their phones. Additionally, 22% have had false rumors spread about them online, and 17% have received unsolicited explicit images.

Furthermore, 15% of teenagers have dealt with persistent inquiries from someone other than a parent about their whereabouts, activities, and companions. Additionally, 10% have faced physical threats, and 7% have had explicit images of themselves shared without their consent. In total, 28% of teenagers have experienced multiple forms of cyberbullying.

Dig Deeper: More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report

The high level of exposure and the increasing number of online threats led to the development of the McAfee’s Digital Safety Program, previously known as McAfee’s Online Safety for Kids. This program provides essential resources that can be used by cybersecurity experts to educate school children about the potential dangers that lurk online and how best to protect themselves. Over the past five years, the highly interactive program has been implemented in numerous school systems across the United States, shedding light on the depth and extent of the threats that children encounter daily. 

Dig Deeper: McAfee Relaunches Award-Winning Online Safety Program for Kids

The Digital Safety Program

The McAfee Digital Safety Program is a collaborative effort that brings together the expertise of security professionals, the experiences of children, and the efforts of community partners. It involves not just theoretical learning, but also anecdotal sharing of online experiences, which greatly enhances the effectiveness of the program. Participants of the program, both children and adults alike, often leave with a profound sense of the multitude of threats that children encounter online. By sharing these real-world experiences, it allows everyone involved in the program to better understand the landscape of online dangers and reinforces the importance of adequate protection measures.

Recently, at our Technical Forum in Puerto Rico, the McAfee team and our partners introduced the Digital Safety Program to a private middle school, engaging more than 100 students from grades 6 to 8. Previous participants in the program have ranged from company owners and senior executives to sales and marketing teams. However, at this event, it was the technical experts delivering the message. This not only allowed their technical peers to understand the ease and satisfaction of participating in such a program but also inspired them to consider innovative ways of protecting children and getting their fellow peers and clients involved. 

Social Responsibility and Corporate Citizenship

The McAfee Digital Safety Program does more than just promote online safety – it serves as a vessel of corporate social responsibility, connecting security professionals with their local communities and raising awareness of the need for better cybersecurity measures. Additionally, the program offers tangible benefits for partners involved. Many have reported increased brand awareness and appreciation from the communities they serve. Plus, delivering the online safety message serves as a valuable training tool that improves their sales and marketing skills.

While the quest for online safety for children comes with business benefits, it is an endeavor that is worth pursuing regardless. We encourage all our partners and anyone interested to learn more about the McAfee Digital Safety Program and consider how they can implement it in their local communities.

Guarding the Digital Playground: Tools and Measures for Children’s Online Safety

While certain elements of digital threats are beyond our control, what we can do is educate our children and ourselves about online safety and equip ourselves with tools that can help guard against such risks. McAfee’s Digital Safety Program aims to provide adequate knowledge and resources for this purpose. However, it is also important to use the available protection measures that can make the digital playground safer for our children.

One of the first measures to ensure online safety is having a strong and reliable security software installed on the devices used by children. This software should be effective in protecting against malware, phishing attacks, and other online threats. It is also important to keep the software updated, as new threats emerge regularly. Furthermore, parental control features, such as content filters and usage restrictions, can provide an extra layer of protection by limiting the exposure of children to inappropriate or dangerous online content.

The Art of Conversation: Discussing Online Safety with Children

Despite implementing technological measures to ensure online safety, the most effective tool is open and thorough conversations about the potential risks and threats that exist online. Children are often unaware of the potential dangers or may not fully comprehend the gravity of these threats. Therefore, it is essential to engage kids in an ongoing dialogue about online safety, equip them with the knowledge to make informed decisions, and encourage them to seek adult assistance when they encounter something unfamiliar or suspicious online.

It is important to have these discussions as early and as often as possible. But, of course, the content and tone of conversations should be age-appropriate. It is equally important to create a safe and non-judgemental environment where children feel comfortable discussing their online experiences without fear of punishment or ridicule. Building trust with children can go long way toward ensuring their safety online.

McAfee Pro Tip: Implement parental controls on their devices gradually, even if your kids may not be enthusiastic about it. This is akin to encouraging them to consume vegetables; it’s a measure taken for their well-being.

Final Thoughts

The internet is a wonderful tool for learning and communication but, like every innovation, it comes with its own set of risks and threats, especially for our children who are particularly vulnerable. As adults, we need to play our part in en/suring their online safety. Through proactive measures and ongoing open conversation’s, we can create a safer online environment for our children. Initiatives like McAfee’s Digital Safety Program are essential in making this a reality. It is a continuous journey, but the efforts to protect our children from online threats and to educate them about online safety are undoubtedly worth it.

The post Keeping Kids Safe from Online Threats appeared first on McAfee Blog.

How Extremist Groups Target Teens Online

By: McAfee
is roblox safe for kids?

With the reality of the digital age, the internet has become a vital part of our daily lives. While it offers immense benefits, the online world also has its potential risks. One such alarming issue involves extremist groups targeting impressionable teenagers online. An example of this is the Orlando nightclub massacre, where the gunman was believed to have been radicalized online. This guide aims to shed light on how these extremist groups operate and provide helpful measures for parents to protect their children.

Understanding The Online Influence of Extremist Groups

According to experts, extremist groups approach their targets subtly, often presenting their ideologies as non-threatening at first. These manipulations are not limited to only social media platforms, such as Facebook or Twitter, but can be encountered in various forms like pop-up ads, hashtags, blog posts, and even videos. Extremist content is widespread online, and it has become increasingly crucial to educate your family about these threats.

Influence from these groups does not happen overnight. It often starts with behavioral changes. Common signs that a teen may be exposed to extremist ideologies include physical changes, sudden interest in fundamental values, increasingly critical towards the U.S., or constantly praising extremist violence in the news. These changes may seem minor at first, but they can lead to sinister results if left unchecked.

Strategies Employed by Extremist Groups Online

ISIS, among other extremist groups, has used the internet extensively for propaganda and recruitment. Their online presence is state-of-the-art and their recruitment methods are sophisticated. They primarily target impressionable teens and young adults who are often at the peak of their emotional turmoil and rebellion. They capitalize on the young person’s desire for acceptance, camaraderie and the urge to act out.

Extremist ideology is presented in a way that validates and glorifies this rebellion, treating it as an act of bravery. These groups lure in both males and females with promises of material rewards, eternal favor, adventure, and even heroism. All these appeal to the human desire for acceptance and significance, making it more appealing for impressionable youths.

Defending Against Online Extremism

The Family Institute for Online Safety (FOSI) released a report entitled “Violent Extremism: The New Online Safety Discussion”. It highlighted the ongoing threat of online extremism and the potential exposure of children to extremist content. The report recommends proactive measures such as awareness, education, and collaboration among government, community leaders, and social media companies to keep families safe from these threats.

Parents play a critical role in curbing this menace. They need to discuss current world events and the reliability of online content their children might encounter online. They should help their children develop critical thinking skills about the content they consume online, understand the motivations behind posted content and the potential manipulation involved.

Monitoring Your Child’s Online Activity

As a parent, it is important to observe your child’s online behavior. This does not imply invading their privacy but rather maintaining open communication about their online activities. As recommended by the FOSI report, parents should be aware of the sites their children visit and the content they consume. Encourage your child to discuss questionable content or unusual interactions they encounter online. This open communication helps build trust and promotes a safer online environment.

Teaching your children about digital footprint is also essential. Explain how their online behavior can have real-life consequences. This can range from damaging their reputation to attracting unwanted attention from malicious figures, such as those from extremist groups. Encourage them to think twice before posting or responding to content online, and remind them that nothing they do online is truly hidden or erased.

Dig Deeper: 6 Tips to Help Protect and Improve Your Child’s Online Reputation

Online Resources for Parents

There are numerous online resources available to assist parents in mitigating the influence of online extremism on their children. These include guides on dealing with tragedy and resources to help identify and address childhood depression. Utilizing these resources can equip parents with the knowledge to address difficult situations appropriately and limit the impact on their child’s mental health. Here are some sources you might want to check out: 

  • Educational Websites: Resources like those provided by the FOSI, including studies and actionable advice, can help parents stay informed about the current behaviors and trends of online extremists. Websites like Common Sense Media and NetSmartz also offer comprehensive educational materials, including articles, videos, and lesson plans, to help parents and educators address online safety and digital literacy with children. Keeping abreast of these trends enables parents to better recognize potential threats and intervene before their children are influenced by extremist propaganda.
  • Parental Control Software: McAfee’s comprehensive parental control software offers parents a multifaceted solution to ensure the online safety of their children. With these tools, parents can actively monitor and manage their child’s internet activities, enabling them to set restrictions on certain websites or content deemed inappropriate. 
  • Online Safety Workshops: Many organizations and schools host workshops and webinars on online safety and digital literacy. These can provide parents with practical strategies and expert insights.
  • Mental Health Support: Accessing online platforms like the National Alliance on Mental Illness (NAMI) or Crisis Text Line can help parents understand and address the mental health challenges their children may face as a result of online experiences.
  • Social Media Guides: Given the central role of social media in many children’s lives, parents can also find guides from platforms like Facebook, Instagram, and Snapchat on how to ensure a safer and more positive online experience.

Dig Deeper: Does Your Child Have an Unhealthy Relationship with Social Media?

  • Counseling Services: If parents observe concerning changes in their child’s behavior or mental health, it’s important to connect with school counselors, therapists, or psychologists who specialize in youth mental health and digital well-being.
  • Community Support: Local parent groups or online communities dedicated to online safety and parenting can provide a sense of solidarity and practical advice from other parents who have faced similar challenges.

Final Thoughts

The digital age brings with it immense benefits and potential risks. Online extremism is a real threat, but proactive and involved parenting can help minimize its influence on our children. By staying informed about extremist tactics, maintaining open dialogue with our children about their online activities, and utilizing available resources, we can help ensure their online safety. After all, armed with knowledge and understanding, we are well-equipped to face, address, and overcome these challenges.

Improve yours and your children’s understanding of the online world with the help of McAfee. Whether it’s through educational content, parental control solutions, or security features, McAfee empowers both parents and children to make informed decisions, practice responsible online behavior, and stay safe in an ever-evolving digital landscape. 

The post How Extremist Groups Target Teens Online appeared first on McAfee Blog.

How to Protect Your Mobile Device From Loss and Theft

In the ever-growing digital age, our mobile devices contain an alarming amount of personal, sensitive data. From emails, social media accounts, banking applications to payment apps, our personal and financial lives are increasingly entwined with the convenience of online, mobile platforms. However, despite the increasing threat to cyber security, it appears many of us are complacent about protecting our mobile devices.

Survey revealed that many mobile users still use easy-to-remember and easy-to-guess passwords. With such an increasing dependence on mobile devices to handle our daily tasks, it seems unimaginable that many of us leave our important personal data unguarded. Theft or loss of an unsecured mobile device can, and often does, result in a catastrophic loss of privacy and financial security.

Mobile Device Security

The unfortunate reality of our digital era is that devices are lost, misplaced, or stolen every day. A mobile device without password protection is a gold mine for anyone with malicious intent. According to a global survey by McAfee and One Poll, many consumers are largely unconcerned about the security of their personal data stored on mobile devices. To illustrate, only one in five respondents had backed up data on their tablet or smartphone. Even more concerning, 15% admitted they saved password information on their phone.

Such statistics are troubling for several reasons. The most obvious is the risk of personal information —including banking details and online login credentials— falling into the wrong hands. A lost or stolen device is not just a device lost— it’s potentially an identity, a bank account, or worse. The lack of urgency in securing data on mobile devices speaks to a broad consumer misunderstanding about the severity of the threats posed by cybercriminals and the ease with which they can exploit an unprotected device.

Dig Deeper: McAfee 2023 Consumer Mobile Threat Report

The Gender Disparity in Mobile Device Security

Perhaps one of the most surprising findings of the survey is the difference in mobile security behaviors between men and women. This difference illustrates not just a disparity in the type of personal information each group holds dear, but also the degree of risk each is willing to accept with their mobile devices.

Broadly speaking, men tend to place greater value on the content stored on their devices, such as photos, videos, and contact lists. Women, on the other hand, appear more concerned about the potential loss of access to social media accounts and personal communication tools like email. They are statistically more likely to experience online harassment and privacy breaches. This could explain why they are more concerned about the security of their social media accounts, as maintaining control over their online presence can be a way to protect against harassment and maintain a sense of safety.

The loss of a mobile device, which for many individuals has become an extension of their social identity, can disrupt daily life significantly. This distinction illustrates that the consequences of lost or stolen mobile devices are not just financial, but social and emotional as well.

Risky Behaviors Persist

Despite the differences in what we value on our mobile devices, the survey showed a worrying level of risky behavior from both genders. Over half (55%) of respondents admitted sharing their passwords or PIN with others, including their children. This behavior not only leaves devices and data at risk of unauthorized access but also contributes to a wider culture of complacency around mobile security.

Password protection offers a fundamental layer of security for devices, yet many people still choose convenience over safety. Setting a password or PIN isn’t a failsafe method for keeping your data safe. However, it is a simple and effective starting point in the broader effort to protect our digital lives.

Dig Deeper: Put a PIN on It: Securing Your Mobile Devices

Steps to Mobile Device Security

While the survey results raise an alarm, the good news is that we can turn things around. It all begins with acknowledging the risks of leaving our mobile devices unprotected. There are simple steps that can be taken to ramp up the security of your devices and protect your personal information.

First and foremost, password-protect all your devices. This means going beyond your mobile phone to include tablets and any other portable, internet-capable devices you may use. And, while setting a password, avoid easy ones like “1234” or “1111”. These are the first combinations a hacker will try. The more complex your password is, the sturdier a barrier it forms against unauthorized access.

Another important step is to avoid using the “remember me” function on your apps or mobile web browser. Although it might seem convenient to stay logged into your accounts for quick access, this considerably amplifies the risk if your device gets stolen or lost. It’s crucial to ensure you log out of your accounts whenever not in use. This includes email, social media, banking, payment apps, and any other accounts linked to sensitive information.

McAfee Pro Tip: If your phone is lost or stolen, employing a combination of tracking your device, locking it remotely, and erasing its data can safeguard both your phone and the information it contains. Learn more tips on how to protect your mobile device from loss and theft.

Sharing your PIN or password is also a risky behavior that should be discouraged. Admittedly, this might be challenging to implement, especially with family members or close friends. But the potential harm it can prevent in the long run far outweighs the temporary convenience it might present.

Investing in Mobile Security Products

Having highlighted the importance of individual action towards secure mobile practices, it’s worth noting that investing in reliable security software can also make a world of difference. A mobile security product like McAfee Mobile Security, which offers anti-malware, web protection, and app protection, can provide a crucial extra layer of defense.

With app protection, not only are you alerted if your apps are accessing information on your mobile that they shouldn’t, but in the event that someone does unlock your device, your personal information remains safe by locking some or all of your apps. This means that even if your device falls into the wrong hands, they still won’t be able to access your crucial information.

It’s also critical to stay educated on the latest ways to protect your mobile device. Cyber threats evolve constantly, and awareness is your first line of defense. McAfee has designed a comprehensive approach to make the process of learning about mobile security not just informative but also engaging. Our array of resources includes a rich repository of blogs, insightful reports, and informative guides. These materials are meticulously crafted to provide users with a wealth of knowledge on how to protect their mobile devices, ensuring that the learning experience is not only informative but also engaging and enjoyable.

Final Thoughts

While the current state of mobile device security may seem concerning, it’s far from hopeless. By incorporating simple security practices such as setting complex passwords and avoiding shared access, we can significantly reduce the risk of unauthorized data access. Additionally, investing in trusted mobile security products like McAfee Mobile Security can provide a robust defense against advancing cyber threats. Remember, our digital lives mirror our real lives – just as we lock and secure our homes, so too must we protect our mobile devices.

The post How to Protect Your Mobile Device From Loss and Theft appeared first on McAfee Blog.

Digital Strategies to Safeguard Your Child from Upsetting and Violent Content Online

Amidst the recent heartbreaking events in the Middle East, parents now face the challenge of protecting children from the overwhelming amount of violent and disturbing content so easily accessible to children online 

Reports of unimaginable acts, including graphic photos and videos, have emerged on popular social networks, leading child advocates to call for heightened monitoring and, in some cases, the removal of these apps from children’s devices. According to a recent investigation by The Institute for Strategic Dialogue, the team adopted the personas of 13-year-olds to establish accounts on Instagram, TikTok, and Snapchat. During a 48-hour period spanning from October 14 to 16, the researchers unearthed over 300 problematic posts. Surprisingly, a significant majority of these problematic posts, approximately 78%, were discovered on Instagram, with Snapchat hosting about 5% of them. 

In today’s digital age, the consensus is clear: keeping older children informed about global events is important. However, given the abundance of real-time, violent content, the urgency to protect them from distressing material that could harm their mental well-being has become even more imperative. 

In such times, there isn’t a one-size-fits-all strategy, but we can provide valuable tips to help you monitor and minimize your child’s exposure to violent content. 

10 Ways to Limit Your Family’s Exposure to Online Violence 

  1. Safeguard Screen Time: It’s natural if you are anxious about your child’s exposure to online content right now. Listen to that inner voice and be proactive with all screen time including television. A practical approach is to limit device access. For younger children, consider using a family device instead of a personal one to manage screen time more effectively. Know where the remote is and explain why you are making changes. 
  2. Get Serious about Parental Controls: Technology can be your ally during times of global crisis. Parental control features enable you to not only block inappropriate content but also regulate screen time. Consider apps that have built-in parental controls that can be customized to the age of your child and give you the added protection and peace of mind needed right now. 
  3. Talk Openly and Honestly. Don’t be shy about engaging your child in open and honest conversations about what’s going on in the world right now. Chances are, they’re already getting the information anyway, or absorbing the stress anyway. Depending on age, explain the basics of the conflict and why it’s dominating the news and online conversations. Encourage your children to ask questions and share their thoughts and concerns.
  4. Monitor Their Digital Circles: Keep a watchful eye on your child’s online activities, especially during sensitive times when it’s unclear what kind of content they may see online. This includes online gaming platforms and messaging apps. Installing parental control software is important but so is listening to what and how your child (and his or her peers) posts, comments on, and shares.
  5. Zero in on Media Literacy: Propaganda and misinformation is rampant, especially in connection with a geopolitical conflict. Teach your children the art of critical thinking and challenge them to level up their media literacy. Help them discern the difference between reliable sources and disinformation campaigns. Teach them to how to question the information and opinions they encounter online.
  6. 6. Implement a Digital Detox: During periods of particularly distressing news coverage, urge your child to take breaks from the news and model that decision as well. Engage with them in alternative activities and hobbies that foster relaxation and well-being, balancing their online exposure.
  7. Family News Time: If age-appropriate, make watching the news a family affair. This practice allows you to explain and discuss what’s happening and address any questions or concerns your child may have in real-time.
  8. Empathy and Compassion: Foster discussions about the importance of empathy and compassion for those suffering due to conflicts. Encourage your child to engage in activities that promote understanding and kindness.
  9. Review Reporting Channels: If your child is online be sure they know how to report disturbing or inappropriate content on their favorite apps, games, or social sites. Most platforms have mechanisms for flagging or reporting such content, which empowers children to be active participants in online safety.
  10. Seek Professional Support if Needed: What’s happening in the world is distressing and can ignite confusion, fear, and anxiety in a child. Every child is unique so if you notice signs of distress, anxiety, or trauma due to exposure to violent online content, don’t hesitate to seek professional help from a therapist or counselor. Their expertise can be invaluable in times of need.

To wrap up, don’t lose sight of mental and physical well-being by implementing the strategies mentioned here. By setting a strong example of a balanced digital life and open communication about real-life crises, your children will naturally pick up on how to navigate the online world. Your actions speak volumes, and they will follow your lead.

The post Digital Strategies to Safeguard Your Child from Upsetting and Violent Content Online appeared first on McAfee Blog.

A Detailed Guide on Cyberbullying

By: McAfee

Unfortunately, cyberbullying has become a prevalent and emerging threat in our digital age. This type of bullying, carried out through computers and similar technologies, including cell phones, often involves harmful or intimidating comments and public posts created with malevolent intent to humiliate the victim. It’s a phenomenon that doesn’t only affect adults but is incredibly common among young people. As a result, it’s crucial to understand how to help your children navigate and mitigate this pervasive, especially now that they can leave digital footprints anywhere and encounter people with bad intentions.

The Uniqueness of Cyberbullying

One of the distinguishing factors of cyberbullying is that, unlike traditional in-person bullying, it doesn’t simply end when the bully is out of sight. Today, bullies can virtually pursue their victims everywhere through technology. This implies that bullying can transpire without the victim’s immediate consciousness, and due to the extensive reach of social media, the bullying can be witnessed by a significantly larger audience than the conventional school playground. 

Bearing in mind the challenges in getting a cyberbully to cease their harmful behavior, the most effective strategy is to educate your children about safe online habits to prevent such situations from arising in the first place. 

Dig Deeper: More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report

Types of Cyberbullies

Evolved from the classic schoolyard bullies of old, these cyberbullies can take various forms depending on their attack vector and intent. In fact, there are said to be four types of cyberbullies: the Vengeful Angel, the Power Hungry Cyberbully, Revenge of the Nerds/Inadvertent Cyberbully, and Mean Girls. The Vengeful Angel bullies in order to protect the weak/other victims and often takes action to protect a loved one or friend. The Power Hungry archetype, however, is just a nasty, unkind person who wants to display dominance and control over others. Then there’s the Inadvertent Cyberbully, who are usually the ones getting bullied online or in real life and are typically trying to enact some form of justice or revenge anonymously from the web. Mean Girls are the opposite – and take their online actions in order to impress a group of friends or gain social status.

Cyberbullying Methods

Not only is there a variety in the kinds of bullies across the web, but also many types of cyberbullying techniques these meanies use to bother their victims. First and foremost, there’s harassment, which involves repeated, offensive messages sent to a victim by a bully on some type of online medium. These messages can be rude, personal, and even threatening, with one recent example emerging between two wives of professional hockey players. Similar to harassment is Flaming – an online fight conducted via emails, social media messages, chat rooms, you name it.

Then there are very targeted attacks, named Exclusion and Outing. With Exclusion, cyberbullies select one individual to single out. Exclusion is a popular method, with examples everywhere, from high students in Iowa to well-known celebrities. With Outing, these harassers share private information, photos, and videos of a single person to humiliate them online. There’s also the anonymous angle, AKA Masquerading, where a cyberbully creates a fake online identity to belittle, harass, and degrade their victim – which a nurse in New Zealand was a victim of for a whopping five years.

Cyberbullying Prevention Tips

Parents should inform their children that their online activities will be monitored using parental control software. Explaining how this software works and how it can protect them is essential. This policy should be well established before your child gets their phone or computer. 

Furthermore, parents should discuss cyberbullying with their children and help them understand how it happens. This discussion should take place before your child gets their devices. Before a child gets their own digital devices, they must disclose their passwords to their parents. Parents can reassure them that these passwords will only be used during emergencies. 

Setting Conditions for Device Ownership

A condition set before children get their own digital devices is that they should consent to instructions on smart online habits. Importantly, they must understand that once something is posted online, it stays there forever. 

Another essential guideline for owning a device is that children should be cautious about their personal information. They should be advised not to publicly share their cell phone number and email address and should never disclose their passwords, even to close friends. 

Dig Deeper: 8 Signs It May Be Time for Parental Controls

Role-Playing for Cyberbullying

Once your child obtains their digital devices, engaging in role-playing exercises with them is suggested. This allows parents to simulate scenarios where the child might encounter a cyberbully, teaching them appropriate responses. This exercise can also provide a safe space for your child to practice dealing with cyberbullying tactics and learn to act assertively without resorting to aggression or submission. 

In this role-playing activity, parents should encourage their children to report any bullying incidents, even if it is simulated or perceived as insignificant. This activity not only cultivates resilience but also reassures children that they won’t be blamed or punished for being a victim of cyberbullying. 

Maintaining Awareness of Online Activities

Parents must maintain vigilance regarding their child’s internet activities despite all preventive measures. Regular check-ins and encouraging open communication about their online experiences can create a strong bond of trust between parents and children. Assure them they can approach you without fear if they are bullied online. Encourage them to share any suspicious interactions and reassure them that they won’t be in trouble for reporting cyberbullying incidents.

If possible, try to familiarise yourself with the social media platforms that your children are using. Understanding these platforms can provide insight into their online experience and potential risks. Such knowledge can be valuable when initiating discussions about cyberbullying, providing tangible examples and relatable scenarios.

McAfee Pro Tip: Get McAfee’s parental control to safeguard your children against online threats and cyberbullying. With its features, you can actively supervise your kids’ online interactions, establish usage time restrictions, and prevent exposure to inappropriate content. This reassures you that your children can explore the online realm while enjoying a layer of protection. 

Importance of Staying Updated & Educated

Cyberbullying is a complex issue that evolves with the rapid advancements of technology and social media platforms. Therefore, parents must stay updated about the latest forms of cyberbullying and the newest safety settings available on various platforms. Parents should also regularly educate themselves about digital safety and responsible internet usage and share this information with their children to boost their awareness and readiness.

Parents and children can attend webinars, workshops, and seminars about cyberbullying and online safety. Learning together provides a good bonding exercise and ensures that both parties are on the same page. Schools and local community centers often offer resources and programs for cyberbullying awareness and prevention.

Dig Deeper: Cyberbullying’s Impact on Both Society and Security

Next Steps for Both Parents and Kids

Typically, cyberbullying is common among teens navigating the trials and tribulations of middle and high school. But that doesn’t mean it’s exclusive to teens, and that doesn’t mean there aren’t steps parents and kids alike can do to stop cyberbullying in its tracks.

If you’re the subject of cyberbullying, the first thing you need to do is block the bully. Then, make sure you collect evidence – take screenshots, print the proof, and do whatever you can to have material to back up your claim. It depends on the type of cyberbullying at work, but you can also use the internet to your advantage and look up relevant resources to aid with your issue.

If you’re a parent, the most important thing is communication. Make yourself available as a resource and remind your kids that they can tell you anything happening in their online world. Beyond that, continuously weave cybersecurity into your family discussions. Remind kids of the simple steps to be safe online, and ensure they know when to flag a cyberbully or online scheme.

There are also technical avenues you can take to protect your kid online. Look into solutions that will help you monitor your family’s online interactions, such as McAfee Safe Family. This solution, for instance, can help you set rules and time limits for apps and websites and see what your kids are up to at a glance. Of course, these solutions are not the be-all and end-all for stopping cyberbullying, but they can help.

Now, there’s still a lot more research that has to be done to understand the cyberbullying problem society is faced with fully. So, as this problem continues to evolve, so must the research, solutions, and regulations that will be created to combat the issue. With the right proactive action, people everywhere can stand up to cyberbullies.

Dig Deeper: Cyberbullying – How Parents Can Minimize Impact On Kids

Final Thoughts

In conclusion, cyberbullying is a pressing issue that requires continuous attention and education. By teaching your children what it is and how it happens, setting up rules for responsible device usage, conducting role-play exercises together, and staying informed about their online activities, you can better equip them to navigate the digital world safely. Remember, the ultimate goal is not to control your child’s online activities but to empower them with the tools and understanding necessary to protect themselves online.

The post A Detailed Guide on Cyberbullying appeared first on McAfee Blog.

Could Your Kids Spot an Online Predator?

By: McAfee

Despite the extensive media coverage and awareness campaigns, it’s harrowing to admit that children, particularly vulnerable teenagers, are still targeted by online predators. This is not a matter exclusive to the “other” kids – it affects everyone, and young individuals’ innocent and accepting nature often leads them into the dangerous trap of these predators.

As parents, caregivers, and mentors, it’s our responsibility to educate and guide our children about the virtual perils that lurk within their screens. An essential part of this is continuous communication, ensuring they understand the gravity of the situation and can recognize the deceptive tactics employed by these predators.

The Tragic Tale of Nicole Lovell

A heartbreaking example of how these predators operate is the story of Nicole Lovell, a 13-year-old girl who made headlines not long ago. Nicole met David Eisenhauer, an engineering student from Virginia Tech, through the messaging app Kik. Their relations initially seemed harmless, characterized by playful flirtations and shared stories. However, their friendship took a horrific turn when they decided to meet in person, leading to Nicole’s tragic demise. Her body was found shortly after their encounter.

David exhibited no signs of having a ‘dark side,’ an aspect that made their meeting seem all the more innocent. This incident is a stark reminder that anyone can fall prey to such predators, regardless of their background or circumstances. This is why discussing and dissecting such incidents with our children is crucial to teaching them the harsh realities of the digital world.

Recognizing the Traits of Online Predators

Identifying an online predator’s markers is a critical aspect of child safety education. More often than not, these individuals are cunning and mentally unbalanced and spend a significant amount of their time seeking and ‘grooming’ their prospective victims online. The ultimate goal of these predators is to exploit children, either by convincing them to send inappropriate photos or by meeting them in person.

Initiating a continuous dialogue with your children about these predators is crucial. Make them aware of the tactics these individuals employ, such as appearing overly friendly or empathetic. Let them know that predators will go to any length to appear younger and more relatable.

Dig Deeper: Reports of Online Predators on the Rise. How to Keep Your Kids Safe

Starting the Conversation with Kids

Addressing such a sensitive issue with your children can be challenging but necessary. Start by discussing cases like Nicole’s, focusing not only on the tragic outcome but also on the lead-up events and why she may have developed such a strong online connection. Discussing how innocent online friendships can spiral into dangerous situations can be an excellent eye-opener for your kids.

It’s crucial to teach your kids to look out for strangers who are “too friendly” or excessively understanding. Tell them that predators keep themselves updated with the latest movies, music, and trends to seem younger and easily start conversations with children. Remember, predators will say anything to appear more youthful than they actually are.

Red Flags and Warning Signs 

You don’t always know what your children are doing online. Their digital footprints could be anywhere. That’s why it is imperative to understand the red flags and warning signs that may signal a hazardous online interaction, especially when they already encounter a predator, and you’re still in the shadow. 

  • Identifying Suspicious Behavior in Online Contacts: Your children should be cautious if someone they’re communicating with online excessively flatters them, evades questions about their identity, provides inconsistent information, or repeatedly pushes boundaries. Isolation attempts, where the contact discourages your child from discussing the interaction with others or emphasizes secrecy, should raise concerns. 
  • Recognizing Signs of Manipulation and Coercion: Online predators often employ manipulative tactics to gain control over their targets. Your child should be aware of emotional manipulation, blackmail, and threats, all signs of coercion. Predators may work to build false trust by pretending to be the only one who cares about or understands the child. If the contact insists on secrecy, isolates your child from real-world activities, or uses emotional manipulation, it’s crucial for your child to recognize these tactics and take them seriously. And you, as a parent, should acknowledge your child’s behavior when they’re being emotionally manipulated. 
  • Understanding When to Seek Help or Report Concerning Interactions: Open communication is crucial to your child’s safety. Encourage them to talk to you about any concerns regarding their online interactions. Help your child trust their instincts; if something doesn’t feel right or makes them uncomfortable, they should share those feelings with a trusted adult. Ensure they know how to report concerning interactions on the platforms they use and don’t hesitate to involve law enforcement if you suspect contact with an online predator. In some cases, seeking professional help may also be necessary to support your child’s recovery from a traumatic online experience. Building a foundation of trust and proactive communication is essential for online safety.

Teaching Kids to Guard their Online Presence

Reinforcing the importance of online privacy is a crucial step in protecting your kids from virtual predators. Teach your children that personal information such as their full name, address, school, and phone number should never be shared online. They must also understand that specific images and details about their life can also reveal too much to an online predator. Remind them to limit geotagged photos as this can expose their location, and also to strictly control who is able to view their social media accounts.

Dig Deeper: Why You Should Think Before Geotagging that Selfie

Explain to your kids the dangers of accepting friend requests or communicating with strangers online. Make them aware that individuals posing as children or teenagers could be adults with malicious intent. Reinforce that anyone who asks them to keep a conversation secret or requests for personal information or inappropriate content is a potential danger, and they should inform you immediately if this occurs.

Dig Deeper: Making Online Safety a Priority for Our Tech-Savvy Children

Implementing Online Safety Measures

As parents, we must stay informed about our children’s online activities, which goes far beyond just asking them about it. This can involve regularly reviewing their social media profiles and friends lists and ensuring they only interact with people they know personally. Familiarize yourself with the platforms and apps your children use to comprehend their functionalities and potential risks better. 

Creating house rules regarding internet use can be an effective measure to ensure online safety. This could involve having specific periods when the internet can be used, limiting the time spent online, and setting out where internet-access devices can be used. For instance, allowing internet use only in common areas instead of bedrooms can be a good practice. It is essential to have ongoing dialogues about these rules and their reasons so your children can understand and appreciate their importance.

Final Thoughts

In an age where the online world is a significant part of our children’s lives, online safety education is essential. It’s crucial that, as parents, caregivers, and mentors, we take proactive steps to protect our children from the pervasive threat of online predators. This means having open and ongoing conversations about the real dangers that can lurk behind a screen, teaching kids to guard their online presence, and implementing online safety measures. Together, we can ensure the internet becomes safer for our children to learn, explore, and connect with others. Protect your whole family with McAfee+ Family plans.

The post Could Your Kids Spot an Online Predator? appeared first on McAfee Blog.

Handling Social Media Stress for Teens

By: McAfee

Handling Social Media Stress for Teens

In today’s world, most communication happens through the internet, facilitated by numerous applications. The web is a lively center filled with various activities such as news, videos, education, blogs, gaming, activism, and entertainment. Notably, social media apps have morphed into the digital meeting points for netizens. Our society is undeniably superbly interconnected, and our digital persona is greatly treasured.

However, this isn’t always beneficial, especially for teenagers who may be overwhelmed by the deluge of information, leading to stress. Stress is a common part of our daily lives, emerging from our education, employment, relationships, and surroundings. A similar situation transpires online. In fact, we tend to cope with stress by expressing our frustrations, confronting problems directly, or evading the issue altogether. Yet, the ways to cope with stress in the virtual world differ. Online stress can arise from unique triggers, and its repercussions can rapidly escalate and proliferate at an alarming rate.

Causes of Social Media Stress in Children

The rise of social media has brought a concerning phenomenon – social media stress in children. As these young individuals navigate the complex virtual world, they often encounter a range of stressors that can significantly impact their emotional and psychological well-being. Understanding these underlying causes is a crucial step in addressing and mitigating the adverse effects of social media on our younger generations. Let’s delve into the causes of social media stress in children and shed light on the various factors that contribute to this growing issue:

  • Peer pressure: The most important reason children are online is to connect with friends. To keep this friendship alive and kicking, they often blindly copy the group leaders, even if they are uncomfortable with their actions.
  • FOMO (Fear of Missing Out): Teens, especially girls, have a competitive spirit when it comes to online presence and don’t want to be ‘the last to know’ so, they end up spending a lot of time online.
  • Keeping up with the Jones’: The same competitive spirit leads kids to spend hours posing and selecting the perfect pics to share online or seek approval from strangers. This is risky, as negative comments online can harm self-confidence.

Other Triggers of Social Media Stress

Besides the more obvious and well-documented sources of social media stress in children, there exist several other significant triggers that contribute to the overall stress levels experienced by young individuals in the digital age, and these may include:

  • Excessive sharing: When kids share a lot of their private information on social media, they leave themselves vulnerable to hacking and open themselves up to contact from inappropriate individuals online.

Dig Deeper: The Ultimate Guide to Safe Sharing Online

  • Cyberbullying: Most kids have witnessed or experienced some form of cyberbullying and often end up as either perpetrators or victims, or mute spectators. In all cases, this is a disturbing occurrence.

Dig Deeper: More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report

  • Lack of screen time limits and lack of empathy: Lack of digital balance can have psychological effects, so digital usage rules are necessary. Similarly, when children are not taught to respect others and their traditions, they do not develop empathy and may bully those with differing views and lifestyles.

Dig Deeper: 5 Screen Time Principles to Establish When Your Kids are Still Babies

The Role of Parenting

Parenting plays a major role in helping children learn how to tackle social media stress. As parents, you know your children the best. Yes, even teens. Observe them, and if you note any change in their social media habits or general behavior, talk to them. The earlier you start having frank one-to-one conversations, the easier it will be for you later. But before that, you may need to modify your response to stress and learn to control your reactions. That way, you will teach them a very important lesson without using a single word.

Helping Kids Fight Social Media Stress

Children can learn to manage social media stress by developing a healthy online etiquette and creating boundaries for their online activities. Encourage them to accept differences and realize that people have varied opinions. Remind them not to make judgments based on someone’s online bio and pictures and to understand that life isn’t a bed of roses for anyone. Another important step is to help them understand how important it is to respond tactfully when things get heated online. It’s essential that they understand the power of choosing not to engage in online altercations. Being silent doesn’t mean they’re weak but smart enough not to get provoked. If any online situation becomes too intense, they should be encouraged to report and block the perpetrator immediately.

McAfee Pro Tip: Since each child’s level of maturity and cognitive capacity to manage online challenges varies, a one-site-fits-all approach to balancing social media and mental health won’t work for everyone. Find tips on how to find the best method for your child.

Practicing Digital Balance and Awareness

One of the keys to managing stress caused by social media is ensuring that kids practice digital balance. Set screen time limits and encourage them to make and maintain friendships in the real world. In-person interactions promote emotional growth and provide a well-rounded social experience. Moreover, it’s crucial to instill the idea that maturity is about staying true to their values and wisdom lies in identifying the negatives and avoiding them. Just as they would in the physical world, they should be aware that the digital world comprises both good and bad elements. This awareness can help them navigate online spaces safely. Let them know the importance of applying their real-life values in the digital world and the mantra of STOP, THINK, CONNECT, should always be in their mind before posting anything online.

Dig Deeper: 6 Steps to Help Your Family Restore Digital Balance in Stressful Times

Conclusion

In conclusion, parents play a crucial role in helping their children tackle social media stress. By observing their kids’ behavioral changes, having open conversations, and setting appropriate boundaries for their online activities, parents can help their kids navigate the digital world safely. Encouraging children to accept differences, practice tact, maintain digital balance, and be aware of the good and bad online can help alleviate the stress caused by social media. Ultimately, the goal is to create a healthier and happier online space for children, free from unnecessary stress.

Improve your digital parenting with McAfee’s Parental Controls. This security tool allows parents to monitor device usage, set limits on screen time, and even keep tabs on kids’ whereabouts.​

The post Handling Social Media Stress for Teens appeared first on McAfee Blog.

Help Kids Steer Clear of Cyberbullies During Summer Break

By: McAfee

As we all look forward to the sunshine and freedom of summer, it’s important to remember that not all elements of the school year disappear with the ringing of the final bell. In our increasingly digital age, cyberbullying has become a pervasive issue that can affect kids even during their summer break. This guide will help parents understand the issue, recognize the signs, and provide practical strategies to protect their kids from cyberbullies.

The Reality of Summer Cyberbullying

Summer break should be a time of fun-filled days, exploration, relaxation, and a break from the rigors of the school year. However, with the increase in leisure time comes a corresponding increase in screen time, and, unfortunately, this often results in an uptick in instances of cyberbullying. As the McAfee survey in 2014 revealed, 87% of teenagers reported witnessing cyberbullying, a significant increase from the previous year. The reasons for being targeted varied, with appearance, race, religion, and sexual orientation all cited as factors. Given this reality, parents must remain vigilant during the summer months. Keeping an eye on your child’s online activities, encouraging open communication, and intervening when necessary can make the difference between a summer of fun and one of fear and isolation. → Dig Deeper: More Dangers of Cyberbullying Emerge—Our Latest Connected Family Report

Things Not to Do

When confronted with bullying, our instinctive reactions aren’t always the best. Here are three things you should avoid doing when addressing cyberbullying:

  • Telling your child to ignore the bullying. The nature of social media can amplify the impact of bullying, making it impossible to overlook simply.
  • Blaming the child for being bullied. Even if your child made poor decisions or inadvertently instigated the situation, nobody deserves to be bullied.
  • Encouraging physical retaliation. Fighting back can escalate the situation and put your child in physical or legal danger.

3 Ways to Avoid Bullying Online

Prevention is the best cure, and there are several proactive steps you can take to minimize the risk of your child being cyberbullied:

  • Make profiles and photos private. Insist on privacy settings for all social profiles. This confines your child’s online circles to known friends, reducing the likelihood of cyberbullying.

Dig Deeper: Protecting Your Privacy on Social Media

  • Avoid risky apps. Certain apps, like ask.fm, Kik Messenger, and Yik Yak, are associated with higher rates of cyberbullying due to their allowance of anonymous interaction. Ensure these are off-limits for your child.

Dig Deeper: Beware of Malicious Mobile Apps

  • Don’t invite criticism. The online culture often encourages kids to seek approval through “likes” or “ranks” of their photos. Discuss the risks involved in this behavior and remind your child of their worth outside these superficial metrics.

3 Things to Do if Bullied Online

Despite taking precautions, there may be instances where cyberbullying can’t be immediately prevented. In such situations, it is crucial to know what steps to take to mitigate the impact and bring the bullying to an end:

  • Tell someone. It’s important for the child to confide in a trusted adult, somebody who can help manage the situation appropriately. Encourage open communication from the start. Many times, kids withhold information about bullying, allowing it to escalate unchecked. Monitor your child’s online behavior discreetly, paying attention to the tone and content of their interactions. It’s also crucial to provide emotional support and reassurance to children who are being targeted, as they may be suffering from fear, embarrassment, or feelings of isolation.
  • Save the evidence. Make sure to keep a record of bullying incidents – texts, emails, social media posts, or screenshot conversations. These might provide valuable information to address the situation and serve as evidence if the need to report to authorities arises.
  • Report serious incidents to the police. If cyberbullying escalates to the point where it includes threats, intimidation, or any form of sexual exploitation, it’s time to involve the authorities. Report the situation to the police and specific social networks where bullying occurs. Websites such as StopBullying.gov provide comprehensive resources to understand your rights better and get the help you need.

Supporting Your Child

Addressing the issue of cyberbullying can be a complex task. The emotional wounds inflicted by this abuse can be deep and long-lasting. Therefore, it’s indispensable that your child feels supported and understood. Maintain an open line of communication with your child, creating a secure and trusting environment where they can comfortably express their feelings and fears. It might also be beneficial to seek professional help when dealing with cases of severe bullying. Therapy or counseling can provide your child with effective coping strategies, helping them regain their confidence and self-esteem. McAfee Pro Tip: While numerous aspects of the digital world remain beyond our control, one aspect where we wield significant influence is our commitment to protecting the well-being of our family members in both the digital and mental realms. Mental health always matters. Find ways to support your child online and offline.

Teaching Empathy and Respect Online

Preventing cyberbullying starts at home. By teaching our children the values of empathy and respect, we can contribute to a more positive online culture. Incorporate digital citizenship lessons into your everyday conversations, emphasizing the importance of treating others kindly offline and online. Teach your children to think before they post and remind them that behind every screen, there’s a real person who can be hurt by their words. Building respect and empathy can discourage cyberbullying and inspire children to stand against it. → Dig Deeper: Cyberbullying’s Impact on Both Society and Security

Conclusion

Parenting in the digital age brings with it new challenges and responsibilities. Cyberbullying is a significant issue that requires our attention and vigilance, especially during the summer when screen time increases. Equip your child with the right tools to protect themselves online, foster open communication at all times, and support them in the face of adversity. Remember, the goal is for our children to enjoy their digital interactions and have a safe, enjoyable summer free from the threat of cyberbullying. Improve your family’s digital habits, privacy, and safety with McAfee’s Parental Controls. This security tool allows parents to oversee device usage, establish screen time restrictions, and even track the locations of their children.

The post Help Kids Steer Clear of Cyberbullies During Summer Break appeared first on McAfee Blog.

Skyhook - A Round-Trip Obfuscated HTTP File Transfer Setup Built To Bypass IDS Detections

By: Zion3R


Skyhook is a REST-driven utility used to smuggle files into and out of networks defended by IDS implementations. It comes with a pre-packaged web client that uses a blend of React, vanilla JS, and web assembly to manage file transfers.


Key Links

Features

  • Round trip file content obfuscation
  • User-configurable obfuscation chaining
  • Self-signed and Lets Encrypt certificate procurement methods
  • Embedded web applications for both configuration and file transfers.
  • Server fingerprinting resiliency techniques:
    • Encrypted loaders capable of dynamically encrypting interface files as the file transfer interface is rendered
    • API and web resource path randomization

Brief Description

Note: See the user documentation for more thorough discussion of Skyhook and how it functions.

Skyhook's file transfer server seamlessly obfuscates file content with a user-configured series of obfuscation algorithms prior to writing the content to response bodies. Clients, which are configred with the same obfuscation algorithms, deobfuscate the file content prior to saving the file to disk. A file streaming technique is used to manage the HTTP transactions in a chunked manner, thus facilitating large file transfers.

flowchart

subgraph sg-cloudfront[Cloudfront CDN]
cf-listener(443/tls)
end

subgraph sg-vps[VPS]
subgraph sg-skyhook[Skyhook Servers]
admin-listener(Admin Server<br>45000/tls)
transfer-listener(Transfer Server<br>45001/tls)
end

config-file(Config File<br>/var/skyroot/config.yml)

admin-listener -..->|Reads &<br>Manages| config-file

webroot(Webroot<br>/var/skyhook/webroot)
transfer-listener -..->|Serves From &<br>Writes Cleartext<br>Files To| webroot
end


op-browser(Operator<br>Web Browser) -->|Administration<br>Traffic| admin-listener
op-browser <-->|Obfuscated<br>Data| transfer-listener

subgraph sg-corp[Corporate Environment]
subgraph sg-compromised[Beachhead Host]
comp-browser(Web Browser) -->|Reads &<b r>Writes| cleartext-file(Cleartext Files)
end
end

comp-browser <-->|Obfuscated<br>Data| cf-listener <-->|Obfuscated<br>Data| transfer-listener

A Brief Example

For example, here is a working obfuscation configuration:

And here is the file transfer interface. Clicking "Download" results in the file being retrieved in chunks that are encrypted with the chain of obfuscation methods configured above.

JavaScript deobfuscates the file before prompting the user to save it to disk.

Below is a request stemming from a download being inspected with Burp. Key elements of the transaction are encrypted to evade detection.



HHS Launches 'Digiheals' Project to Better Protect US Hospitals From Ransomware

An innovation agency within the US Department of Health and Human Services will fund research into better defenses for the US health care system’s digital infrastructure.

Child identity theft: how do I keep my kids’ personal data safe?

Why is kids’ personal information in high demand, how do criminals steal it, and what can parents do to help prevent child identity theft?

The post Child identity theft: how do I keep my kids’ personal data safe? appeared first on WeLiveSecurity

School’s out for summer, but it’s not time to let your cyber guard down

The beginning of the summer break is the perfect time for parents to remind their children about the importance of safe online habits

The post School’s out for summer, but it’s not time to let your cyber guard down appeared first on WeLiveSecurity

Stop Cyberbullying Day: Prevention is everyone’s responsibility

Strategies for stopping and responding to cyberbullying require a concerted, community-wide effort involving parents, educators and children themselves

The post Stop Cyberbullying Day: Prevention is everyone’s responsibility appeared first on WeLiveSecurity

New COSMICENERGY Malware Exploits ICS Protocol to Sabotage Power Grids

A new strain of malicious software that's engineered to penetrate and disrupt critical systems in industrial environments has been unearthed. Google-owned threat intelligence firm Mandiant dubbed the malware COSMICENERGY, adding it was uploaded to the VirusTotal public malware scanning utility in December 2021 by a submitter in Russia. There is no evidence that it has been put to use in the wild

Instagram Safety for Kids: Protecting Privacy and Avoiding Risks

If you’re a parent of a teen, there’s a good chance that Instagram is the culprit behind a good chunk of their screen time. However, woven into the stream of reels, stories, selfies, and Insta-worthy moments, are potential risks to your child’s privacy and safety. 

According to a recent Pew Research Center report, 62 percent of teens use Instagram, making it the third most popular social media platform after YouTube and TikTok. Teens use the photo and video-sharing platform to share their creativity, connect with friends, and get updates on their favorite celebrities and influencers.  

Instagram’s format makes it easy for kids (and adults!) to spend hours using filters and stickers, commenting, liking posts, and counting likes. But all this fun can take a turn if kids misuse the platform or fail to take the risks seriously.  

Whether your child is new to Instagram or a seasoned IG user, consider pausing to talk about the many aspects of the platform.  

Here are a few critical topics to help you kick off those conversations.  

Instagram Privacy & Safety Tips 

1. Resist oversharing.

Acknowledging the impulsive behavior and maturity gaps unique to the teen years is essential. Do you feel like you are repeating yourself on these topics? That’s okay—it means you are doing it right. Repetition works. Advise them: Sharing too many personal details online can set them up for serious privacy risks, including identity theft, online scams, sextortion, or cyberbullying. Also, oversharing can negatively influence potential schools and employers who may disapprove of the content teens choose to share online.  

Suggestion: Sit down together and review Instagram’s privacy settings to limit who can see your child’s content. Please encourage them to use strong passwords and two-factor authentication to secure accounts. Also, advise them to think twice before posting something and warn them about the risks of sharing intimate photos online (even with friends), as they can be easily shared or stolen. Now may be the time if you’ve never considered adding security software to protect your family devices. McAfee+ provides all-in-one privacy, identity, and device protection for families. It includes helpful features, including identity monitoring, password manager, unlimited VPN, file shredding, protection score, and parental controls. The software has updated features to include personal data cleanup and credit monitoring and reporting to protect kids from identity theft further. 

2. Just say no to FOMO.

This acronym stands for Fear of Missing Out. This word came from the subtle undercurrent of emotions that can bubble up when using social media. It’s common for kids to feel anxious or even become depressed because they think they are being excluded from the party. FOMO can lead them to spend too much time and money on social media, neglect their family or school responsibilities, or engage in risky behaviors to fit in with or impress others.  

Suggestion: Help your child understand that it’s normal to sometimes have FOMO feelings. Please encourage them to focus on their strengths and to develop fulfilling hobbies and interests offline. To reduce FOMO, encourage your child to take breaks from social media. Also, install software to help you manage family screen time.  

3. Social Comparison.

Akin to FOMO, comparing oneself to others is an ever-present reality among teens that is only amplified on Instagram. According to several reports, Instagram’s photo-driven culture and photo filters that enhance facial and body features can make teens feel worse about their bodies and increase the risk of eating disorders, depression, and risky behaviors. Girls, especially, can develop low self-esteem, comparing themselves to unrealistic or edited images of celebrities, influencers, or friends. Social comparison can also lead to the fixation on getting more likes, followers, or comments on their posts. 

Suggestion: Create a safe space for your teen to discuss this topic with you. Help them understand the differences between Instagram life and real life. Help them be aware of how they feel while using Instagram. Encourage them to follow accounts that inspire and uplift them and unfollow accounts that spark feelings of comparison, jealousy, or inferiority.  

4. Talk about cyberbullying.

Hurtful events that impact teens, such as gossip, rumor spreading, peer pressure, criticism, and conflict, can increase in online communities. If your child posts online, they can receive mean or sexual comments from people they know and strangers (trolls). Cyberbullying can surface in many ways online, making kids feel anxious, fearful, isolated, and worthless.  

Suggestions: Keep up on how kids bully one another online and check in with your child daily about what’s happening in their life. Encourage them not to respond to bullies and to block and report the person instead. Also, if they are getting bullied, remind them to take and store screenshots. Such evidence can be helpful if they need to confide with a parent, teacher, or law enforcement.
 

5. Emphasize digital literacy.

Understanding how to discern true and false information online is becoming more complicated daily. In the McAfee 2023 Threat Predictions: Evolution and Exploitation, experts predict that AI tools will enable more realistic and efficient manipulation of images and videos, which could increase disinformation and harm the public’s mental health. Understanding online content is a great way to help your kids build their confidence and security on Instagram and other networks.   

Suggestion: Encourage critical thinking and guide kids to use fact-checking tools before believing or sharing content that could be fake and using ethical AI frameworks. Remind them of their digital footprints and how the things they do online can have long-lasting consequences. 

It’s important to remember that all social networks come with inherent dangers and that Instagram has taken a number of steps to reduce the potential risks associated with its community by improving its security features and safety rules for kids. Remember, nothing protects your child like a solid parent-child relationship. As a parent or caregiver, you play a critical role in educating your child about their digital well-being and privacy. Working together, as a family, your child will be equipped to enjoy the good stuff and avoid the sketchy side of the digital world.  

The post Instagram Safety for Kids: Protecting Privacy and Avoiding Risks appeared first on McAfee Blog.

Why you need parental control software – and 5 features to look for

Strike a balance between making the internet a safer place for your children and giving them the freedom to explore, learn and socialize

The post Why you need parental control software – and 5 features to look for appeared first on WeLiveSecurity

Teler-Waf - A Go HTTP Middleware That Provides Teler IDS Functionality To Protect Against Web-Based Attacks And Improve The Security Of Go-based Web Applications

By: Zion3R

teler-waf is a comprehensive security solution for Go-based web applications. It acts as an HTTP middleware, providing an easy-to-use interface for integrating IDS functionality with teler IDS into existing Go applications. By using teler-waf, you can help protect against a variety of web-based attacks, such as cross-site scripting (XSS) and SQL injection.

The package comes with a standard net/http.Handler, making it easy to integrate into your application's routing. When a client makes a request to a route protected by teler-waf, the request is first checked against the teler IDS to detect known malicious patterns. If no malicious patterns are detected, the request is then passed through for further processing.

In addition to providing protection against web-based attacks, teler-waf can also help improve the overall security and integrity of your application. It is highly configurable, allowing you to tailor it to fit the specific needs of your application.


See also:

  • kitabisa/teler: Real-time HTTP intrusion detection.
  • dwisiswant0/cox: Cox is bluemonday-wrapper to perform a deep-clean and/or sanitization of (nested-)interfaces from HTML to prevent XSS payloads.

Features

Some core features of teler-waf include:

  • HTTP middleware for Go web applications.
  • Integration of teler IDS functionality.
  • Detection of known malicious patterns using the teler IDS.
    • Common web attacks, such as cross-site scripting (XSS) and SQL injection, etc.
    • CVEs, covers known vulnerabilities and exploits.
    • Bad IP addresses, such as those associated with known malicious actors or botnets.
    • Bad HTTP referers, such as those that are not expected based on the application's URL structure or are known to be associated with malicious actors.
    • Bad crawlers, covers requests from known bad crawlers or scrapers, such as those that are known to cause performance issues or attempt to extract sensitive information from the application.
    • Directory bruteforce attacks, such as by trying common directory names or using dictionary attacks.
  • Configuration options to whitelist specific types of requests based on their URL or headers.
  • Easy integration with many frameworks.
  • High configurability to fit the specific needs of your application.

Overall, teler-waf provides a comprehensive security solution for Go-based web applications, helping to protect against web-based attacks and improve the overall security and integrity of your application.

Install

To install teler-waf in your Go application, run the following command to download and install the teler-waf package:

go get github.com/kitabisa/teler-waf

Usage

Here is an example of how to use teler-waf in a Go application:

  1. Import the teler-waf package in your Go code:
import "github.com/kitabisa/teler-waf"
  1. Use the New function to create a new instance of the Teler type. This function takes a variety of optional parameters that can be used to configure teler-waf to suit the specific needs of your application.
waf := teler.New()
  1. Use the Handler method of the Teler instance to create a net/http.Handler. This handler can then be used in your application's HTTP routing to apply teler-waf's security measures to specific routes.
handler := waf.Handler(http.HandlerFunc(yourHandlerFunc))
  1. Use the handler in your application's HTTP routing to apply teler-waf's security measures to specific routes.
http.Handle("/path", handler)

That's it! You have configured teler-waf in your Go application.

Options:

For a list of the options available to customize teler-waf, see the teler.Options struct.

Examples

Here is an example of how to customize the options and rules for teler-waf:

// main.go
package main

import (
"net/http"

"github.com/kitabisa/teler-waf"
"github.com/kitabisa/teler-waf/request"
"github.com/kitabisa/teler-waf/threat"
)

var myHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// This is the handler function for the route that we want to protect
// with teler-waf's security measures.
w.Write([]byte("hello world"))
})

var rejectHandler = http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// This is the handler function for the route that we want to be rejected
// if the teler-waf's security measures are triggered.
http.Error(w, "Sorry, your request has been denied for security reasons.", http.StatusForbidden)
})

func main() {
// Create a new instance of the Teler type using the New function
// and configure it using the Options struct.
telerMiddleware := teler.New(tel er.Options{
// Exclude specific threats from being checked by the teler-waf.
Excludes: []threat.Threat{
threat.BadReferrer,
threat.BadCrawler,
},
// Specify whitelisted URIs (path & query parameters), headers,
// or IP addresses that will always be allowed by the teler-waf.
Whitelists: []string{
`(curl|Go-http-client|okhttp)/*`,
`^/wp-login\.php`,
`(?i)Referer: https?:\/\/www\.facebook\.com`,
`192\.168\.0\.1`,
},
// Specify custom rules for the teler-waf to follow.
Customs: []teler.Rule{
{
// Give the rule a name for easy identification.
Name: "Log4j Attack",
// Specify the logical operator to use when evaluating the rule's conditions.
Condition: "or",
// Specify the conditions that must be met for the rule to trigger.
Rules: []teler.Condition{
{
// Specify the HTTP method that the rule applies to.
Method: request.GET,
// Specify the element of the request that the rule applies to
// (e.g. URI, headers, body).
Element: request.URI,
// Specify the pattern to match against the element of the request.
Pattern: `\$\{.*:\/\/.*\/?\w+?\}`,
},
},
},
},
// Specify the file path to use for logging.
LogFile: "/tmp/teler.log",
})

// Set the rejectHandler as the handler for the telerMiddleware.
telerMiddleware.SetHandler(rejectHandler)

// Create a new handler using the handler method of the Teler instance
// and pass in the myHandler function for the route we want to protect.
app := telerMiddleware.Handler(myHandler)

// Use the app handler as the handler for the route.
http.ListenAndServe("127.0.0.1:3000", app)
}

Warning: When using a whitelist, any request that matches it - regardless of the type of threat it poses, it will be returned without further analysis.

To illustrate, suppose you set up a whitelist to permit requests containing a certain string. In the event that a request contains that string, but /also/ includes a payload such as an SQL injection or cross-site scripting ("XSS") attack, the request may not be thoroughly analyzed for common web attack threats and will be swiftly returned. See issue #25.

For more examples of how to use teler-waf or integrate it with any framework, take a look at examples/ directory.

Development

By default, teler-waf caches all incoming requests for 15 minutes & clear them every 20 minutes to improve the performance. However, if you're still customizing the settings to match the requirements of your application, you can disable caching during development by setting the development mode option to true. This will prevent incoming requests from being cached and can be helpful for debugging purposes.

// Create a new instance of the Teler type using
// the New function & enable development mode option.
telerMiddleware := teler.New(teler.Options{
Development: true,
})

Logs

Here is an example of what the log lines would look like if teler-waf detects a threat on a request:

{"level":"warn","ts":1672261174.5995026,"msg":"bad crawler","id":"654b85325e1b2911258a","category":"BadCrawler","request":{"method":"GET","path":"/","ip_addr":"127.0.0.1:37702","headers":{"Accept":["*/*"],"User-Agent":["curl/7.81.0"]},"body":""}}
{"level":"warn","ts":1672261175.9567692,"msg":"directory bruteforce","id":"b29546945276ed6b1fba","category":"DirectoryBruteforce","request":{"method":"GET","path":"/.git","ip_addr":"127.0.0.1:37716","headers":{"Accept":["*/*"],"User-Agent":["X"]},"body":""}}
{"level":"warn","ts":1672261177.1487508,"msg":"Detects common comment types","id":"75412f2cc0ec1cf79efd","category":"CommonWebAttack","request":{"method":"GET","path":"/?id=1%27% 20or%201%3D1%23","ip_addr":"127.0.0.1:37728","headers":{"Accept":["*/*"],"User-Agent":["X"]},"body":""}}

The id is a unique identifier that is generated when a request is rejected by teler-waf. It is included in the HTTP response headers of the request (X-Teler-Req-Id), and can be used to troubleshoot issues with requests that are being made to the website.

For example, if a request to a website returns an HTTP error status code, such as a 403 Forbidden, the teler request ID can be used to identify the specific request that caused the error and help troubleshoot the issue.

Teler request IDs are used by teler-waf to track requests made to its web application and can be useful for debugging and analyzing traffic patterns on a website.

Datasets

The teler-waf package utilizes a dataset of threats to identify and analyze each incoming request for potential security threats. This dataset is updated daily, which means that you will always have the latest resource. The dataset is initially stored in the user-level cache directory (on Unix systems, it returns $XDG_CACHE_HOME/teler-waf as specified by XDG Base Directory Specification if non-empty, else $HOME/.cache/teler-waf. On Darwin, it returns $HOME/Library/Caches/teler-waf. On Windows, it returns %LocalAppData%/teler-waf. On Plan 9, it returns $home/lib/cache/teler-waf) on your first launch. Subsequent launch will utilize the cached dataset, rather than downloading it again.

Note: The threat datasets are obtained from the kitabisa/teler-resources repository.

However, there may be situations where you want to disable automatic updates to the threat dataset. For example, you may have a slow or limited internet connection, or you may be using a machine with restricted file access. In these cases, you can set an option called NoUpdateCheck to true, which will prevent the teler-waf from automatically updating the dataset.

// Create a new instance of the Teler type using the New
// function & disable automatic updates to the threat dataset.
telerMiddleware := teler.New(teler.Options{
NoUpdateCheck: true,
})

Finally, there may be cases where it's necessary to load the threat dataset into memory rather than saving it to a user-level cache directory. This can be particularly useful if you're running the application or service on a distroless or runtime image, where file access may be limited or slow. In this scenario, you can set an option called InMemory to true, which will load the threat dataset into memory for faster access.

// Create a new instance of the Teler type using the
// New function & enable in-memory threat datasets store.
telerMiddleware := teler.New(teler.Options{
InMemory: true,
})

Warning: This may also consume more system resources, so it's worth considering the trade-offs before making this decision.

Resources

Security

If you discover a security issue, please bring it to their attention right away, we take security seriously!

Reporting a Vulnerability

If you have information about a security issue, or vulnerability in this teler-waf package, and/or you are able to successfully execute such as cross-site scripting (XSS) and pop-up an alert in our demo site (see resources), please do NOT file a public issue — instead, kindly send your report privately via the vulnerability report form or to our official channels as per our security policy.

Limitations

Here are some limitations of using teler-waf:

  • Performance overhead: teler-waf may introduce some performance overhead, as the teler-waf will need to process each incoming request. If you have a high volume of traffic, this can potentially slow down the overall performance of your application significantly, especially if you enable the CVEs threat detection. See benchmark below:
$ go test -bench . -cpu=4
goos: linux
goarch: amd64
pkg: github.com/kitabisa/teler-waf
cpu: 11th Gen Intel(R) Core(TM) i9-11900H @ 2.50GHz
BenchmarkTelerDefaultOptions-4 42649 24923 ns/op 6206 B/op 97 allocs/op
BenchmarkTelerCommonWebAttackOnly-4 48589 23069 ns/op 5560 B/op 89 allocs/op
BenchmarkTelerCVEOnly-4 48103 23909 ns/op 5587 B/op 90 allocs/op
BenchmarkTelerBadIPAddressOnly-4 47871 22846 ns/op 5470 B/op 87 allocs/op
BenchmarkTelerBadReferrerOnly-4 47558 23917 ns/op 5649 B/op 89 allocs/op
BenchmarkTelerBadCrawlerOnly-4 42138 24010 ns/op 5694 B/op 86 allocs/op
BenchmarkTelerDirectoryBruteforceOnly-4 45274 23523 ns/op 5657 B/op 86 allocs/op
BenchmarkT elerCustomRule-4 48193 22821 ns/op 5434 B/op 86 allocs/op
BenchmarkTelerWithoutCommonWebAttack-4 44524 24822 ns/op 6054 B/op 94 allocs/op
BenchmarkTelerWithoutCVE-4 46023 25732 ns/op 6018 B/op 93 allocs/op
BenchmarkTelerWithoutBadIPAddress-4 39205 25927 ns/op 6220 B/op 96 allocs/op
BenchmarkTelerWithoutBadReferrer-4 45228 24806 ns/op 5967 B/op 94 allocs/op
BenchmarkTelerWithoutBadCrawler-4 45806 26114 ns/op 5980 B/op 97 allocs/op
BenchmarkTelerWithoutDirectoryBruteforce-4 44432 25636 ns/op 6185 B/op 97 allocs/op
PASS
ok github.com/kitabisa/teler-waf 25.759s

Note: Benchmarking results may vary and may not be consistent. Those results were obtained when there were >1.5k CVE templates and the teler-resources dataset may have increased since then, which may impact the results.

  • Configuration complexity: Configuring teler-waf to suit the specific needs of your application can be complex, and may require a certain level of expertise in web security. This can make it difficult for those who are not familiar with application firewalls and IDS systems to properly set up and use teler-waf.
  • Limited protection: teler-waf is not a perfect security solution, and it may not be able to protect against all possible types of attacks. As with any security system, it is important to regularly monitor and maintain teler-waf to ensure that it is providing the desired level of protection.

Known Issues

To view a list of known issues with teler-waf, please filter the issues by the "known-issue" label.

License

This program is developed and maintained by members of Kitabisa Security Team, and this is not an officially supported Kitabisa product. This program is free software: you can redistribute it and/or modify it under the terms of the Apache license. Kitabisa teler-waf and any contributions are copyright © by Dwi Siswanto 2022-2023.



Pinacolada - Wireless Intrusion Detection System For Hak5's WiFi Coconut


Pinacolada looks for typical IEEE 802.11 attacks and then informs you about them as quickly as possible. All this with the help of Hak5's WiFi Coconut, which allows it to listen for threats on all 14 channels in the 2.4GHz range simultaneously.


Supported 802.11 Attacks

Attack Type Status
Deauthentication DoS
Disassociation DoS
Authentication DoS
EvilTwin MiTM
KARMA MiTM

Dependencies

MacOS (With PIP/Python and Homebrew package manager)

pip install flask
brew install wireshark

Linux (With PIP/Python and APT package manager)

pip install flask
apt install tshark

For both operating systems install the WiFi Coconut's userspace

Installation

# Download Pinacolada
git clone https://github.com/90N45-d3v/Pinacolada
cd Pinacolada

# Start Pinacolada
python main.py

Usage

Pinacolada will be accessible from your browser at 127.0.0.1:8888.
The default password is CoconutsAreYummy.
After you have logged in, you can see a dashboard on the start page and you should change the password in the settings tab.

E-Mail Notifications

If configured, Pinacolada will alert you to attacks via E-Mail. In order to send you an E-Mail, however, an E-Mail account for Pinacolada must be specified in the settings tab. To find the necessary information such as SMTP server and SMTP port, search the internet for your mail provider and how their SMTP servers are configured + how to use them. Here are some information about known providers:

Provider SMTP Server SMTP Port (TLS)
Gmail smtp.gmail.com 587
Outlook smtp.office365.com 587
GoDaddy smtpout.secureserver.net 587

Not fully tested!

Since I don't own a WiFi Coconut myself, I have to simulate their traffic. So if you encounter any problems, don't hesitate to contact me and open an issue.



Why You Should Opt Out of Sharing Data With Your Mobile Provider

A new breach involving data from nine million AT&T customers is a fresh reminder that your mobile provider likely collects and shares a great deal of information about where you go and what you do with your mobile device — unless and until you affirmatively opt out of this data collection. Here’s a primer on why you might want to do that, and how.

Image: Shutterstock

Telecommunications giant AT&T disclosed this month that a breach at a marketing vendor exposed certain account information for nine million customers. AT&T said the data exposed did not include sensitive information, such as credit card or Social Security numbers, or account passwords, but was limited to “Customer Proprietary Network Information” (CPNI), such as the number of lines on an account.

Certain questions may be coming to mind right now, like “What the heck is CPNI?” And, ‘If it’s so ‘customer proprietary,’ why is AT&T sharing it with marketers?” Also maybe, “What can I do about it?” Read on for answers to all three questions.

AT&T’s disclosure said the information exposed included customer first name, wireless account number, wireless phone number and email address. In addition, a small percentage of customer records also exposed the rate plan name, past due amounts, monthly payment amounts and minutes used.

CPNI refers to customer-specific “metadata” about the account and account usage, and may include:

-Called phone numbers
-Time of calls
-Length of calls
-Cost and billing of calls
-Service features
-Premium services, such as directory call assistance

According to a succinct CPNI explainer at TechTarget, CPNI is private and protected information that cannot be used for advertising or marketing directly.

“An individual’s CPNI can be shared with other telecommunications providers for network operating reasons,” wrote TechTarget’s Gavin Wright. “So, when the individual first signs up for phone service, this information is automatically shared by the phone provider to partner companies.”

Is your mobile Internet usage covered by CPNI laws? That’s less clear, as the CPNI rules were established before mobile phones and wireless Internet access were common. TechTarget’s CPNI primer explains:

“Under current U.S. law, cellphone use is only protected as CPNI when it is being used as a telephone. During this time, the company is acting as a telecommunications provider requiring CPNI rules. Internet use, websites visited, search history or apps used are not protected CPNI because the company is acting as an information services provider not subject to these laws.”

Hence, the carriers can share and sell this data because they’re not explicitly prohibited from doing so. All three major carriers say they take steps to anonymize the customer data they share, but researchers have shown it is not terribly difficult to de-anonymize supposedly anonymous web-browsing data.

“Your phone, and consequently your mobile provider, know a lot about you,” wrote Jack Morse for Mashable. “The places you go, apps you use, and the websites you visit potentially reveal all kinds of private information — e.g. religious beliefs, health conditions, travel plans, income level, and specific tastes in pornography. This should bother you.”

Happily, all of the U.S. carriers are required to offer customers ways to opt out of having data about how they use their devices shared with marketers. Here’s a look at some of the carrier-specific practices and opt-out options.

AT&T

AT&T’s policy says it shares device or “ad ID”, combined with demographics including age range, gender, and ZIP code information with third parties which explicitly include advertisers, programmers, and networks, social media networks, analytics firms, ad networks and other similar companies that are involved in creating and delivering advertisements.

AT&T said the data exposed on 9 million customers was several years old, and mostly related to device upgrade eligibility. This may sound like the data went to just one of its partners who experienced a breach, but in all likelihood it also went to hundreds of AT&T’s partners.

AT&T’s CPNI opt-out page says it shares CPNI data with several of its affiliates, including WarnerMedia, DirecTV and Cricket Wireless. Until recently, AT&T also shared CPNI data with Xandr, whose privacy policy in turn explains that it shares data with hundreds of other advertising firms. Microsoft bought Xandr from AT&T last year.

T-MOBILE

According to the Electronic Privacy Information Center (EPIC), T-Mobile seems to be the only company out of the big three to extend to all customers the rights conferred by the California Consumer Privacy Act (CCPA).

EPIC says T-Mobile customer data sold to third parties uses another unique identifier called mobile advertising IDs or “MAIDs.” T-Mobile claims that MAIDs don’t directly identify consumers, but under the CCPA MAIDs are considered “personal information” that can be connected to IP addresses, mobile apps installed or used with the device, any video or content viewing information, and device activity and attributes.

T-Mobile customers can opt out by logging into their account and navigating to the profile page, then to “Privacy and Notifications.” From there, toggle off the options for “Use my data for analytics and reporting” and “Use my data to make ads more relevant to me.”

VERIZON

Verizon’s privacy policy says it does not sell information that personally identities customers (e.g., name, telephone number or email address), but it does allow third-party advertising companies to collect information about activity on Verizon websites and in Verizon apps, through MAIDs, pixels, web beacons and social network plugins.

According to Wired.com’s tutorial, Verizon users can opt out by logging into their Verizon account through a web browser or the My Verizon mobile app. From there, select the Account tab, then click Account Settings and Privacy Settings on the web. For the mobile app, click the gear icon in the upper right corner and then Manage Privacy Settings.

On the privacy preferences page, web users can choose “Don’t use” under the Custom Experience section. On the My Verizon app, toggle any green sliders to the left.

EPIC notes that all three major carriers say resetting the consumer’s device ID and/or clearing cookies in the browser will similarly reset any opt-out preferences (i.e., the customer will need to opt out again), and that blocking cookies by default may also block the opt-out cookie from being set.

T-Mobile says its opt out is device-specific and/or browser-specific. “In most cases, your opt-out choice will apply only to the specific device or browser on which it was made. You may need to separately opt out from your other devices and browsers.”

Both AT&T and Verizon offer opt-in programs that gather and share far more information, including device location, the phone numbers you call, and which sites you visit using your mobile and/or home Internet connection. AT&T calls this their Enhanced Relevant Advertising Program; Verizon’s is called Custom Experience Plus.

In 2021, multiple media outlets reported that some Verizon customers were being automatically enrolled in Custom Experience Plus — even after those customers had already opted out of the same program under its previous name — “Verizon Selects.”

If none of the above opt out options work for you, at a minimum you should be able to opt out of CPNI sharing by calling your carrier, or by visiting one of their stores.

THE CASE FOR OPTING OUT

Why should you opt out of sharing CPNI data? For starters, some of the nation’s largest wireless carriers don’t have a great track record in terms of protecting the sensitive information that you give them solely for the purposes of becoming a customer — let alone the information they collect about your use of their services after that point.

In January 2023, T-Mobile disclosed that someone stole data on 37 million customer accounts, including customer name, billing address, email, phone number, date of birth, T-Mobile account number and plan details. In August 2021, T-Mobile acknowledged that hackers made off with the names, dates of birth, Social Security numbers and driver’s license/ID information on more than 40 million current, former or prospective customers who applied for credit with the company.

Last summer, a cybercriminal began selling the names, email addresses, phone numbers, SSNs and dates of birth on 23 million Americans. An exhaustive analysis of the data strongly suggested it all belonged to customers of one AT&T company or another. AT&T stopped short of saying the data wasn’t theirs, but said the records did not appear to have come from its systems and may be tied to a previous data incident at another company.

However frequently the carriers may alert consumers about CPNI breaches, it’s probably nowhere near often enough. Currently, the carriers are required to report a consumer CPNI breach only in cases “when a person, without authorization or exceeding authorization, has intentionally gained access to, used or disclosed CPNI.”

But that definition of breach was crafted eons ago, back when the primary way CPNI was exposed was through “pretexting,” such when the phone company’s employees are tricked into giving away protected customer data.

In January, regulators at the U.S. Federal Communications Commission (FCC) proposed amending the definition of “breach” to include things like inadvertent disclosure — such as when companies expose CPNI data on a poorly-secured server in the cloud. The FCC is accepting public comments on the matter until March 24, 2023.

While it’s true that the leak of CPNI data does not involve sensitive information like Social Security or credit card numbers, one thing AT&T’s breach notice doesn’t mention is that CPNI data — such as balances and payments made — can be abused by fraudsters to make scam emails and text messages more believable when they’re trying to impersonate AT&T and phish AT&T customers.

The other problem with letting companies share or sell your CPNI data is that the wireless carriers can change their privacy policies at any time, and you are assumed to be okay with those changes as long as you keep using their services.

For example, location data from your wireless device is most definitely CPNI, and yet until very recently all of the major carriers sold their customers’ real-time location data to third party data brokers without customer consent.

What was their punishment? In 2020, the FCC proposed fines totaling $208 million against all of the major carriers for selling their customers’ real-time location data. If that sounds like a lot of money, consider that all of the major wireless providers reported tens of billions of dollars in revenue last year (e.g., Verizon’s consumer revenue alone was more than $100 billion last year).

If the United States had federal privacy laws that were at all consumer-friendly and relevant to today’s digital economy, this kind of data collection and sharing would always be opt-in by default. In such a world, the enormously profitable wireless industry would likely be forced to offer clear financial incentives to customers who choose to share this information.

But until that day arrives, understand that the carriers can change their data collection and sharing policies when it suits them. And regardless of whether you actually read any notices about changes to their privacy policies, you will have agreed to those changes as long as you continue using their service.

When Does My Child Really Need A Phone?

Deciding when to give your child a phone is not an easy task. Should you wait until they start high school or until they catch public transport home alone from school? Or, should 10 be the magic age when they become official phone owners? Or do hold off as long as you can until you can no longer bear their moaning that everyone else has one except for them!! 

How I Made The Decision 

When my boys were younger (and I knew a little less), we had a family ‘understanding’ that when the boys started Year 5, they would receive a (very cheap and likely second hand) phone. Up until Year 5, my boys would go to after-school care. Somehow, turning 10 and entering Middle School meant after-school care wasn’t really that ‘cool’ anymore, so instead they required a phone so they could safely catch the train home by themselves. The fact that they could also use these devices to play games and talk to their friends was of course, only a secondary consideration for them! 😉 

That was how we managed the phone situation but let me assure you, almost every other family we knew had a different approach. Some gifted their offspring the latest iPhones as soon as they were requested, others provided a phone but with no ‘credit’ so the devices could only be used to receive calls. Others chose to wait till Year 7 and beyond and made their kids pay for the phone plan out of their pocket money.  

Now, I’m a big fan of parents choosing what works best – no one knows a child quite like a parent does, right? But the problem is, deciding what’s right can be really overwhelming. So, I’ve put together a list of things to consider when making this all important decision. Once you’ve worked through these points, I am sure you’ll feel more confident to make a decision that works for both you and your child. 

How Responsible and Savvy Is Your Child? 

Having parented 4 very different boys, I am the first to confirm that every child grasps personal responsibility at different stages. Some kids just have a knack for losing things while others have the same lunchbox their entire school career! Some kids just get the consequence of spending money while others spend up big whilst gaming online, blissfully unaware of their bill.  

You child’s digital reputation should also be worth considering when making your decision. Some kids understand that their online behaviour forms a key part of their reputation while others will charge forth in a heated online exchange without thinking.  

I really believe there is a direct link between social smarts and a positive online experience. When a child can read a situation and instinctively know when to shut it down or withdraw, their online experience will be far more rewarding. If your child is slow to catch on to social cues, they may struggle with posting and communicating online.   

Will A Phone Really Help With Safety? 

When I was deliberating about giving my eldest son a phone, he really went hard with the safety argument – knowing it would appeal to my parental anxiety. So, I relented but he had to promise to answer when I called. And he did – usually!! But it’s worth pointing out that a device itself doesn’t guarantee safety. If your kids are travelling home from school, they still need to know how to cross the road, not to talk to strangers and to always lock the front door once home. A phone doesn’t teach this. But I personally did find it handy (and anxiety reducing) to be able to give them a quick call to give them a few reminders and ensure all was well. 

When my younger boys received their phones, tracking apps like Life 360 were available. I know, they are controversial but, personally I found these super helpful. Being able to see where they were after school and to ensure they were heading in the right direction on the train, brought me great comfort to me when I was beating away on my keyboard at work.  

Could A ‘Dumb Phone’ Or Parental Controls Help? 

If, after reading this, you’re thinking that your child really isn’t ready but still love the idea of being able to contact them, why not consider parental controls or a phone with limited features?  

Putting age-appropriate boundaries around what your child does on their device is what parental controls will do. If you decide that you don’t want them to download TikTok, play particular games or view certain categories of websites, then this maybe your answer. You can also choose to set limits on their daily screen time and block out times when their phone can’t be used. Check out McAfee’s SafeFamily parental controls for peace of mind. 

Or, instead, why not make a ‘dumb’ phone their only option? A basic dumb phone lacks the advanced functionality of most smartphones – think phones before the internet. This means you’ll be able to call and text them but will probably be more relaxed knowing they’re not researching the latest fads on TikTok!  

Some companies have designed dumb phones for kids that even have built in parental controls. Open Mobile has a SmartKids Phone with a built-in GPS tracker and SOS button and comes without a camera. It does have internet connectivity but parents can see which apps have been downloaded, restrict specific apps and nominate what days and times apps can be used. A perfect option for a tween or young teenager! 

Connection 

Now, before making your final decision, I think it’s essential to think about your child’s sense of connectedness. As adults, we all know that being part of a community and ‘belonging’ is critical to mental health and self-worth. And I would not be doing my job if I didn’t remind you of just how fabulous a phone can be for staying in touch with your people. Just take a moment to remember how essential devices were for survival during Covid lockdowns.  

So, over to you mums and dads. This is definitely one of the trickiest decisions you’ll make in your parenting journey but don’t forget that you know your child best. You’ve got this! 

The post When Does My Child Really Need A Phone? appeared first on McAfee Blog.

Online safety laws: What’s in store for children’s digital playgrounds?

As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in the digital realm

The post Online safety laws: What’s in store for children’s digital playgrounds? appeared first on WeLiveSecurity

Gaming: How much is too much for our children?

With many children spending a little too much time playing video games, learn to spot the signs that things may be spinning out of control

The post Gaming: How much is too much for our children? appeared first on WeLiveSecurity

‘Tis the season for gaming: Keeping children safe (and parents sane)

It’s all fun and games over the holidays, but is your young gamer safe from the darker side of the action?

The post ‘Tis the season for gaming: Keeping children safe (and parents sane) appeared first on WeLiveSecurity

How to set up parental controls on your child’s new smartphone

Give yourself peace of mind and help create a safe online space for your child using Android or iOS parental controls

The post How to set up parental controls on your child’s new smartphone appeared first on WeLiveSecurity

Help! My kid has asked Santa for a smartphone

The time has come for your child to receive their first smartphone. Before handing it over, however, make sure to help them use their new gadget safely and responsibly.

The post Help! My kid has asked Santa for a smartphone appeared first on WeLiveSecurity

Whids - Open Source EDR For Windows


What

EDR with artifact collection driven by detection. The detection engine is built on top of a previous project Gene specially designed to match Windows events against user defined rules.

What do you mean by "artifact collection driven by detection" ?

It means that an alert can directly trigger some artifact collection (file, registry, process memory). This way you are sure you collected the artifacts as soon as you could (near real time).

All this work has been done on my free time in the hope it would help other people, I hope you will enjoy it. Unless I get some funding to further develop this project, I will continue doing so. I will make all I can to fix issues in time and provide updates. Feel free to open issues to improve that project and keep it alive.


Why

  • Provide an Open Source EDR to the community
  • Make transparency on the detection rules to make analysts understand why a rule triggered
  • Offer powerful detection primitives though a flexible rule engine
  • Optimize Incident Response processes by drastically reducing the time between detection and artifact collection

How

NB: the EDR agent can be ran standalone (without being connected to an EDR manager)

Strengths

  • Open Source
  • Relies on Sysmon for all the heavy lifting (kernel component)
  • Very powerful but also customizable detection engine
  • Built by an Incident Responder for all Incident Responders to make their job easier
  • Low footprint (no process injection)
  • Can co-exist with any antivirus product (advised to run it along with MS Defender)
  • Designed for high throughput. It can easily enrich and analyze 4M events a day per endpoint without performance impact. Good luck to achieve that with a SIEM.
  • Easily integrable with other tools (Splunk, ELK, MISP ...)
  • Integrated with ATT&CK framework

Weaknesses

  • Only works on Windows
  • Detection limited to what is available in Windows event logs channels ETW providers/sessions (already a lot in there)
  • No process instrumentation (it is also a strength as it depends on the point of view)
  • No GUI yet (will develop one if requested by the community)
  • No support for ETW (available in beta)
  • Tell me if you notice others ...

Installation

Requirements

  1. Install Sysmon
  2. Configure Sysmon
    • You can find optimized Sysmon configurations here
    • Logging any ProcessCreate and ProcessTerminate is mandatory
  3. Take note of the path to your Sysmon binary because you will need it later on

NB: event filtering can be done at 100% with Gene rules so do not bother creating a complicated Sysmon configuration.

Pre-Installation Recommendations

In order to get the most of WHIDS you might want to improve your logging policy.

  • Enable Powershell Module Logging
  • Audit Service Creation: gpedit.msc -> Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies\System\Audit Security System Extension -> Enable
  • Enable File System Audit. Sysmon only provides FileCreate events when new files are created, so if you want/need to log other kind of accesses (Read, Write, ...) you need to enable FS Auditing.
    1. gpedit.msc -> Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies\Object Access\Audit File System -> Enable
    2. Right Click Any Folder -> Properties -> Security -> Advanced -> Auditing -> Add
      1. Select a principal (put here the name of the user/group you want the audit for). Put group Everyone if you want to log access from any user.
      2. Apply this to is used to select the scope of this audit policy starting from the folder you have selected
      3. Basic permissions select the kinds of accesses you want the logs to be generated for
      4. Validate
    3. File System auditing logs will appear in the Security log channel
  • If you want an antivirus to run on your endpoints, keep Microsoft Defender, first because it is a good AV but also because it logs alerts in a dedicated log channel Microsoft-Windows-Windows Defender/Operational monitored by the EDR.

EDR Endpoint agent (Whids.exe)

This section covers the installation of the agent on the endpoint.

  1. Download and extract the latest WHIDS release https://github.com/0xrawsec/whids/releases
  2. Run manage.bat as administrator
  3. Launch installation by selecting the appropriate option
  4. Verify that files have been created at the installation directory
  5. Edit configuration file by selecting the appropriate option in manage.bat or using your preferred text editor
  6. Skip this if running with a connection to a manager, because rules will be updated automatically. If there is nothing in the rules directory the tool will be useless, so make sure there are some gene rules in there. Some rules are packaged with WHIDS and you will be prompted to choose if you want to install those or not. If you want the last up to date rules, you can get those here (take the compiled ones)
  7. Start the services from appropriate option in manage.bat or just reboot (preferred option otherwise some enrichment fields will be incomplete leading to false alerts)
  8. If you configured a manager do not forget to run it in order to receive alerts and dumps

NB: At installation time the Sysmon service will be made dependent of WHIDS service so that we are sure the EDR runs before Sysmon starts generating some events.

EDR Manager

The EDR manager can be installed on several platforms, pre-built binaries are provided for Windows, Linux and Darwin.

  1. Create TLS certificate if needed for HTTPS connections
  2. Create a configuration file (there is a command line argument to generate a basic config)
  3. Run the binary

Configuration Examples

Please visit doc/configuration.md

Further Documentation

Known Issues

  • Does not work properly when ran from a network share mapped as a network drive (this case prevent whids to identify itself and thus generate some noise). Example: if \\vbox\test is mounted as Z: drive, running Z:\whids.exe won't work while running \\vbox\test\whids.exe actually would.

Roadmap until next release

  • find a new name to the project because we all agree it sucks
  • better sysmon integration (config, deployment, update)
  • endpoint configuration from manager
  • tooling management (update, install), like OSQuery
  • code refactoring and optimization
  • implement a performance monitor
  • get rid of any on-disk configuration
  • implement IOC management capabilities
  • ETW support
  • automatic documentation (OpenAPI) and testing of manager's API
  • provide endpoint system information in manager
  • implement actionable rules
  • provide canary file management
  • builtin commands to be executed by endpoints
  • provide Incident Response reports about endpoints
  • overall manager API improvement
  • provide event streams so that a client can receive events in realtime
  • standardize HTTP headers
  • provide a python library to interact with EDR manager (https://github.com/0xrawsec/pywhids)

Changelog

v1.7

  • New Administrative HTTP API with following features:
    • Manage endpoints (list, create, delete)
    • Get basic statistics about the manager
    • Execute commands on endpoints and get results
      • Can drop files prior to execution, to execute binaries/scripts not present on endpoint. Dropped files are deleted after command was ran.
      • Can retrieve files (post command execution), to retrieve results of the command
    • Collect files from endpoints for forensic purposes
    • Contain / Uncontain endpoints by restricting any network traffic except communication to the manager.
    • Query endpoints logs
    • Query endpoints alerts
    • Pivot on a timestamp and retrieve logs/alerts around that time pivot
    • Access endpoint report
      • Scoring (relative to each environment) allowing to sort endpoints and spot the ones behaving differently from the others.
      • Alerts / TTPs observed on a given time frame
    • Manage rules (list, create, update, save, delete)
  • Integration with Sysmon v12 and v13
    • Integrate ClipboardData events
      • Put the content of the clipboard data inside the event to allow creating rule on the content of the clipboard
    • Integrate ProcessTampering events
      • Enrich event with a diffing score between .text section on disk and in memory
  • Implemented certificate pinning on client to enhance security of the communication channel between endpoints and management server
  • Log filtering capabilities, allowing one to collect contextual events. Log filtering is achieved by creating Gene filtering rules (c.f. Gene Documentation).
  • Configuration files in TOML format for better readability
  • Better protection of the installation directory

Related Work

Sponsors

Github:https://github.com/tines Website:https://www.tines.com/ Twitter:@tines_io



Protecting teens from sextortion: What parents should know

Online predators increasingly trick or coerce youth into sharing explicit videos and photos of themselves before threatening to post the content online

The post Protecting teens from sextortion: What parents should know appeared first on WeLiveSecurity

5 tips to help children navigate the internet safely

The online world provides children with previously unimagined opportunities to learn and socialize, but it also opens them up to a range of hazards. How can you steer kids toward safe internet habits?

The post 5 tips to help children navigate the internet safely appeared first on WeLiveSecurity

Smartphone Alternatives: Ease Your Way into Your Child’s First Phone

By: McAfee

“But everyone else has one.” 

Those are familiar words to a parent, especially if you’re having the first smartphone conversation with your tween or pre-teen. In their mind, everyone else has a smartphone so they want a one too. But does “everyone” really have one? Well, your child isn’t wrong.  

Our recent global study found that 76% of children aged 10 to 14 reported using a smartphone or mobile device, with Brazil leading the way at 95% and the U.S. trailing the global average at 65%.   

Our figures show that younger children with smartphones and mobile devices make up a decisive majority of younger children overall. 

Of course, just because everyone else has smartphone doesn’t mean that it’s necessarily right for your child and your family. After all, with a smartphone comes access to a wide and practically unfettered world of access to the internet, apps, social media, instant messaging, texting, and gaming, all within nearly constant reach. Put plainly, some tweens and pre-teens simply aren’t ready for that just yet, whether in terms of their maturity, habits, or ability to care for and use a device like that responsibly. 

Yet from a parent’s standpoint, a first smartphone holds some major upsides. One of the top reasons parents give a child a smartphone is “to stay in touch,” and that’s understandable. There’s something reassuring knowing that your child is a call or text away—and that you can keep tabs on their whereabouts with GPS tracking. Likewise, it’s good to know that they can reach you easily too. Arguably, that may be a reason why some parents end up giving their children a smartphone a little sooner than they otherwise would.  

However, you don’t need a smartphone to do to text, track, and talk with your child. You have alternatives. 

Smartphone alternatives 

One way to think about the first smartphone is that it’s something you ease into. In other words, if the internet is a pool, your child should learn to navigate the shallows with some simpler devices before diving into the deep end with a smartphone.  

Introducing technology and internet usage in steps can build familiarity and confidence for them while giving you control. You can oversee their development, while establishing rules and expectations along the way. Then, when the time is right, they can indeed get their first smartphone. 

But how to go about that? 

It seems a lot of parents have had the same idea and device manufacturers have listened. They’ve come up with smartphone alternatives that give kids the chance to wade into the mobile internet, allowing them to get comfortable with device ownership and safety over time without making the direct leap to a fully featured smartphone. Let’s look at some of those options, along with a few other long-standing alternatives. 

GPS trackers for kids 

These small and ruggedly designed devices can clip to a belt loop, backpack, or simply fit in a pocket, giving you the ability to see your child’s location. In all, it’s quite like the “find my” functionality we have on our smartphones. When it comes to GPS trackers for kids, you’ll find a range of options and form factors, along with different features such as an S.O.S. button, “geofencing” that can send you an alert when your child enters or leaves a specific area (like home or school), and how often it sends an updated location (to regulate battery life).  

Whichever GPS tracker you select, make sure it’s designed specifically for children. So-called “smart tags” designed to locate things like missing keys and wallets are just that—trackers designed to locate things, not children. 

Smart watches for kids 

With GPS tracking and many other communication-friendly features for families, smart watches can give parents the reassurance they’re looking for while giving kids a cool piece of tech that they can enjoy. The field of options is wide, to say the least. Smart watches for kids can range anywhere from devices offered by mobile carriers like Verizon, T-Mobile, and Vodaphone to others from Apple, Explora, and Tick Talk. Because of that, you’ll want to do a bit of research to determine the right choice for you and your child.  

Typical features include restricted texting and calling, and you’ll find that some devices are more durable and more water resistant than others, while yet others have cameras and simple games. Along those lines, you can select a smart watch that has a setting for “school time” so that it doesn’t become a distraction in class. Also, you’ll want to look closely at battery life, as some appear to do a better job of holding a charge than others.  

Smartphones for kids 

Another relatively recent entry on the scene are smartphones designed specifically for children, which offer a great step toward full-blown smartphone ownership. These devices look, feel, and act like a smartphone, but without web browsing, app stores, and social media. Again, features will vary, yet there are ways kids can store and play music, stream it via Bluetooth to headphones or a speaker, and install apps that you approve of.  

Some are paired with a parental control app that allows you to introduce more and more features over time as your child as you see fit—and that can screen texts from non-approved contacts before they reach your child. Again, a purchase like this one calls for some research, yet names like Gabb wireless and the Pinwheel phone offer a starting point. 

The flip phone 

The old reliable. Rugged and compact, and typically with a healthy battery life to boot, flip phones do what you need them to—help you and your child keep in touch. They’re still an option, even if your child may balk at the idea of a phone that’s “not as cool as a smartphone.” However, if we’re talking about introducing mobile devices and the mobile internet to our children in steps, the flip phone remains in the mix.  

Some are just phones and nothing else, while other models can offer more functionality like cameras and slide-out keyboards for texting. And in keeping with the theme here, you’ll want to consider your options so you can pick the phone that has the features you want (and don’t want) for your child. 

Ease into that first smartphone 

Despite what your younger tween or pre-teen might think, there’s no rush to get that first smartphone. And you know it too. You have time. Time to take eventual smartphone ownership in steps, with a device that keeps you in touch and that still works great for your child.  

By easing into that first smartphone, you’ll find opportunities where you can monitor and guide their internet usage. You’ll also find plenty of moments to help your child start forming healthy habits around device ownership and care, etiquette, and safety online. In all, this approach can help you build a body of experience that will come in handy when that big day finally comes—first smartphone day. 

The post Smartphone Alternatives: Ease Your Way into Your Child’s First Phone appeared first on McAfee Blog.

How To Get Your Head Around Your Kids’ Online Gaming Life

Let’s be honest – many of us parents aren’t big fans of gaming. In fact, some of us have probably even been known to roll our eyes or groan when we think about just how long our kids spend playing online games. But if there is one thing I’ve learned after 25 years of parenting, it’s that taking the time to look at a stressful family situation from the perspective of my children, can be very powerful. In fact, it can almost always fast track finding a mutually agreeable work-around for everyone – and gaming is the perfect example.  

Why Do Our Kids Love Gaming? 

We have all read about how online gaming can provide players with regular hits of dopamine  –  a neurotransmitter in the brain that becomes active when you participate in fun and pleasurable activities. Now I am not disputing this for a moment – I’ve witnessed it firsthand! However, it is important to remember that dopamine increases whenever we do anything enjoyable – pop a square of chocolate in our mouth or watch our favorite sporting team win – not just when we play online games. 

Many online games have cleverly designed built-in reward systems, and many experts believe that it is the combination of dopamine and reward that probably best explains why our kids are such gaming fans. Now, these reward systems are intentionally unpredictable so players are aware they will eventually get a reward, but they have no idea as to when or how often it is coming – so they are compelled to keep playing! Very clever! 

In my opinion, gaming also fills several other needs in our children – the need to belong, to feel competent and be independent. And while we may have had these needs addressed very differently in the 70’s and 80’s – hanging at the bus stop, mastering the Rubix cube and not being helicopter parented, our batch of digital natives will often use gaming as their go-to solution. 

Why You Should See Gaming Through The Eyes of Your Child 

When many of us parents think about our kids’ online gaming, our initial thought is ‘how do we make our kids stop’. But I can you this isn’t the right approach. Online gaming isn’t going anywhere. So, taking the time to see gaming from your child’s perspective and understand why it is such a big part of their life is where you need to focus your energy. I guarantee this will further strengthen your relationship with your child and help you introduce rules that they will better respect. 

Let’s take a moment to channel the great Atticus Finch from To Kill a Mockingbird and focus on his words of inspiration for us all: ‘“You never really understand a person until you consider things from his point of view…until you climb into his skin and walk around in it.” Ah yes – very wise words! 

My Top Tips For A Happy Gaming Family 

So, if you are keen to stop gaming being a negative issue in your family, here are my top tips to help you get it under control and stop it causing family tension: 

1. Change Your Thinking 

If you find yourself thinking ‘how do I get my kids to stop gaming’, you’re barking up the wrong tree. Gaming isn’t going anywhere and as parents, we don’t want to drive an unnecessary wedge between ourselves and our kids. Instead, commit to having an open mind. Think ’Ok, let’s give this gaming thing a go’. 

2. Talk To Your Kids About Their Gaming – With No Tone 

When the time is right, ask your kids what their favourite games are and why. Your aim is to get them talking. You could even do your research in advance and drop in the names of a few popular games to ask them about. ‘My work friend’s son plays Roblox, do you know much about that?’ 

3. Play Along! 

Even if you aren’t that interested, I promise, playing along will open your eyes. You’ll better understand how the game’s reward system works and what it feels like to get a shot of digital dopamine! And most importantly, it will be great for your relationship with your child. By taking the time to play with them, you are showing that you are interested in their life and their hobbies.   

4. Educate Yourself About All Thing Gaming 

When your kids started their social media journey, chances are you spent a little time familiarising yourself with the various platforms they joined. Well, you need to adopt the same approach with their gaming life too. Here are a few areas to focus on:  

  • Check out Discord – an online community where a lot of gamers spend time sharing tips and ‘cheats’. Check out an article I wrote about Discord here. 
  • Suss out Twitch – it’s a live streaming video gaming site where loads of kids spend loads of time watching others game. Yes, this is a thing!  
  • Big time gamers are now considered ‘influencers’. It’s not uncommon for tweens and teens to watch then play on Twitch, subscribe to their YouTube channel, and then follow them on Instagram. They can have a lot of sway! 
  • Do your research on the games your kids play. Having an open mind about gaming doesn’t mean it’s OK for them to play games that are not age-appropriate.  

5. Introduce Fair, Age-Appropriate Rules Around Gaming 

Once you’ve taken the time to understand your child’s gaming life, cleared your mind of any unnecessary negative gaming thoughts and done your research, why not put together a set of family rules for gaming? You may like to consider a family tech agreement and have a separate section for gaming. Or you may prefer to keep it more casual and have the rules written on the fridge or shared in the family group chat. Regardless of what you choose, ensure that you introduce these boundaries when everyone is calm and in a good head space NOT when you’re in the middle of a verbal stoush! 

You could choose to give your children a set amount of time they can use each week on gaming and then let them choose when to use it or you allocate a small time everyday once they’ve completed homework and chores. When my boys were younger, I didn’t allow gaming Monday – Thursday but after school Friday was always quite the gaming fest – a reward for getting through the school week. Do what works for your family!   

There’s no question that this digital parenting gig is complicated. Trying to help your kids find the right balance between embracing the online world and offline world can often feel hard to get right. But if you’re ever in doubt about whether you’re on track when it comes to managing your kids’ gaming, always ask yourself – have I kept an open mind? Have I taken the time to talk to my kids and understand their gaming life? Are the gaming rules fair? And, if you have answered yes, then I have every confidence that you have the right approach to ensuring gaming is a positive part of your family’s life.  

The post How To Get Your Head Around Your Kids’ Online Gaming Life appeared first on McAfee Blog.

Why You Need to Get a Family Technology Agreement Happening

There were multiple times during my digital parenting journey when I would have loved to put my head in the sand. Pretend that life was easy and that my kids weren’t going to grow up and want devices and to join social media. But I didn’t. I couldn’t. With four kids who had technology running through their veins, I had no choice but to embrace it. 

It’s All About Phones 

While many kids will first experience the internet from a family laptop or via their parent’s phone at a coffee shop (we’ve all done it), it’s when they get these devices into their hot little hands unsupervised a few years down the track that the real show starts. And that’s usually when they get access to a phone. Research from our eSafety Office shows that just under half of Aussie kids between 6 and 13 use a smartphone with about 1/3 owning their own device 

And while we can all wax lyrical about the good old days when we used payphones and how great it would be if our kids didn’t have smartphones, we need to keep it real. Technology is not going anywhere so the best thing we can to accept it’s here, educates our kids about how to use it safely and introduce boundaries and rules to ensure they are as safe as possible.  

So, without further ado, let me introduce you to the concept of a family technology contract – a great way to manage your kids and their tech use. 

What Is a Family Technology Contract?  

I like to think of a tech agreement as a clear outline of your expectations of your kids’ digital behavior – any behavior that occurs while using a device should be included in the agreement and yes, include TV here too! Now, before we progress, I have to share one key tip – don’t even think of putting together an agreement like this when tensions are high, or a heated argument is still in place – it will never work. Only talk about this or start working on it when you are in a calm and serene headspace.  

The most important thing is to have an agreement that is suitable for your kids’ ages and maturity and one that works for your family’s schedule. There’s no point making your 5-year-old sign an agreement that limits their time on Instagram when they’re probably quite happy visiting only the online sites that you have ‘bookmarked’ for them. And if your kids have a super busy schedule then you might want to include a rule that means there is no ‘leisure screen time’ (eg TV/movie viewing) till all homework is complete.  

How Old Do My Kids Need To Be? 

While it’s entirely based on your kids’ interests and tech usage, I think 3 is a good age to start with a basic agreement. That’s when they start understanding rules. And how old is too old for a tech contract, I hear you ask? Well, I acknowledge that introducing new rules and boundaries when your kids are well into their teens may be difficult however if things feel out of control and you are concerned about their mental health and less than ideal digital habits then it may also be exactly what you all need! 

What Should An Agreement Include? 

Keeping an agreement age-appropriate and relevant is essential. You may also want to keep it simple and focus on a few key things, such as: 

  • Be kind online always 
  • Never share passwords with your friends 
  • Always tell an adult if you see anything that upsets or scares you 

But it can include so much more. Here are some items you may choose to include in your own personalized version. Think of this list as a shopping list. Simply, pick & choose what works for the ages of your kids and your family’s structure. 

Time Limits/Device Usage 

  • I will ask permission before I use my device (younger children). 
  • I can use the internet/my devices/TV for __ hours a day after school. 
  • I can’t use my devices past __ pm in the evening. 
  • When I am not using my device, I will place it ___________.  
  • I will place my device in the family charging zone overnight. (This could be on the kitchen bench in a study, whatever works for your family) 

Responsibility 

  • I understand that any internet-enabled device (eg smartphone and laptop) can give me access to many things that may not be suitable for my age. I will use my devices safely and avoid clicking on any appropriate sites. (You could choose to list sites your kids can’t visit however this maybe, in fact, give them ideas! You choose what works best). 
  • I understand that it is my responsibility to protect my personal information and not share it freely online. This includes my name, family details, school, telephone numbers, and address. 
  • I will keep my password private and not share it with anyone outside my family. 
  • I understand that not everything is as it seems online and that being safe (and savvy) online means thinking critically and questioning whether it is true. 
  • I will not use a credit card online without permission from my parents. 
  • I will close down pop-up or banner ads and not click on them. 

Safety 

  • I will not share my location while using my devices.  
  • I will allow my parents to adjust the privacy settings on this device and monitor my activity. I understand that this is for my own safety. If older: I will ensure privacy settings are always on and set to the highest level for every social media platform I use. 
  • If anyone pressures me or makes me feel uncomfortable, I will stop talking to them and tell a family member or trusted adult.  
  • I understand that people are not always who they say they are online. 
  • I will not talk to anyone online who I don’t know in real life. 
  • I will not meet up with anyone I first met online without permission from my parents. 

Online Behaviour 

  • Being kind and respectful online is essential.  
  • I will only talk to people I know in real life when I am online (ideally, we’d want all our kids to agree to this but in reality, older teens won’t cop this. So, this is more suitable for younger kids) 
  • I will not be hurtful or mean to others on social media. This includes messaging, commenting, posting, liking, and sharing mean or hateful content.  
  • If I feel like I am being harassed or bullied online, I will tell a trusted adult.  
  • I will ask permission before I share pictures or videos of my friends. 
  • I will not share any content that is too revealing. This includes posting or sending inappropriate photos or messages. 

Smartphone Usage 

  • I will ensure my mobile phone stays in its protective case at all times. If it or the screen protector cracks or breaks, I will tell my parents.  
  • I will not use my phone when at school unless ___________________________. 
  • These places are no-phone zones:  
  1. Our family does not use our phones during dinner. 
  2. I will shut off my phone at __ pm and it will not be turned back on until ___ am. (You could also add here – after breakfast and/or until I am ready for school. 
  3. I will get permission from my parents before I download any apps on my smartphone – this includes games. 

Gaming 

  • I can play games that are rated: _____. (Ratings on games range from G, PG, M, MA15+ to R here in Australia). Please do your research here and work out what’s suitable for your kids. Check out the Australian Classification Board’s latest ratings for games to help make your decision. 
  • Video games that I am not allowed to play at my home, or anyone else’s home include: (list what games are off-limits) 
  • I will ensure my privacy settings are set to the highest level. 
  • I will not talk to people I don’t know in real life while gaming. 

Consequences 

I understand that access to my devices is a privilege and breaking this agreement will lead to the following consequences: (list what you feel is appropriate) 

Formalizing The Agreement 

I would have all parties sign and date the agreement: both parents and kids. You may choose to keep a copy on the fridge? Again, whatever works for your situation. 

So, if you are feeling like this digital parenting thing is getting the better of you, please consider introducing an agreement. For decades, parenting experts have written about the virtues of establishing clear boundaries for our kids and in my opinion, a tailored family tech agreement absolutely does that! 

Good luck!! 

Alex x  

The post Why You Need to Get a Family Technology Agreement Happening appeared first on McAfee Blog.

❌