Wednesday, September 23, 2015

Keeping your kids safe online? Follow these 5 tips

It’s a nightmare come true – your (grand)children are sitting at the dinner table or lying around in the living room, vulnerable to unknown threats. Your mind spins as you wonder, what in the world are my children looking at? Are they downloading explicit content, or planning to meet with sexual predators?


And most importantly: isn’t our home the one place my kids should be safe?


What you don’t know can hurt your child


Your children are glued to the screen at all kinds of odd hours, and you’re completely unsure of what they’re up to. It can drive you crazy just trying to imagine what’s reaching them through that blue light.


Glued to the screen (source: pixabay.com)It’s hard to understand why young people are so completely obsessed with the Internet – but for them it’s much more than a useful tool. It’s where they socialize, learn, play, and express themselves. For many of these digital natives, the Internet is where a large portion of their lives will play out.


While it’s important to give children the space to grow and explore, it’s also important to cultivate awareness of the following threats to their safety:


Malware and privacy threats


Kids and teens love torrenting and file sharing, and often their peers will tell them about all the latest games, movies, and music that they just must have. Kids might know how to acquire all of this media, but they also might be downloading malware along with it.


This kind of behavior can also get them heavily monitored by companies that are likely working on behalf of copyright enforcers. While they might not care about their privacy now, a bad choice now could be something that haunts them in the years to come.


Video game addiction


If your children are gamers, you’re probably used to strange shouting and compulsive clicking coming from their rooms. It may be hard to believe, but those silly online games could actually rule your children’s life – people have even died from their inability to put the controller down.


Video game addiction is a real and serious problem. Like addictions to drugs and alcohol, video game addiction can get in the way of a person’s ability to live a normal and meaningful life. It can lead to obesity, hallucinations, irritability, and depression. It may seem like your kids’ preference for video games over socializing and school is not so out of the ordinary, but if your children are spending upwards of five hours a day gaming, it can negatively affect them on much deeper levels.


Predators on social media


It’s easy to see then why kids love social media so much – they can instantly connect with their peers, and collect “likes” and “upvotes” for their thoughts and pictures. Unfortunately, a predator can also leverage these same social media features to lure in your pride and joy.


“OMG cat” (source: mashable.com)



They can even create convincing fake profiles to trick your kids, as Youtuber Coby Persin shows in his social media experiment in this video, where he convinces young girls (with the permission of their parents) to meet him in person with a fake Facebook profile. While this hoax was roused to teach the teens a lesson, it’s heartbreaking to realize how easily they could have fallen victim to a real predator.


Illegal activities and pornography


Unfortunately, when kids have questions they have the Internet at their fingertips. 93% of boys and 62% of girls have been exposed to pornography before the age of 18. This could influence them to be promiscuous at a young age, or even share nude pictures or sexually-charged messages online.


And if that isn’t scary enough, thanks to the growing black market on the darknet, kids can now buy drugs online. Drug trafficking on the internet is very convenient for people who otherwise might not have those kind of connections. Even if your children aren’t surfing the underbelly of the internet, they can easily learn about drugs, how to use them, and where to acquire them by conducting a quick Google search.


How to stop cyber threats in their tracks


Tempted cat (source: pixabay.com)With all of the risks and dangers out there, it can be tempting to ban your children from Internet access entirely. You did have other things on your mind than the Internet when you were a child, and you turned out okay, right? Why can’t they just use encyclopedias when they have to look something up? What’s so bad about using the phone to call up their friends?


Unfortunately, this kind of paranoia will not prepare them for their technology-driven future, where they’ll have to conduct themselves as adults daily. Luckily, you don’t have to keep the keyboard under lock and key to ensure the safety of your children.


Here are the top 5 ways to keep your kids safe from Internet threats:


1. Start a conversation with your child


It’s important to have an open dialogue about risks online with your kids. Bring up the conversation in relevant ways, tying in the topic to current events or TV specials. Try to get your children to express their opinions, that way you can start an ongoing dialogue about Internet safety.


Talk to your kids about other topics too. If they feel a strong social bond with you, they may turn to the computer less to cure their boredom or loneliness. Having an open line of communication can inspire your children to approach you for advice and guidance.


(source imgfave.com)

Serious cat (source imgfave.com)



2. Create rules and guidelines


If your children are old enough, you do not want to have to control every little thing they do. After all, you don’t spend all day at school with them dictating their choices. But similar to limiting what toys you buy them, you can create boundaries surrounding new software and video game downloads. Question their motives when they ask to download:


  • File-sharing software

  • Torrenting software

  • Anonymous browsers

  • Films or music that have yet to be released

This suggests they may be interested in doing something illegal or risky. Additionally, set Internet use limits if you feel that your kids spends too much time online. Create rules surrounding social media, and how much of their personal information they are allowed to share on it.


3. Monitor your child online


Young children should never be on the Internet without adult supervision. Use these tips when sitting down with your child to explore the web:


  • Set all search engines to safesearch. You can even do this on sites such as Youtube, which is a favorite among kids. Scroll down to the bottom of the page and click the safety box.

  • Limit the apps and media on your phone and tablet. If your children use your devices, only have what you wouldn’t mind your child accidentally coming across. If you have a Windows phone, the Kid’s Corner feature can help you limit access to certain content on your device (and prevent your little sweetheart from deleting all of your vacation photos). Just go to Settings under App list to set it up.

  • Consider purchasing a child-friendly tablet. These often come with pre-installed parental controls and settings, and some even allow you to restrict access to entertainment apps so that you can get your children to focus on education.

  • If your kids use a Windows 10 device, take advantage of the family features which allow you to set time and access limits. Your children will need Microsoft accounts, so be sure to familiarize yourself with the ways you can optimize privacy settings on Windows 10.

Cat playing with a fence (source: pixabay.com)


When your kids grow older, it may be wise to let this ritual go and give them your trust unless they abuse it, since most teenagers will know how to clear browser histories anyway. Cyber safety educator Leonie Smith recommends that you perform spot checks for young teens, meaning that you check in with their computer and phone use randomly. However, these checks should not be conducted in secret – you should be very clear with your children on your monitoring practices to preserve trust.


4. Use the right tools


The right tools are integral to making sure that your children don’t download a harmful trojan in the event that they do come across an untrustworthy site. Investing in a quality antimalware solution can prevent nasty, system-compromising infections.


Additionally, there are parental control softwares that can help you monitor your children’s activities. These applications range from blocking inappropriate websites to sending you reports on your little one’s computing habits. While it may be worthwhile to consider investing in these tools, relying on them exclusively could prove to be ineffective. Kids learn how to bypass these systems, especially if they are browser add-ons.


Some trusted parental control tools include:


K9 Web Protection


A simple software that focuses primarily on blocking inappropriate websites and ads. It has a “timeout” feature that can be activated if K9 had to block too many sites in a set period of time.


Zoodles Kids Mode


Looking to protect your children while they’re on your tablet or phone? Zoodles Kids Mode is an app that limits your children’s surfing to a curated assortment of games, educational content, and videos. It’s a good option for those times when you can’t monitor your kids as carefully as you would like.


Qustodio


A comprehensive, cross-device software for those who want to receive more detailed reports about what their kids are doing. Qustodio allows you to set up separate accounts, making it a good choice for those with multiple children with different safety needs.


5. Know the signs of addiction


If your children act out when you ask them to turn off the computer and they seem withdrawn from other activities, the computer may be a problem. Know the signs of addiction, and look out for things like:


  • Irritability

  • DishonestyCat sleeping on floor (source: pixabay.com)

  • Secretive behavior

  • Isolation

  • Back pain

  • Strained vision

  • Anxiety

  • Poor academic performance

If you’re concerned that your children may be suffering from video game or computer addiction, seek professional help for a proper evaluation.


With all of the risks and dangers out there, it can be tempting to ban your kids from Internet access entirely. Unfortunately, this will not prepare them for the online world when they are adults. Addressing the issue of online safety now will help them develop the digital smarts they need to excel in an increasingly technology-driven world – all while keeping them out of harm’s way.


Don’t forget, it’s good to log off the web as a family every now and again. Teach your kids the value of the great outdoors and real-life human contact – they might even update their status about it later!


What do you do to protect your young ones online? Do you have any tips for other parents?


Have a great, safety-conscious day!



Related Posts:


  • Purchase Emsisoft for Mom and Donate to Save the Children

  • So now the police are handing out spyware, for free…

  • Emsisoft donates 100% of Christmas sales income to local…

  • How to stay safe on Facebook and avoid the top 5 scams

  • U.S. sends scary message to hackers, but the truth is even…




Keeping your kids safe online? Follow these 5 tips

Thursday, September 10, 2015

Ransomware hacks Android’s front-facing camera to take embarrassing photos

An Android app that offers pornographic images, Adult Player, has been recently discovered to be a particularly aggressive form of ransomware. The malware secretly takes photos of the unsuspecting victim by accessing the device’s front-facing camera and then locks it, demanding a $500 ransom while pretending to be affiliated with the FBI.


The FBI probably isn’t after you


Unfortunately, as cyber criminals advance their tactics and techniques, the rest of us have to learn to catch up. Ransomware, which has been around for about as long as the PC, is now targeting Androids and other devices.


android_malwareOne of the major scare tactics of ransomware is to catch you in a compromised position, or a fabricate one, and threaten your sense of security in addition to locking your device. That’s often times why “FBI” will pop up in the extortion image that follows infection.


Earlier this year, an app named Porn Droid locked devices and accused the user of accessing child pornography, then demanded $500 as a penalty. Similarly, the app Koler intimidated Android-using victims in the same fashion, and was contracted on pornography websites under the guise of a legitimate app.


The difference with Adult Player is that it can actually take embarrassing photos of you that wouldn’t exist otherwise. And even if you do pay the penalty, who is to say that those photos will actually be destroyed?


Be selective about your downloads


Adult Player, as with many ransomware apps, is not available through Google Play. Often times these malicious apps can be found for direct download through a website, so it’s best to avoid these kinds of downloads unless you have good reason to trust the company behind the app.


Additionally, you should always pay attention to what permissions you grant when you download any app. If an app wants access to your contacts or camera, for example, and it should have no use for those functions, abort the download immediately.


How to remove Android ransomware


While this alert might give some of you a few laughs, it might make another handful of you blush in embarrassment. If you’ve contracted the Adult Player ransomware, follow the steps below to remove it from your device:


  1. Enter safe mode on your device. As there are different methods depending on your device, you might need to do a quick search online, here is one that works for most models.

  2. Go to Security under Settings, and then select Device Administrator. Select the offending app and deactivate it.

  3. Go to Apps, under Settings, and select Uninstall to remove the ransomware app.

Hopefully you have not downloaded Adult Player or any other ransomware for that matter. But in the case that you have, remove it and remember in the future to focus on prevention over cleaning!


Have a great, ransomware-free day!



Related Posts:


  • Android Outbreak: Koler ransomware has learned how to worm

  • Warning: File Encrypting Ransomware, Now on Android

  • BadLepricon Mobile Malware Mines for Bitcoin Gold

  • Xtube compromised, exploits lead to Cryptowall infection

  • The Huffington Post hacked! Advertisements were laced with…




Ransomware hacks Android’s front-facing camera to take embarrassing photos

Monday, September 7, 2015

The truth about Windows 10 spying on almost everything you do

You have probably heard the news by now: Microsoft has updated a controversial service agreement that lays out in scary detail how your personal data is being used and abused – at least, that’s what the major tech blogs are saying. But the reality is, even if you read the 12,000 word service agreement, it’s still confusing and vague at best.


Horacio Gutierrez, Deputy General Counsel of Microsoft’s legal and corporate affairs, wrote about the company’s commitment to transparency on the Microsoft blog in early June. This move, of course, was preceding the new privacy statement and service agreement that accompanied the release of Windows 10.


As he put it, “We are simplifying the services agreement and privacy statement because we believe that real transparency starts with straightforward terms and policies that people can clearly understand. As our services evolve, we recognize we must continue earning your trust.”


How Windows 10 is spying on you


The reality is, we can’t know what Microsoft is doing with your private data, but the release of the updated privacy policy and service agreement can give us some great insight. Yes, these long and tedious documents leave a lot of room for interpretation, but they also inspire something important: a discussion about how data harvesting and lack of digital privacy has become normalized.


Cortana: your personal assistant, or spy machine?


cortanaheroCortana is your voice-activated personal assistant, much like Siri and Google Now. But in order for her to operate, Windows 10 collects your personal information to better serve you. This includes calendar events, contact information, alarm settings, what you view and purchase, your browsing history, emails and text messages… “and more”.


An advertisers greatest dream


You may not have realized it, but each user on each Windows device will be issued a unique advertising ID that is tied to the email address they have on file. The idea is that you will be better served through ads, because according to Microsoft, “Advertising keeps many of the services you use free of charge”.


Microsoft will share this profile (created from information aggregated from your personal files) with their partner ad networks – who in turn serve you ads on certain applications, like solitaire. If you were concerned with ad networks collecting information from your browsing history, then be aware that Microsoft is taking it to the next level with Windows 10.


Data syncing with OneDrive


onedriveOneDrive is Microsoft’s cloud storage system, and it comes with the Windows 10 territory. You might think it’s great because there is no additional sign up or installment required and you can access it from any of your Microsoft devices. But this new convenience comes with a price.


Every time you are signed into your machine with your Microsoft account, your operating system immediately syncs your settings and other data to company’s servers. This includes browser behavior and history, as well as mobile hotspot and Wi-Fi network passwords.


What are they doing with this information?


If you had the time to read through the long privacy policy and service agreement, you might get a vague understanding of what Microsoft will do with your data, but little more. Besides, we all know better than to take giant corporations for their word – they have their own interests to look after. The real questions end up being, what can Microsoft do with this information? And ultimately, what are they mostly likely to do with it?


Advertisers can “serve” you better!


People are getting used to free services online left and right, so these expectations dominate the tech marketplace right now. Windows 10 doesn’t cost you any money, but it still comes at a price.


As Alec Meer of Rock Paper Shotgun points out, Microsoft is increasingly trying to compete with Google through software and applications. But this model requires that, “money comes from harvesting data and flogging it to advertisers and other organisations who want to know exactly what we’re all up to online”.


Comply with big brother


Microsoft doesn’t beat around the bush when it comes to surveillance state issues:


Finally, we will access, disclose and preserve personal data, including your content (such as the content of your emails, other private communications or files in private folders), when we have a good faith belief that doing so is necessary to: 1.comply with applicable law or respond to valid legal process, including from law enforcement or other government agencies…



It’s important to note that while this may seem horrifying to some, it’s really not so different from any other privacy agreement. Just take a look at this snippet from Apple’s privacy policy:


It may be necessary − by law, legal process, litigation, and/or requests from public and governmental authorities within or outside your country of residence − for Apple to disclose your personal information. We may also disclose information about you if we determine that for purposes of national security, law enforcement, or other issues of public importance, disclosure is necessary or appropriate.



At the end of the day, there are few companies that are able to take a stance against big government agencies. The best you can hope for is providers who don’t bury this in privacy agreements, but who are upfront and honest about their current operations as they relate to the surveillance state.


What could go wrong? Why should I care?


As an infamous activist once said, “Arguing that you don’t care about privacy because you have nothing to hide is not different than saying you don’t care about free speech because you have nothing to say.”


14877774_sBut if that’s not reason enough to get up in arms, there are a number of practical concerns to consider. First and foremost, you don’t know which ad networks this data is going to, and you don’t know what their policies for dealing with this very private information are.


What happens in the event of a hack? You might feel safe if your information is with a big company like Microsoft, which undoubtedly has major systems in place to protect your data, but do you really trust any of Microsoft’s ad network customers? A hacker could trace these transactions and conduct a large-scale hack just by finding a single vulnerability in this line of data transfer.


You might say you have nothing to hide, and that the only person who does is clearly breaking the law. If that’s truly the case, why don’t you leave your bank account details in the comments below?


The real truth: Microsoft isn’t the only bad guy


Shifting tides in modern culture have created two dangerous and commonly accepted thoughts on digital privacy, which could make you think that:


  1. Privacy must be compromised for safety.

  2. Privacy must be compromised for convenience.

While there are serious debates on the subject, it’s important to stop and wonder who is ultimately responsible for these ideas, which create the basis for how many companies, institutions, and individuals make their decisions about privacy.


But the reality is, the Windows 10 privacy agreement isn’t so much a revelation as a sign of the times. While it has understandably stirred up some controversy, it hasn’t inspired a mass exodus from use of Microsoft software or products.


This is as it should be, because most of us know that it isn’t different with the developers of other major operating systems and mobile operating systems…like Apple and Google.


Siri’s telling everyone what you did last night


Sure, Apple and Google may have made a show of their commitment to user privacy, with smartphone encryption and very convincing, public battles with high-profile government agencies.


Apple has admitted Siri voice data is being sent to third parties

Apple has admitted Siri voice data is being sent to third parties



But you shouldn’t let these PR stunts fool you. Even when these companies have the best intentions, there is still a bottom line at the end of the day, and that’s money.


Don’t believe us? Cortana isn’t the only personal assistant who likes to abuse your privacy. Apple hands your voice recordings over to third parties for analysis, and you agreed to it in the privacy agreement. Whether it’s a personal message to your sweetheart or your child asking Siri silly questions, Apple stores those messages for two years and essentially does with them what they want.


It might be tempting to switch over to Google Now for your voice commands, but that would come at the cost of both your privacy and sanity. Google Now has a feature called Now cards, which are recommendations for products, services, and information based on your messages and recent searches. Even if you don’t rely on Google Now too much for recommendations, Google already knows so much about you because at some point you have probably used their products or services.


scroogled


And if you use Gmail, you’ll note that Google has been serving ads through Gmail for some time now – and if you haven’t noticed any, just check under your Gmail’s “Promotions” tab. They get information straight out of your private emails to help their ad network partners target you. It’s right there in their privacy agreement. Microsoft even attacked Gmail over these privacy violations and launched a “You got Scroogled” marketing campaign.


What you can do to protect your privacy


The reality is, short of becoming a Linux user or developing your own operating system, there is little you can do to keep your information entirely private. Even recent Windows 7 and 8 updates come with their own host of privacy issues, so don’t think you’re out of the woods just because you haven’t made the move to 10.


But there are several steps you can take to maximize your privacy while using Windows 10, and we encourage you to explore these options – whatever agency you can take over your privacy is better than none.


Windows 10 setting options to look into


If you have yet to install Windows 10 be sure to decline the Express Settings, which enables all of the privacy compromising features. Look through the different setting options and disable anything that makes you uncomfortable.


If you already enabled the Express Settings when you downloaded Windows 10, go to the start menu and select Settings. From there you’ll find that most of these invasive features are listed under Privacy. There are many options to go through, and we encourage you to look carefully at each one. There are several big ones we think you may want to consider disabling:


Cortana


You may not be comfortable with Cortana collecting so much personal information about you, and if that’s the case, you should disable the Getting to know you option under Speech, inking, & typing (this is located in the Privacy box).


Additionally, you can click on the gear icon where you can access the Cortana settings, where you can enable or disable her (as well as manage information kept about you in the cloud).


Advertising ID


If you are concerned about the data harvesting for advertisement purposes, we do recommend you disable setting, “let apps use your advertising ID for experiences across apps”. This is located underneath the General tab in the Privacy box.


Unfortunately, just moving the toggle isn’t enough to keep ad networks from reaching your personal data. You will also have to go to this Microsoft site and disable personalized ads several times over.


Microsoft_settings

Microsoft allows you to personalize your ad settings



Location


You may be used to location services, and they sure are handy when you’re trying to get from point A to B. But Microsoft’s new privacy agreement suggests they are sharing this location information (and your location history) with “trusted” third parties. If that makes you uncomfortable, it may be best to disable this. The Location tab is located directly beneath the General tab.


Wi-Fi Sense


Wi-Fi Sense could be either very practical, or very invasive, depending on how you look at it. The new feature allows you to automatically share your Wi-Fi password with your Outlook, Skype, and Facebook contacts, which saves a lot of hassle when friends come over and need your password.


wi_fi_sense

WIndows 10 Wi-Fi Sense: do you need it?



On the other hand, this may not be wise for those with broad social networks, because this option does not allow you to selectively pick which contacts to share it with. This option should be enabled or disabled on a case by case basis – it’s located in Network & Internet instead of Privacy.


Use a local account


If you’re not concerned with convenience and want maximum privacy, you should consider a using a local account instead of your Microsoft account. You will lose out on a number of features, particularly synchronization across your different devices. But if that doesn’t bother you, locate Accounts under Settings, then click Your account. You should see the option to “Sign in with a local account instead” just above where your picture should be.


Try O&O ShutUp 10


o&o_defrag-EN

O&O ShutUp10



If you’d like to simplify this process, consider using O&O Software’s free privacy tool, ShutUp 10. This tool simplifies the privacy process by giving you a single interface to deal with all of the myriad of settings you’d like to enable or disable on Windows 10. You can also simply apply all of their recommended settings.


O&O ShutUp10 is entirely free and does not have to be installed. Moreover, it will not install or download potentially unwanted or unnecessary software (PUPs), like so many other programs do these days!


Capture

O&O ShutUp10 allows you to easily disable Windows 10 settings



Educate yourself about privacy options that feel right for you


At the end of the day, you might be tempted to throw up your hands and give up perusing privacy at all. You might not see the point, since disabling certain settings doesn’t really guarantee that you are not being spied on, or that your personal data isn’t being sold or distributed.


You might feel that you might as well have the conveniences of certain tools then, or would prefer more relevant advertising. But if we all collectively begin to educate yourself about our privacy options and pursue them, we have a better chance of creating a culture that is concerned with cyber safety and privacy, instead of one that just thinks its a cost needed for a better world.


Have a nice (privacy-conscious) day!


acer-791027_1920_emsisoft_small



Related Posts:


  • Emsisoft: Quite Possibly The Most Privacy Conscious…

  • The transparent citizen – How can I actively prevent…

  • Multinational SIM cards manufacturer Gemalto hacked by NSA…

  • Antivirus software: Protecting your files, at the price of…

  • Privacy Alert: Adobe’s Digital Editions eReader is…




The truth about Windows 10 spying on almost everything you do