Tag: mobile security

How to Keep Your Teen Safe Online

Steven Toporoff, who is one of The Federal Trade Commission’s attorneys, stated in a New York Times article that in 2012 more than 22,000 identity theft complaints to the Federal Trade Commission (FTC) concerned minors. Toporoff also added that child identity theft is a persistent problem. However, it is difficult to assess the magnitude of this problem because parents are usually unaware that anything is wrong until their child becomes a young adult.

A report conducted by Hart Research Associates shows that 51 percent of the teens surveyed are extremely concerned about someone stealing their identity using information they have posted online. Parents can learn how to protect their children from identity theft and what to do if their child’s identity is stolen at the FTC’s website.

Create Rules for Internet Use

  1. Your family’s attitude about Internet safety must be clear and concise. It should never waiver.
  2. Inform your teen which sites she can visit and which she cannot. She also needs to know what apps and social media sites are OK to use.
  3. Be sure to set privacy settings on her social media sites to monitor whom she is communicating with in her digital world.
  4. Regulate the amount of time she spends online by setting log off times.
  5. Protect her identity by locking her credit report.
  6. Use monitoring software like Spytech SpyAgent ($70), AVG Family Safety ($50/year) or Spectorsoft Spector Pro ($100) to deter negative behavior.
  7. Remind her to think before she posts because once she posts it, she cannot take it back.
  8. Have her set her social media privacy settings to “friends only.”
  9. Do not use location-based services online.
  10. Avoid providing optional information.

Technology is continually changing so you must be able to recognize the current trends and possible dangers. Identity theft prevention is possible but you need to know the warning signs for other online and mobile dangers, such as cyber-bullying, Teen Safety Onlinesexting and sexual solicitation. Your teen might be at risk if she:

  • obsesses over the Internet
  • gets angry when she is unable to get online
  • is secretive about her online activities
  • receives phone calls or gifts from strangers
  • engages in unhealthy relationships
  • withdraws from friends and loved ones
  • injures herself
  • seems depressed
  • starts abusing substances
  • shows signs of an eating disorder (binging and purging)

3 Extremely Popular but Dangerous Apps

1. Vine by Twitter: Popular with teens, this video sharing app allows users to make and share looping videos. The problem is that once your teen obtains this app she will be able to access videos that may contain sexually explicit content. Viewing videos is only a portion of the problem as your teen may decide to create and then share mature content of her own. Because Vine allows for finding users nearby, it is essentially a predator’s playground.

2. Tinder: This is a dating app that functions like a game. This app is about hooking up, and the age restriction is a mere 12 years old. Once the app is installed, it invites your teen to post a photo of herself. The app requests access to her location. Once completed, she can browse the profiles of people in her area to see if she likes anyone. If she does, she taps the green heart. If he likes her back, she will receive a notification and a chat feature opens up so they can communicate with one another.

This app has several red flags:

  • It accesses your teen’s location to help her find someone to meet up with in real life.
  • Anyone can like her, which can lead to temptation.
  • This app is the perfect tool for pedophiles and predators to find their victims.

3. Snapchat: This messaging service allows users to send photos with text to other Snapchat members. These photos and messages vanish within 10 seconds of receipt. However, if the recipient has downloaded Snap Hack, he can save any photo he receives through Snapchat to his camera roll. With Snap Hack, he can view and edit the photo any way he wishes.

Amy Sanborn

With three school-aged children, Amy knows a thing or two about parenting. She loves teaching her kids to appreciate the outdoors.

NOTE: Guest Posts do not reflect the opinion of Mobile Commerce Press nor do we endorse any products or technology.

Mobile security threats are growing and evolving

Predictions consistently forecast a massive increase in problems of this nature for smartphones and tablets.

The latest forecasts regarding mobile security threats in 2014 have indicated that clickjacking, watering hole attacks, and other threats over smartphones and tablets will continue to grow in the danger that they will present.

Cyber criminals are increasingly expanding the focus of their attacks to a broader range of technologies.

According to Trend Micro, these cyber criminals are tucking themselves away in the Deep Web and are using much more sophisticated and targeted attack campaigns. This firm, which is an expert in internet and mobile security threats, has made its predictions for this year and has released them in its web video project which was entitled “2020: the Series”. This looked not only at this year but at the problems that will be faced right through to the end of this decade.

According to the firm, this year will already be a considerable one for mobile security threats.

Mobile Security Threats on the RiseThe CTO of Trend Micro, Raimund Genes, has explained that 2014 will be a “prolific year for cybercrime”. This will have an impact on individuals, businesses, and even governments. Among the most common techniques are likely to be spear phishing, open source research. These are forecasted to experience a large amount of growth this year, particularly as best practice knowledge is shared throughout the cyber criminal community.

Two of the most problematic areas in smartphone and tablet use will be in dangers in mobile banking and in targeted attacks. The report indicated that the traditional two-step verification will no longer be enough to ensure that the user remains protected.

Other forms of attack that are likely to continue to take off are malicious apps as well as man-in-the-middle attacks. These are likely to be problematic for both individual consumers and corporate users of smartphones.

The vice president of security research Trend Micro, Rik Ferguson, spoke of this trend in mobile security threats, saying that “Technology advances only more rapidly and attackers are consistently just behind the crest of that innovation, waiting for widespread consumer adoption of new gadgets, new platforms or new ways of doing things.”