Blog Posts Tagged with "Kids"
August 27, 2012 Added by:David Navetta
The proposed modifications to the definitions of "operator" and "website or online service directed to children" address commenters’ concerns related to the use of third party advertising networks and downloadable software kits, or plug ins, that collect personal information through child-directed websites...
August 14, 2012 Added by:Brent Huston
"Watch the scams and traps that are strewn like land mines throughout the site. Watch the free give-aways, be wary of clicking on pictures and videos and look carefully at any messages that contain links or suggest web sites to visit. Also, be VERY careful about ‘friends’ of friends..."
August 12, 2012 Added by:Kelly Colgan
Identity theft is one area where the ignorance of children and their parents can be more costly than a wobbly landing or delayed start off the blocks. It can hamper their ability to secure funding to attend college or buy a car, and to land a job. Children aren’t the only ones who are vulnerable to identity theft...
June 21, 2012 Added by:Kelly Colgan
There’s no shortage of cautionary tales about social media risks for children. They’re all over the news. In a recent Harris Interactive poll, parents said their top concerns included sexual predators, cyberbullying and a desire to monitor their children’s activities online and on mobile phones...
June 19, 2012 Added by:Kelly Colgan
In conjunction with the National PTA Convention, Tim Woda will present about the specific risks plaguing parents and ways to mitigate their concerns. Matt Cullina will unveil findings from a Harris Interactive survey of parents about their child’s social networking habits and what issues cause them the most fear...
June 19, 2012 Added by:Headlines
"Considering how critical Internet access is to our daily lives, we want all Internet users to understand that they have a shared responsibility in protecting themselves online and that safer practices online help protect everyone"...
January 31, 2012 Added by:Scot Terban
Anarchists who want nothing more than to just sow chaos for their own nihilistic animus produced what I call the “Monkeys with guns effect”: Scattershot and useless hacks and pranks that further no other agenda than the Lulz or to sow chaos anywhere they strike...
December 05, 2011 Added by:Kelly Colgan
Mobile applications do much more than entertain, inform, or otherwise make life more convenient. Depending on the app, companies can access private information as varied as phone and email contacts, call logs, calendar data, and data about the device, and therefore our location...
November 16, 2011 Added by:Robert Siciliano
The threat of lost or stolen devices and the possibility of their personal information being used for fraudulent means a significant concern. In the United States 113 mobile phones are lost every minute and more than half of smartphone users do not use any password protection...
November 09, 2011 Added by:Kelly Colgan
It was only six months ago that Sony made headlines with reports of two major data breaches. Taken together, they served as a jarring reminder — or for many people, as a wake-up call — to the security risks inherent in online gaming...
October 23, 2011 Added by:Jackie Singh
You're growing of age at a time when "security" is a fairly new concept. Governments and companies are throwing money at these problems in the hopes they will go away, and will be doing so at an increasing pace for quite the foreseeable future. That's where you come in...
September 30, 2011 Added by:David Navetta
The proposed amendments would modify the Rule in five areas: definitions, parental notice, parental consent mechanisms, confidentiality and security of children’s personal information, and safe harbor programs. Each may have a significant impact on a company’s current online practices...
September 24, 2011 Added by:Theresa Payton
You can use different privacy settings to protect your photos, but sometimes online services have glitches and strangers can see your videos and photos. Cyber Expert Theresa Payton - former White House CIO - offers some easy tips you might want to consider before you upload those photos...
August 29, 2011 Added by:Steven Fox, CISSP, QSA
DefCon Kids follows the trend towards developing cybersecurity skills in youth, so that these young professionals will one day be prepared to tackle the increasingly advanced cyber attacks that constantly threaten today’s enterprises...
August 26, 2011 Added by:Kelly Colgan
September—that whirlwind season of back-to-school registration, dorm move-ins, and sports sign-ups—ushers in a sleigh-full of identity theft opportunities. It’s not just invincible college freshmen who are at risk. Parents can expose kids to fraud without realizing it...
August 13, 2011 Added by:Kelly Colgan
Parents can’t supervise their teens around the clock. So how can you protect your fiercely independent, world-weary, tech-savvy teen—the one with the bad case of selective hearing—from trouble online? Let us do the talking with these tips...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013