![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Protecting Your Children On The Internet
If you are a parent, as am I, I think we can agree there is little else more important than keeping our children safe and protected. It's difficult enough keeping them safe from the unscrupulous people we read about in the news, but dealing with children and the Internet takes it to a completely new level. Many young people find instant messaging and e-mail a convenient and fun way to talk with their friends. If you have children, like me, when they're not on the phone, they're talking with their friends on the Internet. We have very strict rules and guidelines about who they can talk with and for how long. We have given them detailed instructions on what to do when they receive e-mail from someone they don't know or receive an anonymous instant message. Recently, someone close to me received a death threat via an anonymous instant message. The language this person used was so vulgar and explicit you would have thought it came from a prison inmate. Interestingly enough, the person at the other end was a child. After significant investigation we determined this person was a school mate. They had received detailed information about the child including the child's instant messenger alias, their home address and color, and what type of cars the family drove. Can you imagine how scared this child and child's family was? Quite frankly, it was not only sad but sickening that another child could be so verbally brutal. Additional investigation revealed that the school these children go to were aware that this had been going on for quite some time. Other children had been receiving similar threats. This particular event was all the result of several children speaking in a chat roam and one child in particular got upset about something that was said. That child contacted another child, who is known to be mean, and asked them to scare one of the other children. We got to the bottom of the whole mess and everyone felt a bit of relief. It's very important to pay attention and, in some cases, monitor what children are doing on the Internet. It's for their protection and the protection of others. I'm sure I am going to get an ear full from privacy rights advocates on this one. Regardless, the safety of our children is one of the most important tasks a parent has. If your children use e-mail and Instant Messaging on a regular basis you should; 1) Limit the number of people they can e-mail and message with; Update: Shortly after writing this article, a 13 year old boy at a middle school in my area was arrested for e-mailing death threats to two teachers. In one e-mail he indicated he was planning on bringing a gun to school to kill a teacher. The other e-mail, sent to a teacher at a different school, indicated that he planned on targeting students as well. For further details please see the full article at South Florida's Sun Sentinel "http://www.sun-sentinel.com/news/local/palmbeach/sfl-pcletter18feb18,1,216444.story?ctrack=1&cset=true." For information on computer monitoring software take a look at WatchRight http://www.watchright.com/. A good site to visit to learn more about protecting children on the Internet is www.protectkids.com. It's full of great information every parent should know. Other sites you may want to visit are http://www.isafe.org/, and Obscenity Crimes Reporting http://www.obscenitycrimes.org/. About The Author
MORE RESOURCES: Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times Large Language Models Pose Growing Security Risks The Wall Street Journal UK minister met Chinese turbine company amid security concerns POLITICO Europe Electric infrastructure security measure updated Unicameral Update Protector app provides on-demand armed security ABC7 Los Angeles The Jones Act : A disastrous legacy for the U.S. economy and security Pacific Legal Foundation (PLF) Elon Musk’s Private Security Are Now Special Deputies The Daily Beast Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network HackerOne Debuts New Way to Quantify Security Value Channel Insider Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 The Hacker News Whistleblower lawyer Mark Zaid on the Trump administration's move to revoke security clearances The Record from Recorded Future News Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Rep. Woolford on border security Michigan House Republicans Cleared to connect: American Airlines pilots streamlined security program in collaboration with US and UK governments American Airlines Newsroom EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Texada achieves top security certifications American Rental Association The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English How to secure Notes on iOS and macOS Help Net Security Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire Exabits partners with Phala Network to offer robust AI security with TEE-enabled infrastructure GlobeNewswire Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor TechCrunch OpenText unveils AI-powered threat detection and response capabilities Help Net Security Topic: Relations with Ukraine NATO HQ AI app DeepSeek banned on Pennsylvania treasury-issued devices over privacy, security concerns CBS News Regional peace depends on Iran's security Tehran Times EU seeks to strengthen underwater cable security in Baltic and Mediterranean Kathimerini English Edition ‘Golden ticket to job security’: Trade union partnerships hold promise for high school students Youth Today CISA and FBI issue warning for Ghost ransomware activity Security Magazine Second Take: ‘The Winter Soldier’ tackles American democracy and security The Stanford Daily Tusk proposes 3-point plan to strengthen Ukraine, European security. Kyiv Independent Unarmed, undertrained, at risk: Advocates for Hawaii’s private security guards want change Hawaii News Now ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News Venture capital firm Insight Partners faces security breach Security Magazine ID-Pal, Facephi join influential payments, security groups Biometric Update Apple drops key ADP security feature in UK Mobile World Live Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Retired doctor and courthouse security deputy seeking Belvidere Township 'CEO' job Northern Public Radio (WNIJ) |
![]() |
![]() |
![]() |
RELATED ARTICLES
Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Internet Identity Theft - How You Can Shield Yourself With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. New Mass Mailing Spamming Internet Trojan for the Windows Platform May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform. How Spyware Blaster Can Protect Your Computer From Harm By browsing a web page, you could infect your computer withspy ware, ad ware, dialers and hijackers. These, unwelcomeguests, are some of the fastest growing threats on theInternet today. Protecting Your Identity On The Internet Afraid that someone is monitoring your PC or installed a keylogger to record every single keystroke? Find out which tools you need to get to make sure you are protected.X-Cleaner Deluxehttp://www. With the Rise of Internet Crimes, Users are Turning to High-Tech "PI's" for Solutions High-tech private investigators are becoming the answer for many Internet users who have been victimized online. The use of e-mail by that unethical element lurking in cyberspace rings all too common these days. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. How to Thwart the Barbarian Spyware! Today,on most internet user's computers, we have theability to employ software, along with ourintelligence, to prevent viruses and spyware.To put this article into proper perspective, we'll useMedieval defense tactics. Pharming - Another New Scam Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data. Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Parental Control - Dangers To Your Child Online & Internet Child Safety Tips Did you know.. Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking Airport Menace: The Wireless Peeping Tom----------------------------------------As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. A New Low A new variation of the Nigerian Scam themeThe scam artists are employing the Nigerian Scam to fleece unwary sellers who advertise pets for sale.This is particularly despicable because not only are people losing their money but dogs are being abandoned in freight terminals or being killed to get rid of them. ![]() |
home | site map |
© 2006 |