![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Do You Know What your Kids Are Doing Online?
It's a sad statistic, but hundreds of unsuspecting kids are lured away from home every year by strangers they meet in online chat rooms. As frightening as this seems, it gets scarce attention in the media. We often hear about missing children, but only occasionally do we actually hear of a chat room connection. Chat rooms are very popular because they are an easy way to talk to others annonymously. Anyone can enter a chat room with an identity- real names are rarely, if ever, given. A shy person, for example, someone who finds it hard to talk to others in person, may find it much easier to communicate because they can hide behind their identity, which gives them a sense of security. But hiding behind an identity also poses a very real dangerfor young, immature minds which can be easily influenced. To put it in the vernacular, "bad guys" hide behind identities, too. Men, and sometimes women, who have less than noble interests in mind. These people prey on young teens, looking for their next victim. Once they find one, they can be oh, so persuasive! They get to know the kids, often flattering them, complimenting them, saying nice things about them and to them. They know exactly what to say and how to say it. Soon, they've drawn them into their web and the kids fall for whatever they tell them, hook, line, and sinker. The next thing you know- another youngster has gone missing. All too often, they are never seen alive again. I realize this is a very graphic way of putting things, but how else can I impress upon anyone just how real this is? The Internet is a DANGEROUS place for our kids! The tragedy is in almost every case it could have been prevented, if parents had taken proper precautions. However, none of us wants to watch our kids "like a hawk"! We want them to have a measure of freedom, and that's only right and proper. But there is a simple process whereby you CAN give your kids a great deal of freedom, while at the same time protecting them. Software is available now that allows you, the parent, to control where your kids go, what they do, who they talk to online. It's inexpensive, and it works! With it you can block unwanted or prohibited sites, prevent downloading of unsafe programs, eliminate unwanted or unsafe email. Since it's also password protected, and YOU set the password, your kids cannot unblock what you've blocked. Most of this software is also inexpensive, and some of it can be instantly downloaded for immediate protection. There are several places online where it can be purchased, but one word of caution: Be certain the seller includes a guarantee with it, because some of it is bogus! (Yes, there are people who will even rip you off when it comes to protecting your kids!) Last year, over 1,000 young people became victims of pedophiles and deviants lurking in chat rooms. This year the number could go higher than that. Please take action now to protect your kids. Don't let them become the next victim! David Hallett is a ten year veteran of the internet. As president and CEO of TakeBackTheInternet.com, he is working to make the internet a safer place for everyone.
MORE RESOURCES: How Chinese Private Security Companies in Africa Differ From Russia’s Voice of America - VOA News Agri-tech’s triple bottom line: Addressing climate change, food security, and economic growth Times of India China Hits Micron With Review of Chips, Citing Security Risks Data Center Knowledge Security Force or Anti-Arab Militia? Israelis Feud Over Far-Right Plan The New York Times Bitter, frustrated and afraid: Deri to quit observer role in security cabinet The Times of Israel Russia Set to Take Helm of UN Security Council, to Critics' Dismay Voice of America - VOA News Remarks at a UN Security Council Briefing on Threats to ... United States Mission to the United Nations Online Briefing with Uzra Zeya, Under Secretary for Civilian Security ... Department of State DL Security Incident | Department of Public Safety the Texas Department of Public Safety TSA officers stop Tweed New Haven Airport’s first firearm Transportation Security Administration Sustainably meeting the security and operational needs of solar farms Security Magazine Lawmakers seek $75 million security grant for Milwaukee to host RNC Milwaukee Journal Sentinel WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend CBS Sports Ypsilanti man pleads guilty to making false statements on security ... WDIV ClickOnDetroit British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company Forbes NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say NBC New York NYC Ups Security Again After Trump Indictment, NYPD Orders Officers Report in Uniform - NBC New York Underwood Condemns Republican Plan to Cut Food Security ... Lauren Underwood TSA Honors Jacksonville Transit Authority with Gold Standard ... Transportation Security Administration Man arrested over secretly recording Republicans prompts Senate to change security policies NBC News Modi Meets Patrushev, Says Russia Security Council Foreign Policy Commerce Department Outlines Proposed National Security ... US Department of Commerce Argentina: Minimum requirements for management and control of IT ... GlobalComplianceNews How Does Data Literacy Enhance Data Security? Dark Reading TikTok bills could dangerously expand national security state Responsible Statecraft Homeland Security Chief Mayorkas calls Ted Cruz’s comments ... The Texas Tribune China urges Apple to improve security and privacy The Register Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner Russia to outline 'contours of a new world order' as UN Security ... Washington Examiner TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Russian Court Orders Wall Street Journal Reporter Evan ... The Wall Street Journal EPSO investigating Security-Widefield homicide FOX21News.com Security guard shot in 'dine and dash' at Dunwoody restaurant says it changed his life FOX 5 Atlanta Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security The Bureau of International Security and Nonproliferation Advances ... Department of State FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense Why TikTok's security risks keep raising fears The Associated Press Is there a second Supplemental Security Income payment this month? WJW FOX 8 News Cleveland Boyfriend gets caught cheating on couples’ cruise security cameras: ‘Most gut-wrenching moment’ Yahoo Life Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News Officials are preparing security in case of Trump indictment The Associated Press Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal ChatGPT and LLMs: what's the risk - NCSC.GOV.UK National Cyber Security Centre General Michael Langley (USMC), Commander, U.S. Africa ... Department of Defense |
![]() |
![]() |
![]() |
RELATED ARTICLES
How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below:VirusesComputer Viruses are small pieces of software that attach themselves to real programs. An example would be a virus that attaches itself onto windows explorer. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer If you use the internet, you have probably been infected with a virus, trojan or spyware. According to the SANS Internet Storm Center, the average unprotected PC is infected within 20 minutes of normal internet usage. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. The Attack of the Advertiser - Spy Mother Spy The menacing campaigns that drive the corporate spyware and adware market is developing way out of hand. Who are these companies and how do they get away with it? They are costing computer users millions with their sneakware system of promotional crap!We have some serious problems. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. How to Protect Yourself Against Online Criminals Credit card fraud is a growing problem for online businesses and can hurt your business in many ways.Fraudulent credit card transactions are costing e-commerce businesses many millions of dollars annually. Avoid Internet Theft, Fraud and Phishing Since its birth, the Internet has grown and expanded to unprecedented, unmanageable proportions. Information, software, news, and much more flow freely through its twisted pathways. Three-pronged Trojan Attack Threatens Security on the Internet Glieder (Win32.Glieder. Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Its Time to Sing the Encryption Song - Again! Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product. Spyware Programs Are Out To Get You! The average computer is packed with hidden software that can secretly spy on online habits.The US net provider EarthLink said it uncovered an average of 28 spyware programs on each PC scanned during the first three months of the year. Spyware - Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Adware and Spyware: The Problems and Their Solutions The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection. Top Five Spyware Fighting Tips Spyware and adware are becoming major problems for onlinesurfers and PC owners. Some highly respected sources such as AOL, Earthlink and Webroot place the rate of infection at 80-90% of all computers. Email Scams - Ten Simple Steps To Avoiding Them According to the Anti-Phishing Working Group (APWG) email scams also known as phishing attacks claim more than 2,000 victims each day from more than 75 million phishing emails that are sent each day. The APWG also claims that these email scams steal close to $1 billion a year from its victims. ![]() |
home | site map |
© 2006 |