Jdi na obsah Jdi na menu

Security internet

  • The most common threats children can face online in 2017-2018
  • What content is not appropriate for children?
  • Beware of predators on the network
  • How to protect children against bullying online?
  • Virtual scams: how to avoid them?
  • Personal information should stay private!
  • Malware and viruses: how to defend your child’ computer?
  • Children’s Internet addiction: how to avoid it?

The problem of protecting children online is really a red hot issue nowadays. There are plenty of articles written on the topic, people have online discussions on social forums, governments make countries’ legal systems more rigorous as far as children’s online privacy is concerned. We may provide the examples further and further, but it is time to tell you about measures for kids’ safety on the network.

more https://www.bestvpnrating.com/guide-children-privacy

Protecting Children’s Privacy Online – A Guide for Parents, Carers and educators. Kid’s privacy isn’t just about protecting them from predators and fraudsters, although that’s certainly reason enough. But there’s a societal impact on kids who are bombarded by algorithm-triggered advertising and marketing. Kids are impressionable, and their minds can be shaped by what they see online. What they see on the internet is defined by what Google, Facebook, Microsoft, and other corporations that rely on advertising and mass dragnet data collection want them to see.

more https://www.comparitech.com/blog/vpn-privacy/protecting-childrens-privacy/

Internet security
The biggest risk on the Internet is mostly small or minimal browser security or the complex network, which is mostly on general security as they relate to other applications or operating system as a whole. The aim is to establish security rules and elimitovat risks against the use of Internet attacks. Internet poses a threat in the form of an unsecured channel for the exchange of information leading to the high risk of data breaches your privacy or fraud such as phishing.

This tool shows the disruption of the free flow of information, whether it's government, which blocks or other source information due to disruption of the rights and freedoms or copyright infringement

security-united.gifThe Internet is suitable for each kind of cheap communication
Internet Service Providers do not assume responsibility for speeches on their servers, the responsibility borne by each man for himself. To reduce the unwanted kind of access you can use web filters. Web filtering software blocks access to objectionable material through a variety of methods, including blacklists, keyword lists, content rating systems and white lists.Blacklists consist of a predetermined set of Web addresses and will not let users visit specific Web pages.A keyword list actually scans Web sites for undesirable text and, in some cases, images. If it finds a match, the browser refuses to render the site or pops up a warning.White lists, considered the most restrictive method, block access to all sites except those selected by the filter company.Some filters also work in conjunction with Web site ratings, a voluntary system that relies on Web developers providing an honest description of their content. Web filters reduce the risk of dangers of the Internet but do not provide 100% guarantee. Google it has the biggest market share in Web search.

Internet safety, social networking and technology

Think about keeping some control over the information you post. Consider restricting access to your page to a select group of people, for example, your friends from school, your club, your team, your community groups, or your family. Keep your information to yourself. Don’t post your full name, Social Security number, address, phone number, or bank and credit card account numbers — and don’t post other people’s information, either. Be cautious about posting information that could be used to identify you or locate you offline. This could include the name of your school, sports team, clubs, and where you work.
Make sure your screen name doesn’t say too much about you. Don’t use your name, your age, or your hometown. Even if you think your screen name makes you anonymous, it doesn’t take a genius to combine clues to figure out who you are and where you can be found.
Post only information that you are comfortable with others seeing — and knowing — about you. Many people can see your page, including your parents, your teachers,
the police, the college you might want to apply to next year, or the job you might want to apply for in five years.
Remember that once you post information online, you can’t take it back. Even if you delete the information from a site, older versions exist on other people’s computers.
and information is preserved in memory for a search engine about 3/6 months.

Remember too much trust does not pay.
Internet is a Means for obtaining information on Their Own Knowledge.

Check out the new bill

NW3C provides a nationwide support system for law enforcement and regulatory agencies involved in the prevention, investigation and prosecution of economic and high-tech crime.

deliver training in computer forensics, cyber and financial crime investigations and intelligence analysis.
investigative support to agencies investigating white collar and related crimes.
original research on all facets of white collar crime.
partner in the Internet Crime Complaint Center (IC3®), which allows victims of cyber crime to report incidents to law enforcement.

Updated Alert
Internet Crime Complaint Center (IC3)
August 09, 2012

Citadel Malware Continues to Deliver Reveton Ransomware in Attempts to Extort Money
The IC3 has been made aware of a new Citadel malware platform used to deliver ransomware, named Reveton. The ransomware lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States Federal Law. The message further declares the user’s IP address was identified by the Federal Bureau of Investigation as visiting child pornography and other illegal content.
To unlock the computer, the user is instructed to pay a fine to the US Department of Justice, using prepaid money card services. The geographic location of the user’s IP address determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

 You guard my credit file

Russia's FSB threatens to block Gmail, Hotmail, Skype

The lead for the FSB security agency's information group Alexander Andreyechkin on Friday proposed banning Gmail, Hotmail, and Skype in Russia. He complained that the brunt of the traffic on these sites wasn't managed within Russia and allegedly made them a haven for 'extremist' groups. Without filters, using these services could lead to a "massive threat" to the nation's security, he claimed.
Deputy Communications Minister Ilya Massukh added later that the call for a ban was because security officials couldn't as easily spy on people's messages. The attitude paralleled India's complaints against RIM where it has been frustrated that a good security mechanism didn't let it snoop on residents' messages.

source electronista.com