safety – iDefend https://www.idefendhome.com Ultimate Protection for Your Digital Life Thu, 06 Feb 2025 17:43:29 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.1 https://www.idefendhome.com/wp-content/uploads/cropped-idefend-favicon-32x32.png safety – iDefend https://www.idefendhome.com 32 32 Scams Created by AI are Fooling Over 50% of Their Targets https://www.idefendhome.com/blog/onlineprivacy/aiscamsfooling50percent/ Mon, 13 Jan 2025 18:26:50 +0000 https://www.idefendhome.com/?p=10026 Unsurprisingly, AI is being leveraged by cybercriminals to create cunning, convincing, and highly effective scams. They’re so effective that they’re fooling half of their intended victims. Here’s what to watch out for and how you can try to avoid falling for these sophisticated scams.

The post Scams Created by AI are Fooling Over 50% of Their Targets first appeared on iDefend.

]]>
AI_computer
Unsurprisingly, AI is being leveraged by cybercriminals to create cunning, convincing, and highly effective scams. They’re so effective that they’re fooling half of their intended victims. Here’s what to watch out for and how you can try to avoid falling for these sophisticated scams.

In this article

Back when AI models were becoming an everyday talking point, many experts and those in the cybersecurity industry predicted how scammers and criminals would begin commandeering these tools for their personal gain.

Unsurprisingly, this has proved increasingly true. This last year alone, studies have shown that over half of the criminals’ targets are falling for their AI-powered scams.

How Effective are These Scams?

According to a study conducted by Avant Research Group, when testing against their control group using traditional phishing emails, participants fell for nearly 54% of scams vs only 12%. This is an increase from 1 in 10 people to 5 in 10 people. 

That’s alarming.

Seeing as we’re still in the infancy of many of these AI tools and technologies, this means we’re likely to see even more sophisticated scams showing up over the next couple years. Who knows how high that number might get?

How Does This Affect You?

Based on the study’s findings, they ruled that the findings were useful (meaning we can rely on the numbers) in 88% of cases, and only had inaccurate results for 4% of the participants. This means that nearly 9 out of 10 times a potential victim will be seeing a scam that is so well developed that it has a 50% chance of convincing them.

These numbers should scare you, or at least draw your attention. How are you prepared to navigate a digital landscape where dangers like these exist, and are only going to keep getting better? How confident do you feel about landing in the 46% who didn’t fall for these scams vs the 54% who did?

Is There a Bright Side to All This?

Despite all this gloom and doom, there is some good news in the midst of this. AI models are also being trained by ethical hackers and cybersecurity professionals to recognize scams and flag or block them before they can become an issue.

Because of this, as long as you’re following good practices, common sense, and the usual tips when it comes to protecting yourself from scams, you’ll be alright in most cases. 

Make sure you’re doing the following

  1. Use some virus protection and active scanning, especially in your email accounts.
  2. Don’t click on emails you weren’t expecting.
  3. Don’t open attachments you don’t recognize.
  4. Never click on links in unsolicited emails.
  5. Always verify with the actual person instead of trusting them over email.
  6. If it sounds too good to be true, it probably is.

Falling for Scams? iDefend Can Help!

Fortunately, iDefend members enjoy access to an expert support team who are always happy to help you look at and review suspicious emails, help you adjust your antivirus and detection settings, and even recover from scams or cleaning up your devices if they get infected.

Learn more and get protected today! Try iDefend risk free and save 30%.

The post Scams Created by AI are Fooling Over 50% of Their Targets first appeared on iDefend.

]]>
5 Things to Know Before Installing Smart Cameras https://www.idefendhome.com/blog/devicesecurity/5thingsaboutsmartcameras/ Tue, 06 Aug 2024 21:29:58 +0000 https://www.idefendhome.com/?p=6864 Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
pexels-introspectivedsgn-7635126
Adding smart cameras to your home can increase your security and safety, but they are not without their risks and concerns. Here are a few things to know before you buy some.

In this article

A popular addition to many smart homes, security cameras that connect to an app on your phone are an important part of many homeowner’s day-to-day security. These devices are relatively simple to install, quick to get online, and then easy to access whenever you need them.

The problems begin to arise when you get into using them without considering some basics first. To help you out, we’ve put together a few tips for you to consider before taking the plunge and decide if smart cameras are right for your family.

Be Aware of Local Laws

Depending on the area in which you live, you might have to fill out some additional forms, or even pay certain fees before you can install security cameras on your home.

The good news is that in most US States, recording in public areas (i.e. the street) is perfectly acceptable. It’s also worth noting that if your camera is recording sound alongside video then it could complicate things for you.

Be sure to double check your local regulations and you should be good. A quick internet search is likely all that you’ll need to perform anyway.

Discuss Plans With Your Family

If you’re going to be adding cameras to your home, be sure to talk with the other people living there. Chances are, everyone would like to know where and when these devices will be recording.

Another thing to consider is guests and others visiting your home. If you’re going to be recording mostly innocuous footage then no big deal. However, if you’re going to have them in less-conspicuous locations it may be courteous to explain to regular friends and visiting family what to expect.

Choose Smart Locations

For external cameras

Perhaps one of the most important aspect of smart cameras is their placement. If you’re using them primarily for home security and surveillance, then positioning them with a good view of all the major entrances to your property is a good idea.

Another angle of security is visibility. Sometimes you’ll want the cameras to be out in the open to deter any would-be wrongdoers. At the same time, there are cases where keeping the devices more discreet will be what you’re after.

A final use for external cameras are doorbell or front door cameras. These are most useful for package drop off and delivery, and can also stop “porch pirates” from making off with your latest Amazon order.

For internal cameras

Cameras inside your home require much more careful consideration where they are placed. Avoiding private areas should go without saying, but there are still some useful areas for the devices.

A popular use for internal cameras are in you children’s rooms such as toddlers or babies. This allows the parents to keep an eye (or ear) on their kids via an app on their phone. This can be wonderful when you want to check in on how they’re doing.

Another common area is the kitchen or living room, areas that typically command a wide view of the home. This can give you increased peace of mind while you’re away, or allow you to keep an eye on housekeepers or pets while on vacation.

Maintenance

Maintaining your cameras, could include things such as: lens cleaning, trimming tree limbs, sweeping up cobwebs, etc. Removing physical obstructions will be crucial for your camera’s functionality and lifespan. If it’s going to be exposed to the weather, make sure it’s a kind designed for heavy outdoor usage.

Storing and deleting footage

You should also keep in mind that the footage your camera collects will need to be stored somewhere. Some models will opt for on-board storage. This physical memory will either need to be downloaded or actually taken out of the camera if it’s a memory card.

If your camera connects to the cloud, then you will only need to worry about the space you’re paying for there.

In both cases, it’s often not worth your time or money to keep really old footage. Unless it’s got some evidence of a crime, or something valuable to you, you’re better off cleaning out old data regularly to ensure your camera has plenty of room to continue recording.

Know the Safety and Privacy Risks

By far the biggest concern with cameras is their proximity to sensitive data. In this case, the data is you and your family, as well as anyone else entering your home.

Regardless of whether the smart camera can record either video, audio, or both, the moment a hacker gets into your system, they could suddenly have all of this data at their fingertips. 

This is where internal cameras are especially risky as they post the greatest access to this type of data. If you’ve got smart cameras inside your home, make sure they are locked down!

Ensure you have strong network security

Wherever you have the data stored, make sure it’s safe. On top of that, if your camera is connected to your home network, make sure you’ve got a strong password, firewall, and have shorn up any access points. This will make it more difficult for a hacker to get inside.

It’s also probably worth your time to have an expert check out your system and review your network security. iDefend Advisors are trained to assist with network security threats and are an excellent resource for you in this area.

The post 5 Things to Know Before Installing Smart Cameras first appeared on iDefend.

]]>
Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes https://www.idefendhome.com/blog/familysafety/snapchatai/ Mon, 22 Apr 2024 20:39:02 +0000 https://www.idefendhome.com/?p=5618 Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
pexels-shvets-production-7194009
Snapchat, known for its disappearing messages and creative filters, has evolved over the years to slowly incorporate advanced AI features.

In this article

In the digital landscape of today, social media platforms have become integral parts of our daily lives. While these innovations offer convenience and entertainment, they also raise significant concerns, especially when it comes to the safety and well-being of teenagers.

Among these concerns is the omnipresence of Snapchat’s AI, which can be accessed at any time, and the potential dangers it might pose.

Chatbot

One of the most striking aspects of Snapchat’s AI is its chatbot, an interactive feature that allows users to ask questions, seek advice, and engage in conversations. For teenagers, this seemingly harmless function can present a myriad of risks. The allure of a “digital friend” that is always available to chat might lead teens to seek guidance from the AI on sensitive or personal matters.

Whether it’s questions about relationships and sex, mental health, or even more troubling subjects like self-harm, the AI provides immediate answers without the nuance and empathy of a human response.

Teenagers are impressionable

The danger here lies in the misconception that this AI is a reliable source of information and support. Teenagers, who are still developing their critical thinking skills, might take the AI’s responses at face value without questioning its accuracy or understanding its limitations. This can lead to misinformation, misguided decisions, and a lack of human connection when they might need it most.

Privacy Concerns

Furthermore, the constant presence of the Snapchat AI raises privacy concerns. Every interaction with the chatbot is recorded and stored, contributing to the vast data pool that fuels Snapchat’s algorithms.

This data can be used to create targeted advertisements, personalize user experiences, and even predict behaviors. For teenagers, whose online behaviors are still evolving, this data collection can have long-lasting consequences.

You Can’t Remove It

Another alarming aspect is the inability to remove the AI from the app. Unlike traditional chatbots or apps where users can opt out or disable features, Snapchat’s AI is deeply integrated into the platform. The only way to remove it is by subscribing to Snapchat+, the premium version of the app.

This creates a dilemma for parents and teens alike. As a parent, if you don’t want your child to interact with the AI, there is no way to actually hide or get rid of it, giving your child unlimited access.

What to Do as a Parent

As parents navigate the complexities of raising teens in the digital age, understanding these dangers is crucial. Initiating conversations about online safety, critical thinking, and the limitations of AI can empower teens to make informed decisions. Encouraging them to seek human support when needed, whether from trusted adults or professional resources, can provide a balance to the allure of the always-available AI friend.

While Snapchat’s AI offers convenience and entertainment, its potential dangers should not be underestimated. From providing questionable advice to collecting vast amounts of personal data, the implications for teenagers are significant. As we move forward in this digital era, it is essential for parents, educators, and society as a whole to remain vigilant, informed, and proactive in safeguarding the well-being of our teens in the digital realm.

The post Snapchat AI is Your Teen’s Private Chatbot – Free From Your Prying Eyes first appeared on iDefend.

]]>
The Dangers of TikTok Trends https://www.idefendhome.com/blog/familysafety/tiktoktrends/ Wed, 10 Apr 2024 19:26:17 +0000 https://www.idefendhome.com/?p=5570 Eating TIDE pods, licking unbought ice cream for unsuspecting shoppers, or high schoolers destroying school bathrooms. All of these have become extremely popular trends on Tiktok and other social media outlets, yet these can prove to be incredibly dangerous and even cause death, and for what? To go viral and have millions of people see you at a simple swipe of a finger.

The post The Dangers of TikTok Trends first appeared on iDefend.

]]>
tiktok-dangers
Eating TIDE pods, licking unbought ice cream for unsuspecting shoppers, or high schoolers destroying school bathrooms. All of these have become extremely popular trends on Tiktok and other social media outlets, yet these can prove to be incredibly dangerous and even cause death, and for what? To go viral and have millions of people see you at a simple swipe of a finger.

In this article

Tiktok is a media source phenomena to put it lightly. When it was released back in 2016, within a few months the app had over 100 million active users, all watching videos that were a minute or less. This is unprecedented, and the following years have seen this app explode in popularity.

In January of 2023, for example, it had a staggering 104 Million App Downloads. That’s more than 3.3 Million downloads a day. Teens and adults alike can post videos in a matter of minutes for all the world to see, all with the hopes of going viral.

How TikTok Works

Tiktok works by having the user watch videos. The more that you watch a video the more the creator makes while Tiktok generates avenues through ads and selling your data (but that’s another topic for another time.) When someone creates a video, Tiktok releases the video to a small audience to see if the video gets a number of hits, or reactions. Once it meets the requirements, the algorithm then releases it to a bigger audience and so on until a viral effect is reached.

And anyone 13 or over can create videos to be uploaded on Tiktok, giving them hope to one day go viral and be popular among the community. These trends can be a dance, some kind of physical challenge, or mouthing the words to movie lines. With that, there have been some dangerous trends that have reached a viral effect and encouraged others to participate in the hopes that they will go viral as well.

Recent and Past Viral Trends

Below are some of the viral Tiktok trends in the past few years.

The Benadryl Challenge

The Benadryl Challenge saw teens and adults trying to take an excessive amount of benadryl in order to cause themselves to hallucinate. Unfortunately, it caused multiple hospital cases and even the death of a 15 year old girl.

“Benadryl in large doses can cause seizures and cardiac arrests. If young people are being encouraged to take it in large doses on TikTok, this is very dangerous.” David Juurlink, MD, of University of Toronto in Canada said.

The Penny Challenge

The Penny Challenge had teens partially unplug a charge port for an iphone and then stick a penny between the two prongs. This would then create a huge spark that would leave a scourge mark around the outlet and wall. Sometimes doing so would cause house fires, but nearly every time, at the very least, it caused damages.

The Sleeping Chicken Challenge

The Sleeping Chicken Challenge was where a man uploaded himself cooking his chicken with an entire bottle of Nyquil. The heat would dissolve most of the liquid, giving you a very concentrated amount of Nyquil to ingest. The man was then shown eating the chicken he had prepared and the trend shot to millions of views in a matter of hours.

Blackout Challenge

The most recent trend was the “Blackout Challenge” where teens filmed themselves holding their breath or having another squeeze their neck until they lost consciousness. This dangerous trend resulted in multiple deaths including a 10-year-old girl who died in the US December of 2022 after reportedly attempting the challenge.

TikTok Doesn’t Care About Kid’s Safety

Each of these trends happened within the last two years, and the scariest part is that Tiktok did nothing to take down or stop the videos. Once the videos get a certain number of hits, Tiktok will, in fact, send the video out to more people to get more views and generate more revenue for them. The more views these videos get, the more money Tiktok makes. They, in no way, care about the safety of your kids.

There was another video that went viral where a New Jersey teenage girl was getting beat up by her peers outside of her classroom. The bullies then posted the video on Tiktok and ended up getting millions of views in a day. The bullied teen saw how many had seen it, and after the bullies continued to harass her over her phone, she ended up committing suicide. She was only 14 years old.

Social Media Has a Dangerous Side

Social Media does little to protect minors in the world today. As long as they can make an easy dollar, they will allow nearly anything to be posted. With that, Tiktok also has a flood of “soft” pornography that creators post to lead you to their Only Fans accounts. By clicking a link, you can see their Instagram, Twitter, and Only Fans, giving your teen easy access to pornography. Twitter also allows fully nude photos to be posted, and is used as a way to convince viewers to purchase their Only Fans subscription.

Tiktok is a gateway to a world of information and fun, but it can come at a great cost. You will have zero control over what your teen watches and views as anything can come up as a recommended video. Be mindful of the trends, and if you decide for your teen to have a Tiktok, be sure to have rules and guidelines while they are online. To have them participate in these trends can not only cause permanent harm to their bodies, but may also result in death.

The post The Dangers of TikTok Trends first appeared on iDefend.

]]>
Hashtag What? Understanding TikTok Lingo https://www.idefendhome.com/blog/familysafety/tiktoklingo/ Fri, 05 Apr 2024 19:44:42 +0000 https://www.idefendhome.com/?p=5582 As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and words your kids are using. Here's some for TikTok that may help you out.

The post Hashtag What? Understanding TikTok Lingo first appeared on iDefend.

]]>
tiktok-lingo (1)
As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and words your kids are using. Here's some for TikTok that may help you out.

In this article

TikTok is one of the most popular social media apps today. Its fast-paced, short content is enticing, addictive, and easily becomes consuming. While it can be used safely, there are plenty of dangers to be aware of.

Knowing and understanding the lingo used by the app will enable you to have more informed conversations with your teen.

The Lingo

  • “For You” feed. The For You feed is curated to fit each user’s interests and behavior. As kids interact with the platform — watching videos, searching for keywords, and exploring new hashtags — the algorithm mimics their preferences and serves customized content.
  • “Following” feed. Just like it sounds, the Following feed displays the TikTok accounts that are following your child. It’s a good idea to ensure this list only contains friends or people your child knows.
  • Challenge page. Challenges encourage users to record themselves doing something humorous, vulnerable, or difficult and share these videos — persuading other users to do the same. Most challenges are tame, but others promote harmful behaviors or could cause serious injuries.
  • Discover page. The Discover page is where kids find new and exciting content. Trending hashtags, videos, creators, and sponsored content congregate on this tab.
  • In-feed ads. Unlike ads on other video apps, TikTok ads are nondescript. In-feed ads look just like regular TikTok videos, and automatically play as users scroll through their feeds. For example, advertisers might feature well-known influencers to promote popular video games or beauty products.
  • QR code or TikCode. TikTok gives every user a unique TikCode to make it easier to follow each other. Instead of manually typing in a person’s handle, kids can swap profiles by pulling up their TikCodes and asking friends to scan them like they would a QR code.
  • Duet and Stitch. Duets are two TikTok videos playing in a split-screen format using the same audio. Stitch offers another way for users to add their own flair to someone else’s content. You can clip and “stitch” together scenes from another person’s video to make an entirely new video. Stitch is only available for TikTok users who are 16 years of age or older.
  • TikTok Live. Similar to Facebook or Instagram Live, TikTok Live lets users interact in real time. Creators use this feature to communicate with their followers. Brands may use Live for sales or giveaways. Live is only available for users over the age of 18.
  • Reactions. Within TikTok, users can record their own videos of themselves watching another person’s video. The idea is to show their spontaneous reactions to a video — whether it’s surprise, laughter, or shock.
  • Hashtags. TikTok hashtags operate the same way as those on other social media apps. Using hashtags, users can discover trending content from accounts and users whom they haven’t yet followed.

The post Hashtag What? Understanding TikTok Lingo first appeared on iDefend.

]]>
Snap What? Understanding Snapchat Lingo https://www.idefendhome.com/blog/familysafety/snapchatlingo/ Sun, 17 Mar 2024 19:51:33 +0000 https://www.idefendhome.com/?p=5593 As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and whatever those words are your kids are using. Here's some for Snapchat that may help you out.

The post Snap What? Understanding Snapchat Lingo first appeared on iDefend.

]]>
pexels-thought-catalog-317580-2228569
As a parent, it can be difficult to keep up with all the modern slang, social media lingo, and whatever those words are your kids are using. Here's some for Snapchat that may help you out.

In this article

Snapchat has grown and expanded into a staple app for teens and adults everywhere. The ability to communicate with your friends and family through photos and videos that disappear has become a staple app.

Fun filters, posting to your story, and watching a quick discover story has become a highlight for those who use the app, but with Snapchat comes its own lingo.

So what do these terms mean?

The Lingo

  • Snap. Each message you send, text, picture or video, is a snap
  • Story. When you snap a video or photo you can decide to post it to your friends and even to the public for all to view. Stories are publicly visible for 24 hours, then disappear. There are no limits to the amount of stories you can post
  • Memories. Stories which are automatically saved. Snapchat will show you certain stories on the anniversary of when you posted them. Snapchat can also make short videos showing you the memories if multiple videos and pictures were posted on that day.
  • Snapcode. A scannable code that can be used to quickly add friends to a Snapchat profile. Looks like a QR code.
  • Snapstreak. This term refers to the length of time that two people have snapped each other consistently for consecutive days. It’s extremely popular for friends to compete and see how long they can maintain their streak without missing a day and breaking it.
  • Geofilter. Like filters, you can use a geofilter to decorate snaps and share your location (popular at large, public events).
  • Snap Map. With this feature, you can share your location and look around a map to see where other people are located.
  • Discover. Media content created by celebrities, entertainment outlets, and random strangers. While many of these content providers are legitimate, you can’t truly predict what might pop up. Alcohol ads, offensive language, or nudity/sexual talking points could pop up just as easily as the New York Times. Content is typically promotional in nature and is frequently mature in subject matter.

The post Snap What? Understanding Snapchat Lingo first appeared on iDefend.

]]>
Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You https://www.idefendhome.com/blog/familysafety/sextortion/ Tue, 23 Jan 2024 20:12:11 +0000 https://www.idefendhome.com/?p=5603 What starts out as a flirtatious text can quickly turn into a whirlwind of trouble for your child.

The post Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You first appeared on iDefend.

]]>
sextortion
What starts out as a flirtatious text can quickly turn into a whirlwind of trouble for your child.

In this article

Predators and scammers will text your teen to try to develop a relationship by sending flirtatious and fun texts. They will say anything to help develop a relationship and connection all to set the trap.

The moment your child takes and sends the explicit pictures, it is far too late, the trap has been sprung and the scammer is prepared to take full advantage.

Panic is the Natural Response

Your child starts to panic. The person they trusted is suddenly threatening to release the pictures on your child’s social media. The person pulls names of friends and family members saying that they will personally message them the pictures and show them what they’ve done. Sometimes going so far to locate your child’s school threatening to post there to all of your peers, but then they’ll give your teen a way out.

If your child pays $500, then nothing will happen. No pics will be sent, and all of this can go away. The stress that your child is feeling is overwhelming, there’s a way out, but $500 is a lot of money. Thoughts of hopelessness, fear, anxiety and depression creep in as they’ve locked themselves in a corner with no way out and zero relief on the horizon.

Sextortion is Humiliating

To open up about it to a parent can be humiliating, and other thoughts of ways out can start to creep in. Teens that reported sextortion cases found that 1 in 3 teens had engaged in self-harm, threatened suicide or attempted suicide as a result of the sextortion.

It’s difficult when teenagers are constantly searching for gratification and acceptance. With that, hormones can play a major part and cloud judgment. They are learning all the new and exciting things becoming an adult holds, and to explore all of that is a thrilling adventure, but such choices can have major consequences that can affect years to come.

Sextortion is Avoidable

The sad part is that sextortion is 100% avoidable. With social media, your teen can instantly connect with anyone they would like, not knowing if they are real or fake. Everyday millions of messages are sent out to strangers to try to connect with them for a multitude of reasons, and predators will always search for a way in.

What you can do as a parent

So what can you do to ensure that your child never falls victim to this trap? Firstly, be sure to have open conversations with them about these kinds of threats. Educate yourself and them on the dangers of the world, and what people will do to take advantage. Recommend to them that they never message and text strangers they don’t know.

Most of all, especially with people they know, never send out explicit messages, pictures, or videos. Nothing good will ever come of that, and there are also legal actions that can be taken against your child for sending such pictures.

How and When Does it Happen?

Sextortion most commonly occurred via phone/tablet messaging apps, social networking sites and video chats. 56% of reports indicated that only one messenger platform was involved, yet 42% used multiple platforms. The offender would intentionally and systematically move the communication with the teen from one platform to another such as Facebook, Snapchat and text messages.

When your child sends the pictures or videos, 80% of predators will threaten blackmail on the same day. However, 20% of the reported cases indicated prolonged waiting periods before any threats of blackmail were made with the acquired content. In some cases, years later. With such blackmail and payouts victims lost more than $13.6 million in the 18,000 sextortion-related complaints in 2021.

Warning Signs & Predator Tactics

Those who your teen is talking to are rarely who they claim to be. Keep in mind that the teenage girl they believe they are speaking to may very well be a middle aged man. There are certain tactics to keep in mind that the predator may use such as:

  • Reciprocation, the offender promises to provide sexual content in return for your child providing the same. “I’ll show you, if you show me.”
  • Developing a bond by establishing a friendship/romantic relationship.
  • Secretly recording sexually explicit videos of the child during video chats.
  • Physically threatening to hurt or sexually assault the child or family members.
  • Using multiple online identities against a given child, such as the person blackmailing for sexual content as well as pretending to be a supportive friend or a sympathetic victim of the same offender.
  • Pretending to be younger and/or a female.
  • Threatening to commit suicide if the child does not provide sexual content.
  • Creating a fake profile as the child and threatening to post sexual content of the child.
  • Saving sexually explicit conversations with the child and threatening to post them online.

There is Hope

You and your family never need to become a victim of sextortion. Take the steps necessary and educate your child on the threats that exist around them. The online presence of predators and bullies are very real, but as we take the proper steps to prepare and protect our children, we can have peace of mind when facing the dangers of the world.

The post Sextortion: A Parent’s Worst Nightmare Coming Soon to a Smartphone Near You first appeared on iDefend.

]]>
5 Tips for Social Media Safety https://www.idefendhome.com/blog/onlineprivacy/5tipssocialmedia/ Fri, 08 Dec 2023 22:49:21 +0000 https://www.idefendhome.com/?p=5736 These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>
pexels-cottonbro-5053835
These days, it's almost impossible to spend a day on social media without encountering some potential security issues: scams, privacy leaks, and fake follower requests just to name a few.

In this article

Social media is a powerful tool which allows us to connect to the lives of those around us without the need to be near. With that comes the ability to instant message, share photos and videos, as well as view what others have chosen to share.

You may not have enough information for someone to completely steal your identity, but if your profile isn’t properly protected you can allow for phishing attempts among other threats to take place.

Here are five tips for better safety:

1. Be aware of social media scams

Scam artists work to build a profile of you. When your Social Media account is allowed for anyone, including those not of your friends or followers, to openly view you, you allow for them to gain a view into your life. Those potential thieves can look in and view person videos and photos that you have uploaded. This allows them to discover ways in which they can advertise to your needs to trick you to freely give out your information for them to steal your identity.

Take for example that you recently had a birthday party. You posted pictures, tagging friends and family, as well as a few videos to commemorate your special day. The fact is that when your account is open for the world to see, they can look in and see what your home is like, who’s in your family and friends circle, as well as who you are as a person.

Still, there are some vital steps you can take which will allow you to better protect yourself.

2. Ensure your account is fully private

When new friends wish to add you, they can search for your name/username and pull up a variety of accounts until they see the corresponding picture of you. When they click on the link to your profile, they will be given a preview of your account, and the chance to send a request. Now how much you decide to show on your profiles is entirely in your control.

Under your setting section there is a tab labeled privacy. Under that you will be able to pick and choose what you want to show. It is recommended that you hide all information, including social posts. Your profile picture will still be shown, but past profile pictures, among other information will be protected and hidden until you accept that friend request.

If you want to view how your profile looks when others click on you, simply open an incognito window, and post your profile link. This will allow you to see exactly what they see before they send a request.

Tip: Do not list family members on your Social Media Account. Doing so can in fact give thieves information into common security questions, such as your mother’s maiden name. Photos also can reveal the color of your first car, first pet name, and so forth.

3. Know what happens to your information

There are a few items to keep in mind as well outside of what scam artists may be looking for. Social Media websites can also compromise your information and send it to advertisers to help them plot out ads that peak your interest. One thing you can do to help combat this is to keep your location data private. When you’re on your account with your phone, usually the app will be tracking your location and whereabouts. They can also see what you are searching for, what you are clicking on so that they can better populate their web address with ads. To keep it private, go into the settings on your phone, and find the app. Once you do, you can pick the location tracking, and turn it on to, never allow.

Consider using a VPN

Another option would be to install a VPN on your phone and computers. This would ensure that everything that you do is hidden, and that your IP isn’t exposed as well. Your information, searches and clicks on the web stays with you, and isn’t released to outside sources.

Don’t give away too much in your “About” section

Your About section on your profile can carry with it multiple points of valuable information. The nice part is, is that you can simply go in and delete it all together. Information like where you currently work, past places you’ve lived, and family and relationships, can give a perpetrator all the information they need to scam you.

While a scam artist is searching through your profile, one dangerous section is in your contacts. The most common personal information exposed on the dark web is email and phone numbers, and your Social Media profile has direct access to both. Luckily, you can go into your ‘About’ section and mask or delete that information so you will not be the victim of SPAM or Phishing attempts.

4. Only accept requests from those you know

Fake accounts are abundant, and in a matter of minutes someone can look up pictures of someone, upload them to a profile, and make it appear legitimate under a fake name. Once that is done, they can send requests to anyone they would like, to try to gain the ability to view profiles. The most important thing to remember with this is to only accept requests from those you know in person.

There is a dangerous scam that can sometimes occur where your friend’s account is copied and you receive a request to refriend them. Sometimes you can even receive a message explaining how the error occurred and why the need to friend them again. The smart thing to do is verify with the friend directly through some other source, ex. Via Phone, and confirm if that truly is the case.

5. Watch out for common attacks

One of the most important things to remember is to trust yourself when you believe it is questionable. If a friend that you haven’t spoken to in a while randomly sends you a message like, “This video is so funny! Check out this link:” Then there is a chance that your friend’s account has been hacked. Never click on the link. Doing so causes for your account to be compromised with theirs, which can be dangerous because you won’t know what kind of information they were able to gather while in your account.

When in doubt, change your password

If this does end up happening to you, immediately change your password as soon as possible. It is a good rule of thumb to change your password every couple of months to something unique and to only this account. If your password and email is compromised, then each account which uses the same username and password can be accessed as well.

Avoid “Click-bait”

Another hazardous “Click-Bait” which can also compromise your information is the Quizzes or ‘Find Out Tests’. When you want to discover ‘Which Animal Best Fits Your Personality’ you click on a link which transports you to an outside source. There you are prompted to allow access to certain information, and need to click ‘Accept’ or ‘Allow Access’. Each time you allow access to your account you allow for that service to receive anything they would like. You gave them access, yet have no idea what they took, or will use it for.

The post 5 Tips for Social Media Safety first appeared on iDefend.

]]>
Top 10 Bad Cybersecurity Habits to Break in 2022 https://www.idefendhome.com/blog/devicesecurity/10badhabitstobreakin2022/ Sat, 22 Jan 2022 17:22:57 +0000 https://www.idefendhome.com/?p=5841 We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
old_habits_new_habits-300x200-1
We all have bad habits, and the new year is a great time to try (and usually fail) breaking them. Here are 10 simple things you can stop doing to have better cyber health.

In this article

The new year is a great opportunity to evaluate many areas of your life. With cybercrime surging to all-time highs last year, improving your personal and home cyber protection has never been more important. Take better control of your online security and privacy this year by breaking a few bad cyber habits that may put you at risk.

2021 was a big year for cybercrime

Last year shaped up to be one of the worst years on record for cybercrime and losses from scams. In the first nine months of 2021 alone, 281.5 million people were impacted by data breaches and data leaks (ITRC). Hackers targeted people working from home, resulting in a 300% increase in data breaches with their employers (Verizon).

Over $80m scammed

During a nine month stretch last year, victims were scammed out of $80 million in cryptocurrency investment scams (FTC). And that’s only what’s been reported to the Federal Trade Commission. At the same time in 2021, the elderly in America lost over $1 billion in new cyber scams (IC3).

If by chance you’re not feeling the urgency to find new ways to protect your digital world, consider that more than a third of US identity theft victims last year said they didn’t have enough money to buy food or pay for utilities last year after suffering financial losses due to fraud (ITRC).

Focus on things you can control

While you can’t control things like data breaches with businesses, you can do your part. Here are 10 bad habits to break this year to better protect your privacy and your hard-earned money.

Stop doing these things now:

1. Stop ignoring computer problems

When your computer starts having problems – when applications don’t work, files go missing, or your computer and your internet becomes painfully slow, your computer might be infected with a virus, spyware, or other types of hacker tools. Do not ignore computer problems. Get a security check-up done right away from a trained professional when your computer starts acting up.

2. Stop using outdated software

Don’t ignore security updates to your computer and smart devices. More than 50 new vulnerabilities in operating systems, browsers, and other software on computers and devices are discovered every day. Cybercriminals look for and use these vulnerabilities as a top method of attack. The good news is that by switching on automatic updates and clicking to update when prompted, you can easily keep your computer and your smart devices up to date and protected.

3. Stop not thinking before clicking

Scam emails, known as phishing emails, are possibly the most prolific cyber threats you’ll face today. Attackers try to trick their victims into clicking on malicious links or opening a virus-infected attachment in an email that appears to come from a legitimate company or person. The number one rule is to think before you click. If you weren’t expecting the email, be suspicious.

4. Stop using bad passwords

Using the same password for multiple accounts and easy-to-guess security questions gives hackers a massive advantage. Create strong passwords for your accounts. Try using long phrases you’ll remember as your passwords, the longer the better. Don’t use the same password everywhere. Consider using a password manager to remember your passwords and phrases. And be sure to switch on two-factor authentication (2FA) on any account that offers it.

5. Stop not using security on all devices

Everyone knows you should have good anti-malware protection on your computers. Don’t forget to protect your smart phone and tablets too, especially if you have Android devices. Be sure to download and use highly recommended security apps from Google Play and the Apple App Store.

6. Stop using non-secure websites

Start paying attention to the security of websites you visit. HTTPS sites use encryption to protect your connection to the site. It authenticates the site as genuine and that it’s not a phishing website. Look for the padlock symbol and the “S” in HTTPS at the beginning of the website URL.

7. Stop sharing work and personal

With many of us spending more time working from home and maybe using personal devices for work too, the lines between personal and work on computers and devices have become blurred. Keep work and personal separate. Only use your personal email and passwords for consumer shopping, online banking, etc. Keep children and other family members off computers that you use for work.

8. Stop giving out personal information

Never give out personal information to someone who has called you. Scammers are getting good at convincing people to share their date of birth, account numbers, and other credentials over the phone. Legitimate businesses and government agencies will never ask you for private information by phone. Hang up, look up the company’s phone number yourself and then call them back.

9. Stop not backing up your files

Ransomware attacks continue to happen. Imagine if you were suddenly locked out of your computer with a message left by the hacker demanding $10,000 in bitcoin as a ransom payment to get your computer back. All the data on it, and potentially cloud storage, could be lost forever – including family photos and important work documents.

Be sure you have a cloud backup of all your files or that you regularly back up everything to a portable hard drive and store it separately in a secure location. Wiping your computer and reloading from a backup is often the only way to recover from a ransomware attack.

10. Stop not protecting your smart home

Nearly every home is outfitted with smart gadgets like voice assistants, smart TVs, and security cameras. But these smart devices are also becoming an attractive target for criminals. They can be used to infiltrate your home network, your computers and ultimately, your personal data.

Be sure to change the default passwords that come with the device – such as your home Wi-Fi router. Where possible, edit the privacy settings on devices (like a voice assistant) to not allow it to share your activity and information with the manufacturer (such as Google). Also, watch for software and firmware updates from the product manufacturer that fix potential security flaws as they are discovered. Think twice before purchasing new gadgets or toys that listen to things going on in your home, record video, or otherwise track you.

Here’s to a secure 2022!

In many ways, we are all looking forward to a better year than last year. We have enough to worry about without stressing over attacks on our digital lives. To help make sure it’s a year full of good things, start by improving your personal cybersecurity and privacy today.

 


Staying current with all the right protections can be a daunting task. Fortunately, expert help is available for helping you establish a complete cyber defense plan for you and your loved ones. iDefend is a comprehensive identity theft and cybersecurity program for individuals and families that includes unlimited access to U.S. based cybersecurity experts and advisors to help you protect your digital life.

The post Top 10 Bad Cybersecurity Habits to Break in 2022 first appeared on iDefend.

]]>
Easy Cyber-Safe Summer Travel Tips https://www.idefendhome.com/blog/onlineprivacy/summertraveltips/ Thu, 20 May 2021 18:21:43 +0000 https://www.idefendhome.com/?p=5852 Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>
AdobeStock_206919565-1024x683
Masks are coming off, holiday travel is opening up, and cyber criminals are ready to seize your personal information and your money as you try to escape. So, while you make your summer vacation plans, be sure you are cyber-safe while traveling and continue to stay protected after you return.

In this article

Identity theft and cybercrime continue to rise at epidemic levels, and with a care-free summer of travel and vacations coming, thieves have come up with new schemes and employed a series of cyber-attacks that are now being unleashed upon the unsuspecting public. Here are some of the most important things you can do to stay cyber-safe when you leave home and hit the road.

Tips for mobile devices

When we travel most of us use our mobile phones for nearly everything, such as maps, staying in touch with family and friends, travel reservations, etc. It’s important to remember that your mobile devices constantly send and receive data, and the information on your mobile device is often more valuable than your suitcase or wallet.

Here are a few things you can do to protect yourself by securing your mobile devices:

  • Update your devices: One of the most effective ways to stay cyber-safe is to continuously update your devices. Most updates contain critical security fixes to keep you protected.
  • Use strong passcodes/passwords: Lock your device with a long passcode of 6 or 8 numbers, or better yet with facial recognition. On laptops, a minimum of 8-12 character password is recommended using uppercase and lowercase letters, numbers and special characters.
  • Use caution with Bluetooth: Disable your Bluetooth networking while you are travelling to prevent unwanted connection attempts. When you pair your device with a car, your personal information is stored on the car’s system. It’s best to not pair devices with rental cars, but if you do, make sure you delete any stored data and remove your device from the rental car’s paired device list.
  • Keep track of your devices: Ensure that your devices are kept secure while in public places such as airports, hotels, and restaurants. Devices can be easily stolen, which allows access to very private and sensitive information.
  • Set up “find my phone”: Enabling this feature will allow you to find, remotely wipe data and/or disable the device if it gets into the wrong hands.
  • Make a backup before you go: It’s a smart idea to back up your device and your data files to another device or a cloud storage program service.

Tips when using public Wi-Fi

Using open public Wi-Fi at the airport, hotel or a cafe may be convenient, but public Wi-Fi networks and hotspots are not secure. Anyone using the same Wi-Fi connection can potentially see what you are doing on your device, making it an ideal location for hackers to find their next victim.

  • Ensure your device is set to ask permission before automatically connecting to a wireless network while you are traveling.
  • Only use secured Wi-Fi that requires login credentials and passwords.
  • Use the internet data from your cell phone. Create a Wi-Fi hotspot from your smartphone or consider using a trusted virtual private network (VPN) if you need a more secure connection.
  • Avoid logging into your personal accounts or making transactions while on public or hotel networks.

Tips for sharing on social media

Leave your travel plans off social media and consider posting photos and updates about your trip after your return. Opportunistic criminals that are tracking you on social media might see you are gone and attempt to break in and steal from your home.

Fraudsters may also attempt to contact your friends and family with various email and messaging scam tactics by posing as you and asking for emergency money to be able to get back home. Consider setting your social media accounts to only allow friends to view your posts and content.

Final tip

To reduce your worries and get some peace of mind while traveling, consider enrolling in a complete identity theft and cyber protection service such as iDefend. You should know who to contact on a moment’s notice if you ever have a cyber-safety problem.

Should you lose a wallet, your bank cards get hacked and money stolen, your phone or computer gets hacked, or your identity is stolen while you are away, it’s wise to have a world-class cyber protection service you can contact for immediate expert help. Otherwise, your wonderful vacation may end in a nightmare.

For help setting up your travel cyber-safety plan before you go, contact one of our friendly iDefend Advisors.

The post Easy Cyber-Safe Summer Travel Tips first appeared on iDefend.

]]>