{"id":790,"date":"2013-10-18T06:39:27","date_gmt":"2013-10-18T14:39:27","guid":{"rendered":"http:\/\/internetsafety.trendmicro.com\/?p=790"},"modified":"2013-10-18T06:39:53","modified_gmt":"2013-10-18T14:39:53","slug":"4-ways-kids-can-spot-and-stop-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.trendmicro.com\/internet-safety\/blog\/4-ways-kids-can-spot-and-stop-cybercriminals\/","title":{"rendered":"4 Ways Kids Can Spot and Stop Cybercriminals"},"content":{"rendered":"<p><a href=\"\/internet-safety\/wp-content\/uploads\/2013\/08\/LynetteOwens_CES.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-thumbnail wp-image-741\" style=\"width: 74px; height: 74px;\" alt=\"LynetteOwens_CES\" src=\"\/internet-safety\/wp-content\/uploads\/2013\/08\/LynetteOwens_CES-150x150.jpg\" width=\"74\" height=\"79\" \/><\/a>By Lynette Owens<\/p>\n<p><em>October 18, 2013<\/em><\/p>\n<p>October is Cybersecurity Awareness Month and it\u2019s a great time to teach their kids how to stay away from cybercriminals. \u00a0Kids are not usually the target of cybercriminals, but kids do gather online where hackers and identity thieves lay their traps.\u00a0 Here are 4 ways they may fall into those traps and how they can stop them in their tracks:<\/p>\n<p style=\"padding-left: 30px;\"><strong>1. Online Searches.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">Finding information online using a search engine like Google is a great way to find it quickly.\u00a0 When there\u2019s some big news or event that\u2019s about to happen or has just happened, kids may rush online to find out more. \u00a0But it\u2019s also a time when cybercriminals get to work.\u00a0 They pay attention to areas of high internet traffic and use this to their advantage. \u00a0Many times they\u2019ll create false websites and links to those sites that are designed to get people to click, download, or open files, but have actually tricked people into downloading malicious software that can secretly watch your surfing habits or open a door to your computer and steal personal information.<\/p>\n<p style=\"padding-left: 30px;\"><b><i>Tip:<\/i><\/b> Think twice before clicking on a search result.\u00a0 Mouse over the link to make sure the URL that your shown is the URL you think it is.\u00a0 Stick to sites that you already know and try to steer clear of sites you don\u2019t know much about.<\/p>\n<p style=\"padding-left: 30px;\"><strong>2. Ads and offers.\u00a0 \u00a0\u00a0\u00a0\u00a0<\/strong><\/p>\n<p style=\"padding-left: 30px;\">Kids might be drawn to online offers for popular products, movies, music, event tickets, or games that are created by cybercriminals.\u00a0 They may offer something so enticing that they will click, download, or enter personal information (their own or yours) to get it.<\/p>\n<p style=\"padding-left: 30px;\">Sometimes well-designed ads for these products show up on websites that are otherwise credible.\u00a0 However, the ads may come from a different source than the place the website itself is hosted, so cybercriminals just have to intercept the place where the ad is stored rather than break into the place where the website is hosted.<\/p>\n<p style=\"padding-left: 30px;\">They might also receive legitimate-looking emails and texts that contain links that, if clicked, lead them to a legitimate looking website asking them to enter personal information or requiring them to download a file.\u00a0 In the end, they may end up giving that information to a hacker or identity thief.<\/p>\n<p style=\"padding-left: 30px;\"><b><i>Tip:<\/i><\/b><i> <\/i>If the offer looks too good to be true, it almost always is.\u00a0 Question these offers, and learn to trust your instincts.\u00a0 Don\u2019t click on or open anything that looks odd.\u00a0 Mark suspicious emails as spam.<\/p>\n<p style=\"padding-left: 30px;\"><strong>3. Mobile apps.<\/strong><\/p>\n<p style=\"padding-left: 30px;\">With the enormous popularity of apps, it\u2019s no surprise criminals have found a way to wiggle onto smart phones by creating false versions of popular, legitimate apps.\u00a0 In the app stores, it\u2019s sometimes tough to tell which ones might be fake ones because they\u2019re disguised so well.\u00a0 Our researchers have discovered false versions of popular apps like Instagram and Angry Birds Space.\u00a0 These fake apps can be designed to do many things like fool you into entering personal information or downloading malicious software onto your phone that steals your information.<\/p>\n<p style=\"padding-left: 30px;\"><b><i>Tip:<\/i> <\/b>Do your research before you download and start using apps.\u00a0 Stick to ones made by companies you know or are already publicly very popular, or look them up online before you download them.\u00a0 Don\u2019t allow apps to automatically connect to your other data (such as physical location or contact lists) if there\u2019s no reason to do it for that app.\u00a0 Consider using a service like Trend Micro\u2019s Mobile Security feature which scans and alerts you of apps that are fake or are somehow stealing information they shouldn\u2019t be stealing.<\/p>\n<p style=\"padding-left: 30px;\"><strong>4. Social networks.\u00a0<\/strong><\/p>\n<p style=\"padding-left: 30px;\">Cybercriminal can sometimes sneak onto social networks, where people connect and follow links or content posted by people they know and trust.\u00a0 They can trick someone into \u201cliking\u201d a post or link that is actually fake or they can infiltrate the ads that are increasingly showing up in the midst of the content we see in our social network pages.<\/p>\n<p style=\"padding-left: 30px;\"><b><i>Tip:\u00a0 <\/i><\/b>Don\u2019t click on links that seem suspicious, even if it\u2019s something that your friend supposedly posted or endorsed in some way.\u00a0 Contact your friend some other way to make sure they really meant to \u201clike\u201d something on a social network page.<\/p>\n<p style=\"padding-left: 30px;\">There are many ways cybercriminals disguise themselves online, and these are 4 avenues that kids may most likely see their work.\u00a0 But if you teach kids to practice thinking critically about everything they see, click, download, post online and if you follow some of the general tips below, you will for the most part, make cybercriminals powerless.<\/p>\n<p>In addition to the above advice, here are a few more tips to follow and teach kids:<\/p>\n<ol>\n<li><b>Use security software.<\/b>\u00a0 The most important first step is to use reputable security software on any device that connects to the Internet, and keep it updated. \u00a0However, cybercriminals use many, constantly changing tactics, so in addition\u00a0to using security technology,\u00a0it\u2019s\u00a0important to be aware and educated about the issues, too.<\/li>\n<li><b>Choose online passwords that are not easy for someone to figure out<\/b>.\u00a0 Pick a word or phrase that mixes letters, numbers, symbols, uppercase and lower case letters to make it as strong as possible.\u00a0 Don\u2019t use the same password for every site or service.\u00a0 One way is to come up with a pattern and change 1-2 characters in the pattern for each site or service you use a password for.<\/li>\n<li><b>Use privacy settings<\/b>\u00a0wherever they are available and use the strongest level possible. On social networks make sure you understand what information is shared about you publicly, and resist openly \u00a0sharing personal information online such as home address, phone number, birth date in emails, texts, blogs, or social network updates.\u00a0 Even with privacy settings, anything you post can still be shared by those who see it, so think before you say or do anything online.<\/li>\n<li><b>Practice thinking critically<\/b>\u00a0about the things you read, post, and download.\u00a0 Not everything you come across online is necessarily as it might appear.\u00a0 Take the time to consider this before you do anything online.<\/li>\n<li><b>Stick to well-known websites, social networks and online services<\/b>\u00a0for downloading music, games, or movies.\u00a0 If you\u2019re unsure if a site is fake or safe, it\u2019s best not to visit it.\u00a0 Or ask your parents or other adult before visiting it.<\/li>\n<li><b>If you need to enter personal information online<\/b>, enter the least amount necessary.\u00a0 Make sure the website begins with \u201chttps\u201d (not http) which is more secure.\u00a0 Also look for information at the bottom of the webpage verifying that the site is secure or has been verified by an outside party to be secure.<\/li>\n<li><b>If you think you may have done something wrong<\/b>\u00a0and may have fallen for a cybercriminal\u2019s trick, let your parent or other adult know so they can check and fix things if necessary.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>To read more, here are additional helpful resources, information and tools:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/home\/brochures\/br_webthreats_safety.pdf\">The Basics of Web Threats<\/a>\u00a0\u2013 a glossary and safety guide<\/li>\n<li><a href=\"\/internet-safety\/this-school-year-help-kids-with-the-safe-responsible-use-of-social-networks\">Staying Safe on Social Networks<\/a>\u00a0&#8211; security tips from Trend Micro<\/li>\n<li><a href=\"http:\/\/www.connectsafely.org\/guides-2\/\">Parents\u2019 Guides to Facebook, Snapchat, and Instagram\u00a0<\/a>\u00a0\u2013 by Connectsafely<\/li>\n<li><a href=\"http:\/\/www.connectsafely.org\/cybersecurity\/\">Parent&#8217;s Guide to Cybersecurity <\/a>&#8211; by Connectsafely<\/li>\n<li><a href=\"\/internet-safety\/wp-admin\/housecall.trendmicro.com\">Housecall online<\/a>\u2013 scan your PC or Mac and clean it up if it\u2019s been infected\u00a0&#8211; FREE<\/li>\n<li><a href=\"http:\/\/housecall.trendmicro.com\/mobile\/\">Housecall for Android<\/a>\u00a0\u2013 FREE<\/li>\n<li><a href=\"http:\/\/www.trendmicro.com\/us\/home\/products\/mobile-security\/android\/index.html\">Trend Micro Mobile Security<\/a>\u00a0\u2013 Security protection including the industry\u2019s first app scanning technology, which lets you know if an app is fake\/malicious or safe to download (Android mobile devices)<\/li>\n<li><a href=\"http:\/\/free.antivirus.com\/us\/smart-surfing-for-iphone\/index.html\">Trend Micro Smart Surfing Mobile<\/a>\u00a0\u2013 will prevent you from visiting hacked\/fake websites on iOS devices (iPhone, iPad, iPod Touch) \u2014 FREE<\/li>\n<li><a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.trendmicro.socialprivacyscanner\">Trend Micro Privacy Scanner for Facebook<\/a> \u00a0\u2013 this app will monitor your Facebook page settings and help you control who can contact you and access your personal information (Android mobile devices)\u2014 FREE<\/li>\n<li><a href=\"http:\/\/www.trendmicro.com\/us\/home\/products\/titanium\/max-security\/index.html\">Trend Micro Titanium<\/a>\u00a0\u2013 full scale security protection for your PC<\/li>\n<li><a href=\"http:\/\/www.trendmicro.com\/us\/home\/smart-surfing\/index.html\">Safe Surfing for the Mac<\/a>\u00a0\u2013 full scale security protection for your Mac<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is Cybersecurity Awareness Month and it\u2019s a great time to teach their kids how to stay away from cybercriminals.  Kids are not usually the target of cybercriminals, but kids do gather online where hackers and identity thieves lay their traps.  Here are 4 ways they may fall into those traps and how they can stop them in their tracks.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"footnotes":""},"categories":[3,4],"tags":[98,80,13,97,8,47,6,16,5,11,48,66,25,10,57,23,55,88,12,82,99],"class_list":["post-790","post","type-post","status-publish","format-standard","hentry","category-for-parents","category-for-teachers","tag-csam","tag-advertising","tag-cell-phones","tag-cybersecurity","tag-digital-citizenship","tag-digital-literacy","tag-education","tag-facebook","tag-internet-safety","tag-kids","tag-media-literacy","tag-mobile","tag-online-privacy","tag-online-safety","tag-parents","tag-privacy","tag-security","tag-social-media","tag-social-networking","tag-social-networks","tag-trend-micro","wpautop"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/comments?post=790"}],"version-history":[{"count":0,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/posts\/790\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/media?parent=790"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/categories?post=790"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendmicro.com\/internet-safety\/wp-json\/wp\/v2\/tags?post=790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}