Category «Crime Security»

Chilrens’s Internet Risk vs Benefits

internet

Parents of young children believe ‘risks of the internet outweigh the benefits’ The majority of parents of young children (under eight) surveyed in a Webwise parenting report in relation to internet use do not believe the benefits of the internet for their children outweigh the risks. While almost three quarters of parents of children under …

Data Breach Hack [Video]

data Breach

Data breach Posted by: Margaret Rouse Personal Health Information, Personally Identifiable Information, Trade Secrets, Intellectual Property A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), …

Data Protection Privacy [Video]

data

What is Data Protection? Individuals, as citizens and consumers need to have the means to exercise their right to privacy and protect themselves and their information from abuse. This is particularly the case when it comes to our personal information. Data protection is about safeguarding our fundamental right to privacy, which is enshrined in international and regional …

Internet Piracy [Video]

piracy

34 Startling Internet Piracy Statistics Have you ever noticed how easy it is to commit piracy on the Internet today? From bootleg movies to P2P file sharing sites, sometimes piracy happens without intention. On the other hand, there are a lot of pirated files that are viewed and shared on a daily basis on purpose. …

Teen Self-Harm Suicide [Video]

Suicide

Teen Self-Harm Suicide Charity blames social media for children self-harming ‘It is vital we confront the fact that an increasing number are struggling to deal with the pressures and demands of modern-day life’ Jane Kirby Social media is helping fuel a nation of “deeply unhappy” children, a charity has warned, as it published new figures …

Social Engineering [Video]

Social Engineering

Social Engineering Attacking the Weakest Link in the Security Chain By Solange Deschatres It’s happened to major corporations, and even the U.S. Department of Defense–falling victim to data breaches that resulted from attackers exploiting employees or company vendors. Unfortunately, along with exposing millions of identities these attacks also reveal what is often the weakest link …

DarkNet Tor [Video]

Darknet

Darknet The threats The increasing use of technology and the Internet in all aspects of daily life puts everyday citizens at risk of becoming targets of cybercriminals. As society comes to rely more and more on the Internet, the dangers posed by different types of cybercrime have become very real threats. These threats come in …

Sextortion of Children [Video]

sextortion

Sextortion Affecting Thousands of U.S. Children Summary Sextortion is a type of online sexual exploitation in which individuals coerce victims into providing sexually explicit images or videos of themselves, often in compliance with offenders’ threats to post the images publicly or send the images to victims’ friends and family. The FBI has seen a significant …

Privacy Anonymity [Video]

privacy

How Does Privacy Differ From Anonymity, And Why Are Both Important? Privacy and anonymity are two different concepts. They are both increasingly necessary as we get increasingly wiretapped and tracked, legally so or not, and it’s important to understand why they are an integral part of our civil liberties – why they are not just …

Child Pedophiles Predators [Video]

predators

WARNING – Content may be Disturbing to some Readers Predators When children go online, they have direct and immediate access to friends, family, and complete strangers, which can put unsuspecting children at great risk. Children who meet and communicate with strangers online are easy prey for Internet predators. Predators have easy and anonymous access to children …