In our modern society, social media is one of the most common ways we communicate with one another. This is true for adults and children.
many children will find even more time than usual to spend on their phones, tablets, or computers. Often times they are communicating through social media apps. Do we know who they are talking to? Do they really know?
As parents, our main goal is to keep our children safe and healthy. This applies to both physical and emotional health.
One important way to help them stay safe while using social media is to monitor their usage. Just like when our children spend time with their friends in real life, we need to know what they are doing and who they are talking to through social media platforms.
While it is important to give our children some freedom, we still need to know that they are being safe and following the social media rules we set for them. Giving them clear rules and consequences for their misuse will help them continue to use social media in a positive manner.
Teach them social media safety habits. While it is ideal to share this information with them before they get on social media for the first time, that might be difficult. These rules and safety measures will be valuable at any time.
1. Be your own person. Never pretend to be someone that you are not. Be who you really are and you will attract the people who will become your real friends.
2. Be nice. Don’t say mean things just because you can hide behind a screen. Your words hurt the same as if you would say them to the person’s face.
3. Think about what you post. Remember that once it is out there it is out there for everyone!
4. Do not add people you don’t know on social media accounts. Having friends and followers is fun but can be dangerous when they are strangers.
5. Never send inappropriate pictures or engage in sexual conversations with peers or strangers. Never. Never. Never.
ALSO – NEVER GIVE OUT YOUR ADDRESS ON SOCIAL MEDIA! Don’t even tell anyone you don’t know what city you live in or what school you go to. Don’t post photos that show your school or give any information about where you live. Try to be as vague as possible about where you live.
If we stress the importance of these rules and safety habits and reinforce them with a consistent reward/consequence system, we can help our children stay safe online. This also will give us some peace of mind when trusting our kids with the responsibility and privilege of using social media.
The threat of having your phone hacked has become a common and rational fear. The cold hard truth is that it is now possible to hack any phone. With the advancement of technology, where discovery of knowledge and information advances the understanding of technology, hackers are able to hack even some of the most sophisticated phone software. But how?
Did you know that hacking software for Android and other mobile devices exists? And did you know there are countless hacking software options online for free? Hacking software is a method used by hackers to get information from a phone. Check out our 2020 Mobile Threat Report to dig deeper.
The serious hackers can buy hacking software anywhere, such as a phone Spy App, which must be installed on the target phone. Not all hackers need to handle a phone physically in order to install hacking software, but in some cases they must.
Keylogging is an approach that involves downloading a spyware app to target the phone and take the phone’s data before encryption. This type of software can be utilized by accessing the phone physically.
Trojan is a type of malware that can be disguised in your phone to extract important data, such as credit card account details or personal information. To install Trojan Malware, hackers use techniques like phishing to influence you into the trap.
Phishing is a method used by hackers where they impersonate a company or trusted individual in order to gain confidential data. Hackers use this method by sending official-looking codes, images, and messages, most commonly found in email and text messages. When this malicious content is clicked on, the URLs can hack your phone because the link has been infected with a hacking virus or software that can take your personal information.
Hacking Using a Phone Number
In order to be able to hack using only a phone number, you must know and understand the technicalities of phone hacking. SS7 signaling is the system used to connect cell phone networks to one another, but in order to use this system as a method of hacking phones, one must have access to it. Recording calls, forwarding calls, reading messages, and finding locations of a particular device can be done with access to the SS7 system. Although, due to the level of difficulty, it is unlikely that the average person would be able to hack a phone in this manner.
SIM Card Hacking
In August of 2019, the CEO of Twitter had his SIM card hacked by SIM card swapping using the phishing method. SIM card swapping is performed when the hacker contacts your phone provider, pretends to be you, and then asks for a replacement SIM card. Once the provider sends the new SIM to the hacker, the old SIM card will be deactivated, and your phone number will be stolen. This means the hacker has taken over your phone calls, messages, etc. This method of hacking is relatively easy if the hacker can convince the provider that they are you. Keeping personal details to yourself is an important part of ensuring that hackers cannot pretend to be you.
AdaptiveMobile Security discovered a new way hackers were getting into phones using the SIM card—a method they call Simjacker. This way of hacking is more complex than phishing as it targets a SIM card by sending a signal to the target device. If the message is opened and clicked on, hackers are able to spy on the hacked device and even find out the location of the device.
Professional hackers can use special software products to search for vulnerable mobile devices with an operating Bluetooth connection. These types of hacks are done when a hacker is in range of your phone, usually in a populated area. When hackers are connected to your Bluetooth, they have access to all of the information available and the internet connection to access the web, but the data must be downloaded while the phone is within range.
Prevent you become a victim of phone hacking
There are many different ways a hacker can get into your phone and steal personal and critical information. Here are a few tips to ensure that you are not a victim of phone hacking:
1. Keep Your Phone in Your Possession
The easiest way for a hacker to steal your phone’s information is to gain access to it — therefore, it is always important to keep your phone in your possession. If you have been away from your phone around a group of strangers and are concerned about possible hacking, check your settings and look for strange apps.
2. Encrypt Your Device
Encrypting your cell phone can save you from being hacked and can protect your calls, messages, and critical information. To check if a device is encrypted: iPhone users can go into Touch ID & Passcode, scroll to the bottom, and enable Data protection. Android users have automatic encryption depending on the type of phone.
3. SIM Card Locking
Putting a passcode on your SIM card can protect it from being hacked. Setting this code can be done on an iPhone by going to Settings > Cellular > SIM PIN. Enter your existing PIN to enable the lock. Android users can go to Settings > Lock screen and Security > Other security settings > Set up SIM card lock. Here you can enable the option to lock your SIM card.
4. Turn Off WIFI and Bluetooth
It is fairly easy for hackers to connect to your phone using WIFI or Bluetooth, so turn them off when not needed because there is no warning when a hacker attacks you. If you fear being hacked in a public space, turning off your phone can block a hacker’s ability to hack you — this is an effective preventative method.
5. Use Security Protection
Protecting your device from spyware can be done for free and simply through A Mobile Security app on an iPhone and Android can help protect cell phones from hackers.
Making a point to understand how hacking works can help you practice security in your every day life. Know how to be prepared for being hacked, so that when it happens you can be on top of how to handle it.
What are the best ways to protect your computer and your personal data? Here are our top tips:
Keep software and operating system updated
Keeping your software and operating system up to date ensures that you benefit from the latest security patches to protect your computer.
Use anti-virus software and keep it updated
Using anti-virus or a comprehensive internet security. it is a smart way to protect your system from attacks.
Anti-virus software allows you to scan, detect and remove threats before they become a problem. Having this protection in place helps to protect your computer and your data from cybercrime, giving you piece of mind.
If you use anti-virus software, make sure you keep it updated to get the best level of protection.
Use strong passwords
Be sure to use strong passwords that people will not guess and do not record them anywhere. Or use a reputable password manager to generate strong passwords randomly to make this easier.
Never open attachments in spam emails
A classic way that computers get infected by malware attacks and other forms of cybercrime is via email attachments in spam emails. Never open an attachment from a sender you do not know.
Do not click on links in spam emails or untrusted websites
Another way people become victims of cybercrime is by clicking on links in spam emails or other messages, or unfamiliar websites. Avoid doing this to stay safe online.
Do not give out personal information unless secure
Never give out personal data over the phone or via email unless you are completely sure the line or email is secure. Make certain that you are speaking to the person you think you are.
Contact companies directly about suspicious requests
If you get asked for data from a company who has called you, hang up. Call them back using the number on their official website to ensure you are speaking to them and not a cybercriminal.
Ideally, use a different phone because cybercriminals can hold the line open. When you think you’ve re-dialed, they can pretend to be from the bank or other organization that you think you’re speaking to.
Be mindful of which website URLs you visit
Keep an eye on the URLs you are clicking on. Do they look legitimate? Avoid clicking on links with unfamiliar or spammy looking URLs.
If your internet security product includes functionality to secure online transactions, ensure it is enabled before carrying out financial transactions online.
Keep an eye on your bank statements
Our tips should help you avoid falling foul of cybercrime. However, if all else fails, spotting that you have become a victim of cybercrime quickly is important.
Keep an eye on your bank statements and query any unfamiliar transactions with the bank. The bank can investigate whether they are fraudulent.
Now you understand the threat of cybercrime, protect yourself from it.
The Internet can be wonderful for kids. They can use it to research school reports, communicate with teachers and other kids, and play interactive games.
But online access also comes with risks, like inappropriate content, cyberbullying, and online predators. Using apps and websites where kids interact, predators may pose as a child or teen looking to make a new friend. They might prod the child to exchange personal information, such as address and phone number, or encourage kids to call them, seeing their phone number via caller ID.
Parents should be aware of what their kids see and hear on the Internet, who they meet, and what they share about themselves. Talk with your kids, use tools to protect them, and keep an eye on their activities.
Internet Safety Laws
A federal law, the Children’s Online Privacy Protection Act (COPPA) helps protect kids younger than 13 when they’re online. It’s designed to keep anyone from getting a child’s personal information without a parent knowing about it and agreeing to it first.
COPPA requires websites to explain their privacy policies and get parental consent before collecting or using a child’s personal information, such as a name, address, phone number, or Social Security number. The law also prohibits a site from requiring a child to provide more personal information than necessary to play a game or enter a contest.
Online Protection Tools
Online tools let you control your kids’ access to adult material and help protect them from Internet predators. Many Internet service providers (ISPs) provide parent-control options. You can also get software that helps block access to sites and restricts personal information from being sent online. Other programs can monitor and track online activity.
Getting Involved in Kids’ Online Activities
More important than blocking objectionable material is teaching your kids safe and responsible online behavior, and keeping an eye on their Internet use.
Basic guidelines to share with your kids for safe online use:
Follow the family rules, and those set by the Internet service provider.
Never post or trade personal pictures.
Never reveal personal information, such as address, phone number, or school name or location.
Use only a screen name and don’t share passwords (other than with parents).
Never agree to get together in person with anyone met online without parent approval and/or supervision.
Never respond to a threatening email, message, post, or text.
Always tell a parent or other trusted adult about any communication or conversation that was scary or hurtful.
Basic guidelines for parental supervision:
Spend time online together to teach your kids appropriate online behavior.
Keep the computer in a common area where you can watch and monitor its use, not in individual bedrooms. Monitor any time spent on smartphones or tablets.
Bookmark kids’ favorite sites for easy access.
Check your credit card and phone bills for unfamiliar account charges.
Find out what, if any, online protection is offered by your child’s school, after-school center, friends’ homes, or any place where kids could use a computer without your supervision.
Take your child seriously if he or she reports an uncomfortable online exchange.
Call the National Center for Missing and Exploited Children at (800) 843-5678 if you’re aware of the sending, use, or viewing of child pornography online. Contact your local law enforcement agency or the FBI if your child has received child pornography via the Internet.
Watch for warning signs of a child being targeted by an online predator. These can include:
spending long hours online, especially at night
phone calls from people you don’t know
unsolicited gifts arriving in the mail
your child suddenly turning off the computer when you walk into the room
withdrawal from family life and reluctance to discuss online activities
Talk to your kids! Keep an open line of communication and make sure that they feel comfortable turning to you when they have problems online.
The Internet and Teens
As kids get older, it gets a little trickier to monitor their time spent online. They may carry a smartphone with them at all times. They probably want — and need — some privacy. This is healthy and normal, as they’re becoming more independent from their parents. The Internet can provide a safe “virtual” environment for exploring some newfound freedom if precautions are taken.
Talk about the sites and apps teens use and their online experiences. Discuss the dangers of interacting with strangers online and remind them that people online don’t always tell the truth. Explain that passwords are there to protect against things like identity theft. They should never share them with anyone, even a boyfriend, girlfriend, or best friend.
Taking an active role in your kids’ Internet activities helps ensure that they benefit from them without being exposed to the potential dangers.
Your profile picture is used as a primary tool for identification on social media. Trouble is, anyone can create a fake Facebook account using your name and even your actual profile picture. To stop this from happening, Facebook has added a feature called ‘Profile picture guard’. Open your Facebook profile and click on the current profile picture (don’t click on ‘Update profile picture’). When the profile picture opens up, click on options at the bottom of the image and select ‘Turn on profile picture guard’. A blue shield will appear on your picture and no one will be able to share or download it anymore.
2) Make your friends authenticators If Facebook detects an unrecognised login or hacking attempt, it will lock down your account, and you wouldn’t be able to access it. The process to regain access to your account used to be a long one and complicated one, but now Facebook allows you to simply choose up to five trusted friends who can help you regain access to your account. Go to Settings Security and login Choose friends to contact, and select at least three people from your friend list. If you get locked out, these friends can send you verification codes for authentication to help you regain access to your account.
3) Know which devices you use.
Under Settings Security and Login, Facebook shows a section called ‘Where you’re logged in’. This section lists all the devices (laptop, phone, tablet etc.) on which you have logged in to your Facebook account. Remove any devices you don’t recognise or don’t have access to anymore. If you’re unsure of the status of certain devices, we recommend that you use the ‘Log out of all sessions’ option, and log in afresh. This will ensure no one else has access to your Facebook account.
4) View all your information When you open your Facebook account settings, you will notice a new menu item on the left – ‘Your Facebook information’. Facebook has consolidated access to all of your information on a single page. You can view information about you by category (posts, photos, comments, likes, etc.) and download any information you want. You can even view and manage your activity log from this page and control which of your activities appear on your friends’ timelines.
5) Manage your Facebook data ADVERTISEMENT
In the Facebook Information page, you also have a shortcut to ‘Manage your data’. When you access this feature, you need to select if you want to manage data on Facebook or Instagram. For Facebook, you get advanced control on how and where Facebook uses any of your data. You can manage your location data, control contacts uploaded to Facebook, face recognition setting, ad preference and various other features.
6) Control your third party login The majority of websites and apps give you the option to log in using your Facebook account instead of creating a new account from scratch. While this makes things easier, we often forget to revoke Facebook access for these third-party apps and websites when we stop using them. Head to Settings Apps and websites. You will see a list of all the active apps and websites that have access to your Facebook account. You can choose the apps you want to remove from the list, as well as delete any posts that a particular app or website might have published on your behalf.
Fake profiles are a common sight to come across on social networking websites. Facebook is one of the biggest platforms to come across a fake account. A fake account is an online profile made by someone trying to impersonate another person. These accounts are often made with the purpose of harassing other people, for spreading spam as well as viruses to steal private data, and the most common purpose is to take revenge on other people and uploading malicious photos. With the country becoming more equipped with the services of the internet the cases of fake profiles are piling up at an increasing rate. With the alarming increase in fake accounts, the real question stands:
whether creating a fake Facebook account is a punishable offence? In India, there are various remedies available by the law for the inconvenience caused by these fake accounts.
It is necessary to first distinguish whether the fake account was made up of a person who exists in reality or it was a random fake account in order to hold a person liable for punishment. Section 66D of the Information Technology Act of 2000 states that a person will be punished with imprisonment of either description for a term extending to three years and shall also be liable to fine which may extend to one lakh rupees if they cheat by personating through the means of any communication device like a computer. To hold the person responsible one of the most important ingredient is that the person must cheat or the person who created the fake account must gain a pecuniary benefit from it.
Under Section 468 of the Indian Penal Code 1860, a person shall be punished with imprisonment of either description that may extend to seven years, and shall also be liable to fine if they commit the offence of forgery intending that the document or electronic record forged were used for the purpose of cheating.
Under Section 67 of the Information Technology Act of 2000, any material which appeals to be of prurient interest or if its effect is such as to tend to deprave and corrupt persons who are likely, having regard to all relevant circumstances, to read, see or hear the matter contained or embodied in it or any lascivious material is published or transmitted or caused to be published or transmitted by a person, such person shall be punished with imprisonment of either description for a term which may extend to three years and with fine which may extend to five lakh rupees on the first conviction, and in case of a second or subsequent conviction will be subjected to imprisonment of either description extending a term of five years and with a fine that can extend to ten lakh rupees.
Kovalam is an internationally renowned beach with three adjacent crescent beaches. It has been a favourite haunt of tourists since the 1930s. A massive rocky promontory on the beach has created a beautiful bay of calm waters ideal for sea bathing.
The leisure options at this beach are plenty and diverse. Sunbathing, swimming, herbal body toning massages, special cultural programmes and catamaran cruising are some of them. The tropical sun acts so fast that one can see the faint blush of coppery tan on the skin in a matter of minutes. Life on the beach begins late in the day and carries on well into the night. The beach complex includes a string of budget cottages, Ayurvedic health resorts, convention facilities, shopping zones, swimming pools, Yoga and Ayurvedic massage centres.
Accommodation facilities for tourists at Kovalam range from five star hotels to budget hotels and the choice of food available at restaurants and cafeterias range from Continental varieties to South Indian delicacies.
Thiruvananthapuram, the capital city of Kerala, is just 16 km away from Kovalam and getting there is no hassle. But if you are on holiday it is better to stay in Kovalam and visit the city. The city of Thiruvananthapuram has many interesting places to see like the Napier Museum, the Sri Chitra Art Gallery and the Padmanabhaswamy Temple. The SMSM Institute, a State owned handicrafts emporium, is the ideal place to pick up ethnic curios and other articles.
Nearest railway station: Thiruvananthapuram Central, about 16 km
Nearest airport: Trivandrum International Airport, about 10 km
Fifteen km west of Coimbatore, on the Western Ghats, situated in a lush, green milieu is the temple of Marudhamalai. Said to belong to the 12th Century, the temple is surrounded by the hilly range on three sides. Several buses ply between Coimbatore and the foothills of Marudhamalai, from where devotees board mini buses to reach the temple. Stone inscriptions dating back to the 12th Century contain words such as Marudhan and Marudhachalam, which reveal that the names were in vogue even then.
Marudhamalai abounds in medicinal herbs and the pure air and serene atmosphere should make it a haven for the health-conscious. The hill is dotted with small mandapams for the devotees to relax on their way uphill. At the foothills, where the steps to the temple begin, is the Thaan Thondri Vinayakar Temple. The 18th step above the Vinayakar Temple is another significant spot because those, who are unable to make it to Sabarimala find praying at this place equally gratifying.
Another deity that draws your attention on the way is Idumban, who is seen on a huge circular rock at the Temple of Idumban! The three huge stones that stand out for the colour that’s different from the rest, and the mandapam of Kudhirai Kulambu are the other noticeable places on the route. High above these are the Paambaatti Siddhar Cave, Uchchi Pillaiyar Temple and Pancha Vriksham that convey a lot about the hoariness of Marudhamalai.
The Adhi Moolasthanam is in the shape of a lingam, where Lord Muruga is seen with Valli and Deivanai. The beautiful deity of Muruga in the Moolasthanam is both a devotee’s and connoisseur’s delight!
Noted yesteryear filmmaker M.M.A. Chinnappa Thevar made immense contribution to the proper maintenance of the temple, clearing the hilly route for devotees to climb up easily, building resting houses, providing lights on the path to the temple and so on.
Water has been provided at the hill at a cost of more than Rs.6 lakhs.
Apart from religious activities, serving society is part of the agenda. The temple manages a home for destitutes, where now 45 children benefit. Besides food, clothing and shelter, the temple takes care of their education till the high school level.
At the foot of the hill, a siddha hospital treats the poor and distributes medicines worth Rs.30000 free, annually. In Vadavalli, the temple management also runs a school, which had initially been functioning under a thatched roof. It has now shifted to a permanent structure and has grown into a high school.