Tag Archives: Lifestyle

Your money or your data!

The scene unfolds like a cyber thriller. You fire up your PC and a message appears saying your files have been encrypted. Your screen looks like it’s from the FBI. Sometimes it identifies itself as malware. Sometimes it’s a plain-text message. When you click around in your PC (assuming you still can), you find that your photos and text files are indeed unavailable.

The screen also asks for money. To get the key to unencrypt your files, you must pay, usually in some form of untraceable currency, such as bitcoin. In most cases, there’s a firm deadline when payment must be made. If you miss it, the fees shoot up. At some point, your files are permanently encrypted.

Welcome to the world of ransomware.

While this form of malware can slip into devices in any number of ways, phishing is probably the most common vehicle. Basically, bad guys send innocent-looking emails that ask recipients to click on a link or download an attachment. (Phishing is also used to ask for money directly. A tiny piece of software infects the machine and goes about encrypting files before demanding cash. Sometimes the message pops up automatically. Sometimes there’s a time delay or a switch that lets hackers turn it on when it’s convenient to them.

And sometimes attacks are big and bold. Two assaults on major hospitals in the US, for instance, used multipronged ransomware infiltration to shutdown key networks and records. But experts largely agree that most attacks are on individuals. Mass emailing allows criminals to take advantage of long-tail effects and the fact that many people would rather just pay a few hundred (or thousand) dollars to have their data – which many consider their life – returned to them rather than fight back through various law enforcement channels.

Data hostage taking is on the rise

Given the efficacy of ransomware, the number of attacks is set to grow. In its annual Threat Landscape report, published in January 2016, the European Union Agency for Network and Information Security (ENISA) characterizes 2015 as “the year of ransomware”. According to the study, the number of reported incidences nearly doubled in 2015 compared to 2014, with aggressive phishing campaigns a hallmark of many attacks. Targets tended to be in North America and Western Europe, as residents are perceived to have the money to pay.

ENISA also notes that 2015 was a year of innovation in ransomware development and deployment. The number of new ransomware types quadrupled in the first half of the year alone. Criminals have set up service centers, allowing the non-technical to buy crimeware-as-a-service, further expanding the reach of ransomware. And stealthier delivery methods are still being developed.

Do I know you? Did I ask for this?

Phishing is still the most common delivery method. Which is convenient, in a way, as there are some practical steps you can take to avoid getting scammed. Probably the most important is to maintain an online “stranger danger” mindset. If an email looks even the slightest bit suspicious, don’t open it. If it’s from someone you don’t know, don’t open it. If it says you’ve won the lottery, are being watched by some security agency, asks about an order (you did not make), or promises rewards in some other way, don’t open it. (Similar phishing attacks also appear on Facebook.)

For emails you’ve opened, if they include links or attachments you weren’t expecting or didn’t ask for, don’t click or download. If you feel that you must do either, reply to the sender (if you know them), and ask if they did indeed send you something. If you do not know the sender – delete the email.

And of course, you should build a fortress around your device. This is where AVG can help. We provide antivirus, link scanners, attachment and download checkers, enhanced firewalls, spam blockers, and file encryption to help keep your photos, videos, files, contacts, and devices safer. If you haven’t done so already, give us a try on your PC or Android phone.

Top Facebook scams you need to know about

Have you seen the “Most Used Words” quiz on Facebook? Chances are you probably have – because it shockingly accumulated close to 20 million shares in just a few days. It also gained access to the personal data of over 16 million users.

With this kind of virality, it’s little wonder a 2016 report from Cisco found that Facebook scams are the most common online attack method used by cybercriminals. With 1.6 billion users, the social media site serves as a cost-effective way of spreading scams on a large scale quickly and relatively easily.

To help you stay ahead of the bad guys, we’ve assembled a list of the top types of (often overlapping) scams to look out for on Facebook:

Sensational news stories

These have clickbait headlines to tempt you into clicking without first verifying the news. The problem is that they can lead to websites with viruses, ransomware, and other forms of malicious content and advertising. But the good news is that Facebook has made a lot of progress in preventing these kinds of posts from appearing in your News Feed.

Hidden content

An extension of clickbait headlines are sites that require you to enter details before certain content will be “revealed”. For instance, before a juicy celebrity video shows or the answer to a self-assessment quiz displays, you must enter an email address or agree to terms and conditions. This is simply a sneaky way for scammers to capture your information.

Like farming

This occurs when a page is set up by scammers with the purpose of artificially accumulating likes. This is so they can use the large number of likes to distribute additional scams or sell the page on the black market for profit (pages like these are highly valuable to unethical marketers). So think twice when you see one of those adorable cat memes – the source could be a scammer who’s hoping it’ll go viral for their benefit.

Quizzes that promise a prize or gift voucher

If something sounds too good to be true, it usually is. These kinds of quizzes are designed to phish for your personal details or have you fill in surveys that the scammers get paid for you to complete! You definitely won’t win a free business class air ticket or $100 grocery voucher.

Dodgy apps

Some third-party Facebook applications require you to grant unnecessary permissions, including access to your name, profile picture, list of friends, history of posts, and the devices you use. The terms and conditions you accept could even enable a scammer to sell your data or post directly to your timeline. “See who’s viewing your profile” is a classic example of an app created specifically for this (while Linkedin provides such functionality, Facebook currently doesn’t).

Questionable private messages

These are likely to include social engineering schemes, such as offers to work from home. They may even claim you’ve “won” a lottery; then ask for a small advanced fee so you can claim your prize. Hint: your prize will never be delivered!

So what can you do to protect yourself? 

Take note of the Facebook scams we’ve mentioned above, and always:

  • Be vigilant when it comes to entering any form of personal information online
  • Don’t share clickbaiting stories, memes, or videos
  • Install apps only from trusted developers that don’t ask for a stack of unnecessary permissions
  • Watch for strange posts and pages from friends – avoid clicking on them and then let your friend know that it’s likely a scam
  • Don’t respond to messages from people you don’t know, especially when they include offers that sound too good to be true

It’s Cyberattack Season: Did You Get Your Immunization Shot?

There’s a term in public health known as “herd immunity.” The idea is that when a critical number of people are immunized against a contagious disease, most members of that community become protected against the disease, whether or not they received an inoculation.

Breaking the chain of a disease’s transmission enables us to interrupt the ability of the pathogen to set in at a broader scale in our community. In this way, vaccinations protect people who have and haven’t been vaccinated.

The same principle applies to our digital lives which are just as connected, if not more connected, to digital threats and “pathogens” that steal our data and identities, disrupt our productivity, and mar our public profiles.  We spend a great deal of time and energy investing in firewalls and the technical parts of our infrastructure to protect data and privacy, but what about our behavioral practices?

Do we take the time to inoculate ourselves against habits that could risk the digital wellbeing of our family and friends? Or do we, for example, still ask family members for Social Security numbers via email? Or send credit card information and/or passwords insecurely?

“The important principle here is that there are things I can do to help ensure a safer online world for you, and vice versa.”.

If, for example, you posted a compromising photo on social media, I can opt to not re-post it, protecting you from further harm. And if everyone who comes across the photo does the same, we’ve inoculated you from damage even though you had failed to protect yourself.

This is the mindset that we need to adopt in being good digital citizens and embodying the characteristics of a “smart user.” By doing so, we can create an entire network and community of safety and protection.

Most of us, especially the youth and others around the world who are coming online for the first time, are particularly vulnerable. We were all the same at some time. When I worked at Netscape, for example, and got my first email message from a friend “stranded in Thailand,” asking for money – I almost fell for it! On the exposure curve, I was just like a lot of new users today.

Let’s take a page from the herd immunity playbook and create a safer and more private digital world for all of the new users coming online, in addition to helping these users become more educated in smart online behaviors.

AVG has committed to a smart user digital citizenship initiative to build a better web. Please join us or see how you can support this initiative. Because after all, the more you do to help make the web a safer place, you do so not only for yourself but for the whole herd.

To learn more, please visit smartuser.com.

Protecting your wallet in the digital age

In days gone by, keeping your wallet safe while out and about just meant making sure it was still in your pocket. But with a variety of new payment technologies such as contactless payment or Chip and PIN being developed and rolled out, and hackers becoming increasingly creative about how they access and use your information, times are changing fast.

While we all want speedier, more convenient payment options, have you stopped to consider the level of personal information you now carry around about yourself, and whether you are still doing such a good job of keeping your wallet safe in today’s digital age?

As National Cyber Security Awareness month continues, I’ve jotted down a few of my top tips:

When is a wallet, not a wallet?

There has been much talk of the ‘digital wallet’ in recent years, but with NFC payments now enabled through schemes such as Apple Pay and Android Pay, your smartphone could now be considered a wallet on its own. As such, you’ll need to consider both its physical and cyber security. This means taking steps such as considering where you’re carrying and using your phone, making sure you have software to protect it from malware, and ensuring you only use it at trusted locations for sensitive transactions such as money transfers.

Does you wallet speak for itself?

With contactless payment systems becoming more popular, especially in Europe, even cards in your wallet could speak without you knowing. If you card has the ‘contactless’ Wi-Fi type symbol on it then it most likely has RFID technology that allows details to be read from the card without the need to swipe or insert into a chip and pin reader. This also means that if a cybercriminal can get close enough to your card then they might be able to read some of the data from it. Wallet manufacturers are now producing wallets that add pockets of protection for you to store cards of this type. I recently purchased one and now it stores both my driver’s licence and contactless cards in the protected zone.

Putting a PIN in your security

With the increase in payment technologies such as Chip and PIN and contactless, the contents of your traditional wallets are also more vulnerable than ever before. So what steps should you take here?

Just as you wouldn’t leave your house keys in your front door, your card or phone’s PIN number should never be written down and certainly not left with the card or phone itself. If you have trouble remembering the PIN provided by your bank, you should change it to a number that’s easier for you to remember – but not so easy that others could guess it. When entering your PIN, you should also hide it from anyone who might be looking!

While not yet mainstream in the U.S., ‘touch and go’ NFC payment from a phone or ‘contactless’ RFID from a credit card is already common in Europe. Making a payment in seconds is appealing to many of us, but this convenience comes with a number of other security considerations. In the UK, there is currently a cap of $45 (£30) on such purchases – minimising the risk of significant purchases being made on a stolen card or phone. For anyone still feeling nervous, it is possible to ‘opt out’ and request a simple Chip and PIN card.

Beyond these more ‘high-tech’ tips, there are other points of best practice that should always be observed in protecting your financial security.

Check what you’re paying for

As cashless payment becomes the norm, it’s easy to lose track of what you’re spending, and even if you’re the one spending it! Always make sure to check your bank statement, even if online, for any ‘rogue’ payments. Many of us have the attitude that ‘it won’t happen to me’, but fraudsters will often start with small amounts that may go unnoticed to those who aren’t vigilant.

Bin those receipts

Is your wallet bulging with six months’ worth of receipts? If so, de-clutter! Receipts can carry a whole host of valuable information including your credit card details or signature. Keep any important receipts for returns, warranties or business expenses, at home and make sure to shred the rest. Expired cards should also be cleared out of your wallet. While you can’t use them anymore, your information could still be of use to a potential fraudster.

Having taken my wallet with me on various travels abroad recently, I know I’ve kept these tips in mind, and fingers crossed, remained fraud free! Hopefully they will help you do the same!

Life beyond the screen: Coming face to face with technology addiction

Photo via Telegraph online

Photo via Telegraph online

Believe it or not, there’s more to life than what’s happening online! In its beginnings, technology was intended to make our lives simpler and more convenient. When technology becomes an addiction, however, it can become dangerous to our mental and physical health, not to mention our personal lives.

Avast is a technology and security company. At the same time, we’re also human beings. By sharing cybersecurity news on our blog, alongside our forum and social networks, we aim to make things simpler for our users — providing them with safety tips to avoid headaches and losses of time. In other words, we’d like everyone to reserve as much time as possible for the parts of life that truly matter.

Recently, a study found that students’ performance can significantly decline due to technology addiction. To fight students’ urge to be active on their devices when they shouldn’t be, there are several apps that have been created that close and prevent other apps to be opened, ensuring users to be able to stay focused and concentrated on their classes, research or homework.

Since it has become this difficult to pry ourselves away from our screens, it’s sometimes a good thing to occasionally be left without battery or network coverage. This way, we’re essentially forced to put off our thoughts about what’s being published on social media and focus on the things that are taking place around us.

Here in Brazil, it’s not uncommon to see signs at bars or restaurants that read something similar to “we don’t have Wi-Fi, talk among yourselves” or “we don’t have Wi-Fi, bring a friend to talk to”. These places don’t do this because they need to save money on their Internet bill — instead, it’s about providing their guests with human interactions and a genuine experience.

It’s our job to use our current technology wisely. When it’s time to concentrate and focus, Avast is there to keep our users safe from spam, scams, and hackers — things that cause us to lose time and energy.

You can depend on us to keep your security (and peace of mind) in tact. We urge our users to recommend Avast to the ones who they love and who they want to spend quality time with.


Follow Avast on FacebookTwitterYouTube, and Google+ where we keep you updated on cybersecurity news every day.

Self-driving cars – who is really in control?

Self-driving cars got a boost earlier this month from Toyota, which committed $50 million dollars to Stanford University and MIT for artificial intelligence and driverless car labs.

Unlike others in the race to put a driverless car on the road, Toyota has said its approach is not to build a fully autonomous car, but to provide “semi-autonomous assists” that will keep the driver in ultimate control.

At the Toyota announcement event, Re/Code reported that MIT’s Artificial Intelligence lab director Daniela Rus suggested artificial intelligence (AI) could, for example, enable a car to analyze your behaviour to assist in your driving and make it safer. She also described how AI features could make driving more pleasurable. For instance, if you were in a bad mood, it would begin playing your favorite music.

Meanwhile, a fascinating new book by the Pulitzer Prize-winning New York Times senior science writer and long-time tech reporter John Markoff, called “Machines of Loving Grace”, offers an exploration of the future of what smart machines can do for us and what they can help us do. The book, which is subtitled “The Quest for Common Ground Between Humans and Robots,” is an excellent primer on the topic of AI and autonomous cars. The question central to Markoff’s exploration is: Will we control these smart machines, or will they control us?  (You can listen to an interview with Markoff on his book and the topic of AI and driverless cars that aired on National Public Radio).

Now is a good time to consider the question while driverless-car and other AI-driven technologies are still in early stages of development.

Most experts and insiders involved believe, for example, that it’s a five-year scenario before autonomous cars become a reality.  However, in the meantime, we will continue to see more aspects of AI and the Internet of Things (IoT) impacting our daily lives, in and out of the car.

One example playing out right now is how major auto insurance companies are embracing and using the IoT to monitor vehicles and collect data on drivers’ habits and track their behaviour. This includes things like changes in speed, how often we drive, and the time of day we drive, etc.

In a new report, research by Business Intelligence estimates that there are 155 million cars on the road in the U.S. capable of being monitored today through On Board Diagnostic (OBD-II) dongles, or plugs, that sends analytics about the driver’s driving habits back to the insurance company. The purpose touted is that insurance firms can then offer clients potentially lower premiums based on the driving data and their ability to analyze and assess a clients’ risk levels. That’s certainly an incentive to drive well, but raises some concerns.

As Accenture analyst Mark Halverson points out in a recent article on the topic: “Big data is a boon for insurers, which use it for underwriting, pricing and more. For consumers, however, it’s more of a mixed blessing, as they sometimes fail to see the benefit of sacrificing privacy for convenience (to the extent they even know they are sacrificing privacy).”

If you are one of the hundreds of millions of people in the U.S. driving with OBD-II, do you know if your insurance company is monitoring your data?

Halverson argues that for the industry to provide a model of “purposeful” data collection and urges, “insurers should at the very least clearly state their purposes for collecting data, and ensure that the data will be handled securely.”

Ultimately, there are many questions to be answered about who will be in control of the drivers seat in the not too distant future.

From Beacons to Dash – a glimpse at the future of retail and IoT

According to a new research by Juniper Research, retailers will invest $2.5 billion on IoT within the next five years — four times the investment being made in 2015.

Some of the biggest retail IoT investments are being made in location-based beacon technology. Bluetooth-based beacon technology, like Estimote, transmits location information from beacons to smartphones and allows retailers, once you’ve opted in, to track your whereabouts and communicate real-time via their own app. The retailers can provide customers with personalizedm relevant ads and other useful information.

Forgot your shopping list? No worries, you’ll be reminded of products when you enter the store based on your previous purchases, or access shared shopping lists, and receive relevant special in-store coupons and deals.

Target is among the growing list of retailers testing the technology. It launched a test of beacons in 50 stores. One of the features integrated in Target’s app allows it to push timely recommendations and deals in proximity to a shopper’s location.

For a glimpse of how beacons are taking root at retail, Mobile Commerce Daily recently profiled a pilot program at Illinois-based Niemann Foods’ County Markets. The 44-store chain’s launch of in-store beacons provide shoppers with personalized digital offers, location-specific coupons and in-store maps to streamline the purchasing experience.

The results have been positive, including coupon redemption rates as high as 50 percent, compared to a printed ad coupon industry average of below 2 percent, reports Nathaniel Jones, the electronic marketing manager at Niemann’s.

According to the 2015 Store Operations Survey by Retail Touchpoints, nearly 46% of retailers either now have or plan to use beacons in their stores. For now, most of the beacon programs are being deployed in pilots on a small scale as retailers try to understand how the technology can foster customer engagement. So far, analysts report that the biggest barrier to adoption is getting consumers to turn on the Bluetooth capability on their phones.

Now, in new developments at the other end of the IoT retail spectrum away from the store and more conveniently located in your own home comes the new Amazon Dash Button. The eCommerce giant has begun offering the Wi-Fi-enabled Dash buttons for its Prime customers to install in their homes to make it possible to re-order online without even needing to login to Amazon. The inexpensive (US$4.99) small plastic Dash buttons are designed to be placed throughout the home to make it easy to re-order anything from coffee to soap — from where you use it most — with just a press of the button. No need to hassle with a shopping list, Dash is on the case!

On the downside, the Dash service is still in early stages and currently has limited product availability. However, it is earning the support of major brands from Maxwell House to Clorox. And, for the near-term, Dash does not provide immediate gratification; you still have to await a typical Amazon Prime shipment and delivery timeframe of overnight or later, depending on the product availability. (But that may change with Amazon’s planned deliveries by Drones sometime in the future!)

Also on the downside, think of the results if a button-pushing happy child or a teenager plays with Dash? What to do with twenty bags of dog food delivered at your door?

Looking even further ahead to where retail IoT is headed, Time Magazine asks in its review of Dash: “What happens when consumption becomes even less of a conscious process — when, say, our smart cupboards and refrigerators, empowered to monitor what we’re using, start making buying decisions autonomously?”

Indeed. There are definitely a few things to be worked out about the future of IoT and retail in our lives. Chief among them, we believe, are privacy and security safeguards. All the new retail and other IoT technologies and services hinge on data — your data. They are feeding customer data and behavior back to retailers and their vendors to be tracked, analyzed and recorded.

Both the beacon apps and Dash are opt-in services, and consumers must give their permission and have a choice to use them or not. But increasingly with IoT, consumers will face the question: Are you more concerned with privacy or convenience?

And the same question is of supreme importance to businesses in their adoption of IoT. Business owners, small or large, have to gauge these new IoT opportunities for the potential and risks involved…not to mention the potential for annoying customers.

The IoT may prove to be the biggest game-changer since the Internet itself, with wide-ranging implications to society. And like the Internet before it, all of those implications and protocols that will be needed, aren’t yet known. It’s a brave new world and we all need to get ready for it.

At AVG, our prime concern is with privacy and data security, and that’s why we are involved at the industry level to protect them.  For example, we support the OTA IoT Trust Guidelines Framework, which was issued this past month. To read the full Framework Goals you can visit the OTA site.

California governor vetoes drone bill

In the wake of increasing drone incidents, including the most recent highly-publicized crashes at the U.S. Open tennis tournament and the opening game of a newly renovated college football stadium in Kentucky, drones got a somewhat surprising defender last week: California Governor Jerry Brown.

Governor Brown last week vetoed a bill that would have barred drones from flying within 350 feet above a property without “express permission” of the property owners. Despite easily passing the state legislature, the bill was widely reported to have opposition by tech industry companies and trade organizations.

Brown said in his veto message that the measure went too far in its restrictions. The bill, which is SB142 by Santa Barbara Democratic Sen. Hannah-Beth Jackson, would have created a trespassing crime for operating drones within 350 feet above private property without the consent of the property owner.

In his official statement about the veto, Brown noted, “Drone technology certainly raises novel issues that merit careful examination,” and should be looked at “more carefully.” But in his measured response, he suggested the act would be a crime “whether or not anyone’s privacy was violated by the flight.”

Said the Governor, “This bill, however, while well-intentioned, could expose the occasional hobbyist and the FAA-approved commercial user alike to burdensome litigation and new causes of action.”

As industry observer news website Re/Code reported, one of the tech industry’s leading associations, The Consumer Electronics Association, was a vocal opponent of the legislation. Among CEA members are Amazon and Google, both of which are planning drone delivery services. And among other influential participants, Re/Code also reported that GoPro, which recently announced plans for a drone, was in opposition.

“Safe, responsible drone use will transform the way we do business — allowing these devices to assist in search and rescue and disaster relief missions, improve crop production and efficiency, and create safer work environments for infrastructure maintenance.” Gary Shapiro, the CEA president and CEO, said in his statement to Re/Code.

Drones are (literally) at the intersection of technology, security, and privacy. Unfortunately, some bad players have colored the drone issue to date. But there are benefits to be derived from drone technology: They can speed delivery of emergency supplies, they can provide great benefits to agriculture, and they can literally save lives. For example, in natural and/or manmade disasters, drones can be positioned to survey damage, locate lost hikers or disaster victims, and improve efficiency and safety of rescue teams.

There will no doubt be more legal decisions and bills involved. As Re/Code also noted:  46 different states have considered 156 different bills about drones this year. And as American Civil Liberties Union (ACLU) policy analyst Jay Stanley recently said about drone policing,” It’s still a bit of a Wild West.”

But as Capt. Chesley B. “Sully” Sullenberger, the now-retired US Airways pilot that in 2009 managed to safely land his Airbus A320 passenger jet in the Hudson River, saving all 155 persons aboard, emphasizes: we need better risk management, better regulation of the recreational drone industry, and more enforcement of those regulations when drone operators do what he describes as “stupid, reckless, dangerous things.”

Kids safety online depends on us being better role models

We lock our doors and activate security systems to keep intruders out. We place parental controls on TV channels to manage what our children watch. We keep our kids out of R-rated movies until we feel it’s appropriate. We monitor the violence of their videos games. All of this to keep them shielded from explicit content. Except this time, the violence was very real and readily available on social media.

The recent shootings in Virginia created an unprecedented situation for parents. The incident was caught on camera during a live broadcast of a television newscast, producing a graphic video of the shooting, violence that wasn’t in a video game or TV show but a real murder. That clip, along with video of shocked expressions during the newscast, circulated the Internet available for children to stumble upon. The shooter also recorded the murder from his phone and uploaded it onto social media, making the video widely available. And people viewed it and shared it.

This also raises larger questions: How many people viewed these videos online? Should we have sought out and viewed these videos? Is there a social responsibility to take ownership of our online behaviour? Is our own behaviour demonstrating to our kids how to responsibly use the internet?

The children we try so hard to protect could have seen these videos online. Children’s introduction to the Internet often happens before they’re educated in online safety skills. An AVG Technologies survey found 66 percent of children ages three to five stated that they can play a computer game, but only 14 percent can tie their own shoes.

Much of the online crises that can occur to youth today—from teen sexting to identity theft to cyberbullying—can be mostly avoided if they understand the consequences of their actions. According to the same survey from AVG, nearly one in three teenagers said they regret posting something online and 32 percent have had to ask someone to remove content posted online about them.

When technological development outpaces society’s sense of responsibility and understanding of that technology, it can create unintended consequences in our lives and in the lives of our children. The answer is not only to encourage a society-wide attitude of responsibility for our impact as digital citizens, but also to empower the leadership of organizations to work together and create new solutions that allow innovation to continue while taking responsibility for our own digital lives.

For more information about the Smart User Initiative, go to www.smartuser.com.

Preparing Us and Our Kids for Digital Playgrounds

Recent research of parents in the United States, conducted by Harris Poll on behalf of AVG, shows the ubiquitous rise in the number of kids with mobile devices while exploring important issues in our digital family dynamics.

We found 51% of connected kids receive a device before the fifth grade.  With that level of smartphone, tablet and Internet access reaching into lower age groups, it’s clear that today’s schoolyards and playgrounds now extend to the online world.

As a new parent working in tech, I think a lot about the ever-increasing use of connected devices and social media in our families and its effects on us as parents. We are on the frontline of this new issue where the security and privacy of our kids is a major cause of concern. In the real world you can see who is bullying whom but online that’s not always clear.

Of course, it’s not just cyberbullying that we (parents and non-parents) need to be concerned about; but access to a lot of PG-rated and above material that is just one click away. As our new research indicates; unfortunately, many parents don’t monitor their kids’ online activities closely. Only half of parents of children aged 3-17 (51 percent) said they check their child’s activity weekly, one in five check it less than once a month or not at all (nearly two in ten) and just over half (56 percent) say they know the password to their child’s device.

Interestingly enough and coinciding with our research, another report surfaced last week on ABC’s Good Morning America about kids installing secret mobile apps that let them hide their online activities, like photos and texts. Yahoo Tech’s editor Dan Tynan, who was interviewed on the topic, gave this simple advice: turn off the ability to install apps without parental approval.

(Currently, our research suggests only four in ten parents have installed a parental block on their kids’ devices.)

Tynan’s recommendation echoes that of my colleague, AVG’s Sr. Security Evangelist Tony Anscombe, who offered his own sage advice to parents of school age children in a Back to School Tips column last week. Tony is also the author of the book “One Parent to Another,” an excellent resource which is available here.

My baby is less than one-year-old, so I’m a long way off from having to deal with many of these issues but I know my day is coming. I was particularly struck by a recent Parents Magazine article on the topic of “Parenting in a Fakebook World” that chronicled many of the pressures that start at an early age in raising a family in our Instagram-happy, Pinterest-perfect culture. If you haven’t read it, I highly recommend it.

Securing every family member online is a major focus for us at AVG and we will continue to devote a lot of time to understanding the dynamics and needs of digital families, as well as offering tools for help make the online world a safer one for our kids.

So, stay tuned for more here on www.now.avg.com.