{"id":27132,"date":"2024-01-18T02:28:10","date_gmt":"2024-01-18T02:28:10","guid":{"rendered":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-threats-for-kids-2024\/27132\/"},"modified":"2024-01-18T02:28:10","modified_gmt":"2024-01-18T02:28:10","slug":"cybersecurity-threats-for-kids-2024","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-threats-for-kids-2024\/27132\/","title":{"rendered":"Kids and cybersecurity: what parents should be aware of in 2024"},"content":{"rendered":"<p>In the era of modern technology, the age at which children are introduced to the digital world and technology is increasingly lower. This digital experience, however, can be marred by potential risks lurking online. As technology continues to advance, the tactics and strategies used by cybercriminals to target and exploit young internet users are also evolving.<\/p>\n<p>Therefore, it\u2019s crucial for parents to stay informed about the latest cybersecurity threats targeting kids to better protect them from potential harm. In this post, my colleague, Anna Larkina, and I explore some of the key cybersecurity trends that parents should be aware of and provide tips on how to safeguard their children\u2019s online activities.<\/p>\n<h2><strong>AI threats<\/strong><\/h2>\n<p>AI is continuing to revolutionize various industries, and its daily use ranges from chatbots and AI wearables to personalized online shopping recommendations \u2014 among many other common uses. And of course, such global trends pique the interest and curiosity of children, who can use AI tools to do their homework or simply chat with AI-enabled chatbots. According to a <a href=\"https:\/\/unite.un.org\/news\/future-ai-voices-global-youth-report-launched\" target=\"_blank\" rel=\"nofollow noopener\">UN study<\/a>, about 80 percent of youths that took part in its survey claimed that they interact with AI multiple times a day. However, AI applications can pose numerous risks to young users involving data privacy loss, cyberthreats, and inappropriate content.<\/p>\n<p>With the development of AI, numerous little-known applications have emerged with seemingly harmless features such as uploading a photo to receive a modified version \u2014 whether it be an anime-style image or simple retouching. However, when adults, let alone children, upload their images to such applications, they never know in which databases their photos will ultimately remain, or whether they\u2019ll be used further. Even if your child decides to play with such an application, it\u2019s essential to use them extremely cautiously and ensure there\u2019s no personal information that may identify the child\u2019s identity \u2014 such as names, combined with addresses, or similar sensitive data \u2014 in the background of the photo, or consider avoiding using such applications altogether.<\/p>\n<p>Moreover, AI apps \u2013 chatbots in particular \u2013 can easily provide age-inappropriate content when prompted. This poses a heightened risk as teenagers might feel more comfortable sharing personal information with the chatbot than with their real-life acquaintances, as evidenced by <a href=\"https:\/\/www.washingtonpost.com\/technology\/2023\/03\/14\/snapchat-myai\/\" target=\"_blank\" rel=\"nofollow noopener\">instances<\/a> where the chatbot gave advice on masking the smell of alcohol and pot to a user claiming to be 15. On an even more inappropriate level, there are a multitude of AI chatbots that are specifically designed to provide an \u201cerotic\u201d experience. Although some require a form of age verification, this is a dangerous trend as some children might opt to lie about their age, while checks of real age are lacking.<\/p>\n<p>It is <a href=\"https:\/\/bloggingwizard.com\/chatbot-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">estimated<\/a> that on Facebook Messenger alone, there are over 300,000 chatbots in operation. However, not all of them are safe, and may carry various risks, like the ones mentioned earlier. Therefore, it is extremely important to discuss with children the importance of privacy and the dangers of oversharing, as well as talking to them about their online experiences regularly. It also reiterates the significance of establishing trusting relationships with one\u2019s children. This will ensure that they feel comfortable asking their parents for advice rather than turning to a chatbot for guidance.<\/p>\n<h2><strong>Young gamers under attack<\/strong><\/h2>\n<p>According to <a href=\"https:\/\/www.uswitch.com\/broadband\/studies\/online-gaming-statistics\/\" target=\"_blank\" rel=\"nofollow noopener\">statistics<\/a>, 91 percent of children in the UK aged 3-15 play digital games on devices. The vast world of gaming is open to them \u2014 also making them vulnerable to cybercriminals\u2019 attacks. For instance, in 2022, our security solutions <a href=\"https:\/\/www.kaspersky.com\/blog\/threats-in-kids-gaming-worlds\/\" target=\"_blank\" rel=\"noopener nofollow\">detected<\/a> more than seven million attacks relating to popular children\u2019s games, resulting in a 57 percent increase in attempted attacks compared to the previous year. The top children\u2019s games by the number of users targeted even included games for the youngest children \u2014 Poppy Playtime and Toca Life World \u2014 which are designed for children 3-8-years old.<\/p>\n<p>What raises even more concerns is that sometimes children prefer to communicate with strangers on <a href=\"https:\/\/lancashiretimes.co.uk\/article\/A-Quarter-Of-Kids-Playing-Online-Games-With-Strangers\" target=\"_blank\" rel=\"nofollow noopener\">gaming platforms<\/a> rather than on social media. In some games, unmoderated voice and text chats form a significant part of the experience. As more young people come online, criminals can build trust virtually, in the same way as they would entice someone in person \u2014 by offering gifts or promises of friendship. Once they lure a young victim by gaining their trust, cybercriminals can obtain their personal information, suggesting they click on a phishing link, download a malicious file onto their device disguised as a game mod for Minecraft or Fortnite, or even groom them for more nefarious purposes. This can be seen in the documentary series \u201c<a href=\"https:\/\/www.youtube.com\/playlist?list=PLCIzhnLJonIaHGrWy2PUcVzSEg6Wkqxg3\" target=\"_blank\" rel=\"nofollow noopener\">hacker:HUNTER<\/a>\u201c, co-produced by Kaspersky, as one of the episodes revealed how cybercriminals identify skilled children through online games and then groom them to carry out hacking tasks.<\/p>\n<p>The number of ways to interact within the gaming world is increasing, and now includes voice chats as well as AR and VR games. Both cybersecurity and social-related threats remain particular problems in children\u2019s gaming. Parents must remain vigilant regarding their children\u2019s behavior and maintain open communication to address any potential threats. Identifying a threat involves observing changes, such as sudden shifts in gaming habits that may indicate a cause for concern. To keep your child safe by stopping them downloading malicious files during their gaming experience, we advise installing a <a href=\"https:\/\/www.kaspersky.co.uk\/premium?icid=gb_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">trusted security solution<\/a>\u00a0on all their devices.<\/p>\n<h2><strong>Fintech for kids: the phantom menace<\/strong><\/h2>\n<p>An increasing number of banks are <a href=\"https:\/\/www.bankrate.com\/finance\/credit-cards\/debit-vs-credit-cards-for-kids\/\" target=\"_blank\" rel=\"noopener nofollow\">providing<\/a> specialized products and services designed for children \u2014 including bank cards for kids as young as 12. This gives parents helpful things like the ability to monitor their child\u2019s expenditures, establish daily spending limits, or remotely transfer funds for the child\u2019s pocket money.<\/p>\n<p>Yet, by introducing banking cards for children, the latter can become susceptible to financially motivated threat actors and vulnerable to conventional scams, such as promises of a free PlayStation 5 and other similar valuable devices after entering card details on a phishing site. Using social engineering techniques, cybercriminals might exploit children\u2019s trust by posing as their peers and requesting card details or money transfers to their accounts.<\/p>\n<p>As the fintech industry for children <a href=\"https:\/\/www.elinext.com\/industries\/financial\/trends\/fintech-apps-for-kids-and-teens\/\" target=\"_blank\" rel=\"nofollow noopener\">continues<\/a> to evolve, it\u2019s crucial to educate children not only about financial literacy but also the basics of cybersecurity. To achieve this, you can read <a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-alphabet\/?reseller=gl_cyberalphabet_pr_ona_pr__all_b2c_blo_lnk__kas_____&amp;utm_source=CyberAlphabet&amp;utm_medium=sm-project&amp;utm_campaign=gl_CyberAlphabet_ma0250&amp;utm_content=link&amp;utm_term=gl_CyberAlphabet_organic_250y6s04n9gukyn\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Alphabet<\/a> together with your child. It\u2019s specifically designed to explain key online safety rules in a language easily comprehensible for children.<\/p>\n<p>To avoid concerns about a child losing their card or sharing banking details, we recommend installing a digital NFC card on their phone instead of giving them a physical plastic card. Establish transaction confirmation with the parent if the bank allows it. And, of course, the use of any technical solutions must be accompanied by an explanation of how to use them safely.<\/p>\n<h2><strong>Smart home threats for kids<\/strong><\/h2>\n<p>In our interconnected world, an increasing number of devices \u2014 even everyday items like pet feeders \u2014 are becoming \u201csmart\u201d by connecting to the internet. However, as these devices become more sophisticated, they also become more susceptible to cyberattacks. This year, our researchers <a href=\"https:\/\/www.kaspersky.com\/blog\/pet-feeders-vulnerabilities\/48461\/\" target=\"_blank\" rel=\"noopener nofollow\">conducted<\/a> a vulnerability study on a popular model of smart pet feeder. The findings revealed a number of serious security issues that could allow attackers to gain unauthorized access to the device and steal sensitive information such as video footage \u2014 potentially turning the feeder into a surveillance tool.<\/p>\n<p>Despite the increasing number of threats, manufacturers are not rushing to create cyber-immune devices that preemptively prevent potential exploits of vulnerabilities. Meanwhile, the variety of different IoT devices purchased in households continues to grow. These devices are becoming the norm for children, which also means that children can become tools for cybercriminals in an attack. For instance, if a smart device becomes a fully functional surveillance tool and a child is home alone, cybercriminals could contact them through the device and request sensitive information such as their name, address, or even their parents\u2019 credit card number and times when their parents are not at home. In a scenario such as this one, beyond just hacking the device, there is a risk of financial data loss or even a physical attack.<\/p>\n<p>As we cannot restrict children from using smart home devices, our responsibility as parents is to maximize the security of these devices. This includes at least adjusting default security settings, setting new passwords, and explaining basic cybersecurity rules to children who use IoT devices.<\/p>\n<h2><strong>I need my space!<\/strong><\/h2>\n<p>As kids mature, they develop greater self-awareness, encompassing an understanding of their personal space, privacy, and sensitive data, both offline and in their online activities. The increasing accessibility of the internet means more children are prone to becoming aware of this. Consequently, when a parent firmly communicates the intent to install a parenting digital app on their child\u2019s devices, not all children will take it calmly.<\/p>\n<p>This is why parents now require the skill to discuss their child\u2019s online experience and the importance of parenting digital apps for online safety while respecting the child\u2019s personal space. This involves establishing clear boundaries and expectations, discussing the reasons for using the app with the child. Regular check-ins are also vital, and adjustments to the restrictions should be made as the child matures and develops a sense of responsibility. Learn more in our guide on <a href=\"https:\/\/www.kaspersky.com\/blog\/kids-first-gadget-checklist\/49346\/\" target=\"_blank\" rel=\"noopener nofollow\">kids\u2019 first gadget<\/a><u>s<\/u>, where, together with experienced child psychologist Saliha Afridi, our privacy experts analyze a series of important milestones to understand how to introduce such apps into a child\u2019s life properly and establish a meaningful dialogue about cybersecurity online.<\/p>\n<h2><strong>Forbidden fruit can be\u2026 malicious <\/strong><\/h2>\n<p>If an app is unavailable in one\u2019s home region, a child may start looking for an alternative, but this alternative is often only a malicious copy. Even if they turn to official app stores like Google Play, they still run the risk of falling prey to cybercriminals. From 2020 to 2022, our researchers found more than 190 apps infected with the <a href=\"https:\/\/www.kaspersky.com\/blog\/harly-trojan-subscriber\/45573\/\" target=\"_blank\" rel=\"noopener nofollow\">Harly Trojan<\/a> on Google Play, which signed users up for paid services without their knowledge. A conservative estimate of the number of downloads of these apps is 4.8 million, while the actual figure of victims may be even higher.<\/p>\n<p>Children are not the only ones following this trend; adults are as well, which was highlighted in our latest <a href=\"https:\/\/securelist.com\/kaspersky-security-bulletin-consumer-threats-2024\/111135\/\" target=\"_blank\" rel=\"noopener\">consumer cyberthreats predictions<\/a> report as a part of the annual Kaspersky Security Bulletin. That\u2019s why it\u2019s crucial for kids and their parents to understand the fundamentals of cybersecurity. For instance, it\u2019s important to pay attention to the permissions that an app requests when installing it: a simple calculator, for instance, shouldn\u2019t need access to your location or contact list.<\/p>\n<h2><strong>How to keep kids safe?<\/strong><\/h2>\n<p>As we can see, many of the trends that are playing out in society today are also affecting children, making them potential targets for attackers. This includes both the development and popularity of AI and smart homes, as well as the expansion of the world of gaming and the fintech industry. Our experts are convinced that protecting children from cybersecurity threats in 2024 requires proactive measures from parents:<\/p>\n<ul>\n<li>By staying informed about the latest threats and actively monitoring their children\u2019s online activities, parents can create a safer online environment for their kids.<\/li>\n<li>It\u2019s crucial for parents to have open communication with their children about the potential risks they may encounter online and to enforce strict guidelines to ensure their safety.<\/li>\n<li>With the right tools such as <a href=\"https:\/\/www.kaspersky.co.uk\/safe-kids?icid=gb_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____ksk___\" target=\"_blank\" rel=\"noopener\">Kaspersky Safe Kids<\/a>, parents can effectively safeguard their children against cyberthreats in the digital age.<\/li>\n<li>To help parents introduce their children to cybersecurity amid the evolving threat landscape, our experts have developed the above-mentioned <a href=\"https:\/\/www.kaspersky.com\/blog\/cybersecurity-alphabet\/?reseller=gl_cyberalphabet_pr_ona_pr__all_b2c_blo_lnk__kas_____&amp;utm_source=CyberAlphabet&amp;utm_medium=sm-project&amp;utm_campaign=gl_CyberAlphabet_ma0250&amp;utm_content=link&amp;utm_term=gl_CyberAlphabet_organic_250y6s04n9gukyn\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Alphabet<\/a>, with key concepts from the cybersecurity industry. In this book, your child can get to know about new technologies, learn the main cyber hygiene rules, find out how to avoid online threats, and recognize fraudsters\u2019 tricks. After reading this book together, you\u2019ll be sure that your offspring knows how to distinguish a phishing website, how VPN and QR-codes work, and even what encryption and honeypots are and what role they play in modern cybersecurity. You can download <a href=\"https:\/\/www.kaspersky.com\/blog\/files\/2024\/01\/KasperskyCybersecurityAlphabetBook.pdf?1&amp;reseller=gl_cyberalphabet_sp_ona_smm__onl_b2c_blo_lnk_______&amp;utm_source=CyberAlphabet&amp;utm_medium=sm-project&amp;utm_campaign=gl_CyberAlphabet_ma0250&amp;utm_content=link&amp;utm_term=gl_CyberAlphabet_organic_tddv6gefgkj250u\" target=\"_blank\" rel=\"noopener nofollow\">the pdf version of the book<\/a> and also the <a href=\"https:\/\/www.kaspersky.com\/blog\/files\/2024\/01\/KasperskyCybersecurityAlphabetPoster.jpg?1&amp;reseller=gl_cyberalphabet_sp_ona_smm__onl_b2c_blo_lnk_______&amp;utm_source=CyberAlphabet&amp;utm_medium=sm-project&amp;utm_campaign=gl_CyberAlphabet_ma0250&amp;utm_content=link&amp;utm_term=gl_CyberAlphabet_organic_b21250ag0ssxxaz\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Cybersecurity Alphabet poster<\/a> for free.<\/li>\n<\/ul>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-family\">\n","protected":false},"excerpt":{"rendered":"<p>We explore the key cybersecurity trends that parents should be aware of, and provide tips on how to safeguard their children\u2019s online activities<\/p>\n","protected":false},"author":2615,"featured_media":27133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2027,9],"tags":[2643,288,282,89,364,76,701],"class_list":{"0":"post-27132","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-special-projects","8":"category-tips","9":"tag-child-safety","10":"tag-children","11":"tag-cybersecurity","12":"tag-kids","13":"tag-parental-control","14":"tag-phishing","15":"tag-scam"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/cybersecurity-threats-for-kids-2024\/27132\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/cybersecurity-threats-for-kids-2024\/26961\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/cybersecurity-threats-for-kids-2024\/22276\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/cybersecurity-threats-for-kids-2024\/29630\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/cybersecurity-threats-for-kids-2024\/50188\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/cybersecurity-threats-for-kids-2024\/33148\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/cybersecurity-threats-for-kids-2024\/32771\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/kids\/","name":"kids"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27132","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/2615"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=27132"}],"version-history":[{"count":0,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/27132\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/27133"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=27132"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=27132"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=27132"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}