{"id":6114,"date":"2015-08-17T05:14:44","date_gmt":"2015-08-17T09:14:44","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6114"},"modified":"2017-11-08T07:39:03","modified_gmt":"2017-11-08T07:39:03","slug":"security-tips-for-kids-6","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-6\/6114\/","title":{"rendered":"Not everything on the Internet is what it seems"},"content":{"rendered":"<p>When you hear adults saying, \u201ckids are helpless,\u201d it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your family. Unfortunately, the phrase often becomes a blanket statement due to folks who mindlessly abuse their parents\u2019 credit cards by buying stuff for mobile games or readily download games or apps from unreliable websites that install Trojans and other pieces of malware.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/09\/05194919\/tips-for-kids-06-fb.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-6115\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/86\/2015\/09\/05194919\/tips-for-kids-06-fb.png\" alt=\"tips-for-kids-06-fb\" width=\"800\" height=\"800\"><\/a><\/p>\n<p>Let\u2019s not beat around the bush: don\u2019t be a naive slowpoke. Taking an interest in online security, you can\u2019t afford to believe that the Internet\u2019s a place full of cute fairy unicorns and beautiful people. The World Wide Web is a direct reflection of the real world, full of good guys and bad guys. There are no angels on the Web, but criminals also live inside this uncontrollable place and use its anonymity for their own sake.<\/p>\n<p>We are not telling you this to scare you or to turn you into a goody-two shoes. But you do need to be more vigilant for yourself and for your parents, especially if they neglect online security. Unfortunately, there are too many adults who do not follow even basic Internet security rules, choose the weakest passwords ever and fall for well-known phishing emails. \u00a0But who said you can\u2019t be better than them in this game and even teach them a thing or two?<\/p>\n<p>https:\/\/twitter.com\/gustavo_srcc\/status\/610433664451780608<\/p>\n<p><b>Remember: everybody lies<\/b><\/p>\n<p>You should explain to your parents that:<\/p>\n<p>\u25cf Not all Internet users are who they say that they are. That \u201ccool programmer\u201d might just be a kid who can\u2019t do his homework. A \u201cgirl from a nearby school\u201d could be a bored, bearded man living in a far-off country. And this tough guy with lots of attractive pictures all over the Instagram could be just some stranger\u00a0from El Armpito, NM, who\u2019s the only achievement is good skills on Google images search.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Not everything on the Internet is what it seems #security #online<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FaiP9&amp;text=Not+everything+on+the+Internet+is+what+it+seems+%23security+%23online\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>\u25cf The same story holds true for websites. Remember that not every site is reliable. Some of them might display deliberately false information for various reasons. Always check the facts on several sources, preferably well-known, reliable ones. <em>Be sure to speak of your suspicions with parents if you\u2019re not sure.<\/em><\/p>\n<p>A family needs a person who cares about cyber security. And you can be the one.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you hear adults saying, \u201ckids are helpless,\u201d it makes you angry, right? You bet it does even if you are the most self-sustained teen in the history of your<\/p>\n","protected":false},"author":40,"featured_media":6115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026,9],"tags":[621,1035,89,434,76,97,131],"class_list":{"0":"post-6114","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-advice-2","10":"tag-internet","11":"tag-kids","12":"tag-mobile-devices","13":"tag-phishing","14":"tag-security-2","15":"tag-tips"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-6\/6114\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-tips-for-kids-6\/5766\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-tips-for-kids-6\/5935\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-6\/6602\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-tips-for-kids-6\/6457\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-tips-for-kids-6\/8483\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-tips-for-kids-6\/9462\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-tips-for-kids-6\/4784\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-tips-for-kids-6\/5608\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/security-tips-for-kids-6\/5970\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-tips-for-kids-6\/8471\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-tips-for-kids-6\/8483\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-tips-for-kids-6\/9462\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-tips-for-kids-6\/9462\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/advice-2\/","name":"advice"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6114"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6114\/revisions"}],"predecessor-version":[{"id":9099,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6114\/revisions\/9099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6115"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}