GS

Learn about your Apps

How do you choose an app to download? Do you ask friends what they like? Do you read ads for them in social media? Do you browse through Google Play Store?  No matter what app you choose, you usually have to click a box that says you have agreed to the “terms of use” or …

Learn about your Apps Read More »

Learn about Metadata

Every time you send an email, text a friend, create a document, or take a photo, your digital device collects data about what you’ve done. This includes information that identifies your smartphone or tablet and when and where you were when you emailed, texted, or took a photo of your dog. All that information is …

Learn about Metadata Read More »

Guard your Online Profile

Strangers can find out all kinds of information about you online. Everything you do, from internet searches to online shopping to social media posts, leaves a trail of information. That trail is your digital footprint. Companies that want you to buy their products will track the websites you visit, so they can send you ads. …

Guard your Online Profile Read More »

Guard your Identity

Your personally identifiable information (PII) includes any information that can be used to identify, contact, or locate you—like your name, birthday, address, social security number, and email address or password. You should never share identifiable information with someone you don’t know online.  However, even if you only share non-identifying information, all of the things you …

Guard your Identity Read More »

Protect your Identity

Hackers make trouble in lots of ways.   ■ They crack people’s passwords and steal credit card numbers.  ■ They send phishy emails that get you to give them personal information or to download malware.   ■ They get personal information about people from emails, texts, and social media posts.   ■ They secretly install software on computers …

Protect your Identity Read More »

Analyze Log Files

Computers collect metadata. Those are details about what you do online or on a specific computer. Cyber investigators look at metadata called computer log files to help them track down cybercriminals. Log files contain information about all the tasks or operations a computer does. They keep track of what operations were done on which computer, …

Analyze Log Files Read More »

Who Fights them?

Cyber Investigators – Combine law enforcement and tech knowledge to solve crimes. They may work with forensic experts, who piece together data from computers and networks to find the criminals.  Cryptographers- Write the encryption programs companies use to protect their data. Penetration testers- They try to break into secure computer programs and sites to find …

Who Fights them? Read More »

How Hackers use Social Media

When you post updates on social media, you share information about where you are and what you like to do. You might mention your birthday. Some people make a big mistake—they list where they go to school or where they live! Hackers can piece together all this information and use it to steal your identity. …

How Hackers use Social Media Read More »

How to spot phishing emails

In 1996, hackers stole passwords and accounts from America Online with fake emails asking for information. Hackers called the scam phishing because it was kind of like fishing. They lured people with the fake email, and some of them “took the bait,” like a fish does. This was the one of the times people used …

How to spot phishing emails Read More »

Identify phishing emails

Hackers try to trick people into giving out private information. One way they do this is by sending emails with bad links or harmful attachments, or emails that ask for money. This kind of email is called phishing. Sometimes the phishing emails pretend to come from a website you’ve visited, like a site where you’ve …

Identify phishing emails Read More »