CINXE.COM

Yahoo! Security Center: How can my kids communicate safely online?

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01//EN" "http://www.w3.org/TR/html4/strict.dtd"> <html> <head><script type="text/javascript" src="https://web-static.archive.org/_static/js/bundle-playback.js?v=7YQSqjSh" charset="utf-8"></script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/wombat.js?v=txqj7nKC" charset="utf-8"></script> <script>window.RufflePlayer=window.RufflePlayer||{};window.RufflePlayer.config={"autoplay":"on","unmuteOverlay":"hidden"};</script> <script type="text/javascript" src="https://web-static.archive.org/_static/js/ruffle/ruffle.js"></script> <script type="text/javascript"> __wm.init("https://web.archive.org/web"); __wm.wombat("http://security.yahoo.com/article.html?aid=2006102504","20101028130513","https://web.archive.org/","web","https://web-static.archive.org/_static/", "1288271113"); </script> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/banner-styles.css?v=p7PEIJWi" /> <link rel="stylesheet" type="text/css" href="https://web-static.archive.org/_static/css/iconochive.css?v=3PDvdIFv" /> <!-- End Wayback Rewrite JS Include --> <title> Yahoo! Security Center: How can my kids communicate safely online? </title> <meta name="keywords" content="Kid, kids, children, child, protect, chat, instant message, instant messenger, social network, networking, profile, online, friends, strangers, safe, safety"> <meta name="description" content="Find answers to your online safety questions, including viruses, spam, passwords, identity theft, and parental controls."> <link rel="stylesheet" type="text/css" href="https://web.archive.org/web/20101028130513cs_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/css/reset_2.0.5.css"> <link rel="stylesheet" type="text/css" href="https://web.archive.org/web/20101028130513cs_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/css/fonts_2.0.5.css"> <link rel="stylesheet" type="text/css" href="https://web.archive.org/web/20101028130513cs_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/css/grids_2.0.5.css"> <link rel="stylesheet" type="text/css" href="https://web.archive.org/web/20101028130513cs_/http://us.js2.yimg.com/us.js.yimg.com/lib/seccntr/security_1.css"> <style type="text/css"> #hdshdw2 { width:750px;height:3px;background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/masthead_shadow2.gif) no-repeat; } #sec_dn { margin-left: auto; margin-right: auto; } #bd {float:left;margin:0;padding:0;background:#ebeff1; } .yui-t4 #yui-main .yui-b{float:left;width:74.7%;min-width:570px; padding-bottom:10px} .yui-t4 .yui-b {float:left;background:#ebeff1; padding-bottom:10px;} #topnav { height:38px; background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/btn/btn_bg.gif) no-repeat; margin:10px 0 0 10px; padding: 0; } #topnav img {margin:0 0 0 0;} #topnavspacer { width:524px; height:27px; margin-left: auto; margin-right: auto; padding-top: 6px; } #topnavspacer img {margin-right: 4px;} #topnavspacer .last {margin-right: 0;} #topleft { float:left;width:570px;height:48px; background:#469df2 url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/flash_nav_shadow_570.gif) no-repeat bottom left;margin:0;padding:0; } #botleft { float:left;width:560px;background:#ebeff1;margin:0 0 0 10px;} .bcnav {font:normal 77% arial;margin: 5px 0px;} .srchtrm {color:#f26614;} .alsotry {width:530px;margin:10px 0; } #alsotryicn {float:left; margin-bottom:20px;padding-right:10px;} .definition_top {width:530px; background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/definition_bg_top.gif) no-repeat; margin:10px 0; padding:10px 0 0 0;} .definition_mid {width:530px; min-height:30px; background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/definition_bg_mid.gif) repeat-y; padding:0 5px 5px 5px; font:normal 85% arial;} .definition_bot {width:530px; height:10px; background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/definition_bg_btm.gif) no-repeat; padding:0; } .def_term {width:100px;float:left; font-style:italic; } .def_det {width:400px;float:left; } .srchblock {margin:10px 0 15px 0; padding:0 0 25px 10px; border-bottom:1px solid #cdcdcd; } .otherres {padding-left:10px;} .articlehdr {height:85px;width:520px;margin:0;padding:0;} .privacy {background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/cont_privacy.jpg) no-repeat top right;} .kids {background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/cont_kid.jpg) no-repeat top right;} .pc {background:url(https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/cont_pc.jpg) no-repeat top right;} .articlehdr h2 {color:#545454; padding:30px 0; vertical-align:middle;font:normal 146% arial;} #content2 blockquote {width:80%;margin-left:20px;padding:5px;} #content2 img {padding:10px 0;} #content2 p {margin:5px 0 8px;} #content2 ul {list-style:disc;margin:0 30px;} #content2 li {margin:0;} #content2 .fakenum {margin:15px 0;} #content p {margin:10px 0;} #content ul, .otherres ul {list-style:disc;margin:0 30px;} #content li, #content li a {margin:0;font:bold 100% arial;} .otherres ul {list-style:disc;margin:0 20px;} .otherres_text {font:normal 85% arial;} .otherres h2 {padding-bottom:10px;} .srchblock ol {list-style:decimal; font:100% arial; margin-left:15px;padding-top:10px;} .srchblock li {margin:0 0 10px 10px; font:normal 100% arial; } .srchblock li a {font:normal 100% arial;} .last {padding:0; border-bottom:none; } .last li {margin:0 0 5px 10px;} .srchblock .greenlinks {color:#4aa62c;font:normal 85% arial;} .srchblock .module_title {font:normal 123% arial; } .para_title {font:bold 100% arial; padding-top:15px; } .module_title .greenlinks {color:#4aa62c;font:normal 69% arial;margin-top:-5px;margin-left:2px;} .module_title .icn {margin:5px 10px 10px 0;} .backtotop {font:bold 85% arial;margin-left:10px;} </style><!--[if IE]> <style type="text/css"> input#p {height:24px;} #srch_m #prbsrch {margin-bottom:3px; padding:3px 2px 1px 2px;} #nested1 {height:255px;} #nested2 {height:150px;} #ft_shadow {margin-top:-3px;} #botleft {width:550px;margin:0;padding:0 0 0 10px;} </style> <![endif]--><!--[if gte IE 7]> <style type="text/css"> #ygma #ygmahelp {width:12em;float:right;margin:0 5px 0 0;} #frmblock {margin-right:5px; } #nested2 .nested_btm_lnk {margin-top:0px;} </style> <![endif]--> <script type="text/javascript"> var spaceid = 565000007; </script> <script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/ult/ylc_1.7.js"> </script> <script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/seccntr/scanmypc_1.js"> </script> </head> <body id="securitysite"> <div id="doc" class="yui-t4"> <div id="hd1" class="head"> <!-- start: dynamically included page header --> <!-- SpaceID=0 robot --> <!-- end: page header --> </div> <div id="bd"> <!-- start: top primary column --> <div id="yui-main"> <div class="yui-b"> <!-- start:left-col --> <div id="topleft"> <a name="top" id="top"></a> <div id="topnav"> <div id="topnavspacer"> <a href="article_pc.html" onmouseover="s('btn_pc');" onmouseout="r('btn_pc');" onmousedown="d('btn_pc');"><img name="btn_pc" alt="Protect Your PC" src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/btn/btn_pc_nrm.gif" width="126" height="27" id="btn_pc"></a><a href="article_privacy.html" onmouseover="s('btn_privacy');" onmouseout="r('btn_privacy');" onmousedown="d('btn_privacy');"><img name="btn_privacy" alt="Protect Your Privacy" src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/btn/btn_privacy_nrm.gif" width="126" height="27" id="btn_privacy"></a><a href="article_kids.html" onmouseover="s('btn_kid');" onmouseout="r('btn_kid');" onmousedown="d('btn_kid');"><img name="btn_kid" alt="Protect Your Kids" src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/btn/btn_kid_nrm.gif" width="126" height="27" id="btn_kid"></a><a href="all_topics.html" onmouseover="s('btn_all');" onmouseout="r('btn_all');" onmousedown="d('btn_all');"><img name="btn_all" class="last" src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/btn/btn_all_nrm.gif" width="126" height="27" id="btn_all"></a> </div> </div> </div><script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/seccntr/nav_1.js"> </script> <!-- end topleft --> <div id="botleft"> <p class="bcnav"> <a href="index.html">Security Home</a> &gt; <a href="all_topics.html">All Topics</a> &gt; <a href="topic_full.html?topic=Kids and Family Safety">Kids and Family Safety</a> &gt; How can my kids communicate safely online? </p> <div class="pri_dn_top"> <!-- only one module on sec page(s) --> <div class="pri_dn_mid no_nested"> <div class="srchblock"> <div class="articlehdr"> <h2> How can my kids communicate safely online? </h2> </div><div id="content2"> <p>Chat rooms, instant messaging, email, social networking sites, groups, message boards, and personal web pages all offer kids ways to meet and communicate with others in cyberspace. But they also offer dangers for the unsuspecting child.</p> <p>From inappropriate material to cyber-bullying to solicitation by adults, kids can unknowingly put themselves at risk when interacting with strangers online. How can you be sure that your children are safe when they enter a chat room or post a profile on a social networking web site?</p> <p>You can start by familiarizing yourself with the many options available to children for communicating online. The <a href="/web/20101028130513/http://security.yahoo.com/article_kids.html">general guidelines for keeping your kids safe</a> apply whenever your kids go on the Web. But you should take additional precautions when it comes to how and where your kids meet others on the Net. </p> <p class="para_title">Restricting the information they communicate</p> <p>Children, especially teens, may spend hours a day on a computer communicating with others. They can meet strangers who over the course of time can come to feel like true friends. But online friends may not always be who they seem to be, and otherwise cautious kids can let their guard down and reveal more information about themselves than they should.</p> <p>You can help keep your kids safe online by talking to them about communicating safely with others. Make sure your children understand that they should: <ul><li>Never give out personally identifiable information in any conversation, online posting, or profile. This includes their last name, home address, email address, phone number, and school name or sports teams. Even if your children feel safe giving some personal information to one person, and different information to another, they could be victimized by online predators. Some predators create multiple profiles and use them to gather a variety information about a child. Taken together, that information could lead to the child's true identity.</li><li>Avoid posting photos that allow someone to identify where they live, or what school they attend. They should never post sexually suggestive photos.</li><li>Choose a screen name or alias that is used only for chatting and does not contain personally identifiable information. They should avoid names that are sexually suggestive or that might attract inappropriate contact.</li><li>Be assertive. If someone approaches them in a way that makes them uncomfortable, encourage them to end all contact. Ask them to become familiar with the tools and methods available for reporting abusive or inappropriate behavior.</li><li>Assure your children that they can come to you to talk through any situation that makes them uncomfortable, especially if they are afraid or uncertain about how to resolve it.</li></ul></p> <p>Urge your kids to share their blogs or online profiles with you. And be aware that some kids may have more than one account on more than one online service. If you're at all concerned, use search engines and the search tools on social-networking sites to look for your child's name, email address, and other identifying information. </p> <p class="para_title">Restricting who they communicate with</p> <p>Consider using software or online tools to help you monitor or restrict who your children chat with. Using <a href="https://web.archive.org/web/20101028130513/http://us.lrd.yahoo.com/_ylc=X3oDMTByaGZyZ3FvBF9TAzU2NTAwMDAwNwRhaWQDMjAwNjEwMjUwNA--/SIG=11nupc5jq/**http%3A//help.yahoo.com/l/us/yahoo/family/index.html">Yahoo! Family Accounts</a>, for example, you can edit their Yahoo! Mail Block List and Yahoo! Messenger and Ignore lists. </p> <p>If a social networking service offers privacy features, make sure your children use them so that they share information only with people they know. </p> <p class="para_title">Educate your kids</p> <p>The best way to keep your kids safe is to surf with them and talk to them about all potential dangers on the Web. Tell them you care and trust them and that they should talk to you if they receive any suspicious communications.</p> </div> </div> </div> <div class="pri_dn_bot"></div> </div><!-- end: pri_dn_top --> </div><!-- end: botleft --> <a class="backtotop" href="#top"><img src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/ic/arrow_backtotop.gif"> Back to top</a> </div><!-- end: yui-b --> </div><!-- end: yui-main - LEFT COL --> <div class="yui-b"> <div id="sec_dn"> <!-- start: your content here --> <div id="sec_top"> <div class="sec_top"> <div class="sec_mid"> <p id="othrprds"> <a name="othrprds" href="https://web.archive.org/web/20101028130513/http://us.lrd.yahoo.com/_ylc=X3oDMTBjNmdiN29uBF9TAzU2NTAwMDAwMg--/SIG=110v39g9c/**http%3A//downloads.yahoo.com/" id="othrprds">Keep your Yahoo! software updated</a> </p> </div> <div class="sec_bot"></div> </div> </div><!-- end: top chunk --> <!-- end: your content here --> <div class="sec_top"> <div class="sec_mid"> <h2> Security Reference </h2><a id="glossary_open" class="para_title" href="#" name="glossary_open">Glossary</a> </div> <div class="sec_bot"></div> </div> <div class="sec_top"> <div class="sec_mid"> <h2>Featured Topics</h2> <ul> <li><a href="/web/20101028130513/http://security.yahoo.com/article.html?aid=2006102603">Help! I think I've been phished!</a></li> <li><a href="/web/20101028130513/http://security.yahoo.com/article.html?aid=2006102507">What is a sign-in seal?</a></li> <li><a href="/web/20101028130513/http://security.yahoo.com/article.html?aid=2006102508">How do I get rid of pop-ups, viruses, adware, or spyware?</a></li> </ul> <br/> <div align="right"><a href="/web/20101028130513/http://security.yahoo.com/all_topics.html">See All</a></div> </div> <div class="sec_bot"></div> </div><div id="glossary"> <div id="hdr"><h2>Glossary</h2><div id="close"><a href="javascript:;" onclick="hideitemdetail()"><img src="https://web.archive.org/web/20101028130513im_/http://us.i1.yimg.com/us.yimg.com/i/us/seccntr/gr/close.gif" width="43" height="13"></a></div></div> <div id="glossary_nav"> <span><a href="#" onclick="glos_show_hide('a');">A</a></span><span><a href="#" onclick="glos_show_hide('b');">B</a></span><span><a href="#" onclick="glos_show_hide('c');">C</a></span><span><a href="#" onclick="glos_show_hide('d');">D</a></span><span><a href="#" onclick="glos_show_hide('e');">E</a></span><span><a href="#" onclick="glos_show_hide('f');">F</a></span><span>G</span><span><a href="#" onclick="glos_show_hide('h');">H</a></span><span>I</span><span>J</span><span><a href="#" onclick="glos_show_hide('k');">K</a></span><span>L</span><span><a href="#" onclick="glos_show_hide('m');">M</a></span><span>N</span><span>O</span><span><a href="#" onclick="glos_show_hide('p');">P</a></span><span>Q</span><span>R</span><span><a href="#" onclick="glos_show_hide('s');">S</a></span><span><a href="#" onclick="glos_show_hide('t');">T</a></span><span><a href="#" onclick="glos_show_hide('u');">U</a></span><span><a href="#" onclick="glos_show_hide('v');">V</a></span><span><a href="#" onclick="glos_show_hide('w');">W</a></span><span>X</span><span>Y</span><span><a href="#" onclick="glos_show_hide('z');">Z</a></span> <img id="glossary_beacon" width="1" height="1" src="/web/20101028130513im_/http://security.yahoo.com/article.html?aid=2006102504"/> </div> <span class="glossary_body" id="glos_a"> <p class="title">adware</p> <p class="desc">A program that typically displays advertising through pop-up or pop-under windows as you surf the Web. Adware is often hidden alongside other programs, and you may unknowingly install it when you download a program from the Internet or install software from disks. You usually need a specialized anti-adware or anti-spyware program to remove adware from your computer.</p> <p class="title">anonymity</p> <p class="desc">Inability to identify a person from known information.</p> <p class="title">anti-spam</p> <p class="desc">A program that filters spam in an email inbox and moves it to a bulk or spam folder, where it can be deleted.</p> <p class="title">anti-spyware</p> <p class="desc">A program that finds and removes spyware. Some anti-spyware programs can also find and remove other malware, like keyloggers, Trojan horses, worms, and more.</p> <p class="title">anti-virus</p> <p class="desc">A program that is designed to identify, prevent, and eliminate viruses and other malicious software.</p> <p class="title">attacker</p> <p class="desc">A person who intentionally attempts to defeat a system.</p> </span> <span class="glossary_body" id="glos_b"> <p class="title">bulk folder</p> <p class="desc">A folder in some email programs that is used to hold email identified as spam.</p> </span> <span class="glossary_body" id="glos_c"> <p class="title">case-sensitive</p> <p class="desc">Distinguishing between uppercase (or capital) letters and lowercase (or small) letters. Yahoo! passwords are case-sensitive, which means that a capital A is different from a lowercase a. So when you enter your password, make sure to type it with the correct capitalization.</p> <p class="title">cookie</p> <p class="desc">A small amount of data, often including an anonymous unique identifier, that is sent to your browser from a web site's computers and stored on your computer's hard disk. Web sites use cookies to "remember" details about you, such as your user name or site preferences, in order to personalize your experience on that web site. Your browser transmits information back to the site each time you view that site until the cookie expires. Yahoo!, for example, uses cookies to remember your personal preferences, allowing us to display customized content on pages such as My Yahoo!. </p> </span> <span class="glossary_body" id="glos_d"> <p class="title">download</p> <p class="desc">The transfer of a copy of program or file from a network to a single computer.</p> </span> <span class="glossary_body" id="glos_e"> <p class="title">email header</p> <p class="desc">Part of an email message that describes the path that the email took to go from the sender to the recipient. Email headers are generally hidden, but can be displayed if necessary. If you report spam or phishing emails to Yahoo!, you'll be asked to include the email headers to help identify the source of the email.</p> <p class="title">encryption</p> <p class="desc">The process of converting data or other information into code so that unauthorized people cannot access it.</p> </span> <span class="glossary_body" id="glos_f"> <p class="title">firewall</p> <p class="desc">Hardware or a program that prevents unauthorized users from accessing a computer network or that monitors the transfer of information to and from a network. A personal firewall is a program that filters traffic to or from a single computer. Many operating systems (such as Microsoft Windows XP and Mac OS X) include firewall protection.</p> <p class="desc">A computer firewall gets its name from the fireproof wall in buildings that acts as a barrier to prevent the spread of fire.</p> <p class="title">freeware</p> <p class="desc">Software (or programs) available for free, usually over the Internet. These programs can be sources of hidden spyware and adware.</p> </span> <span class="glossary_body" id="glos_h"> <p class="title">hacker</p> <p class="desc">A person who uses programming skills to gain illegal access to a computer, network, or file.</p> <p class="title">header</p> <p class="desc">Another name for an email header.</p> <p class="title">hijacker</p> <p class="desc">A malicious program that takes control of a browser and may redirect it to a fraudulent site for the purpose of committing identity theft or fraud.</p> <p class="title">hoax</p> <p class="desc">Something meant to deceive or trick. Hoaxes involving threats to computers usually arrive in an email and contain bogus warnings designed to frighten or mislead you. Unsuspecting recipients may forward the email to friends and colleagues, spreading the hoax.</p> </span> <span class="glossary_body" id="glos_k"> <p class="title">keylogger</p> <p class="desc">Software (or a program) that secretly tracks and records all activities on a computer, including keystrokes, web sites visited, and potentially more. The information captured is transmitted back to a third party, who can then use the information to access online accounts and sensitive personal and financial information.</p> </span> <span class="glossary_body" id="glos_m"> <p class="title">mail header</p> <p class="desc">Another name for an email header.</p> <p class="title">malware</p> <p class="desc">Software designed to infiltrate or damage a computer without the owner's knowledge. Malware is a general category of software that includes viruses, worms, Trojan horses, spyware, adware, and other malicious software.</p> </span> <span class="glossary_body" id="glos_p"> <p class="title">phishing</p> <p class="desc">An attempt to steal passwords and private account information through fake web sites and emails that look like those of trusted companies. A phishing web site or email can look identical to the real thing, so it can be hard to tell that it's fake. Phishing schemes can also use instant messages, typically when an account is compromised. In this case, the fraudster sends phishing messages to the contacts in the account's Messenger or friend list.</p> <p class="title">pop-under</p> <p class="desc">A form of online advertising designed to attract viewers to a web site or to capture email addresses. This type of ad "pops under" the current web page in a new window and isn't seen until the browser window is closed, making it more difficult to determine which web site opened it.</p> <p class="title">pop-up</p> <p class="desc">A form of online advertising designed to attract viewers to a web site or to capture email addresses. This type of ad "pops up" in a new window, covering all or part of the current web page.</p> <p class="title">pop-up blocker</p> <p class="desc">A program designed to prevent pop-ups and pop-unders.</p> <p class="title">pretexting</p> <p class="desc">Using false pretenses (such as a false identify or name) to get personal information, which may be used to fraudulently obtain credit or assets.</p> </span> <span class="glossary_body" id="glos_s"> <p class="title">shareware</p> <p class="desc">Copyrighted software (or programs) available for free on a trial basis. Usually you'll be asked to pay a fee if you want to continue using the software after the trial period. These programs are sometimes sources of hidden spyware and adware.</p> <p class="title">sign-in seal</p> <p class="desc">A feature of Yahoo! that helps to protect you against phishing scams. You create your personalized sign-in seal and then look for it every time you sign in to Yahoo!. If your sign-in seal isn't displayed, or isn't the one you created, you might be on a fraudulent web site, designed to look like a legitimate Yahoo! site.</p> <p class="title">social engineering</p> <p class="desc">A common ploy used to gain access to accounts by manipulating unsuspecting victims into revealing confidential information. Perpetrators may befriend potential victims and use information provided by them to guess a password or other secret data, which they use to access the victim's online accounts.</p> <p class="title">spam</p> <p class="desc">Any message, regardless of its content, that is sent to multiple recipients who haven't specifically requested it. Spam can be an email message or an instant message. Posting the same message multiple times to newsgroups or list servers is also considered spamming &#151; especially if it isn't related to the topic. Spam is also called UCE (unsolicited commercial email) and UBE (unsolicited bulk email).</p> <p class="title">Spam folder</p> <p class="desc">A folder in Yahoo! Mail used to hold email identified as spam.</p> <p class="title">spearfishing or spearphishing</p> <p class="desc">A kind of phishing scheme that targets a specific organization or individual in an attempt to gain access to confidential data. Like phishing messages, spearphishing messages appear to come from a trusted source, and may even appear to be from an employee within the recipient's company. Typically, a spearphishing email asks for user names and passwords or instructs the recipient to click on a link. That link could result in the downloading of spyware or other malicious programs. If a single employee falls for the spearphishing scam, the attacker can pretend to be that individual and gain access to sensitive data.</p> <p class="title">spoofing</p> <p class="desc">Imitating a legitimate web site. Phishing scams use spoofing to create site that looks like a legitimate web site to fool potential victims into signing on with their user ID and password. The spoofing site captures this information and uses it to gather personal and financial information.</p> <p class="title">spyware</p> <p class="desc">A program or technology that aids in gathering information about a person or organization, often without their knowledge. It includes programs like hijackers and keyloggers. Spyware is often hidden alongside other programs, and you may unknowingly install spyware when you download a program from the Internet or install software from disks. You usually need a specialized anti-spyware program to remove spyware from your computer.</p> <p class="title">SSL</p> <p class="desc">Abbreviation for Secure Sockets Layer. A set of rules that defines the format and sequence of messages sent over the Internet to provide a level of security when transmitting private information. When you sign in to Yahoo!, your password is always transmitted over a SSL encrypted connection.</p> </span> <span class="glossary_body" id="glos_t"> <p class="title">Trojan</p> <p class="desc">A shortened name for Trojan horse.</p> <p class="title">Trojan horse</p> <p class="desc">A program that disguises itself as another program. Similar to a virus, a Trojan horse is hidden and usually causes an unwanted effect, such as installing a "back door" in your computer that can be used by hackers. Unlike a virus, a Trojan horse typically doesn't create copies of itself.</p> </span> <span class="glossary_body" id="glos_u"> <p class="title">UBE</p> <p class="desc">Abbreviation for unsolicited bulk email. More commonly known as spam.</p> <p class="title">UCE</p> <p class="desc">Abbreviation for unsolicited commercial email. More commonly known as spam.</p> </span> <span class="glossary_body" id="glos_v"> <p class="title">virus</p> <p class="desc">A program that hides in other programs or documents and spreads as a side-effect of something you do, like opening an attachment to an email. Viruses come in many forms, and you don't need to install a program for your computer to be infected. For example, some viruses are spread when you open a word-processing document, particularly if you enabled macros in your word processor. An email virus may create copies of itself and automatically mail itself to everyone in your address book or attach itself to outgoing files.</p> </span> <span class="glossary_body" id="glos_w"> <p class="title">worm</p> <p class="desc">A malicious program that spreads without your taking any action, typically by exploiting vulnerabilities in popular programs like Microsoft Outlook and Microsoft Outlook Express email software. Once activated, a worm generally uses the Internet or your local network to spread to other computers.</p> </span> <span class="glossary_body" id="glos_z"> <p class="title">zombie</p> <p class="desc">A computer that has been attacked by a hacker, virus, or Trojan horse and is then used to perform malicious acts, such as sending spam, under remote direction. The zombie computer gets its name from the zombie &#151; an undead or apathetic person &#151; because the computer and its owner are unaware that the computer is controlled remotely.</p> </span> </div> </div><!-- end: sec yui-b --> </div><!-- end bd --> <div id="ft"> <!-- start: dynamically included page footer --> <!-- SpaceID=0 robot --> <!-- end: page footer --> </div> </div><script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/utils/2/yahoo_2.0.6.js"> </script> <script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/utils/2/event_2.0.6.js"> </script> <script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/common/utils/2/dom_2.0.5.js"> </script> <script type="text/javascript" src="https://web.archive.org/web/20101028130513js_/http://us.js2.yimg.com/us.js.yimg.com/lib/seccntr/glossary_1.js"> </script> </div> </body> </html> <!--0.016739--><!-- w4.yop.re2.yahoo.com uncompressed Thu Oct 28 06:05:13 PDT 2010 --> <!-- FILE ARCHIVED ON 13:05:13 Oct 28, 2010 AND RETRIEVED FROM THE INTERNET ARCHIVE ON 05:15:26 Feb 27, 2025. JAVASCRIPT APPENDED BY WAYBACK MACHINE, COPYRIGHT INTERNET ARCHIVE. ALL OTHER CONTENT MAY ALSO BE PROTECTED BY COPYRIGHT (17 U.S.C. SECTION 108(a)(3)). --> <!-- playback timings (ms): captures_list: 0.48 exclusion.robots: 0.024 exclusion.robots.policy: 0.015 esindex: 0.009 cdx.remote: 9.777 LoadShardBlock: 468.263 (3) PetaboxLoader3.datanode: 109.325 (4) PetaboxLoader3.resolve: 132.947 (2) load_resource: 206.637 -->

Pages: 1 2 3 4 5 6 7 8 9 10