Education, Parenting, Internet Safety for All Bookmark
SAFE SEARCH
SAFE IMAGES
SAFE WIKI
SAFE VIDEOS
Enhanced by Google
Enhanced by Google
Enhanced by Google
Enhanced by Google
Category: Internet Security
How to Delete Search Bar History
So you searched for a word or phrase and noticed it appears in the drop down history every time you go to the search bar to search for a new term. Would you like to learn how to delete all those words and phrases anytime you wish? The method to delete search bar history is different for every browser.
Here, we’ll review the various steps needed no matter what browser you are using to conduct your Google searches. Often parents contact us after testing our kids search engine for certain words. They want to ensure our Google enhanced search bar works to protect kids. They are happy when inappropriate search terms are blocked, but now those same words and phrases show up when clicking the search bar.
Clearing Google Search
This issue is not something only related to our website. It’s what happens on any search engine bar in any browser. You may have noticed that your email address will show up in certain forms on your computer as well. Well, there are ways to remove any dropdown term you wish showing up on any form, including our safe search resources.
The solution is to finding the proper instructions to delete your recent searches depends on your web browser. It’s not as simple as just clearing the history because these terms showing up are related to forms on your operating system.
Now for the good news! Below are the steps you need to take to remove form history in Chrome, Microsoft Edge and Firefox browsers.
How to Delete Search Bar history on Chrome
When the drop-down list of suggestions appear, you can highlight an entry by pressing the down arrow key. Then press “Shift-Delete” to remove the highlighted entry from the list. This is the simple way to only remove specific words or phrases.
To do a more extensive removal of all terms you can do so by going to your Chrome browser history, which will provide various option related to all types of history in Chrome.
How to Remove Search History in Microsoft Edge
To delete search bar history from Edge press Ctrl-H on your computer. Then click “Clear History” in the top right. A menu will open to reveal a number of options. If you only wish to delete the search bar history, only select the Autofill Data box. This will remove all words and phrases that were entered.
In Microsoft Edge you can also select to always clear anything thing that is checked off when the browser is closed. The ON button for this is located below the menu and applies to all boxes that a checked off.
Deleting Search Bar History in Firefox
The Firefox browser provides the easiest way to delete searches from any form or a search engine such as ours. Simply click on the search bar and when the word appears click it and hold it, but don’t let go. Then click the delete key. This will allow you to delete only specific searches in the dropdown.
To conduct a blanket delete of history in Firefox, look for the menu links in the top right corner of the browser. Select Tools => Options => Privacy and Security. Then scroll down and click Clear History. To delete the history of searches made, you will need to select Form and Search History. Here you decide whether to check or uncheck other items to may or may not want deleted. Firefox also allows you to delete Everything => or the Last Hour => last Two Hours => last Four hours => or Today only. Firefox has the most options when deleting various history variables.
Having Trouble Deleting Searches?
At Safe Search Kids, we understand that parents and teachers in schools are looking for filtered search engines they can trust to block content that is harmful to kids. You may enter the worst of the worst terms to ensure nothing bad shows up. So if you are having trouble with these instructions, please feel free to contact us for further clarification.
Short of installing parental control apps and taking steps to turn on safe search, Safe Search Kids is a good first step towards protecting kids online. So thanks for testing us out. We hope our search engine can be of use. Our Google enhanced search engine provides safe search of the web, safe images, kids Wikipedia and safe videos for use in your home and in the classroom.
Reading to Learn More:
When not using a browser to safely search Google, test our Safe Search App.
Most parents can easily come up with a list of potentially harmful elements on the Internet that their kids could be exposed to. But as long as that list gets, most will not even think about malware. Precautions to block certain content from causing lasting damage in young minds includes making sure malicious software (malware) does not invade our child’s privacy.
Malware can secretly infect any computer through infected websites, bad software, music and movie file sharing sites and even seemingly innocent online video games. It can expose kids to harmful materiel and at the very least reek havoc on computer. And like any type of virus, it can spread to other computers.
In this article, we’ve collated some of the best ways to take measures regarding Internet security and privacy in order to keep your children’s browsing and gaming safe. Most of these precautionary measures include having an open dialogue with kids about the unseen dangers of malware. Additionally, software solutions a necessary.
Get an Anti-Malware Program
An anti-malware program will save you from future headaches. It protects your browsing and gaming from unwanted viruses and malware; an effective anti-malware program will keep the Trojan virus away. Trojan viruses are a class of code or app that seems to be innocuous when downloaded, but once it’s part of your computer system it goes to work to cause mayhem.
Malware protection blankets your computer against most threats, including Trojan horses which even top of the line antivirus systems do not have. It does it’s best to block “suspect” programs, as well as conducts daily scans to subsequently removes threats that are attempting to change the way your computer behaves.
Google “Malwabytes free download” so do a free scan of your computer. If data and privacy is compromised due to a scammer, it can also block a brute force attack.
Setup Digital Boundary rules
This is where effective communication comes through. Setting up digital boundary rules with your children is fundamental in making them understand that while the Internet is a great place to obtain information, play games, and communicate with their friends, it can also be a dangerous place for someone vulnerable.
Talk to them about rules that you’ve decided upon, or better yet, allow them to participate in the decision-making process. For example, ask them what their stance on no Internet or gadgets after a certain time on weekdays. If you prefer they go to bed before 10:30 PM, it’s wise to set up no Internet by 9 PM or thirty minutes earlier. It’s also a great decision to tell your kids what sites they can or can not access. If they ask, answer them honestly.
Create a Safe Space for Kids via Parental Controls
Teaching kids to make good decisions about online use can only go so far. Any device you have in your home should have parental controls installed. This includes smartphones, laptops, iPads and of course, desk top computers and laptops. Once installed, parental controls can be customized to automatically block sites according to the age of your child. You can also monitor what your kids are doing online.
Effective parental control will also allow you to set usage restrictions according to the time of day. In addition to blocking websites, monitoring social media and filtering content, it can also track location. You may decide to set up rules with your kids to adhere to without setting up blocking features. Leave up to them so make the right decision, but you’ll know if they went online after hours for example, thanks to monitoring. This will help them build self control skills.
Always Communicate with your Kids Regarding their Internet Concerns
Even when you already have set up everything and it’s all going very well and smoothly, encourage your kids to express concerns they may have about their Internet use. Re-enforce why staying away from harmful content is for their own benefit. Slowly give them responsibility to “do the right thing” within the safe confines of your parental control settings.
You can’t protect your children from mature and adult content forever, as well as keeping kids safe from inappropriate YouTube videos. That’s why keeping the lines of communication open is essential to nurture a strong relationship of trust between you and your child. When kids feel listened too, they feel less of a need to rebel from the rules.
Takeaway
Parental supervision is only the start. No parent should feel inadequate for not being able to monitor their child’s activist online all the time. Most computer systems do a good job of preventing virus infections. But malware is much more deviant. It is not uncommon to install a anti-malware program for malware protection, even from innocent website, software programs or video games. The same goes for parental control software which blocks access to the worst parts of the web.
How to Protect Yourself Against Email Phishing (Spear Phishing Update)
I will be the first person to tell you to never click a link in an email from a bank or what you think is a legitimate link to any online account you may have. Whether it be Netflix, Amazon, Fed Ex, PayPal, Capital One or Spotify, the list of companies used by scam artists is endless.
Those sending out phishing emails use trust in these companies to fool us when we least expect it. This is how I came to click on one of those lines, even though I know better. It happened to me when I had my guard down. More about that in a moment and how you can protect your online accounts and identity.
My story in a moment, but first let’s define exactly what I am talking about.
What is Phishing?
Phishing is a malicious attempt to steal your personal information and gain access to an online account you have with a reputable company. The scammer will send you a fake email that links to a fake login of that company.
The word phishing is is pronounced like ‘fishing’ and just like when commercial fisherman casts a wide net to catch fish, scammers and hackers send out millions of emails in hopes to catch easy prey who unwittingly click on the links in those emails.
First of all, most online services will never send you a link asking you to sign into your account for any reason. If they do, I’ll explain why you should still not click it and how to access your account safety to see if the email actually came from a legitimate company. In most cases, these malicious emails contain alarming news about your account being compromised, hacked or suspended.
We’ve all seem these emails. They come from hackers and scammers that state “Your Account Has Been Locked” or the message I recently received from Netflix:
“Thanks for choosing Netflix membership! due latest security issues we need you to upgrade your account details in order to continue your membership.”
Notice how there was even a grammatical error in the message, but yes – I still clicked it. I knew full well that if our account had needed changing or was compromised, Netflix is one of those companies that would have emailed a notice and then instructed me to go to their website via usual methods (such as Googling Netflix or using a trusted bookmark you made in your browser). They won’t put the link in the email.
I Knew Better, but I Still Clicked a Phishing Link
In my case, I had just made changes to the WiFi password in our home and this of course would effect Netflix’s ability to connect via the devices that were previously set up using the old password. Even though I know about phishing and to be careful when receiving these emails, my wife had just mentioned to me that she was unable to connect to Netflix.
At the same time the fake Netflix email arrived in my inbox. I was annoyed that Netflix may not be working so I clicked the link. Fortunately, I realized immediately what I’d done so I closed my browser before any harm was done.
Upon further investigation, I noticed that the link actually was going to a different website than Netflix, but in that moment of frustration it made sense in my mind to be receiving an email from Netflix.
Cyberthieves count on catching people off guard.
Those taking extra precautions to be safe online, such as using only secure public networks or secure websites, can easily be stolen from if not paying attention. For example, if you don’t have a Chase bank account, then chances are you won’t pay much attention to the email. You know it’s probably fraudulent. But if I do have an account related to the email, it makes sense to be receiving an email about a problem with your account. Especially when you’ve recently logged in your this account and made changes.
For example, imagine that you just shipped a package via FedEx, and later that day a FedEx email comes in stating that your package can’t be shipped. You immediately get stressed… “What?” If you’re not thinking, you will click the link to see what the problem is.
It’s a ‘game of chance’ as hackers send out millions of these emails. They know they will trick some people because by coincidence alone these same people will not only have an account related to the email, some of them will have recently made changes to their account, or shipped a package with UPS, or applied for a loan at a bank.
If there is a legitimate problem with your online account, there will be a notice posted about it after you log in. If all is normal, then you know the email you received is a scam.
Phishing, also known as Spoofing, is very common. If you click the link in a phishing email and you attempt to log into your account, thieves gain access to your user name and password. Once inside the account, they have access to all of your personal information.
Beware of Viruses Coming as Email Attachments
Protecting yourself against phishing is as easy as never clicking a link to an online account from within the email. Always go to your account by typing in the website url in a browser directly. Or use the bookmark you’ve set up. Computer infections caused by viruses in email attachments however, are a different story. This is why Anti-Virus software is important to stop spyware, Trojan horses, adware and computer worms. But there are new email virus schemes that employ the same methods as phishing.
You may have see them. These emails contain attachments in the form of a seemingly innocent Word doc or a zip file. The email may say, “Your loan has been approved!” Or “Attached is Your Out Standing Invoice”. If you happened to have just applied for a loan or are curious about if you owe money, you will be more likely to open the attachment.
Invoice Scams are an example of phishing: You may you receive a fake invoice from PayPal or another invoicing platform. Usually, the dollar amount is high enough to cause alarm when you receive it, but low enough that it doesn’t look like an obvious scam.
If you’re not expecting an invoice or it’s unknown to you. Don’t click the link. Log into your credit card account from your trusted bookmarks or access the payment platform to see if there are any charges. Chances are, there won’t be.
While phishing emails gain access a single account to access your personal information, viruses via email will activate malware that infects your entire computer. In both cases, your personal information is compromised.
While phishing emails gain access a single account to access your personal information, viruses via email will activate malware that infects your entire computer. In both cases, your personal information is compromised.
If you have accidentally given access to one of your online accounts for any reason or are not sure, log in and change your password as soon as possible.
If you think your computer has been infected by a virus, read more about how to scan and remove malware – as well as protect yourself from attacks.
Protect Yourself Using the SLAM Method
S stands for Sender:
Check to make sure the sender matches the request in an email. If things don’t line up, tread lightly. The email may also be spoofed to look like it’s from a friend or your boss. Or, their email may have been hacked. If unsure, contact the them by creating a new email from your contacts, see them in person, or call to verify the message.
L stands for Links:
Inspect any link that is contained in any email or text. In emails, you can hover over the link to see the real destination. Pressing and hold the link on a phone will reveal the destination in a popup. Close the popup without proceeding. Texts should also be verified. If you know the sender, check with them first to see if they sent you a text with a link. This includes companies.
A stands for Attachments:
Be cautious of all attachments in all emails you receive. Attachments can be named in a way the seems trustworthy. Verify the sender and if they are familiar to you, check with them first before opening the attachment. Installing anti-virus software will help screen for viruses, but this does not mean you won’t receive attachments that are infected with malware or spyware.
M stands for Message:
Examine all messages you receive via email or text. Check for spelling errors or unusual use of words or phrases. Grammatical errors are common signs of phishing email. Even if everything looks legitimate, check for oddities that seem off. This includes requests for personal information or a topic that doesn’t line up with your personal situation.
Spear Phishing
Spear phishing attacks often use specific details about an individual to get them to trust the message. This information can be gathered from social media, responses from victims if they unknowingly reply to phishing emails or texts. This is why privacy settings should be updated to be more secure.
But even if you do everything correctly, company data breaches can mean that your personal information is stolen and sold to scammers. Therefore, all accounts should have multi-factor authentication set up.
Phishing is when generic emails or texts are sent out to the masses, like a wide net casted out into the sea to catch a lot of fish. Spear phishing is when you receive an email sent directly to you with personal details.
When you get a phishing email per personal information, it can look legitimate. With AI, cybercriminals can generate these messages easier than ever before. Just because a message includes information personalized to you, doesn’t mean you can automatically trust it. Extra vigilance is required.
How to Stop Phishing Emails
There are things you can do to help stop hackers who send phishing emails. Virtually every online account service you use will have security departments that investigate phishing. As such, many have email addresses that you can forward these bad emails to for further investigation. When you get a suspicious email, report it for possible phishing. Simply Google the company name with the word phishing (i.e. ‘Report PayPal Phishing’ or ‘Report Chase Phishing’). You will often find information about where to send phishing emails and perhaps help these companies catch the cyberthieves.
If you land on a URL that appears to impersonating a legitimate website, report the phishing website to the Google Safe Browsing team.
With new technology, there’s more to educate needed to avoid being scammed:
As we move to distance learning due to the recent health crisis, it’s more important than ever to carefully consider the implications of transferring student data between parents, teachers, and administrators. Educational technology is now a standard across classrooms—so what exactly does that mean for our students?
Risk of Student Data Breaches
From 2018 to 2019, student data breaches tripled. In the worst case, the student’s personally identifiable information, or PII, was sold on the dark web. Even on a small scale, these breaches mean the potential for hackers to decode passwords. In these cases, student’s accounts are compromised, and there have even been reported cases of cyberbullying.
Lengthier Education Records
Years ago, the extent of student data was education records stuffed into file cabinets. Oftentimes, those records were lost or tampered with. Ultimately, they didn’t follow students as far as education records will today. Solidified on the web, students have little room for mistakes in the current climate.
It’s important to consider these factors when employing new chatrooms or technology mediums in classrooms. Ensuring all edtech helps, instead of hinders, student’s futures should be an educator’s number one priority.
Responsible Student Data Privacy in the Classroom
Student data privacy laws on a federal and state level monitor some of these potential risks on a micro-level. As an educator, though, you must take proactive measures to protect student data privacy. Consider the following when implementing education technology in digital and physical classrooms:
Follow FERPA Sherpa: Use resources available from the government to understand the concerns with edtech in the classroom.
Read the privacy policy: Before having students visit a website, make sure you read the privacy policy thoroughly. It may indicate it sells data to third parties, or worse, does not have a privacy policy in place at all.
Follow the school’s approved list: Districts and schools will have an approved list of companies and websites to use in the classroom. Seek out this approval before asking students to use a program or website.
Explain best practices: Explain best practices for safe web use to your students, and lead by example. Inform them of the dangers of sharing personal information online and not to believe everything they read online.
Avoid clickwrap agreements: If a website in question has a clickwrap agreement, avoid using it in the classroom. These agreements are data-controlling and have free use of information used on their site.
Look for secure sites: the “s” in ‘https’ signifies that a webpage is encrypted. Any site where students need to log in to an account should be encrypted.
The advancement of tech in education can be a benefit for efficient, personalized learning, but it’s important to take extra measures to protect the new influx of data. With proper vetting of websites, technologies, and platforms; technology can be an advantage for students, parents, and teachers. Learn what types of personal data parents should protect.
A Note to Kids About Personal Data Privacy
Do you really want someone to use your phone to record what you say without you knowing? Do you really want strangers looking at all your pictures and texts? Then you better learn about SMALL PRINT. How about strangers selling your pictures and texts to other people? Or following everything you do online?
Of course, secretly peeking into your life is wrong. Still, you probably clicked on a box that gave someone you don’t know permission to do just that.
Small Print for Small Humans
Whenever you activate a phone or play a computer game or download an app, you see itsy bitsy print at the bottom of the pages. Those tiny words are filled with things that you need to check off before you can use your new computer or play that new game. Those words can be so small that you probably can’t even read them.
If you could read them, they’d sound like gibberish. Many adults with years of education have trouble understanding what those weird words mean. Your parents should look at any small print that you check off, but they might have problems figuring out what they say. What people do know is that when you check the “AGREED” box, you give strangers permission to do scary things.
Do you:
Use a web browser?
Play games online?
Download apps to your phone or computer?
Upload pictures for your friends to see?
Store pictures or text in a cloud?
If you do, then here is a list of just some of the things that you have probably agreed to let strangers do:
turn your video and audio recorders on
take and use your pictures and videos
turn your gaming machine off forever
track everything you do online and share or sell your activity
prevent you or your parents from legally stopping people from sharing details from your lives.
Small print is tricky. Teams of well-trained lawyers spend thousands of hours working on every little word. All that time and all those brains are there to protect the big companies that you use online. It’s up to you and your parents to protect YOU.
Make a point of looking for small print. Grab a bunch of your friends and see if all of you can figure out exactly what you agree to when you click that little box. You will be surprised.
Make a point of looking for small print. Grab a bunch of your friends and see if all of you can figure out exactly what you agree to when you click that little box. You will be surprised.