Category: Online Safety for Kids

Data Privacy Risks in Child-Targeted Android Apps – Incogni Research

Data Privacy Risks in Child-Targeted Android Apps - Incogni Research

With many children’s apps lacking transparency in the data-safety and privacy practices, these apps may also be engaging in invasive practices, potentially exposing children to exploitative advertising and even criminal activity.

Incogni conducted worldwide research and analyzed the 10 most popular child-targeted apps from 59 countries. Their findings revealed that half of these apps extensively collect children’s data.

The troubling fact is that many apps don’t follow the best data privacy guidelines.  Due to the fact that kids spend so much of their free time on mobile devices, keeping them and their personal information safe becomes a challenge.

Insufficient parental supervision can facilitate the exposure of children’s data, not only for marketing purposes but also for malicious and criminal activity targeting children.

Press Release

Incogni, a leading personal information removal service, has conducted an analysis of child-targeted Android apps, shedding light on concerning data privacy practices prevalent in children’s apps globally.

The data was gathered and analyzed for the 10 most popular child-targeted apps from 59 countries, which yielded a total of 74 unique apps—primarily games.

The investigation focused on the data safety sections of these apps on the Google Play Store.

Data Collection Findings

Out of these 74 popular children’s apps, Incogni identified 34 that were collecting user data, and 21 that were sharing data.

The 34 data-collecting apps gather data from an average of 5.7 data points and share from an average of 2.8 data categories. Notably, 11 apps were recognized as particularly data-hungry, collecting 7 or more data points, with five collecting 10 or more, mainly their users’ approximate location (4), email addresses (8), photos (2), and purchase histories (8).

  • These 11 apps accounted for 55% of all data points collected by the investigated apps, including analytics, app functionality, fraud prevention, and advertising/marketing.

Almost all data-collecting apps claimed to encrypt data and remain committed to the Google Play Families Policy. However, only 62% of data-collecting apps allowed users to request the deletion of their data.

In a global breakdown, apps popular in Oceania exhibited the highest average of 5.3 data points per use, with those in New Zealand coming in at the top. Apps in Europe averaged 5 data points, with the most data being collected in Finland (6.7 collected data points), followed by Ireland (6.2), Portugal (6.0), Poland (6.0) and Spain (5.6). In Germany most popular apps collect 5.1 data points, in the UK 4.6 and in France only 3.1.

  • Among the most popular children’s apps in Europe are: Avatar World: City Life, Toca Life World: Build a Story, Kahoot: Play and Create Quizzes and Bluey: Let’s Play.

North America ranked as the third most data-hungry region, with popular apps collecting an average of 4.1 data points and sharing 0.2. Apps popular with Americans collected 4.9 data points, almost double Mexico’s 2.6.

The complexity of privacy settings, legal and regulatory gaps, and weak enforcement, contribute to the persistence of exploitative practices. The issue is intensified further by the lack of parental education.

Incogni emphasizes the need for enhanced transparency and user control, urging app developers to prioritize the privacy and security of their youngest users.


Addressing this problem requires collaborative efforts from parents, regulators, and tech companies to establish and enforce clear and strong standards that prioritize children’s online safety and privacy, including parental education, industry self-regulation, and legal frameworks.

Darius Belejevas, Head of Incogni, outlines.


Incogni’s study, based on the rankings provided by Appmagic.rocks2 in the kids’ category, covered apps popular in 59 countries. The information on each of the 74 identified apps was then collected from the data safety sections of the Google Play Store pages and further aggregated on a country and regional level for analysis. Data collection from the Google Play Store took place on November 28, 2023.

Research Data

  • ​​The full text of the study and images are available here: study
  • The data used in this research is available here: public dataset

How to Ensure Data Security Online for Your Child in 2024

Share This Article

The Password Predicament: A Modern Child’s Guidebook

The Password Predicament: A Modern Child's Guidebook

In an epoch where classrooms are as likely to be found in the cloud as they are in bricks and mortar, the young ones are navigating digital realms more than ever before. But with great tech comes great responsibility, especially when it comes to online security.

Why press the issue?

Well, it’s like leaving your front door ajar if your passwords are as easy as ‘1234’. Kids’ online adventures must be anchored in strong password practices to keep the cyber baddies at bay. It’s not just about the here and now, but about equipping them with the savvy to protect their digital lives into adulthood.

Why Parents Should Lend a Hand

When it comes to tech, there’s a bit of a gap, isn’t there? Kids tend to run circles around their parents. But with online security, it’s not just about know-how, it’s about know-why. Parents getting involved can help little ones understand the gravity of cybersecurity. It’s like teaching them to tie their shoelaces: They’ll trip up a few times, but you’re there to make sure they don’t fall flat on their face.

With online hazards more prevalent than ever, it’s vital for parents to lay down the foundations of what makes a strong password, much like explaining the birds and the bees of the internet world. After all, it takes a family to raise a digitally savvy kid.

The Joy of Independence: Kids Taking the Wheel

Yet there’s something to be said for letting kids have a crack at it on their own terms. After being shown the ropes, giving wee ones the freedom to create their own passwords is a cracking way to make them feel more involved and responsible. It’s empowering, a bit like that first ride on a bike without stabilizers.

Sure, they might wobble a bit, create a password that’s a touch on the weak side, but it’s all part of the learning curve. Establishing a sense of ownership over their digital safety can lead to a lifetime of savvy surfing. The trick is to keep an eye out so they don’t veer off the path.

The Art of the Strong Password: A Tutorial for Tots

Cracking the code to creating strong passwords can be as fun as it is educational. It starts with turning it into a game — think ‘Password Bingo’ where they mix and match symbols and letters, or ‘Secret Agent Codes’ where every password is a mission. The gist of it? A strong password for educational online activities (as well as non-educational) is a mix-up of upper and lowercase letters, numbers, and symbols that looks like alphabet soup to anyone who tries to snoop. Teaching kids the value of this seemingly jumbled mess helps them understand that, just like a bike lock, the trickier it is, the tougher it is for someone to nick their details.

The Why’s and Wherefore’s of Password Power

The Why's and Wherefore's of Password Power

So, why make a meal out of memorizing complex passwords? For starters, it’s about as crucial as learning to look both ways before crossing the street. Each strong password is a child’s personal guard dog for their information treasure trove. By ingraining these habits early, youngsters learn that their actions have consequences, bracing them for the day when they’re responsible for critical information like bank accounts. Plus, it’s about dodging the digital pickpockets that lurk in the shadows of the internet, waiting to pinch anything from game points to important personal data.

Future-Proofing the Fledgelings: The Long Game

It may seem like a bit of a faff now, but down the line, knowing how to create a beefy password will pay dividends. Today’s Minecraft mastermind could be tomorrow’s tech titan, and a strong grasp on digital security is a sterling start.

As these youngsters grow into their digital boots, they’ll come to appreciate the value of security know-how. Whether it’s safeguarding a social media empire or ensuring their latest start-up isn’t hacked, strong password etiquette is something they’ll thank their stars (and perhaps their clever parents or teachers) for, somewhere down the track.

Instilling the know-how of crafting a solid password is just as crucial as teaching the ABCs in this digital age. While it may not come with a gold star or a house point, the peace of mind from knowing their personal data is sealed up tighter than a drum is priceless. And let’s face it, in today’s online-centric world, that’s a lesson worth its weight in gold (or bitcoins, for that matter).

Share This Article

Why Keeping Games Consoles Secure Should be a Priority

Why Keeping Games Consoles Secure Should be a Priority

The rise in video games cannot be understated. What was once a public novelty has now evolved into a quintessential part of most homes, with children and teenagers firmly accustomed to the idea of playing video games.  Unlike age ratings like for films and content, there is no official or recommended age for using games consoles

With online gaming becoming vastly popular, it’s never been more important for parents to decide if their child can safely use one.  This guide is here to explain why ensuring your child’s gaming system should always be secure, and why overlooking that aspect could present some serious concerns.

Gaming and Consoles are Mainstays of 2024

Recent surveys show that most children aged 7 to 18 (68%) own a games console, with a further 9% having access to one, which is quite telling of the situation many parents and educators find themselves in. At least 53% of US households report owning at least one gaming console, with 26% claiming a ‘next-generation’ model. Not only are video games and consoles firmly ingrained in how kids interact with each other and form social connections, but they also shape their experiences.

As our culture has grown increasingly digitally connected in recent years, it’s no surprise that video gaming consoles have become ‘must-haves’ for today’s youth. With many kids in elementary school playing video games semi-regularly, it’s become a solid necessity to not feel isolated from their peers.

Multiplayer capabilities and a host of new releases making the rounds each year also make consoles highly coveted. Not only that, but the advancements in tech also make gaming more enticing, with keen gamers seeking new consoles and exclusive games to immerse themselves in. Therefore, it’s fair to say that consoles and gaming are here to stay, so parents and caretakers must ensure safe usage, rather than restrict access.

Security Concerns of Video Gaming

Amid all the discourse surrounding video games and their influence on children’s behavior, it cannot be denied that they can, if moderated and monitored appropriately, can have educational and social benefits. However, one thing that remains constant is the level of risk that lies with such proficient online gaming. Consoles introduce risks, ranging from interconnectivity with strangers in online, often ‘lawless’ chatrooms and forums, to a plethora of other cyber security risks and privacy breaches.

Providers and network administrators have their part to play in ensuring the robustness of their infrastructure. They can use mechanisms like vulnerability patching and penetration testing for weaknesses, although each user has to exercise vigilance. Console developers, meanwhile, are often tasked with rigorously securing networks and infrastructure, yet bad actors can still slip through the cracks. Sony recently suffered a series of hacks and security breaches which compromised user data, thus emphasizing the need for bolstering defenses.

Risks and Threats Associated with Gaming Devices

Games consoles introduce a range of potential cyber risks which can be concerning for parents. These include but are not limited to the following:

Personal data collection – Like all internet-connected devices, consoles and games can collect and transmit large amounts of user data. From usernames and passwords to usage data and communications, this information needs safeguarding with precision to prevent it from being used fraudulently or maliciously.

Device takeovers – Unwarranted hacks can give attackers full control over the console and any other connected devices. Remote hackers can compromise a device and expose users to unauthorized or inappropriate content.

Account takeovers – Attackers with stolen login credentials can access user accounts, steal personal information, make fraudulent purchases with saved payment cards, exploit associated email accounts, and much more.

Communication platforms – Instant messaging, and voice chat features can expose vulnerable children to bullying and harassment. If not supervised, kids can become victims of exploitative cyberbullying and social engineering attacks.

Malware risks – Viruses, spyware, and other malware can ‘brick’ games and consoles or render them inaccessible. These can often materialize innocuously without arousing suspicion from users.

Network risks – Gaming on public Wi-Fi networks – or those with poor, weak network security – leaves consoles vulnerable to eavesdropping and MitM (man-in-the-middle) cyber attacks.

This year alone we have seen the aforementioned attacks on the PlayStation Network, as well as a large-scale data leak on the Xbox servers. As these are two of the industry’s most recognizable brands, it only proves that as consoles grow in popularity, they can become more appealing targets for cybercriminals. Therefore, personal safety and security is essential.

Securing Gaming Devices and Accounts

While there are undoubtedly risks when using gaming consoles, they are, fundamentally, no different than those that exist when using the Internet. This type of technology is increasingly available and beneficial, so the steps that parents can take to minimize threats bear many similarities to moderating children’s Internet usage and access.

As a baseline level, consider implementing these controls to keep your kids safer when using online game consoles.

Use Strong Passwords and MFA

Establishing strong, unique passwords – using undecipherable, random strings of letters, numbers, symbols and capitalizations – will make initial barriers harder to break. Avoid using birthdays, pet names, or other easy-to-guess information in passwords.

Keep this data safe and bolster it by allowing multi-factor authentication (MFA) to validate login attempts. It might seem overly protective, but this will prevent usernames and passwords from being compromised.

Limit Personal Info

When setting up accounts, make sure that only essential information is provided. Consider leaving phone numbers, locations, school names, and other identifiable information fields blank, and restricting the access that third-party applications have to this data. Consider also masking real names on user profiles to avoid being targeted or identified.

Monitor Friends and Chats

If your child interacts with friends online, there’s a good chance that, over time, they may encounter mutual friends and broaden their friendship circle online. However, listen carefully to what they say. Take a fervent interest in what they talk about and the interactions they mention in conversation.

If they seem ‘off’ or dissociate, it could indicate that they are interacting with someone anonymous who is worrying or stressing them. Cyberbullies and predators lurk in gaming comms channels, so pay close attention. If necessary, step in and enable parental controls and enhance privacy settings.

Patch Networks and Consoles

Ensure your home Wi-Fi uses modern WPA2 or WPA3 encryption protocols and a long, complicated pre-shared key (password). If relevant, consider installing a separate VPN to offer more robust, controlled connections.

Keep firmware updated on the console itself as well as routers and other network devices, applying all new security patches and revisions when prompted.

Disable remote administration capabilities and UPnP on routers, and, where possible, connect consoles to routers using ethernet cables. This stabilizes the connection between the console and the Internet.

Beware of Social Engineering

Kids may instinctively try to keep their gaming activities secret from parents, particularly if they find it to be an immersive escape from daily life. However, it’s important to bridge that gap where possible and educate them – not forcefully but, rather, openly – on attempts to manipulate them.

Teach them ways to identify attempts to steal login credentials or sensitive data, and emphasize that divulging this could pose a security risk. Phishing emails, notifications, and links can be dangerous, so they should take time to assess their legitimacy before clicking them.

It will help exponentially if your child feels comfortable maintaining autonomy when using their console but flagging up any suspicions to you with confidence, at which point you can intervene without reprimanding them.

While no gaming console security is foolproof, combining the security steps outlined above will significantly reduce the attack surface. Parents must manage and monitor console usage carefully but not to the point where it becomes disruptive or invasive to their child’s enjoyment. Stay alert for new threats and make cyber safety an ongoing conversation with your young gamer(s), as they should feel empowered to enjoy the gaming experience without becoming desensitized to it because of security concerns.

If your kids want to find their own solutions to any challenging parts of the games they are playing, you can support them to navigate the web safely by using Safe Search Kids. Using Safe Search Kids means that you don’t have to worry about your kids stumbling upon content that isn’t appropriate for them.

Share This Article

Limits in Differential Calculus: Linking to Derivatives

Limits in Differential Calculus: Linking to Derivatives

In differential calculus, limits are like the building blocks of change that play an important role. It serves as a key to derivatives which is used to determine the rate of change in a function. Suppose you want to set a journey by using the car. The speed of a car is important to track down. Limits help us zoom in on the exact moment the car’s speed is changing.

This change of speed sets the stage for derivatives to step in and provide a precise description of that change.  As we explore limits on mathematics, we begin to understand that both limits and derivatives are duo concepts. These concepts help us to understand what happens to a function as we move close to a specific point.

On the other hand, derivatives help us understand the slope or rate of change at the exact point. Let’s move a little bit further to making calculus to understand all sorts of situations.

Introduction to Limits in Calculus:

In Calculus, limits are defined as:

“The indication of the values in which a function is approached as its given inputs at a specific point without reaching that point”

This concept helps you to understand all types of functions to show whether the points are near or far. It is a simple concept that the boundary of anything is their limit and in calculus, this limit tells how a function behaves near a point. The advanced limits calculator helps to determine the limits for the given functions and shows all steps. But if you come for manual calculations the below formula is used:

Lim x→a F(x) = L

  • The decreasing limits show that the negative function values
  • A positive limit tells that the function increases without any type of limit
  • In the equal limit, there are positive and negative both at the time

Why Limits Matter in Calculus

In calculus, we often encounter situations where we need to analyze the behavior of a function at a specific point or as it approaches infinity. Limits matter due to the fundamental concept of a better understanding of how functions behave. At the core of limit indications, it approaches the inputs as arbitrarily close to a certain value. This concept is understood as crucial for defining the main pillars of calculus like derivatives and integrals.

To lessen the difficulty for students, it allows the analysis more precisely, and now it has been used by worldwide students. Their values approach the x value to the numeric x. They help us grasp the continuity and smoothness of functions, enabling a deeper understanding of their properties.

Utilize Limit Calculator For Iterative Limits Approximation:

With the use of a limit calculator, we will be able to determine all types of limit problems and for manual calculations follow the below table.

Rule’s Expression
Sum/Difference Rule limx→b[f(x) ± h(x)] = limx→b[f(x)] ± limx→b[h(x)]
Constant Rule limx→b[k] = k
Product Rule limx→b[f(x) * h(x)] = limx→b[f(x)] * limx→b[h(x)]
Quotient Rule limx→b[f(x) / h(x)] = limx→b[f(x)] / limx→b[h(x)]
L’Hopital’s Rule limx→b[f(x) / h(x)] = limx→b[f'(x) /h(x)]
Power Rule limx→b[f(x)^n] = [limx→b[f(x)]]^n

How To Use The Limit Calculator

Input Data:

  • There are options like an equation or for a function, choose this one.
  • Set the variable that can be x, y, z, a, b, c, or n
  • Select the direction of the limit whether it is positive or negative
  • You can use the simple expression from the designated field, so place the number at which you want to calculate the limit.

Output Data:

  • Limits of a given function
  • Shows the Taylor’s series expansion for the given function
  • Complete stepwise calculations

Conclusion:

At the end of this discussion, we have concluded that these methods have significant algorithms by which the iterative power to the limits has the roots of the functions with their increasing values. While limit calculation can be difficult for many students, a limit calculator can help to show the steps utilized to better understand the process for any calculation.

Share This Article