technology technology technology technology technology

technology technology technology technology technology


A 14-year-old committed suicide after following the advice of an AI chatbot. Another family is suing the same one — Character AI — after it told an autistic 14-year-old to kill his parents. It also exposed an 11-year-old to sexual content.

These stories are heavy reminders that young people are especially vulnerable on the internet, but AI isn’t the only thing targeting them.

HOW TO (KINDLY) ASK PEOPLE NOT TO POST YOUR KIDS’ PHOTOS ON SOCIAL MEDIA

The fine folks at the FBI’s crime division say teens lost 2,500% more money to scams over a recent five-year stretch. Compare that to an 805% increase for seniors, which is still not great, but at least it’s not 2,500%.

So, why teens? Because thieves have more ways than ever to target them. Talk to anyone in your circle born between 1996 and 2010 about this. It’s a big deal.

I share smart tech news and tips you can use every single day. Join 600K readers who get The Current.

The most prevalent scams and tricks

Under the influence: Say a kiddo in your family idolizes an online influencer. That person is so easy to impersonate. All a fraudster has to do is set up a phony account that looks real, run a contest and trick “winners” into handing over their personal details (or more) to claim their (nonexistent) prizes. Done and done.

This file photo shows someone checking his smartphone

This file photo shows someone checking his smartphone in Glenview, Ill. (AP Photo/Nam Y. Huh, File)

Pro tip: Stick to “official” influencer accounts with substantial follower counts. A smaller account is almost always a scammer, not some secret one. And never give financial info or money to someone via DM.

‘Hey there, handsome’: This is a classic for a reason. Scammers grab pictures of an attractive teen or 20-something and play digital Casanovas. All too soon, they profess their love — then comes the request for money, gifts or info.

Pro tip: Try a reverse image search to see if those pics pop up elsewhere online. If the person refuses to video call or meet you in person, it’s a bad sign.

RELATED: Deepfakes are so easy to make. Talk to your kids.

‘Send me a photo’: This is the dangerous intersection of smartphones, sexting and scammers. Someone shares sexy pictures and asks for some in return. As soon as the victim sends a pic or video, everything changes.

AI EXPERT: CHATGPT PROMPTS YOU’LL WISH YOU KNEW SOONER

The person on the other end is now blackmailing them. Pay up or they’ll share the content with everyone the victim knows. Think about how horrifying that would be at any age, but especially as a teenager. I spoke to a family that lost their son to suicide after this happened to him. Such a heartbreaking story, and they’re not alone; this is way too common.

Pro tip: Talk to your kids about sending pictures to others online. Urge them to never share anything explicit, even with someone they know in person and trust. It’s just not worth it.

‘You won!’ … Not”: This one targets younger teens. A thief tricks them into revealing credit card details or downloading malware under the guise of rewards in their favorite game.

Social media applications

Social media apps are pictured on a smartphone. (Matt Cardy/Getty Images)

Pro tip: This one’s easy. Only ever buy apps or make in-app purchases through an official app store — no trades and nothing “private.”

So, what can you do?

The internet is an incredible resource for learning, creativity and fun, but let’s not sugarcoat it: there are dangers out there. Scammers and predators have become experts at manipulation, and kids can easily fall victim. The most important thing you can do as a parent? Foster open, honest communication.

When my son was younger, I shared age-appropriate stories about what he might encounter online. We talked about the risks in a way he could understand. He knew that if anything or anyone made him feel uncomfortable, he should come to me immediately, no questions asked.

DO THIS WITH YOUR FAMILY VIDEOS BEFORE IT’S TOO LATE

That’s the foundation: trust. Kids need to know that they won’t get in trouble for being fooled. Today’s online predators are sneaky, and scammers know exactly how to win a child’s trust. If your child is targeted, it’s never their fault. 

Here’s my free tech safety contract you both can sign if you’re not sure where to start the conversation around tech limits.

Action plan for parents

Remember when you had a fake driver’s license or told a little white lie to get what you wanted? Kids have ways around parental controls and are smart enough to spin the birth year wheel when signing up to get around age restrictions. 

Mom with daughter on phone

A mother and teenage daughter are seen using a smartphone. (iStock)

RELATED: Best apps and gadgets to monitor your kid (from preschool to teens)

Set clear ground rules for screen time and device use, and keep the conversation going as they grow. A few simple steps to take:

  • Have the passcode to their phone: You need access to everything at any time. Even if you don’t pop in much, they need to know you can.
  • Set limits: Use built-in app controls to monitor their time spent in the apps and tools like content filters to limit their exposure to inappropriate material.
  • “Friend” or “Follow” them: Stay connected on social media to see their circle and interactions. Without open dialogue, they’ll find ways around you.
  • Know the special settings: On Snapchat, Instagram and YouTube, you can connect to your child’s account.

The best protection is being your child’s go-to resource for help and guidance. Let your kids know you’re there, ready to listen, no matter what. That’s the real safety net.

CLICK HERE TO GET THE FOX NEWS APP

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2025, WestStar Multimedia Entertainment. All rights reserved.



Source link

Add comment

Categories

035363ed-b098-5de5-a223-f3a5d32dc035 1 0586f978-27d1-50a3-a6f9-b5622233596c 1 1262d853-829e-532c-986c-d8e8512583b5 1 15ad1585-a6fb-5d85-93bd-95945671fcd6 1 1af06e34-5799-528d-b431-9a999532d3ef 1 35c40733-e901-59ed-8365-827cc66201dc 1 3644a004-6db7-5c67-94ec-1c774c356ce9 1 37adbb61-469d-5ac9-8972-c54be5420deb 1 37cb5ed3-b6dd-5635-98c7-24201b1523e4 1 518dc926-eb88-56a8-9393-c0636e44930a 1 5271a8ac-ee78-5644-a814-b93e2702e697 1 5b1f2b8b-1924-585b-86fb-0f5083a389bb 1 68f20594-f140-50bb-8e40-33e23f460649 1 8f569b60-71cd-5d67-b6cf-b67855498d1c 1 97e06c80-2bed-5abb-90e0-49ddbc4d1f26 1 a128d530-bdba-5f6d-8d28-b0f2f20d185d 1 a328a851-ea6a-5e26-be2e-5f4f1c31658d 1 a5450a08-1023-57a6-a675-fdc194dc9d60 1 Acquisitions and Divestitures 2 ad6916f5-c01d-5410-a835-82709c5d7727 1 Advertising and Marketing 1 af83f998-47c6-5db8-afae-380980658cbd 1 Alternative and Renewable Energy 1 Altman 1 Amazon Labor Union 1 Amazon.com Inc 3 Amit P 2 Andreessen Horowitz 1 Android (Operating System) 3 Anthropic AI LLC 1 Antitrust Laws and Competition Issues 2 Apple Inc 1 article 27 Artificial Intelligence 11 Automobiles 3 b00f7177-73de-5bd5-85d0-3ba420dabf58 1 Baker 1 Banking and Financial Institutions 1 Bezos 3 Biden 1 Bitzer 1 BlackRock Inc 1 Blue Origin 1 Business 2 c4ff002e-1bb5-5430-bd7c-877e76e83142 1 Cameras 1 Carbon 1 ChatGPT 1 China 1 Chrome (Browser) 2 Chrome (Operating System) 1 College Station (Tex) 1 Columbia River (Pacific Northwest) 1 Commerce Department 1 Computer Chips 2 Computer Monitors 1 Computer Security 1 Computers and the Internet 17 Conspiracy Theories 1 Content Type: Service 1 Corporate Social Responsibility 2 Corporations 2 Creativity 1 Crime and Criminals 1 Cuba 1 Customer Relations 1 d82e36d0-86aa-5988-a24e-40cd16430e07 1 DaimlerChrysler AG 1 Data Centers 1 Data-Mining and Database Marketing 1 Databricks Inc 1 David 1 David (1962- ) 1 David O 1 Deaths (Obituaries) 1 Decisions and Verdicts 1 Deductions and Exemptions 1 DeepMind Technologies Ltd 1 Delivery Services 2 Demis 1 Democratic Party 1 df4bf239-cb8e-50c3-a1cd-fdb5b80d0463 1 Donald (1934-2024) 1 Donald J 4 Driverless and Semiautonomous Vehicles 2 Drones (Pilotless Planes) 2 Durov 1 E-Commerce 2 e4724a7e-a9f7-5ad1-abf9-7c46688b43a7 1 e5c52334-1ec2-53f3-8c24-0592c889f09e 1 e922cf52-cded-5e45-aff8-12d800bcdd57 1 Electric and Hybrid Vehicles 3 Electric Light and Power 2 Elon 3 Energy and Power 1 Energy Department 1 Environmental Protection Agency 1 European Union 1 Executives and Management (Theory) 1 Factories and Manufacturing 1 Federal Aid (US) 1 Fees and Rates) 2 Fiat Chrysler Automobiles NV 1 Fidelity Investments 1 fnc 27 Foreign Workers 1 Fox News 27 fox-news/auto 1 fox-news/auto/attributes/electric 1 fox-news/columns/artificial-intelligence-newsletter 3 fox-news/columns/how-to-tech 2 fox-news/food-drink 1 fox-news/lifestyle 4 fox-news/politics/executive/homeland-security 2 fox-news/politics/finance 1 fox-news/sports 1 fox-news/tech 27 fox-news/tech/artificial-intelligence 8 fox-news/tech/companies/apple 5 fox-news/tech/companies/google 5 fox-news/tech/companies/instagram 1 fox-news/tech/companies/samsung 1 fox-news/tech/technologies/android 1 fox-news/tech/technologies/apps 1 fox-news/tech/technologies/ipad 2 fox-news/tech/technologies/iphone 3 fox-news/tech/technologies/laptops 1 fox-news/tech/technologies/mac 1 fox-news/tech/technologies/robots 1 fox-news/tech/technologies/smartphones 5 fox-news/tech/technologies/tvs 1 fox-news/tech/technologies/wifi 2 fox-news/tech/topics/computers 3 fox-news/tech/topics/cybercrime 10 fox-news/tech/topics/hackers 3 fox-news/tech/topics/innovation 5 fox-news/tech/topics/privacy 6 fox-news/tech/topics/security 16 fox-news/topic/mexican-cartel-violence 1 fox-news/travel 2 fox-news/us 2 fox-news/us/crime 2 fox-news/us/personal-freedoms/privacy 10 fox-news/world/disasters/transportation 1 fox-news/world/global-economy/banking 1 France 1 gaming 2 General Motors 1 Germany 1 Global Warming 1 Google Inc 4 Google Street View 1 Greenhouse Gas Emissions 1 Haley 1 hardware 1 Harris 1 Hassabis 1 Honda Motor Co Ltd 1 Huang 1 Hydroelectric Power 1 Illegal Immigration 1 Immigration and Emigration 1 Inflation Reduction Act of 2022 1 Innovation 1 Instant Messaging 1 International Brotherhood of Electrical Workers 1 International Brotherhood of Teamsters 1 International Trade and World Market 2 iPhone 1 Italy 1 Japan 1 Jeffrey P 3 Jen-Hsun 1 Joseph R Jr 1 Justice Department 1 Kamala D 1 Kidnapping and Hostages 1 Labor and Jobs 4 Laura 1 Layoffs and Job Reductions 1 Loomer 1 Louisiana State University 1 Massachusetts Institute of Technology 1 Mathematics 1 Mehta 2 Mergers 2 Microsoft Corp 1 Missing Persons 1 Mobile Applications 2 Musk 3 Natural Gas 1 Nikki R 1 Nissan Motor Co 1 Nonprofit Organizations 1 North Carolina State University 1 NVIDIA Corporation 2 Oil (Petroleum) and Gasoline 1 OnStar Corp 1 OpenAI Labs 3 Organized Labor 2 Ozzie 1 Pavel Valeryevich (1984- ) 1 Phoenix (Ariz) 1 Photography 1 Politics and Government 1 Polls and Public Opinion 1 Presidential Election of 2024 2 Presidential Transition (US) 1 Prices (Fares 2 Privacy 1 Private Spaceflight 1 Proteins 1 Ramaswamy 1 Ray 1 Regulation and Deregulation of Industry 2 Research 3 Roads and Traffic 1 Rocket Science and Propulsion 1 Rumors and Misinformation 1 Sacks 1 Samuel H 1 Science and Technology 4 Search Engines 2 Sequoia Capital 1 Shutdowns (Institutional) 1 Smartphones 1 Social Media 1 Solar Energy 1 Space and Astronomy 1 Spain 1 Sports Utility Vehicles and Light Trucks 1 Start-ups 4 Staten Island (NYC) 1 Stellantis NV 1 Stocks and Bonds 3 Strikes 1 Supercomputers 1 Tablet Computers 1 Tax Credits 1 Telegram LLC 1 Tesla Motors Inc 1 The 1 Thrive Capital 1 Traffic Accidents and Safety 1 Trump 4 Uncategorized 21 United States 3 United States International Relations 1 United States Politics and Government 2 University of Illinois 1 Venture Capital 2 Virtual Currency 1 Visas 1 Vivek (1985- ) 1 Voter Fraud (Election Fraud) 1 Voting Machines 1 Warehouses 1 Wind Power 1 Wirecutter 1 X (Formerly Twitter) 1 X.ai Inc 1 your-feed-science 1

Sign Up to receive the latest Updates and News

© 2024 Listivo - Listing Directory WordPress Theme. All rights reserved.