Connect with us

Technology

5 phone safety tips every parent should know

Published

on

5 phone safety tips every parent should know

NEWYou can now listen to Fox News articles!

Kids today are growing up in a world where screens, apps and social platforms are part of everyday life. From homework to gaming to group chats, their digital lives can move faster than parents can keep up. But behind every app and device are settings and systems that can impact their privacy, safety, and focus.

Whether you’re trying to set healthy limits, track screen time or just understand what your child’s phone can do, knowing a few key tech terms can make parenting in the digital age a lot less stressful. Here’s a quick guide to help you stay informed, confident and in control.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter 

Setting healthy screen time limits helps kids learn balance and keeps tech use from taking over family time. (Kurt “CyberGuy” Knutsson)

Advertisement

1) Screen time limits

The boundary that helps restore balance

Screen time limits let you manage how long your child spends on apps, games or devices each day. It’s not about punishment, it’s about setting healthy boundaries that help kids disconnect and recharge.

Why it matters: Too much screen time has been linked to reduced focus, sleep disruption and overstimulation. Setting limits helps your child create a better balance between online fun and real-world rest.

How to set screen time limits

On iPhone:

  • Go to Settings
  • Tap Screen Time
  • Click App Limits
  • Select Add Limit, choose categories or specific apps and set daily time limit

On Android:

Settings may vary depending on your Android phone’s manufacturer

Advertisement
  • Go to Settings
  • Tap Digital Wellbeing & Parental Controls. If you don’t see it right away, try searching “Digital Wellbeing” in the Settings search bar
  • Open the Dashboard or App Timers section. On some phones (like Samsung), it may appear as “App Timers”. On others (like Google Pixel), tap Dashboard to view your app usage list
  • Tap the hourglass icon next to the app you want to limit
  • Set a daily time limit, then tap OK or Done
  • The timer resets every night at midnight

Pro tip: Make it a family routine. Review screen time reports together so kids feel involved in the process rather than restricted. 

TEENS HACK SCHOOL CELL PHONE BANS WITH CREATIVE WORKAROUNDS

2) Parental controls

Your built-in safety net

Parental controls are tools that let you manage what your child can see and do on their devices – from blocking explicit content to approving downloads and monitoring usage. Every major device, app and streaming service has its own version.

Why it matters: Parental controls can help prevent exposure to inappropriate content, manage purchases and set up age-appropriate experiences.

Built-in parental controls make it easier to guide what kids can see and do on their devices. (Kurt “CyberGuy” Knutsson)

Advertisement

How to turn parental controls on

On iPhone:

  • Go to Settings
  • Click Screen Time 
  • Tap Content & Privacy Restrictions
  • Turn it on so the toggle turns green.
  • Within Content & Privacy Restrictions you can go to sections like Allowed AppsiTunes & App Store Purchases, etc, to set filters and restrict what apps the device can do.

On Android:

Settings may vary depending on your Android phone‘s manufacturer

  • Go to Settings
  • Tap Digital Wellbeing & Parental Controls
  • Select Parental Controls, then follow the steps to set up a supervised account through Google Family Link, which lets you manage screen time on a child’s device remotely

Pro tip: Most streaming apps, like YouTube, Netflix and Disney+, also have parental settings, so make sure you adjust those separately.

3) Geolocation

The invisible map in your child’s pocket

5 SOCIAL MEDIA SAFETY TIPS TO PROTECT YOUR PRIVACY ONLINE

Geolocation allows apps and devices to track physical location in real time. It powers navigation and “Find My” features but can also share more than you intend if left unchecked.

Advertisement

Why it matters: While location sharing helps families stay connected, it can pose privacy and safety concerns if apps broadcast your child’s whereabouts.

How to manage location access

On iPhone:

  • Go to Settings
  • Click Privacy & Security
  • Then, click Location Services
  • Tap each app and change “Always” to “While Using the App” or “Never”

On Android:

Settings may vary depending on your Android phone’s manufacturer

  • Go to Settings
  • Tap Location (or “Location & security” or “Privacy → Location” depending on device)
  • Tap App location permissions (or “Permission manager → Location”)
  • Select an app from the list
  • Change the app permission from, “Allow all the time” to “Allow only while using the app” or “Don’t Allow”

Pro tip: For younger kids, use “Share My Location” within Family Sharing (iPhone) or Google Family Link (Android) instead of third-party tracking apps to ensure safer monitoring.

4) Private browsing

The mode that hides – but doesn’t erase

Private browsing, also called Incognito Mode, lets users browse the internet without saving history, cookies or logins. While it may sound harmless, it can make it harder for parents to see what kids are accessing online.

Advertisement

Why it matters: Private browsing prevents history tracking on the device, but your internet provider, school or router may still record activity. It’s a reminder that no browsing mode is completely private.

TEENS FACE NEW PG-13 LIMITS ON INSTAGRAM

How to disable private browsing

On iPhone (Safari):

  • Open Settings
  • Tap Screen Time
  • Tap Content & Privacy Restrictions
  • If prompted, enter or set a Screen Time passcode
  • Turn on Content & Privacy Restrictions (toggle to green)
  • Tap App Store, Media & Purchases (or similarly named) and optionally set limits
  • Click Web Content 
  • Choose one of the options such as, Limit Adult Websites (this will disable Private Browsing in Safari) or Only Approved Websites 

On Android (Chrome):

Settings may vary depending on your Android phone’s manufacturer

  • Open the Family Link app on your Android phone (or download it if it isn’t installed)
  • Select your child’s profile
  • Tap Controls
  • Click Google Chrome & Web
  • Choose Try to block explicit sites (or select “Only allow approved sites” for stricter filtering)
  • This setting automatically disables Incognito Mode in Chrome for your child’s supervised account
  • (Optional) You can also review SafeSearch and YouTube restrictions under the same section for extra protection

Conversations about online safety matter more than rules alone because openness builds digital trust. (iStock)

SCHOOLS’ SAFETY TOOLS ARE SPYING ON KIDS — EVEN AT HOME

Advertisement

Pro tip: Talk to your child about why transparency matters. Turning off private browsing is most effective when paired with open, ongoing conversations about online safety.

5) Digital footprint

The trail your child leaves behind

Every post, comment or photo shared online becomes part of your child’s digital footprint, a permanent record of their online presence. Even deleted posts can live on through screenshots, data archives or algorithms.

Why it matters: Colleges, employers and even peers can access public digital traces. Teaching kids to think before posting helps them build a positive and professional online reputation.

How to check what’s out there

  • Search your child’s name on Google and image results
  • Review old accounts or unused apps that may still contain personal info
  • Help them make their social media profiles private and share selectively

Pro tip: You can also set up Google Alerts for your child’s name to get notified whenever new content appears online, a simple, free way to stay aware of their digital footprint as it evolves. 

Also, you may want to consider using a data removal service to help clean up your child’s personal information that may appear on people-search sites or data-broker platforms. These tools scan the web for outdated profiles, cached pages and databases containing sensitive details like addresses, phone numbers and photos. They can automatically submit takedown requests and continue monitoring for new exposures over time.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com

Take my quiz: How safe is your online security?

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com

Advertisement

Kurt’s key takeaways

Parenting in the digital age doesn’t mean knowing every app or trend. It means understanding the fundamentals that shape your child’s online experience. From screen time limits to digital footprints, these five terms give you the language to set boundaries, foster trust and keep your family safer online.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Want more help building healthy digital habits at home? Let us know by writing to us at Cyberguy.com

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts, and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter

Copyright 2025 CyberGuy.com. All rights reserved.  

Advertisement

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

X claims it has stopped Grok from undressing people, but of course it hasn’t

Published

on

X claims it has stopped Grok from undressing people, but of course it hasn’t

Updates to [@]Grok Account

We have implemented technological measures to prevent the Grok account from allowing the editing of images of real people in revealing clothing such as bikinis. This restriction applies to all users, including paid subscribers.

Additionally, image creation and the ability to edit images via the Grok account on the X platform are now only available to paid subscribers. This adds an extra layer of protection by helping to ensure that individuals who attempt to abuse the Grok account to violate the law or our policies can be held accountable.

Geoblock update

We now geoblock the ability of all users to generate images of real people in bikinis, underwear, and similar attire via the Grok account and in Grok in X in those jurisdictions where it’s illegal.

Advertisement
Continue Reading

Technology

Malicious Mac extensions steal crypto wallets and passwords

Published

on

Malicious Mac extensions steal crypto wallets and passwords

NEWYou can now listen to Fox News articles!

Mac users often assume they’re safer than everyone else, especially when they stick to official app stores and trusted tools.

That sense of security is exactly what attackers like to exploit. Security researchers have now uncovered a fresh wave of malicious Mac extensions that don’t just spy on you, but can also steal cryptocurrency wallet data, passwords and even Keychain credentials. What makes this campaign especially concerning is where the malware was found, inside legitimate extension marketplaces that many people trust by default.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Once active, GlassWorm targets passwords, crypto wallets, and even your macOS Keychain without obvious warning signs. (Cyberguy.com)

Advertisement

How malicious Mac extensions slipped into trusted stores

Security researchers at Koi Security uncovered a new wave of the GlassWorm malware hiding inside extensions for code editors like Visual Studio Code (via Bleeping Computer). If you’re not familiar with code editors, they’re tools developers use to write and edit code, similar to how you might use Google Docs or Microsoft Word to edit text. These malicious extensions appeared on both the Microsoft Visual Studio Marketplace and OpenVSX, platforms widely used by developers and power users.

FAKE AI CHAT RESULTS ARE SPREADING DANGEROUS MAC MALWARE

At first glance, the extensions looked harmless. They promised popular features like code formatting, themes or productivity tools. Once installed, though, they quietly ran malicious code in the background. Earlier versions of GlassWorm relied on hidden text tricks to stay invisible. The latest wave goes further by encrypting its malicious code and delaying execution, making it harder for automated security checks to catch.

Even though this campaign is described as targeting developers, you don’t need to write code to be at risk. If you use a Mac, install extensions or store passwords or cryptocurrency on your system, this threat still applies to you.

What GlassWorm does once it’s on your Mac

Once active, GlassWorm goes after some of the most sensitive data on your device. It attempts to steal login credentials tied to platforms like GitHub and npm, but it doesn’t stop there. The malware also targets browser-based cryptocurrency wallets and now tries to access your macOS Keychain, where many saved passwords are stored.

Advertisement

Researchers also found that GlassWorm checks whether hardware wallet apps like Ledger Live or Trezor Suite are installed. If they are, the malware attempts to replace them with a compromised version designed to steal crypto. That part of the attack isn’t fully working yet, but the functionality is already in place.

To maintain access, the malware sets itself up to run automatically after a reboot. It can also allow remote access to your system and route internet traffic through your Mac without you realizing it, turning your device into a quiet relay for someone else.

Some of the malicious extensions showed tens of thousands of downloads. Those numbers can be manipulated, but they still create a false sense of trust that makes people more likely to install them.

7 steps you can take to stay safe from malicious Mac extensions

Malicious extensions don’t look dangerous. That’s what makes them effective. These steps can help you reduce the risk, even when threats slip into trusted marketplaces.

1) Only install extensions you actually need

Every extension you install increases risk. If you’re not actively using one, remove it. Be especially cautious of extensions that promise big productivity gains, premium features for free or imitate popular tools with slightly altered names.

Advertisement

2) Verify the publisher before installing anything

Check who made the extension. Established developers usually have a clear website, documentation and update history. New publishers, vague descriptions or cloned names should raise red flags.

These malicious extensions looked like helpful tools but quietly ran hidden code once installed. (Cyberguy.com)

3) Use a password manager

A password manager keeps your logins encrypted and stored safely outside your browser or editor. It also ensures every account has a unique password, so if one set of credentials is stolen, attackers can’t reuse it elsewhere.

Next, see if your email has been exposed in past breaches. Our No. 1 password manager pick includes a built-in breach scanner that checks whether your email address or passwords have appeared in known leaks. If you discover a match, immediately change any reused passwords and secure those accounts with new, unique credentials.

Check out the best expert-reviewed password managers of 2026 at Cyberguy.com.

Advertisement

HOW HACKERS ARE BREAKING INTO APPLE DEVICES THROUGH AIRPLAY

4) Run strong antivirus software on your Mac

Modern macOS malware doesn’t always drop obvious files. Antivirus tools today focus on behavior, looking for suspicious background activity, encrypted payloads and persistence mechanisms used by malicious extensions. This adds a critical safety net when something slips through official marketplaces.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe.

Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at Cyberguy.com.

5) Consider a personal data removal service

When your data leaks, it often spreads across data broker sites and breaches databases. Personal data removal services help reduce how much of your information is publicly available, making it harder for attackers to target you with follow-up scams or account takeovers.

Advertisement

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

6) Turn on two-factor authentication (2FA)

Enable 2FA wherever possible, especially for email, cloud services, developer platforms and crypto-related accounts. Even if a password is stolen, 2FA can stop attackers from logging in.

7) Keep macOS and your apps fully updated

Security updates close gaps that malware relies on. Turn on automatic updates so you’re protected even if you miss the headlines or forget to check manually.

Advertisement

Mac users often trust official app stores, but that trust is exactly what attackers are counting on. (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaway

GlassWorm shows that malware doesn’t always come from shady downloads or obvious scams. Sometimes it hides inside tools you already trust. Even official extension stores can host malicious software long enough to cause real harm. If you use a Mac and rely on extensions, a quick review of what’s installed could save you from losing passwords, crypto or access to important accounts.

When was the last time you checked the extensions running on your Mac? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report 
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved. 

Continue Reading

Technology

BMW says electric M3 will be a ‘new level’ of performance

Published

on

BMW says electric M3 will be a ‘new level’ of performance

BMW teased its forthcoming all-electric M-series performance sedan today, promising that the quad-motor M3 sports car would feature specs that are truly next level when it arrives in 2027.

The M3 will have four electric motors and simulated gear shifting, a feature that is quickly becoming a must-have for electrified sports cars. BMW says the setup unlocks the benefits of both rear and all-wheel drive, with the ability to decouple the front axle.

The electric M3 will also be built on BMW’s Neue Klasse platform that promises more efficient batteries, lightning fast charging, and higher powered computers. The architecture will be 800-volt, the regenerative braking will be highly efficient, and if the camouflaged pictures are any indication, it will be a real looker on the streets.

Speaking of computers, the M3 will have four of them, unified under its oddly named “Heart of Joy” component that aggregates all the traction, stability, and electric motor management functions of the vehicle. That means when software updates are made available, the vehicle’s brain will be able to receive them over-the-air faster than BMW’s current processors.

The M3’s simulated gear shifting will feature a “newly developed soundscape” that “channels pure emotion.” Like other automakers, BMW is loath to alienate its loyal M-series customers by giving them all the torque but none of the gearing feedback. And now a fake “soundscape” will accompany all that shifting. Porsche, Hyundai, and Dodge are also on board the fake EV gear shifting bandwagon.

Advertisement
Continue Reading
Advertisement

Trending