My Instagram Account Has Been Hacked – How To Regain Control
We here at the White Hatter have seen a significant increase in calls and messages from followers who are looking for assistance because they have lost control of their Instagram account and someone else is now using it, often an organized crime group, to send messages to friends asking for things like money. One of the […]
Product Review – The “Brick”: A Device To Turn A Fully Functioning iPhone Into A Hybrid Minimalist Phone
CAVEAT: It is important to note, aside from being sent the Brick device for testing and evaluation, we have not been paid for this review nor received any gratuity or other compensation from Brick. While the Brick was primarily designed for adults, we believe it can also serve as an effective parenting tool for youth, […]
How to Permanently Blur Your Home on Google & Apple Maps: A Step-by-Step Guide
IMPORTANT CAVEAT: Once you have completed this process, Google has stated that you will not be able to unblur! Recently, we helped a client who had significant privacy and security concerns after leaving an abusive relationship and wanted to know how they could blur their new home on Google and Apple Maps. Google and Apple Maps, […]
A Parent’s Guide To Pop-Ups – Understanding and Managing Them On Safari & Google Chrome
One challenges that families face when they and their kids are online – dealing with pop-up advertisements and notifications. Pop-ups can be not only annoying but also potentially harmful if they lead to malicious websites or unwanted content such as pornography, hate, or online violence. As a parents and caregivers, it’s essential to understand what […]
Ensuring App Safety for Teens: A Guide for Parents and Caregivers
In today’s onlife world, teenagers are increasingly reliant on apps for socializing, learning, and entertainment. As parents and caregivers, it is crucial to be vigilant about the safety of the apps that our teens use – not all apps are built the same! With a multitude of apps available, at the time of writing this […]
Duty to Report CSAM by Law – Online Services in Canada
Are internet providers and social networks doing enough to stop illegal images online? Not always! But in Canada, they have a legal obligation to act and by not doing so, it can result in significant fines. In 2011 the government of Canada introduced a legal act that requires internet providers to report and take action […]
Is Your Partner Using Google Maps To Track Your Location and What You Can Do To Stop It!
CAVEAT: This article was spawned given that we have now assisted several teens who found themselves in abusive relationships where Snapchat was wielded as a weaponized tool by their partner to monitor their movements, a specific example – the “SnapMaps” feature in Snapchat. Activating the “only these friends” setting in SnapMaps, with the abuser’s name exclusively associated, grants […]
How To Turn A Hand-Me-Down Old iPhone Into A “Safer” Minimalist Phone For Youth:
CAVEAT: This “How To” guide is specific to the iPhone. Unfortunately, we have not been able to find a parent friendly way to modify a fully functioning Android fusion device into a minimalist device. If any of our readers know of such a parent friendly process, please send us a link for review and we would […]
The New Use Of Artificial Intelligence (AI) To Commit Crime
The emergence of Artificial Intelligence (AI) has transformed our daily lives, enhancing efficiency and can streamline numerous tasks. AI has also disrupted traditional educational teaching methods (1). Nonetheless, as with any technological innovation, AI can be weaponized for criminal purposes, and its use in senior fraud scams (2)and kidnapping scams (3) is an alarming trend that we all need […]
Digital Inoculation: A Guide to Taking Back Control After Leaving an Abusive Relationship – Steps to Protect Yourself from Tech-Facilitated Abuse
This guide is all about empowering someone who is leaving an abusive relationship and providing them with information on how to take digital control back from the abuser, who could be using technology as a weapon of retribution and control.