Yik Yak – What Parents Need to Know
Parents need to be on the look out for Yik Yak on their children’s smart phones. This new social media app that launched just three months ago is spreading like […]
Pheed – What parents need to know

Pheed is best described as a hybrid of Facebook, Instagram, Twitter and YouTube — except that you can require others to pay a premium to access your personal channel. Why […]
How to block adult websites or people in iOS 7

Block adult web content in iOS7 on iPods, iPads and iPhones As you may know Apple does offer some level of parental control for iPods, iPhones and iPads through Restriction […]
Tumblr – What parents need to know
Tumblr is like a cross between a blog and Twitter: It’s a streaming scrapbook of text, photos and/or videos and audio clips. Users create and follow short blogs, or “tumblelogs,” […]
How to Set Parental Controls on Mac OS X

How to Set Parental Controls on Mac OS X It isn’t hard to look around and see the social and technological influence that Apple has had on our society. They’ve […]
Instagram – What every parent should know

I tell parents cyber safety is a moving target. The app popular with teens today is often out of vogue in just a few months. Today, Instagram is on every […]
Zero tolerance policies for bullying don’t work: Says Expert

Criminologist and cyberbullying expert Justin Pachin says zero tolerance policies often don’t work. He cites the recent case in the U.S. of a boy who bit into a Pop-Tart in […]
Vine – What every parent should know about this trending Social Media app

Vine is rapidly becoming a popular app for teens to share 6 second looped videos. 1. Vine is free, and it’s easy to sign up.Unlike paid apps where you get a […]
Tinder – What every parent should know

If you search the web, you’ll discover that Tinder is all about hooking up and still the age restriction to use the app is only 12. This dating app […]
Understanding How Online Predators Operate

There is no one single method in which online predators work. But there are several methods that can have been identified as how online predators locate their victims and get […]