Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 26 February 2011

95% of parents found children accessing internet pornography

Posted on 08:52 by Unknown

Survey reveals that while most respondents use parental controls, teenagers often succeed in uninstalling or unlocking this software

BitDefender®, an award winning provider of innovative internet security solutions, has today announced the results of a new study that shows 95% of parents have noticed that their children had accessed internet pornography, especially during homework time. According to the study, the average age of a child starting to look for adult content sites is just over 11 years old.

The BitDefender study is based on interviews with 1,570 parents from five different countries, focusing on their children’s internet usage habits and their own habits, especially those related to sexually explicit materials. The study also found that while 97% of respondents used parental control software to block access to adult websites, 12% of the teenage sons or daughters succeeded in uninstalling or unlocking this software.

“One of the most interesting findings from this study is related to parental control. Even if the parents understood the necessity of such a piece of software and the need to monitor their teenagers’ activity on social networks and on the internet in general, children will always find a way to access adult content,” said Sabina Datcu, BitDefender E-Threats Analysis and Communication Specialist and author of the study. “BitDefender believes this sends a clear message to parents - it’s more important than ever to take steps to protect children from exposure to sexually explicit materials found on the internet.”

62% of adults admitted that they themselves had searched for and accessed adult content sites. Moreover, 87% said they would allow their children to look for sexually explicit materials if the children were 19 years old or older.

BitDefender’s Internet Security 2011 software includes parental control features to help monitor and control what websites children can visit. More details of the survey can be found on MalwareCity.com. For a full list of BitDefender 2011 features and benefits by product, please visit www.bitdefender.co.uk or follow BitDefender on Twitter for daily malware alerts.

BitDefender is the creator of one of the industry's fastest and most effective lines of internationally certified security software. Since its inception in 2001, BitDefender has continued to raise the bar and set new standards in proactive threat prevention. Every day, BitDefender protects tens of millions of home and corporate users across the globe - giving them the peace of mind of knowing that their digital experiences will be secure. BitDefender security solutions are distributed by a global network of value-added distribution and reseller partners in more than 100 countries worldwide. More information about BitDefender and its products are available at the company’s security solutions press room. Additionally, BitDefender’s www.malwarecity.com provides background and the latest updates on security threats helping users stay informed in the everyday battle against malware.

Source: Media Safari

This press release is presented without editing for your information only.

Full Disclosure Statement: The ICT REVIEW received no compensation for any component of this article.

Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ▼  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ▼  February (30)
      • Security Concerns over Cloud Storage
      • Lieberman Software warns on new hacking trend of m...
      • 95% of parents found children accessing internet p...
      • Parallels to leverage Scality RING technology in i...
      • Connectria selects Scality to launch a public clou...
      • Flash disk security is very different to magnetic ...
      • New Financial Trojan OddJob Keeps Online Banking S...
      • US worries over Internet `kill switch' highlights ...
      • CREDANT TECHNOLOGIES LAUNCHES BETA PROGRAM FOR CLO...
      • Beware the Enemy Within
      • Infosecurity Europe welcomes plans for rapid taked...
      • ISACA’s EuroCACS Examines Data Protection, Cloud C...
      • Imperva warns on the real insider security threat
      • Tufin unveils new functionality & updated PCI DSS ...
      • Trusteer Secure Web Access prevents attacks that e...
      • Venafi launches 1st universal automated management...
      • Safer Internet Day - The role of Security within S...
      • `What are the banks not telling us about card frau...
      • DES Offers Free Encryption
      • Tufin introduces next generation firewall manageme...
      • Infosecurity Europe 2011 Hall of Fame nominations ...
      • Huddersfield NHS laptop loss highlights need to pr...
      • Innovative software solutions to reduce business e...
      • Talk of Intel developing IT security game-changer ...
      • SOURCEFIRE’S IMMUNET ANTI-MALWARE SOLUTION DELIVERS
      • Lieberman Software and Q1 Labs Partner to stop ins...
      • Data governance and leaks drives Varonis growth
      • ISACA report emphasizes governance's central role ...
      • WikiLeaks DDoS arrests welcomed by Infosecurity Eu...
      • KOBIL mIDentity secures e-Banking of the BBVA (Sui...
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ►  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ►  August (30)
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile