Help Center
Help Center » Safety
Safety

Digital Safety: Staying Safe Online

The Internet has made our lives easier in many ways. We now shop online, keep in touch with friends, pay bills, market our businesses and keep up with current affairs in cyberspace. The Internet is also incredibly useful for finding information that would have required a trip to the local library 30 years ago. Need to check out the 12th game of the 1927 world chess championship or find the best hotel in Santa Cruz, Bolivia? Want a quick recipe for pumpkin soup or a tutorial on video editing? You can get all this and more in a matter of minutes online.

Criminals are also excited about this wealth of information, because it gives them access to personal details that can be used for unlawful activities. Staying safe online is mostly about being alert to the dangers. Here are some useful tips for increasing your Internet safety:

Don’t become a victim of identity theft

Thieves only need to collect a few pieces of information before they have enough to steal your identity. They’re after details like your full name (especially as it appears on your credit card), date and place of birth, email address, physical address (including previous residences), passport or driver’s license numbers, credit card details (expiration date, PIN, card number and security code), where you do your banking, phone number, employment history, club memberships and even your hobbies.

Identity theft is a serious issue in Australia. Criminals increasingly turn to the Internet for easy pickings. In 1 out of 5 instances, your stolen identification details are used to gain credit or apply for a loan. Around a third of Australian identity theft victims don’t even realise anything has happened until they receive an official notification or query from a government agency.1 Although people often use the terms interchangeably, there are distinct differences between identity theft and identity fraud. Identity theft occurs when a thief accesses your personal information in order to impersonate you (in person or online), mainly to open accounts in your name. They might even use your details to take control of your existing accounts.

Identity fraud is a little different: instead of stealing your identity, the thief uses your details to create a fictitious person in order to defraud merchants. Both identity theft and identity fraud are sinister crimes that affect all Australians, because merchants, credit card issuers, utility companies and other entities must factor these crimes into their pricing structure, resulting in higher costs for everyone.

Thieves only need to collect a few pieces of information before they have enough to steal your identity. They’re after details like your full name (especially as it appears on your credit card), date and place of birth, email address, physical address (including previous residences), passport or driver’s license numbers, credit card details (expiration date, PIN, card number and security code), where you do your banking, phone number, employment history, club memberships and even your hobbies.

  • It’s impossible to completely eliminate identity theft, but there are several steps you can take to reduce your risk of becoming a victim:
  • Keep your smartphone, tablet and other portable devices safe – they may have as much personal information in them as your purse or wallet.
  • Check your bank and superannuation statements regularly to check for unusual activity.
  • Unless you know and trust the sender, never open links or attachments in an email. Type a known address into your browser instead. Clicking on a link may lead you to a bogus lookalike site designed to extract personal details.
  • Cut down on the personal information you share on social media sites – these are a favourite hunting ground for identity thieves.
  • Improve your passwords, and don’t use the same password for everything.
  • Check your credit history regularly through an Australian credit reporting agency (CheckYourCredit.com.au, MyCreditFile.com.au or Tasmanian Collection Service, for instance).
  • Don’t do any online banking or make payments on public computers – use your PC at home instead.
  • Only download apps from reputable sources. Viruses are easily transmitted to your devices through dodgy downloading sites.
  • Change your browser settings to disable pop-ups. Pop-ups are commonly used by criminals to install spying or key-stroke detection programs onto your computer to access banking details, passwords and other information.
  • Install quality, up-to-date anti-virus software on your PC and devices.

If you believe you have become a victim of identity theft, notify the police immediately as well as any financial institutions or businesses that might be affected.

How secure are your passwords?

Passwords should be a random collection of letters (in both upper and lower case), numbers and symbols. Avoid choices that are easy to guess (like 123456 or the word ‘password’), and change your passwords regularly. A longer password is more secure than a short one. Don’t use the same password for everything – this makes it much too easy for criminals.

Password security is one of the most commonly ignored aspects of online safety. If someone discovers your passwords, they have immediate access to all your personal online information – including your financial details.

Ideally, you should never write passwords down. If you do, don’t store them anywhere near your computer. Don’t hide your password under your mouse pad or keyboard, on a note taped to the underside of your desk, under your landline phone or in the top drawer of your desk. Leaving your password in a ‘clever’ spot near your computer is a bit like leaving your front door house key under the mat, on top of the doorsill or wedged under a potted plant: thieves know all about these obvious hiding places.

Passwords should be a random collection of letters (in both upper and lower case), numbers and symbols. Avoid choices that are easy to guess (like 123456 or the word ‘password’), and change your passwords regularly. A longer password is more secure than a short one. Don’t use the same password for everything – this makes it much too easy for criminals.

If keeping track of all your passwords becomes too much, there are a number of password management systems (some free, some not) that can assist you.

Safety on social media

We use social media sites to keep in touch with friends, search for employment, support our favourite organisations and promote our businesses – and we do it on PCs, tablets, smartphones and a growing range of other devices.

The idea behind Internet security is to keep your personal information to yourself, while the idea behind social media is to share. This isn’t a problem, provided you’re careful about what you share. If you’re too generous with personal details, you can become a victim of identity theft, financial fraud or burglary. Providing too much personal information can even expose you to physical danger.

Protecting your PIN numbers, passwords, credit card details and banking information is priority number one. And even though it’s common to share seemingly harmless information like your birthplace or birth date on social media, this information can be used in identity theft.

Most social media sites give you a wide range of privacy settings, so take advantage of these to protect yourself. Make sensible decisions about the individuals and groups that are allowed to view your posts. On Linkedin, you can limit access to your contacts in relation to others in your network – a common practice for businesses that don’t want competitors to steal their customer base. Googling your own name is an easy way to check how much information is available about you online. Do this once a month or so – this also lets you know if someone is using your name for dubious purposes. It’s not unheard of for people to impersonate others when replying to blog posts or conducting other online interactions, so always keep track of what’s happening online in your name.

Protecting your PIN numbers, passwords, credit card details and banking information is priority number one. And even though it’s common to share seemingly harmless information like your birthplace or birth date on social media, this information can be used in identity theft.

It’s human nature to want to tell people about your upcoming overseas holiday, or even post photos from your Italian villa or the top of Machu Picchu. Resist the temptation, because burglars love it when you announce that your house is empty. Similarly, you should never let it be known that you live alone – this can give home invaders and predators all the encouragement they need. A thief that knows you’re a sole occupant need merely wait for you to go head off to work before ransacking your empty abode. And it’s not just extended holidays that put you at risk: a tweet like “Taking the whole family camping Saturday night – can’t wait!” is just as useful to burglars.

Social media is best used sparingly and with discretion. Beware: that drunken tweet or risqué photo you were so proud of 8 years ago may still be in cyberspace when a prospective employer is looking at your online history – and deciding if you’re the right person to hire. Minimising your online profile will also help reduce the sheer volume of spam that comes your way.

SuspiciousUser

Keep your kids safe online

Children are naturally trusting, and this trait can make them vulnerable online. Keeping your kids cyber-safe requires education, open communication and regular monitoring. Teach them about what you do to ensure your own safety on the Internet. Make them aware of the dangers of chatting online to strangers, the need to verify the origins of emails, and what to do if they think they’ve accidentally downloaded a virus.

Keeping children safe online doesn’t always have to be about control and restrictions. Reward them with extra online hours for doing positive things, too – like running their own security scans or changing passwords regularly.

There are a number of software programs available that filter, block or otherwise control which sites your children can access. If you prefer to prevent all unsupervised browsing, you can install programs that automatically ‘forget’ access passwords until Mum or Dad are around to allow online access. Apps can be fun for kids, but make sure you know which ones they’re using and that they’re aware of the spyware dangers of downloading apps from dubious sources.

Cyberbullying is an increasing problem for children of all ages, and can be hurtful to a child’s self-esteem. Teach your children never to post anything they wouldn’t post if their parents were standing right behind them, and educate them about the principles of online kindness, etiquette and courtesy so they can carry good habits into adulthood. If your child becomes a cyberbullying victim, there are a number of online resources available to help both you and your child learn about how to deal with this issue.

Like adults, children should avoid clicking on unknown email attachments and sharing their passwords. Long, run-together sentences are the easiest passwords for children to remember, and are more secure than shorter ones (like birthdays or pet nicknames).

One should always log out after they’re finished with a computer (at home, at school or anywhere else) so no one can access their personal information or browsing history.

Predatory individuals will often pretend to be someone of a different age or gender in order to infiltrate a child’s world. Children must be taught to connect only with people they know, and to advise their parents immediately if they’re at all uncomfortable with the way an online conversation is going. Instruct them about what is and isn’t acceptable when sharing photos online.

Explain to your kids that social media is not a popularity contest: it’s the quality of their online friends that matters, not the quantity. And though your children (especially older ones) may not like it, you have both the right and a parental obligation to monitor their posts and online activity for their own safety. If necessary, this parental access can be a prerequisite for allowing them to go online. As they get older, you can loosen the reins as appropriate.

Keeping children safe online doesn’t always have to be about control and restrictions. Reward them with extra online hours for doing positive things, too – like running their own security scans or changing passwords regularly.

Internet viruses

Without a reliable antivirus program on your PC and devices, you’re at the mercy of a huge range of programs that can adversely affect your computer. It’s not always easy to tell if your computer has been infected with a virus, spyware, malware or other cyberspace vermin, but here are a few telltale clues: your PC runs slower than normal, freezes without warning, has strange pop-up windows appear out of nowhere or just doesn’t behave normally all of a sudden.

If you believe your system has been infected, you’ll find numerous tips online on the most effective ways to remove them. Once you’ve rid yourself of the offending virus, make sure you change all your passwords and usernames. Invest in a top-notch antivirus system to reduce future problems. This is particularly important for computers used in the running of your business. Be aware that being connected to the Internet is not needed to become infected with a virus – some viruses can be transferred through documents or other files hidden on a CD you’ve borrowed from a friend.

With thousands of new online viruses appearing daily, it’s impossible to protect yourself against everything, but a decent antivirus program (designed to handle a wide range of threats) is a good start. Quality antivirus software can be regularly updated so you can protect yourself against new ‘strains’. Beware of free antivirus systems that you’re invited to download over the Internet – these are often the quickest way to find yourself infected with a new virus! Go to a software store and buy packaged software instead. An Internet security suite that offers a firewall as well as antivirus and ant-spyware protection is ideal.

Regularly delete your temporary Internet files. Aside from freeing up space on your hard drive, this also speeds up virus scanning and may even remove basic spyware.

If you believe your system has been infected, you’ll find numerous tips online on the most effective ways to remove them. Once you’ve rid yourself of the offending virus, make sure you change all your passwords and usernames. Invest in a top-notch antivirus system to reduce future problems. This is particularly important for computers used in the running of your business. Be aware that being connected to the Internet is not needed to become infected with a virus – some viruses can be transferred through documents or other files hidden on a CD you’ve borrowed from a friend.

Common Internet scams

The Internet is a fertile breeding ground for deception and criminal scams. Here are some of the more prevalent culprits:

  • The ‘you’ve won the lottery’ scam
    An email arrives, informing you of your million-dollar lottery win. Of course, they’ll need your full financial details so they can transfer these non-existent winnings into your account. Give them nothing and delete the email at once – without clicking on any links.
  • The ‘your account will soon be deactivated’ scam
    In this ploy, you get an email (allegedly from your bank or PayPal) saying there’s a problem with your account, and you should click on a link to go to their site and correct the situation. Threats of account deactivation may persuade you into clicking on the link. Unfortunately, this link doesn’t take you the genuine financial site – it takes you to a fake lookalike site that’s aimed at getting sensitive information from you. Whenever you get one of these ‘act immediately or your account will be frozen’ emails, delete it at once. These emails rely on impulsive panic, but are easily thwarted by not clicking on links in emails from financial entities. When in doubt, call them on the phone.
  • Lonely hearts scams
    These scams often prey on older people, and can affect both sexes equally. A person worms their way into your online life and strikes up a friendship. The relationship deepens, and may turn to cyberspace romance. There may even be promises of marriage. Before long, they’ll ask for a small ‘loan’ under some pretext: their child is sick, they need airfare money to come visit you, etc. If you pay, they’ll thank you profusely, wait a suitable length of time, and ask for more money for something else – and on it goes. The person you’ve fallen for might not even exist: their photo could be a phony, and their life history a fairy tale.
  • Nigerian inheritance scam
    This one has become famous: you get an email from Prince Makatele Mubongo of Nigeria (or similar), telling of a massive inheritance that he desperately needs to get out of the country. Naturally, he has selected you to transfer this money to – provided you supply your banking details and pay an ‘overseas bank transfer fee’ of a few hundred dollars to get things rolling. If you send the money, you’ll find there’s been a glitch in the process, and even more money is required to smooth out the bureaucratic details. You’ll never see a cent of this make-believe inheritance, but the make-believe Prince will do okay.
  • The ‘take our survey’ scam
    This is one of the most common ways for computer hackers to install malware or spyware on your computer. When you take the requested survey, these criminals install their programs and can then check on your every online move, scanning for passwords, credit card information and anything else usable for financial gain. Avoiding online surveys is a wise move. The survey may appear to be from a legitimate source (and may even promise a prize for participating), but a check of the sender’s email address will usually reveal a suspicious URL. Delete it immediately.
  • The ‘work from home and make thousands a week’ scam
    The way these work is that you get an email (or respond to a pop-up on a site you’ve visited) telling you about the sure-fire way you can ‘earn $5,000 a week while you sleep!’ Upon responding, you’ll discover that to get to the ‘top earning level’ you’ll need to fork out for some training materials. If you don’t, they’ll typically bombard you with emails to ask why you haven’t taken this ‘simple step toward financial freedom’. A variation on this theme is the fake (but extremely lucrative) job offer that asks for an upfront fee to ‘process your application’.

These scams constitute just a sampling of the ways unscrupulous folks might try to extract money from you online. There are many others, but you can avoid most of them with simple vigilance. Beware of anything that seems too good to be true. Delete unsolicited emails, adjust your privacy settings and don’t click on links you’re not sure about – especially from His Majesty Prince Baron von Ripyuoffkwik from Nigeria.

 

1 http://www.abs.gov.au/ausstats/abs@.nsf/0/90A4971FB1FC0992CA2579E40012060A?opendocument

ID Theft, Fraud & Victims of Cybercrime

If you're the victim of cybercrime, you need to know what to do and respond quickly.

The Realities of Cybercrime
When dealing with cybercrime, an ounce of prevention is truly worth a pound of cure. Cybercrime in all its many forms (e.g., online identity theft, financial fraud, stalking, bullying, hacking, e-mail spoofing, information piracy and forgery, intellectual property crime, and more) can, at best, wreak havoc in victims’ lives through major inconvenience and annoyance. At worst, cybercrime can lead to financial ruin and potentially threaten a victim’s reputation and personal safety.

It’s always wise to do as much as possible to prevent cybercrime.

One of the best ways to learn how to prevent cybercrime is to check out STOP. THINK. CONNECT. at http://stopthinkconnect.org/tips-and-advice/.

But, despite our best efforts, our increasingly digital lives may put us in harm’s way. The fact remains that the bad guys continue to find new uses for ever-expanding—but easily accessible—online technologies to steal, harass, and commit all sorts of crime. If cybercrime happens to you, you need to know what to do and to respond quickly.

Should I Report Cybercrime?Cybercrime can be particularly difficult to investigate and prosecute because it often crosses legal jurisdictions and even international boundaries. And, many offenders disband one online criminal operation—only to start up a new activity with a new approach—before an incident even comes to the attention of the authorities.

The good news is that federal, state, and local law enforcement authorities are becoming more sophisticated about and devoting more resources to responding to cybercrime. Furthermore, over the past several years, many new anti-cybercrime statutes have been passed empowering federal, state, and local authorities to investigate and prosecute these crimes. But, law enforcement needs your help to stop the nefarious behavior of cyber criminals and bring them to justice.

Who to contact:

  • Local law enforcement. Even if you have been the target of a multijurisdictional cybercrime, your local law enforcement agency (either police department or sheriff’s office) has an obligation to assist you, take a formal report, and make referrals to other agencies, when appropriate. Report your situation as soon as you find out about it. Some local agencies have detectives or departments that focus specifically on cybercrime.
  • IC3. The Internet Crime Complaint Center (IC3) will thoroughly review and evaluate your complaint and refer it to the appropriate federal, state, local, or international law enforcement or regulatory agency that has jurisdiction over the matter. IC3 is a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center (funded, in part, by the Department of Justice’s Bureau of Justice Assistance). Complaints may be filed online at http://www.ic3.gov/default.aspx.
  • Federal Trade Commission. The FTC does not resolve individual consumer complaints, but does operate the Consumer Sentinel, a secure online database that is used by civil and criminal law enforcement authorities worldwide to detect patterns of wrong-doing, leading to investigations and prosecutions. File your complaint at https://www.ftccomplaintassistant.gov/FTC_Wizard.aspx?Lang=en. Victims of identity crime may receive additional help through the FTC hotline at 1-877-IDTHEFT (1-877-438-4388); the FTC website at www.ftc.gov/IDTheft provides resources for victims, businesses, and law enforcement.
  • Your Local Victim Service Provider. Most communities in the United States have victim advocates ready to help following a crime. They can provide information, emotional support and advocacy as needed. Find local victims service providers here: http://ovc.ncjrs.gov/findvictimservices/search.asp

Collect and Keep EvidenceEven though you may not be asked to provide evidence when you first report the cybercrime, it is very important to keep any evidence you may have related to your complaint. Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence. Evidence may include, but is not limited to, the following:

  • Canceled checks
  • Certified or other mail receipts
  • Chatroom or newsgroup text
  • Credit card receipts
  • Envelopes (if you received items via FedEx, UPS, or U.S. Mail)
  • Facsimiles
  • Log files, if available, with date, time and time zone
  • Messages from Facebook, Twitter or other social networking sites
  • Money order receipts
  • Pamphlets or brochures
  • Phone bills
  • Printed or preferably electronic copies of emails (if printed, include full email header information)
  • Printed or preferably electronic copies of web pages
  • Wire receipts

Additional Tips for Specific Types of CybercrimeOnce you discover that you have become a victim of cybercrime, your response will depend, to some degree, on the type and particular circumstances of the crime.  Here are useful tips to follow for some specific types of cybercrimes:

In cases of identity theft:

  • Make sure you change your passwords for all online accounts. When changing your password, make it long, strong and unique, with a mix of upper and lowercase letters, numbers and symbols. You also may need to contact your bank and other financial institutions to freeze your accounts so that the offender is not able to access your financial resources.
  • Close any unauthorized or compromised credit or charge accounts. Cancel each credit and charge card. Get new cards with new account numbers. Inform the companies that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. You may also want to write a letter to the company so there is a record of the problem.
  • Think about what other personal information may be at risk. You may need to contact other agencies depending on the type of theft. For example, if a thief has access to your Social Security number, you should contact the Social Security Administration.  You should also contact your state Department of Motor Vehicles if your driver's license or car registration are stolen.
  • File a report with your local law enforcement agency.  Even if your local police department or sheriff’s office doesn’t have jurisdiction over the crime (a common occurrence for online crime which may originate in another jurisdiction or even another country), you will need to provide a copy of the law enforcement report to your banks, creditors, other businesses, credit bureaus, and debt collectors.
  • If your personal information has been stolen through a corporate data breach (when a cyberthief hacks into a large database of accounts to steal information, such as Social Security numbers, home addresses, and personal email addresses), you will likely be contacted by the business or agency whose data was compromised with additional instructions, as appropriate. You may also contact the organization’s IT security officer for more information.
  • If stolen money or identity is involved, contact one of the three credit bureaus to report the crime (Equifax at 1-800-525-6285, Experian at 1-888-397-3742, or TransUnion at 1-800-680-7289).  Request that the credit bureau place a fraud alert on your credit report to prevent any further fraudulent activity (such as opening an account with your identification) from occurring. As soon as one of the bureaus issues a fraud alert, the other two bureaus are automatically notified.

For additional resources, visit the Identity Theft Resource Center at www.idtheftcenter.org or the Federal Trade Commission at www.ftc.gov/idtheft. 

In cases of Social Security fraud:

  • If you believe someone is using your social security number for employment purposes or to fraudulently receive Social Security benefits, contact the Social Security Administration’s fraud hotline at 1-800-269-0271. Request a copy of your social security statement to verify its accuracy.

For additional resources, visit the Social Security Administration at http://oig.ssa.gov/report-fraud-waste-or-abuse.

In cases of online stalking:

  • In cases where the offender is known, send the stalker a clear written warning saying the contact is unwanted and asking that the perpetrator cease sending communications of any kind. Do this only once and do not communicate with the stalker again (Ongoing contact usually only encourages the stalker to continue the behavior).
    • Save copies of all communication from the stalker (e.g., emails, threatening messages, messages via social media) and document each contact, including dates, times and additional circumstances, when appropriate.
    • File a complaint with the stalker’s Internet Service Provider (ISP) and yours. Many ISPs offer tools that filter or block communications from specific individuals.
    • Own your online presence. Set security and privacy settings on social networks and other services to your comfort level of sharing.
    • Consider changing your email address and ISP; use encryption software or privacy protection programs on your computer and mobile devices. (You should consult with law enforcement before changing your email account. It can be beneficial to the investigation to continue using the email account so law enforcement can also monitor communication.)
    • File a report with local law enforcement or contact your local prosecutor’s office to see what charges, if any, can be pursued. Stalking is illegal in all 50 states and the District of Columbia.

For additional resources, visit the Stalking Resource Center at www.ncvc.org/src.

In cases of cyberbullying:

  • Tell a trusted adult about what’s going on.
  • Save any of the related emails, texts, or messages as evidence.
  • Keep a record of incidents.
  • Report the incident to the website’s administrator; many websites including Facebook and YouTube encourage users to report incidents of cyberbullying.
  • Block the person on social networks and in email.
  • Avoid escalating the situationResponding with hostility is likely to provoke a bully.  Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. If you or your child receives unwanted email messages, consider changing your email address. The problem may stop. If you continue to get messages at the new account, you may have a strong case for legal action.
  • If the communications become more frequent, the threats more severe, the methods more dangerous and if third-parties (such as hate groups and sexually deviant groups) become involved—the more likely law enforcement needs to be contacted and a legal process initiated.

 For more information, visit www.stopcyberbullying.org and www.ncpc.org/cyberbullying.

How Did This Happen To Me? A Word about Malware.Many cybercrimes start with malware—short for “malicious software.” Malware includes viruses and spyware that get installed on your computer, phone, or mobile device without your consent—you may have downloaded the malware without even realizing it! These programs can cause your device to crash and can be used to monitor and control your online activity. Criminals use malware to steal personal information and commit fraud. If you think your computer has malware, you can file a complaint with the Federal Trade Commission at www.ftc.gov/complaint.

Avoid malware with the following tips from the STOP. THINK. CONNECT. campaign:

  • Keep a clean machine by making sure your security software, operating system and web browser are up to date.
  • When in doubt throw it out. Don’t click on any links or open attachments unless you trust the source.
  • Make your passwords long and strong and unique. Combine capital and lowercase letters with numbers and symbols to create a more secure password. Use a different password for each account.
  • Set your browser security high enough to detect unauthorized downloads.
  • Use a pop-up blocker (the links in pop-up ads are notorious sources of malware).
  • Back up your data regularly (just in case your computer crashes).
  • Protect all devices that connect to the Internet. Along with computers, smart phones, gaming systems, and other web-enabled devices also need protection from malware.
  • Make sure all members of your family follow these safety tips (one infected computer on a home network can infect other computers).

Other Places to Find Resources or File a Complaint:

Ways to Prevent Cybercrime

Follow these STOP. THINK. CONNECT. tips to help protect your personal information:

  • Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you to verify who you are before you conduct business on their sites.
  • Make passwords long and strong: Combine capital and lowercase letters with numbers and symbols to create a more secure password.
  • Unique account, unique password: Having separate passwords for every account helps to thwart cybercriminals.
  • Write it down and keep it safe: Everyone can forget a password. Keep a list that’s stored in a safe, secure place away from your computer.
  • Own your online presence: Set the privacy and security settings on websites to your comfort level for information sharing when they are available. It’s OK to limit who you share information with.  

Additional Resources:

The National Cyber Security Alliance would like to thank the National Sheriffs’ Association and International Association of Chiefs of Police for their assistance in creating this resource. 

About my account ››
How can I change my email address or password
How do I cancel my account?
How do I change my personal information
Games ››
Pet Runs
Is friendsutopia.com Free ››
Can I donate to friendsutopia.com
Is friendsutopia.com Free?
My Page ››
Back Ground Codes
GOLD
How do I make my page private?
Why is My Page suddenly messed up? It has music, sound or strange graphics on it
New Accounts ››
What if I do not recieve a confirmation e-mail?
Who can i contact for help?
Popular Topics ››
How do I add a profile picture?
How do I convert gold to cash?
How do i play Pets
How to Design my prfile skin
What is a Social Network?
Where is my Gold?
Recent Topics ››
How to enter chatroom
Recruiting/Inviting Friends ››
Is there a letter I can send to my friends on another site?
Is there a letter I can send to my Squid4Duck team mates to invite them to join FriendsUtopia.com
Safety ››
Online Safety
Parent Resources
Teen Resourses
Go to Top