If you're seeing this message, it means we're having trouble loading external resources on our website.

If you're behind a web filter, please make sure that the domains *.kastatic.org and *.kasandbox.org are unblocked.

Main content

The Basics of Safe Browsing

Learn what you should look out for while browsing the internet, along with some specific steps that you can take to stay safe and secure. To learn more about how you can keep yourself safe while on the Internet, visit: internet-safety.khanacademy.org. Created by Sal Khan.

Want to join the conversation?

  • blobby green style avatar for user kenzie wright
    A lot of games ask for my location why does it want to know my location, and is it good that I say no?
    (14 votes)
    • stelly blue style avatar for user Evan Lewis
      This depends on the game. Some games may use your location for advertising purposes, while others may need your location to provide a critical part of the game (such as Pokemon Go).

      If you're concerned about how the game uses your location, then it would be good to verify the reputation of the game developer and read their privacy policy.
      (7 votes)
  • marcimus pink style avatar for user Sydney
    i just got a notification that google wants to know my location and i said block did i make the right choice ?
    (6 votes)
  • blobby green style avatar for user ldtoutlook
    What is Phishing?
    (3 votes)
  • blobby green style avatar for user amuhib1111
    *what can someone do with my device location? If I am not a criminal, why should I be afraid of giving my my location info?*
    (5 votes)
    Default Khan Academy avatar avatar for user
  • blobby green style avatar for user acox1689
    my roblox password got leaked on the dark web what do i do?
    (4 votes)
    Default Khan Academy avatar avatar for user
  • duskpin ultimate style avatar for user L.E.G.
    Is Phishing worse than hacking?
    (3 votes)
    Default Khan Academy avatar avatar for user
    • hopper cool style avatar for user Sophia ∑οφια 😊
      The Webster's Dictionary defines phishing as "the practice of tricking Internet users (as through the use of deceptive email messages or websites) into revealing personal or confidential information which can then be used illicitly." It is therefore a technique of social engineering (human hacking) so requires little technical knowledge and could be argued both ways.
      (4 votes)
  • blobby green style avatar for user Becca
    you should not put your stuff on the internet
    (2 votes)
    Default Khan Academy avatar avatar for user
  • blobby green style avatar for user babtar.uk
    What is crypto mining?
    (3 votes)
  • spunky sam blue style avatar for user Sonic
    Well, apparently Khan Academy tracks you a lot... just look.
    The service can delete specific content without prior notice and without a reason
    Tracking via third-party cookies for other purposes without your consent.
    The service collects many different types of personal data
    This service may keep personal data after a request for erasure for business interests or legal obligations
    The service can delete your account without prior notice and without a reason
    This service reserves the right to disclose your personal information without notifying you
    This service tracks which web page referred you to it
    The service can sell or otherwise transfer your personal data as part of a bankruptcy proceeding or other type of financial transaction.
    This service can license user content to third parties
    This service forces users into binding arbitration in the case of disputes
    Users have a reduced time period to take legal action against the service
    This service keeps a license on user-generated content even after users close their accounts.
    The service may use tracking pixels, web beacons, browser fingerprinting, and/or device fingerprinting on users.
    Your profile is combined across various products
    Instead of asking directly, this Service will assume your consent merely from your usage.
    You waive your right to a class action.
    The service may collect extra data about you through promotions
    This service may use your personal information for marketing purposes
    This service gathers information about you through third parties
    The service may keep a secure, anonymized record of users' data for analytical purposes even after the data retention period
    The service uses your personal data to employ targeted third-party advertising
    Your personal data is given to third parties
    This service assumes no liability for unauthorized access to your personal information
    Users shall not interfere with another person's enjoyment of the service
    You must provide your legal name, pseudonyms are not allowed
    This service uses third-party cookies for statistics
    Tracking pixels are used in service-to-user communication
    (3 votes)
    Default Khan Academy avatar avatar for user
  • blobby green style avatar for user fireninjakai900
    i will find them myself and make sure there leaking blood like a fish then ima hang him on a hook until he says im sorry for fishing you
    (3 votes)
    Default Khan Academy avatar avatar for user

Video transcript

- Hi, everyone. Sal Khan here from Khan Academy, and I'm excited to talk a little bit about safe browsing. Our guest today is Kelly Hope Harrington, who's a Senior Staff Software Engineer at Google. Kelly, welcome. - Thank you. Happy to be here. - So safe browsing, my sense of browser, we, you go to some websites, it sends up some webpages. What's the worst that can happen? - Oh, well there, there's all sorts of bad things that can happen on the internet, and I think some of the ones that are come to mind first are things like phishing or social engineering. So someone is trying to trick you into thinking they're someone you trust. So you share either your personal information like your password or your credit card information, or maybe you do something that you wouldn't otherwise do because you trust them. And that could be something like downloading, installing malware. So, malware is something that will take over your computer. The attacker is trying to do something to get value out of you. So, maybe they want to take some of your personal data and sell it on the dark web. Maybe they want to do ransomware where they lock down your computer and won't let you use it until you pay them money. Or maybe they wanna do something sneakier and do crypto mining in the background so your computer gets hot and slow while that's happening. We also see unwanted software. So, unwanted software might have something that you do value but also does something else. - Yeah, so I just wanna make sure I understand this 'cause we talk in other videos about phishing where someone pretends to send you an emergency letter from a bank or whatever, and many of those phishing attacks usually try to get you to some type of a website. And this is where, once again, you're browsing now. You need to make sure that that's actually the website that you think it is. - Yeah, yeah. You know, I think that the attackers know you're looking for stuff, so they're trying to take advantage of you're already naturally trying to go and download something, and that is their opportunity to try and trick you, and try and get you to do something that you weren't otherwise gonna do. - Super helpful.