About Duy Vu

Duy is the Technology Editor at Protect Your Bubble. Follow Duy on Google for more insights into the tech and digital world.

Tablet Addiction Among Children: A Growing Problem


In today’s generation, tablets and phones have replaced the TV as a way of pacifying children and keeping them entertained – yet these devices could be having a significant impact on the mental health of children. Experts have warned that parents who allow babies and toddlers to access tablet computers for several hours a day are in danger of causing “dangerous” long term effects.


The report, Zero to Eight: Children’s Media Use in America in 2013, for example, has revealed that one in three toddlers use a gadget before they can even talk. London-based Consultant Adolescent Psychiatrist Dr. Richard Graham and Clinical Psychologist Dr. Jay Watts, who launched the UK’s first technology addiction program a few years ago, say that technology addiction can affect a child’s behavior and sleeping patterns.


Is your child addicted to their iPad? Here are 5 signs that indicate your child is hooked.


Lack of Interest in Other Activities

tablet addiction child


One sign a child may have an issue with technology is when a parent is trying to get the child to do something else that is fun – such as going to the cinema or taking part in real-life activities – and the child is reluctant to do so.


Dr. Graham explained that if this reluctance increases and ‘it becomes harder and harder to get them to do anything other than engaging with technology’, they may be showing signs of addiction. Dr. Watts added that ‘a bit of groaning at having to do anything else is common.’ ‘But if your child has difficulty paying attention its worth finding out what is going on and whether this is a problem at school too.’


Distracted by Technology


You may have an issue if you find your child constantly talking about when they are next going online, or they’re talking about their next technology fix. ‘Look for signs of them constantly wanting to get back to their devices. For example, if they keep playing and checking their phone wanting to switch it back on,’ Dr. Graham says. Is the amount of time they spend using devices increasing? The constant need to interact with their tablet is a definite cause for concern for parents.


Mood Swings

child tantrum


If your child starts to become very sensitive when you’re expressing your concern on their tablet usage, up to the point that it escalates into an argument should serves as a wake-up call to parents. When your child can’t cope reacts with tantrums and uncontrollable behavior when their device is taken away is a sure sign of tablet addiction.


Withdrawal Symptoms


According to Dr. Graham, ‘if a child appears tense or upset when they can’t get online, and this feeling noticeably goes away when they are given their devices, they may have a problem.’ He also adds, ‘When they may become distressed or angry by small things and when they are back online become calmer’ it’s time for parents to check for signs of anxiety, agitation and irritability.

Dr. Watts added: ‘A little agitation at not being able to be online with one’s friends is pretty normal, but if a child continuously can’t get over this, it’s time to start a conversation.’


Devious Behavior


Another red flag for tablet addiction among children includes concealing the extent to which they use their devices, hiding them or using them in bed without your knowledge. Dr. Graham said children with potential addiction ‘will try to do as much as they can to minimize the extent to which they are asked about their technology use’ by keeping it a secret.


These 5 signs of tablet addiction can be curbed at an early stage if parents enforce limits in usage, instill consequences for excessive use, and provide daily structure for their children. It is especially important for sleep hygiene that tablets are not used before bed time and that they are kept in a different room overnight to stop children from using the devices straight before, during, and after sleep.

  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Pinterest
  • Email

What’s Covered (and Not Covered) in Our Protection Plans

whats covered in a protection planHave you ever been confused about what’s covered (and not covered) in our protection plans? You’re not alone.  There are differences between our protection plan and your original manufacturer’s warranty.  Our quick video below explains it all.



What’s covered:

- water damage

- mechanical failure

- surge protection

- cracked screens


What’s not covered:

- pre-existing damage

- intentional damage

- theft or loss

- cosmetic damage



  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Pinterest
  • Email

Senator Graham Just Demolished His Old Phone. Here are 10 Other Crazy Ways People Have Destroyed Their Phones.

lindsey graham cell phone kendo

You may have heard that South Carolina Senator Lindsey Graham took his frustrations with Donald Trump out on his old cellphone after he was responsible for an influx of calls after giving out Graham’s personal cellphone number.


In a video shot by the IJReview, Graham found plenty of different ways to lay the smackdown on his old flip phone.


He also tweeted that he’s now shopping for a new phone.


We’d like to remind Graham, and anyone else who’s currently shopping for a new phone, that a smartphone protection plan is a good idea to help protect his next phone from succumbing to damage that happens from everyday oops moments – or other political frustrations.


In honor of Graham’s cell phone beat down, here are the top 10 craziest ways Protect Your Bubble has heard of people destroying their old phones.


1.      Dropping into a fondue pot of boiling oil

Let phone simmer for 3min for crispy edge

2.      Dropping it on the train track

3.      Dropping it into the Grand Canyon

Protip: use a selfie stick at the GC

4.      Stepping on it with a stiletto heel

5.      Dropping it into the ocean while trying to capture a surfing video

6.      Dropping it into the campfire during s’mores

7.      Not securing it enough when skydiving

If only you could buy a parachute for your phone

8.      Walking into a pole while texting and walking, dropping onto the ground and smashing

9.      Spilling acid on it at the lab

10.    And of course, letting any child play with it

child with phone

A phone's worst enemy - children!


Congratulations on upgrading your phone, Sen. Graham. We’re here to protect your phone, as well as the devices of all running presidential candidates and voters.


*Disclaimer* Protect Your Bubble is not affiliated with Sen. Graham or any other running presidential candidates.  We just hate seeing broken phones & broken hearts.



  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Pinterest
  • Email

5 Must-Have Security Apps for your Android Phone

security apps for android

Our phones are our digital lifelines, a technological extension of ourselves. And the moment we lose or break our phone, most of us become pretty much unable to function (c’mon, you’ve been there). Fortunately, we can shield our phones with a good phone case and a phone protection plan to prevent such a tragic demise. And as we protect our phones with cases and protection plans, keep in mind, our phones can protect us too. Your phone can serve as a mobile security tool for safeguarding your home, passwords, data, personal safety and more. Turn your Android device into your first line of defense with the following apps.


1. Vivint

vivint house app manager

Two things in life need protection the most—your home and heart (because your home is where the heart is) (or rather, because heartbreak hurts like hell and your home contains all your possessions). You can’t download an app to prevent heartbreak, but you can install an app to enhance home security. Vivint mobile apps remotely manage and monitor your home’s smart and security systems from anywhere at anytime. Features include video surveillance, electronic door locks and arming/disarming your security system. You can also receive notifications about any distressing home activity like flooding or water leaks.


2. Keeper Password Manager

You’ve probably created dozens and dozens of passwords—passwords for work email, personal email, computer logins, social media accounts, online shopping accounts, your bank account, and the list goes on and on. A single password hack can expose sensitive private information and cause devastating outcomes, including identity theft. Keeper Password Manager provides protection against hackers as a secure and convenient password managing system. Store passwords, logins, credit card numbers, bank account information, confidential files, photos, important documents and videos in an encrypted, private digital vault. The app also protects your privacy by generating high-strength passwords and syncs to all your devices.


3. SpiderOak

SpiderOak app

Your phone is more than a communications device; it can be used as a mobile database for accessing, viewing and sharing personal files and documents. With SpiderOak, you can securely back up and access your data right from your Android device. SpiderOak is a 100 percent privacy-oriented, “zero-knowledge” cloud technology company that enables data backup, access and sharing in a secure and easy process. You can be assured that your files are stored and backed up across all your devices. SpiderOak’s “zero-knowledge” policy means your password will only exist in the server memory during the browsing session. It’s stored in encrypted memory and destroyed without a trace once your browsing session ends.


4. 360 Security

360 Security is a multi-layer antivirus app built to protect your Android phone against viruses, malware, system vulnerabilities and privacy risks in real time. Not only is 360 Security a premium mobile security app, it boosts your phone’s speed, frees available storage space on the SD card, locks apps for privacy and deletes your system’s application caches and junk files for enhanced performance. Use the One Tap Clean feature to reclaim memory space, power saver to optimize battery and anti-theft features to help protect and retrieve your device if lost.


5. Guardly

guardly 911 app

Your Android phone can be a lifesaver during a dicey situation. Guardly is the fastest way to send emergency alerts to friends and family or contact 911. With one quick tap, you can reach up to 15 personal contacts via email, phone call or text message. The app’s interface also enables you to quickly make an emergency call, even if your phone’s locked. Personal contacts or emergency personnel can locate you using Guardly’s advanced GPS, and Guardly’s indoor positioning system provides phone dispatchers with your real-time indoor location during an emergency, which can greatly reduce response times.



  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Pinterest
  • Email

Protect your iPhone: It’s the Brand Most Likely to be Stolen

iphone most likely to be stolen

To you, your smartphone is more than a high-tech device; it’s a pocket-sized extension of yourself. To thieves, smartphones are part of the business plan, a way to fetch money and sensitive personal data. Our mobile devices are so important, many of us are willing to pay top dollar for their safe return—in a poll by the mobile security firm Lookout, one-third of theft victims said they would pay $1,000 to retrieve their stolen smartphones. And if you’re an iPhone user, you’re more likely to have your device stolen. Apple Insider reports iPhones are 65 percent more likely to go missing over other smartphones.


Don’t think about ditching your iPhone for a larceny-free option either, unless you’re willing to go back to a ’90s-era data-free flip phone. About 3.1 million American consumers were victims of smartphone theft in 2013, according to Consumer Reports. Although iPhones were the most commonly targeted, switching brands isn’t the answer; all mobile devices are subject to theft. Instead, take extra precautions to protect your device and the personal information it contains.


Security Woes

charging iphone

The miscreants who know the ins and outs of the black market resale racket are appropriately dubbed “Apple pickers.” These thieves have little trouble wiping personal information from a device without triggering a tracking device. If a phone isn’t password-protected, it can easily be reset by its new user. Your iPhone does provide helpful tracking features—but if it’s not location-enabled, your device is good as gone.


Safeguard Your Phone

viewing iphone on bench

From bank account logins and passwords to home addresses, birth dates and Social Security numbers, our phones store our most sensitive private information. Additionally, the memories captured and stored in our devices are priceless, and losing them can be devastating. This data is so important that according to the Lookout survey, 68 percent of smartphone owners are willing to risk their personal safety to ensure a timely reunion with their digital other half. By taking these proactive security measures, you won’t have to risk your life to recoup your valuable data.


Start with identity theft protection. Many companies offer credit monitoring, identity monitoring, and fraud alerts for suspicious activity. This goes a long way if your sensitive personal data is compromised. Hackers can ruin your credit, take out fraudulent loans, and more.


Set a passcode. This is one of the simplest and oft-ignored security tips. Block access to your phone by setting a passcode to the home screen.


Turn on Find My iPhone. Approximately 1.4 million smartphones were lost or stolen and never recovered last year, according to Consumer Reports. Turn on this important security feature—it gives authorities a better chance of recovering your device.


Pay attention. Forty-four percent of smartphones were stolen after owners forgot them at a public place like a restaurant, bar or club. Ensure your phone is put away in your front pocket, purse or anywhere except the table top.



  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
  • Pinterest
  • Email