TikTok and Its Hidden Vulnerabilities

Many people are using TikTok these days. If you haven’t heard of TikTok, you are part of the rare crowd. TikTok is video-sharing social networking, basically the new Vine. There are over 1.5 billion uses globe-wide within a two and a half year span.  TikTok has spread to Facebook, Twitter, and even Instagram.

How can hackers use TikTok to hurt users:

  • Manipulating content in Tik Tok user accounts
  • Erasing videos
  • Uploading unapproved videos
  • Changing private videos to be publicly available
  • Expose private information like personal email addresses

HOW?

How are they doing this?? By sending malicious links with spoofed messages, they are gaining access to TikTok profiles. Social engineering is also a way that hackers are getting access to TikTok user profiles.

Since TikTok has been looking to grow quickly, they have not given security vulnerabilities much needed attention. However, back in 2019, TikTok was fined 5.7 million dollars for collecting personal information illegally from minors. *Yikes* Soldiers are not permitted to make TikTok’s while in uniform. The Navy and the Army have banned the application on December 30th. 

It has many vulnerabilities, and it has the potential to be very risky for minors. Parents, please monitor your children’s TikTok. Very important to follow your children’s social media and make sure they are not being taken advantage of. Thanks for reading!

Don’t be the next headline, contact CoreRecon at 3612483258

Big thanks to Medium for providing this insightful information. 

Photo creds to Wikimedia Commons for the TikTok logo

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon
Facebook: https://www.facebook.com/CoreReconCyberSec
Instagram: http://instagram.com/corerecon

Heads up Texas, Your Data Is in Danger

When it comes to cybercrime, there is no discrimination. When it comes to data theft, every Texas government or business is considered a target. However, larger companies are the most targeted. Hackers are stealing data, selling it, and are making money off of your data. According to Jareth at Emsisoft, hackers are using multiple tactics to steal your data, and here is how:

1. Malware

Hackers are using malware such as keyloggers and banking malware to pull login credentials and credit card information. Malware also spreads in the form of email, so it’s essential to have strict email security. By having tight email security, this decreases significantly the chance of being infected by email malware. Many ransomware attacks are using malware to hit significant numbers of businesses and local governments. Texas is a major target for these attacks, so it’s essential to have security policies to protect your business.

2. Phishing

Phishing is a form of social engineering. 

“Social engineering is a form of techniques employed by cybercriminals designed to lure unsuspecting users into sending them their confidential data, infecting their computers with malware or opening links to infected sites.”

Kaspersky

These hackers use these social engineering techniques to gain access to your personal information that they can use to infect your environment. For example, a Texas school district, Manor Independent School District, was the target of a major phishing scam. The hackers posed as vendors and stole 2.3 million dollars from the Texas school district. Schemes like this occurring bring up the question, how many others have gone unnoticed? 

3.Weak Passwords

Weak passwords are the easiest way that hackers get access to systems. Texas and all other states are vulnerable to this attack. Hackers use different password crackers to steal data such as brute force attacks, keyloggers, and phishing. It is essential to use strong password policies to prevent an attack like this. 

There are multiple ways that hackers can gain access to personal data. Tactics used are malware, phishing, weak passwords, and even unsecured networks. Hackers are stealing data, selling it, and are making money off of your data. Texas remains a primary target for attacks like these. Your data is your data, don’t be the next headline. To prevent an attack like this, contact CoreRecon. Thanks for reading, let us know what you think!

Follow CoreRecon on Twitter: https://twitter.com/CoreRecon
Facebook: https://www.facebook.com/CoreReconCyberSec
Instagram: http://instagram.com/corerecon