In early February, a team of researchers discovered a configuration flaw in a group of servers associated with the database of a parental control app, KidSecurity. The data was accessible for more than a year. With close to a million downloads, The app allows parents to track the location of children, control digital interactions and listen to the device's microphone under control.

It's not the first time something similar has happened to them. One year ago, An error in the authentication procedure caused a leak of some 300 Millions of records with data including messages, Names, IP addresses… On this occasion, data has been leaked from GPS locations and related to the specifications that identify it with the phone where the application is installed.

Surprisingly, The way to access sensitive information is to directly access the database system used by the application. Whereupon, With access to the system, you give access to the information transmitted by the application. The researchers received a 456.000 messages during an hour of observation in their investigations.

Fountain: Cybernews

Image by freepik


Leave a Reply

Your email address will not be published. Required fields are marked *

More news
A cybercriminal manages to use AI to steal data from the Mexican Government
Read more »
Intec creates an AI that redefines the rules of the game in cybersecurity in the AI era.
Read more »
Una exfiltración de datos afecta a un proveedor de Adidas
Read more »
Se incrementan un 26% los incidentes de ciberseguridad
Read more »
Un ciberataque paraliza en Roma la Universidad La Sapienza
Read more »