{"id":1030,"date":"2018-05-22T09:27:35","date_gmt":"2018-05-22T09:27:35","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/"},"modified":"2018-05-22T09:27:35","modified_gmt":"2018-05-22T09:27:35","slug":"victorias-educational-apps-for-students-let-creeps-contact-kids","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/","title":{"rendered":"Victoria&#8217;s educational apps-for-students let creeps contact kids"},"content":{"rendered":"<p><strong class=\"trailer\">UPDATED<\/strong> Google and the Victorian Department of Education have set parents, students, teachers, and the Office of the Australian Information Commissioner a poser: at what point does a feature become a vulnerability? Or just too creepy to put in front of kids?<\/p>\n<p>Victoria&#8217;s teachers and students have adopted a system based on Google Apps for Education, accessed through a portal on the department&#8217;s EduSTAR system.<\/p>\n<p>As people become more familiar with the setup, however, parents have identified system behaviours which are reasonable for business tools used by adults, but look out-of-place in the hands of primary school students.<\/p>\n<p>The two brought to <em>Vulture South&#8217;s<\/em> attention by a concerned parent appear to be normal Google Apps features, but we can understand how they could be worrying to a parent: easy access to around 170,000 EduSTAR profiles of teachers and students via Google Contacts; and the ability for <em>anybody<\/em> with a Google account \u2013 for example, Google Drive \u2013 to contact a student as an \u201coutsider\u201d with no connection whatsoever to education.<\/p>\n<p>These are features \u2013 but, as one parent told <em>The Register<\/em>, in the sensitive setting of school education, they&#8217;re prone to abuse.<\/p>\n<p>In short: first, someone willing to abuse a legitimate EduSTAR login could easily scrape all the profiles; and second, those profiles would let a malicious outsider identify students and abuse other Google features to (as an example) chat with and groom students via shared editing of a Google document.<\/p>\n<h3 class=\"crosshead\"><span>Profiles<\/span><\/h3>\n<p>The concerned parent who contacted <em>The Register<\/em> arrive at their estimate of 170,000 profiles simply enough: they multiplied the number of pages (nearly 700) in EduSTAR&#8217;s Google Contacts database with the number of entries per page.<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"8\"><a href=\"https:\/\/regmedia.co.uk\/2018\/05\/22\/edustar_1.jpg\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/05\/22\/edustar_1.jpg?x=648&amp;y=327&amp;infer_y=1\" alt=\"EduSTAR contacts screenshot\" title=\"EduSTAR contacts screenshot\" height=\"327\" width=\"648\"\/><\/a><\/p>\n<p class=\"text_center\">The URL tells all: navigation to the last page of contacts in EduSTAR. Image supplied. Click to embiggen<\/p>\n<\/div>\n<p>The profile fields include name, nickname, title and company<sup>*<\/sup>, a \u201cfile as\u201d field, notes, e-mail, phone, address, birthday, URL, \u201crelationship\u201d, instant messaging contact, and Internet call contact.<\/p>\n<p>E-mail, the parent told us, is disabled for primary children.<\/p>\n<p>Whoever is responsible for the implementation, <em>The Register<\/em> feels it&#8217;s arguable that a system-wide open directory is a de facto bad idea and probably privacy breach: nobody should be able to see what school your kids attend.<\/p>\n<p>We asked the Office of the Australian Information Commissioner (OAIC) for an opinion on this, and were told the office is investigating.<\/p>\n<h3 class=\"crosshead\"><span>Kids contactable by World+Dog<\/span><\/h3>\n<p>The second, more serious issue the parent pointed out to <em>Vulture South<\/em> is that any of these profiles can be contacted by other people with Google accounts \u2013 contact to or from EduSTAR accounts is not limited to people with EduSTAR logins.<\/p>\n<p>The parent provided us with the following image as an example \u2013 an exchange created in a Google Drive shared image between parent (without an EduSTAR account) and their child (with an EduSTAR account). The back-and-forth is possible thanks to EduSTAR and Google&#8217;s collaborative features.<\/p>\n<div class=\"CaptionedImage Border width_85\" readability=\"7\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/05\/22\/edustar_2.jpg\" alt=\"EduSTAR shared chat via Google Drive\" title=\"EduSTAR shared chat via Google Drive\" height=\"325\" width=\"518\"\/><\/p>\n<p class=\"text_center\">The parent created this chat with their child in Google Drive. Image supplied<\/p>\n<\/div>\n<p>The parent worried that such chats offer opportunities for grooming by outsiders \u2013 most easily if someone had scraped and then shared the Google Contacts profiles, since that would let the malicious try to target their approaches.<\/p>\n<p>The parent commented: \u201cEffectively [Google Docs] is a low-grade instant messaging app, shared unsolicited and unflagged to a seven year old child.\u201d<\/p>\n<p>Nor does it seem that such a contact would be flagged to system administrators or parents.<\/p>\n<p>It&#8217;s also feasible that an outsider who knows how identities are created could try to brute-force their way into getting a student to respond. And not much force would be required because EduSTAR IDs are formulaic.<\/p>\n<p>We included this aspect of the system in our inquiries to the OAIC.<\/p>\n<p>As the parent pointed out, other attack vectors also exist.<\/p>\n<p>It&#8217;s easy to imagine account IDs becoming part of a phishing campaign, for example: getting students or teachers to open an \u201cofficial-looking\u201d document that happens to include malicious links.<\/p>\n<p>Even if a malicious outsider had not accessed EduSTAR, an unrelated privacy breach could yield student identities \u2013 the education application <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2016\/02\/29\/mathletics_security_complaints_parents\/\">Mathletics was in 2016 criticised for weak client-side security<\/a>, and later, because its competition leaderboard seemed to contain enough information to identify individual students (first name, surname initial, and school).<\/p>\n<p>\u201cTwo semi-innocuous breaches with personally identifiable information are then combined to create a much greater pedophile risk, where the would-be offender now knows where the child is at school, has a photo, a name, and now can instant message them (via Google Drive)\u201d, the parent told us.<\/p>\n<h3 class=\"crosshead\"><span>Aren&#8217;t these features?<\/span><\/h3>\n<p><em>Vulture South<\/em> considered whether or not to publish this story, because after all, accessing Google Contacts or sharing in Drive or Docs are <em>features<\/em> of G Suite.<\/p>\n<p>Our contact argued that these features might be suitable for adults who log in to G Suite either because their employer uses it or because they want the features for themselves.<\/p>\n<p>But kids can&#8217;t consent in the same way as adults, so surely an application suite intended for school students must be built to the particular requirements of its intended audience. Students also need and deserve more than generic click-to-accept privacy and safety.<\/p>\n<p><em>The Register<\/em> raised the parent&#8217;s concerns with Victoria&#8217;s Department of Education. We do not yet have a definitive response from the Department.<\/p>\n<p>We have also asked Google for comment. \u00ae<\/p>\n<p><strong>Update:<\/strong> The Victorian Department of Education has provided the following responses through a spokesperson:<\/p>\n<p>\u201cThe Department runs Privacy Impact Assessments on key systems that house any student information and has performed an assessment on this system.<\/p>\n<p>\u201cGoogle Apps is a collaboration tool which necessitates students being able to find and connect with other students \u2013 either at their own school or at another school. As such, the directory function is a known and controlled function of Google Apps.<\/p>\n<p>\u201cParents are provided privacy information about Google Apps which explain the tool, what information it collects (and why), and are offered an opt-out process.<\/p>\n<p>\u201cStudents are supervised when they use the system, and are also educated around digital citizenship and encouraged to raise any concerns.<\/p>\n<p>\u201cThe Department runs Privacy Impact Assessments on key systems that house any student information and has performed an assessment on this system.\u201d<\/p>\n<p>In a follow-up e-mail, the Department outlined the following concerns:<\/p>\n<div readability=\"50\"><strong>The Department<\/strong> is concerned that we wrote that \u201cEduSTAR profiles are exposed. There is no such thing as an EduSTAR profile, the only profile that is exposed is the limited (by the Department) profile that is created in Google Apps for Education.\u201c<\/p>\n<p><em>The Register\u2019s<\/em> response: We accept the correction, that what\u2019s exposed is not an \u201cEduSTAR profile\u201d, but a Google Apps for Education profile, and have amended the copy.<\/p>\n<p><strong>Department:<\/strong> \u201cThe address book is not exposed to external people and does not contain a student\u2019s location\/school. Moreover, students are unable to add additional information to their address book profile which is locked down so that it provides only the essential information required to operate the system.\u201d<\/p>\n<p><em>The Register<\/em>\u2019s response: We did not claim that the address book was exposed to external people. However, it could leak to the outside via a malicious insider, as described in the article.<\/p>\n<p><strong>Department:<\/strong> The article implies this is the same Google Apps that is used in business. It is not \u2013 it is Google Apps for Education \u2013 built specifically for K-12.<\/p>\n<p><em>The Register\u2019s<\/em> response: Our concern was, and is, that Google Apps for Education inherits too many default features from Google Apps.<\/p>\n<p><strong>Department:<\/strong> Additionally, the Department\u2019s Privacy Impact Assessment reviewed the privacy and data security controls implemented by Google as a pre-requisite to providing system-access. Google comply with, and are independently audited on, the relevant industry standard controls such as ISO270001, 27017, 27018, SOC2\/3.<\/p>\n<p><em>The Register\u2019s<\/em> response: We accept that this took place. If breach opportunities exist, it may also indicate that standards compliance does not cover all use-cases.<\/p>\n<\/div>\n<p><sup>*<\/sup>What&#8217;s \u201ctitle and company\u201d doing in a contacts database for teachers and students? Could it be that either the Department of Education, Google, or both, have rolled out Google Apps into schools with unmodified defaults?<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1759\/shttp:\/\/www.mcubed.london\/\">Minds Mastering Machines &#8211; Call for papers now open<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2018\/05\/22\/has_google_built_a_haven_for_creeps_in_victorias_education_apps\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>World+Dog can contact any student via a shared doc UPDATED\u00a0 Google and the Victorian Department of Education have set parents, students, teachers, and the Office of the Australian Information Commissioner a poser: at what point does a feature become a vulnerability? Or just too creepy to put in front of kids?\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-1030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Victoria&#039;s educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Victoria&#039;s educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-22T09:27:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Victoria&#8217;s educational apps-for-students let creeps contact kids\",\"datePublished\":\"2018-05-22T09:27:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/\"},\"wordCount\":1373,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/\",\"name\":\"Victoria's educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg\",\"datePublished\":\"2018-05-22T09:27:35+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg\",\"width\":648,\"height\":327},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/victorias-educational-apps-for-students-let-creeps-contact-kids\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Victoria&#8217;s educational apps-for-students let creeps contact kids\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Victoria's educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/","og_locale":"en_US","og_type":"article","og_title":"Victoria's educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-22T09:27:35+00:00","og_image":[{"width":648,"height":327,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Victoria&#8217;s educational apps-for-students let creeps contact kids","datePublished":"2018-05-22T09:27:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/"},"wordCount":1373,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/","url":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/","name":"Victoria's educational apps-for-students let creeps contact kids 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg","datePublished":"2018-05-22T09:27:35+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/victorias-educational-apps-for-students-let-creeps-contact-kids.jpg","width":648,"height":327},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/victorias-educational-apps-for-students-let-creeps-contact-kids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Victoria&#8217;s educational apps-for-students let creeps contact kids"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1030"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1031"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}