{"id":1057,"date":"2018-05-21T19:30:56","date_gmt":"2018-05-21T19:30:56","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/threatpost\/?p=132152"},"modified":"2018-05-21T19:30:56","modified_gmt":"2018-05-21T19:30:56","slug":"teensafe-tracking-app-exposes-thousands-of-private-records","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/","title":{"rendered":"TeenSafe Tracking App Exposes Thousands of Private Records"},"content":{"rendered":"<div class=\"media_block\"><\/div>\n<div><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/31\/2018\/05\/21153312\/Creepy_Spy_Hacker_Dude.png\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>Thousands of accounts for TeenSafe, which is a mobile app that parents can use to monitor what their kids are doing online, have been exposed in the latest Amazon Web Services cloud misconfiguration.<\/p>\n<p>According to a <a href=\"https:\/\/www.zdnet.com\/article\/teen-phone-monitoring-app-leaks-thousands-of-users-data\/\">report<\/a> from <em>ZDNet<\/em>, which verified the data breach, there were at least two servers left open to the internet without a password, with information easily available in plaintext.<\/p>\n<p>The leaky servers were discovered by security researcher <a href=\"https:\/\/twitter.com\/Random_Robbie\">Robert Wiggins<\/a>, who told <em>ZDNet<\/em> that the information trove contained parental email addresses, Apple ID information including emails and passwords, the name of the teen\u2019s device and the phone\u2019s unique identifier. Fortunately, no location information, nor photos or message content was made public, but the info that was on offer is certainly enough to mount a phishing expedition or log into an account and hijack it.<\/p>\n<p>\u201cThis breach is a perfect example of all information security and security development best practices being violated or not implemented whatsoever,\u201d Rishi Bhargava, co-founder at Demisto, told Threatpost. \u201cClear-text passwords are evil and there is no reason to store any password in [a] database without encryption. There are so many open source libraries to do basic encryption that encrypting passwords is not additional work at all.\u201d<\/p>\n<p>Analysis of the bucket found that there were about 10,200 of the aforementioned records found in the main server, some of them duplicates; the other contained only test data by all appearances. TeenSafe has since removed the public access for both, and the company said that it\u2019s in the process of notifying those affected. It didn\u2019t say whether the information had been accessed by bad actors.<\/p>\n<p>The app is a privacy and security researcher\u2019s nightmare in many ways. On the former front, it allows parents to spy on their children in very invasive ways. These include being able to read all text messages, including those that were deleted, along with messages sent by third-party services, such as WhatsApp. It also records call logs, both outgoing and incoming; allows location-tracking and location history review; and gives parents a window into browsing history and bookmarks. The service allow allows parents to block access to certain apps and shut down the device entirely. All of this can be done <a href=\"https:\/\/www.teensafe.com\/blog\/legal-monitor-child-cell-phone-tracking-device\/\">without the teen\u2019s consent<\/a>.<\/p>\n<p>Meanwhile, the service actually <a href=\"https:\/\/teensafe.zendesk.com\/hc\/en-us\/articles\/206160465-Disabling-Apple-Two-Factor-Authentication\">requires the disabling<\/a> of two-factor authentication in order to use it. And no hashes or other precautionary measures were found among the data, even though the company claims on its <a href=\"https:\/\/www.teensafe.com\/\">homepage<\/a> that it encrypts its data: \u201cindustry-leading SSL and vormetric data encryption to secure your child\u2019s data,\u201d it says, adding, \u201cchild\u2019s data is encrypted \u2013 and remains encrypted \u2013 until delivered to you, the parent.\u201d<\/p>\n<p>\u201cIt is absolutely shocking that a company that promotes security and protecting your most valuable assets, your children, have completely left sensitive data unsecured and available to cybercriminals who will abuse it,\u201d Joseph Carson, chief security scientist at Thycotic, told Threatpost via email. \u201cThe ironic thing is that they require two-factor authentication to be turned off (yes turned OFF), and that they store passwords in clear text. It\u2019s surprising that companies still do such irresponsible actions against cybersecurity best practices.\u201d<\/p>\n<p>He added that with only four days until the EU\u2019s <a href=\"https:\/\/threatpost.com\/new-eu-privacy-laws-will-complicate-b2b-data-sharing\/126518\/\">GDPR privacy regulation<\/a> is enforced, TeenSafe appears to have been lucky with the timing of this incident.<\/p>\n<p>\u201cI\u2019m sure it might not be the last we hear about how this impacts EU citizens\u2019 data, which should make May 26th an interesting day related to this particular data breach,\u201d he said.<\/p>\n<p>The misconfiguration of cloud storage buckets resulting in data exposure of sensitive information has been an ongoing problem for companies and organizations of all sizes, even at the <a href=\"https:\/\/threatpost.com\/leaky-aws-storage-bucket-spills-military-secrets-again\/129021\/\">US Department of Defense<\/a>. Billions of records have been <a href=\"https:\/\/threatpost.com\/data-pours-from-cloud-and-the-enemy-is-us\/128747\/\">inadvertently exposed<\/a> to the public internet in the past few quarters.<\/p>\n<p>\u201cThis is yet another example of organizations, in this case one developing monitoring applications, deploying in the cloud without understanding the security implications,\u201d said Mukul Kumar, CISO and vice president of cyber practice at Cavirin, via email. \u201cUnder the shared responsibility model, TeenSafe has the responsibility to protect the data, but their IT team obviously didn\u2019t uphold their part of the shared-responsibility bargain.\u00a0 The cloud providers probably need to do more, and in fact they are moving in this direction, to protect the cloud assets of organizations with little or no expertise.\u00a0 When spinning up on EC2 instance and S3 storage buckets is almost as easy as learning how to ride a bike, the providers need to implement process checks that take into account little or no cloud knowledge. Parents deploying these types of applications also need to better understand the nuances of these applications, but we know that won\u2019t happen.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/threatpost.com\/teensafe-tracking-app-exposes-thousands-of-private-records\/132152\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Records for a mobile app that parents can use to monitor what their kids are doing online has been exposed in the latest Amazon Web Services cloud misconfiguration. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":1058,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[3],"tags":[8,127,670,536,671,672,673,5,674,675,676],"class_list":["post-1057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threatpost","tag-amazon","tag-aws","tag-cloud-bucket","tag-cloud-security","tag-cloud-storage","tag-misconfiguration","tag-parental-controls","tag-privacy","tag-teen-information","tag-teensafe","tag-tracking-app"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-21T19:30:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"402\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"TeenSafe Tracking App Exposes Thousands of Private Records\",\"datePublished\":\"2018-05-21T19:30:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/\"},\"wordCount\":803,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/teensafe-tracking-app-exposes-thousands-of-private-records.png\",\"keywords\":[\"Amazon\",\"AWS\",\"cloud bucket\",\"Cloud Security\",\"cloud storage\",\"misconfiguration\",\"parental controls\",\"Privacy\",\"teen information\",\"teensafe\",\"tracking app\"],\"articleSection\":[\"Threatpost\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/\",\"name\":\"TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/teensafe-tracking-app-exposes-thousands-of-private-records.png\",\"datePublished\":\"2018-05-21T19:30:56+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/teensafe-tracking-app-exposes-thousands-of-private-records.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/teensafe-tracking-app-exposes-thousands-of-private-records.png\",\"width\":900,\"height\":402},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/teensafe-tracking-app-exposes-thousands-of-private-records\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Amazon\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/amazon\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"TeenSafe Tracking App Exposes Thousands of Private Records\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/","og_locale":"en_US","og_type":"article","og_title":"TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-21T19:30:56+00:00","og_image":[{"width":900,"height":402,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"TeenSafe Tracking App Exposes Thousands of Private Records","datePublished":"2018-05-21T19:30:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/"},"wordCount":803,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png","keywords":["Amazon","AWS","cloud bucket","Cloud Security","cloud storage","misconfiguration","parental controls","Privacy","teen information","teensafe","tracking app"],"articleSection":["Threatpost"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/","url":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/","name":"TeenSafe Tracking App Exposes Thousands of Private Records 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png","datePublished":"2018-05-21T19:30:56+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/teensafe-tracking-app-exposes-thousands-of-private-records.png","width":900,"height":402},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/teensafe-tracking-app-exposes-thousands-of-private-records\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Amazon","item":"https:\/\/www.threatshub.org\/blog\/tag\/amazon\/"},{"@type":"ListItem","position":3,"name":"TeenSafe Tracking App Exposes Thousands of Private Records"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=1057"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/1057\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/1058"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=1057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=1057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=1057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}