Click For Photo: http://i.dailymail.co.uk/i/newpix/2018/05/21/14/4C808B7F00000578-0-image-a-12_1526909636955.jpgClick For Video: http://video.dailymail.co.uk/video/mol/2018/04/11/8233240667988708469/1024x576_MP4_8233240667988708469.mp4
An app called Teensafe that lets parents keep an eye on their teens' online activity may have leaked the private data of tens of thousands of youngsters.
The Apple ID passwords and usernames were stored without encryption on an unsecured server, meaning anyone could access the information without a password, a report has revealed.
App - Parents - Access - Youngsters - Web
The app is designed to let parents access their youngsters' web browser history, text messages, call logs and device location.
Ironically TeenSafe, which bills itself as a 'secure' monitoring app, requires two-factor authentication to be disabled, so anyone could access the Apple ID accounts using login credentials from leaky servers.
App - Servers - Amazon - Cloud - Service
At least one of the app's servers, which was hosted by Amazon's cloud service, could be accessed without a password, according to the report by ZDNet.
British security researchers Robert Wiggins who searches for public and exposed data found two servers had been compromised.
'We - Action - Servers - Public - Customers
'We have taken action to close one of our servers to the public and begun alerting customers that could potentially be impacted,' a TeenSafe spokesperson told ZDNet.
The database includes the child's device name - which is often just their name - and their unique identifier.
Server - Offline - Records - Customer - Data
Shortly before the server went offline, more than 10,200 records containing customer data were exposed.
None of the records contained photos, messages or the locations of either parents or children, the report revealed.
However, some of these were duplicates...
Wake Up To Breaking News!