Get Help Now

From the Cybersecurity News Desk

Serious TikTok Security Risks

App Collects Excessive & Concerning Amounts of Data

Forbes has reported a serious security risk associated with the popular social media app TikTok. When users enter a website through a TikTok link, the app will insert specialized code that can monitor keystrokes and access clipboard content. This allows for the capturing of user data, passwords, usernames, activities, and even credit card information if purchases are made.

This revelation comes during the height of current security concerns with the highly popular app (Google Play Store reports over 1 billion downloads) primarily stemming from government bodies and military organizations.  In July, a report by Australian-US security firm Internet 2.0 published findings indicating that the app collects ‘excessive’ and ‘concerning’ amounts of data from its users. The capabilities range from user contact lists, calendar appointments, and even the ability to scan hard drives and geolocate registered devices.

GreyCastle Security suggests that in order to protect organizations from potentially sensitive information disclosure, users should be restricted in their ability to download and install the TikTok app on any organization-owned devices. This includes both corporate issued phones as well as laptop and desktop computers. Organizations should also educate personnel on the potential security risks of having TikTok installed on their personal devices.

To read more about this and other current cyber threats, visit this week’s GreyCastle Security’s Threat Intelligence Briefing.

See How We Can Help!

Fill out this form and we’ll be in touch shortly

    Number of Employees - select one:
    Industry - select one:

    Through our comprehensive approach to cybersecurity, we’ll help train your employees on cybersecurity dangers.


    Be Proactive with Penetration Testing

    We can reveal if there are weaknesses in your systems.

    Achieve Readiness with Managed SOC

    Connect people, process & technology in one workflow.

    Cybersecurity Incidents Happen

    Plan, prevent, and mitigate with our incident response team.

    View expert analysis on the latest threats 

    Finding qualified security professionals can be difficult and costly.

    Ours are the best. Put them to work for you.

    Contact Us
    Privacy Settings
    We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
    Consent to display content from - Youtube
    Consent to display content from - Vimeo
    Google Maps
    Consent to display content from - Google
    Consent to display content from - Spotify
    Sound Cloud
    Consent to display content from - Sound
    Contact Us