TikTok app

TikTok Fixes Cybersecurity Flaws That Could Have Allowed Hackers to Upload, Delete Videos

Following the disclosure of several security issues, TikTok issued a patch to ensure that user privacy was protected.

After a team of Israeli cybersecurity researchers discovered a number of security issues with the popular video app TikTok, the company has taken steps to fix the cybersecurity flaws and ensure that hackers are not able to access personal user information.

The researchers, from Check Point Research, published a report on Wednesday that demonstrated how hackers could upload or delete videos off of user accounts and access personal user information, such as email addresses and birthdays. Most shocking was the fact that the researchers were able to manipulate the links sent to users by text when they signed up for a TikTok account.

Once the user clicked on the link, hackers would be able to control the account, NBC News reported.

“Check Point researchers learned that a hacker can force a TikTok user onto a web server controlled by the hacker, making it possible for the attacker to send unwanted requests on behalf of the user," the research team wrote in a press release.

There was no indication that a hacker took advantage of the flaws before the researchers notified TikTok of the issues in November.

“Check Point Research informed TikTok developers about the vulnerabilities exposed in this research and a solution was responsibly deployed to ensure its users can safely continue using the TikTok app,” the firm wrote.

In response to the report, Luke Deshotels, who works for TikTok’s security team, said in a statement provided to CheckPoint that TikTok encourages researchers to privately disclose vulnerabilities to the company so that they can be fixed before the flaws are public.

“Before public disclosure, CheckPoint agreed that all reported issues were patched in the latest version of our app,” Deshotels said. “We hope that this successful resolution will encourage future collaboration with security researchers.”

TikTok has faced frequent scrutiny from security experts and lawmakers over the past year who are concerned over the app’s Chinese ownership. ByteDance, the Chinese company that owns TikTok, has been accused of censoring content considered offensive to China and collecting user data that can then be shared with the government.

The Department of Commerce is currently conducting a national security review of ByteDance’s purchase of American app Musical.ly, TikTok’s precursor. In addition, the app paid a multi-million dollar fine in 2019 to settle accusations that it violated the Children’s Online Privacy Protection Act by collecting personal information about kids without requiring parental consent.

About the Author

Haley Samsel is an Associate Content Editor for the Infrastructure Solutions Group at 1105 Media.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • Securing the Flow of Operations

    The transportation industry is a complex and dynamic environment where efficient management of physical keys, vehicles and shared devices is critical to ensuring smooth operations, reducing costs and maintaining security. Every day, more transportation facilities are using modern electronic key and asset management systems to better secure, audit and manage the important assets that keep operations running smoothly. Read Now

  • Today's Enterprise

    Protecting servers and data has evolved rapidly over the past 15-plus years. Early on, concerns centered around the environmental conditions of where servers were housed within a building and the effects of humidity, temperature and air quality on their performance. This led to a better understanding of the need for a controlled environment to maximize equipment lifespan and capacity. It was also a driving force behind consolidating servers in a common space, i.e., the data center. Read Now

  • Study Proves It: Security Awareness Training Reduces Phishing Attacks

    Attackers are increasingly targeting human-based vulnerabilities to infiltrate organizations. Humans have direct access to insider systems and data – any threat actor can easily phish users, steal their credentials and secure keys to the kingdom without having to fight advanced cybersecurity defenses. Studies show social engineering attacks and human errors are behind 68% of all breaches.  Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3