Skip to the main content.

1 min read

Decoy Apps—The Digital Secrets Your Child May Be Hiding.

As a parent, there are so many things to worry about. And with them now using technology, there’s something more to be concerned about.

decoy apps

Decoy apps (also known as secret, safe or vault apps).

What Are Decoy Apps and How Do They Work?

These are applications that allow a child to hide text messages and pictures on their smartphone. They “jailbreak” their phones, and disable the limitations set by the cell phone provider. Once accomplished, they can download the decoy apps.

Decoy apps are disguised as innocent-looking calculators or music apps. When inspecting your child’s phone you probably won’t recognize them. For example, a Secret Calculator decoy app allows them to hide photos, videos, documents and PDF files behind a calculator that works.

You may think it’s just an ordinary calculator, but when the child enters his or her password, they have access to their secret files. They keep their password private, and give you a fake one. This way you only see what they want you to, and you have no idea what’s actually hiding behind these apps.

Why should you worry? — Because with today’s sexting and cyberbullying, your child may be hiding things that could get him or her into trouble.

So what can you do?

  • Set the phone back to factory settings, and monitor what they are adding.
  • Set up parental controls on your child’s device.
  • Along with checking their Instagram or text messages, keep tabs on any new apps.
  • “Google” their apps to determine if they are decoys.

What’s hiding in plain sight on your child’s phone? Contact {company} to learn more. {phone} {email}

Nest, Google’s Smart Home Division, Discovers Leaked Passwords and Contacts Customers

Nest, Google’s Smart Home Division, Discovers Leaked Passwords and Contacts Customers

Nest Labs, a division of Google, recently discovered a list of email addresses and passwords that had been published online. As part of their ongoing...

Read More
Mexican Refugees Seek Asylum in Canada Due to Fallout from Exposing Secret Cyberattack Plot Against the United States

Mexican Refugees Seek Asylum in Canada Due to Fallout from Exposing Secret Cyberattack Plot Against the United States

An international plot to infiltrate banks, intelligence centers and nuclear facilities in the United States. A secret Mexican cybersecurity team...

Read More
Does your existing IT Support Provider disrupt your day and bill you for doing so?

Does your existing IT Support Provider disrupt your day and bill you for doing so?

We don’t bill you for work that is our responsibility. We offer plans for an hourly fee or managed IT services for a flat-rate fee, so you can choose...

Read More