Microsoft has detailed a high-severity flaw in the TikTok Android app that could have allowed an attacker to hijack an account when users click on a link.
Fortunately, developers at TikTok parent ByteDance quickly fixed the flaw after Microsoft researchers reported the issue to it in February through its bug bounty program, according to Dimitrios Valsamaras, a researcher with the Microsoft 365 Defender Research Team.
<div uuid="aed32fa0-1ae6-4be7-9615-18dae5d2d87e" uri="/api/component/editorial/aed32fa0-1ae6-4be7-9615-18dae5d2d87e" float="right" data-key="pinbox__b5c9bd22-eae2-5a5d-b595-093675b21fbc" api="{"content":[{"body":null,"dek":"The Telsa CEO cannot back out of his commitment to acquire Twitter, the social media company claims in court documents.","description":"The Telsa CEO cannot back out of his commitment to acquire Twitter, the social media company claims in court documents.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"d200779e-2abd-491f-b05f-788d8e28bc6a","title":"musk-twitter-gettyimages","filename":"musk-twitter-gettyimages.jpg","path":"https://www.zdnet.com/a/img/2022/04/29/d200779e-2abd-491f-b05f-788d8e28bc6a/musk-twitter-gettyimages.jpg","caption":"","tags":[],"size":64622,"width":1024,"height":683,"author":{"id":"0fb23a78-8176-11e2-9d12-0018fe8a00b0","username":"chrisduckett","email":"cduckett@redventures.com","firstName":"Chris","middleName":null,"lastName":"Duckett","dateCreated":{"date":"2006-09-01 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-02-14 17:48:17","timezone":"UTC","timezone_type":3},"ursId":"24318481750960793266356928318084","roles":[],"profiles":{"data":[{"id":"4b1902e9-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2006-09-01 10:08:43","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-07-20 15:14:00","timezone":"UTC","timezone_type":3},"language":"en","title":null,"byline":null,"bureau":"AU","authorBio":"Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and subsequently served as the Australian Editor of ZDNet.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"4b1902e9-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2006-09-01 10:08:43","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-07-20 15:14:00","timezone":"UTC","timezone_type":3},"language":"en","title":null,"byline":null,"bureau":"AU","authorBio":"Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and subsequently served as the Australian Editor of ZDNet.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":"dobes","googlePlus":"117720908650070931760","instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"Australia/Sydney","cmsDisplayName":"Chris Duckett","authorBlogs":[],"language":"en","title":null,"byline":null,"bureau":"AU","authorBio":"Chris started his journalistic adventure in 2006 as the Editor of Builder AU after originally joining CBS as a programmer. After a Canadian sojourn, he returned in 2011 as the Editor of TechRepublic Australia, and subsequently served as the Australian Editor of ZDNet.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null},"dateCreated":{"date":"2022-04-29 04:46:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-05-26 11:36:19","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"akub Porzycki/NurPhoto via Getty Images","alt":"Elon Musk Twitter profile displayed on a computer screen and Twitter logo displayed on a phone screen","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"The Telsa CEO cannot back out of his commitment to acquire Twitter, the social media company claims in court documents.","promoTitle":null,"slug":"the-saga-continues-twitter-sues-elon-musk-to-force-deal","title":"The saga continues: Twitter sues Elon Musk","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"114c901c-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":true,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":0,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"1720d8d4-3239-4b27-9e63-27930ccae3e8","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"81fd6790-dc6e-4170-8a3d-73c268a8876a","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"87b9d598-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"9a2b9f55-5df5-4170-8acd-930de4422e79","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f418f3cb-6ad3-47cb-9203-6bda4e5fc20f","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"fd5d6701-6556-4250-acf0-6c373fd8d8ca","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"8768c691-08ca-11e4-9732-00505685119a","name":"Social Media","description":null,"language":"en","slug":"social-media","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Social Media","description":null,"slug":"social-media","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"I would have called the Instagram tech support number, except — surprise! — there's no such thing. Oh foolish, foolish me.","description":"I would have called the Instagram tech support number, except — surprise! — there's no such thing. Oh foolish, foolish me.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"cf7e474a-e41a-4cc5-8d37-9bb339d205f8","title":"zd-pentest-ethical-hacking","filename":"zd-pentest-ethical-hacking.jpg","path":"https://www.zdnet.com/a/img/2022/03/15/cf7e474a-e41a-4cc5-8d37-9bb339d205f8/zd-pentest-ethical-hacking.jpg","caption":"","tags":[],"size":241564,"width":1200,"height":800,"author":{"id":"6d17551a-4abb-41b3-ba50-b9e6958598cf","username":"zdnetacademy","email":"jonathan.gross@stackcommerce.com","firstName":null,"middleName":null,"lastName":"StackCommerce","dateCreated":{"date":"2020-05-15 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-22 19:15:35","timezone":"UTC","timezone_type":3},"ursId":"28058608732035323797240764566623","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Contributor","role":"ROLE_CONTRIBUTOR"}],"profiles":{"data":[{"id":"4e67de0d-f889-4713-8dea-6b528d8bc9c8","dateCreated":{"date":"2020-05-15 19:46:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-23 17:19:12","timezone":"UTC","timezone_type":3},"language":"en","title":"Partner","byline":null,"bureau":null,"authorBio":"StackCommerce offers deals on training, certifications, and a variety of products and services.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"4e67de0d-f889-4713-8dea-6b528d8bc9c8","dateCreated":{"date":"2020-05-15 19:46:39","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-06-23 17:19:12","timezone":"UTC","timezone_type":3},"language":"en","title":"Partner","byline":null,"bureau":null,"authorBio":"StackCommerce offers deals on training, certifications, and a variety of products and services.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null,"typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":null,"googlePlus":null,"instagram":null},"suppressProfile":true,"editions":[],"defaultTimezone":"America/Los_Angeles","cmsDisplayName":"StackCommerce","authorBlogs":[],"language":"en","title":"Partner","byline":null,"bureau":null,"authorBio":"StackCommerce offers deals on training, certifications, and a variety of products and services.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":null},"dateCreated":{"date":"2022-03-15 21:12:15","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-03-15 21:12:20","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"StackCommerce","alt":"zd-pentest-ethical-hacking.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"I would have called the Instagram tech support number, except — surprise! — there's no such thing. Oh foolish, foolish me.","promoTitle":null,"slug":"my-instagram-account-was-hacked-and-two-factor-authentication-didnt-help","title":"My Instagram account was hacked, and two-factor authentication didn't help","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"113c25b6-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":false,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":6,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"02f76cc8-60a7-42e3-b095-85d5fceb201e","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"177e0dd2-ef13-4119-a775-e123c25752d7","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"26f2f74b-8aea-4cb8-8ad7-98ea6678f72f","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"578b5003-5398-44c2-b340-d94262af8075","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"8231dda1-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f84de0a6-d156-45c9-9500-543e34cc6419","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","slug":"security","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"Getting rid of your Facebook account takes a bit of work on your part.","description":"Getting rid of your Facebook account takes a bit of work on your part.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"c07f2c5e-8fa3-43de-ad09-f96ba4904ca0","title":"facebook-messenger","filename":"facebook-messenger.jpg","path":"https://www.zdnet.com/a/img/2021/07/21/c07f2c5e-8fa3-43de-ad09-f96ba4904ca0/facebook-messenger.jpg","caption":"","tags":[],"size":2320051,"width":1600,"height":1069,"author":{"id":"a24dfb36-55e8-491c-aa70-b8886fec93fa","username":"David Grober","email":"dgrober@redventures.com","firstName":"David","middleName":null,"lastName":"Grober","dateCreated":{"date":"2011-08-15 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2020-11-11 16:26:22","timezone":"UTC","timezone_type":3},"ursId":"78706119","roles":[{"name":"Editor","role":"ROLE_EDITOR"},{"name":"Sponsored Only","role":"ROLE_SPONSORED_ONLY"},{"name":"Super Admin","role":"ROLE_SUPER_ADMIN"},{"name":"Super User","role":"ROLE_SUPER_USER"}],"profiles":{"data":[{"id":"a671881c-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2011-08-15 12:17:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-07-20 15:29:30","timezone":"UTC","timezone_type":3},"language":"en","title":null,"byline":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News.","bureau":"AU","authorBio":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News. He served as managing editor for PC Week (now eWeek) and, later, Digital News. David made the leap from print to online publishing in 1994, when he joined Ziff-Net's Software Library. rnrnSince 9/11, David has worked in ZDNet's Business Technology Group, and now serves as ZDNet's managing editor.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":"David Grober has nothing to disclose and does not hold any investments.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"a671881c-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2011-08-15 12:17:04","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-07-20 15:29:30","timezone":"UTC","timezone_type":3},"language":"en","title":null,"byline":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News.","bureau":"AU","authorBio":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News. He served as managing editor for PC Week (now eWeek) and, later, Digital News. David made the leap from print to online publishing in 1994, when he joined Ziff-Net's Software Library. rnrnSince 9/11, David has worked in ZDNet's Business Technology Group, and now serves as ZDNet's managing editor.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":"David Grober has nothing to disclose and does not hold any investments.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":null,"googlePlus":null,"instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"America/New_York","cmsDisplayName":"David Grober","authorBlogs":[],"language":"en","title":null,"byline":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News.","bureau":"AU","authorBio":"David Grober has worked a variety of editorial roles in the technology media since 1982, when he joined the copy desk at IDG's Computer Business News. He served as managing editor for PC Week (now eWeek) and, later, Digital News. David made the leap from print to online publishing in 1994, when he joined Ziff-Net's Software Library. rnrnSince 9/11, David has worked in ZDNet's Business Technology Group, and now serves as ZDNet's managing editor.","expertise":null,"awardsAndCredentials":null,"education":null,"authorDisclosure":"David Grober has nothing to disclose and does not hold any investments."},"dateCreated":{"date":"2021-07-21 12:58:27","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2021-08-05 13:36:43","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":"Shutterstock","alt":"facebook-messenger.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"Getting rid of your Facebook account takes a bit of work on your part.","promoTitle":null,"slug":"how-to-delete-your-facebook-account-for-good","title":"How to delete your Facebook account for good","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"114c901c-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":true,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":0,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"1720d8d4-3239-4b27-9e63-27930ccae3e8","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"81fd6790-dc6e-4170-8a3d-73c268a8876a","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"87b9d598-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"9a2b9f55-5df5-4170-8acd-930de4422e79","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f418f3cb-6ad3-47cb-9203-6bda4e5fc20f","typeName":"content_topic_edition"},{"topic":"114c901c-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"fd5d6701-6556-4250-acf0-6c373fd8d8ca","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"8768c691-08ca-11e4-9732-00505685119a","name":"Social Media","description":null,"language":"en","slug":"social-media","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Social Media","description":null,"slug":"social-media","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"},{"body":null,"dek":"If you have the urge to reach out and help Ukrainians, we've compiled a list of donation sites and resources you can explore.","description":"If you have the urge to reach out and help Ukrainians, we've compiled a list of donation sites and resources you can explore.","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"image":{"id":"26ef474d-61c3-4188-af73-1fabe11a22d6","title":"headway3","filename":"headway3.jpg","path":"https://www.zdnet.com/a/img/2022/03/28/26ef474d-61c3-4188-af73-1fabe11a22d6/headway3.jpg","caption":"
Image: Anna Ustynova
","tags":[],"size":310916,"width":1673,"height":960,"author":{"id":"9a23272b-10d6-11e4-9732-00505685119a","username":"David Gewirtz","email":"david@zatz.com","firstName":"David","middleName":null,"lastName":"Gewirtz","dateCreated":{"date":"2011-02-17 00:00:00","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:24:50","timezone":"UTC","timezone_type":3},"ursId":"23406400086788310583051568294949","roles":[{"name":"CMS User","role":"ROLE_CMS_USER"},{"name":"Editor","role":"ROLE_EDITOR"}],"profiles":{"data":[{"id":"9a2a67c3-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2011-02-17 05:27:18","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:24:50","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Contributing Editor","byline":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, Distinguished Lecturer David Gewirtz is an author, U.S. policy advisor and computer scientist.","bureau":"US","authorBio":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President’s Book of Secrets, is one of America’s foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.rnrnDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today’s agile business movement.","expertise":"Digital transformation, cloud computing, cloud storage, big data, data center management, edge computing and IoT, e-commerce, data centers, smart cities","awardsAndCredentials":"~Sigma Xi Research Award in Engineering ~Candidate, Pulitzer Prize in Letters ~Kappa Delta Pi, International Honor Society in Education ~Example of Excellence, Western Governors University Teacher’s College ~Best Strategy, New Jersey Venture Council","education":"B.S. Computer Science with honors, Worcester Polytechnic Institute M.Ed. Learning and Technology, Western Governors University","authorDisclosure":"David has relationships with a variety of professional associations and nonprofit organizations. He is the executive director of U.S. Strategic Perspective Institute, a nonprofit research and policy organization. He is the cyberwarfare advisor for the International Association for Counterterrorism and Security Professionals. He is the IT advisor for the Florida Public Health Association, and an advisory board member for the Technical Communications and Management Certificate program at the University of California, Berkeley extension.rnrnDavid is a member of the FBI’s InfraGard program, the security partnership between the FBI and industry. David is also a member of the U.S. Naval Institute and the National Defense Industrial Association, the leading defense industry association promoting national security.rnrnTechnically, David is a government employee. He is employed by the State of California on behalf of the University of California, Berkeley extension, where he is a member of the instructional faculty and teaches object-oriented programming.rnrnMany of David’s projects find their way into ZDNet DIY-IT articles and are shared with readers worldwide. As part of David’s project work, various vendors supply David with products, services, advice, and support. Whenever he discusses an offering from one of these vendors in ZDNet editoral, David makes sure to disclose any support he’s received.rnrnAside from his equity stake in Component Enterprises, Inc., the firm that manages David’s contracts and financial affairs, David holds no stock in any other entities. From time-to-time, David’s holdings may include mutual funds or other financial instruments, but he has no direct visibility into the components of those funds or the companies they may invest in.rnrnComponent Enterprises also owns ZATZ Publishing, one of the first technology magazine publishers on the Internet. Today, more than 15 years of ZATZ archives remain online and the ZATZ technology sites update automatically with relevant news items of the day.rnrnZATZ is also home to David’s research projects, where he has developed breakthrough technologies like the ZENPRESS enterprise content management system and the AI Editor, a dynamic content analysis and editing system based on innovative artificial intelligence algorithms and heuristics.rnrnDavid is the author of a number of books, and receives royalties on books sales from a number of entities, including Amazon. David also provides his books free in digital form, as part of a grant to the U.S. Strategic Perspective Institute. When he mentions his books in editorial, he always provides a link to the free download location.rnrnDavid believes strongly in disclosure and transparency, and if he establishes any further relationships or partnerships with parties relevant to ZDNet editorial, he will make sure to disclose them to his editors, and in his columns and here, in this document.","typeName":"user_user_profile"}],"paging":{"total":1,"limit":15,"offset":0}},"profile":{"id":"9a2a67c3-10d6-11e4-9732-00505685119a","dateCreated":{"date":"2011-02-17 05:27:18","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-08-05 16:24:50","timezone":"UTC","timezone_type":3},"language":"en","title":"Senior Contributing Editor","byline":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, Distinguished Lecturer David Gewirtz is an author, U.S. policy advisor and computer scientist.","bureau":"US","authorBio":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President’s Book of Secrets, is one of America’s foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.rnrnDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today’s agile business movement.","expertise":"Digital transformation, cloud computing, cloud storage, big data, data center management, edge computing and IoT, e-commerce, data centers, smart cities","awardsAndCredentials":"~Sigma Xi Research Award in Engineering ~Candidate, Pulitzer Prize in Letters ~Kappa Delta Pi, International Honor Society in Education ~Example of Excellence, Western Governors University Teacher’s College ~Best Strategy, New Jersey Venture Council","education":"B.S. Computer Science with honors, Worcester Polytechnic Institute M.Ed. Learning and Technology, Western Governors University","authorDisclosure":"David has relationships with a variety of professional associations and nonprofit organizations. He is the executive director of U.S. Strategic Perspective Institute, a nonprofit research and policy organization. He is the cyberwarfare advisor for the International Association for Counterterrorism and Security Professionals. He is the IT advisor for the Florida Public Health Association, and an advisory board member for the Technical Communications and Management Certificate program at the University of California, Berkeley extension.rnrnDavid is a member of the FBI’s InfraGard program, the security partnership between the FBI and industry. David is also a member of the U.S. Naval Institute and the National Defense Industrial Association, the leading defense industry association promoting national security.rnrnTechnically, David is a government employee. He is employed by the State of California on behalf of the University of California, Berkeley extension, where he is a member of the instructional faculty and teaches object-oriented programming.rnrnMany of David’s projects find their way into ZDNet DIY-IT articles and are shared with readers worldwide. As part of David’s project work, various vendors supply David with products, services, advice, and support. Whenever he discusses an offering from one of these vendors in ZDNet editoral, David makes sure to disclose any support he’s received.rnrnAside from his equity stake in Component Enterprises, Inc., the firm that manages David’s contracts and financial affairs, David holds no stock in any other entities. From time-to-time, David’s holdings may include mutual funds or other financial instruments, but he has no direct visibility into the components of those funds or the companies they may invest in.rnrnComponent Enterprises also owns ZATZ Publishing, one of the first technology magazine publishers on the Internet. Today, more than 15 years of ZATZ archives remain online and the ZATZ technology sites update automatically with relevant news items of the day.rnrnZATZ is also home to David’s research projects, where he has developed breakthrough technologies like the ZENPRESS enterprise content management system and the AI Editor, a dynamic content analysis and editing system based on innovative artificial intelligence algorithms and heuristics.rnrnDavid is the author of a number of books, and receives royalties on books sales from a number of entities, including Amazon. David also provides his books free in digital form, as part of a grant to the U.S. Strategic Perspective Institute. When he mentions his books in editorial, he always provides a link to the free download location.rnrnDavid believes strongly in disclosure and transparency, and if he establishes any further relationships or partnerships with parties relevant to ZDNet editorial, he will make sure to disclose them to his editors, and in his columns and here, in this document.","typeName":"user_user_profile"},"socialProfileIds":{"facebookProfile":null,"facebookPage":null,"twitter":"DavidGewirtz","googlePlus":"108628332529353619308","instagram":null},"suppressProfile":false,"editions":[],"defaultTimezone":"Europe/London","cmsDisplayName":"David Gewirtz","authorBlogs":[],"language":"en","title":"Senior Contributing Editor","byline":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, Distinguished Lecturer David Gewirtz is an author, U.S. policy advisor and computer scientist.","bureau":"US","authorBio":"In addition to hosting the ZDNet Government and ZDNet DIY-IT blogs, David Gewirtz is an author, U.S. policy advisor, and computer scientist. He is featured in The History Channel special The President’s Book of Secrets, is one of America’s foremost cyber-security experts, and is a top expert on saving and creating jobs. He is also director of the U.S. Strategic Perspective Institute as well as the founder of ZATZ Publishing.rnrnDavid is a member of FBI InfraGard, the Cyberwarfare Advisor for the International Association for Counterterrorism & Security Professionals, a columnist for The Journal of Counterterrorism and Homeland Security, and has been a regular CNN contributor, and a guest commentator for the Nieman Watchdog of the Nieman Foundation for Journalism at Harvard University. He is the author of Where Have All the Emails Gone?, the definitive study of email in the White House, as well as How To Save Jobs and The Flexible Enterprise, the classic book that served as a foundation for today’s agile business movement.","expertise":"Digital transformation, cloud computing, cloud storage, big data, data center management, edge computing and IoT, e-commerce, data centers, smart cities","awardsAndCredentials":"~Sigma Xi Research Award in Engineering ~Candidate, Pulitzer Prize in Letters ~Kappa Delta Pi, International Honor Society in Education ~Example of Excellence, Western Governors University Teacher’s College ~Best Strategy, New Jersey Venture Council","education":"B.S. Computer Science with honors, Worcester Polytechnic Institute M.Ed. Learning and Technology, Western Governors University","authorDisclosure":"David has relationships with a variety of professional associations and nonprofit organizations. He is the executive director of U.S. Strategic Perspective Institute, a nonprofit research and policy organization. He is the cyberwarfare advisor for the International Association for Counterterrorism and Security Professionals. He is the IT advisor for the Florida Public Health Association, and an advisory board member for the Technical Communications and Management Certificate program at the University of California, Berkeley extension.rnrnDavid is a member of the FBI’s InfraGard program, the security partnership between the FBI and industry. David is also a member of the U.S. Naval Institute and the National Defense Industrial Association, the leading defense industry association promoting national security.rnrnTechnically, David is a government employee. He is employed by the State of California on behalf of the University of California, Berkeley extension, where he is a member of the instructional faculty and teaches object-oriented programming.rnrnMany of David’s projects find their way into ZDNet DIY-IT articles and are shared with readers worldwide. As part of David’s project work, various vendors supply David with products, services, advice, and support. Whenever he discusses an offering from one of these vendors in ZDNet editoral, David makes sure to disclose any support he’s received.rnrnAside from his equity stake in Component Enterprises, Inc., the firm that manages David’s contracts and financial affairs, David holds no stock in any other entities. From time-to-time, David’s holdings may include mutual funds or other financial instruments, but he has no direct visibility into the components of those funds or the companies they may invest in.rnrnComponent Enterprises also owns ZATZ Publishing, one of the first technology magazine publishers on the Internet. Today, more than 15 years of ZATZ archives remain online and the ZATZ technology sites update automatically with relevant news items of the day.rnrnZATZ is also home to David’s research projects, where he has developed breakthrough technologies like the ZENPRESS enterprise content management system and the AI Editor, a dynamic content analysis and editing system based on innovative artificial intelligence algorithms and heuristics.rnrnDavid is the author of a number of books, and receives royalties on books sales from a number of entities, including Amazon. David also provides his books free in digital form, as part of a grant to the U.S. Strategic Perspective Institute. When he mentions his books in editorial, he always provides a link to the free download location.rnrnDavid believes strongly in disclosure and transparency, and if he establishes any further relationships or partnerships with parties relevant to ZDNet editorial, he will make sure to disclose them to his editors, and in his columns and here, in this document."},"dateCreated":{"date":"2022-03-28 20:37:14","timezone":"UTC","timezone_type":3},"dateUpdated":{"date":"2022-03-28 20:37:18","timezone":"UTC","timezone_type":3},"needsModeration":false,"mimeType":"image/jpeg","deleted":false,"credits":null,"alt":"headway3.jpg","restricted":false,"startDate":null,"endDate":null,"preferred":false,"watermark":false,"doNotCrop":false,"doNotResize":false,"primaryCollection":null,"vanityUrl":null,"notes":null,"crop":null,"cropGravity":0,"preservedRegion":null,"isNew":false,"keywords":[],"primeColor":null,"hasWarning":false,"typeName":"content_image"},"label":null,"linkText":null,"linkUrl":null,"preferredProductName":null,"promoDek":"If you have the urge to reach out and help Ukrainians, we’ve compiled a list of donation sites and resources you can explore.","promoTitle":null,"slug":"how-you-can-help-ukraine-donation-sites-and-resources","title":"How you can help Ukraine: Donation sites and resources","topic":{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"113c25b6-ec91-11e3-95d2-02911863765e","deleted":false,"leaf":false,"topicPath":[{"id":"9d3e6108-0023-11e4-95d2-02911863765e","name":"Innovation","typeName":"content_topic","slug":"innovation","languages":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"4c7171e8-08ca-11e4-9732-00505685119a","name":"Innovation","description":"Discover the best technology ideas emerging from around the globe and how they are promising to help build a better future.","language":"en","slug":"innovation","vanityUrl":null,"typeName":"content_topic_language"}]}],"descendantCount":6,"type":{"id":"31bc3a04-c7a0-4fc1-b073-372a09f0cb0c","title":"Content","description":"Content","dateUpdated":null,"typeName":"content_topic_type"},"authors":{"data":[],"paging":{"total":0,"limit":15,"offset":0}},"editions":{"data":[{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"in","label":"India","prefix":"in/","lang":"en","translationLocale":"en_IN","locales":["en-in"],"timezone":"Asia/Kolkata","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"India Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"02f76cc8-60a7-42e3-b095-85d5fceb201e","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"eu","label":"EU","prefix":"eu/","lang":"en","translationLocale":"en_GB","locales":["de-at","ar-bh","en-be","bg-bg","el-cy","cs-cz","da-dk","pt-pl","et-ee","fi-fi","fr-fr","de-de","el-gr","hu-hu","it-it","lv-lv","lt-lt","de-lu","fr-lu","en-mt","nl-nl","pl-pl","pt-pt","ro-ro","sk-sk","sl-sl","es-es","sv-se","fr-ch","de-ch","tr-tk"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"EU Edition","currency_name":"Euro","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"177e0dd2-ef13-4119-a775-e123c25752d7","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"uk","label":"UK","prefix":"uk/","lang":"en","translationLocale":"en_GB","locales":["en-gb","en-ie","en-za","ka-ge","fa-ir","ar-iq","he-il","ar-jo","ar-kw","ar-lb","ar-om","ar-ps","ar-qa","ar-sa","ar-sy","ar-ae","ar-ye"],"timezone":"Europe/London","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"UK Edition","currency_name":"STG","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"26f2f74b-8aea-4cb8-8ad7-98ea6678f72f","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"au","label":"AU","prefix":"au/","lang":"en","translationLocale":"en_AU","locales":["en-au","en-nz"],"timezone":"Australia/Sydney","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"AU Edition","currency_name":"AUD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"578b5003-5398-44c2-b340-d94262af8075","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"us","label":"US","prefix":"","lang":"en","translationLocale":"en_US","locales":["en-us"],"timezone":"America/Los_Angeles","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"US Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"8231dda1-08ca-11e4-9732-00505685119a","typeName":"content_topic_edition"},{"topic":"113c25b6-ec91-11e3-95d2-02911863765e","edition":{"key":"as","label":"Asia","prefix":"as/","lang":"en","translationLocale":"en_SG","locales":["fa-af","hy-am","az-az","bn-bd","dz-bt","ms-bn","zh-cn","km-kh","en-hk","zh-hk","in-id","ja-jp","kk-kz","ky-kg","lo-la","ms-my","dv-mv","mm-mn","my-mm","ne-np","kr-kp","en-pk","en-ph","en-sg","si-lk","ko-kr","tg-tj","zh-tw","th-th","pt-tl","tk-tm","uz-uz","vi-vn"],"timezone":"Asia/Singapore","dateFormat":"MMMM d, yyyy — HH:mm z LOCALTIME","metadata":{"nav_label":"Asia Edition","currency_name":"USD","short_date":"MMM d, YYYY","long_date":"MMMM d, YYYY"}},"id":"f84de0a6-d156-45c9-9500-543e34cc6419","typeName":"content_topic_edition"}],"paging":{"total":6,"limit":15,"offset":0}},"languages":{"data":[{"canonicalUrl":null,"suppressSearch":false,"titleTag":null,"excludeFromRivers":false,"noIndex":false,"seoHeadline":null,"seoMetaDescription":null,"seoNewsKeywords":null,"relAlternate":null,"relHreflang":null,"relNext":null,"relPrev":null,"seoTwitterCreator":null,"seoTwitterTitle":null,"seoTwitterImage":null,"seoTwitterDescription":null,"seoOgDescription":null,"seoOgImage":null,"seoOgTitle":null,"siteSearchBoostKeywords":null,"tweetText":null,"id":"81e128a0-08ca-11e4-9732-00505685119a","name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","language":"en","slug":"security","vanityUrl":null,"typeName":"content_topic_language"}],"paging":{"total":1,"limit":15,"offset":0}},"name":"Security","description":"Software has holes, and hackers will exploit the new vulnerabilities that appear daily. Keep tabs on the latest threats.","slug":"security","landingPage":null,"listingPage":null,"typeName":"content_topic"},"typeName":"content_article"}],"title":"Social Media","view":"pinbox_text_list"}” class=”c-shortcodePinbox-textList c-shortcodePinbox-textList_floating g-border-thin-light-bottom g-outer-spacing-top-medium g-outer-spacing-bottom-medium”>
Social Media
The bug has now been assigned the identifier CVE-2022-28799, and while it is fixed, Microsoft is urging all TikTok users on Android to update the app to the latest version.
SEE: These are the biggest cybersecurity threats. Make sure you aren’t ignoring them
It’s a nasty flaw in the app’s exposed JavaScript interface that could be exploited via a WebView component of the TikTok Android app, which has been downloaded 1.5 billion times from the Google Play store. WebView is a component of Android that lets Android apps, which are written in the Java programming language and Java-compatible Kotlin, display web content.
“The TikTok application before 23.7.3 for Android allows account takeover… This may allow an attacker to leverage an attached JavaScript interface for the takeover with one click,” reads the MITRE entry for CVE-2022-28799.
As Valsamaras notes in a blogpost, there are two versions of the TikTok Android app. One (with the package name com.ss.android.ugc.trill) is for East and Southeast Asia and another (with the package name com.zhiliaoapp.musically) is for other regions. Both contained the vulnerability.
“We commend the efficient and professional resolution from the TikTok security team. TikTok users are encouraged to ensure they’re using the latest version of the app,” writes Valsamaras.
The vulnerability stems from the way TikTok developers implemented the app’s JavaScript interfaces in WebView. The interface can provide “bridge functionality”, so that JavaScript code in a web page invokes specific Java methods of a particular class in the app.
“Loading untrusted web content to WebView with application-level objects accessible via JavaScript code renders the application vulnerable to JavaScript interface injection, which may lead to data leakage, data corruption, or, in some cases, arbitrary code execution,” explains Valsamaras.
However, the actual vulnerability is in how the TikTok app handles a particular “deeplink” on Android, according to Valsamaras. Developers can use deeplinks to link to a chosen component within an app. When users click a deeplink, the Android package manager checks all installed apps to see which one can respond to the deeplink and then routs it to the company declared as its handler, Valsamaras notes.
TikTok’s implementation of JavaScript interfaces in the app defined the impact of the vulnerability.
“While reviewing the app’s handling of a specific deeplink, we discovered several issues that, when chained together, could have been used to force the application to load an arbitrary URL to the application’s WebView,” writes Valsamaras.
SEE: What, exactly, is cybersecurity? And why does it matter?
Microsoft found “more than 70 exposed methods” when checking the functionality accessible to the JavaScript code in web pages loaded to WebView. Combining the vulnerability with the exposed methods can give attackers extra functionality to view and change users’ private data.
By invoking these methods, the attacker can nab the user’s authentication tokens by triggering a request to a controlled server and logging the cookie and the request headers. The attacker can also retrieve or modify the user’s TikTok account data, such as private videos and profile settings.
“In short, by controlling any of the methods able to perform authenticated HTTP requests, a malicious actor could have compromised a TikTok user account,” writes Valsamaras.
Microsoft more broadly believes that developers using JavaScript interfaces is a bad idea and poses significant risks because compromising that interface can potentially allow attackers to execute code using the app’s ID and privileges. Microsoft has previously detailed flaws caused by JavaScript interfaces in several popular Android apps.
Microsoft recommends developers instead use an “approved list of trusted domains to be loaded to the application’s WebView to prevent loading malicious or untrusted web content.”
Google has also published a page for Android app developers to remediate JavaScript Interface Injection vulnerabilities.