12 Potentially Dangerous Apps for Kids

The average teen spends more than 9 hours a day in front of a screen (kids ages 8-12 spend six hours in front of a screen every day). It’s no wonder 54% of teens think they spend too much time on their cellphones. And what are they doing? Using their apps. Mobile apps account for nearly 90% of mobile use! The average smartphone user has between 60-90 apps on their phone, and while many are helpful, some can pose danger, especially to teens and kids. But which of these apps should keep parents awake at night? We think these 12 dangerous apps for kids are worth noting. We’ve chosen them due to their popularity and risk.

1. HIP

HIP is short for Hide it Pro. This app looks like a music manager, but its actual purpose is to store secret photos, videos and text messages. Kids use it to hide inappropriate material from their parents along with …

2. Calculator+

Another “hiding” app, this time using a simple calculator icon. By entering your own code, you can access hidden photos, contacts, browser history and passwords, all kept safely from a parent’s prying eyes.

3. Snapchat

If you have a teen or tween in your house, you probably have at least heard of Snapchat, which has more than 180 million users. Snapchat allows its users to send a photo or video from their phone, which then disappears after a few views. This “disappearing” feature, however, encourages the sharing of inappropriate photos. Unfortunately, it is fairly easy for the recipient to take a screen shot, keeping the image or text forever. For more information, we recommend connectsafely.org’s “A Parents’ Guide to Snapchat.”

4. Tinder

This popular app has more than 4 million users. On Tinder, you can post a selfie and people can “like” you. If you like him or her back, you can connect—the app even includes GPS tracking to help you find one another. Tinder describes itself as “the fun way to connect with new and interesting people around you,” but it’s mostly used as a dating tool or for one-night stands, even between teens and tweens. You only need to be 13-years old to use it, although there is no way to verify someone’s age. It attracts online predators which is why one blogger calls it: “The Worst App Ever for Teens and Tweens.”

5. Whisper

Whisper lets users, including kids, anonymously share whatever they’re really thinking. Does that sound good to you? It even includes a “nearby” section where you can see posts from people who live near you. Lots of trolls post racist, sexual, or abusive content, with plenty of guys asking teens for pictures of themselves. A 12-year-old girl in Washington was reportedly raped by a 21-year-old man who met her on Whisper, making this questionably-appropriate app one of the most dangerous apps for kids.

6. Kik

Kik lets users exchange videos, photos, sketches and gifs to anyone, even to people they are not friends with. There are no parental controls and kids can password protect their information so parents can’t see it. Since it lacks age authentication, predators can easily interact with kids. The app has also been connected with cyberbullying; Rebecca Sedwick, a 12-year old from Florida, committed suicide after receiving messages like “Go kill yourself.” As of 2016, Kik was reportedly used by approximately 40% of all teenagers in the United States.

7. Ask.fm

Ask.fm is a Q&A site where users can ask other users questions anonymously, which makes publishing suggestive or insulting questions pretty easy, and routine. A number of child suicides have been linked to cyberbullying from this app, making it another one of the most dangerous apps for kids.

8. TikTok

TikTok is an incredibly popular app for creating and sharing short videos, with more than 100 million users, many of them children as young as 10 or 11. Special effects can be added, and kids are encouraged to show their creativity. But there is also a lot of inappropriate language in the videos, and by default all accounts are set to public, letting strangers contact children easily.

9. YouTube

The video giant YouTube is one of the Internet’s most popular sites, with more than a billion users. It’s a great resource for educational videos and has robust privacy settings. Unfortunately, it’s also a great resource for inappropriate content, some of which is spliced into cartoons and other videos aimed at children. The most widespread problem, however, may be from user comments, which can be hurtful and bullying.

YouTube also attracts pedophiles. As Wired Magazine reports, “Videos of children showing their exposed buttocks, underwear and genitals are racking up millions of views on YouTube—with the site displaying advertising from major cosmetics and car brands alongside the content. Comments beneath scores of videos appear to show pedophiles sharing timestamps for parts of the videos where exposed genitals can be seen, or when a child does the splits or lifts up their top to show their nipples.”

10. Tellonym

Tellonym is an anonymous messenger app that calls itself “the most honest place on the internet.” It’s one of the most dangerous apps for kids because the app allows kids to ask and answer questions anonymously. So, as you might expect, cyberbullying, violent threats, and sexual content are prevalent. Messages can connect to social media accounts, so if a user writes something terrible about a classmate, it can be shared loudly with the rest of the world. Tellonym is particularly popular in middle schools and high schools.

11. Tumblr

On Tumblr, users can keep a diary, share photos and videos, and chat. This is another very popular website and app, with more than 450 million active blogs. But, like many sites that have no or uneven policing, users can post pornographic, violent and other inappropriate content. Common Sense Media says Tumblr is “too raunchy for tykes” and also notes that privacy settings aren’t easily set up. Plus, anyone can search for terms such as “suicide” and see hundreds of graphic images and blog articles, some of which glorify dangerous behavior. Tumblr has officially banned all “adult” content, but their efforts are not foolproof.

12. Instagram

With more than one billion users (and owned by Facebook) this photo-sharing site is incredibly popular. Users can add filters or create collages to share on social media platforms. While this site does not have as much inappropriate content as Tumblr, users can still find mature or inappropriate content and comments. People leaving mean-spirited and anonymous comments are common.

Be Smart about These Potentially Dangerous Apps for Kids.

In fairness to all of the apps in this list, or at least most of them, when used safely they can be fun, and help children connect with each other. But when in the wrong hands, or accessed by mean-spirited or an unintended audience, they verge from fun to potentially dangerous apps for kids.

Parents should be aware of the apps their children use, how they are being used, and educate their kids on their dangers. Knowing the best apps to use, along with the best Internet safety tips for kids can be incredibly important. At Single Path, we work with educators and businesses on cyber safety, security and education every day. If you have any questions about any of these potentially dangerous apps for kids, we invite you to reach out to us. We are always happy to answer your questions and help the wonderful world of the Internet be safer for everyone.

Contact us for questions, or to get started protecting your organization.

The Top 3 Mistakes that Businesses Make when Investing in IT

Whether you’re a new or established business, IT expenses come with the territory. It could be capital expenditures in the form of workstations, laptops or network hardware. Or maybe you’re revamping mobility and you need to deploy tablets to your field sales reps. Wi-fi not keeping up with demand? Now you’re looking at upgrading bandwidth from your service provider and adding new wireless access points. As the workplace becomes more reliant on always-up and state-of-the-art technology, these expenses are just a cost of doing business in the 21st century.

While almost all of the upgrades mentioned above are great for your business, they don’t come without caveats. Over our many years of working with clients, we’ve identified a few key points that a lot of businesses seem to miss when investing in IT and we’re here to help make sure that you see them.

  1. Not thinking about compatibility

Having Macs in the office is a great idea, but what if you’re running Outlook? Most people don’t stop to think about compatibility when they’re purchasing new technology for existing environments and to be honest, they shouldn’t be blamed. We expect everything to play nice because for the most part, it does. However, in a business environment where downtime and productivity makes a difference, incompatibility needs to be considered carefully. You could have a member of the executive team demand a shiny new iMac only to find out that MS Outlook doesn’t work the way he’s used to. Worse yet, you might have a wi-fi issue in the office and decide to buy an off-the-shelf router from BestBuy to “add to your network.” More often than not, mixing residential and commercial hardware can actually make the problem worse. Most compatibility issues don’t arise with a new office buildout or initial capital investment, because businesses normally contract with a managed services provider for an initial implementation or use their internal IT team. The problem normally happens when someone in IT leaves or the managed services partner is no longer on retainer and an employee without a strong IT background makes decisions on what the office needs to alleviate some technology problem. If you insist on keeping these decisions in-house and you don’t have an IT team, do your research! You’re better off partnering with a managed services provider to ensure there are no problems.

  1. Chasing the “new and shiny”

“Apple just came out with new cylinder computers, let’s buy them for the creative team!” “Surface Tablets for everyone on the sales team!” While it’s tempting to equip your employees with the latest and greatest technology, more often than not it can actually hinder them from doing their jobs. Most security loopholes and performance issues are found in new hardware in the first few months after their public release. It’s a good idea to let the market test new products instead of having your business play the guinea pig. On the surface, “new and shiny” seems like it only applies to hardware, but that’s not true. As Windows™ 10 hits the market and major companies are updating their software to be compatible, there’s going to be some growing pains. This can lead to swaths of downtime and it’s nearly always better to wait to update software to the newest release until after it can be tested on local workstations and in your network environment.

  1. Overlooking ancillary costs (training, downtime, etc.)

When businesses invest in IT there’s a tendency to think that the cost ends at the sticker price of the software or hardware. In reality, there are many other costs that factor in. When a new network drive needs to be installed you might lose access to it for a few hours. When you’re rolling out a new mobile sales solution, the sales team needs to be trained in order for it to actually make an impact. All of these issues are exacerbated when companies implement this internally without IT expertise.


A Few Helpful Tips for Single Path Customers

How Single Path customers can help themselves

Single Path offers to manage all IT needs for organizations like yours, so you can concentrate on what your core competencies. You can count on Single Path, and that hasn’t changed. There are, however, some things that you and your employees can do to help your server environment run properly to maximize efficiency and avoid downtime. Continue reading

Ten years, zero problems

A long-time Single Path customer
reports nothing but solid support.

Founded as an institutional investment firm in 1970, Institutional Capital (ICAP) manages money for some of the world’s largest and most respected corporations, public funds, foundations, endowments, and multi-employer plans. ICAP chose Single Path to install and manage their Cisco communications system in 2004, becoming one of Single Path’s charter customers. Continue reading

To Cloud or Not to Cloud:

Introduce Single Path’s Unified Communications Solutions to your clients

With all the talk of “the cloud” these days, it’s not surprising that many longtime Cisco on-premise customers are now considering the prospect of migrating to a “cloud-based” phone system. However, moving one’s voice solution to the cloud is not always the right decision. Continue reading

Professional Development for Education

Educational systems have traditionally taught children how to prepare for the working world, If you are new to those online writing services, you need to remain cautious. The number of fraudulent writers with access to fake websites has increased. They need trusted statistics assignment helper sites such as Famed Writings. Since the prototypical workplace environment has dramatically changed over the last twenty years, schools need to constantly adapt their curriculum(s) to keep up with such societal changes. Continue reading

Single Path’s 24/7 Customer Support: Proactive monitoring solves IT problems before you know you have them.

The Chicago White Sox
had a problem and it wasn’t on the field. Their Contact Center Server was about to fail, but they didn’t know it. Fortunately Single Path was paying attention. Proactive monitoring at our Network Operations Center revealed signs of imminent failure. We applied a patch to the server before it failed, preventing any outage or interruption to customer service for White Sox fans. Continue reading


The goal of the educational system should be to prepare its students for tomorrow’s adulthood. This has been the recurring theme throughout today’s educational reform discussion.  We’re knee-deep in the Information Age and that’s made the development of problem solving and critical thinking skills more crucial than ever to attain future success. Continue reading


Cisco’s Meraki brings the benefits of the cloud to enterprise networking: delivering easy to use, cost effective wired and wireless networks that are centrally managed over the web. Continue reading

What Tablet Is Best For You?

Tablets fall into two categories: iPad and Everything Else. Although the iPad wasn’t the first tablet invented or introduced to the market, its sleek, modern design and successful marketing blitz quickly made it the must-have item for gadget lovers. Continue reading