{"id":94741,"date":"2019-03-23T07:00:09","date_gmt":"2019-03-23T14:00:09","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94741"},"modified":"2025-05-18T20:06:27","modified_gmt":"2025-05-19T03:06:27","slug":"hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/","title":{"rendered":"Hidden &#038; Fake Apps: How Hackers Could Be Targeting Your Connected Home"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-94757\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\" alt=\"\" width=\"513\" height=\"281\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1-300x164.jpg 300w\" sizes=\"auto, (max-width: 513px) 100vw, 513px\" \/>Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The only thing you may have overlooked is the smartphone illuminated on your nightstand. And if you were to add up the smartphones humming all over your house, suddenly you&#8217;d have a number of unlocked doors that a determined criminal could enter through. Maybe not tonight \u2014 but eventually.<\/p>\n<h2><strong>Digital Ecosystem<\/strong><\/h2>\n<p>Over time you\u2019ve purchased and plugged in devices throughout your home. You might have a voice assistant, a baby monitor, a thermostat, a treadmill, a gaming system, a fitness watch, smart TVs, a refrigerator, and many other fun, useful gadgets. Each purchase likely connects to your smartphone. Take stock: You now have a digital ecosystem growing all around you. And while you rarely stop to take notice of this invisible power grid around you, hackers can&#8217;t stop thinking about it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-94761 alignright\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/shutterstock_521452618.jpg\" alt=\"\" width=\"312\" height=\"208\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_521452618.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_521452618-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_521452618-768x512.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_521452618-750x500.jpg 750w\" sizes=\"auto, (max-width: 312px) 100vw, 312px\" \/><\/p>\n<p>This digital framework that pulsates within your home gives cybercriminals potential new entryways into your life and your data. Depending on your devices, by accessing your smartphone, outsiders may be able to unlock your literal doors while you are away (via your home security system), eavesdrop on your family conversations and collect important information (via your voice assistant), access financial information (via your gaming system, tablet, or laptop).<\/p>\n<h2><strong>What you can do:<\/strong><\/h2>\n<ul>\n<li><strong>Change factory security settings.<\/strong> Before you fire up that smart TV, drone, or sound system, be sure to change each product&#8217;s factory settings and replace it with a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/tips-for-creating-passwords\/\">bulletproof password<\/a>\u00a0to put a layer of protection between you and would-be hackers.<\/li>\n<li><strong>Protect your home network.<\/strong> We are connected people living in connected homes. So, part of the wired lifestyle is taking the lead on doing all we can to protect it. One way to do that is at the router level with <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=223304\">built-in network security<\/a>, which can help secure your connected devices.<\/li>\n<li><strong>Stay on top of software updates.<\/strong> Cybercrooks rely on consumers to ignore software updates; it makes their job so much easier. So be sure to install updates to your devices, <a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog.html?_ga=2.230805791.1833046487.1553123940-149906154.1498739887\">security software<\/a>, and IoT products when alerted to do so.<\/li>\n<\/ul>\n<h2><strong>Smartphone = Front Gate<\/strong><\/h2>\n<p>The most common entry point to all of these connected things is your smartphone. While you\u2019ve done a lot of things to protect your phone \u2014 a lock screen, secure passwords on accounts, and system updates \u2014 there are hacking tactics you likely know nothing about. According to McAfee&#8217;s recent <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-mobile-threat-report-2019.pdf?_ga=2.167974177.1833046487.1553123940-149906154.1498739887\">\u00a0Mobile Threat Report<\/a>, you don\u2019t know because the scope and complexity of mobile hacks are increasing at alarming rates.<\/p>\n<h2><strong>Hidden Apps<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-94758 alignright\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/shutterstock_181909460.jpg\" alt=\"\" width=\"278\" height=\"185\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_181909460.jpg 500w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_181909460-300x200.jpg 300w\" sizes=\"auto, (max-width: 278px) 100vw, 278px\" \/><\/p>\n<p>The latest statistics report that the average person has between 60-90 apps installed on their phones. Multiply that between all the users in your home, and you are looking at anywhere from 200-500 apps living under your digital roof. Hackers gravitate toward digital trends. They go where the most people congregate because that\u2019s where they can grab the most money. Many of us control everything in our homes from our apps, so app downloads are off the charts, which is why crooks have engineered some of their most sophisticated schemes specifically around app users.<\/p>\n<p>Hidden apps are a way that crooks trick users into letting them inside their phones. Typically, hidden apps (such as TimpDoor) get to users via Google Play when they download games or customized tools. TimpDoor will then directly communicate with users via a text with a link to a voice message that gives detailed instructions to enable apps from unknown sources. That link downloads malware which will run in the background after the app closes. Users often forget they\u2019ve downloaded this and go on with life while the malware runs in the background and can access other internal networks on the smartphone.<\/p>\n<h2><strong>What you can do:<\/strong><\/h2>\n<ul>\n<li><strong>Stay alert. <\/strong>Don\u2019t fall for the traps or click\u00a0links\u00a0to other apps sent via text message.<\/li>\n<li><strong>Stay legit.<\/strong> Only download apps hosted by the original trusted stores and verified partner sites.<\/li>\n<li><strong>Avoid spam.<\/strong> Don\u2019t click on any email links, pop-ups, or direct messages that include suspicious links, password prompts, or fake attachments. Delete and block spam emails and texts.<\/li>\n<li><strong>Disable and delete.<\/strong> If you are not using an app, disable it. And, as a safety habit, remove apps from your phone, tablet, or laptop you no longer use.<\/li>\n<\/ul>\n<h2><strong>Fake Apps<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-94759 alignright\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/shutterstock_1287455440.jpg\" alt=\"\" width=\"276\" height=\"207\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1287455440.jpg 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1287455440-300x225.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1287455440-768x576.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1287455440-667x500.jpg 667w\" sizes=\"auto, (max-width: 276px) 100vw, 276px\" \/>Again, crooks go where the most people congregate, and this year it is the 60 million+ downloaded game <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/why-kids-love-playing-fortnite-and-what-parents-need-to-know\/\">Fortnite<\/a>. The Fortnite craze has lead hackers to design fake Fortnite apps masquerading as the real thing. The fraudulent app designers go to great lengths to make the download look legitimate. They offer enticing downloads and promise users a ton of free perks and add ons. Once users download the fake app, crooks can collect money through ads, send text messages with more bad app links, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/family-safety\/cryptojacking-up-4000-how-you-can-block-the-bad-guys\/\">crypto jack\u00a0users<\/a>, or install malware or spyware.<\/p>\n<h2><strong>What you can do:<\/strong><\/h2>\n<ul>\n<li><strong>Don\u2019t install apps from unknown sources.<\/strong> Not all gaming companies distribute via Google Play or the App Store. This makes it even harder for users to know that the app they are downloading is legit. Do all you can to verify the legitimacy of the site you are downloading from.<\/li>\n<li><strong>Delete suspicious acting apps.<\/strong> If you download an app and it begins to request access to anything outside of its service, delete it immediately from your device.<\/li>\n<li><strong>Update devices regularly.<\/strong> Keep new bugs and threats at bay by updating your devices automatically.<\/li>\n<li><strong>Monitor bank statements.<\/strong> Check statements regularly to monitor the activity of the card linked to your Fortnite account. If you notice repeat or multiple transactions from your account or see charges that you don\u2019t recognize, alert your bank immediately.<\/li>\n<li><strong>Be a savvy app user.<\/strong> Verify an app\u2019s legitimacy. Read other user reviews and be discerning before you download anything. This practice also applies to partner sites that sell game hacks, credits, patches, or virtual assets players use to gain rank within a game. Beware of \u201cfree\u201d downloads and avoid illegal file-sharing sites. Free downloads can be hotbeds for malware. Stick with the safer, paid options from a reputable source.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to&#8230;<\/p>\n","protected":false},"author":642,"featured_media":94757,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838,12],"tags":[37,4322,76,3949,4452,32,5700,5598,5701,142,4131,5702,180,2205,4140,5422,5703],"coauthors":[3359],"class_list":["post-94741","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","category-family-safety","tag-android","tag-app-security","tag-cybercrime","tag-cybersafety","tag-cybersecurity","tag-data-protection","tag-fake-apps","tag-fortnite","tag-hidden-apps","tag-tag-identity-theft","tag-internet-of-things","tag-malicious-apps","tag-malware","tag-protecting-kids-online","tag-quarterly-threats-report","tag-strong-passwords","tag-timpdoor"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hidden &amp; Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family&#039;s data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hidden &amp; Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family&#039;s data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-23T14:00:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-19T03:06:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"274\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Toni Birdsong\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Toni Birdsong\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\"},\"author\":{\"name\":\"Toni Birdsong\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\"},\"headline\":\"Hidden &#038; Fake Apps: How Hackers Could Be Targeting Your Connected Home\",\"datePublished\":\"2019-03-23T14:00:09+00:00\",\"dateModified\":\"2025-05-19T03:06:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\"},\"wordCount\":1046,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\",\"keywords\":[\"android\",\"app security\",\"cybercrime\",\"cybersafety\",\"cybersecurity\",\"data protection\",\"fake apps\",\"Fortnite\",\"hidden apps\",\"identity theft\",\"Internet of Things\",\"malicious apps\",\"malware\",\"protecting kids online\",\"Quarterly Threats Report\",\"strong passwords\",\"TimpDoor\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\",\"Family Safety\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\",\"name\":\"Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\",\"datePublished\":\"2019-03-23T14:00:09+00:00\",\"dateModified\":\"2025-05-19T03:06:27+00:00\",\"description\":\"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family's data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg\",\"width\":500,\"height\":274},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hidden &#038; Fake Apps: How Hackers Could Be Targeting Your Connected Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228\",\"name\":\"Toni Birdsong\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg\",\"caption\":\"Toni Birdsong\"},\"description\":\"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog","description":"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family's data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog","og_description":"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family's data.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-23T14:00:09+00:00","article_modified_time":"2025-05-19T03:06:27+00:00","og_image":[{"width":500,"height":274,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg","type":"image\/jpeg"}],"author":"Toni Birdsong","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Toni Birdsong","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/"},"author":{"name":"Toni Birdsong","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228"},"headline":"Hidden &#038; Fake Apps: How Hackers Could Be Targeting Your Connected Home","datePublished":"2019-03-23T14:00:09+00:00","dateModified":"2025-05-19T03:06:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/"},"wordCount":1046,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg","keywords":["android","app security","cybercrime","cybersafety","cybersecurity","data protection","fake apps","Fortnite","hidden apps","identity theft","Internet of Things","malicious apps","malware","protecting kids online","Quarterly Threats Report","strong passwords","TimpDoor"],"articleSection":["Internet Security","Mobile Security","Family Safety"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/","name":"Hidden & Fake Apps: How Hackers Could Be Targeting Your Connected Home | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg","datePublished":"2019-03-23T14:00:09+00:00","dateModified":"2025-05-19T03:06:27+00:00","description":"Like most parents, before you go to sleep each night, you take extra care to lock doors and windows to keep your family safe from any outside threats. The Hackers access consumer data in unthinkable ways. Learn more about how hidden and fake apps are giving cybercriminals an open door to your family's data.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/shutterstock_1093322477-1.jpg","width":500,"height":274},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/hidden-fake-apps-how-hackers-could-be-targeting-your-connected-home\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Hidden &#038; Fake Apps: How Hackers Could Be Targeting Your Connected Home"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/43ae9712cde24fe81854f2daa0af1228","name":"Toni Birdsong","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/de48b651aa67772c9c2a8d7e7eee076a","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2016\/10\/Toni-Black-Shirt-Headshot-150x150.jpeg","caption":"Toni Birdsong"},"description":"Toni Birdsong began her career as a reporter in Los Angeles and later became a writer for Walt Disney Imagineering. Her passion for digital safety started 10 years ago as a way to gain the survival skills she needed to parent her own connected teenagers. Her goal with each post is to give busy parents the insight they need raise wiser, more compassionate digital kids. When she\u2019s not writing (her first love), you can find Toni hiking, watching TikTok, or trying not to break an important body part at CrossFit.","url":"https:\/\/www.mcafee.com\/blogs\/author\/toni-birdsong\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/642"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94741"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94741\/revisions"}],"predecessor-version":[{"id":213663,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94741\/revisions\/213663"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94757"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94741"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94741"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94741"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}