anybody no longer will be able to download or utilize this app because of the national security threat that it is. it will be a criminal offense if they do. >> reporter: despite the warnings, some elected leaders continue to maintain a presence on the social media giant. like california governor gavin n newsome. his office did not respond to cnn's request for comment. still, the warning from u.s. intelligence leaders remains stark. >> it's troubling to see what the chinese government could do to manipulate tiktok. >> reporter: for those who think, who cares if a foreign government is spying on me watching dog videos? cybersecurity experts say it goes beyond the app itself. you should only download apps from companies you trust, because any software you put on your smartphone could open up that device to tampering. josh campbell, cnn, los angeles. >> good reminder.
still the warning remains stark. >> it's genuinely troubling to see what the chinese government could do to manipulate tiktok. >> reporter: for those who think who cares, cybersecurity experts say the vulnerabilities go far beyond the app itself. you should only download apps from companies you trust. any app you put on your smartphone can open up the device to tampering. >> that's the important thing. josh, thank you so much for explaining that. that's truly the big take away here. coming in on cnn this morning, tributes are pouring in for pele. brick and mortar stores not dead yet. opening new stores in the new year. we'll tell you which.
techophile anyway. if you talk to any cybersecurity experts, they're going say, duh. the government is late to the party. >> taking the date sta but the manipulation is really what is a cause of concern on capitol hill as well. this is it for us on "inside politics sunday." a reminder we will have special live coverage of tomorrow's january 6th committee hearing at noon eastern time tomorrow on cnn. coming up next on "state of the union" jake's guests include congressman adam schiff and congressman pat toomey. thank you for sharining your sunday with us. have a great rest of your day. for a cleaner, healthier mouth. listerine. feel the whoa! it's the subway series menu. 12 irresistible subs. the most epic sandwich roster ever crted.
66% of cybersecurity analysts reported burnout this year, which may harm their mental health. Because of the staggering average cost of $4. 35 million per data breach, security analysts are under continual pressure to safeguard valuable data assets.
million downloads this month. how much are you seeing this in your social feed? >> my entire social feed. >> reporter: crystal loves her magic avatars from an app with a viral feature that allows users to upload images of themselves or others and with artificial intelligence turn them into this. >> i was able to see myself in a light i had never seen myself. >> reporter: they aren't the only thing getting people talking. so is number five of terms of use that says in part -- you grant us a non-exclusive licensable license to use, reproduce, modify, create works >> if you are a user who wants to use it, you agree that any photographs you give to them they can use it however they want. >> reporter: that has cybersecurity experts concerned.
>> krystal loves her magic avatars, from lenses a i, a photo and video editing app with a new viral featured that allows viewers to upload images of themselves or others. and with the help of artificial intelligence, turn them into this. >> i was able to see myself in a light, as a creator, and an actress, that i had never seen myself before. >> but avatars are the only thing getting people talking. so is number five of the terms of use that says in part, you grant us a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, felipe, transferable, supplies visible used to reproduce, modify, distribute, create derivative or's of your user contests. >> in plain terms, if you want to use this app, you agree that any photographs you give them, they can use it however they want. >> and that has cybersecurity experts concerned. >> what is the danger in getting this company your face? >> your face is something used
so is number five of the terms of use that says in part, you grant us a perpetual, irrevocable, nonexclusive, royalty-free, worldwide, fully paid, transferable, license to use, reproduce, modify, distribute, create derivative or's of your user contests. >> in plain terms, if you want to use this app, you agree that any photographs you give them, they can use it however they want. >> and that has cybersecurity experts concerned. >> what is the danger in giving this company or face? >> your face is something used to identify you. and can unlock your identity around the world, online. >> the app is owned by prisma labs, the companies whose founders according to lengthen pages, previously worked in russia. prisma, and cooperated in the u.s., tells nbc news that we don't have any presence in the russian federation. they also said that photos will
GUEST OPINION by Lani Refiti, ANZ Regional Director of cybersecurity firm Claroty: The Australian Government has recently announced a team comprising...
longer, more severe breach we're confirming now from common spirit hospital system. they were attacked back in october. hackers hijacked the system and demanded payment to let doctors and hospital administrators back in. common spirit runs 140 hospitals. over 1,000 cancer clinics. surgery hubs and stroke centers. that hack has had some very real consequences for patients. look at this. a 3-year-old was overdoses on pain medication in des moines after having his tonsils removed. his mother says he was given five times his prescribed dose and two times his body weight. doctors told her it happened because of that hack saying it shut down his records. jay was then readmitted to the hospital for urgent care. cybersecurity experts say the hack has left 20 million americans across 21 states now at risk of dangerous healthcare like jay received. but unfortunately it is nothing
extracts the contents including everything messages, photos, contacts, and video. it is created by an israeli spy ware firm black listed by the u.s. government. cybersecurity experts call it a powerful and stealthy cyber weapon. take a listen.>> it uses 0 clic order to infect the target's phone without requiring any interaction from the target user. much more sophisticated in the way it collects data on user's phones. >> lawmakers are worried the f.b.i., though they didn't use it yet, may take it up in the future without oversight. >> bill: wow, gillian turner, thank you. we'll follow it. >> dana: homeland security secretary mayorkas and f.b.i. director wray are facing questions on national security from the chaos at the southern border as well as the chaotic departure of cbp commissioner