Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

11/29/2011
07:54 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Anti-Sexting Application Enables Parents To Monitor Sexting & Other Inappropriate Behavior By Their Children

Wyd Eye Software launches PicsChecker

CHICAGO, Nov. 29, 2011 /PRNewswire/ -- Wyd Eye Software, a family-owned business in northern Illinois, has launched a new anti-sexting application that allows parents to monitor the texts and photos their children transmit on their mobile phones.

For more information about PicsChecker, please visit www.picschecker.com.

PicsChecker delivers parents a daily report on their children's mobile phone transmissions, giving parents a tool to monitor objectionable content and, if necessary, to intervene to deter inappropriate use of a child's mobile phone.

"PicsChecker is based on the simple premise that if a child knows that mom or dad will get a copy, too, the child will be a lot less likely to send something inappropriate," said Wyd Eye Software President Jeremy Witkins of Algonquin, Illinois. "It also gives the child a tool to combat peer pressure to engage in inappropriate behavior."

Sexting is becoming an increasingly common occurrence, Witkins said.

-- Surveys show that 39 percent of teens are sending or posting sexually suggestive messages and that one in five teens admit to having sent nude or semi-nude photos. -- A recent University of Michigan poll showed that parents now consider sexting one of their top ten concerns about the health and well-being of their children. PicsChecker, developed for Android phones, is the first application to deliver content in a daily email to parents, eliminating the need for parents to go to a server and sift though pages of reports. It has a market potential of 27 million underage users, a number that is only growing, as smart phones are being marketed to underage users.

"We know that today's parents don't have 20 minutes a night to look through reports and logs, to see if their child sent an inappropriate photo or message," continues Witkins. "So we designed PicsChecker to deliver the content the parent wants in a simple, easy-to-read email."

How PicsChecker Works :

-- Once installed, PicsChecker records all outbound SMS and MMS, as well as all photos taken on a phone. The recorded events are then periodically sent to the Wyd Eye server and logged. -- Once a day, the events the parents have chosen to monitor are emailed to the parents. PicsChecker also reports the phone numbers or emails messages were sent to, with a time stamp. -- Parents then have the information they need to evaluate transmissions and decide if it is necessary to intervene to stop the sending of inappropriate content. PicsChecker does not view or use received content in any way other than to transmit to parents, and content received by the server is regularly purged after 10 days. Parents have the legal right to monitor use of their children's phones because the parents own the phones used by their children.

The phone's user is reminded that PicsChecker is installed on the phone by an icon on the phone's display.

Wyd Eye Software

Wyd Eye Software was founded by Jeremy Witkins in the fall of 2009. Jeremy and his wife, Cary, had recently become licensed foster parents. They began to ask family members, several of whom are teachers, about issues that cause parents concern. Sexting by young people was often mentioned by the teachers, who had noticed the harmful effects it could have on their students.

Looking for solutions, Witkins found none. So he decided to develop a smart phone application that allowed parents and children to work together to make sure the child did not get caught up in the sexting epidemic.

In 2010, Witkins partnered with his parents, Joseph and Janie Witkins. Together, Jeremy and Joe Witkins have more than 30 years of experience in the telecommunications business.

After months of development work, PicsChecker was launched. It is now available on the Wyd Eye and PicsChecker websites and through the Android application store for $3.99 per month, without a contract.

PicsChecker will soon be available through other telephone carriers' application websites.

SOURCE Wyd Eye Software

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
The Data-Centric Path to Zero Trust
Altaz Valani, Director of Insights Research, Security Compass,  1/13/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-7343
PUBLISHED: 2021-01-18
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.
CVE-2020-28476
PUBLISHED: 2021-01-18
All versions of package tornado are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with default configura...
CVE-2020-28473
PUBLISHED: 2021-01-18
The package bottle from 0 and before 0.12.19 are vulnerable to Web Cache Poisoning by using a vector called parameter cloaking. When the attacker can separate query parameters using a semicolon (;), they can cause a difference in the interpretation of the request between the proxy (running with defa...
CVE-2021-25173
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory allocation with excessive size vulnerability exists when reading malformed DGN files, which allows attackers to cause a crash, potentially enabling denial of service (crash, exit, or restart).
CVE-2021-25174
PUBLISHED: 2021-01-18
An issue was discovered in Open Design Alliance Drawings SDK before 2021.12. A memory corruption vulnerability exists when reading malformed DGN files. It can allow attackers to cause a crash, potentially enabling denial of service (Crash, Exit, or Restart).