• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Protected Documents

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

FaceApp: The Russian Company That Wants Your Selfie

Data breaches are back in the news. Capital One, one of the biggest banks and credit card issuers on the globe just reported that 106 million user’s personal details were stolen by a rogue employee.  No one knows where it ended up; the investigation is just getting started.

Your personal information – social security numbers, birthdates, answers to “secret” questions, are the keys fraudsters employ to gain access to your accounts. Now a new piece of data is frequently being used as well: Your face.  

The logic is simple – who else has your face but you? But facial recognition technology is as hackable as anything else, and our selfies are making it way too easy for the bad guys to know exactly what we look like.

FaceApp is a mobile phone application that’s recently gone viral. Millions of users have downloaded it and used the fun filters to see what they’d look like as old folks. You’ve probably seen the results on Facebook or Twitter.

It’s fun. But risky too. Here’s why:

What you didn’t know is that FaceApp is run by a Russian company, a company that demands “perpetual, irrevocable” rights to the images you upload, and company that also does all of its photo processing “in the cloud” not on your phone.

This means that every selfie you pop into FaceApp gets uploaded to the internet, to a server you can’t control, and is processed by the same type of software that enables facial recognition technology to be so effective.

While we don’t have any proof that Russian spys are assembling new databases full of FaceApp uploads, you should understand that using FaceApp means that you’re providing ID-style, geo-tagged, date-stamped, user-specific photographs to a 3rd party that does not enjoy the same rule-of-law protection that we are accustomed to in the states.

Combine the Capital One breach with the photos from FaceApp, and you’d have everything you need to forge anything from a fake Twitter account to a new passport. Building a database to cross-reference the two wouldn’t be hard for a hacker to do.

What to do? Be alert!

Read the terms of service, educate yourself and your team on the best practices for handling personal and professional information. Be sure to limit access to corporate data on personal devices and use secure systems whenever possible. And look for suspicous activty whenever you’re online.  

If you have any questions, give us a call. Singlesource IT has a wide range of solutions to make sure that your data’s safe. And stays that way.

We’re here to help!

Get in touch today to find out why Singlesource IT should be your partner in IT.

You May Also Be Interested In:

Free cyber security digital cyber illustration

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

Free list notes icon illustration

The Essential Checklist for Securing Company Laptops at Home

Free cloud computer backup illustration

The 2026 Guide to Uncovering Unsanctioned Cloud Apps

A combination lock rests on a computer keyboard.

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Old Router Around the House? The NSA & The FBI Agree: Reboot or Replace Now!

A piece of cardboard with a keyboard appearing through it

How to Run a “Shadow AI” Audit Without Slowing Down Your Team

Free cyber security technology network illustration

A Small Business Roadmap for Implementing Zero-Trust Architecture

Download free HD stock image of Technology Light

5 Security Layers Your MSP Is Likely Missing (and How to Add Them)

Free castle security locked vector

Zero-Trust for Small Business: No Longer Just for Tech Giants

Next Post: Microsoft Teams – Skype for Business Leaps to the Next Level. »

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Free cyber security digital cyber illustration

“Clean Desk” 2.0: Securing Your Home Office from Physical Data Leaks

In the traditional office, a “Clean Desk” policy was a simple habit: shred the sensitive stuff, lock …

Free list notes icon illustration

The Essential Checklist for Securing Company Laptops at Home

At home, security incidents don’t look like dramatic movie hacks. They look like stepping away from …

Free cloud computer backup illustration

The 2026 Guide to Uncovering Unsanctioned Cloud Apps

If you want to uncover unsanctioned cloud apps, don’t begin with a policy. Start with your browser …

A combination lock rests on a computer keyboard.

Stop Ransomware in Its Tracks: A 5-Step Proactive Defense Plan

Ransomware isn’t a jump scare. It’s a slow build.In many cases, it begins days, or even weeks, …

Old Router Around the House? The NSA & The FBI Agree: Reboot or Replace Now!

The NSA The FBI have just announced that they've detected a massive effort by Russian …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2026 · Singlesource IT