Controversial Social Media App Wizz Removed from App Stores Amid Child Safety Concerns

Wizz, a rapidly growing social media app popular among US teenagers, was unexpectedly removed from both the Apple App Store and the Google Play Store on January 30. Owned by Voodoo, a French mobile video game developer, Wizz operates as a Tinder-like platform for users aged 13 and above. However, recent controversies surrounding the app’s involvement in sextortion, the production of child sexual exploitation material (CS-CSEM), and the serving of pornographic ads to minors have led to its temporary removal.

Controversies surrounding Wizz

According to a report by the National Center for Missing and Exploited Children (NCMEC), Wizz was identified as the third most used app for sextortion purposes among teenagers, trailing only behind popular platforms like Instagram and Snapchat. Additionally, numerous minors on both the Google Play Store and the App Store have come forward, claiming that they were coerced into producing SG-CSEM and subsequently blackmailed on the Wizz app. Furthermore, concerns have been raised about the app frequently serving pornographic ads to minors, highlighting serious child safety issues within the platform.

Temporary removal from app stores

Upon being removed from app stores, Wizz’s official Instagram account issued a statement attributing the app’s absence to a mere technical hiccup and launched the hashtag #freewizz in response to the removal. However, this explanation raises skepticism considering the gravity of the allegations against the app.

Voodoo’s response to the removal

Voodoo, the parent company of Wizz, has acknowledged that both Apple and Google are seeking further information regarding their app. They have expressed their willingness to work closely with the app store teams to clarify the extensive safeguards in place for users and resolve the matter promptly. Voodoo remains optimistic about reinstating Wizz on the app stores.

Company’s implementation of security controls

A spokesperson for Voodoo emphasized that the company has implemented strict security measures to prevent abusive or illegal behavior on the Wizz platform. While responding to the NCRI report, the spokesperson defended the platform’s practices and reiterated their commitment to user safety.

Wizz co-founder’s statement

Gautier Gédoux, co-founder and Chief Technology Officer (CTO) of Wizz, took to Medium to address some of the claims made in the NCRI report. Gédoux stated that they were not aware of any successful extortion attempts occurring within the Wizz app. He further discussed the app’s initiatives to combat users sending pornographic ads, aiming to foster a safer environment for all users.

The controversy surrounding the removal of Wizz from app stores highlights the urgent need to address child safety concerns prevalent on social media platforms. While the temporary removal may have disrupted the app’s growing popularity, it underscores the greater responsibility of developers and app stores to prioritize user protection. As the investigation continues and the discussions between Voodoo, Apple, and Google progress, the ultimate impact of Wizz’s removal from app stores remains uncertain. However, it is crucial that swift measures are taken to address the alarming issues raised by the NCRI report, ensuring the safety of young users in the digital landscape.

Explore more

Digital Transformation Challenges – Review

Imagine a boardroom where executives, once brimming with optimism about technology-driven growth, now grapple with mounting doubts as digital initiatives falter under the weight of complexity. This scenario is not a distant fiction but a reality for 65% of business leaders who, according to recent research, are losing confidence in delivering value through digital transformation. As organizations across industries strive

Understanding Private APIs: Security and Efficiency Unveiled

In an era where data breaches and operational inefficiencies can cripple even the most robust organizations, the role of private APIs as silent guardians of internal systems has never been more critical, serving as secure conduits between applications and data. These specialized tools, designed exclusively for use within a company, ensure that sensitive information remains protected while workflows operate seamlessly.

How Does Storm-2603 Evade Endpoint Security with BYOVD?

In the ever-evolving landscape of cybersecurity, a new and formidable threat actor has emerged, sending ripples through the industry with its sophisticated methods of bypassing even the most robust defenses. Known as Storm-2603, this ransomware group has quickly gained notoriety for its innovative use of custom malware and advanced techniques that challenge traditional endpoint security measures. Discovered during a major

Samsung Rolls Out One UI 8 Beta to Galaxy S24 and Fold 6

Introduction Imagine being among the first to experience cutting-edge smartphone software, exploring features that redefine user interaction and security before they reach the masses. Samsung has sparked excitement among tech enthusiasts by initiating the rollout of the One UI 8 Beta, based on Android 16, to select devices like the Galaxy S24 series and Galaxy Z Fold 6. This beta

Broadcom Boosts VMware Cloud Security and Compliance

In today’s digital landscape, where cyber threats are intensifying at an alarming rate and regulatory demands are growing more intricate by the day, Broadcom has introduced groundbreaking enhancements to VMware Cloud Foundation (VCF) to address these pressing challenges. Organizations, especially those in regulated industries, face unprecedented risks as cyberattacks become more sophisticated, often involving data encryption and exfiltration. With 65%