Dating apps put user information at risk

In an analysis by IBM , about 26 of the 41 dating apps studied on Android had vulnerabilities of medium and high severity.

More than 60 percent of the most popular dating app s on Google’s download store are potentially vulnerable to cyber attacks, which put users' personal information at risk.

In an [analysis by IBM]

According to an analysis prepared by the IBM Security unit of the technology company IBM, about 26 of the 41 dating apps studied on the Android mobile platform had vulnerabilities of medium and high severity.

“Many of these dating apps have access to additional features such as camera, microphone, storage, GPS location and mobile wallet billing information, which coupled with vulnerabilities can make them targets for hackers,” , he notes.

analysis prepared by the IBM Security unit

Among the main vulnerabilities discovered by IBM is the possibility of downloading malware when the application is installed on the cell phone, as well as the use of GPS information to track users' movements.

“IBM found that 73 percent of the 41 dating apps analyzed have access to current and past GPS location information. Hackers can capture a user’s location to find out where they live, work or hang out” .

In addition, he adds, 48 percent of the apps analyzed have access to billing information that a user stores on their device, which not only puts personal data at risk, but also users' money.

IBM points out that by having functions that activate a phone’s camera or microphone, apps can allow a hacker to eavesdrop on users or be able to intrude on a company’s confidential meetings, even when the app is not being used.

Faced with these vulnerabilities, the technology company recommends users not to divulge too much personal information on these sites, such as where you work, your birthday or social media profiles, until you feel comfortable with the person you are interacting with.

Also, he adds, it is important to verify the accesses that will be authorized to the app, since it is common that when updated, these tools automatically reconfigure the permissions that determine which phone features they have access to, such as address book or GPS data.

“Use unique passwords for each online account you have. If you use the same password for all your accounts, you may leave multiple attack fronts open in case one account is compromised.” .


Written By

Lauren Scott

Read more


Reasons to join Harimirch dating in india

Online dating has gain popularity in the past few years. The best thing about online dating is the fact that we have now many dating apps to choose. Harimirch is one of the popular dating apps that we have today. Many people continue to join the site every day, and some have been successful in their search for love. If you are looking for love online, then you should probably try joining Harimirch. The process of joining the site is quite straightforward, and it will not take much of your time.

Extramarital adventures in Los Angeles: here’s why to get to know each other online

The desire for betrayal has always been inherent in every marital relationship, and that is why within stable couples, at least in one case out of two one of the partners (if not both) betray. In the largest city in California, until recently, the procedure for giving way to their desire to “meet” outside the marriage bed, followed the usual clichés tested and somewhat risky. They saw the identification of a meeting place, the subsequent physical knowledge, and the organization of the actual betrayal at an agreed “location”, in each of these stages was high risk of being discovered.

Sites that propose [casual encounters in los angeles]

Lately in the big cities, L.A. first, there is a consolidated trend that sees the search for betrayal through the exploitation of new information technologies. Sites that propose casual encounters in los angeles are proliferating, and the attention of users on such platforms is very high. Generally, the meeting starts with a detailed announcement, often accompanied by photos or videos. If it arouses interest, we proceed to the contact phase, a very important phase to explore the affinities of each of the possible future partners. In these first cases, the use of new technologies optimally safeguards the priority confidentiality of all participants in the meeting. This is very important especially in case the meeting should not go well, the risk of a possible discovery is in fact always high, given that anyway we proceed on the “minefield” of marital betrayal.