Downloading Dating Apps could be Infectious around this Valentineâ€™s, says IBM
Published By : 13 Feb 2015 | Published By : QYRESEARCH
IBM warns techies about the high risks of dating websites and apps as Valentine’s Day is just around the corner. According to a published report Big Blue outlined the potential security risks related with users downloading dating apps and running sex scheduling software on their tablets and smartphones.
The report has studied 41 different hookup apps and various claims. It has also found more than 60 percent of the apps contained with vulnerabilities that could affect the device and steal the data.
According to the IBM study these apps contain an exploitable flaw that could allow an attacker to do phishing, man-in-the-middle attacks, and cross-site scripting. IBM states that attackers could not steal user credentials by exploiting those flaws. They could however look into the stored data and photos or even remotely activate a speaker and devices camera.
The app could also gain excessive permissions to run up extra billing charges. This should worry businesses as users are excessively running the dating apps on their phones. In case if a user falls victim to a phishing attack most of the corporate data could be hacked from the device.
If all this is not managed properly, the organizations might look out for corporate data through the employee owned devices, said IBM in the report. The information could include the employee phone numbers, address book, geo location, and more to be at risk via these devices.
The company offers management tools and security systems towards BYOD and other network security. IBM did not disclose the names of the apps it tested. However, the parent company of Match, Tinder, and OKCupid, IAC was quick and easy to tell that the dating platforms were well-secured. These dating apps were not among the varied apps found to showcase the cited vulnerabilities, said the company.
The company feels confident in offering security measures to meet the highest security standards.
IBM strongly recommends that users educate themselves in including limiting the checking app permissions, profiles, and run apps on trusted network connections only.