Popular and vulnerable dating apps: the Steps consumers need to protect themselves against attackers.
In our digital-driven world, where data are the most powerful asset,
nothing is critical like a secure trustworthy app.
The IBM study reveals that many of the
popular dating applications have access to additional features on mobile
devices such as the camera, microphone, storage, GPS location and mobile wallet
billing information, which in combination with the vulnerabilities may make
them exploitable to hackers.
According to this study, hackers could intercept cookies from the app via a
Wi-Fi connection or rogue access point, and then tap into other device features
such as the camera, GPS, and microphone that the app has permission to access.
They also could create a fake login screen via the dating app to capture the
user’s credentials, so when they try to log into a website, the information is
also shared with the attacker.
Therefore, the steps consumers need to protect themselves against vulnerable
dating apps are:
· Be Mysterious: Don't divulge too much personal information on these sites such
as where you work birthday or social media profiles until you're comfortable
with the person you are engaging with via the app.
· Permission Fitness: Figure out if you want to use an app
by checking the permissions it asks for by viewing the settings on your mobile
device. When updating, apps often automatically reset the permissions
determining what phone features they have access to, like your address book or
GPS data.
· Keep it Unique: Use unique passwords for every
online account you have. If you use the same password for all your accounts it
can leave you open to multiple attacks if one account is compromised.
· Punctual Patching: Always apply the latest patches and
updates to your apps and your device when they become available. This will fix
any identified bugs in your device and applications, resulting in a more secure
experience.
· Trusted Connections: Use only trusted Wi-Fi connections
when on your dating app. Hackers love using fake Wi-Fi access points that
connect you directly to their device to execute these types of attacks.