When online dating turns dangerous frree intewrnet dating

We were interested in what could be intercepted if, for example, the user connects to an unprotected wireless network – to carry out an attack it’s sufficient for a cybercriminal to be on the same network.Even if the Wi-Fi traffic is encrypted, it can still be intercepted on an access point if it’s controlled by a cybercriminal.

when online dating turns dangerous-74when online dating turns dangerous-11

If the app included an option to show your place of work, it was fairly easy to match the name of a user and their page on a social network.

This in turn could allow criminals to gather much more data about the victim, track their movements, identify their circle of friends and acquaintances. Discovering a user’s profile on a social network also means other app restrictions, such as the ban on writing each other messages, can be circumvented.

Information about users in all the other apps is usually limited to just photos, age, first name or nickname.

We couldn’t find any accounts for people on other social networks using just this information. In one case the search recognized Adam Sandler in a photo, despite it being of a woman that looked nothing like the actor.

This allows an attacker, for example, to see which accounts the victim is currently viewing.

The Android version of Paktor uses the quantumgraph analytics module that transmits a lot of information in unencrypted format, including the user’s name, date of birth and GPS coordinates.

As a result, an attacker can end up with the email addresses not only of those users whose profiles they viewed but also for other users – the app receives a list of users from the server with data that includes email addresses.

This problem is found in both the Android and i OS versions of the app. Some of the apps in our study allow you to attach an Instagram account to your profile.

In addition, the module sends the server information about which app functions the victim is currently using.

Tags: , ,