IBM sounds smartphone security alarm over dating apps

As Valentine's Day approaches, IBM tells users to approach mobile dating apps with caution

App store

People who use dating apps on company-issued smartphones could be putting corporate data at risk, according to a study by IBM.

Big Blue's report saw the vendor test 41 dating apps on an Android device, and discovered 26 of them were either mildly or highly vulnerable to hacking.

As a result, users could have their movements tracked by hackers who can access GPS information via the apps, or have the camera and microphones on their smartphones remotely controlled.

Advertisement - Article continues below

Furthermore, hackers could also hijack people's dating profiles, it is feared, leading to identity theft or blackmail attempts.

IBM has reportedly made the makers of the vulnerable apps aware of its findings, but has not publicly named who makes them.

In the second part of its research, IBM also polled companies to see how many of their employees used dating apps. Of those sampled, around 50 per cent had employees who used the vulnerable ones.

These findings have huge implications for companies that have embraced the Bring Your Own Device trend, warned IBM, although it denied it's trying to put people off using them.

"Rather, [the] goal is to educate organisations and their users on potential risks and mobile security best practices to use the applications safely," the company said in a blog post.

Advertisement
Advertisement - Article continues below

To protect their users, IBM is urging corporations who allow users to access company information on personal devices to make use of enterprise mobility management tools and ban users from downloading apps from unauthorised sources.

Advertisement - Article continues below

It also advocates educating users about the dangers of not paying attention to what services apps have permission to access on a person's phone.

"Set automated policies on smartphones and tablets that take immediate action if a device is found compromised or malicious apps are discovered," the company advised in a blog post

"This approach protects your organisation's data while the issue is remedied," the company adds.

Featured Resources

Preparing for long-term remote working after COVID-19

Learn how to safely and securely enable your remote workforce

Download now

Cloud vs on-premise storage: What’s right for you?

Key considerations driving document storage decisions for businesses

Download now

Staying ahead of the game in the world of data

Create successful marketing campaigns by understanding your customers better

Download now

Transforming productivity

Solutions that facilitate work at full speed

Download now
Advertisement

Recommended

Visit/technology/artificial-intelligence-ai/356332/ibm-unveils-ai-powered-inventory-control-system
artificial intelligence (AI)

IBM unveils AI-powered inventory control system

2 Jul 2020
Visit/cloud/cloud-computing/356317/mercedes-heads-to-the-cloud-as-daimler-expands-ibm-agreement
cloud computing

Mercedes heads to the cloud as Daimler expands IBM agreement

2 Jul 2020
Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/mobile/google-android/356373/over-2-dozen-additional-android-apps-found-stealing-user-data
Google Android

Over two dozen Android apps found stealing user data

7 Jul 2020
Visit/cloud/356260/the-road-to-recovery
Sponsored

The road to recovery

30 Jun 2020