IBM sounds smartphone security alarm over dating apps

As Valentine's Day approaches, IBM tells users to approach mobile dating apps with caution

App store

People who use dating apps on company-issued smartphones could be putting corporate data at risk, according to a study by IBM.

Big Blue's report saw the vendor test 41 dating apps on an Android device, and discovered 26 of them were either mildly or highly vulnerable to hacking.

As a result, users could have their movements tracked by hackers who can access GPS information via the apps, or have the camera and microphones on their smartphones remotely controlled.

Advertisement - Article continues below

Furthermore, hackers could also hijack people's dating profiles, it is feared, leading to identity theft or blackmail attempts.

IBM has reportedly made the makers of the vulnerable apps aware of its findings, but has not publicly named who makes them.

In the second part of its research, IBM also polled companies to see how many of their employees used dating apps. Of those sampled, around 50 per cent had employees who used the vulnerable ones.

These findings have huge implications for companies that have embraced the Bring Your Own Device trend, warned IBM, although it denied it's trying to put people off using them.

"Rather, [the] goal is to educate organisations and their users on potential risks and mobile security best practices to use the applications safely," the company said in a blog post.

Advertisement - Article continues below

To protect their users, IBM is urging corporations who allow users to access company information on personal devices to make use of enterprise mobility management tools and ban users from downloading apps from unauthorised sources.

Advertisement - Article continues below

It also advocates educating users about the dangers of not paying attention to what services apps have permission to access on a person's phone.

"Set automated policies on smartphones and tablets that take immediate action if a device is found compromised or malicious apps are discovered," the company advised in a blog post

"This approach protects your organisation's data while the issue is remedied," the company adds.

Featured Resources

Successful digital transformations are future ready - now

Research findings identify key ingredients to complete your transformation journey

Download now

Cyber security for accountants

3 ways to protect yourself and your clients online

Download now

The future of database administrators in the era of the autonomous database

Autonomous databases are here. So who needs database administrators anymore?

Download now

The IT expert’s guide to AI and content management

Your guide to the biggest opportunities for IT teams when it comes to AI and content management

Download now


Advertisement Feature

Defeat your data deluge with cloud object storage

10 Apr 2020

Businesses brace for second 'Fujiwhara effect' of 2020 as Patch Tuesday looms

9 Apr 2020
cyber security

Zoom hires ex-Facebook CSO Alex Stamos to boost platform security

8 Apr 2020

HP Support Assistant flaws leave Windows devices open to attack

6 Apr 2020

Most Popular

video conferencing

Taiwan becomes first country to ban Zoom amid security concerns

8 Apr 2020
Mobile Phones

Microsoft patents a mobile device with a third screen

6 Apr 2020
cyber security

Microsoft gobbles up domain to keep it from hackers

8 Apr 2020