Dating website intelligence priscilla presley dating 2016
And as a user, you should report and un-match the profile if you feel like you are being targeted. The same discretion should be done with email and other social media accounts.
They’re easy to access, outside a company’s control, and a cash cow for cybercriminals.
That shouldn’t come as a surprise, as online dating networks allow you to filter people using a wide range of factors—age, location, education, profession, salary, not to mention physical attributes like height and hair color.
Grindr was an exception, because it requires less personal information.
People are increasingly taking to online dating to find relationships—but can they be used to attack a business?
The kind (and amount) of information divulged—about the users themselves, the places they work, visit or live—are not only useful for people looking for a date, but also to attackers who leverage this information to gain a foothold into your organization.
We also had our fair share of cheesy pickup lines and honest, good people connecting with us, but we never got a targeted attack. Perhaps no campaigns were active on the online dating networks and areas we chose during our research.
We also employed a few house rules for our research—play hard to get, but be open-minded: The goal was to familiarize ourselves to the quirks of each online dating network.
We also set up profiles that, while looking as genuine as possible, would not overly appeal to normal users but entice attackers based on the profile’s profession.
We further explored by setting up “honeyprofiles”, or honeypots in the form of fake accounts.
We narrowed the scope of our research down to Tinder, Plenty of Fish, OKCupid, and Jdate, which we selected because of the amount of personal information shown, the kind of interaction that transpires, and the lack of initial fees.