• Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
Monday, February 16, 2026
  • Login
  • Register
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Technology Times | Latest and Breaking Nigeria Tech News
No Result
View All Result
Your text
Remita Remita Remita
ADVERTISEMENT

‘Over 60% of dating mobile apps open users to hackers’

Technology Times StaffbyTechnology Times Staff
14/02/2015
in News
Reading Time: 5 mins read
1 0
A A
0
10-ways-spot-fraudulent-online-orders

The Internet hacker

ADVERTISEMENT
Tech security investigators have found that over 60 percent of leading dating mobile apps they studied to be potentially vulnerable to a variety of cyber-attacks that put personal user information and corporate data at risk.
The analysis conducted by IBM reveals that many of these dating applications have access to additional features on mobile devices such as the camera, microphone, storage, GPS location and mobile wallet billing information, which in combination with the vulnerabilities may make them exploitable to hackers.
IBM also found that nearly 50 percent of organizations analysed have at least one of these popular dating apps installed on mobile devices used to access business information.

[su_quote cite=”IBM”]All the vulnerabilities identified can allow a hacker to gain access to a phone’s camera or microphone even if the user is not logged into the app. This means an attacker can spy and eavesdrop on users or tap into confidential business meetings.[/su_quote]

hacker

In today’s connected culture, dating apps are a common and convenient way for singles of all ages to meet new love interests.
In fact, a Pew Research study revealed one in 10 Americans, or roughly 31 million people, have used a dating site or app and the number of people who dated someone they met online grew to 66 percent.
“Many consumers use and trust their mobile phones for a variety of applications. It is this trust that gives hackers the opportunity to exploit vulnerabilities like the ones we found in these dating apps,” said Caleb Barlow, Vice President, IBM Security. “Consumers need to be careful not to reveal too much personal information on these sites as they look to build a relationship. Our research demonstrates that some users may be engaged in a dangerous tradeoff – with increased sharing resulting in decreased personal security and privacy.”
15873561994_908d94f5b1_bSecurity researchers from IBM Security identified that 26 of the 41 dating apps they analysed on the Android mobile platform had either medium or high severity vulnerabilities. The analysis was done based on apps available in the Google Play app store in October 2014.
The vulnerabilities discovered by IBM Security make it possible for a hacker to gather valuable personal information about a user. While some apps have privacy measures in place, IBM found many are vulnerable to attacks that could lead to the following scenarios:
  • Dating App Used to Download Malware:  Users let their guard down when they anticipate receiving interest from a potential date. That’s just the sort of moment that hackers thrive on. Some of the vulnerable apps could be reprogrammed by hackers to send an alert that asks users to click for an update or to retrieve a message that, in reality, is just a ploy to download malware onto their device.
  • GPS Information Used to Track Movements: IBM found 73% of the 41 popular dating apps analysed have access to current and past GPS location information. Hackers can capture a user’s current and past GPS location information to find out where a user lives, works, or spends most of their time.
  • Credit Card Numbers Stolen From App: 48% of the 41 popular dating apps analysed have access to a user’s billing information saved on their device. Through poor coding, an attacker could gain access to billing information saved on the device’s mobile wallet through a vulnerability in the dating app and steal the information to make unauthorized purchases.
  • Remote Control of a Phone’s Camera or Microphone: All the vulnerabilities identified can allow a hacker to gain access to a phone’s camera or microphone even if the user is not logged into the app. This means an attacker can spy and eavesdrop on users or tap into confidential business meetings.
  • Hijacking of Your Dating Profile: A hacker can change content and images on the dating profile, impersonate the user and communicate with other app users, or leak personal information externally to affect the reputation of a user’s identity. This poses a risk to other users, as well, since a hijacked account can be used by an attacker to trick other users into sharing personal and potentially compromising information.
Some of the specific vulnerabilities identified on the at-risk dating apps include cross site scripting via man in the middle, debug flag enabled, weak random number generator and phishing via man in the middle. When these vulnerabilities are exploited an attacker can potentially use the mobile device to conduct attacks.
For example, hackers could intercept cookies from the app via a Wi-Fi connection or rogue access point, and then tap into other device features such as the camera, GPS, and microphone that the app has permission to access. They also could create a fake login screen via the dating app to capture the user’s credentials, so when they try to log into a website, the information is also shared with the attacker.16495553255_7a23173e97_b
Steps to Protect Against Dating App Hacks
While IBM discovered a number of vulnerabilities in over 60 percent of popular Android dating apps, both consumers and businesses can take steps to protect themselves against potential threats.
What Can Consumers Do?
  • Be Mysterious: Don’t divulge too much personal information on these sites such as where you work, birthday or social media profiles until you’re comfortable with the person you are engaging with via the app.
  • Permission Fitness: Figure out if you want to use an app by checking the permissions it asks for by viewing the settings on your mobile device. When updating, apps often automatically reset the permissions determining what phone features they have access to, like your address book or GPS data.
  • Keep it Unique: Use unique passwords for every online account you have. If you use the same password for all your accounts it can leave you open to multiple attacks if one account is compromised.
  • Punctual Patching: Always apply the latest patches and updates to your apps and your device when they become available. This will fix any identified bugs in your device and applications, resulting in a more secure experience.
  • Trusted Connections: Use only trusted Wi-Fi connections when on your dating app. Hackers love using fake Wi-Fi access points that connect you directly to their device to execute these types of attacks. Many of the vulnerabilities found in this research can be exploited via Wi-Fi.
What Can Enterprises Do?
Businesses also need to be prepared to protect themselves from vulnerable dating apps active inside their infrastructure, especially for Bring Your Own Device (BYOD) scenarios. IBM found that nearly 50 percent of organizations sampled for this research have at least one of these popular dating apps installed on corporate-owned or personal mobile devices used for work. To protect confidential corporate assets, businesses should:15875572883_576527a47f_h
  • Adopt the Right Protection: Leverage Enterprise Mobility Management (EMM) offerings with mobile threat management (MTM) capabilities to enable employees to utilize their own devices while still maintaining the security of the organization.
  • Define Downloadable Apps: Allow employees to only download applications from authorized app stores such as Google Play, iTunes, and the corporate app store.
  • Education is Key: Educate employees to know the dangers of downloading third party applications and what it means when they grant that app specific device permissions.
  • Immediately Communicate Potential Threats: Set automated policies on smartphones and tablets, which take immediate action if a device is found compromised or malicious apps are discovered. This enables protection to corporate resources while the issue is remediated.

Related Articles

FMIST unveils team to advance home-grown technology solutions

MTN, Airtel back ₦58,600 smartphone drive for Nigeria and beyond

NDPC warns Nigerians on Google Chrome security flaws 

Nigeria’s ngCERT warns of malware targeting Android users 

Nigeria powers Africa’s smartphone market to 7% growth in Q2 2025

Tinubu: Nigeria must take Africa’s lead through technology, food sovereignty

Customs, Shippers’ Council in talks over B’Odogwu rollout glitches

Factors to consider before buying that smartphone

The case for human-led tech partnerships

Nigeria Police deploys tech to step up intelligence-led law enforcement

Tags: AndroidappApp StoreAppsbusinesscyber attacksdevicesGoogleGPSHackersiOSiTunesmalwareMobilemobile appMobile appsmobile phonemobile phonesmobile walletNiPhonesSecuritySmartphonesmartphonesTabletstechnology
Share19Tweet12Share3SendShare
Previous Post

Bidco, IBM enter technology pact

Next Post

Bitflux to boost ‘Nigerian Content’ in telecoms sector, NCC says

Technology Times Staff

Technology Times Staff

News and Reports from Technology Times Newsroom. Call/SMS/WhatsApp: +234 815 7000 100

Related Posts

Catch Wiko Fever Special Edition smartphone
Consumer Technology

Catch Wiko Fever Special Edition smartphone

byDonatus Anichukwueze
29/02/2016
apple-launches-apple-invites-for-event-planning
Consumer Technology

Apple launches ‘Apple Invites’ for event planning

byFejiro Awowede
07/02/2025
Panaftel Wireless
News

Nokia Siemens achieves top broadband speed

byTechnology Times Staff
30/06/2012
airtel-device-switches-analogue-to-smart-tv
Consumer Technology

Airtel device switch users from analogue to smart TV

byOladapo Riliwan
10/12/2024
Ebola2
News

Ebola: Survivors’ tales come to mobile app

byTechnology Times Staff
08/01/2015
Updated: Photo Gallery of top selling feature phone in Nigeria
Consumer Technology

Highly risky: Mobility without security

byKayode Oladeinde
13/03/2016
right-of-way-ekiti-state-nigeria
News

Omobola Johnson at TEDx: KPIs are not enough

byTechnology Times Staff
11/01/2015
10 Must-have apps for today’s mobile consumer
News

Google, LG seal patent license agreement

byKayode Oladeinde
10/11/2014
Nigeria General Elections 2015
News

APC: How party volunteer ‘hijacked Twitter handle’

byTechnology Times Staff
16/04/2018
Nigerian tech mogul to Buhari: ‘It’s too late to devalue Naira’, calls for economic diversification
News

Facebook to ‘connect Nigerian SMEs with customers’

byKayode Oladeinde
12/07/2016
Next Post
Nigeria telecoms invetors

Bitflux to boost ‘Nigerian Content’ in telecoms sector, NCC says

Nigeria posted record 135% growth in smartphone shipments in 2014 as falling prices price threaten feature phones, according to a new report by IDC.

47 years after 911 call, company unveils smartphone app

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

5 × 4 =

Latest Articles

minister-nigeria-turkiye-innovation-pact

Minister: Nigeria–Türkiye innovation pact targets measurable outcomes

15/02/2026
boi-funds-100-tech-ventures-amid-record-₦636bn

BOI Funds 100 tech ventures amid record ₦636bn disbursement in 2025

13/02/2026
IHS Towers sells 51% stakes to to Brazil’s TIM in $452.6m deal

IHS Towers sells 51% stakes to to Brazil’s TIM in $452.6m deal

11/02/2026
nigeria-overhauls-outdated-telecoms-policy

Nigeria overhauls ‘outdated’ telecoms policy that heralded mobile explosion, eyes next telecoms growth phase

11/02/2026
fg-ericsson-launch-connect-nextgen-hackathon

FG, Ericsson launch Connect NextGen Hackathon to up Nigerian youths in 5G, AI

11/02/2026
CrownCrystal Technologies CrownCrystal Technologies CrownCrystal Technologies
ADVERTISEMENT
ADVERTISEMENT
eGovernance Nigeria Magazine eGovernance Nigeria Magazine eGovernance Nigeria Magazine
ADVERTISEMENT

POPULAR ARTICLES

  • minister-nigeria-turkiye-innovation-pact

    Minister: Nigeria–Türkiye innovation pact targets measurable outcomes

    50 shares
    Share 20 Tweet 13
  • Facebook parent company taps Nigeria for advanced Meta AI launch in African expansion

    72 shares
    Share 29 Tweet 18
  • Big Brother: 78% of social media users ‘planning to leave’

    54 shares
    Share 22 Tweet 14
  • Credit Rating Agencies Should Focus on Investors’ Protection, SEC says at Datapro Webinar

    51 shares
    Share 20 Tweet 13
  • Nigeria’s ccHub takes ‘Summer of Code’ to four new cities

    52 shares
    Share 21 Tweet 13
  • Nigeria’s CWG named World Economic Forum member

    52 shares
    Share 21 Tweet 13
  • MTN Nigeria begins Samsung Galaxy S4 pre-order

    56 shares
    Share 22 Tweet 14
  • Cashless Nigeria won’t wipe Naira as CBN answers 50+ questions

    59 shares
    Share 24 Tweet 15
  • FG, IAEA plan online registry on radiation exposure in Nigeria

    59 shares
    Share 24 Tweet 15
  • Nigeria’s Immigration tightens control with ‘e-border solutions’

    96 shares
    Share 38 Tweet 24

Latest Videos

  • TT TV
data-privacy-and-nigerias-online-consumers

Data privacy and Nigeria’s online consumers | Technology Times Live TV

11/08/2025
9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

9mobile Rebranding Livestream | Technology Meets Tenacity | Technology Times Live

08/08/2025
teniola-advocates-dynamic-billing-for-nigerians

Teniola advocates dynamic billing to protect Nigerian consumers | Technology Times Policy eXchange

14/04/2025
watch-mtn-nigeria-board-lawsuit-interview

#Watch: MTN Nigeria’s board is filled with ex-regulators—is this a conflict of interest?

24/03/2025
engr-banjo-on-local-content-in-nigeris-telecoms

Watch: Engr. Banjo on local content in Nigeria’s telecoms market

23/03/2025
Load More
Facebook Twitter Youtube LinkedIn RSS

ABOUT TECHNOLOGY TIMES

technology-times-logo

Nigeria Technology Media Group

Founded in 2004, Technology Times’ trusted technology news, market intelligence, views and business services reach readers and partners across Nigeria, Africa and beyond.

Advertising

Sign up for TT eNews

Get in touch here

CONTACT US

Phone: +234 201 454 1818
WhatsApp: +234 815 700 0100
Email: info@technologytimes.ng
Web: www.technologytimes.ng

LEGAL & COMPLIANCE

technology-times-logoHome

TT Privacy Policy

TT Terms & Conditions

TT Website Disclaimer

TT Guest Post Guidelines

TT Sitemap

VOffice

  • credicorp-portal-for-nigeria-consumer-credit

    CREDICORP: FG opens portal on www.credicorp.ng for Nigerians to access consumer credit

    15732 shares
    Share 6293 Tweet 3933
  • CUG: NCC caps call rate at ₦50, bans data bundling

    5058 shares
    Share 2023 Tweet 1265
  • 9mobile rebrands today, targets multibillion-naira comeback in mobile market

    4413 shares
    Share 1765 Tweet 1103
  • Exclusive: Boardroom battle erupts at 9mobile, threatens spectrum trade deal with MTN

    3890 shares
    Share 1556 Tweet 973

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Big Story
  • News
    • News
    • Consumer Technology
    • Market Updates
    • Technology Insights
  • Interviews
  • Opinion
  • Digital Transformation Series
  • Special Reports
    • MWC Africa
    • Nigeria 5G Spectrum Auction
  • Login
  • Sign Up

©2004-2025 Technology Times, owned and operated by Digital Transformation Media Limited (DTML), Nigeria or its affiliates. All rights reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy Policy Page.