Start Internet dating professionals south africa

Internet dating professionals south africa

That let us establish a baseline for several locations and see if there were any active attacks in those areas.

We also employed a few house rules for our research—play hard to get, but be open-minded: The goal was to familiarize ourselves to the quirks of each online dating network.

We also set up profiles that, while looking as genuine as possible, would not overly appeal to normal users but entice attackers based on the profile’s profession.

People are increasingly taking to online dating to find relationships—but can they be used to attack a business?

The kind (and amount) of information divulged—about the users themselves, the places they work, visit or live—are not only useful for people looking for a date, but also to attackers who leverage this information to gain a foothold into your organization.

They could also use an exploit kit, but since most use dating apps on mobile devices, this is somewhat more difficult.

Once the target is compromised, the attacker can attempt to hijack more machines with the endgame of accessing the victim’s professional life and their company’s network.

And as a user, you should report and un-match the profile if you feel like you are being targeted. The same discretion should be done with email and other social media accounts.

They’re easy to access, outside a company’s control, and a cash cow for cybercriminals.

Indeed, such attacks are feasible—but do they actually happen? Targeted attacks on the Israeli army early this year used provocative social network profiles as entry points.

Romance scams are also nothing new—but how much of these are done on online dating networks?

This isn’t to say though that this couldn’t happen or isn’t happening—we know that it’s technically (and definitely) possible.