IBM sounds smartphone security alarm over dating apps
As Valentine's Day approaches, IBM tells users to approach mobile dating apps with caution

People who use dating apps on company-issued smartphones could be putting corporate data at risk, according to a study by IBM.
Big Blue's report saw the vendor test 41 dating apps on an Android device, and discovered 26 of them were either mildly or highly vulnerable to hacking.
As a result, users could have their movements tracked by hackers who can access GPS information via the apps, or have the camera and microphones on their smartphones remotely controlled.
Furthermore, hackers could also hijack people's dating profiles, it is feared, leading to identity theft or blackmail attempts.
IBM has reportedly made the makers of the vulnerable apps aware of its findings, but has not publicly named who makes them.
In the second part of its research, IBM also polled companies to see how many of their employees used dating apps. Of those sampled, around 50 per cent had employees who used the vulnerable ones.
These findings have huge implications for companies that have embraced the Bring Your Own Device trend, warned IBM, although it denied it's trying to put people off using them.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Rather, [the] goal is to educate organisations and their users on potential risks and mobile security best practices to use the applications safely," the company said in a blog post.
To protect their users, IBM is urging corporations who allow users to access company information on personal devices to make use of enterprise mobility management tools and ban users from downloading apps from unauthorised sources.
It also advocates educating users about the dangers of not paying attention to what services apps have permission to access on a person's phone.
"Set automated policies on smartphones and tablets that take immediate action if a device is found compromised or malicious apps are discovered," the company advised in a blog post.
"This approach protects your organisation's data while the issue is remedied," the company adds.
-
Bigger salaries, more burnout: Is the CISO role in crisis?
In-depth CISOs are more stressed than ever before – but why is this and what can be done?
By Kate O'Flaherty Published
-
Cheap cyber crime kits can be bought on the dark web for less than $25
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott Published
-
Put AI to work for IT operations
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro Published
-
AI in the retail industry is spreading beyond the IT department
News AI has become a strategic imperative for retailers, delivering marked productivity gains
By Emma Woollacott Published
-
Maximizing contact center operations with generative AI assistants backed by responsible AI principles
whitepaper Reduce the cost and complexity of managing hybrid applications
By ITPro Published
-
IBM just launched powerful new open source AI models – here’s what you need to know
News Available under the Apache 2.0 license, IBM's Granite 3.0 models are trained on enterprise data and can out-perform the competition
By Emma Woollacott Published
-
Achieving business outcomes with generative AI
Webinar Take your hybrid cloud journey to the next level with generative AI
By ITPro Published
-
Wimbledon’s new Catch Me Up AI feature promises to keep fans up to date at the tournament – after it irons out some of the wrinkles
News The latest feature to come out of IBM’s partnership with Wimbledon will keep fans engaged from the early stages right through to the final with dynamic player insights
By Solomon Klappholz Published
-
AI demands new ways of data management
whitepaper The data leader’s guide for how to leverage the right databases for applications, analytics and generative AI
By ITPro Last updated
-
AI governance for responsible transparent and explainable AI workflows
whitepaper Build greater trust in your AI
By ITPro Published