Security Flaws Discovered in OKCupid Dating ServiceSecurity Flaws Discovered in OKCupid Dating Service
Researchers identified a variety of vulnerabilities in apps and websites for the popular online dating platform.
July 30, 2020
Researchers at Check Point recently found that the mobile app and website for dating service OKCupid contained multiple vulnerabilities that could allow a malicious user to perform actions ranging from stealing users' personal data to performing in-app actions on behalf of those users.
According to researchers Alon Boxiner and Eran Vaknin, OKCupid was informed of the vulnerabilities and patched them prior to their disclosure of the flaws. The researchers say their work shows the importance of secure development, especially in the current era of social distancing. "The dire need for privacy and data security becomes far more crucial when so much private and intimate information being stored, managed and analyzed in an app," they wrote. "The app and platform was created to bring people together, but of course where people go, criminals will follow, looking for easy pickings."
For more, read here.
Register now for this year's fully virtual Black Hat USA, scheduled to take place August 1–6, and get more information about the event on the Black Hat website. Click for details on conference information and to register.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report
Build a Case for a Password Manager