Blogs on internet dating


We gauged this by sending messages between our test accounts with links to known bad sites.

They arrived just fine and weren’t flagged as malicious.

blogs on internet dating-18

With a little bit of social engineering, it’s easy enough to dupe the user into clicking on a link.

It can be as vanilla as a classic phishing page for the dating app itself or the network the attacker is sending them to.

Once the target is compromised, the attacker can attempt to hijack more machines with the endgame of accessing the victim’s professional life and their company’s network.

Indeed, such attacks are feasible—but do they actually happen? Targeted attacks on the Israeli army early this year used provocative social network profiles as entry points.

Newcomers such as Happn, Bumble and Coffee Meets Bagel may have come onto the scene, but most of our guy panel still preferred Tinder.