Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Swipes and Photos from Tinder can be Hacked

 

It can be very easy to hack Tinder photos as the application doesn't have the encryption facility, states one fresh report from Security Company Checkmarx based in Tel Aviv. The company discovered that Android and iOS applications of Tinder did not employ HTTPS encryption and so described the failure 'disturbing.'

 

Usually, websites use HTTPS for their most fundamental safeguard against hackers. Mozilla estimates that 68% of the online space had HTTPS encryption to January 2018. When a website utilizes HTTPS one small lock icon is displayed on the address bar's left side.

 

Checkmarx explained so, claiming the dating application's iOS and Android makes did not encrypt to and fro traffic on the network implying anybody could collect swipes from any user's profiles while using the Wi-Fi which that user is on alternatively execute likewise spying. Theregister.co.uk posted this, January 23, 2018.

 

Security experts from Checkmarx exposed 2 vulnerabilities namely CVE-2018-6018 and CVE-2018-6017 along with one proof-of-concept (POC) showing an application's ability to lurk on a hotel's or airport's Wi-Fi network while watch actions such as swipes, profile views and so on.

 

Checkmarx researchers also worked out a mechanism to circumvent swiping actions possible with HTTPS encryption by Tinder. This one is: when the user swipes on Tinder application his smart-phone dispatches details onto his Wi-Fi network which makes a match to that action. Now swipes get encrypted so somebody seeing those details wouldn't comprehend its meaning. However, there are just three varieties in which Tinder swipes exist: super like, right swipe and left swipe. By using the appropriate tools the impression is like somebody is simply gazing the user's screen.

 

Thus it implies TinderDrift is capable of watching the profiles the target phone user was interested in. For correcting the vulnerabilities, Checkmarx suggests Tinder mustn't just encrypt photos; however, "pad" the remaining instructions as well within its application by appending noise in order that every instruction looks the identical size else in order that they can't be deciphered from within a data stream flowing in randomly. Only then can no tindering become publicly visible just like the publicly usable Wi-Fi to which the user is connected.

» SPAMfighter News - 05-02-2018

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next