Tag: Tinder
-
Watch out! Tinder and Grinder users targeted by cruel scammers using real abuse photos
A horrible catfishing scam is using real abuse photos in order to lure in unsuspecting victims on sites like Tinder and Grinder. Recently …
-
BreachQuest emerges from stealth with $4.4M to modernize incident response
BreachQuest, an early-stage startup with a founding team of cybersecurity experts building a modern incident response platform, has emerged …
-
Smashing Security podcast #219: Cheerleaders, dating apps, and crisis PR
How are cheerleaders being creeped out by deepfakes? What might Tinder tell potential dates about your murky …
-
Tinder achieves certification for its information security management system
Tinder becomes first dating app to be recognized for comprehensive information security practices in accordance with internationally accepted standards …
-
Irish watchdog launches Google, Tinder GDPR data processing probe
Ireland’s Data Protection Commission (DPC) has launched separate investigations into how Google and Tinder process and manage user data. …
-
Study says Grindr, OkCupid, and Tinder breach GDPR
Dating apps Grindr, OkCupid, and Tinder are allegedly spreading user information like sexual preferences, behavioural data, and precise …
-
Cop arrested following explicit chat with bogus 16yo girl
A California cop recently recognized for his leadership has been arrested for allegedly exchanging explicit messages with somebody he …
-
Russia says Tinder must share user data, private messages
The Russian government has added dating service Tinder on a government database that legally forces the company to hand over user data and …
-
DOM-based XSS Vulnerability Affected 685 Million Users of Tinder, Shopify, Western Union, and Imgur
DOM-based XSS also called as type-0 XSS, this vulnerability allows an attacker to craft a malicious URL and if the URL visited by another …
-
Tinder Hack Emphasizes the Need for Mobile Device Management
While security professionals are busy protecting enterprises against DDoS attacks, ransomware, and application vulnerabilities, another …
●●●