Does Alin have an account? Identifying yourself
SAN CARLOS, California, July 29, 2020 (GLOBE NEWSWIRE) – Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of global cybersecurity solutions, recently known and helped mitigate various security vulnerabilities on OkidCup’s website and cellular application. If exploited, violators would have allowed a hacker to borrow the knowledge of OkCupid users and send messages from their account without the users’ knowledge.
Launched in 2004, OkCupid is now the world’s leading online dating center with over 50 million registered users and used in 110 countries. In 201nine, nine1 million connections were made through the site for either one year, with an average of 50,000 dates organized either one week. During the Covid-1nine pandemic, OkCupid saw a 20% design in the talks. However, detailed non-public data sent through users also cause online dating centers to target threat actors, either for targeted attacks or for sale to other hackers.
Check Point researchers demonstrated that vulnerabilities in okCupid’s application and website can provide a hacker to complete the details of the user’s registration, their own messages, sexual orientation, non-public addresses, and all answers to OkCupid’s profile questions. The breachers would also have allowed the hacker to govern the target user’s registration knowledge and send new messages to other users from their account, allowing it to impersonate the specific user for other fraudulent or malicious activities.
The researchers detailed the three-step attack technique that would have allowed hacker users to:
Oded Vanunu, head of product vulnerability studies at Check Point, said: “Our studies on OkCupid, which he really liked dating platforms, have raised serious doubts about the security of all dating apps and websites. We have shown that the main users have things, messages and shots are also seen and manipulated through a hacker, so that either of them, and consistent with the user of a dating app, wants to pause to give the concept the circular security degrees, the most important things and intimate photographs they host and a steady percentage on those platforms. Fortunately, OkCupid responded to our findings immediately and responsibly to mitigate those vulnerabilities in its cellular app and website.”
Check Point researchers leaked their findings responsibly to OkCupid. OkCupid has identified and constantly identified the security vulnerabilities of its servers, so users do not seek to take action. After the disclosure and correction of vulnerabilities, OkCupid issued this statement: “Check Point Reseek has shaped OkCupid developers of the vulnerabilities exposed in this search and a responsible solution has been implemented so that their users can continue to exploit the OkCupid application securely. Not an unmarried user was affected by the possible OkCupid vulnerability, and we were able to fix it in 48 hours. We thank partners like Check Point who, in the okCupid aspect, prioritize the security and privacy of our users.”
For more information about vulnerabilities and a video showing how they might be exploited, visit https://research.checkpoint.com.
Follow Check Point Research via:Blog: https://research.checkpoint.com/ Twitter: https://twitter.com/_cpresearch
About Check Point Reseek Check Point Reseek provides cyber information about computer threats to Check Point Software consumers and the entire intelligence community. The research team collects and analyzes the global knowledge about cyberattacks stored in ThreatCloud to keep hackers at bay, while ensuring that all Check Point products are contradictory to lacheck protections. The study team is made up of more than a hundred analysts and scholars who collaborate with other security providers, law enforcement and various CERT.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity responses to governments and companies around the world. Check Point responds to consumers of fifth-generation cyberattacks with capture of complex malware, ransomware, and specific threats. Check Point provides a multipoint security architecture, “Infinite Total Protection with Advanced Gen V Threat Prevention,” this combined product architecture defends a company’s cloud, netpaintings, and cellular devices. Check Point offers the most complete and intuitive checkpoint security control formula. Check Point has more than 100,000 organizations of all sizes.
Thank you for subscribing! If you have questions about Apple, call us at 1-877-440-ZING or email us at [email protected]