IBM sounds smartphone security alarm over dating apps
As Valentine's Day approaches, IBM tells users to approach mobile dating apps with caution

People who use dating apps on company-issued smartphones could be putting corporate data at risk, according to a study by IBM.
Big Blue's report saw the vendor test 41 dating apps on an Android device, and discovered 26 of them were either mildly or highly vulnerable to hacking.
As a result, users could have their movements tracked by hackers who can access GPS information via the apps, or have the camera and microphones on their smartphones remotely controlled.
Furthermore, hackers could also hijack people's dating profiles, it is feared, leading to identity theft or blackmail attempts.
IBM has reportedly made the makers of the vulnerable apps aware of its findings, but has not publicly named who makes them.
In the second part of its research, IBM also polled companies to see how many of their employees used dating apps. Of those sampled, around 50 per cent had employees who used the vulnerable ones.
These findings have huge implications for companies that have embraced the Bring Your Own Device trend, warned IBM, although it denied it's trying to put people off using them.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
"Rather, [the] goal is to educate organisations and their users on potential risks and mobile security best practices to use the applications safely," the company said in a blog post.
To protect their users, IBM is urging corporations who allow users to access company information on personal devices to make use of enterprise mobility management tools and ban users from downloading apps from unauthorised sources.
It also advocates educating users about the dangers of not paying attention to what services apps have permission to access on a person's phone.
"Set automated policies on smartphones and tablets that take immediate action if a device is found compromised or malicious apps are discovered," the company advised in a blog post.
"This approach protects your organisation's data while the issue is remedied," the company adds.
-
RSAC Conference 2025: The front line of cyber innovation
ITPro Podcast Ransomware, quantum computing, and an unsurprising focus on AI were highlights of this year's event
-
Anthropic CEO Dario Amodei thinks we're burying our heads in the sand on AI job losses
News With AI set to hit entry-level jobs especially, some industry execs say clear warning signs are being ignored
-
Put AI to work for IT operations
whitepaper Reduce the cost and complexity of managing hybrid applications
-
AI in the retail industry is spreading beyond the IT department
News AI has become a strategic imperative for retailers, delivering marked productivity gains
-
Maximizing contact center operations with generative AI assistants backed by responsible AI principles
whitepaper Reduce the cost and complexity of managing hybrid applications
-
IBM just launched powerful new open source AI models – here’s what you need to know
News Available under the Apache 2.0 license, IBM's Granite 3.0 models are trained on enterprise data and can out-perform the competition
-
Achieving business outcomes with generative AI
Webinar Take your hybrid cloud journey to the next level with generative AI
-
Wimbledon’s new Catch Me Up AI feature promises to keep fans up to date at the tournament – after it irons out some of the wrinkles
News The latest feature to come out of IBM’s partnership with Wimbledon will keep fans engaged from the early stages right through to the final with dynamic player insights
-
AI demands new ways of data management
whitepaper The data leader’s guide for how to leverage the right databases for applications, analytics and generative AI
-
AI governance for responsible transparent and explainable AI workflows
whitepaper Build greater trust in your AI