• Skip to content
logo logo
  • Blog
Login SIGNUP

data breach

Love vs cybersecurity: How to use dating apps and protect your privacy?

March 7, 2019 by HushApp Team

Love vs cybersecurity: How to use dating apps and protect your privacy?

Are you looking for love? Or rather an adventure? Whatever your preferences you surely want to take advantage of a large number of apps that exist in the market to facilitate or improve your search for the right person. Nowadays you can look for someone because of their tastes, their location, or whatever. The question is how secure are these dating apps? Can you protect your privacy enough by using them?

Like almost everything in the digital and interconnected world, these dating apps are also vulnerable to cyber attacks, and many people have suffered consequences, either because they have leaked files of their intimate life that have been exchanged through these applications, or worse, have been the victim of some fraud or criminals that are not the people who claim to be in these apps. So, how to balance your love or sexual life without endangering your security or privacy?

We do not want you to stay single for fear of being victim to an attack like these. If you follow some security measures in the digital or physical world, you can reduce the chances that your information will be used for other purposes than what you are looking for.

Advantages and disadvantages of dating apps and how to use them safely

  1. The duality between privacy and the veracity of information: One of the main problems that arise in these dating applications is knowing if the person is really who they say they are. Some of these apps allow users to register with Facebook, place work or study site, so this could allow the other person to see if this person, in a certain way, is “real”. The counterpart: the person being investigated, how can we know if they are really looking for an “appointment”? Our advice: limit information about yourself on the Internet to the one you want others to know about you, and with whom you want them to know about you, then you can introduce yourself as you like.
  2. The ideal, in this case, is to have common sense and not to share personal information immediately, as well as it is advisable to have the first dates in public places. Moreover not to give money: it is important to note that there are even people who have been victims of fraud, where their alleged “dates” have asked for money and for some reason there are those who have agreed.
  3. Another common feature of these applications is that they allow you to locate a person close to you, thanks to geolocation, there are also much more accurate, as they indicate how many times you have crossed with that person. It can be an advantage if you want to look for someone in your area, but also it is a disadvantage due to the fact that you are making it clear where you are, and even worse if you indicate each step you take. It is preferable to opt for applications that do not use this modality, which would only allow users to communicate directly so that they define where to find each other. Although it is not so exact, you have the power to determine where and when you want to meet that person.
  4. Secure communications: The problem with many of these dating apps is that they do not have secure communication channels between their users, and therefore they are victims of data leakage. When choosing the application, take into account that your app use encryption in your system to protect the privacy of its users.

For your part, add all the necessary layers of protection, connect to secure networks, use a VPN and an antivirus to protect the device you use.

Protect these photos that should not be exposed for any reason 🔥😈 using HushApp, there you can keep them protected in your Hushbox, without anyone else but you can access them, or sending it to your date in an easy and completely safe way. Nobody who you do not want can be able to access your privacy.

In HushApp we do not want to know about your private life, we want to help you to protect it.

We invite you to try Hushapp …

Filed Under: HushApp Tips Tagged With: ciberattack, cibersecurity, data breach, HushApp, HushBox, privacy, private life, Tags: dating apps

Data Breach: Types and Vulnerabilities

January 23, 2019 by HushApp Team

Data Breach: Types and Vulnerabilities

We invite you to read Hogan Injury’s post, our special guests:

For many years now, data has been a critical part of every organization. Criminals have been sharpening their tools to breach companies’ cybersecurity to get a hold of sensitive data.

What is a data breach?

A data breach occurs when a cybercriminal is able to infiltrate a data source and acquire sensitive information, either done physically by accessing a computer or a network and steal the information or compromising a network security remotely. The latter is the one often used to target companies.

What are types of data breaches?

  1. Phishing. This refers to attempts to extract information from users by presenting itself as something official. This could be an email message that looks like an official message from your bank asking you to update your information.
  2. Password attacks. Cybercriminals run programs that would try multiple passwords until they are able to access your accounts. Such attacks can successfully crack unsecure passwords.
  3. Malware. The word “malware” is the general term used to refer to any virus. Worms and Trojans are among the best-known malwares. To keep them from infiltrating systems, risk management firms advise against clicking links and opening attachments from unrecognized sources.
  4. Ransomware. This type of breach is becoming popular recently, especially in law firms and hospitals. Cybercriminals, after gaining access to the network or website, will shut it down and lock it from all functionalities. After which, the criminals will ask for ransom for the access and the information gained.
  5. Denial of Service. This breach happens when the attackers or hackers attempt to prevent legitimate users from accessing a network, account, or service. It is done by flooding the users with useless and invalid authentication requests, resulting in the network to eventually crash.

How does a company become vulnerable to data breaches?

  • Employees. Insider threat remains to be on top of the list of security risks, partially because it is much easier for those who already have access to data to abuse it. Unhappy employees and those who have recently separated from the company are potential threats to data security. Employers must employ protocols that will minimize internal attacks and immediately deactivate separated employees’ login credentials. Employees who are careless and uninformed are equally dangerous.
  • Cloud Storage Apps. While it is a modern and convenient way to store data, cloud systems are vulnerable to breaches. To minimize risk, choose a reputable cloud storage company that uses data encryption.
  • Mobile Devices. When employees are allowed to bring and use their own mobile devices at work, it is a lot more difficult to control security, passwords, downloads, and other activities. Companies that allow employees to sue their own mobile device must have a comprehensive written policy in terms of expectations, liabilities, and limitations.
  • Third Party Service Providers. Outsourcing can be convenient and cost-effective, but it also leaves your company susceptible to cyber attacks and data breaches, especially if your service provider uses low-security methods. To minimize risk, choose a reputable third party service provider; have them specify in the contract their security procedures and the assumption of liability in case of a data breach in their system.

Contact us at Hogan Injury for expert legal advice.

Original text here

Filed Under: Cybersecurity Business Tagged With: cybersecurity, data breach, data security, malware, password, phishing, rasomware

logo HushApp made in EU

HushApp allows to protect and send files safely without complications, in any platform. Sign up for HushApp and enjoy the peace of mind of end-to-end encryption.


Product
Features Pricing Android App iOS App coming soon Web App
Users
Book a demo FAQ Guide Support
Business
Hush for Business GDPR Use cases
About
About us Jobs Terms of Use Privacy Policy Legal
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More
Privacy & Cookies Policy
Necessary Always Enabled