Connect with us

Science & Tech

Tinder to tackle catfishing with ID verification

Published

on

The introduction of the ID verification service follows Sky News revealing more than £63m was stolen by online romance scammers last year.

Tinder has announced it will be making its ID Verification service available for users around the world..

The ID verification tool will be used to tackle so-called catfishing, or duping someone into a relationship by using false pictures and information.

It will allow users to verify their identities by sending Tinder an official document, often a driver’s licence or a passport when it was trialled in Japan last year, and these users will be marked as verified when using the dating platform.

It follows the introduction of a Photo Verification feature which verified that users looked like photos using an algorithm and human assistance to prompt users to take selfies in real-time.

Photo Verification was first announced last January and debuted alongside other safety features, including a panic button in case users need to alert the authorities while on a date.

Once users have successfully completed the procedure then their profiles will receive a blue tick affirming their looks are verified.

“The product will begin as voluntary, except where mandated by law, and based on the inputs received will evolve to ensure an equitable, inclusive and privacy-friendly approach to ID Verification,” the company said.

Penny Ward (in vision) was scammed out of £500. Elizabeth* (anon) lost a staggering £30,000.
Image:Penny Ward was scammed out of £500, while Elizabeth lost a staggering £30,000 to a Tinder scammer

It follows a Sky News report on how victims of online romance fraud in the UK were conned out of more than £63m last year.

Penny Ward and Elizabeth, whose name Sky News has changed, were both conned by a scammer they met on Tinder.

After about two months, the scammer asked both women for money.

Penny, who quickly realised she was being scammed but said she “felt desperate not to lose him”, sent around £500, but Elizabeth lost a staggering £30,000.

“He said he needed it to keep the farm going, to pay workers’ salaries, to send a worker home to attend a funeral – another time it was because he had appendicitis and it was for hospital bills.”

Eventually, Elizabeth used up all her savings.

“Once he realised I didn’t have any more money, his messages stopped,” she said.

“He just disappeared. And you just feel like such an idiot. The story, the photos – all just lies. And afterwards everything seems too obvious.

“I’m too ashamed to tell anyone I know, even too ashamed to tell the police. I’m borderline now whether I lose my house or not,” Elizabeth told us at the time.

Announcing the ID Verification feature, a Tinder spokesperson said: “We know one of the most valuable things Tinder can do to make members feel safe is to give them more confidence that their matches are authentic and more control over who they interact with.

“And we hope all our members worldwide will see the benefits of interacting with people who have gone through our ID verification process.

“We look forward to a day when as many people as possible are verified on Tinder,” they added.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Science & Tech

Egypt: Researchers identify prehistoric killer whale that walked on land from 43-million-year-old fossil

Published

on

“It could kill any creature it crossed paths with,” say Egyptian scientists who have discovered a new killer whale fossil from the African nation’s Whale Valley.

Egyptian scientists have identified a new species of prehistoric killer whale from a 43-million-year-old fossil that was found in Eqypt’s “Whale Valley”.

The ancient fossil, which was unearthed in Egypt’s Western Desert in 2008, has been named as Phiomicetus Anubis, after the god of death in ancient Egypt.

The four-legged whale which is from the family of Protecetids, are extinct semi-aquatic whales that lived from 34 to 59 million years ago.

Egyptian researcher at Mansoura University Abdullah Gohar, shows the fossil of a 43 million-year-old four-legged prehistoric whale known as the "Phiomicetus Anubis," in an evolution of whales from land to sea, which was unearthed over a decade ago in Fayoum in the Western Desert of Egypt,
PIC:AP
Image:Researchers said it was approximately 2.7m (9ft) long and weighed around 600kg

Professor Hesham Sallam, of Mansoura University in Egypt, the leading palaeontologist who examined the fossil, said the creature was unique in its versatility in the way its features were adapted to hunt on land and in the sea – characteristics that made it stand out among other whale fossils.

“We chose the name Anubis because it had a strong and deadly bite,” said Professor Sallam.

“It could kill any creature it crossed paths with.”

The creature’s killer features included an elongated skull and snout. Its sharp hearing and acute sense of smell meant it was an efficient carnivore capable of hunting down, before grasping and chewing prey, researchers said. It was approximately 2.7m (9ft) long and weighed around 600kg.

The fossils of a 43 million-year-old four-legged prehistoric whale known as the "Phiomicetus Anubis," in an evolution of whales from land to sea, which was unearthed over a decade ago in Fayoum in the Western Desert of Egypt
PIC:AP
Image:Professor Sallam said it ‘could kill any creature it crossed paths with’. Pic: AP

Professor Sallam said his team did not start examining the fossil until 2017 because he wanted to assemble the best and the most talented Egyptian palaeontologists for the study.

The fossil sheds light on the evolution of whales from herbivore land mammals into a carnivorous species that today live exclusively in water.

The oldest fossil whales are approximately 50 million years old and are believed to have originated in modern-day Pakistan and India.

Scientists have not been able to reach a conclusive answer as to when whales moved from land to sea.

The location of the discovery of the fossil will give a clue as to how and when this happened.

Continue Reading

Science & Tech

Former US intelligence officers admit to mercenary hacking for United Arab Emirates

Published

on

The charges against them are published amid growing concerns that foreign states may be compromising US security by recruiting intelligence personnel to bolster their own capabilities.

Three former US intelligence and military officers have admitted working as mercenaries for the United Arab Emirates (UAE) and carrying out sophisticated hacking operations targeting victims in America.

The charges against them are published amid growing concerns that foreign states may be compromising US security by recruiting intelligence personnel to bolster their own capabilities.

The men, named as Marc Baier, Ryan Adams, and Daniel Gericke in an unsealed court document, were accused of breaking computer crime laws and export controls and have agreed to pay more than $1.6m (£1.1m) as part of a deferred prosecution agreement.

According to the court document, after leaving US government employment, the three men worked for an American company that provided licensed services to the UAE.

But in January 2016, “after receiving an offer for higher compensation and an expanded budget”, the men left this company and joined a new one called Dark Matter based in the gulf state.

The clandestine unit helped the UAE spy on human rights activists, journalists, and rival governments, according to Reuters, which reported on the clandestine unit called Project Maven before these charges were made public.

While working for the UAE business, which did not have an export licence to receive hacking technology from the US, the men developed “two similar ‘zero-click’ computer hacking and intelligence gathering systems” that were used to target victims in America.

“Today’s announcement shines a light on the unlawful activity of three former members of the US intelligence community and military,” said Steven D’Antuono of the FBI’s Washington Field Office.

“These individuals chose to ignore warnings and to leverage their years of experience to support and enhance a foreign government’s offensive cyber operations.

“These charges and the associated penalties make clear that the FBI will continue to investigate such violations.”

Bryan Vorndran, of the FBI’s cyber division, added: “This is a clear message to anybody, including former US government employees, who had considered using cyberspace to leverage export-controlled information for the benefit of a foreign government or a foreign commercial company – there is risk, and there will be consequences.”

As part of the deferred prosecution, Baier, Adams, and Gericke must cooperate with the Department of Justice’s investigation.

They have agreed to pay $750,000 (£542,000), $600,000 (£430,000), and $335,000 (£242,000) respectively over the next three years – funds which they are prohibited from being reimbursed for by the UAE.

They have also received a lifetime ban on receiving any security clearances, as well as from being employed as hackers or by “certain UAE organisations”.

Continue Reading

Science & Tech

Apple issues emergency software update after discovery of ‘zero click’ malware

Published

on

The spyware has been attributed “with high confidence” to Israel’s NSO Group.

Apple has issued an emergency software update after a flaw was found that allowed spyware attributed to Israel’s NSO Group to infect an iPhone, Apple Watch, or Mac computer without the user having to click on anything.

The malware was found on the phone of an unidentified Saudi activist by Canadian internet security watchdog Citizen Lab.

It is the first time that a “zero-click” exploit – an exploit that allows an attacker to hack into the device without requiring the victim to click on anything, meaning they have no chance to catch the attack – has been caught and analysed.

The phone is thought to have been infected in February, although the researchers discovered the malicious code on 7 September and immediately alerted Apple.

The logo of Israeli cyber firm NSO Group is seen at one of its branches in the Arava Desert, southern Israel July 22, 2021. REUTERS/Amir Cohen
Image:NSO Group is an Israeli cyber surveillance firm

Ivan Krstic, head of Apple security engineering and architecture, said: “After identifying the vulnerability used by this exploit for iMessage, Apple rapidly developed and deployed a fix in iOS 14.8 to protect our users.Advertisement

“Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals.”

“While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data,” he added.

Citizen Lab researcher Bill Marczak said there was high confidence that Israeli surveillance firm NSO Group was behind the attack, although it was “not necessarily” being attributed to the Saudi government.

In a statement to Reuters, NSO did not confirm or deny that it was behind the technique, saying only that it would “continue to provide intelligence and law enforcement agencies around the world with life-saving technologies to fight terror and crime”.

Citizen Lab has previously found evidence of zero-click malware being used to hack the phones of some journalists and other targets but Mr Marczak said this was the first time one had been captured “so we can find out how it works”.

A man reads at a stand of the NSO Group Technologies, an Israeli technology firm known for its Pegasus spyware enabling the remote surveillance of smartphones, at the annual European Police Congress in Berlin, Germany, February 4, 2020
Image:Experts say the average user does not need to be too concerned, as such attacks tend to be highly targeted

Security experts have said that the average user does not need to be too concerned, as such attacks tend to be highly targeted, but the exploit was still alarming.

Mr Marczak said that malicious files were put on the Saudi activist’s phone via the iMessage app before the phone was hacked with NSO’s Pegasus spyware.

This meant the phone was able to spy on its user, without them even knowing.

Citizen Lab researcher John Scott-Railton said: “Popular chat apps are at risk of becoming the soft underbelly of device security. Securing them should be top priority.”

In July it was reported that NSO Group’s spyware had been used to target journalists, political dissidents and human rights activists.

NSO Group says that its spyware is only used by governments to hack the mobile phones of terrorists and serious criminals, but a leaked list featuring more than 50,000 phone numbers of interest to the company’s clients suggested that it is being used much more broadly.

More than 1,000 individuals in 50 countries were allegedly selected for potential surveillance – including 189 journalists and more than 600 politicians and government officials, according to Paris-based journalism non-profit Forbidden Stories and Amnesty International, as well as their media partners.

Mr Marczak said on Monday: “If Pegasus was only being used against criminals and terrorists, we never would have found this stuff.”

It has also been reported that the FBI is investigating NSO Group, and Israel has set up a senior inter-ministerial team to examine the allegations surrounding how the spyware is being used.

Continue Reading

Trending Now