skip to content »

tenpoint.ru

Online dating exploits

online dating exploits-36

The next time someone sends you a "you're so hot" opening line on a dating app, try simply saying "Yeah I am." That's exactly what one college student started doing, and she got some... Claire Boniface, a 20-year-old student, began conducting a social experiment she called "agreeing with boys when they compliment you." Rather than profess thanks and gratitude to suitors offering compliments via online dating sites, Boniface politely agreed with them.

online dating exploits-41online dating exploits-51online dating exploits-20

"They don't know what to do when a woman isn't grateful for their comments and so they take away the compliment as if this will change anything." Gweneth Bateman, an 18-year-old from the U.Though most of Monica's dates were positive, even though she says the first one with a 23-year-old had a 'vague Benny Hill sauciness about it' she has admitted that some verged on dangerous, recalling one man who put his hands around her throat during sex.But now she says she has quit online dating, after penning a book about her experiences called Raven: My Year of Dating Dangerously and has revealed she has no shortage of offers despite being so frank about her sex life.'I've deleted all my online dating accounts now,' she says 'I've got something out of my system - it was just a reaction to my situation and not something you can do for very long, you have to move on.'There were some people who said "who'd want to be with her now?Bateman then began responding to her own "complimentary" messages in a similar fashion, including those received through Twitter direct message, Facebook and texting. Below are a few of them, which she provided to Huff Post: "Many responses state how 'vain' and 'conceited' I was for agreeing with their compliment which I found baffling," Bateman said."Why give me the compliment in the first place if you didn't want me to believe it?The sample collected in this particular instance was the Tinba banking Trojan.

Given that the time frame of both attacks and that the ad network involved is the same, chances are high that pof[dot]com dropped that Trojan as well.

K., shared Boniface's Tumblr post with her 66,700 Twitter followers.

Bateman told The Huffington Post she wanted to introduce the experiment to her following because she thought it made an important point about how women are treated on the Internet.

The ad network involved in the malvertising campaign (ad.360yield.com) was familiar and it turns out that we had observed it in a rare attack captured by our honeypots just one day prior.

As you can see in the picture below, the redirection chain goes through multiple hoops before reach its final destination, the exploit kit landing page.

You can browse for vendors, products and versions and view cve entries, vulnerabilities, related to them.