
Photo by appshunter.io on Unsplash
Tinder To Require Facial Recognition In California To Reduce Impersonation
- Written by Andrea Miliani Former Tech News Expert
- Fact-Checked by Sarah Frazier Former Content Manager
Tinder is now requiring new users in California to use facial recognition technology to verify their profiles. The matchmaking platform aims to reduce impersonation as the feature has already performed well in Colombia and Canada.
In a rush? Here are the quick facts:
- Tinder is requiring users in California to use facial recognition technology.
- The ID verification feature has already been deployed in Colombia and Canada, achieving good results.
- The company is considering safety a core business strategy.
According to Axios , the initiative is part of Match Group—Tinder’s parent company—broader efforts to enhance user safety. The new feature, called Face Check, is designed to scan users’ faces during the onboarding process.
Users will be asked to make a short video selfie, and the technology will verify if the image matches the photos uploaded for the profile. The system will also detect if the person has multiple profiles. Those who verify their ID will get a verified badge on their profile.
“We see this as one part of a set of identity assurance options that are available to users,” said Yoel Roth, Match Group’s head of trust and safety, to Axios. “Face Check … is really meant to be about confirming that this person is a real, live person and not a bot or a spoofed account.”
Tinder introduced ID verification in 2020, which uses a government-issued ID to confirm age and name, Face Check will be another security layer.
Face Check has already been introduced in Colombia and Canada, and the company said it helped reduce bad actor reports and improved the perception of authenticity.
Spencer Rascoff, Match Group CEO, explained that they are considering safety a core business strategy. “Even if in the short term, it has the effect of potentially reducing some top-line user metrics, we think it’s the right thing to do for the business,” said Rascoff.
A few days ago, Tinder also began testing a paid feature that allows users to set height preferences , sparking debate in the community. Features that filter appearance have gained interest among users, as well as concerns.
Competitors such as Bumble and Hinge have been implementing similar features recently. Tinder’s new initiatives come after the company has been facing challenges in the market, as paid users dropped 5% and it will lay off 13% of staff.

Image by Rami Al-zayat, from Unsplash
Android Malware Up 151% As Mobile Cybercrime Becomes More Organized
- Written by Kiara Fabbri Former Tech News Writer
- Fact-Checked by Sarah Frazier Former Content Manager
Android users face a 151% spike in mobile malware as attackers shift to smarter, large-scale scams exploiting outdated software and user trust.
In a rush? Here are the quick facts:
- Spyware incidents increased 147%, peaking in February and March.
- SMS-based malware spiked 692% between April and May.
- Over 30% of Android devices run outdated, unpatched systems.
Mobile malware targeting Android users has surged 151% in the first half of 2025, according to new data from Malwarebytes . Security researchers warn that this isn’t just a spike, it’s the start of a new, more organized era of mobile threats.
Spyware, which collects data without user consent, rose by 147%, especially in February and March. Even more alarming is a 692% jump in SMS-based malware between April and May, likely driven by tax scams and fake toll fee messages, as noted by Malwarebytes.
“These numbers show attackers are scaling up,” said Shahak Shalev, Sr. Director at Malwarebytes. “Attackers are moving beyond simple scams to building sustainable criminal enterprises. They’re playing the long game now—developing monetization strategies for every type of data they can harvest.”
Malwarebytes explains that one major threat, SpyLoan, offers fake loans with attractive terms to trick people into sharing private info. Banking Trojans, fake financial tools, and “updates” hiding malware are now more common than traditional adware. Many are being distributed through both official and unofficial app stores.
Shalev added, “The February spike shows this isn’t random, it’s methodical business development in the cybercrime space”
Malwarebytes says that a big part of the problem is outdated software. More than 30% of Android devices still run old operating systems that can’t get security patches. Others, especially cheap or fake phones, come preloaded with malware.
To protect yourself, only download apps from the Google Play Store, check app permissions carefully, and avoid enabling features like “Display over other apps.” Google Play Protect offers built-in defense, but it’s not foolproof.
What’s happening isn’t random, it’s organized. Shalev concluded saying, “The Android threat landscape has matured into a network of monetization schemes that thrive on scale, persistence, and user trust. Attackers aren’t just after quick wins—they’re building operations that last.”