pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Major Vulnerability Exposed in WhatsApp

Whatsapp Vulnerability

WhatsApp is the latest application to fall prey to a major vulnerability being exposed. This impacted users of the web-based app and not the mobile app, fortunately. But, it still hit home the need to keep our computers protected and updated, and to keep a vigilant eye out for issues.

The web-based version of the WhatsApp app was only launched a few months back, initially for WhatsApp accounts on Android and Windows Phone devices and later for those on iPhones, but has already grown in popularity. The recent security vulnerability related to vCards, electronic business cards shared by WhatsApp users, and effectively amounted to a kind of phishing.

An error in the WhatsApp web client meant that less-than-innocuous vCard business cards created by hackers were not properly filtered out by the app. As a result, these phishing-style cards made it through to users who, if they clicked them, were at risk of the cards converting themselves to more harmful executable scripts once downloaded – and potentially accessing and playing foul with users’ personal data. There are even reports of a ransomware approach being taken by hackers in this case, with attempts being made to extort cash from WhatsApp users in exchange for restored access to their infected devices and hijacked data.

WhatsApp put a fix in place, by releasing an updated version of the app, prior to making public news of the security vulnerability. It’s worth making sure you have the latest version of WhatsApp installed on your phone, if you haven’t checked recently – WhatsApp’s phone and web versions are linked to one another, so ensuring you are up-to-date on your phone is the way to ensure you’re safe when using the web client too. The patch is also available directly through the web client, though this won’t update your phone’s version of the app at the same time.

The whole affair also serves as a timely reminder that it pays to be vigilant when it comes to using WhatsApp and other instant messaging platforms – including email. Avoid opening links or downloading files that you’re not expecting to receive, and proceed with caution even if you were anticipating them. It’s better to double check with the sender that they’re consciously passing a file to you, and that they’re fully aware of its contents, than to wait until your device has been infected and damage has potentially been inflicted on your vital data.

It is a good idea to regularly scan your PC for malware, viruses and other issues. We recommend a free software called SpyHunter.  Click on the link below and you will be able to download a free version that will allow you to scan your PC for issues.

Remove TakeOrLeave Malware

Filed Under: Articles

Latest Articles

Keep Your PC Cool

Computers need to stay as cool as possible in order to work properly. This becomes increasingly difficult as more people are trying to squeeze more processing power inside of their rigs. More components combined with people overclocking processors to get as much processing muscle as possible can … [Read More...]

Machine Learning Could Play a Key Role in Covid-19 Vaccination Strategies

Machine learning technology has been incredibly important in addressing some of the most pressing concerns of the pandemic. A number of countries used machine learning technology to help with contact tracing and improve social distancing capabilities. However, another benefit of machine learning … [Read More...]

CCD Scanners – History of Product

CCD technology is responsible for having made scanning a desktop application and has been in use for a number of years in devices such as fax machines and digital cameras. A CCD consists of many photo-sensitive elements, arranged in a grid in the case of a … [Read More...]

Revolutionize Your Internet Experience with Orbi 960 – The Ultimate WiFi System

In a world where seamless connectivity is essential, slow and unreliable internet connections are a major problem. Whether you are running a business, … [Read More...]

Do You Need a VPN When Trading Cryptocurrency?

There’s no doubt that the biggest global industries in 2023 are tech-driven, while there remains a significant crossover between many of these … [Read More...]

Goodbye Bitcoin: the 3 alternative cryptocurrencies that have great upside potential, according to experts

Bitcoin has been a very lucrative investment for people that got into it early. One report from The Motley Fool pointed out that $10 of bitcoin … [Read More...]

Self-driving cars face their Achilles’ heel and may be targets of hackers

The market for self-driving cars is booming. Customers spent $22.22 billion on these autonomous vehicles in 2021 and they will likely spend more in … [Read More...]

How to avoid scams with bitcoin and other cryptocurrencies

Cryptocurrencies got a bad reputation when scams multiplied like ants on a piece of cake. Even today many people associate bitcoin and other … [Read More...]

WHAT IS CLOUD COMPUTING AND WHAT ARE ITS MAIN BENEFITS?

Users are Increasingly using cloud computing to store their information, which is replacing local storage. The business digitization process goes … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Hard Disk SMART Drives

In 1992, IBM began shipping 3.5-inch hard disk drives that could actually predict their own failure - an industry first. … [Read More...]

Rotary Tuners Removal

RotaryTuners is another malware/spyware application that causes annoying commercial ads and popups inside your browser. If you are infected with this … [Read More...]

Digital Video Fundimentals

Understanding what digital video is first requires an understanding of its ancestor - broadcast television or analogue … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors