pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Major Vulnerability Exposed in WhatsApp

Whatsapp Vulnerability

WhatsApp is the latest application to fall prey to a major vulnerability being exposed. This impacted users of the web-based app and not the mobile app, fortunately. But, it still hit home the need to keep our computers protected and updated, and to keep a vigilant eye out for issues.

The web-based version of the WhatsApp app was only launched a few months back, initially for WhatsApp accounts on Android and Windows Phone devices and later for those on iPhones, but has already grown in popularity. The recent security vulnerability related to vCards, electronic business cards shared by WhatsApp users, and effectively amounted to a kind of phishing.

An error in the WhatsApp web client meant that less-than-innocuous vCard business cards created by hackers were not properly filtered out by the app. As a result, these phishing-style cards made it through to users who, if they clicked them, were at risk of the cards converting themselves to more harmful executable scripts once downloaded – and potentially accessing and playing foul with users’ personal data. There are even reports of a ransomware approach being taken by hackers in this case, with attempts being made to extort cash from WhatsApp users in exchange for restored access to their infected devices and hijacked data.

WhatsApp put a fix in place, by releasing an updated version of the app, prior to making public news of the security vulnerability. It’s worth making sure you have the latest version of WhatsApp installed on your phone, if you haven’t checked recently – WhatsApp’s phone and web versions are linked to one another, so ensuring you are up-to-date on your phone is the way to ensure you’re safe when using the web client too. The patch is also available directly through the web client, though this won’t update your phone’s version of the app at the same time.

The whole affair also serves as a timely reminder that it pays to be vigilant when it comes to using WhatsApp and other instant messaging platforms – including email. Avoid opening links or downloading files that you’re not expecting to receive, and proceed with caution even if you were anticipating them. It’s better to double check with the sender that they’re consciously passing a file to you, and that they’re fully aware of its contents, than to wait until your device has been infected and damage has potentially been inflicted on your vital data.

It is a good idea to regularly scan your PC for malware, viruses and other issues. We recommend a free software called SpyHunter.  Click on the link below and you will be able to download a free version that will allow you to scan your PC for issues.

Remove TakeOrLeave Malware

Filed Under: Articles

Latest Articles

Remo Recover Mac Pro Review

PROS: This product is very easy to use, even for a novice. CONS: The price tag is a little steep, but worth it for ease of use and the data recovery options it offers. OVERVIEW: Remo Recover Mac Pro is designed to recover your media files and other lost data. It is for Mac users only, and will … [Read More...]

Pentium 4 Removal

It's unlikely that you'll ever need to remove the fan/heatsink assembly once fit. However, if you do, Intel offer the following advice on how to tackle this somewhat tricky procedure. First make the processor area accessible and unplug the processor fan heatsink power cable from the motherboard … [Read More...]

IEEE 802.11 – The new standard

The Institute of Electrical and Electronics Engineers (IEEE) ratified the original 802.11 specification in 1997 as the standard for WLANs. That version of 802.11 provided for 1 Mbit/s and 2 Mbit/s data rates and a set of fundamental signalling … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

How Data Transforms Retail Businesses

The retail industry is continuously experiencing changes. Following the introduction of new technologies like mobile shopping and e-commerce, people … [Read More...]

Writing A Term Paper as a Computer Science Major

There are a lot of different things that you have to deal with as a computer science major. You probably went into the major thinking that you could … [Read More...]

2008 to 2009 Updates of the PCTechGuide

Date Details of recent updates 18May 09 New page on the digital image series explaining colour palettes, colour look-up tables, and … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors