WhatsApp Vulnerability Spies on Users

by / Wednesday, 15 May 2019 / News Category Business 2 Community

Hacked Message on Mobile Device

What happened?

On Monday, May 13, 2019, the popular messaging app, WhatsApp, announced hackers had exploited a flaw in the app’s voice call feature, installing surveillance software on users’ smartphones (both iOS and Android), which may have impacted its 1.5 billion users worldwide. As of Tuesday, May 14th, the exact number of victims remains unknown.

The hack may mean that spyware technology, created by NSO Group, infiltrated WhatsApp. This compromise could include the ability to turn on a phone’s microphone and camera, spy through emails and messages, and collect location data, according to the New York Times. NSO offers its surveillance technology to authorized governments to fight terrorism and cybercrime.

WhatsApp is a Facebook-owned application.

Should I Be Worried?

The security vulnerability was patched over the weekend, before the news was announced. WhatsApp users are urged to update their app to the latest version, version 2.19.51. If you are not sure how to do this, you can follow instructions here.

It is unknown what information may have been compromised, but mobile vulnerabilities are a leading factor in data breaches. If cybercriminals accessed the Personally Identifiable Information (PII) of WhatsApp users, that data is at risk of being sold on the dark web or used to commit identity theft and fraud.

3 Tips to Protect Yourself

  1. Update your phone software and all mobile apps. Make sure you have the latest iOS or Android update installed. Having all applications up to date reduces the risk of a vulnerability infiltrating your device.
  2. Change your passwords. Update passwords for your accounts and refrain from storing passwords to your phone. If you have a hard time remembering your login credentials, use a password manager.
  3. Safeguard your device with Mobile Protection. Invest in a mobile program that alerts you of rogue applications, spyware, and unsecured Wi-Fi connections for added security.

Read more on Business 2 Community 

Related News
I can’t tell you how many times I’ve read or heard that “email is dead,” even though 247 billion emails are still sent every day. Likewise, the phone is proclaimed ...
WASHINGTON — The Twitter and YouTube accounts of the US Central Command were easy to hack because the military was using simple passwords, a senior administration official said Tuesday. “Obviously... ...
EvoNexus has long been established as the place to incubate if you’re in the San Diego area, and the recent expansion of their network to Irvine has brought that prestige ...
Canadian military on the lookout for spies and sabotage during annual Arctic training: internal documents
OTTAWA — The Canadian military has been routinely deploying a counter-intelligence team to guard against possible spying, terrorism and sabotage during its annual Arctic exercise, according to internal documents.Adrian Wyld ...
That depends on where the data comes from.I recently saw a comment by Randall Bolten to a Proformative webinar on Excel based reporting. Mr. Randall is author of the book ...
Programmatic advertising has seen a stellar rise, more than doubling each year for the past two years. This year the share of programmatic will be over half of the total ...
As a business owner, your biggest responsibility is to make sure that all operations run smoothly and you limit risks. In other words, you have to do all you can ...
The availability of customer data provides endless opportunities for businesses. Businesses can use customer data to amplify their marketing efforts, better understand their customers, hit targets, and grow their business.The ...
It’s Not A Phone. It’s A Human Connect
Simple passwords led to CENTCOM Twitter hack: official
EvoNexus Rolls out the Red Carpet for 26
Canadian military on the lookout for spies and
Is Excel Reporting A Wise Choice?
Mobile to Claim 70% of Programmatic Display Market
How to Legally Protect Your Online Business
Lacking a Data Strategy That Makes Sense?
Share Button
Tagged under:

Leave a Reply