A couple of months before, the digital world was riddled with anxiety when a messaging bug—present in the Android operating system—left an astounding 95% of its users exposed and vulnerable to threats. Recently, we’ve learned of another alarming glitch, this time, it’s lurking within the ubiquitous messaging platform of Facebook – WhatsApp.
A diligent security team from Check Point raised a foreboding alarm-stating that with the discovery of this flaw, up to 200 million of the over 800 million WhatsApp users could be in potential danger. This perilous loophole grants cyber hackers the ability to disseminate malware, including ransomware which essentially locks a user’s files, only to be released upon the payment of a ransom. The susceptibility revolves around execution via a digital business card. Once unsuspectingly opened by a targeted user, the unidentified malicious code is stealthily delivered into the system. The only prerequisite for this illicit process? The targeted user’s phone number.
In response to discoveries of security breaches, developers generally lean on the early warnings from security companies to commence their mitigation operations. This time was no different. The builders behind WhatsApp have made it clear that they’ve successfully patched up the troublesome crack in their system, securing the confidentiality of the 200 million users of its web app.
However, in the world of cybersecurity, indifference equates to exposure. Despite the apparent resolution, we must maintain steadiness and vigilance. We always recommend keeping your applications updated to the latest versions released by the developers – a simple safety measure that often helps in averting major security anomalies.
While there’s no preventing all possible security breaches, we can greatly minimize exposure by arming ourselves and our technical assets with the right protective measures. Thus, keep those eyes peeled, stay security-conscious, and keep your system updated!
Discover more from TechBooky
Subscribe to get the latest posts sent to your email.