Users of Web Based WhatsApp Can Get Hacked

Experts have recently discovered a security flaw in one of the most popular mobile massaging applications called WhatsApp. The bug appeared to be located in the WhatsApp web extension and hackers could easily take control over 200m application users. At the same time, this security vulnerability was tracked in the web-based version of the application. As a result, app users could be tricked into downloading malware on their personal computers.

The problem is that the application is becoming popular with each day as the company managed to render the services to users of Android, BlackBerry and Windows Phones. The web based application is widely used as well and it lets using all the benefits of the application with the help of a web browser.

Whats app use with safety

Thanks to these services, users can track all the images, audio and video files that have been sent or received. One of the security companies called Check Point released all the details of the existing security vulnerability that can make millions of computers compromised. Hackers will easily get a chance to distribute bots, malicious codes and ransomware. With the help of the malware, hackers will easily get control over the system and information stored on the computers. Recently, WhatsApp stated that it has about 850m new users coming each month and about 150m of them appear to use a web based application.

The vulnerability is really dangerous as a hacker needs just a phone number related to the account. By clicking a file with malicious codes, received by a user, hackers launch the process of downloading malware. It is an interesting thing that the company recognized the bug present in a web based version of the application and released a fix for clients world-wide. Clients should know that every version of WhatsApp Web that followed v0.1.4481 has that fix and all the users can enjoy the messaging application with no limits.

Whatsapp-closeup by Murasam3, on Flickr
Photo by: (CC BY 2.0) by Murasam3

Comments are closed.