WhatsApp security vulnerability
A security vulnerability in WhatsApp poses a threat to all users, whether iOS, Android, Tizen or Windows Phone. Unauthorized persons can gain remote access to the smartphone via the vulnerability (CVE-2019-3568).
Cybercriminals infiltrate the spyware via a WhatsApp call, even if the called party does not accept the call. Security specialist Eset recommends updating WhatsApp manually.
Thomas Uhlemann, Eset Security Specialist, emphasizes: "The current vulnerability in WhatsApp is not currently used for mass surveillance, but is used for targeted attacks. Nevertheless, it cannot be ruled out that in the medium term these attacks will be exploited by cybercriminals across the board. We will have to be prepared for these kinds of attacks against messenger and communication services in the future as well. Especially with WhatsApp, because a broad mass of users use it every day." Users should currently initiate the current update manually in order not to lose any time. Many devices still show the affected version of the application as current.
Tips from the security expert
– Manually check for updates: Users should check the App Store (Apple) or Google Play for the latest version of WhatsApp and trigger the update manually.
– Update operating system: In the course of this, it is a good idea to also install the current version of the operating system.
– Enable automatic updates: It is advisable to activate the automatic update function. This way, users will always get the latest version of the installed apps and the operating system in a timely manner.
Versions not affected
These version numbers of WhatsApp are no longer affected by the vulnerability:
- Android: v2.19.134
- Business for Android: v2.19.44
- iOS: v2.19.51
- Business for iOS: v2.19.51
- Tizen: v2.18.15
- Windows Phone: v2.18.348
Source: Eset