As far as we know, updates are critical to maintaining the app and introducing new features that increase user engagement. In order not to lose new features and for security reasons. Now the warning comes from security firm Check Point, which has discovered a serious flaw in WhatsApp for iOS and Android. According to the company, this security flaw allows hackers to cause WhatsApp to stop working and to reinstall the application. If this happens, you will eventually lose all your groups during the process. It is also important to highlight a point that deserved great attention from Check Point. If a hacker takes advantage of this flaw, it will not only be your WhatsApp that will be affected, but also your friends’. To exploit this flaw, a specific message is sent to one of your groups. And as soon as this happens, all members’ WhatsApp will stop working until they install it again. Also, it will not be possible to return to the group and until it is permanently deleted, the application will continue to block it constantly. This followed another WhatsApp vulnerability discovered by last year. The FakesApp vulnerability allowed people to manipulate messages in group chats. To make it appear as if other users had said things they had not. This worked by manipulating the parameters used by the WhatsApp web interface to fake the apparent sender of a message. To Prevent the Occurrence, WhatsApp Already released a New Version that Scraps this Security Hole As usual, once they discovered this flaw, the Check Point team quickly alerted WhatsApp. Therefore, a patch is available that resolves the issue. It patched the issue in September with version 2.19.58.

Therefore, confirm that you do not have any updates available on your smartphone. So that you do not risk losing access to one of your chat groups.


administrator

I'm Funsho, a lover of anything technology. I have an uncontrollable passion for sharing the latest and trending tech-related ideas and information.

Leave a Reply

Your email address will not be published. Required fields are marked *