• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Malware-laced images may lead to hacking of WhatsApp and Telegram

3100

Millions of WhatsApp and Telegram accounts could be at risk due to malicious files concealed in a faç ade of images or videos.

The vulnerability was uncovered last week by a research team from Check Point, a security firm, and they claimed the hackers can easily overtake the victim’ s account and access all their personal information such as conversations, contact lists, photos, videos and other shared media.

Since WhatsApp and Telegram use end-to-end encryption which protects privacy of its users, the messaging platforms cannot be aware of the content of the messages, hence the malicious messages can easy go unnoticed by the platform.

Both the applications lets only a certain type of files like images and videos to be uploaded, and also includes mechanisms checks to ensure that only those kinds of files get uploaded. But, the researchers at Check Point have found a way to bypass the verifications by uploading HTML files which can mimic images and videos that look attractive.

The team at Check Point had notified about the threat to both the platforms last week. WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients. WhatsApp has updated their web service which has additional secure features and recommended its users to use the latest version.

Tags:
jackson
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 2 )

Q

Can pictures have viruses?

A

A Jpeg file can contain a virus. A picture or photo in your PC can have different file extensions, such as jpeg, bmp, etc. ... You cannot receive or send viruses through images that include jpegs, .gifs, etc. but can you send or receive viruses through executable files like .exe, .scrg, etc.

Q

It is possible to hack the Telegram?

A

That means you have to be very smart in monitoring the activities because a user may use any other device once they know that someone is spying on him. However, there are many other ways to hack telegram app; you can use telegram hack tools. Telegram trackers are developed to spy the messages on a telegram.

Related Tutorials in Malware-laced images may lead to hacking of WhatsApp and Telegram

Related Tutorials in Malware-laced images may lead to hacking of WhatsApp and Telegram

How to use Whatsapp using Whatsapp web client in Linux
How to use Whatsapp using Whatsapp web client in Linux
Mar 25, 2016
How to Install Telegram on Linux Mint18.3
How to Install Telegram on Linux Mint18.3
Apr 23, 2018
How to Configure Telegram with Netdata for CPU, RAM load Alert
How to Configure Telegram with Netdata for CPU, RAM load Alert
Feb 1, 2021
How to create Extensions on AI SmartCaller
How to create Extensions on AI SmartCaller
Aug 29, 2024
What is AI smartcaller?
What is AI smartcaller?
Aug 30, 2024

Related News in Malware-laced images may lead to hacking of WhatsApp and Telegram

Related News in Malware-laced images may lead to hacking of WhatsApp and Telegram

Malware-laced images may lead to hacking of WhatsApp and Telegram
Malware-laced images may lead to hacking of WhatsApp and Telegram
Mar 16, 2017
WhatsApp and Telegram Security Flaw Can Make Hackers to Manipulate Media Files
WhatsApp and Telegram Security Flaw Can Make Hackers to Manipulate Media Files
Jul 19, 2019
Distributed Denial of Service attack on Telegram causes service outages
Distributed Denial of Service attack on Telegram causes service outages
Jun 15, 2019
Cybersecurity Agency Warned WhatsApp Users To Upgrade To Avoid The Vulnerability
Cybersecurity Agency Warned WhatsApp Users To Upgrade To Avoid The Vulnerability
Nov 25, 2019
Indian Government Wants Answers About WhatsApp's Recent Spyware
Indian Government Wants Answers About WhatsApp's Recent Spyware
May 20, 2019
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help legeek ?
Installation of the call center module

hello

I wish to install a call center in virtual with issabel, I downloaded the latest version of it , but I don' t arrive to install the call center module in issabel. please help me

thanks!

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.