• Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • Categories
    Category
    {{ postCtrl.tags }}
    • {{ category.tag_type }}

      • {{tag.tag_name}}
      • View more
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
Tutorial News Comments FAQ Related Articles

Malware-laced images may lead to hacking of WhatsApp and Telegram

{{postValue.id}}

Millions of WhatsApp and Telegram accounts could be at risk due to malicious files concealed in a faç ade of images or videos.

The vulnerability was uncovered last week by a research team from Check Point, a security firm, and they claimed the hackers can easily overtake the victim’ s account and access all their personal information such as conversations, contact lists, photos, videos and other shared media.

Since WhatsApp and Telegram use end-to-end encryption which protects privacy of its users, the messaging platforms cannot be aware of the content of the messages, hence the malicious messages can easy go unnoticed by the platform.

Both the applications lets only a certain type of files like images and videos to be uploaded, and also includes mechanisms checks to ensure that only those kinds of files get uploaded. But, the researchers at Check Point have found a way to bypass the verifications by uploading HTML files which can mimic images and videos that look attractive.

The team at Check Point had notified about the threat to both the platforms last week. WhatsApp and Telegram responded quickly and responsibly to deploy the mitigation against exploitation of this issue in all web clients. WhatsApp has updated their web service which has additional secure features and recommended its users to use the latest version.

Tags:
jackson
Author: 

Comments ( 0 )

No comments available

Add a comment
{{postCtrl.cmtErrMsg}}

Frequently asked questions ( 2 )

Q

Can pictures have viruses?

A

A Jpeg file can contain a virus. A picture or photo in your PC can have different file extensions, such as jpeg, bmp, etc. ... You cannot receive or send viruses through images that include jpegs, .gifs, etc. but can you send or receive viruses through executable files like .exe, .scrg, etc.

Q

It is possible to hack the Telegram?

A

That means you have to be very smart in monitoring the activities because a user may use any other device once they know that someone is spying on him. However, there are many other ways to hack telegram app; you can use telegram hack tools. Telegram trackers are developed to spy the messages on a telegram.

Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Isaiah ?
What is the use of SUID & SGID commands

How to set the special permissions to the files and folders using SUID and SGID commands...

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.