Anyone Can Deactivate Your Personal
Total Page:16
File Type:pdf, Size:1020Kb
Kumbh mela returnees may exacerbate COVID-19 ... PG 04 << VIEWS & VISION OF CITY Volume: 12, Issue: 208 WEDNESDAY, APRIL 14, 2021, MUMBAI 12 Pages, ₹2 /- RNI No. MAHENG/2009/29332 www.afternoonvoice.com Akshaye Khanna, Kerala Education Raveena Tandon Minister to share KT Jaleel screen for... quits... << PG 12 << PG 05 ANYONE CAN DEACTIVATE YOUR PERSONAL Newsmakers Bureau afternoon_voice e w s W h a t s A p p Vulnerability revealed, Nthat might permit attackers to deactivate your WhatsApp account remotely. WhatsApp has recommended that users should provide their email address with the two-step verification to avoid such a hack. Security researchers Luis Márquez Carpintero and ACCOUNT Ernesto Canales Pereña have discovered the error that can exploited even if you've enabled The first weakness allows the However, while the attacker This will deactivate your allow attackers to remotely two-factor authentication (2FA) attacker to enter your phone won't be able to repeat the sign-in WhatsApp account, meaning suspend your WhatsApp for your WhatsApp account. number on WhatsApp installed process with your phone that you'll no longer be able to account. As first reported by WhatsApp has discovered a on their phones. This will, of number, they will be able to access the instant messaging app Forbes, the researchers found vulnerability that allows an course, not give access to your contact WhatsApp support to on your phone. You won't be able that the flaw exists on the invader to suspend your WhatsApp account unless the deactivate your phone number to avoid that deactivation by instant messaging app due to account remotely using your attacker obtains the six-digit from the app. What they need is a using 2FA on your WhatsApp two fundamental weaknesses. phone number. The flaw that registration code you'll get on new email address and a simple account as the account has A large number of WhatsApp has now been found by security your phone. Multiple failed email stating that the phone has apparently been deactivated users are said to be at risk as a researchers appears to have attempts to sign in using your been stolen or lost. In response to through the email sent by the remote attacker can deactivate e x i s t e d o n t h e i n s t a n t phone number will also block that email, WhatsApp will ask attacker. WhatsApp on your phone and messaging app for quite some code entries on WhatsApp for a confirmation that the then restrict you from activating time now — due to fundamental installed on the attacker's phone attacker will quickly provide it back. The vulnerability can be weaknesses. for 12 hours. from their end. CONTINUED ON PAGE 4 WhatsApp users’ needs to be careful but no app is immune to vulnerabilities he maximum population of India uses smartphones and network. WhatsApp. This app has become their life. WhatsApp has When Facebook bought WhatsApp in 2014, it vowed to keep the Tbecome an inevitable communication mode. When two services separate. Yet only a few years later, Facebook Facebook took over WhatsApp, there were many rumours that announced aims to integrate the messaging systems of Facebook, WhatsApp was sharing some data with Facebook, including phone Instagram and WhatsApp. This appears to have stalled owing to numbers and profile name, but this has been happening for years. technical and regulatory difficulties about encoding, but it’s still WhatsApp the messaging app doesn’t gather the content of your the long-term plan. chats, but it does collect the metadata attached to them – such as the All of sudden people not only felt cheated but they were scared of sender, the time a message was sent and who it was sent to. This can a data breach and switched to Signal, a secure messaging app, be shared with “Facebook companies”. Facebook’s highly which has been the main beneficiary of the WhatsApp evacuation. Dr.Vaidehi disparaged data collection tenet has worn trust in the social CONTINUED ON PAGE 2 afternoonvoice.com/editorial [email protected] afternoon_voice afternoonvoicenews TUESDAY, APRIL 13, 2021 Editoritis AFTERNOON VOICE, MUMBAI 02 WhatsApp users needs to be careful The fact is that no app is immune to but no app is immune to vulnerabilities security vulnerabilities; they << PAGE 1 CVE-2020-1894 was a stack-overflow issue in Android and are a fact of iOS apps that could allow for arbitrary code implementation technological life. It’s Another messaging app, Telegram, has also qualified for an triggered by a malicious push-to-talk message. Severity the way those uptick in downloads, but Signal has been topping the charts rating of vulnerability marked high susceptibilities are on the Apple and Android app stores. India’s cyber security agency, the Computer Emergency dealt with that is vital. Signal aids from being the most similar to WhatsApp in Response Team (CERT-In) recently issued an alert against CVE-2020-1886 was a terms of features, while Telegram has had problems as a multiple vulnerabilities in older versions of WhatsApp and buffer-overflow secure and private messaging app, with its live location WhatsApp Business for iOS. The severity rating of the problem in the feature recently coming under fire for privacy breaches. vulnerability has been marked high. According to the alert WhatsApp for Significantly, Telegram is not end-to-end encrypted by issued by CERT-In, there were two critical vulnerabilities Android app, versions default, instead of storing your data in the cloud. The Signal in WhatsApp and WhatsApp Business of iOS — an before v2.20.11 that is end-to-end encrypted, collects less data than Telegram and Improper Access Control vulnerability (CVE-2020-1908) could be caused by stores messages on your device rather than in the cloud. and a User-After-Free vulnerability (CVE-2020-1909). Still, WhatsApp is used by millions of people, it is truly a These vulnerabilities have been disclosed by WhatsApp as receiving and dynamo when it comes to apps in general, let alone part of its November update to its security advisories. The answering a messenger ones specifically. With this level of success improper Access Control vulnerability can allow hackers malevolent video call. comes increased exposure to those who would do WhatsApp to access WhatsApp even after a phone is locked. The user’s harm. Those using WhatsApp on the iPhone were vulnerability affects WhatsApp iOS versions prior to the warned about a one-click attack risk earlier this year, for v2.20.100. example. A reported “sharp rise” in WhatsApp security flaws The use-after-free in a logging library in WhatsApp can be across 2019 has even led to some reports of political staffers exploited by a remote attacker “by sending a specially crafter being advised to switch to contending secure messenger, animated sticker to the target while placing a WhatsApp Security researchers Signal. video call on hold, resulting in several events occurring have identified a The fact is that no app is immune to security together. The CERT-In advisory suggests users install and JavaScript vulnerabilities; they are a fact of technological life. It’s the update to the latest version of WhatsApp with security vulnerability in the way those susceptibilities are dealt with that is vital. CVE- patches from the App Store. A high-severity vulnerability WhatsApp desktop 2020-1886 was a buffer-overflow problem in the WhatsApp could allow cybercriminals to push malware or remotely platform that could for Android app, versions before v2.20.11 that could be execute code, using seemingly innocuous messages. caused by receiving and answering a malevolent video call. allow cybercriminals Security researchers have identified a JavaScript CVE-2020-1889 affected the WhatsApp desktop client vulnerability in the WhatsApp desktop platform that could to spread malware, before v0.3.4932 and was an appreciation of privilege threat allow cybercriminals to spread malware, phishing or phishing or when combined with a remote code execution vulnerability ransomware campaigns through notification messages that ransomware to escape the system security sandbox. CVE-2020-1890 was appear completely normal to unsuspecting users. And, campaigns through another Android app problem, this time triggered by receipt further investigation shows this could be parlayed into notification messages of a malicious sticker message that could lead to privilege remote code execution. More specifically, “The flaws leave that appear escalation once more. users vulnerable to attacks by allowing both the text content CVE-2020-1891 was in both Android and iOS apps and completely normal and links in website previews to be tampered with to display involved the video call handler. All that’s publicly known is false content and modified links that point to malicious to unsuspecting that it could impact confidentiality, integrity and availability. destinations. users. [email protected] vaidehitaman vaidehisachin Volume No. 12 | Issue No. 207 Editor Dr. Vaidehi Printer and Publisher Printed at Newsmakers Publications Pvt. Ltd. S R Publication & Printing Press Vaishali Nagar, Dahisar (E), Mumbai - 68. www.afternoonvoice.com www.newsmakers.co.in Shop No 07, Swapna Siddhi Complex, www.beyondthenews.biz www.nbcaward.com Akurli Road, Kandivali (East), Mumbai 400 101. www.mumbaimanoos.com www.hackers5.com Post Box No.8571 Mumbai- 400 101 Tel: 9137352545 Email- [email protected] • SMS -9820199881 For any queries regarding the editorial desk, contact - 7506760610 Disclaimer : The views expressed in the edit are solely of the editor. The publication do not necessarily share the opinions expressed. Any litigation against the content or publication will be entertained under the Jurisdiction of Mumbai only. afternoonvoice.com/opinion [email protected] afternoon_voice afternoonvoicenews WEDNESDAY, APRIL 14, 2021 Voices AFTERNOON VOICE, MUMBAI 03 “Dr.