|More from: | Slashdot |||
WhatsApp developers have fixed a bug in the Android and iOS versions of the WhatsApp mobile app that allowed hackers to take over the application when users answered an incoming video call. From a report: Natalie Silvanovich, a security researcher with Google’s Project Zero security research team, discovered the WhatsApp vulnerability at the end of August. She described the vulnerability as a “memory corruption bug in WhatsApp’s non-WebRTC video conferencing implementation.” “Heap corruption can occur when the WhatsApp mobile application receives a malformed RTP packet,” Silvanovich said in a bug report. “This issue can occur when a WhatsApp user accepts a call from a malicious peer.” It is unclear how popular the video feature is on WhatsApp, which is used
About | Slashdot |
Slashdot was created in 1997 by Rob "CmdrTaco" Malda. Today it's owned by BIZX, LLC. Slashdot is run primarily by a handful of editors and coders, with the help of many others. As of April 2016, the Slashcode is wrangled and taunted by Drew ("SlashDrew") Kroft. The editors are Beau ("BeauHD") Hamilton, Manish ("manishs") Singh, David ("EditorDavid"), and Logan ("whipslash") Abbott.