Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
whatsapp exploit allows hackers to gain unauthorized access to devices
- This topic has 0 replies, 1 voice, and was last updated 1 year, 6 months ago by .
An exploit was recently discovered which could allow hackers to gain unauthorized access to android devices by means of a simple, or not so simple gif image. This image contains malicious code which can enable anyone who sends the file to gain access to the phone without the user’s consent, since it maintains the same permissions as whatsapp is granted. Luckily, this vulnerability has been pattched but it’s hard not to wonder whether or not this is an example of foreshadowing in the world of technology. https://thehackernews.com/2019/10/whatsapp-rce-vulnerability.html
You must be logged in to reply to this topic.