SlideShare a Scribd company logo
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
NewsBytes - Nullhyd
WhatsApp Users Vulnerable to v Card Vulnerability
● A dangerous security flaw in the web version of the popular instant messaging app
puts up to 200 Million of its users at risk.
● This flaw allows to compromise your machines by distributing malware.
● "To target an individual, all an attacker needs is the phone number associated with
the [WhatsApp] account,"

More Related Content

PPTX
Null hyderabad - October Newsbytes
PPTX
News Bytes - December 2015
PPTX
Attack chaining for web exploitation
PPT
Ransomware - The Growing Threat
PPTX
How to stay protected against ransomware
PDF
Web security 2012
PDF
WannaCry Ransomware Attack: What to Do Now
PDF
NewsByte Mumbai October 2017
Null hyderabad - October Newsbytes
News Bytes - December 2015
Attack chaining for web exploitation
Ransomware - The Growing Threat
How to stay protected against ransomware
Web security 2012
WannaCry Ransomware Attack: What to Do Now
NewsByte Mumbai October 2017

What's hot (20)

PPTX
Cyber Attack Survival: Are You Ready?
PPTX
Evolution of ransomware
PDF
Web Security
PDF
Jean pier talbot - web is the battlefield - atlseccon2011
PPT
Web Security and Network Security
PPTX
Ransomware
PPTX
Cerdant Security State of the Union
PPTX
Wannacry & Petya ransomware
PPTX
Cisco Web and Email Security Overview
PPTX
Web Security
PDF
Ransomware- What you need to know to Safeguard your Data
PDF
Cyber Attack Analysis : Part I DDoS
PPTX
seminar report on What is ransomware
PDF
Sophos Day Belgium - The IT Threat Landscape and what to look out for
PDF
Enterprise security: ransomware in enterprise and corporate entities
PDF
Ransomware and tips to prevent ransomware attacks
PDF
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
PPSX
Threat predictions 2011
PPTX
This is Next-Gen IT Security - Introducing Intercept X
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Cyber Attack Survival: Are You Ready?
Evolution of ransomware
Web Security
Jean pier talbot - web is the battlefield - atlseccon2011
Web Security and Network Security
Ransomware
Cerdant Security State of the Union
Wannacry & Petya ransomware
Cisco Web and Email Security Overview
Web Security
Ransomware- What you need to know to Safeguard your Data
Cyber Attack Analysis : Part I DDoS
seminar report on What is ransomware
Sophos Day Belgium - The IT Threat Landscape and what to look out for
Enterprise security: ransomware in enterprise and corporate entities
Ransomware and tips to prevent ransomware attacks
Upwardly Mobile: Looking at Evolving Cybercrime Tactics in Mobile Malware
Threat predictions 2011
This is Next-Gen IT Security - Introducing Intercept X
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Ad

Viewers also liked (20)

PDF
Stegano Secrets - Python
PPTX
News Bytes - June 2015 - Null HYD
PPTX
Perl basics for pentesters part 2
PDF
Secure Coding For Java - Une introduction
ODP
Shell Scripting & Ruby Hacking
PDF
Secure java script-for-developers
PDF
Again with the Ajax accessibility
KEY
Javascript done right - Open Web Camp III
PDF
Null Singapore - Can We secure the IoT - Chadi Hantouche
PDF
Linux Hardening - nullhyd
PDF
Three things that rowhammer taught me by Halvar Flake
PPTX
DNS hijacking - null Singapore
PDF
Managing third party libraries
PPTX
PPTX
Security Information Event Management - nullhyd
PPT
Reverse Engineering Android Application
PPTX
Identifying XSS Vulnerabilities
PPT
iOS Application Pentesting
PPTX
Veil Evasion and Client Side Attacks
Stegano Secrets - Python
News Bytes - June 2015 - Null HYD
Perl basics for pentesters part 2
Secure Coding For Java - Une introduction
Shell Scripting & Ruby Hacking
Secure java script-for-developers
Again with the Ajax accessibility
Javascript done right - Open Web Camp III
Null Singapore - Can We secure the IoT - Chadi Hantouche
Linux Hardening - nullhyd
Three things that rowhammer taught me by Halvar Flake
DNS hijacking - null Singapore
Managing third party libraries
Security Information Event Management - nullhyd
Reverse Engineering Android Application
Identifying XSS Vulnerabilities
iOS Application Pentesting
Veil Evasion and Client Side Attacks
Ad

More from n|u - The Open Security Community (20)

PDF
Hardware security testing 101 (Null - Delhi Chapter)
PPTX
SSRF exploit the trust relationship
PDF
PDF
Api security-testing
PDF
Introduction to TLS 1.3
PDF
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
PDF
Talking About SSRF,CRLF
PPTX
Building active directory lab for red teaming
PPTX
Owning a company through their logs
PPTX
Introduction to shodan
PDF
Detecting persistence in windows
PPTX
Frida - Objection Tool Usage
PDF
OSQuery - Monitoring System Process
PDF
DevSecOps Jenkins Pipeline -Security
PDF
Extensible markup language attacks
PPTX
PDF
Hardware security testing 101 (Null - Delhi Chapter)
SSRF exploit the trust relationship
Api security-testing
Introduction to TLS 1.3
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Talking About SSRF,CRLF
Building active directory lab for red teaming
Owning a company through their logs
Introduction to shodan
Detecting persistence in windows
Frida - Objection Tool Usage
OSQuery - Monitoring System Process
DevSecOps Jenkins Pipeline -Security
Extensible markup language attacks

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Approach and Philosophy of On baking technology
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
KodekX | Application Modernization Development
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
The AUB Centre for AI in Media Proposal.docx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation theory and applications.pdf
Approach and Philosophy of On baking technology
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
KodekX | Application Modernization Development
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Reach Out and Touch Someone: Haptics and Empathic Computing

NewsBytes - Nullhyd

  • 21. WhatsApp Users Vulnerable to v Card Vulnerability ● A dangerous security flaw in the web version of the popular instant messaging app puts up to 200 Million of its users at risk. ● This flaw allows to compromise your machines by distributing malware. ● "To target an individual, all an attacker needs is the phone number associated with the [WhatsApp] account,"