Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

WhatsApp Fixes Vulnerability That’s Triggered by Answering a Call.


A critical vulnerability in the WhatsApp messaging app for Android and iOS was fixed today that could have been activated simply by a user answering a video call.

GoogleProject Zero researcher Natalie Silvanovichstated in a bug report that heap corruption in the WhatsAppapp could occur when an attacker sends a malformed RTP packet to a victim.

"Heap corruption can occur when the WhatsApp mobile application receives a malformed RTP packet," stated the Google Project Zero bug report. "This issue can occur when a WhatsApp user accepts a call from a malicious peer. It affects both the Android and iPhone clients."

RTP stands forRealtime Transport Protocol and is commonly used to send audio and video over the Internet. In this case, both the iOS and Android versions of WhatsApp use this protocol and thus were vulnerable.

Google Project Zero does not disclose reported vulnerabilities until the bug is fixed or 90 days has elapsed. As the vulnerability in WhatsAppfor Android was...(continued)

View All Trending Stories