SIGNAL MESSENGER BUG: AUTO-CONNECT CALLS

SIGNAL MESSENGER BUG: AUTO-CONNECT CALLS

Nowadays every application or software contains one or more vulnerabilities. The more you code your application or software the more it becomes vulnerable.

Today's vulnerable application is "SECURE PRIVATE MESSANGER"

The secure private messenger is used to call privately anywhere in the world for free.


SECURE PRIVATE MESSENGER says :
"Millions of people use Signal every day for free and instantaneous communication anywhere in the world. Send and receive high-fidelity messages, participate in HD voice/video calls, and explore a growing set of new features that help you stay connected. Signal’s advanced privacy-preserving technology is always enabled, so you can focus on sharing the moments that matter with the people who matter to you".

Google Project Zero Researcher NATALIE SILVANOVICH discovered a vulnerability that a malicious caller can force a call to be answered at the receiver's end without receivers interruption.

In simple words, the hacker can access the microphone and can listen to the surrounding sound of the user.

SILVANOVICH reported this vulnerability last week to the messenger company.

However, the vulnerability is patched within few hours of reported in the application Android version 4.47.7

For further details visit here:
https://thehackernews.com/2019/10/signal-messenger-bug.html

Comments

Popular posts from this blog

Some Dark web Links

How to join Cyber Cell or Cyber Crime Department in India || Exam or Direct or Skills???

ATM HACKING TOOL TRENDING ON DARK WEB