In the event that you think the start to finish encryption on WhatsApp and Telegram implies nobody can take advantage of anything you talk about in these stages, reconsider! Symantec specialists have discovered that media documents that you spare through these applications are not sheltered and are defenseless against digital assaults.
According to The Verge, the media records spared by means of these two applications are either spared in inward capacity or outside capacity of the gadget. In the event that the malware enters your Android cell phone and these documents are spared in outer capacity, malware can without much of a stretch gain admittance to these records and adventure the information. Malware can even achieve these documents, even before you have seen them.
As it were, these programmers can even modify active interactive media messages without the client’s notice. The analysts are considering it the “Media File Jacking” assault.
A WhatsApp representative disclosed to us that they have looked carefully into this issue and they will furnish refreshes in accordance with Android’s continuous improvement. He additionally indicated that this security risk is like past inquiries with respect to the versatile stockpiling influencing the application biological system.
“WhatsApp has taken a gander at this issue and it’s like past inquiries regarding cell phone stockpiling affecting the application environment. WhatsApp pursues current accepted procedures given by working frameworks to media stockpiling and anticipates furnishing refreshes in accordance with Android’s progressing improvement,” the representative said.
We have likewise contacted WhatsApp and Telegram and will refresh this space as we get notification from them.
Furthermore, it isn’t only these two applications, as per the ongoing news specialists at the International Computer Science Institute (ICSI) found that a great many application on the Android application store figure out how to skirt limitations and accumulate exact geolocation information and telephone identifiers, without client assent.
The examination took a gander at more than 88,000 applications on Google Play and followed how information was moved from the application when a client denied consents. Of these, they found 1,325 applications that damaged the consent strategy and depended on workarounds to recover client information without their insight.