logo

Article On Issues Affecting WhatsApp | Threat On Its Users

   

Added on  2020-02-03

5 Pages620 Words78 Views
Running head: Mobile Security Investigation 1Mobile Security Investigation(Name)(Course)(Instructor)(Date)

Mobile Security Investigation 2Mobile Security Investigation Part ITitle: Security Threats on WhatsApp Bring Spy Apps into the LimelightAuthor: Zak MustaphaReference Details: Mustapha, Z. Security Threats on WhatsApp Bring Spy Apps Into the Limelight. Retrieved from < http://www.huffingtonpost.com/zak-mustapha/security-threats-on-whats_b_11302266.html>. [Date accessed 26th October 2016].Brief SummaryThe article addresses several issues that are affecting WhatsApp making it a threat to all its users.The author talks of the message crushing threat, the ability to snoop on other users and the weak privacy settings that are made possible through WhatsSpy an application available online. Information assetThe information that one has to have to make use of this application is a person’s phone number. These phone numbers can be got from the large WhatsApp groups or stealing it from a person’s device. ThreatOne has to have an alternative WhatsApp account to have the app. Also, a routed mobile phone is needed. Once this is achieved the spy will just be asked to add the number of their victim to beable to trace all the activities of a person’s WhatsApp account. VulnerabilityOnce the spying app is on, the spy can see when the victim logs into their accounts. Despite the privacy settings of an individual’s WhatsApp being on, important information like their username, profile picture and status can be easily displayed on WhatsSpy dashboard of the hacker. This compromises the security goal of privacy and confidentiality of the application.Security incidentThe article explains how the application can be used. Once one has obtained the number or, they can be able to trace the activities of all individuals that are in their number list. Through this one can go ahead to establish relevant connections between different people. This can prompt the spyto initiate blackmail or even a kidnaping.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
An investigation into the security of mobile phone communication Assignment 2022
|13
|874
|14

Security, Privacy, and Data Sovereignty Issues in COVID Safe App
|7
|1881
|27

Facebook Application and Data Security: A Human Computer Interaction Perspective
|3
|502
|99

COVID 19 Safety Applications and Risks
|33
|2384
|78

Cyber Security Laws and Regulations
|15
|5469
|290

Security Risks and Prevention Capabilities in Mobile Application Development
|8
|2949
|348