<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>0-day Archives - DIGITAL SELF-DEFENSE</title>
	<atom:link href="https://www.digitalnisebeobrana.cz/en/tag/0-day/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.digitalnisebeobrana.cz/en/tag/0-day/</link>
	<description></description>
	<lastBuildDate>Wed, 15 May 2019 12:54:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.6.2</generator>

<image>
	<url>https://www.digitalnisebeobrana.cz/wp-content/uploads/2018/12/cropped-mr.black_-32x32.png</url>
	<title>0-day Archives - DIGITAL SELF-DEFENSE</title>
	<link>https://www.digitalnisebeobrana.cz/en/tag/0-day/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>0-day vulnerability in WhatsApp</title>
		<link>https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/</link>
		
		<dc:creator><![CDATA[Milan]]></dc:creator>
		<pubDate>Wed, 15 May 2019 12:49:02 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Rychlé novinky]]></category>
		<category><![CDATA[Techniky hackerů]]></category>
		<category><![CDATA[0-day]]></category>
		<category><![CDATA[šifrování]]></category>
		<category><![CDATA[Signal]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<guid isPermaLink="false">https://www.zaskolit.cz/?p=1478</guid>

					<description><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software. While WhatsApp is end-to-end encrypted, an attacker could access messages by infecting an end device (phone) on which messages are normally visible. In addition, an attacker did not have to rely on a faulty user step &#8230;<br /><a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/" class="more-link pen_button pen_element_default pen_icon_arrow_double">Continue reading <span class="screen-reader-text">0-day vulnerability in WhatsApp</span></a></p>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>WhatsApp (owned by Facebook) has released an update that patches the vulnerability that allowed attackers to install malicious software.<span id="more-1478"></span></p>
<p>While WhatsApp is <a href="https://www.zaskolit.cz/en/sifrovani-zprav-demo/">end-to-end encrypted</a>, an attacker could access messages by infecting an end device (phone) on which messages are normally visible.</p>
<h4>In addition, an attacker did not have to rely on a faulty user step (such as clicking a link or opening an attachment), the software installation took place after an attacker start WhatsApp call. The user did not even have to accept the call, the malicious code already contained that call.<br />
The call record could then be erased so that the user would not normally be able to determine whether he / she had been the victim of such an attack.<br />
As mentioned above, the bug is already fixed, so it is highly recommended to upgrade to the latest version of WhatsApp.<br />
Or just go to a safer <a href="https://www.signal.org">Signal Messenger</a> <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></h4>
<h4></h4>
<h4>Vulnerable Versions:</h4>
<p><strong>Android</strong>: v2.19.134 and lower, WhatsApp Bussines v2.19.44 and lower<br />
<strong>iOS</strong>: v2.19.51 and lower, WhatsApp Business v2.19.51 and lower<br />
<strong>Windows Phone</strong>: v2.18.348 and lower<br />
<strong>Tizen</strong>: v2.18.15 and lower</p>
<h4>How to update WhatsApp?</h4>
<p><strong>Android</strong>:</p>
<ul>
<li>Open Google PlayOpen the menu in the upper left menu</li>
<li>Open My Apps and Games</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead.</li>
</ul>
<p><strong>iOS</strong>:</p>
<ul>
<li>Open the App Store</li>
<li>Click &#8220;Update&#8221; at the bottom of the display</li>
<li>If WhatsApp was not automatically updated, the &#8220;Update&#8221; button is available. Otherwise, the update menu is missing, only the button to open is used instead</li>
</ul>
<p>The post <a href="https://www.digitalnisebeobrana.cz/en/0-day-zranitelnost-ve-whatsapp/">0-day vulnerability in WhatsApp</a> appeared first on <a href="https://www.digitalnisebeobrana.cz/en">DIGITAL SELF-DEFENSE</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
