If you are using WhatsApp Reconsider After Jeff Bezos Hack? Probably not

If you are using WhatsApp Reconsider After Jeff Bezos Hack? Probably not

Under reported that Amazon CEO Jeff Bezos phone claiming to be from Saudi Arabia has been violated – with the direct involvement of the Crown Prince Mohammad Bin Salman on the popular chat application WhatsApp – some users might ask, can be cut in the same way? Investigators have “medium to high confidence” that Bezos unit was impaired after the boss “MBS” investigates a mysterious video files of bin Salman, also known as received through WhatsApp, according to a report of FTI Consulting, a Bezos phone company. After the file has been received, the phone Bezos’ started unusually large amount of outbound data to send. About six months later, Bin Salman Bezos has sent messages that hit the knowledge of the CEO has a secret relationship with Lauren Sanchez, the details in January last year was publicly. The report concludes that the first Gigabyte motherboard released photos, text messages and audio recordings, perhaps with Bezos’ iPhone microphone are sent but carried out the attack. So it’s time, WhatsApp, to eliminate at least 1.5 billion people worldwide popular chat application? Probably not, if you’re worried that particular incident. Some in the community have taken issue with FTI Forensic report, claiming that leaves important questions unanswered. Chris Sanders, a network security expert teachers and are used in an FTI tool during the investigation, the evidence says in the report did not make credible to support his conclusion. “I do not comment on the news that the forensic investigator found no malware on the system, there is still no concrete identification malicious communication, and found no malicious code in the video,” says Sanders. He also notes that the report does not specify which app has been responsible for the rise of the iPhone transfers data output. “The iPhone, the volume of output data for the application tracks,” he says. “However, the relationship is the corresponding application is not associated with this data output. Why?” The former CISO Facebook Alex Stamos has a better understanding, the way they came over FTI. He demanded a thorough investigation of iPhone Bezos what happened. “The idea that this report, the more so, to access the phone can go wrong,” Stamos tweet. “The circumstantial evidence is reasonably convincing, but since this is now more eyes should be testing an important matter of national security. “” All the work FTI Consulting client is confidential, “a spokesman FTI said.” We do not comment, confirm or deny customer orders or potential obligations. “WhatsApp, which was acquired by Facebook in 2014, did not respond to TIME for comment. the fact that security experts say that, if accurate, the Bezos report the existence of a particularly nasty bug in WhatsApp suggests, at least to the time of the accident. “… and if you use WhatsApp is a F Ault, for example, the video player? Boy, you’re hosed,” Carl Livitt, principal investigator of Cyber ​​Fox says Bischof. Although it usually does not open a good idea mysterious files, FTI bulletin, not mentioned video playback actually opened or suspected, that seems to have led to the invasion of privacy. Bezos or investigators This means that there is a potential that they use “literally do anything except open WhatsApp, should be initiated for them, does not require user interaction,” says Livitt. Still, an attack like this would cost orchestration million dollars, according Livitt. This should reassure all users WhatsApp day. “For your average consumer really is not much of a problem because you darn important for a nation that the level of effort required for the exercise of alignment,” says Livitt. But it could be a risk for people like businessmen, dissidents and others who might be the target of state actors. Livitt adds that there is a silver lining in the incident Bezos: has a lot of people probably think twice getting their information practices. be: “What we do, we do to prevent it’d be very surprised if many high profile entrepreneurs, have not looked Bezos incident and speak at this time their experts of security, so that the questions you ask me” Livitt thinks Bezos ‘safety hygiene improved by simply could, transmits a second telephone, so that the main body less attractive target. “We tend to advise against these technical corrections go off and maintain a separation of duty for devices that are used.” In addition, the traffic monitoring your phone to send and receive help can see everything that can be wrong. To monitor the network usage or the activity of the smartphone’s memory, applications such as Omnistat Panel System 2 and 2 can reveal these details and updates made in real time, together with the widget support that keep the data easily accessible. You can also take other measures. “Upgrading the operating system, the review such as access to data app go to privacy settings in their safety and to make these excellent things, you know, to make sure that they have access,” says Carnegie Mellon professor Yuvraj Agarwal, who is increased awareness is recommended by consumers when dealing with a stronger, more the privacy-oriented approach on the part of the developer’s data exchange. “The same platforms, I think, are quite robust, in my opinion,” says Agarwal, his research on the Internet-of-Things security and privacy in a proof-of-concept tool is rotated develops feedback in real time offers the potential privacy questions developer during the encoding process. “In recent years, they have to know more and more controls for some time to leave the users and decide whether they want to give access to specific data for these applications.” Apple and other companies work to identify and fix vulnerabilities also helps. But, says Agarwal, it will probably always be the bad actors for research and the search for new ways to infiltrate digital devices. “Ultimately, there is money in it,” he says. “And if other people buy these exploits, then there are people and organizations go for it to look.”
Photo copyright AFP via Getty Images