WhatsApp users are being urged to update their apps, to address a vulnerability discovered recently. If you have family members using this platform, I
[See the full post at: WhatsApp spyware vulnerability]

![]() |
Patch reliability is unclear, but widespread attacks make patching prudent. Go ahead and patch, but watch out for potential problems. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
Home » Forums » Newsletter and Homepage topics » WhatsApp spyware vulnerability
Facebook = /facepalm
‘Pegasus’ spyware: aptly named trojan horse that flew off with your data.
NSO limits sales of its spyware, Pegasus, to state intelligence agencies
I’ll bet users of WhatsApp are comforted at that news..
It’s a little more complex than that. Ends up that this vulnerability was used to attack the phone of a human rights attorney. It’s not widespread, but it is disconcerting.
WhatsApp should be updating itself automatically, but if you’re very concerned, you can check manually:
On an iPhone:
— Open the App Store and select updates.
— Select “WhatsApp” and Update.
On Android:
— Open the Play Store and tap on the 3 lines in the upper left corner.
— Select “My apps & games”.
— Select “WhatsApp” and Update.
This also affects
PC Windows/ Mac versions as well aswindows phones.
Any source for the PC Windows/Mac info?
More than 80 sites report that it only affects phones:
WhatsApp for Android prior to v2.19.134
WhatsApp Business for Android prior to v2.19.44
WhatsApp for iOS prior to v2.19.51
WhatsApp Business for iOS prior to v2.19.51
WhatsApp for Windows Phone prior to v2.18.348
WhatsApp for Tizen prior to v2.18.15
@b my bad, misread (now corrected in previous post)
How do the people know if they are infected with spyware or not?
How does one know if the spyware is off their device after the update?
I guess we’ll soon find out..
When all our devices can communicate, whether it be an app originally on a phone or a Mac or PC, there’s the possibility it can infect another system on the same network. So you’re basically correct in your initial post, taking into account the way our machines speak with each other.
MacOS iPadOS and sometimes SOS
Here’s a link from The Verge … https://www.theverge.com/2019/5/14/18622744/whatsapp-spyware-nso-pegasus-vulnerability
MacOS iPadOS and sometimes SOS
According to The Verge,
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of SRTCP packets sent to a target phone number
Shouldn’t buffer overflows be a basic thing detected on everyday automated testing, or not testing basic stuff at all is the new trend from multi-gazillion IT corporations?
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.
Notifications