Monday, April 7, 2025
HomeTechnologyWhatsApp Now Allow You to Edit Sent Messages

WhatsApp Now Allow You to Edit Sent Messages

Published on

SIEM as a Service

Follow Us on Google News

Editing messages is one of the key features that WhatsApp has been missing for a while. Ever since the Facebook takeover in 2014, there have been several additional features, including 24-hour status, video status, etc., 

Recent reports stated that the communication platform had released a message editing feature for people who make a mistake while typing and change their minds.

https://twitter.com/WhatsApp/status/1660680955722629120

Various communication platforms like Skype, Teams, Slack, and others have previously added this message-editing feature. Adding to them, WhatsApp has also released this feature for users’ convenience.

- Advertisement - Google News

Like other communication platforms, WhatsApp will display edited messages as “Edited.” This “Edit” option for a message will be available only for 15 minutes before the sent message. It doesn’t show the edit history to the end-users.

WhatsApp has become the largest used communication platform, with more than 2 billion customers worldwide. The platform has many additional features, including end-to-end encryption, payment methods, security codes, video status, picture status, and various other features.

This is the third new feature released this month after Caption Polls, Chat Lock. Earlier this month, Caption Polls was released by WhatsApp, in which users can turn off multiple poll answers for polling from a user. 

Last week, WhatsApp released the Chat Lock feature, which can be used for locking a chat from an inbox that can only be unlocked if the user uses their device to unlock a password or pattern. It also hides the content of the locked chat in notifications.

In addition to this, the message editing feature has been rolled out now and will be available to all users in the coming weeks, as stated by WhatsApp.

Shut Down Phishing Attacks with Device Posture Security – Download Free E-Book

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Threat Actors Exploit Fake CAPTCHAs and Cloudflare Turnstile to Distribute LegionLoader

In a sophisticated attack targeting individuals searching for PDF documents online, cybercriminals are using...

HellCat, Rey, and Grep Groups Dispute Claims in Orange and HighWire Press Cases

SuspectFile.com has uncovered a complex web of overlapping claims and accusations within the cybercrime...

AI Surpasses Elite Red Teams in Crafting Effective Spear Phishing Attacks

In a groundbreaking development in the field of cybersecurity, AI has reached a pivotal...

Threat Actors Use Windows Screensaver Files as Malware Delivery Method

Cybersecurity experts at Symantec have uncovered a sophisticated phishing campaign targeting various sectors across...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

10 Common UX Mistakes That Compromise User Security

Here are ten common UX mistakes that can create security vulnerabilities:1. Overly Simplified AuthenticationTrying...

Server Colocation in California: The Compliance and Regulations You Should Know

Colocation, the practice of housing servers and IT infrastructure in data centers, plays a...

Content Disarm and Reconstruction: Safeguarding Your Digital Environment

In today's digital landscape, cybersecurity threats continue to evolve at an alarming rate. Organizations...