Saturday, April 5, 2025
HomeCyber Security NewsWhatsApp Delays New Privacy Policy Update by Three Months

WhatsApp Delays New Privacy Policy Update by Three Months

Published on

SIEM as a Service

Follow Us on Google News

Last week an announcement by WhatsApp caused an outcry among people. Whatsapp had announced that it would be updating its policies from February 8th and people would have no choice but to accept it, else relinquish their right to use the instant messaging service.

Several tech moguls, including Tesla’s CEO Elon Musk, Twitter’s CEO Jack Dorsey and Chairman of Mahindra group Anand Mahindra had come out asking people to get onto the new messaging platform “Signal”. Signal is believe to be a much more secure alternative to Facebook owned WhatsApp.

Seeing the uproar, WhatsApp has delayed the launch of the new policy by three months from February 8th to May 15th. Whatsapp has clarified that the data is encrypted and is completely secure and cannot be seen or accessed by anyone, including WhatsApp and Facebook.

WhatsApp also states the following:

  1. Calls made via the instant messaging app are not tracked or logged anywhere.
  2. Calls made via the call are not listened upon by unauthorized parties
  3. The location shared to others can also not be viewed by either WhatsApp or Facebook.
  4. All WhatsApp groups remain private
  5. Contacts are not shared by WhatsApp to Facebook
  6. Messages can be set to disappear
  7. Your data can be downloaded

WhatsApp has also clarified how business messaging works and its link with Facebook. Since several business use WhatsApp to communicate with their customers, WhatsApp has made it easier by giving business the option to use secure hosting services provided from Facebook.

This would enable businesses to manage WhatsApp chats with their customers, answer questions and also send purchase receipts and other important information.

WhatsApp will also help in the discovery of a business, whereby a person would see an ad on Facebook with a button to message the business using WhatsApp. Facebook may use the way you interact with these ads to customize and personalize the ads viewed by a user on Facebook.

Will this clarity provided by WhatsApp help to regain the users lost to other apps such as Signal and Telegram? Only time will tell.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Also Read

WhatsApp Updates – Users Must Agree on New Privacy Policy to Continue Using the App

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...

PoisonSeed Targets CRM and Bulk Email Providers in New Supply Chain Phishing Attack

A sophisticated phishing campaign, dubbed "PoisonSeed," has been identified targeting customer relationship management (CRM)...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ivanti Fully Patched Connect Secure RCE Vulnerability That Actively Exploited in the Wild

Ivanti has issued an urgent security advisory for CVE-2025-22457, a critical vulnerability impacting Ivanti...

Beware! Weaponized Job Recruitment Emails Spreading BeaverTail and Tropidoor Malware

A concerning malware campaign was disclosed by the AhnLab Security Intelligence Center (ASEC), revealing...

EncryptHub Ransomware Uncovered Through ChatGPT Use and OPSEC Failures

EncryptHub, a rapidly evolving cybercriminal entity, has come under intense scrutiny following revelations of...