Tuesday, April 16, 2024

WhatsApp Delays New Privacy Policy Update by Three Months

Last week an announcement by WhatsApp caused an outcry among people. Whatsapp had announced that it would be updating its policies from February 8th and people would have no choice but to accept it, else relinquish their right to use the instant messaging service.

Several tech moguls, including Tesla’s CEO Elon Musk, Twitter’s CEO Jack Dorsey and Chairman of Mahindra group Anand Mahindra had come out asking people to get onto the new messaging platform “Signal”. Signal is believe to be a much more secure alternative to Facebook owned WhatsApp.

Seeing the uproar, WhatsApp has delayed the launch of the new policy by three months from February 8th to May 15th. Whatsapp has clarified that the data is encrypted and is completely secure and cannot be seen or accessed by anyone, including WhatsApp and Facebook.

WhatsApp also states the following:

  1. Calls made via the instant messaging app are not tracked or logged anywhere.
  2. Calls made via the call are not listened upon by unauthorized parties
  3. The location shared to others can also not be viewed by either WhatsApp or Facebook.
  4. All WhatsApp groups remain private
  5. Contacts are not shared by WhatsApp to Facebook
  6. Messages can be set to disappear
  7. Your data can be downloaded

WhatsApp has also clarified how business messaging works and its link with Facebook. Since several business use WhatsApp to communicate with their customers, WhatsApp has made it easier by giving business the option to use secure hosting services provided from Facebook.

This would enable businesses to manage WhatsApp chats with their customers, answer questions and also send purchase receipts and other important information.

WhatsApp will also help in the discovery of a business, whereby a person would see an ad on Facebook with a button to message the business using WhatsApp. Facebook may use the way you interact with these ads to customize and personalize the ads viewed by a user on Facebook.

Will this clarity provided by WhatsApp help to regain the users lost to other apps such as Signal and Telegram? Only time will tell.

Follow us on TwitterLinkedinFacebook for Daily cyber security & hacking news updates.

Also Read

WhatsApp Updates – Users Must Agree on New Privacy Policy to Continue Using the App

Website

Latest articles

Hacker Customize LockBit 3.0 Ransomware to Attack Orgs Worldwide

Cybersecurity researchers at Kaspersky have uncovered evidence that cybercriminal groups are customizing the virulent...

Microsoft .NET, .NET Framework, & Visual Studio Vulnerable To RCE Attacks

A new remote code execution vulnerability has been identified to be affecting multiple Microsoft...

LightSpy Hackers Indian Apple Device Users to Steal Sensitive Data

The revival of the LightSpy malware campaign has been observed, focusing on Indian Apple...

LightSpy Malware Attacking Android and iOS Users

A new malware known as LightSpy has been targeting Android and iOS users.This sophisticated...

This Startup Aims To Simplify End-to-End Cybersecurity, So Anyone Can Do It

The Web3 movement is going from strength to strength with every day that passes....

Alert! Palo Alto RCE Zero-day Vulnerability Actively Exploited in the Wild

In a recent security bulletin, Palo Alto Networks disclosed a critical vulnerability in its...

6-year-old Lighttpd Flaw Impacts Intel And Lenovo Servers

The software supply chain is filled with various challenges, such as untracked security vulnerabilities...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Top 3 SME Attack Vectors

Securing the Top 3 SME Attack Vectors

Cybercriminals are laying siege to small-to-medium enterprises (SMEs) across sectors. 73% of SMEs know they were breached in 2023. The real rate could be closer to 100%.

  • Stolen credentials
  • Phishing
  • Exploitation of vulnerabilities

Related Articles