messaging apps

AppWizard
May 13, 2025
Michael Waltz, the former national security adviser, mistakenly included a journalist in a sensitive chat on Signal during a cabinet meeting, raising concerns about communication practices among senior officials. A photograph captured him using a different messaging app that promotes archiving for record-keeping, which raises compliance questions with federal regulations. Visible contacts on his screen included Vice President JD Vance, special envoy Steve Witkoff, Secretary of State Marco Rubio, and Director of National Intelligence Tulsi Gabbard. The use of encrypted messaging apps like Signal complicates the National Archives' role in preserving governmental records, highlighting the tension between secure communication and the need for transparency in government operations.
AppWizard
May 11, 2025
Customs and Border Protection (CBP) and the White House are facing scrutiny over security vulnerabilities in their messaging application. Hacktivists breached GlobalX, the airline handling U.S. deportation flights, exposing sensitive flight manifests. The FBI warned about threats exploiting outdated routers. Pearson confirmed a cyberattack compromising customer data. Research shows cybercriminals are using Windows Remote Management (WinRM) for lateral movements in Active Directory environments. A new email attack campaign is delivering a Remote Access Trojan (RAT) via malicious PDF invoices. A zero-day vulnerability in SAP NetWeaver allows remote code execution, affecting multiple sectors. An Indiana health system reported a data breach affecting nearly 263,000 individuals.
AppWizard
May 8, 2025
A cybersecurity breach involving TeleMessage, an Israeli messaging application company, has raised concerns about customer data safety. The breach allowed unauthorized access to direct messages and personal information on the platform, which lacks full end-to-end encryption like Signal. The hacker reported that accessing the data took only 15-20 minutes and exposed names, phone numbers, and email addresses of Customs and Border Protection officials, along with information from various financial institutions. TeleMessage is used by government agencies, including the State Department and the Centers for Disease Control and Prevention, making the breach more significant. While the hacker did not access all content, they indicated potential for further breaches, and journalists have verified some of the compromised material. TeleMessage's claim of maintaining Signal's security standards is questioned, as archiving messages introduces privacy risks. A spokesperson for Signal warned against using unofficial versions of their app, highlighting security vulnerabilities.
AppWizard
May 8, 2025
A hacker breached TeleMessage, a messaging app used by members of the Trump administration and US government officials, in a quick attack that reportedly took 15 to 20 minutes. The breached materials included sensitive data related to Customs and Border Protection (CBP) and cryptocurrency exchange Coinbase. A screenshot from the control panel showed names, phone numbers, and email addresses of CBP employees, indicating access to data of hundreds of US government personnel. Michael Waltz, the recently dismissed national security adviser, was noted to have used TeleMessage during a cabinet meeting.
AppWizard
May 1, 2025
TikTok has enhanced its Promote ads feature by allowing brands to target direct messages (DMs) through third-party messaging applications, including WhatsApp, Facebook Messenger, LINE, and Zalo. Advertisers can now drive message traffic to these external platforms instead of only encouraging interactions within the TikTok app. This change is particularly useful for lead generation campaigns targeting users with compatible messaging apps installed. The supported messaging platforms currently are LINE, Zalo, WhatsApp, and Facebook Messenger. This update aims to improve customer engagement and simplify management of interactions across different messaging channels.
AppWizard
April 25, 2025
Recent findings from cybersecurity experts at ESET revealed that several Android applications, disguised as harmless tools, have been secretly recording conversations and stealing sensitive data. These malicious apps infiltrated devices through the Google Play Store and third-party platforms, compromising the privacy of thousands of users. One tactic used by cybercriminals involved romantic deception, where victims were coaxed into downloading a seemingly harmless messaging app containing the VajraSpy Trojan, which activated upon installation to record conversations and harvest personal data. The identified malicious apps fall into three categories: 1. Standard Messaging Apps with Hidden Trojans: These apps, including Hello Chat, MeetMe, and Chit Chat, request access to personal data and operate silently in the background, stealing contacts, SMS messages, call logs, device location, and installed app lists. 2. Apps Exploiting Accessibility Features: Apps like Wave Chat exploit Android’s accessibility features to intercept communications from secure platforms, record phone calls, keystrokes, and ambient sounds. 3. Single Non-Messaging App: Nidus, a news app, requests a phone number for sign-in and collects contacts and files, increasing the risk of data theft. The 12 malicious Android apps identified include: Rafaqat, Privee Talk, MeetMe, Let’s Chat, Quick Chat, Chit Chat, YohooTalk, TikTalk, Hello Chat, Nidus, GlowChat, and Wave Chat. The first six apps were available on the Google Play Store and had over 1,400 downloads before removal. Users are advised to uninstall these apps immediately to protect their personal data.
AppWizard
April 24, 2025
Manychat has secured million in a Series B funding round led by Summit Partners to expand its operations. The company has approximately 1.5 million customers in 170 countries, including brands like Nike and the New York Times. Manychat facilitates the transmission of billions of messages annually across platforms such as TikTok, Instagram, WhatsApp, and Messenger. Since its inception in 2015, Manychat had raised around million prior to this round, mainly from a million Series A round in 2019. The company operates at a near break-even point and has experienced significant growth, particularly after Facebook opened its Messenger APIs. Manychat's focus on user engagement distinguishes it from many generative AI chatbots. The new funds will be used for research and development to enhance AI capabilities and improve global sales, marketing, and customer support.
Winsage
April 24, 2025
Ninite is a tool that simplifies the installation of applications and runtimes during the setup of a fresh Windows LTSC edition. It allows users to create a custom installer that can be reused to update applications to their latest versions. Windows 10 will reach its support deadline in October 2025, prompting users to transition to Windows 11 or consider LTSC editions, which have support until 2027 or 2032 for US English. Users must back up data and have the necessary media and license keys for applications when switching to LTSC, which involves formatting and reinstalling the PC. Ninite enables users to select applications from its website, creating a single installation program that automates the process without unnecessary prompts. It offers a wide range of software, including web browsers, graphics packages, developer tools, messaging apps, and utilities. Additionally, users may need device drivers, for which Snappy Driver Installer Origin can be useful, while O&O ShutUp10++ can help disable Microsoft telemetry.
Search