whatsapp

  1. B

    Is Whatsapp Support a Joke?

    Used their web form to contact them. The answer I received came after 10 minutes and was a canned reply with FAQ part. It didn't answer my question at all. Replying that I received another canned reply with different FAQ part which was more relevant this time. This time I tried to be more...
  2. K

    is fm whatsapp banned?

    I have used an intel pc chip when installing the bluestack emulator to download fm whatsapp apk. When I first installed and logged in, I was notified that my account was banned and thrown out of the main screen. People tell me if this is due to the computer's processor chip?
  3. FrgMstr

    WhatsApp Gearing Up to Charge for Chat

    Use the WhatsApp free Business tools to build chat for your business, but don't worry, we will figure out to charge you later when you become dependent on it. But don't worry, since it's encrypted, Facebook, WhatsApp's owner, will never know what you are chatting about. You really believe...
  4. R

    How Secure Are Your Messages

    Researchers at Brigham Young University have learned that most users of popular messaging apps Facebook Messenger, What’sApp and Viber are leaving themselves exposed to fraud or other hacking because they don’t know about or aren’t using important security options. Even though What’sApp and...
  5. Zarathustra[H]

    UK Government Renews Calls for WhatsApp Backdoor after London Attack

    Looks like big brother is at it again in the UK, which shouldn't be surprising considering it is the land of CCTV. The debate between privacy and security is not a new one, which has been highlighted by both the Apple FBI decryption case as well as the many conflicts between WhatsApp and the...
  6. Zarathustra[H]

    Vulnerability in WhatsApp and Telegram Allowed Complete Account Takeover

    Well, it looks like the CIA might have been slacking on this one, as they were apparently unaware of any method to break popular encrypted messaging clients remotely, instead having to take the circuitous route of first compromising the handset itself in order to listen in on communications...
Back
Top