Featured post

Raccoon Rescue - Bubble Shooter

Raccoon Rescue - Bubble Shooter Swister Inc. Puzzle Brain Games Download Now Raccoon Bubble Shooter You will have a lot of fun while playing this game and you can play everywhere. Your main mission blow up bubbles and collect as many points as you can. How many bubbles will you blow in a shot? Come on it's your turn. You can play it at the home, in the car or whenever you want. All you need to do, download to your phone. Shoot the same color bubbles and raise your level. Each higher level is more difficult and more fun. Acquire new skills and blow more bubbles. This game will tired you and will entertain you. Sometimes you will be forced and sometimes you will win instantly. But you'll have a lot of fun each time. You can play Raccoon Bubble Shoter with any smartphone and you can play anywhere. Fun is in your hands now. Download open, and play. Download Now Download Now Bubbles Waiting For You This game is very popular among the games of sh...

WhatsApp Exploit Can Allow Hackers To Monitor Your Sleep And Other Things



Who knew there could be ways to analyze our sleep patterns other than the sleep tracking apps and fitness bands. Credits to a WhatsApp exploit, some interested person can monitor your WhatsApp activity to figure out when you sleep, wakeup, and how much do you sleep. And it doesn’t require one to be a pro techie.
The not precisely a vulnerability resides in the two of features that are harmless themselves: the last seen status, and the online status. This information can be logged and analyzed to keep an eye on your activity.
If we talk about WhatsApp’s privacy settings, it’s possible to limit the visibility of your last seen status to Everyone, your friends, no one. But there is no way you can hide the online status.
Image source: Rob Heaton
Rob Heaton, a software engineer, has demonstrated this strange thing by creating a Google Chrome extension which logs the online activity of his contacts through the WhatsApp web app.
Image source: Rob Heaton
Taking the so-called surveillance to the next level, the data belonging to a person can be cross-referenced to that of another person, and it can be known if they two are talking to each other.

Let’s say, a person comes online to send a message, and another person shows up at the same moment. If this continues for a while, it can be inferred the two are in a conversation.

If the data monitoring is done at a larger scale, the consequences might give you chills down your spine. It can be used to satisfy the hunger of advertising agencies who drool over your information even while they’re asleep. In a hypothetical scenario, you can even create a company that runs a service to return people’s WhatsApp information against their phone number, Heaton says.

This isn’t the first time an exploit of this nature has been discovered for a social platform. Earlier, a similar hack was created for Facebook Messenger and Tinder.