Skip to main content

WhatsApp Starts Testing 'Suspicious Link Detection' Feature to Limit Spam Circulation: Report| -CyberLuC

WhatsApp Starts Testing 'Suspicious Link Detection' Feature to Limit Spam Circulation: Report


In another move to put a stop to the circulation of spam on its platform, WhatsApp is working on a Suspicious Link Detection feature. The new feature, which is presently said to be under testing, helps users detect suspicious links available within their WhatsApp messages. It is a part of the WhatsApp beta for Android version 2.18.204 and later, though not available for the masses at the initial stage. The latest development hits amidst different measures by the Facebook-owned company to limit the circulation of spam and fake news through the instant messaging app that has over 1.5 billion monthly active users worldwide. A previous WhatsApp beta version brought a 'Forwarded' label that was aimed to make a dent in the growth of fake news distribution through the app and help people easily identify forwarded messages.

How to Block Jio from Showing Ads on your Android Phone

Leveraging the Suspicious Link Detection feature, WhatsApp analyses the links available in a message to detect a suspicious link, reports WABetaInfo. The messaging app is said to automatically identify whether the link in a received message is redirecting to a fake or alternative website that could potentially harm users. Upon detection of a suspicious link, the message is marked with a Red-coloured label to let users easily understand its behaviour.

There's No Automating Your Way Out of Security Hiring Woes


The screenshots posted by the WABetaInfo folks highlight that WhatsApp also warns users when they try to open the link with a message that reads, "This link contains unusual characters. It may be trying to appear as another site." It has also been claimed that WhatsApp analyses the link locally. This suggests that the links will not be sent to WhatsApp servers and the user data won't be compromised for sake of detecting suspicious links.
We weren't able to spot the reported Suspicious Link Detection feature on any of our Android devices using the latest WhatsApp beta version 2.18.207. However, since the WABetaInfo team claims that WhatsApp is currently testing the feature, we can expect its arrival at least for WhatsApp beta users sometime in the coming future. It is also reported that with some other improvements, the feature will also get an ability to let users manually report a suspicious link.
Earlier this month, WhatsApp came in the headlines for the massive spread of misinformation that allegedly led to the lynching of a large number of innocents in India. The IT ministry even asked WhatsApp to take preventative actions to restrict the proliferation of fake messages on its platform. The messaging service on its part revealed that it had started taking help from local experts to flight spam and fake news and announced 'research awards' for researchers interested in limiting the circulation of misinformative messages in the country. This was a step in addition to the primary moves such as the 'Forwarded' label and 'Send Messages' group controls to retain WhatsApp's domination in the market of instant messaging apps. Particularly in India, WhatsApp serves over 200 million monthly active users.

Comments

Popular posts from this blog

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC

Top 5 Website Vulnerability Scanning Tools [New Listing 2018] -CyberLuC This is why security testing of web applications is very important because In the past, many popular websites have been hacked. Hackers are now active and always try to hack websites and leak data.   And here comes the role of web application security scanners. Web Application Security Scanner is a software program which performs automatic black box testing on a web application and identifies security vulnerabilities. Scanners do not access the source code, they only perform functional testing and try to find security vulnerabilities. The moment our world went online and enterprises started conducting their businesses using websites, they became the primary targets for hackers. The situation worsened with the  emergence of Content Management System(s) (CMS)  – like WordPress, Joomla, Drupal etc., – which while offering an easy way to build (as well as customize) websites, left...

Top 5 Most Popular and Best Cyber Forensics Tools | -CyberLuC

Top 5 Most Popular and Best Cyber Forensics Tools The art of Cyber forensic investigation is quite complex and requires rigorous precision in following every investigative step from Acquisition to Analysis & Reporting. Experts now face the need for dependable tools that help them to do so, from the beginning. Every investigation requires usage of multiple tools, dependence on a sole tool causes the investigation to lose its flexibility and makes it prone towards ambiguity.   Cyber forensic: As the title says, it is collecting evidence for investigation after an unwanted activity has occurred. Cyber/Computer Forensics is a department that comes under Digital Forensic Science for improving cyber security Here are top 5 cyber forensic tools preferred by specialists and investigators around the world. So what are the tools used by these professionals? Here’s a list of top 5 tools  used with a brief description and key features. #1)Pro Disc...

2018’s Most Dangerous Cyber Threats| -CyberLuC

2018’s Most Dangero us Cyber Threats The year 2017 witnessed some of the biggest cyber attacks of all times. This includes WannaCry Cyber Attack propelled by North Korea targeting more than 250,000 computers worldwide, NotPetya cyber attack on companies operating in Ukraine & Russia and the much-publicized Equifax data breach which even led to the resignation of the CEO after data of more than 143 million US Citizens was found to be compromised. And according to Gartner, Information security spending is said to reach $86.4 billion by the end of 2017 and will probably cross the $110 billion mark by the end of next year. 2018 is a new year, and with it come newer, more advanced cyber threats. A growing set of efforts against individuals, businesses, and international security, cyber-attacks threaten systems and devices that people use every day, from smartphones to the websites you check before bed every night, to your work computer. Cyber threats have a variety of aim...