A severe bug in the desktop (both Windows & Linux) messaging app Signal discovered by security researchers. This vulnerability allows the attacker to remotely execute malicious code on recipients system without user interaction by sending a message. While the technical details have not been disclosed as of today, the problem seems to be a remote code execution vulnerability in the messaging app, which could allow the attacker to inject code onto the target. Currently , it is not very clear if these vulnerability or other bugs are only in the source code of the App or as well in the web app framework ( Electron) , technology used to build the Signal app. If such flaw is within the Electron , it could lead to bigger impact on other software build on this technology, like Skype, Slack or WordPress. https://youtu.be/bfFcD9kZog4 The company behind messaging app has already release a patch with the latest version. ( Version 1.10.1. and pre-release version 1.11.0-beta.3 . )
You can read more Windows tips and tricks on the official Microsoft Windows blog.