• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware

You are here: Home / General Cyber Security News / WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
January 27, 2026

Meta on Tuesday announced it’s adding Strict Account Settings on WhatsApp to secure certain users against advanced cyber attacks because of who they are and what they do.

The feature, similar to Lockdown Mode in Apple iOS and Advanced Protection in Android, aims to protect individuals, such as journalists or public-facing figures, from sophisticated spyware by trading some functionality for enhanced security.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Once this security mode is enabled, some of the account settings will be locked to the most restrictive options, while simultaneously blocking attachments and media from people not in a user’s contacts.

“This lockdown-style feature bolsters your security on WhatsApp even further with just a few taps by locking your account to the most restrictive settings like automatically blocking attachments and media from unknown senders, silencing calls from people you don’t know, and restricting other settings that may limit how the app works,” Meta said.

Cybersecurity

The feature can be enabled by navigating to Settings > Privacy > Advanced. Meta said the feature is rolling out gradually over the coming weeks.

In tandem, the social media giant said it’s adopting the use of the Rust programming language in its media sharing functionality to help keep users’ photos, videos, and messages safe from spyware attacks. It described the development as the “largest rollout globally of any library written in Rust.”

The company also said the use of Rust made it possible to develop a secure, high-performance, cross-platform library (“wamedia”) for media sharing in WhatsApp across devices, adding it’s investing in a three-pronged approach to combat memory safety issues –

  • Design the product to minimize unnecessary attack surface exposure
  • Invest in security assurance for the remaining C and C++ code
  • By default, the choice of memory-safe languages for new code

“WhatsApp has added protections like CFI, hardened memory allocators, safer buffer handling APIs, and more,” the company said. “This is an important step forward in adding additional security behind the scenes for users and part of our ongoing defense-in-depth approach.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «experts detect pakistan linked cyber campaigns aimed at indian government entities Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
  • CTEM in Practice: Prioritization, Validation, and Outcomes That Matter
  • Critical Grist-Core Vulnerability Allows RCE Attacks via Spreadsheet Formulas
  • China-Linked Hackers Have Used the PeckBirdy JavaScript C2 Framework Since 2023
  • Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation
  • Indian Users Targeted in Tax Phishing Campaign Delivering Blackmoon Malware
  • Malicious VS Code AI Extensions with 1.5 Million Installs Steal Developer Source Code
  • ⚡ Weekly Recap: Firewall Flaws, AI-Built Malware, Browser Traps, Critical CVEs & More

Copyright © TheCyberSecurity.News, All Rights Reserved.