The letter outlined not only the improper access engineers had to WhatsApp user data, but a variety of other shortcomings, including a "failure to inventory user data," as required under privacy laws in California, the European Union, and the FTC settlement, failure to locate data storage, an absence of systems for monitoring user data access, and an inability to detect data breaches that were standard for other companies.
The vulnerabilities on ControlVault USHs were potentially highly dangerous. These laptop models are widely-used in the cybersecurity industry, government settings and challenging environments in their rugged version.
I am very nervous that we have an impending, significant, impending fraud crisis. A thing that terrifies me is apparently there are still some financial institutions that will accept a voice print as authentication for you to move a lot of money.
These vulnerabilities could be remotely exploited to allow remote code execution, disclosure of information, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal information disclosure vulnerabilities.