“Card seismic waves”. Watch out for this message on WhatsApp: what hides

“They are sending some photos of the earthquake in Morocco – (or Myanmar) – via WhatsApp. The file is called the seismic waves, do not open it and do not look at it, …

That new WhatsApp function to save us from voice messages (perhaps)


They are sending some photos of the earthquake in Morocco – (or Myanmar) – via WhatsApp. The file is called the seismic waves, do not open it and do not look at it, hack the phone in 10 seconds and cannot be stopped in any way. Turn around !!!! Don’t open it. They also said it on television. Share

Whatapp’s message

For days he has been circulating on the phones of millions of users A message that refers to the Morocco earthquake or the most recent Myanmar that pushes users to return it urgently without stopping to reflect. But be careful it is what was once called the classic “Sant’Antonio chain“That now with the technology it has moved from letters to messages through whatapp even if the basic idea is always the same.

The hoax to avoid

According to the message shared not only on the phone but also on the Facebook social, it would be a stratagem through which hackers would be able to hack our smartphones. It is not the first time you find ourselves in front of the genre, but there is no file called “Card seismic waves” that can hack the phone simply opening a message.

The diffusion mechanism

Similar to this there have been dozens of cases whose mechanism is always the same:

A message that contains a possible dangerous file

An alarmistic notice that invites immediate action

A reference to the authorities or possible TV services

Fortunately, modern mobile phones have settings Such for which it is not enough to open a WhatsApp message with images to install software without our permission, there are always blocks and notices before it is always better to check carefully and that we alert us.

Having said that it is, in this case, of theYet another hoax which, however, can be useful to remember everyone

users to pay close attention to files that come from an unknown source that they should never be openedif not after having ascertained their origin and the purpose for which they were sent.