For Android, targeted smartphone should run OS version 4 or above; Apple devices should run on i OS 6 or newer.
Smartphones with older versions of operating systems are not in the use anymore, therefore support for them isn’t actually needed.
These accounts have older and shorter passwords so are easier to hack.' Gluck said it's unusual for groups to name the date of their attack and suggested the video posted on Monday was an attempt to 'project a great threat.'He added: 'The other week an anti ISIS group called a "hack ISIS" day for November 17.This turned out to be a bit over hyped but it might be the reason behind them naming a date.'The increased cyber threat comes as ISIS collapses in Iraq and Syria.The simplest answer you can get to this question is yes, you can obtain all Whatsapp messages and call logs from a targeted device, regardless does it use Android or i OS operating system.This is actually a very simple method, that requires hacking neither experience nor any advance knowledge in this matter.Yesterday the chairman of the US Senate Homeland Security Committee said: 'This is the new caliphate - in cyberspace.'US national security officials told senators that the collapse of Islamic State in Iraq and Syria has not diminished the group's ability to inspire attacks on Western targets via the internet.
Lora Shiao, acting director of intelligence at the National Counterterrorism Center, told a US Senate committee: 'Unfortunately, we don't see ISIS' loss of territory translating into a corresponding reduction in its inability to inspire attacks.' 'ISIS' capacity to reach sympathizers around the world through its robust social media capability is unprecedented and gives the group access to large numbers of homegrown violent extremists,' Shiao said.On the other hand, the basic features will run on non-rooted smartphones.Rooting is a process that can be completed with computer software or an app downloaded from Google play in less than 2 minutes.Raphael Gluck of monitoring group Jihado Scope told Mail Online: 'With the exception of hackers like the now-deceased Junaid Hussein, ISIS' level of hack has been very low.'The United cyber caliphate claims to be hacking social media accounts but what it's really doing, if anything, is taking control of some very dormant accounts from 2012 or something like that.It is very easy and simple to use, so more and more people are installing it on their smartphones.