Zoom grappling with security issues such as the demand for videoconferencing Spikes

Zoom grappling with security issues such as the demand for videoconferencing Spikes

During the crown pandemic, it seems as if everyone with zoom video conferencing app included, sometimes unwanted visitors to join. online trolls were sneaking in web meetings and disturb them with profanity and pornography for at least most of the last month. Cyber ‚Äč‚Äčresearchers fear these disorders could be a precursor malicious attacks allow hackers to control machines connected to access protected files or other enterprise software. “Much of our current reality a new territory, and this growing dependence Zoom at home is just another,” said Mark Ostrowski, Check Point Software Technologies Ltd. regional manager of engineering to expect “Once a surface platform attack becomes large enough, you may just be more interesting for attackers. This is what happened to Zoom. “in a blog post on Wednesday, said push that security concerns” very seriously “and is working to solve them. In addition, said a representative zoom in an e-mail that the company is excited about the news and tried harassment zoom user meetings to educate protection. Zoom also apologized in another blog, “the confusion we have caused wrong, suggesting that the zoom meetings with end-to-end encryption is capable of doing.” While striving for company to use encryption in as many possible scenarios “we realize that there is a discrepancy between the generally accepted definition of end-to-end encryption as we have them and used”. But there is good news. Users do not have to follow Elon Musk, whose SpaceX using Zoom Video Communications Inc. compared banned amid privacy concerns. There are some simple steps for video conferencing secure guest, according to security experts. For example, make sure the session is protected by a password, and does not share session IDs and passwords for social media, where the criminal hacker can access the credentials. Experts also recommend that the organizers of the meeting or classroom take attendance and kicking unwanted visitors. Here are some tips: Use the participants waiting room screen function before the meeting that interact in the meeting room. This can be read and then during the meeting option (Advanced) by clicking on the Settings tab. Use meeting IDs instead of links when you invite others to join. malicious links and used to affect innocent users. Far not repeated encounters unwanted participants expected meeting ID. Calling the control connections and documents that may contain malicious code. When you are using any computer microphone and webcam, using blockers or both covers can be purchased online. Zoom shares have more than doubled this year, as investors bet that the teleconferencing company would be one of the few winners of the crown pandemic. The company has become very popular, more than 200 million participants in the daily meetings reached in March, according to his blog. But he also drew more control of security experts and privacy. There was the most recent incident on Monday published as Patrick Wardle, principal security researcher at JAMF, a blog on two new zoom errors. If you are already infected with malware desktop version of Mac OS could allow high-level strikers and capers privileges to win the webcam and microphone, he said. Zoom said later released fixes for the problems. Zoom was developed with certainty appears as “laggards” Wardle said, adding that focused around a common phenomenon among start-ups in the first place for users and funding. But larger meteoric popularity drew further scrutiny. “We have the design of the product with the expectation that in a matter of weeks, everyone would work suddenly in the world to study and socialize from home,” said Zoom in the blog post. The influx of new users, the company with the presentation “Challenges we had not expected when the platform was designed,” and the company “is committed to learning from them and do better in the future.” On 30 March, the FBI issued a warning through the so-called “push-bombing”, to alert the operator classes or meetings in public share or to make connections to conferences on social media. On the same day, a zoom suing users, the company supports its illegal policy services were. The company collects information when users install or open the Zoom application and notify them without proper notice to third parties including Facebook Inc., according to the federal lawsuit. But push the Data Protection Directive does not explain to users that the application contains the code that reveal information to others, according to the complaint. Zoom acknowledged that they are using Facebook in a blog post on March 27, as well as New York State Attorney General Letitia James wrote the data to the last letter to the portion boost that included “a series of questions, the company to ensure adequate measures to ensure users’ privacy and security is protected, “to share as a spokesman for the attorney general’s office, who refused a copy of the letter. concerns about the push-security practices are not new. last year, a researcher Jonathan called Leitschuh found that the desktop version is installed by Zoom for Mac calm a Web server – one that remained to systems even if the application has been removed – which introduced a new way for hackers to access the webcam, it said. Apple Inc. has released an update in July that the security hole plugged. Keep zoom “feet to the fire” for security and privacy in the middle of the new popularity of the app will create a tailor nreize for businesses, Leitschuh said in an interview.
Picture copyright by Smith Collection / Gado / Getty Images