search3
    Here is What Got Zoom Under Attack
    Latest Tech news Right in

    YOUR INBOX!

    Receive News Alerts, Special Info and other offers!
    We Respect your Privacy. Your Information will not be shared.

    Here is What Got Zoom Under Attack

    339
    Shubham Mehta | Apr 07, 2020 | 556 Views | 0 Comments
    Here is What Got Zoom Under Attack
    In our previous blog, we shared how Zoom has become the most popular video conferencing application in the past few weeks. Which resulted in fake registrations of this messenger. And then the application was criticized at a global level for its privacy policy and its users also reported this messenger when uninvited guests started crashing in the chats and meetings.

    Once it was detected that Zoom was the new target for cyber attackers, cyber researchers haunted the vulnerabilities that were being exploited by these cyber attackers. The researchers found that:-

    • The extraordinary growth of Zoom from $10 million to $200 million (daily basis) that happened in just a month caught the eyes of the cyber attackers.
    • When one user used to create a meeting link on Zoom the URL and UNC path were getting converted in a clickable link on the chat message (evil.server.comimagescat.jpg) that gave intruders access to get into uninvited meetings.
    • It was also found that the user’s data was being sent to China, where the user’s recordings were being used to exploit users.
    • It has been seen that Zoom data collecting tools and its privacy policies out of order that led this application to such a disaster.

    The most surprising and interesting thing at the same time in all this is that Zoom the only messaging application that is popular right from MNCs to startups. That has got organizations in an ambiguous spot especially in terms of exploring which tool to use to connect with the team. Here are options that organizations can take into consideration to smoothen their operations.

    1.FaceTime: Organizations that are equipped with Apple’s devices as a part of their operations can connect with one another using FaceTime. It’s a stable application that allows users to have an end to end encrypted experience, in other words, no one else can view your chats on Apple.

    2.Skype & Microsoft Teams: Organizations that are not equipped with Apple’s devices can go for Skype or Microsoft Teams: These applications support multiple user conferences and chats. In case if you have taken up sensitive topis on the call then you should be using Skype.

    3.JItsi: This is one recently launched application that allows multiple users to connect with one another.

    This content is brought to you by Mercury Solutions Limited, one of the best IT Training Company in India. Mehar Ahluwalia, the founder, with a vision of making the professionals’ career more fulfilling, is dedicated to delivering world-class IT Training programs and Certifications to the global participants.
    Tags : zoom blog security, skype security, zoom under attack, cyber attack, what is zoom

    Recommended Posts

     

    Mercury Solutions Ltd. https://bit.ly/2H3ANjF is rated 4.6 stars by www.facebook.com/mercurysol based on 18 reviews.