1
/
11
The popularity of online meetings
At the end of 2019, the Zoom video conference platform had about 10 million users. At the end of April, with most of the country in place, the figure rose to more than 200 million. Zoom is not the only video conference platform to see a major uptick in users since the World Health Organization (WHO) Covid-19 declared a pandemic in early March; Others include Cisco’s Webex, Google’s Hangouts and Meet Platforms, Microsoft’s teams and Gotometing. However, Zoom gained the most fame for his safety blatments. The most striking is that one is concern that virtually someone could collapse in silence (and listen to everything you said) and resolved before social distance began in the United States, while others came to light, as social distance became more common. Here are the Zoomwests that you still need to be aware of. If your video conferences are for work, you must follow these rules to keep things professional.
3
/
11
Zoom bombs
On March 30, the FBI issued a public warning about the vulnerabilities of Zoom. Although in this case, the FBI was less concerned about keeping user information private (although of course it is always an important consideration) than with hackers who have planted inappropriate content, including pornographic content, hate images (eg swastikas), threatening language and even reaffirmation of private information. For example, a Massachusetts Zoom class was interrupted by a hacker showing swastika tattooing that shouted swear words and unveiled the teacher’s home address. The FBI advised educators to protect video calls with passwords.
4
/
11
Password theft
At the end of March, cyber security leader Bleepingcomputer discovered that people who access Zoom’s chat functions via Windows via Windows for theft of password. In early April, Zoom has released a software plaster to stop this practice, but Forbes recommended that Windows users take the precaution to disable “outgoing NTLM traffic” by finding “Windows Settings” and then selecting “security settings”, and then “local policy”, then “security options” and a network. When talking about passwords, here are 12 password errors that hackers only hope you will make.
6
/
11
Another thing of those recorded meetings
According to CNET, who was discovered in the mid -April, a safety researcher, Phil Guimond, who was discovered in the mid -April, and worse, it remains, even after you thought you had deleted it. After Guidmond noted that surveys of zoom meetings stored on the cloud all have a predictable URL structure and that not all recordings of zoom meetings were protected with a password, he built an instrument that proved how vulnerable the cloud storage actually was. To defeat the instrument, Zoom added a ‘CAPTCHA’ challenge, but it only works to eliminate hackers in the form of bots. “The URL pattern is still the same, and attackers can still try to open each generated result by hand,” Guimond reports. The lesson here? Always protect your recorded zoom meetings.
7
/
11
Leaked e -mails and photos
“Zoom is leaking personal information from at least thousands of users, including their email address and photo,” it was revealed in early April, which declared that it originated because the algorithm of zoom considers the same e -mail domain as part of the same “company”. In other words, Gmail users are thrown with other Gmail users in the same company directory, all of which are visible to each other. From May 21, this issue has not been fully resolved, but a software update prevents zoom users on the same e -mail domain to search for each other automatically. You will be particularly watching for this one after you find out that a hacker can do with UE postal address.
8
/
11
This one is on you …
Zoom users who install zoom using any installation software other than Zoom self -provide, run the risk of installing malware on their computers, which can seriously waste your computer’s performance (eg, meager acceleration or delaying your processes). Although Zoom did nothing to solve it, it is not the problem of zoom to solve, Tom’s guide points out. The easiest way to avoid this problem is to ignore all emails, social media posts, pop-up messages and the like to install zoom on your computer for you. In addition, you would like to consider running a good antivirus program on your computer. Here are 20 cyber security secrets hackers really wish we wouldn’t tell.
9
/
11
Zero-day exploitation
If cyber security experts exploit over ‘zero-day’, they refer to vulnerabilities that hackers have discovered, but have not yet utilized. Since the software manufacturer is not aware of these vulnerabilities until the hackers unleash them, they have “zero days” to come with a defense or work. According to Vice, hackers are on the Dark Web presentation to sell such exploitation to the highest bidders. Although zero-day exploitation may exist and are available to buy, most at this point are completely theoretical, including one that presumably enables a remote attacker to take control of the victim’s computer (Vont price: $ 500,000). By the way, Zoom is not the only platform used by scammers; You should also watch for Facebook spending.
10
/
11
Phishing expeditions
Over the past few weeks, thousands of domain names that look, feel and sound like zoom-but are in no way linked to zoom is registered by hackers. Once these hackers take over these domains, they send emails (or texts or other communications) from them to zoom users, and ask the user to provide personal information, or to click on a link that automatically releases their personal information or sets a malicious attack on the user’s computer (including ransom attacks) that takes control of the computer until the user pays for the release). Here is what some of the subject lines can look like:
Welcome to “Zoom”: In this version of a phishing expedition, the hacker encourages the victim to “activate” their zoom account by entering private information such as reporting evidence. You missed a “meeting”: This version tells the victim that they missed a zoom meeting, for which a link is offered. However, the link takes the victim to a false zoom page, where their private information, including reporting evidence, can be stolen. Time to update your zoom software: In this version, the victim makes them think that they take good care of their computer if they are not.
In response, Zoom said in a statement to Techradar Pro: “Users on all services and technology platforms should be careful with email, links or files received from unknown transmitters, and that users should make sure that you should click on authentic links or open attachments to well -known and reliable service providers. He clicks on any links.
11
/
11
Be your own security expert
Follow these best practices for using video conference platforms safely:
Take advantage of the waiting rooms if your platform is available, unique passwords do not use part of the information on social channels as you log in, use a web browser, not the app, which is probably less safe, make sure you are who they say they make use of virtual backgrounds before starting the meeting (because you do not realize what information your home background reveals).
Then read on for 18 secrets of people who are never hacked.
Disclaimer for Uncirculars, with a Touch of Personality:
While we love diving into the exciting world of crypto here at Uncirculars, remember that this post, and all our content, is purely for your information and exploration. Think of it as your crypto compass, pointing you in the right direction to do your own research and make informed decisions.
No legal, tax, investment, or financial advice should be inferred from these pixels. We’re not fortune tellers or stockbrokers, just passionate crypto enthusiasts sharing our knowledge.
And just like that rollercoaster ride in your favorite DeFi protocol, past performance isn’t a guarantee of future thrills. The value of crypto assets can be as unpredictable as a moon landing, so buckle up and do your due diligence before taking the plunge.
Ultimately, any crypto adventure you embark on is yours alone. We’re just happy to be your crypto companion, cheering you on from the sidelines (and maybe sharing some snacks along the way). So research, explore, and remember, with a little knowledge and a lot of curiosity, you can navigate the crypto cosmos like a pro!
UnCirculars – Cutting through the noise, delivering unbiased crypto news