TechBriefly
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
  • FAQ
    • Articles
No Result
View All Result
 Hot Topics:
  • Counter-Strike 2
  • Snapchat planets order
  • Microsoft AI copilot
  • ChatGPT plugins
  • Binance WOTD answers (Fan Tokens)
TechBriefly
No Result
View All Result
Home Tech Security

Do not have a Zoom video conference without password protection

by Florian Maximiliano
5 April 2020
in Security, Tech
Reading Time: 2 mins read
Do not have a Zoom video conference without password protection
Share on FacebookShare on Twitter

Zoom is once again criticized for serious security vulnerabilities. For one thing, hackers were recently able to hijack Windows accounts via Zoom, now it seems most people have a video conference without password which is unsecure.

The video conference tool Zoom has gained tremendous popularity since coronacrisis epidemic started. At the same time, attacks by cybercriminals and criticism by data protectionists increased. Accordingly, Zoom boss Eric Yuan said on Wednesday that the company would focus on security patches and bug fixes in the coming months. The development of new functions for the app are on hold for now. Two current security gaps show how important this is.

Zoom gap allowed access to sensitive data

In one vulnerability, hackers were said to have had the opportunity to access sensitive data and emails until the gap was closed on Wednesday. IT security expert Matthew Hickey previously said he had managed to intercept a Zoom user’s username and Windows password. He had been able to transfer this to a server he controlled without being noticed. The attack was fairly easy to carry out, Hickey said.

Hickey, who works for the IT company Hacker House, was able to replicate this attack within 30 minutes time. Users who had company computers were particularly at risk.

Most people use Zoom to have a video conference without password

The popular security researcher Brian Krebs reported another problem on his blog Krebsonsecurity. According to him, so-called zoom bombing is also possible primarily because of inadequate password protection. Zoom bombing refers to the undesired entrance of strangers into a Zoom conference.

Automated Zoom conference meeting finder 'zWarDial' discovers ~100 meetings per hour that aren't protected by passwords. The tool also has prompted Zoom to investigate whether its password-by-default approach might be malfunctioning https://t.co/dXNq6KUYb3 pic.twitter.com/h0vB1Cp9Tb

— briankrebs (@briankrebs) April 2, 2020

According to Krebs, the Z-War-Dial tool, which can detect Zoom video conferences not protected by a password, is currently said to find around 100 such meetings per hour. The tool can not find password-protected Zoom video conferences. The problem lies on the one hand with inattentive users who forget to secure their meeting accordingly. On the other hand, there also seems to be a problem with Zoom. Because the tool should actually assign an automatic password – in many cases this does not seem to work, according to Krebs.

Tags: online meetingpasswordvideo chatvideo conferencezoom

Related Posts

Luh Twizzy TikTok challenge causes stampede

Luh Twizzy TikTok challenge causes stampede

Insta360 Flow

Insta360 flow: Specs, price, and release date

AI whisperer jobs, aka prompt engineers, are on the rise

AI whisperer jobs, aka prompt engineers, are on the rise

Bing AI ads

The challenge of Bing AI ads is maximazing the user experience

POPULAR

Binance Word of the Day answers: Fan Tokens theme

What is Snapchat planets order?

What is Instagram direct message suggested list order (explained)?

How to hide retakes on BeReal?

RCM Loader for Nintendo Switch: What is it, how can you install?

What does setting interrogation succeeded mean?

How to hide blue ticks on WhatsApp?

Binance Word of the Day answers: Technical Analysis theme

Forza Horizon 5 Rally Adventure not working: How to fix it?

Should I update to iOS 16.4: Problems and new features

RSS News Republic

  • Pepsi new logo has been introduced and it is bold
  • The Last of Us building shaders error: How to fix it?
  • When is the next Steam sale: Dates and contents
  • Erin Darke and Daniel Radcliffe announce they are expecting a baby
  • What does IMY mean, and how to use it?

RSS Digital Report

  • Using Voice of the Customer for marketing and its benefits
  • Creating estimations for cost and organic traffic for your future SEO endeavors
  • Biggest issues plaguing the blockchain in 2023
  • What is the “Framing Effect” in marketing and how to use it?
  • How does in-house SEO compare to utilizing agencies and how to get started with it?

RSS Latest from LeaderGamer

  • Resident Evil 4 Remake system requirements – how many GB?
  • Wordle TR 1 Nisan 2023 günün cevabı
  • Wordle TR 30 Mart 2023 günün cevabı
  • Wordle TR 31 Mart 2023 günün cevabı
  • What are the Resident Evil 4 Remake difficulty levels?
TechBriefly

© 2021 TechBriefly is a Linkmedya brand.

  • Tech
  • Business
  • Science
  • Geek
  • How to
  • About
  • Privacy
  • Terms
  • Contact
  • FAQ
  • | Network Sites |
  • Digital Report
  • LeaderGamer
  • News Republic

Follow Us

No Result
View All Result
  • Tech
  • Business
  • Crypto
  • Science
  • Geek
  • How to
  • About
    • About TechBriefly
    • Terms and Conditions
    • Privacy Policy
    • Contact Us
    • Languages
      • 中文 (Chinese)
      • Dansk
      • Deutsch
      • Español
      • English
      • Français
      • Nederlands
      • Italiano
      • 日本语 (Japanese)
      • 한국인 (Korean)
      • Norsk
      • Polski
      • Português
      • Pусский (Russian)
      • Suomalainen
      • Svenska
  • FAQ
    • Articles