(Update 4/20/20)

Amidst the Covid-19 epidemic, Zoom has become a popular choice as a video-conferencing application. Both businesses and families are relying on Zoom to provide their connection to the world beyond their homes. 
As more people are turning to Zoom, questions about the application are growing increasingly.

Zoom Frequently Asked Questions

How do I get started with Zoom?

To sign-up for Zoom, visit their website here.

How do I contact someone via Zoom?

After signing up and installing the Zoom Application, you can contact someone by either sharing your meeting room ID or inviting someone to a scheduled meeting.

Is Zoom secure?

Like anything, it can be used with moderate security but in general, the platform has been known to be less than secure. In addition to the countless discovered vulnerabilities, incidents of “Zoom Bombing” are occurring to governments, businesses, and others.

_____________________________________

(Original Post)

Zoom Vulnerability

A major security vulnerability was recently discovered that affects all Mac users who have used Zoom video conferencing.

This vulnerability also affects RingCentral users, as RingCentral white labels their video conferencing with Zoom.

This allows any website to forcibly join a user to a Zoom call, with their video camera activated, without the user’s permission.

A step further, the vulnerability allows any site to DOS (Denial-of-service) a Mac user by repeatedly joining them to an invalid call. 

On July 8th, Jonathan Leitschuh, a security researcher identified the vulnerability saying:

“Additionally, if you’ve ever installed the Zoom client and then uninstalled it, you still have a localhost web server on your machine that will happily re-install the Zoom client for you, without requiring any user interaction on your behalf besides visiting a webpage. This re-install ‘feature’ continues to work to this day.”

Zoom CEO, Eric Yuan has stated that a recent update fixes the issue and emphasized an increased focus on security to further protect users privacy.

PHISHING

Download our infographic and learn how to identify a phishing scam when you see one.

Other Articles You Might Be Interested In:

Office365 is not a Disaster Recovery Plan

Office365 is not a Disaster Recovery Plan

Disaster recovery plans are vital, not just important. Data becomes lost, deleted, purged, corrupted, all the time. Without that measure in place, data is truly lost. There does seem to be confusion on what constitutes a Disaster Recovery plan, however. While many...

read more
Data Backups and Disaster Recovery

Data Backups and Disaster Recovery

Data backup is a critical part of an organization’s overall disaster recovery plan. The concept of data backup is simple: you make copies of your data and store them in a different location in case data is lost or destroyed.

read more

Founded in 1999, ITonDemand helps businesses and associations across the US achieve growth by guiding and supporting IT infrastructure and providing cybersecurity management. ITonDemand’s Core Solution and Security+ have been recognized among both Managed Services and Cybersecurity Providers as a member of the MSP Pioneer 250 and the Top 200 MSSPs.

1423 Powhatan St, Alexandria, VA 22314

233 SW 3rd St, Ocala, FL 34471

info@itondemand.com

800-297-8293