Looking for:

How to lock a Zoom meeting to keep out unwanted guests | TechRepublic

Click here to ENTER


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Department of Justice opens in new tab said it had issued an arrest warrant for former Zoom executive Jin Xinjiang, aka Julien Jin, who until recently had served as the liaison between Zoom and the Chinese government. The U. Jin is thought to be residing in China. Jin allegedly had help from unnamed co-conspirators who created fake email accounts and Zoom accounts in the names of known Chinese dissidents “to fabricate evidence that the hosts of and participants in the meetings to commemorate the Tiananmen Square massacre were supporting terrorist organizations, inciting violence or distributing child pornography.

The Dept. The DoJ announcement and arrest warrant opens in new tab refer only to an unnamed “Company-1” as Jin’s employer, but in a blog post, Zoom admitted that it was the company opens in new tab and that it had been conducting its own investigation after it received a subpoena from the U.

The post further explained that Jin had been hired by Zoom in October as part of an agreement with the Chinese government, which in September had “turned off our service in China without warning. The price of getting Zoom turned back on in China was to hire “an in-house contact for law enforcement requests” — i. Zoom service was restored in China in November , and the Dept. Zoom admitted that Jin “shared or directed the sharing of a limited amount of individual user data with Chinese authorities,” and that the information of “fewer than ten The Better Business Bureau opens in new tab is warning Zoom users that scammers are trying to steal their usernames and passwords via phishing emails and text messages, reports Threatpost opens in new tab.

The messages tell you that “your Zoom account has been suspended” or that “you missed a meeting,” and offer a helpful link to log back in. But don’t fall for the bait — the login page is really a trap to capture your Zoom user credentials, with which the crooks can use or even steal your Zoom account.

One of the biggest problems with Zoom has been “Zoom bombing,” in which uninvited participants crash a Zoom meeting and disrupt it. Over the weekend, Zoom released two new features to combat this. One, “Suspend Participant Activities,” lets the meeting host pause the meeting, kick out disruptive participants, and then resume the meeting.

The other, “Report by Participants,” extends to meeting participants the ability to report disruptive participants, a remedy that previously had been given only to meeting hosts.

The Federal Trade Commission announced that Zoom “misled users” and “engaged in a series of deceptive and unfair practices” regarding its own security. The FTC cited the fake end-to-end encryption uncovered in March and software that Zoom installed on Macs without authorization in and Zoom must agree to yearly internal security reviews and external security reviews every other year and must implement a vulnerability-management program.

Another stipulation was that Zoom offer customers multi-factor authentication , which it has already implemented. Researchers in Texas and Oklahoma discovered that it’s possible to tell what someone is typing during a Zoom call just by watching their shoulders and arms.

Any kind of video-conferencing platform could be used for this, the researchers said, as could YouTube videos or streaming platforms like Twitch. Zoom’s end-to-end-encryption feature finally went live, except on iOS where it had to wait for Apple’s approval.

We’ve got instructions on how to enable Zoom’s end-to-end encryption. After a long period of time with no Zoom news, the company announced that the end-to-end encryption it had been working on for many months would soon be available for beta testing.

Users will have to wait for a Zoom client software update in the third week of October. Meeting hosts will be deciding whether to make a Zoom meeting end-to-end encrypted.

Those meetings will not work for now for users trying to join via the web-browser interface or over the telephone. If you recall that the Zoom web interface was out of commission for a few days back in April , now we know why: The company was fixing a very serious security flaw that could have let anyone join a private Zoom meeting.

British security researcher Tom Anthony opens in new tab detailed on his blog this week how he found that he could make endless random guesses on the 6-digit PINs Zoom assigns to private meetings.

That’s a million possibilities to go through, which might be tough for a human, but isn’t hard for a decently powered PC running multiple threads. Anthony found he could break into Zoom meetings in about half an hour, give or take.

That’s long before many meetings are over. An unnamed security researcher found a critical flaw in the Zoom meetings client software for Windows that would let a hacker remotely take over any PC running Windows 7 or earlier. Zoom fixed the flaw with a software update soon after the flaw became public knowledge.

Backing down after sustained criticism from privacy advocates, Zoom announced in a blog posting June 17 opens in new tab that its upcoming end-to-end encryption E2E wouldn’t just be for paid users any more.

The millions of people who use Zoom for free for school, socializing and work would get end-to-end encryption too. Yuan wrote. But if you’re a free user who wants E2E, you’ll first have to verify your identity to Zoom via a one-time-password or similar service. This will make it harder to “zoom bomb” meetings.

The E2E encryption will remain an optional feature, Yuan reminded, because when it’s activated, no one can join a meeting over the phone or with certain office teleconferencing equipment. It’ll be up to meeting hosts whether to activate E2E. Zoom’s in hot water in the U. The company apologized for the actions in a blog post June 11 opens in new tab and said it would develop a way to block meeting participants from certain locations i.

That wasn’t enough to satisfy more than a dozen U. Yuan demanding to know how cozy his company was with the Beijing government. Talos opens in new tab , an information-security research firm owned by Cisco, revealed June 3 that it had found two serious flaws in Zoom client applications, both of which have now been patched.

The first flaw opens in new tab would have let an attacker use a specially created animated GIF placed in a Zoom meeting chat to hack Zoom client software on other people’s machines to force the installation of malware, or, as Talos put it, “achieve arbitrary code execution.

The second flaw opens in new tab also involves the chat function in Zoom meeting client software, with similarly serious potential consequences. The problem was that Zoom did not validate the contents of shared compressed files such as. An attacker could have sent malware in the form of a compressed file to a user via Zoom meeting chat, and the user’s Zoom client would have saved and opened the malware within the Zoom application’s directory. Even worse, if the user were to save the Zoom compressed file elsewhere on the PC, such as on the desktop, then the attacked could send an altered version of the first file with the same name.

Zoom would open the second version but not the first automatically, permitting the malware to “plant binaries at almost arbitrary paths and Zoom’s upcoming end-to-end encryption is mainly for paid users, as Zoom itself stated back on May 7. But Alex Stamos, a well-known information-security expert who is consulting Zoom on security matters, told Reuters opens in new tab last week that schools and other non-profit enterprises might be able to also get the end-to-end encryption for their accounts.

All administrators of Zoom Rooms need to update their software opens in new tab by May 30, Zoom said in a blog posting May The update to Zoom 5. More information about updating Zoom Rooms is here opens in new tab. The 5. Two more instances of corrupted Zoom installers were found by Trend Micro researchers.

The first opens up a backdoor on a PC; the second spies on the PC’s owner with screenshots, keylogging and webcam hijacking and drafts the PC into the Devil Shadow botnet. Both installers do install the Zoom software client, so victims may be none the wiser. As always, get your Zoom software straight from the Zoom website at Zoom. Zoom suffered an unexplained outage Sunday, May 17, rendering it unavailable to thousands of users in the U.

The outage, which began Sunday morning U. Even the British government’s daily coronavirus briefing opens in new tab was affected, knocking out the ability of journalists to ask questions over Zoom. Some users reported on Twitter that logging out of Zoom accounts, then logging back in, seemed to solve the issue. Zoom’s status page noted that a backend update had taken place earlier Sunday morning, but there didn’t seem to be any linkage between that update and the outage that began a few hours later.

The Zoom status page opens in new tab said at the time that the outages “appear to be limited to a subset of users” and that Zoom was “working to identify the root cause and scope of this issue. Cybercriminals may have registered hundreds of new Zoom-related website addresses in the past few weeks, according to researchers at Israeli security firm Check Point opens in new tab. Many of these sites are being used in phishing attacks to grab victims’ Zoom usernames and passwords, and similar scams are leveraging rival video-conferencing platforms such as Google Meet and Microsoft Teams.

Over the weekend, online vandals hijacked the graduation ceremony at Oklahoma City University opens in new tab , replacing the Zoom video feed with racist language and symbols.

It wasn’t immediately clear whether this was a result of regular Zoom-bombing or if the attackers used less well-known methods to disrupt the video feed. Zoom announced May 7 opens in new tab that due to its technical-support staff being overwhelmed with calls, it would be able to give personal technical assistance only to “owners and administrators” of paid accounts.

In other words, any user, owner or administrator of a free Zoom account, and end users of paid accounts, won’t be entitled to human help. Instead, they’ll have to rely on the FAQs and how-to’s list on the Zoom online resources opens in new tab page. For now, this provision applies only to May and June If the coronavirus lockdown last longer than that, Zoom may have to hire more tech-support staffers. New York State Attorney General Letitia James’ office reached an agreement with Zoom opens in new tab May 7 following an investigation into Zoom’s security and privacy practices.

There isn’t a lot of new stuff in the agreement. Most of the stipulations Zoom agreed to are things the company is already doing, including making passwords mandatory and using better encryption.

In the long term, Zoom has to conduct regular code reviews and conduct yearly penetration-testing exercises, in which paid hackers try to break through the company’s defenses. Only two new things will directly affect consumers. It also has to update its Acceptable Use policies to ban “abusive conduct include hatred against others based on race, religion, ethnicity, national origin, gender, or sexual orientation.

Frankly, these are longstanding standard policies at many other online companies, so we’re a little surprised that they weren’t already Zoom policies.

Yuan announced opens in new tab. Zoom is a video and audio conferencing tool with easy collaboration, chat, screen sharing and more across mobile devices, desktops, and telephones. Starting June 1st, , Zoom cloud recordings older than days will automatically be deleted and sent to the Zoom Cloud trash. Learn more. This action will be on a rolling basis, and recordings will be removed after they pass the day mark.

If you notice anything strange about the way Zoom works missing features, can’t access meeting , sign out and back into Zoom. Learn how to Install and sign into the Zoom app. When creating new meetings as host, if you want external guests to attend, leave the “Only authenticated users can join” setting unchecked: Learn how.

Zoom is a web conferencing program and so much more. See how Zoom is used for Teaching, Learning, and Meeting. Use Zoom to present your classes synchronously online. Faculty can also record classes to share for asynchronous access. Learn more about Zoom for Teaching. Students can join classes presented with Zoom on a computer or mobile device with internet access. Learn more about Zoom for Learning. Faculty, Staff, and Students can use Zoom to hold meetings with attendees in different locations.

Faculty, Staff, and Students can record meetings to their computers; Faculty and Staff can also record to the cloud. Learn more about Getting Started with Zoom. Just like in person classes or meetings, Zoom session have their own disruptions.

Familiarize yourself with these Zoom settings in particular to help prevent and manage disruptions:. If this is true — and there needs to be more research in the problem — it will certainly be time to become more conscious of when and how often we meet on Zoom, for how long and for what purpose.

Try holding some of your work meetings by phone. It might seem strange at first and take a bit of getting used to, but you might just find your meetings are more productive and satisfying. Your imagination might kick into gear and re-fire your motivation. Edition: Available editions Global. Become an author Sign up as a reader Sign in. Paul Levy , University of Brighton. Zoom has features to support online events of various sizes with varying degrees of interactivity.

For highly interactive events where all participants will share video and audio, a regular Zoom meeting with attention given to certain settings might be best. Northwestern IT has secured licenses for webinars with up to participants. One license for up to 1, participants is available on a first-come-first-served basis. To request a webinar license at no cost, please fill out the Zoom Webinar Request Form at least one week in advance of the event. Webinar licenses can typically be applied to your account within two business days after submission of the request form.

Departments can also purchase webinar licenses for exclusive use. Visit the IT Knowledge Base to learn more about Zoom webinars, how to request a license, and pricing. Due to extensive use of Zoom and the high volume of meetings being recorded to Zoom’s cloud, measures are needed to stay within contracted Zoom cloud storage limits.

CA Shibboleth. Delivering and supporting desktop computers, computer labs, printers and peripherals. Zoom Video Conferencing. Accessible on multiple devices – Attendees can participate in meetings using smartphone, computer, or audio only. Interactive and engaging – Collaborative whiteboard and annotation, and remote control of screen. Live polls can be prepared and used during the meeting, with live chat used to ask questions or provide visual feedback. Accessibility for all learners – Ensures that everyone can participate equitably with closed captioning and keyboard shortcuts.

For faculty who want to use Zoom for delivering real-time lectures, please reference these step-by-step instructions. For faculty who want to use Zoom for exam invigilation, please reference these step-by-step instructions. Instructors may use Zoom to deliver real-time lectures as follows: Instructors should inform students that they can maintain their privacy by logging in using only their first name or a nickname, turning off their camera, and muting their microphone.

 
 

 

How to join a zoom meeting for the first time in canada – none:. Zoom security issues: What’s gone wrong and what’s been fixed

 
Researchers at Trend Micro opens in new tab discovered a version of the Zoom installer that has been bundled with cryptocurrency-mining malware , i. But researchers at the Citizen Lab opens in new tab at the University of Toronto, in a report posted April 3, found that Zoom actually uses the somewhat weaker AES algorithm. Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process.

 
 

How to join a zoom meeting for the first time in canada – none: –

 
 

Zoom integrates with Canvas , the University’s Learning Management System, allowing instructors to conduct audio, video, and content sharing conferencing within their Canvas courses. Student study groups can virtually meet over Zoom, allowing flexibility when coordinating schedules.

To sign up for a Zoom user account, visit the Zoom login and click the Log In button. Accounts are provisioned automatically after first login.

The first time you log in, schedule, or connect to a Zoom meeting using a computer you will need to download the Zoom desktop application. The person scheduling the meeting will receive an automated email from Zoom Network with connection details including a URL to access the meeting. This email can be forwarded to meeting participants or added to a meeting invitation in Outlook.

How do I schedule a Zoom meeting? Zoom offers optional settings to increase the privacy of your meetings and recordings. Using these settings is recommended if you are discussing any sensitive or confidential information in your meetings. How do I set privacy for Zoom meetings and recordings , and how do I protect against and respond to “Zoombombing?

There are two ways to attend a Zoom meeting. You can use the link included in the meeting email invitation or enter a Meeting ID after logging into your Zoom account.

A Zoom account is not required to attend a meeting. How do I attend a Zoom meeting? The web browser version gets security enhancements faster and “sits in a sandbox” to limit security problems, notes antivirus company Kaspersky opens in new tab.

When you click a link to join a meeting, your browser will open a new tab and prompt you to use or install the Zoom desktop software. But there’s a smaller link to “join from your browser. That will make Zoom-bombing much less likely. We’ve put the most recent Zoom issues up top and separated older problems into those that are unresolved, those that have been fixed and those that don’t fit into either category.

Following reports from multiple Mac users who said their microphones stayed on even after Zoom meetings had ended , Zoom pushed out a patch that was supposed to fix the problem. It didn’t quite work. Another patch a month later finally did turn the microphones off. Make sure your Zoom desktop client on Mac is updated to version 5. You may have to install the update “manually” by downloading it directly from the Zoom website opens in new tab.

Zoom’s client software for Windows and Mac personal use now lets you enable automatic updates opens in new tab , which means you’ll get all the latest crucial security fixes as soon as they come. Even better, the new feature lets you choose a “fast” or “slow” lane for less urgent updates, meaning that you can choose whether to get all the latest features and risk a little instability, or to proceed at a steady pace with maximum reliability.

Automatic updates will probably be enabled by default soon for all new and existing users. As a result of a settlement in a class-action lawsuit relating to some of the privacy and security issues detailed earlier on this page, anyone who used Zoom between March 30, and July 30, is entitled to a cash payout.

It might not be a lot of money per person. To file a claim, read the fine print at ZoomMeetingClassAction. Tom’s Guide cannot guarantee that you will get anything. Zoom has patched three serious flaws in some of its enterprise video-conferencing software, the worst of which could have let an attacker penetrate a company’s internal server system. The following enterprise Zoom applications are vulnerable and must be updated, per a report from Positive Technologies opens in new tab : Meeting Connector Controller up to version 4.

Regarding consumer software, Zoom has fixed a security flaw in Zoom Client for Meetings for Windows, which needs to be updated to version 5. That’s according to the Zoom Security Bulletin opens in new tab page. Zoom announced that beginning Nov. Anyone running software older than that will be prompted to update their software.

This affects all Zoom software running on all supported platforms except for Zoom Room Controller software, at least for now. Zoom disclosed several security issues opens in new tab that had been fixed in later versions of Zoom’s desktop clients and plug-ins for Microsoft Outlook for both Windows and macOS. The flaws ranged in severity from low to high, with some allowing remote code execution — i.

All were patched by at least Zoom Client for Meetings 5. Zoom announced that it planned to roll out end-to-end encryption opens in new tab to Zoom Phone opens in new tab , its paid cloud calling service for Pro, Business or Enterprise accounts.

The end-to-end encryption will be an option for one-to-one Zoom Phone calls. Zoom announced via its Zoom Security Bulletin opens in new tab that the remote-hacking flaw demonstrated at the Pwn2Own competition in April had been fixed. Zoom reached a tentative settlement in a federal class-action lawsuit that alleged the company skimped on security, misled users and shared user personal data with third parties without notification or consent. Enterprise and government Zoom account holders are not part of this litigation.

Known class members will be notified by email or regular mail that they can file a claim, and others will be able to use the website www. Zoom has released a ” simpler, clearer opens in new tab ” privacy policy that reflects the fact that the online meeting service has “shifted from a primarily enterprise-focused product to one that is also used broadly by individuals” during the COVID pandemic.

The updated privacy policy includes more details about who can “see, save and share” Zoom meeting content, and the kinds of data that Zoom collects from users’ devices. You can read the full updated Zoom privacy “statement” here opens in new tab. In a blog post, Zoom announced that it had added privacy notifications opens in new tab to the latest version of its desktop client software.

The notifications appear in the in-meeting chat window as a button labeled “Who can see your messages? It added that future updates would include notifications when a meeting host or participant uses a Zoom transcription or scheduling app during a meeting. Two researchers demonstrated at the Pwn2Own contest that they could remotely take over Windows PCs and Macs by using at least one previously unknown vulnerability in the Zoom desktop application.

Fortunately, the only people who fully understand how this exploit works are the two researchers and Zoom itself, which is working on a fix. The chances of this attack being used “in the wild” are low, but if you’re concerned, use the Zoom browser interface instead during meetings until this is fixed. Zoom lets meeting participants share all of their computer screens, part of their screens, or just specific application windows with other people in the same meeting. Two German researchers discovered that for a brief moment, the entire screen may be visible even when the Zoom user sharing the screen intends only part of the screen to be.

Any participants recording the meeting would be able to freeze frames during playback and view potentially sensitive information. Zoom said it was working to fix the issue, but at the time of this writing, the flaw was still present in the latest version of the Zoom desktop client software for at least Windows and Linux. Keybase, an encrypted social-media verification system and chat app bought by Zoom in May , had a serious flaw opens in new tab that preserved images in online directories even after the user had deleted them.

The flaw was reported to Zoom in early January , and a Keybase software update to fix the flaw was released later that month. A new study conducted by researchers at Boston University and Binghamton University found that efforts to stop “Zoom bombing,” such as requiring passwords or making attendees stew in “waiting rooms,” often won’t work.

That’s because many attacks are carried out by “insiders” who are already authorized to be in the meetings. The “only effective defense” against such insider attacks, the paper argues, is to create “unique join links for each participant.

Plagued by an epidemic of Zoom-bombing during city-assembly meetings, the city of Juneau, Alaska is exploring ways to outlaw the practice. Police in Alaska’s capital have had a hard time tracking down the Zoom bombers. The city hopes that by making the practice illegal, it can compel Zoom to turn over information identifying the digital miscreants. In a bombshell announcement, the U.

Department of Justice opens in new tab said it had issued an arrest warrant for former Zoom executive Jin Xinjiang, aka Julien Jin, who until recently had served as the liaison between Zoom and the Chinese government. The U. Jin is thought to be residing in China. Jin allegedly had help from unnamed co-conspirators who created fake email accounts and Zoom accounts in the names of known Chinese dissidents “to fabricate evidence that the hosts of and participants in the meetings to commemorate the Tiananmen Square massacre were supporting terrorist organizations, inciting violence or distributing child pornography.

The Dept. The DoJ announcement and arrest warrant opens in new tab refer only to an unnamed “Company-1” as Jin’s employer, but in a blog post, Zoom admitted that it was the company opens in new tab and that it had been conducting its own investigation after it received a subpoena from the U. The post further explained that Jin had been hired by Zoom in October as part of an agreement with the Chinese government, which in September had “turned off our service in China without warning.

The price of getting Zoom turned back on in China was to hire “an in-house contact for law enforcement requests” — i. Zoom service was restored in China in November , and the Dept. Zoom admitted that Jin “shared or directed the sharing of a limited amount of individual user data with Chinese authorities,” and that the information of “fewer than ten The Better Business Bureau opens in new tab is warning Zoom users that scammers are trying to steal their usernames and passwords via phishing emails and text messages, reports Threatpost opens in new tab.

The messages tell you that “your Zoom account has been suspended” or that “you missed a meeting,” and offer a helpful link to log back in. But don’t fall for the bait — the login page is really a trap to capture your Zoom user credentials, with which the crooks can use or even steal your Zoom account.

One of the biggest problems with Zoom has been “Zoom bombing,” in which uninvited participants crash a Zoom meeting and disrupt it. Over the weekend, Zoom released two new features to combat this.

One, “Suspend Participant Activities,” lets the meeting host pause the meeting, kick out disruptive participants, and then resume the meeting. The other, “Report by Participants,” extends to meeting participants the ability to report disruptive participants, a remedy that previously had been given only to meeting hosts. The Federal Trade Commission announced that Zoom “misled users” and “engaged in a series of deceptive and unfair practices” regarding its own security. The FTC cited the fake end-to-end encryption uncovered in March and software that Zoom installed on Macs without authorization in and Zoom must agree to yearly internal security reviews and external security reviews every other year and must implement a vulnerability-management program.

Another stipulation was that Zoom offer customers multi-factor authentication , which it has already implemented. Researchers in Texas and Oklahoma discovered that it’s possible to tell what someone is typing during a Zoom call just by watching their shoulders and arms. Any kind of video-conferencing platform could be used for this, the researchers said, as could YouTube videos or streaming platforms like Twitch.

Zoom’s end-to-end-encryption feature finally went live, except on iOS where it had to wait for Apple’s approval. We’ve got instructions on how to enable Zoom’s end-to-end encryption. After a long period of time with no Zoom news, the company announced that the end-to-end encryption it had been working on for many months would soon be available for beta testing. Users will have to wait for a Zoom client software update in the third week of October.

Meeting hosts will be deciding whether to make a Zoom meeting end-to-end encrypted. Those meetings will not work for now for users trying to join via the web-browser interface or over the telephone.

If you recall that the Zoom web interface was out of commission for a few days back in April , now we know why: The company was fixing a very serious security flaw that could have let anyone join a private Zoom meeting.

British security researcher Tom Anthony opens in new tab detailed on his blog this week how he found that he could make endless random guesses on the 6-digit PINs Zoom assigns to private meetings. That’s a million possibilities to go through, which might be tough for a human, but isn’t hard for a decently powered PC running multiple threads.

Anthony found he could break into Zoom meetings in about half an hour, give or take. That’s long before many meetings are over.

An unnamed security researcher found a critical flaw in the Zoom meetings client software for Windows that would let a hacker remotely take over any PC running Windows 7 or earlier. Zoom fixed the flaw with a software update soon after the flaw became public knowledge.

Backing down after sustained criticism from privacy advocates, Zoom announced in a blog posting June 17 opens in new tab that its upcoming end-to-end encryption E2E wouldn’t just be for paid users any more. The millions of people who use Zoom for free for school, socializing and work would get end-to-end encryption too.

Yuan wrote. But if you’re a free user who wants E2E, you’ll first have to verify your identity to Zoom via a one-time-password or similar service. This will make it harder to “zoom bomb” meetings. The E2E encryption will remain an optional feature, Yuan reminded, because when it’s activated, no one can join a meeting over the phone or with certain office teleconferencing equipment.

It’ll be up to meeting hosts whether to activate E2E. Zoom’s in hot water in the U. The company apologized for the actions in a blog post June 11 opens in new tab and said it would develop a way to block meeting participants from certain locations i. That wasn’t enough to satisfy more than a dozen U. Yuan demanding to know how cozy his company was with the Beijing government.

Talos opens in new tab , an information-security research firm owned by Cisco, revealed June 3 that it had found two serious flaws in Zoom client applications, both of which have now been patched. The first flaw opens in new tab would have let an attacker use a specially created animated GIF placed in a Zoom meeting chat to hack Zoom client software on other people’s machines to force the installation of malware, or, as Talos put it, “achieve arbitrary code execution.

The second flaw opens in new tab also involves the chat function in Zoom meeting client software, with similarly serious potential consequences. The problem was that Zoom did not validate the contents of shared compressed files such as. An attacker could have sent malware in the form of a compressed file to a user via Zoom meeting chat, and the user’s Zoom client would have saved and opened the malware within the Zoom application’s directory.

Even worse, if the user were to save the Zoom compressed file elsewhere on the PC, such as on the desktop, then the attacked could send an altered version of the first file with the same name.

Zoom would open the second version but not the first automatically, permitting the malware to “plant binaries at almost arbitrary paths and Zoom’s upcoming end-to-end encryption is mainly for paid users, as Zoom itself stated back on May 7. But Alex Stamos, a well-known information-security expert who is consulting Zoom on security matters, told Reuters opens in new tab last week that schools and other non-profit enterprises might be able to also get the end-to-end encryption for their accounts.

All administrators of Zoom Rooms need to update their software opens in new tab by May 30, Zoom said in a blog posting May The update to Zoom 5. More information about updating Zoom Rooms is here opens in new tab. The 5. Two more instances of corrupted Zoom installers were found by Trend Micro researchers.

The first opens up a backdoor on a PC; the second spies on the PC’s owner with screenshots, keylogging and webcam hijacking and drafts the PC into the Devil Shadow botnet. Both installers do install the Zoom software client, so victims may be none the wiser.

As always, get your Zoom software straight from the Zoom website at Zoom. Zoom suffered an unexplained outage Sunday, May 17, rendering it unavailable to thousands of users in the U. The outage, which began Sunday morning U.

Even the British government’s daily coronavirus briefing opens in new tab was affected, knocking out the ability of journalists to ask questions over Zoom. Some users reported on Twitter that logging out of Zoom accounts, then logging back in, seemed to solve the issue. Zoom’s status page noted that a backend update had taken place earlier Sunday morning, but there didn’t seem to be any linkage between that update and the outage that began a few hours later.

The Zoom status page opens in new tab said at the time that the outages “appear to be limited to a subset of users” and that Zoom was “working to identify the root cause and scope of this issue. Cybercriminals may have registered hundreds of new Zoom-related website addresses in the past few weeks, according to researchers at Israeli security firm Check Point opens in new tab.

Many of these sites are being used in phishing attacks to grab victims’ Zoom usernames and passwords, and similar scams are leveraging rival video-conferencing platforms such as Google Meet and Microsoft Teams. Over the weekend, online vandals hijacked the graduation ceremony at Oklahoma City University opens in new tab , replacing the Zoom video feed with racist language and symbols.

It wasn’t immediately clear whether this was a result of regular Zoom-bombing or if the attackers used less well-known methods to disrupt the video feed.

Zoom announced May 7 opens in new tab that due to its technical-support staff being overwhelmed with calls, it would be able to give personal technical assistance only to “owners and administrators” of paid accounts.

In other words, any user, owner or administrator of a free Zoom account, and end users of paid accounts, won’t be entitled to human help. Instead, they’ll have to rely on the FAQs and how-to’s list on the Zoom online resources opens in new tab page.

For now, this provision applies only to May and June If the coronavirus lockdown last longer than that, Zoom may have to hire more tech-support staffers. New York State Attorney General Letitia James’ office reached an agreement with Zoom opens in new tab May 7 following an investigation into Zoom’s security and privacy practices.

There isn’t a lot of new stuff in the agreement. Most of the stipulations Zoom agreed to are things the company is already doing, including making passwords mandatory and using better encryption. In the long term, Zoom has to conduct regular code reviews and conduct yearly penetration-testing exercises, in which paid hackers try to break through the company’s defenses.

Only two new things will directly affect consumers. It also has to update its Acceptable Use policies to ban “abusive conduct include hatred against others based on race, religion, ethnicity, national origin, gender, or sexual orientation.

Frankly, these are longstanding standard policies at many other online companies, so we’re a little surprised that they weren’t already Zoom policies. Yuan announced opens in new tab. The purchase price or other terms of the deal were not disclosed.

Keybase makes user-friendly software to easily and securely encrypt messaging and social media posts. In March, Zoom had to admit that its touted “end-to-end” encryption was not the real thing because Zoom’s own servers are always able to access the contents of meetings.

According to this view, imagination can make us more goal directed, more likely to get things done. Zoom fatigue can have the opposite effect. If this is true — and there needs to be more research in the problem — it will certainly be time to become more conscious of when and how often we meet on Zoom, for how long and for what purpose.

Try holding some of your work meetings by phone. It might seem strange at first and take a bit of getting used to, but you might just find your meetings are more productive and satisfying. Your imagination might kick into gear and re-fire your motivation. Edition: Available editions Global. Become an author Sign up as a reader Sign in.

Paul Levy , University of Brighton. Technology Video calls Zoom meetings Zoom calls. Events More events.

Leave a Reply

Your email address will not be published. Required fields are marked *