![]() ![]() ![]() In April 2020, when pandemic remote working led to a 500% increase in daily traffic to the Zoom download page, some critics said the company’s software was “a privacy disaster” and even malware. It is not the first time Zoom’s focus on frictionless use has led to a security hole. Normally, the company tries to ensure that is safe by limiting the installer to only operate on code that has been cryptographically signed by Zoom, but the bug discovered by Wardle means that an attacker could trivially bypass that protection and convince the installer to load and run any malware they want. In order to make the user journey simpler, the installer continues to run in the background from the moment a user first installs zoom, and does so with “superuser” privileges, allowing it to change anything about the computer. ![]() It targets the Zoom installer, which the company uses to enable frictionless automatic updates. Start Zoom Meetings and make Zoom Phone calls with flawless video, crystal clear audio, and instant screen sharing from any Slack channel, private group. Discovered by an independent security researcher, Patrick Wardle – whose brother Jeremy invented the popular game Wordle – the vulnerability was first presented at the Def Con hacking conference in Las Vegas last week. Users of Zoom on Macs should update the app, after the company issued a patch to fix a security flaw that could allow an attacker to take over their.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |