Zoom app and security. Zoom Security Issues Are a Wakeup Call for Enterprises
Looking for:
Zoom privacy risks: The video chat app could be sharing more information than you think - CNET - Security OverviewWhile framing is a feature, it can also pose as a security threat without insufficient measures in place. Please ensure that this feature is securely implemented. Logging information for app debugging and diagnostics is an important function to understand app and system performance as well as to identify vulnerabilities and malicious intent. Security-focused logging should be used to identify any potential attacks and enable responses to secure or invalidate a user session or token.
If submitted data or suspicious user activity is detected, encoded information on the session should be sent to a secure logging service. Do not ever log sensitive information. Errors reported during app usage are commonly used to report information directly to a user, but this provides the risk that data provided to the user within a client could also provide information useful to an attacker.
For example, it is possible that information within the error response could be used to determine sensitive information and the existence of user accounts. Information leakage is a common vulnerability that exposes data through error codes shown to users which include common debugging information, stack traces, or failed database queries.
Application errors should be logged for debugging and reporting purposes but should not be exposed within a client. Cross-site Request Forgery CSRF is a common vulnerability which allows a malicious program to cause unauthorized actions on a site when a user is authenticated. In a CSRF attack, a browser request takes advantage of the authenticated access of the user, allowing an attacker to compromise end user data and operations without their knowledge.
Many common web frameworks have CSRF support built in but unique vulnerabilities are exposed based on specific app capabilities. For a wide range of topics on web and app security best practices, The Zoom Marketplace highly recommends reviewing the OWASP Open Web Application Security Project , a worldwide not-for-profit organization focused on improving the security of software.
If you're looking for help, try Developer Support or our Developer Forum. The attackers tried to spoof the email address and replicate the subject line of a legitimate email from Zoom. The email was able to bypass Microsoft email security controls, she wrote. About 10, emails were sent to an online mortgage brokerage company in North America, according to Armorblox.
That ubiquitous nature and the broad reach within enterprise should not be overlooked as part of the attack surface, according to cybersecurity professionals.
A single Zoom account might only be used by one employee; however, that employee is connected to countless other cyber assets, such as Microsoft Teams, devices, cloud resources and sensitive data repositories.
Oliver Tavakoli, CTO at cybersecurity vendor Vectra, said many collaboration platforms in many ways are relatively new, making them less familiar to security professionals at companies. These tools are also relatively immature in terms of accompanying security protections provided by third parties. Applications like Zoom also will continue to be a problem as hackers are increasingly using fake links to commonly used platforms as foundational to phishing campaigns.
Property of TechnologyAdvice. All Rights Reserved Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation.
This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace. With the option to customize your background and newer features such as Immersive View and a vanishing pen tool , it's easy to see why Zoom's popularity hasn't dwindled even as COVID vaccines and booster shots roll out and offices become hybrid workplaces.
But that popularity comes with privacy risks. From built-in attention-tracking features which have since been disabled to exploitable software bugs and issues with "Zoom-bombing" where uninvited attendees break into and disrupt meetings , Zoom's security practices have drawn scrutiny worldwide. The Electronic Frontier Foundation also cautioned people working from home about the software's onboard privacy features. Read more: 20 Zoom video chat tips, tricks and hidden features.
Privacy experts previously expressed concerns about Zoom in , when the video-conferencing software experienced both a webcam hacking scandal , and a bug that allowed people to potentially join video meetings they hadn't been invited to , if those meetings weren't protected with a password. The issues were exacerbated by Zoom's widespread adoption at the start of the pandemic, but this was just the latest chapter in the software's rocky security history.
It prompted Zoom CEO Eric Yuan to respond to concerns in April , freezing feature updates to address security issues over a day update rollout. Zoom saw explosive growth at the time, increasing its ranks from 2, to 6, employees from February to December By the end of Zoom's hiring boom, the software had become the first video communications client to attain Common Criteria certification, an international cybersecurity standard awarded after rigorous analysis.
Though Zoom has added these and other security features like end-to-end encryption , there are still a few things you should watch out for to keep your chats as private as possible. For paid subscribers, Zoom's cloud recording feature can either be a life-saver or a catastrophic faux pas waiting to happen. If the feature is enabled on the account, a host can record the meeting along with its text transcription and a text file of any active chats in that meeting, and save it to the cloud where it can later be accessed by other authorized users at your company, including people who may have never attended the meeting in question.
Zoom does allow a narrowing of the audience here, however. Administrators can limit the recording's accessibility to only certain preapproved IP addresses, even if the recording has already been shared.
Participants can also see when a meeting is being recorded. In the spring of , Zoom rolled out two privacy improvements aimed at making users more aware of whether a meeting is being recorded.
- Is Zoom Safe & Secure?
Zoom Security Issues Are a Wakeup Call for Enterprises | eSecurityPlanet.
Zoom also offers an API call to pre-provision users from any database backend. Additionally, your organization or university can add users to your account automatically with managed domains. Once your managed domain application is approved, all existing and new users with your email address domain will be added to your account. We have introduced tools and processes to ensure our compliance with requirements imposed by the GDPR and to help our customers comply as well.
Zoom does not have access to identifiable health information and we protect and encrypt all audio, video, and screen sharing data. Healthcare organizations should contact our sales teams to learn more about our solutions and how they can be configured to comply. If you think you have found a security vulnerability in Zoom, please visit our Vulnerability Disclosure Policy. Request a Demo 1. Security at Zoom See why millions of people and organizations trust us with their communications. More Resources.
We take your security seriously. Protecting your meetings Zoom offers several tools to protect your meetings, helping manage participant activity, information sharing, and more.
Protecting your data Communications are established using bit TLS encryption and all shared content can be encrypted using AES encryption, and optional end-to-end encryption. By the end of Zoom's hiring boom, the software had become the first video communications client to attain Common Criteria certification, an international cybersecurity standard awarded after rigorous analysis.
Though Zoom has added these and other security features like end-to-end encryption , there are still a few things you should watch out for to keep your chats as private as possible. For paid subscribers, Zoom's cloud recording feature can either be a life-saver or a catastrophic faux pas waiting to happen. If the feature is enabled on the account, a host can record the meeting along with its text transcription and a text file of any active chats in that meeting, and save it to the cloud where it can later be accessed by other authorized users at your company, including people who may have never attended the meeting in question.
Zoom does allow a narrowing of the audience here, however. Administrators can limit the recording's accessibility to only certain preapproved IP addresses, even if the recording has already been shared. Participants can also see when a meeting is being recorded. In the spring of , Zoom rolled out two privacy improvements aimed at making users more aware of whether a meeting is being recorded. During a meeting, you can now look at the bottom of your in-app chat window near the text field where -- if the meeting is being recorded -- you'll see the message "Recording On.
Zoom also introduced a digital stop sign to alert people to bigger potential privacy exposures, in the form of a pop-up notification. When entering a meeting that is being recorded or streamed live, a window will appear informing you of the meetings status and you'll first be required to consent to being recorded before you can proceed. Regardless of the account owner's settings, the notices are displayed to all guests that join a meeting or live streaming session outside the account's organization.
Read more: The best VPN services for By now, you're used to hearing it from the privacy-minded: Don't use Facebook to log in to other sites and software unless you want Facebook to have data on what you're doing. Fair enough. But what to do when Zoom gets caught sending some of your analytics data to Facebook -- whether or not you even have a Facebook account?
Courtesy of Facebook's Graph API, Zoom was telling Facebook whenever you opened the Zoom app, what phone or device you were using, and your phone carrier, location and a unique advertising identifier. The Security icon is available in our latest release version 4.
Read more about the Security icon update on our support page or check out the overview video here:. Additionally, the Zoom Meeting ID will no longer be displayed on the title toolbar.
The Zoom team also updated several features for specific account types:.
Comments
Post a Comment