![]() “Zoom’s security and privacy track record is rather poor–and these bugs are trivial to exploit,” says Wardle. Once Zoom has been tricked into loading the malicious code, it gains all Zoom access rights. ![]() ![]() While a user needs to give their consent for Zoom to use the webcam or mic, Wardle explains how an attacker could inject malicious code into Zoom to force the app to provide access. Meanwhile, the second issue found by Wardle exploits a flaw in the way Zoom handles the Mac’s webcam and microphone. MORE FROM FORBES Google Just Confirmed Major Chrome Update Following Powerful COVID-19 Security Move By Kate O'Flaherty
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |