Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

admin
Pinned July 18, 2019

<> Embed

@  Email

Report

Uploaded by user
Zoom will remove server behind Mac webcam security hole
<> Embed @  Email Report

Zoom will remove server behind Mac webcam security hole

Jon Fingas, @jonfingas

July 09, 2019
 
Zoom will remove server behind Mac webcam security hole | DeviceDaily.com

Zoom is acting quickly on the security flaw that let intruders hijack Mac users’ webcams. The video conferencing firm is releasing a patch on July 9th (that’s today, if you’re reading in time) that removes access to the local web server behind the vulnerability. It’ll also let you manually uninstall Zoom and remove all traces of the app so that there’s no chance of an exploit later on. Another update, due for the weekend of July 12th, will also ensure that rookies who choose “always turn off my video” will automatically have their preferences honored in those situations where a meeting host would normally require that video switches on.

The company had previously defended its earlier decisions. The web server only responded to requests from the local computer, Zoom said. It argued that this was more convenient than having to confirm launching the Zoom client every time you wanted to get into a meeting. It also fixed a denial-of-service bug in May, although it didn’t require an update as this was deemed a “low-risk vulnerability.”

This won’t be a huge issue unless you’re regularly using Macs for work-related video conversations, but it promises to be a relief for the corporate crowd. It also illustrates the sheer amount of pressure to be transparent and quick about addressing security holes in the modern tech world. Researcher Jonathan Leitschuh, who discovered the flaw, noted that Zoom’s newfound willingness to patch out the web service represented an “about face” — it went from rationalizing its existing strategy to planning a fix in a matter of hours.

Engadget RSS Feed

(59)