Analysis of information sources in references of the Wikipedia article "Zoom (software)" in English language version.
The vulnerability was first described last week by a researcher who uses the Twitter handle @_g0dmode. He wrote: "#Zoom chat allows you to post links such as \\x.x.x.x\xyz to attempt to capture Net-NTLM hashes if clicked by other users.
collects and stores personal data and shares it with third parties such as advertisers. But Zoom's policy also covers what it labels "customer content" or "the content contained in cloud recordings, and instant messages, files, whiteboards... shared while using the service". This includes videos, transcripts that can be generated automatically, documents shared on screen, and the names of everyone on a call.
Zoom did not employ end-to-end encryption... Zoom did not employ 256-bit Encryption... recorded Messages are not stored encrypted in Zoom's cloud storage immediately after a Meeting has ended... Zoom installed the ZoomOpener webserver, without adequate notice or consent, to circumvent a browser privacy and security safeguard... the webserver would remain on users' computers even after they had uninstalled the Zoom App.
must not misrepresent in any manner, expressly or by implication, the security features... establish and implement, and thereafter maintain, a comprehensive information security program... The Assessments must be obtained by one or more qualified, objective, independent third-party professionals...
as high school students in Colorado signed in to a mandatory video meeting for a class, Zoom readied the full names and email addresses of at least six students — and their teacher — for possible use by its LinkedIn profile-matching tool
Among the latest organisations to block the use of Zoom are German industrial giant Siemens, which sent out an internal circular urging its employees to not use the tool for video conferencing, with Standard Chartered Bank also issuing a similar note to its staff.
Currently, it is not possible to enable E2E encryption for Zoom video meetings. (...) When we use the phrase 'End to End' in our other literature, it is in reference to the connection being encrypted from Zoom end point to Zoom end point.
Among the latest organisations to block the use of Zoom are German industrial giant Siemens, which sent out an internal circular urging its employees to not use the tool for video conferencing, with Standard Chartered Bank also issuing a similar note to its staff.
collects and stores personal data and shares it with third parties such as advertisers. But Zoom's policy also covers what it labels "customer content" or "the content contained in cloud recordings, and instant messages, files, whiteboards... shared while using the service". This includes videos, transcripts that can be generated automatically, documents shared on screen, and the names of everyone on a call.
as high school students in Colorado signed in to a mandatory video meeting for a class, Zoom readied the full names and email addresses of at least six students — and their teacher — for possible use by its LinkedIn profile-matching tool
Zoom did not employ end-to-end encryption... Zoom did not employ 256-bit Encryption... recorded Messages are not stored encrypted in Zoom's cloud storage immediately after a Meeting has ended... Zoom installed the ZoomOpener webserver, without adequate notice or consent, to circumvent a browser privacy and security safeguard... the webserver would remain on users' computers even after they had uninstalled the Zoom App.
must not misrepresent in any manner, expressly or by implication, the security features... establish and implement, and thereafter maintain, a comprehensive information security program... The Assessments must be obtained by one or more qualified, objective, independent third-party professionals...
The vulnerability was first described last week by a researcher who uses the Twitter handle @_g0dmode. He wrote: "#Zoom chat allows you to post links such as \\x.x.x.x\xyz to attempt to capture Net-NTLM hashes if clicked by other users.
Currently, it is not possible to enable E2E encryption for Zoom video meetings. (...) When we use the phrase 'End to End' in our other literature, it is in reference to the connection being encrypted from Zoom end point to Zoom end point.