Analysis of information sources in references of the Wikipedia article "Zoom (phần mềm)" in Vietnamese language version.
The vulnerability was first described last week by a researcher who uses the Twitter handle @_g0dmode. He wrote: "#Zoom chat allows you to post links such as \\x.x.x.x\xyz to attempt to capture Net-NTLM hashes if clicked by other users.
collects and stores personal data and shares it with third parties such as advertisers. But Zoom's policy also covers what it labels "customer content" or "the content contained in cloud recordings, and instant messages, files, whiteboards... shared while using the service." This includes videos, transcripts that can be generated automatically, documents shared on screen, and the names of everyone on a call.
as high school students in Colorado signed in to a mandatory video meeting for a class, Zoom readied the full names and email addresses of at least six students — and their teacher — for possible use by its LinkedIn profile-matching tool
Among the latest organisations to block the use of Zoom are German industrial giant Siemens, which sent out an internal circular urging its employees to not use the tool for video conferencing, with Standard Chartered Bank also issuing a similar note to its staff.
Among the latest organisations to block the use of Zoom are German industrial giant Siemens, which sent out an internal circular urging its employees to not use the tool for video conferencing, with Standard Chartered Bank also issuing a similar note to its staff.
collects and stores personal data and shares it with third parties such as advertisers. But Zoom's policy also covers what it labels "customer content" or "the content contained in cloud recordings, and instant messages, files, whiteboards... shared while using the service." This includes videos, transcripts that can be generated automatically, documents shared on screen, and the names of everyone on a call.
as high school students in Colorado signed in to a mandatory video meeting for a class, Zoom readied the full names and email addresses of at least six students — and their teacher — for possible use by its LinkedIn profile-matching tool
The vulnerability was first described last week by a researcher who uses the Twitter handle @_g0dmode. He wrote: "#Zoom chat allows you to post links such as \\x.x.x.x\xyz to attempt to capture Net-NTLM hashes if clicked by other users.