- Attackers can use Zoom to steal users’ Windows credentials with no warning https://arstechnica.com/information-technology/2020/04/unpatched-zoom-bug-lets-attackers-steal-windows-credentials-with-no-warning/ 46 comments technology
Linking pages
- Zoombombing is a crime, not a prank, prosecutors warn | Ars Technica https://arstechnica.com/tech-policy/2020/04/zoombombing-is-a-crime-not-a-prank-prosecutors-warn/ 109 comments
- FCC requires anti-robocall tech after “voluntary” plan didn’t work out [Updated] | Ars Technica https://arstechnica.com/tech-policy/2020/03/ajit-pai-follows-congress-instructions-requires-new-anti-robocall-tech/ 52 comments
- Zoom brings in former Facebook security head amid lawsuits, investigations | Ars Technica https://arstechnica.com/tech-policy/2020/04/zoom-brings-in-former-facebook-security-head-amid-lawsuits-investigations/ 8 comments
- Microsoft announces Microsoft 365, a service to replace personal Office 365 | Ars Technica https://arstechnica.com/gadgets/2020/04/office-365-is-now-microsoft-365-and-its-getting-new-apps-and-features/ 3 comments
- Update Zoom for Mac now to avoid root-access vulnerability | Ars Technica https://arstechnica.com/information-technology/2022/08/zoom-patches-mac-auto-updater-vulnerability-that-granted-root-access/ 2 comments
- Zoom Sucks · GitHub https://gist.github.com/typokign/dd2480f195f5b48a9ab7af8b41c21404 1 comment
Linked pages
- A Message to Our Users - Zoom Blog https://blog.zoom.us/wordpress/2020/04/01/a-message-to-our-users/ 256 comments
- Objective-See's Blog https://objective-see.com/blog/blog_0x56.html 9 comments
- Microsoft announces Microsoft 365, a service to replace personal Office 365 | Ars Technica https://arstechnica.com/gadgets/2020/04/office-365-is-now-microsoft-365-and-its-getting-new-apps-and-features/ 3 comments
- Hacker House – Training & Services https://hacker.house/ 1 comment
- Beware of 'ZoomBombing': screensharing filth to video calls | TechCrunch https://techcrunch.com/2020/03/17/zoombombing/ 1 comment
- hackerfantastic.crypto on Twitter: "Hi @zoom_us &ampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampampamp; @NCSC - here is an example of exploiting the Zoom Windows client using UNC path injection to expose credentials for use in SMBRelay attacks. The screen shot below shows an example UNC path link and the credentials being exposed (redacted). https://t.co/gjWXas7TMO" / Twitter https://twitter.com/hackerfantastic/status/1245133371262619654 0 comments
Related searches:
Search whole site: site:arstechnica.com
Search title: Attackers can use Zoom to steal users’ Windows credentials with no warning | Ars Technica
See how to search.