Hackers are dropping malware using fake Zoom application
Various video conferencing tools are being exploited by hackers to cause menace.
Due to the COVID-19 outbreak, institutions, corporations, and even government offices globally have all shut down physically and depending on running things remotely. To do so, people are looking towards video communication platforms in order to seamlessly hold meetings, give lectures for a class of students and to collaborate on anything else possible.
Hackers are using this as an opportunity to launch attacks towards various professionals who are working from home. Zoom is a cloud-based video conferencing service you can use to virtually meet with others - either by video or audio-only or both, all while conducting live chats - and it lets you record those sessions to view later. Zoom users were the prime target of these attacks.
Zoom sessions could be joined by someone unauthorized if the organizer has disabled the custom password option. Certain security reports have also stated that Zoom's video conferencing sessions can be bombed by hackers which means that any data shared over them is not secure.
Various secure data and information are being shared over such applications and hacking such data can lead to huge losses for various organizations. NPAV recommends using secure networks and applications for exchanging information related to the organization. Keep yourself updated about any security news that surfaces about any such application.
Use NPAV and join us on a mission to secure the cyber world.
- Other (42)
- Ransomware (124)
- Events and News (26)
- Features (44)
- Security (425)
- Tips (79)
- Google (22)
- Achievements (8)
- Products (33)
- Activation (7)
- Dealers (1)
- Bank Phishing (42)
- Malware Alerts (188)
- Cyber Attack (219)
- Data Backup (11)
- Data Breach (75)
- Phishing (138)
- Securty Tips (1)
- Browser Hijack (16)
- Adware (15)
- Email And Password (67)
- Android Security (55)
- Knoweldgebase (38)
- Botnet (15)
- Updates (3)
- Alert (70)
- Hacking (57)
- Social Media (7)
- vulnerability (53)
- Hacker (31)
- Spyware (8)
- Windows (6)
- Microsoft (21)
- Uber (1)
- YouTube (1)
- Trojan (2)
- Website hacks (3)
- Paytm (1)
- Credit card scam (1)
- Telegram (3)
- RAT (5)
- Bug (3)
- Twitter (2)
- Facebook (7)
- Banking Trojan (5)
- Mozilla (2)
- COVID-19 (5)
- Instagram (2)
- NPAV Announcement (5)
- IoT Security (1)
- Deals and Offers (1)
- Cloud Security (8)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (2)
- WhatsApp (4)
- Amazon (1)
- DMart (1)
- Payment Risk (4)
- Occasion (2)
- firewall (1)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (5)
- Impersonation phishing (1)
- DDoS (4)
- Smishing (2)
- Whale (0)
- Whale phishing (3)
- WINRAR (2)
- ZIP (2)