![]() |
Image : Resonate |
According to the latest cve site report data, the vulnerability in the Zoom application occurred on July 12, 2019 with a vulnerability score of 6.8. This means that for now it should be relatively safe from vulnerability. Now you can judge for yourself whether or not it is safe to use this application.
In conclusion :
FIRST Computer Operating System is vulnerable. Could be because it was never updated, RDC (Remote Desktop Computer) is on, the IP can be accessed from the public.
SECOND Users make a click action on the application that is indicated THIRD e-mail malware that users use to register zoom using e-mail that is commonly used everyday even more connected to his smartphone e-mail.
Tips on Safe Zoom Application
Make sure the device's Operating System is safe from viruses and malware, and use an updated antivirus application Download the latest Zoom application on the official page https://zoom.us/download Register then enter the official Zoom application with Two-Factor Authentication
If You Are a Host Meeting
- Use Zoom premium
- Create a list of meeting participants
- Set the "Meeting Room" by generating an ID and create a password
- Don't share the ID and password of the "Meeting Room" to the public
- Activate the "Waiting Room" feature
- Disable the "Join" feature before Host "
- Disable the recording feature
- Activate the" Host Only "feature in the screen sharing settings
- If needed to record, save the recorded file in a safe place
If you are a participant
- Register your Zoom account at the Host meeting
- Don't click on suspicious and unknown links
- Official meeting links, IDs and Passwords will only be informed by the Host
- Make sure the camera's point of view does not belong to the private area
- Turn on the microphone only when talking
Become Victims Of ZOOM BOMBING ?
- Lock the intruder! Immediately open the "Participants List" or list of participants, scroll down and click "More". After that, click "Lock Meeting" so you can remove the dark participants immediately.
- Activate "Mute". Open the "Participants List", then click "Mute All Controls". That way, intruders cannot use a microphone so that the possibility of "hijacking" online meetings can be immediately avoided.
Prevention
- Always update the application. Don't use an older / older version
- Set restrictions on application access rights.If there is only enough camera and sound on the smartphone
- Do not auto login using Gmail or Facebook
- Do not the same email address with any social media and e-wallet
- Turn off the RDC (Remote Desktop Computer) service while using Zoom
- Get used to log out after using Zoom
- For meetings that are highly confidential, DO NOT use Zoom. Use the application and the server itself.