Security News > 2020 > January > Video: Zoom Researcher Details Web Conference Security Risks, 2020 Threats

"The main takeaway for online conference platforms is that these companies are in charge of the security of their users and they need to work to secure these environments. Zoom added a password but other actions can be taken as well so that people can't really abuse these platforms," she said.
Beyond Zoom's recent flaw, Horowitz also talked to Threatpost about the challenges of hunting down cybercriminals and making attribution, and the top threats she's anticipating in 2020 - from ransomware to cloud-infrastructure attacks.
We were able to actually track the way that Zoom randomize their conference numbers and generate these numbers ourselves, and join many different videos or just different conferences that take place on Zoom.
So the threat actors now understand that we don't only want to stop the attacks, but also to find who they are.
So these ransomware attacks are kind of, I like to call them "Boutique attacks." So they are attacking some very specific organizations that have lots of data and lots of money, which allows the threat actors to ask for a ransom as high as millions of dollars.
News URL
https://threatpost.com/video-zoom-web-conference-security-risks/152337/
Related news
- Cross-Domain Attacks: A Growing Threat to Modern Security and How to Combat Them (source)
- Severe Security Flaws Patched in Microsoft Dynamics 365 and Power Apps Web API (source)
- Researchers Uncover Major Security Flaw in Illumina iSeq 100 DNA Sequencers (source)
- FTC orders GoDaddy to fix poor web hosting security practices (source)
- Addressing the intersection of cyber and physical security threats (source)
- Discover Hidden Browsing Threats: Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks (source)
- Uncover Hidden Browsing Threats: Get a Free Risk Assessment for GenAI, Identity, Web, and SaaS Risks (source)
- Inconsistent security strategies fuel third-party threats (source)