Security News > 2020 > April > Zoom's security flaws: Has it done enough to fix them?
Tim Keeler, CEO of Remediant, a security consultant and penetration tester, explained how Zoom became a target.
The Windows version of Zoom "Tricked users into disclosing usernames and password hashes by clicking on links in a Zoom session chat window," which "Took advantage of the Universal Naming Convention path injection vulnerability in the Zoom Windows client."
Zoom acknowledged the problems: "We moved too fast... and we had some missteps," CEO Eric Yuan told CNN. "We've learned our lessons and we've taken a step back to focus on privacy and security." The platform responded by pausing feature updates for 90 days.
On Sunday, April 5, Zoom responded by offering some options to help beef up security.
Still, the key takeaway is that while these security breaches have targeted Zoom, it could happen to any platform that hasn't taken the proper measures to protect itself.