Sender: |
|
X-To: |
|
Date: |
Tue, 9 Jul 2019 21:20:57 +0200 |
Reply-To: |
|
Message-ID: |
|
Subject: |
|
From: |
|
Content-Transfer-Encoding: |
quoted-printable |
In-Reply-To: |
|
Content-Type: |
text/plain; charset=utf-8 |
MIME-Version: |
1.0 |
Parts/Attachments: |
|
|
The web client, as well as the Windows, Linux and Android clients
see OK based on what we know so far.
Julf
On 09-07-19 21:15, Vaibhav Aggarwal, Catalyst & Group CEO wrote:
> Thanks for this. Till the next Update, I have removed the Zoom For Mac
> Client with immediate effect.
>
> Regards,
> Vaibhav Aggarwal
> New Delhi
> VaibhavAggarwal.com <http://VaibhavAggarwal.com>
>
>
>> On Jul 10, 2019, at 12:30 AM, Michael Karanicolas
>> <[log in to unmask] <mailto:[log in to unmask]>> wrote:
>>
>> Hey - remember when ICANN switched everyone from Adobe over to Zoom as
>> a way of enhancing information security and data privacy?
>>
>> "A vulnerability in the Mac Zoom Client allows any malicious website
>> to enable your camera without your permission... This vulnerability
>> allows any website to forcibly join a user to a Zoom call, with their
>> video camera activated, without the user's permission. On top of this,
>> this vulnerability would have allowed any webpage to DOS (Denial of
>> Service) a Mac by repeatedly joining a user to an invalid call.
>> Additionally, if you’ve ever installed the Zoom client and then
>> uninstalled it, you still have a localhost web server on your machine
>> that will happily re-install the Zoom client for you, without
>> requiring any user interaction on your behalf besides visiting a
>> webpage. This re-install ‘feature’ continues to work to this day."
>>
>> Read more
>> here: [log in to unmask]" target="_blank">https:[log in to unmask]
>
|
|
|