![]() Researchers at Check Point learned that a hacker could pre-generate a long list of Zoom Meeting ID numbers, use automation techniques to quickly verify if a respective Zoom Meeting ID was valid or not, and then gain entry into Zoom meetings that were not password protected. Typically, these ID numbers comprise of 9, 10 and 11-digit numbers. Zoom meeting IDs are access points for Zoom meeting participants. Check Point Research identified a major security flaw in Zoom, the video conferencing service used by over 60% of the Fortune 500.Ĭheck Point's researchers were able to prove that hackers could easily generate and verify Zoom Meeting IDs to target victims, enabling a hacker to eavesdrop on Zoom meetings, giving them intrusive access to all audio, video and documents shared throughout the duration of the meeting.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |