Zoom zero-day flaw allows code execution on victim’s Windows machine

A zero-day vulnerability in Zoom for Windows may be exploited by an attacker to execute arbitrary code on a victim’s computer. The attack doesn’t trigger a security warning and can be pulled off by getting the victim to perform a typical ac… Continue reading Zoom zero-day flaw allows code execution on victim’s Windows machine

Zoom announces new Hardware as a Service offering to run on ServiceNow

Zoom announced a new Hardware as a Service offering today that will run on the ServiceNow platform. At the same time the company announced a deal with ServiceNow to standardize on Zoom and Zoom Phone for its 11,000 employees in another case of SaaS cooperation. For starters, the new Hardware as a Service offering allows […] Continue reading Zoom announces new Hardware as a Service offering to run on ServiceNow

China’s Great Firewall of Censorship Is Already Going Up Around Hong Kong

Facebook, Google, Microsoft, Twitter, WhatsApp, and Zoom have all said they will stop complying with government orders to hand over data. And that’s exactly what Beijing wanted. Continue reading China’s Great Firewall of Censorship Is Already Going Up Around Hong Kong

Handy audio recorder puts field, music and podcast workflows on tap

Zoom has revealed a new app-driven portable audio recorder. Whether you’re out in the field, capturing the latest groove at band practice or producing your latest podcast, the H8 is like an all you can eat buffet for audio recording.Continue ReadingCat… Continue reading Handy audio recorder puts field, music and podcast workflows on tap

Zoom founder and CEO Eric Yuan will speak at Disrupt 2020

The coronavirus pandemic has bruised and battered many technology startups, but it has also boosted a small few. One such company is Zoom, which has shouldered the task of keeping us connected to one another in the midst of remote work and social distancing. So, of course, we’re absolutely thrilled to have the chance to […] Continue reading Zoom founder and CEO Eric Yuan will speak at Disrupt 2020

Zoom to Implement End-to-End Encryption for All Users, Not Just Paid

Zoom announced that end-to-end encryption (E2EE) will be available to all users, free and premium, marking a shift in strategy at the US company. One of the more controversial measures announced by Zoom a few weeks ago was related to their end-to-end e… Continue reading Zoom to Implement End-to-End Encryption for All Users, Not Just Paid

End-to-end encryption will be offered to all Zoom users

Zoom Video Communications has decided to extend the benefits of end-to-end encryption (E2EE) not only to paying Zoom customers, but to those who create free accounts, as well. The decision was reached after much public outcry by privacy-minded users an… Continue reading End-to-end encryption will be offered to all Zoom users

In reversal, Zoom says all users will have access to end-to-end encryption

Zoom has decided it will be able to offer end-to-end encryption to both free and paid users after all, reversing a recent decision that would have limited the feature to paid users, company founder Eric S. Yuan announced Wednesday. “Since releasing the draft design of Zoom’s end-to-end encryption (E2EE) on May 22, we have engaged with civil liberties organizations, our CISO council, child safety advocates, encryption experts, government representatives, our own users, and others to gather their feedback on this feature. We have also explored new technologies to enable us to offer E2EE to all tiers of users,” Yuan writes in a company blog. In order to gain access to end-to-end encryption, users will have to provide additional information, such as verifying their cell phone number through a text message, Yuan said. Yuan previously said that the earlier decision was rooted in the idea that Zoom should be able to share information with law […]

The post In reversal, Zoom says all users will have access to end-to-end encryption appeared first on CyberScoop.

Continue reading In reversal, Zoom says all users will have access to end-to-end encryption