![]() ![]() Zoom also set things up so that meeting hosts could specify the default video and audio settings for participants joining the meeting-including “join with webcam enabled”. To accomplish this on macOS, the Zoom app installs its own web server on a user’s system so that when they click on a meeting invitation and open the link in their browser, the Zoom client is automatically launched and the meeting participant is joined to the meeting. Zoom wanted to make it easy for hosts to invite participants to an online meeting-and for participants to accept and join meetings with a click. In this short post we’ll tell you about the vulnerability, explain its possible effects, and tell you what you can do to protect yourself. So even if you haven’t used Zoom in a while (or if you can’t remember if it was ever on your computer), read on. Worse yet, because of the way Zoom works on macOS, you could still be at risk even if you uninstall the app! Security researcher Jonathan Leitschuh has discovered a major vulnerability in the popular Zoom video conferencing app that could allow malicious actors to turn on your Mac’s camera without your permission. ![]() ![]() The update does not require user interaction your version of macOS should automatically update itself with this patch. Update: As of 10 July, Apple has released a silent update to resolve the persistent web server issue described in this article. ![]() Zoom security flaw puts you at risk (even after you uninstall) ![]()
0 Comments
Leave a Reply. |