<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>dos attack &#8211; EFR Technology Group</title>
	<atom:link href="https://www.efrtechgroup.com/category/dos-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.efrtechgroup.com</link>
	<description>We maintain technology so you don't have to!</description>
	<lastBuildDate>Tue, 09 Jul 2019 12:00:00 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.efrtechgroup.com/wp-content/uploads/2019/02/cropped-EFRTG-color-2-32x32.jpg</url>
	<title>dos attack &#8211; EFR Technology Group</title>
	<link>https://www.efrtechgroup.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>A flaw in Zoom&#8217;s Mac app may have let attackers hijack webcams</title>
		<link>https://www.efrtechgroup.com/tech/a-flaw-in-zooms-mac-app-may-have-let-attackers-hijack-webcams/</link>
		
		<dc:creator><![CDATA[Randall]]></dc:creator>
		<pubDate>Tue, 09 Jul 2019 12:00:00 +0000</pubDate>
				<category><![CDATA[Apple]]></category>
		<category><![CDATA[dos attack]]></category>
		<category><![CDATA[gear]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[software security]]></category>
		<category><![CDATA[Tech]]></category>
		<category><![CDATA[webcam]]></category>
		<category><![CDATA[zoom]]></category>
		<guid isPermaLink="false">https://www.efrtechgroup.com/a-flaw-in-zooms-mac-app-may-have-let-attackers-hijack-webcams/</guid>

					<description><![CDATA[[ad_1] The flaw takes advantage of Zoom&#8217;s click-to-join feature. The exploit can force users to join a conference with their webcams enabled, without their permission, if they click a special link in their browser. The security issue occurs because Zoom installs a local web server that runs in the background on Macs. But this web [&#8230;]]]></description>
										<content:encoded><![CDATA[<p> [ad_1]<br />
</p>
<div>
<p>The flaw takes advantage of Zoom&#8217;s click-to-join feature. The exploit can force users to join a conference with their webcams enabled, without their permission, if they click a special link in their browser.</p>
<p>The security issue occurs because Zoom installs a local web server that runs in the background on Macs. But this web server has poor security, and any website that a user visits can interact with it and make changes to users&#8217; machines. Worryingly, even if a user uninstalls Zoom, the web server remains active and can be used to reinstall the Zoom client when a user visits a webpage.</p>
<p>Security researcher <a href="https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5">Jonathan Leitschuh</a>, who discovered and reported the vulnerability, warned that this could be used for two types of attacks: users could be lured into meetings with their cameras turned on, in order to gather information for phishing attacks, or users&#8217; machines could be the target of Denial of Service (DOS) attacks by sending repeated junk requests to the local server.</p>
<p>Traditionally, desktop and web applications are sandboxed to prevent this kind of cross-communication. When Zoom was made aware of the security issue, it released a quick fix solution which saved users&#8217; settings for whether video is enabled when they join a call, so users can at least have their cameras off by default. However, the fix <a href="https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5">did not address</a> the underlying issue of the insecure local web server.</p>
<p>The company defended its decision in a <a href="https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/">blog post</a>, saying that without the use of the web server, users would have to click to confirm they wanted to start the Zoom client before joining a meeting. &#8220;The local web server enables users to avoid this extra click before joining every meeting. We feel that this is a legitimate solution to a poor user experience problem, enabling our users to have faster, one-click-to-join meetings.&#8221; It also noted that it has no indication that the exploit has never been used, and even if it were to be used, users would see they had unintentionally joined a meeting and could leave immediately.</p>
<p>Whether the convenience of not having to click one extra button is worth the huge security issue created by the insecure web server is not a topic Zoom is keen to debate. In a statement to <a href="https://gizmodo.com/serious-security-flaw-with-teleconferencing-app-allowed-1836202438"><em>Gizmodo</em></a>, the company said &#8220;one-click-to-join meetings&#8221; were its &#8220;key product differentiator&#8221; and it has not announced any plans to address the insecure web server issue.</p>
</p></div>
<p>[ad_2]<br />
<br /><a href="https://www.engadget.com/2019/07/09/mac-vulnerability-webcams-zoom/">Source link </a></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
