
This is not the only issue to have been uncovered in Zoom video conferencing software over the past couple of days, raising privacy and security concerns among millions of users. More Zoom-related Security and Privacy Incidents Jitsi (free, self-host, open source, up to 75 participants)īesides using a strong password, Windows users can also change the security policy settings to restrict the operating system from automatically passing their NTML credentials to a remote SMB server.Google Hangouts Meet (up to 250 participants).Skype & Microsoft Teams (up to 50 participants).Some of the best alternative video conferencing and chat software are:
Skype password hack beta 1.05.exe Patch#
( Update: A day after we published this report, Zoom apologies for falling short of privacy and security expectations and released an updated version if it software to patch recently reported multiple security issues, including UNC path injection.) Zoom has already been notified of this bug, but since the flaw has not yet been patched, users are advised to either use an alternative video conferencing software or Zoom in their web browsers instead of installing a dedicated client app on their systems.

In addition, another security researcher going by the name ' pwnsdx' on Twitter shared another trick with The Hacker News that could let attackers hide malicious links when displayed at the recipients' end, potentially making it look more convincing and practical. To be noted, to exploit this issue, an attacker must be aware of the Windows username for the targeted user, which, however, can easily be obtained using the first SMBRelay attack.
