computer Security

Zoom Announced Security Enhancements to Prevent Zoombombing Attacks

The video-conferencing platform Zoom has released a new update in an attempt to deal with an assault of security concerns surrounding the service. Zoom released new security enhancements to remove and report disruptive meeting participants.

New Zoom Security Enhancements:

Suspend Participant Activities

The Suspend Participant Activities feature is enabled by default for all free and paid Zoom users.

Under the Security icon, hosts and co-hosts have the choice to click “Suspend Participant Activities,” to remove a troubling participant from their meeting. All video, audio, in-meeting chat, annotation, screen sharing, and recording during that point will stop, and Breakout Rooms will come to an end.

Additionally, the hosts or co-host are going to be asked if they might wish to report a user from their meeting, share any details, and optionally include a screenshot. Once they reported a specific user, the reported user is going to be removed from their meeting. Zoom’s Trust & Safety team are going to be notified.

Report by Participants

At this point, meeting participants also can report a disruptive user directly from the Zoom client by clicking the top-left Security badge (as shown below). Account owners and admin can allow reporting capabilities for non-hosts in their web settings.

At-Risk Meeting Notifier

Zoom deployed an At-Risk Meeting Notifier to scan public social media posts and other websites for publicly shared Zoom Meeting links. When the tool detects a meeting that appears to be at high risk of being disrupted, it automatically alerts the account owner by email and provides advice on what to do.

This will help to delete the vulnerable meeting and create a new one with new meeting ID.

One of the finest ways to maintain your Zoom meeting secure is to never share your meeting ID or passcode on any public forum, including social media.

These are the new features available on the Zoom desktop clients for Mac, PC, and Linux, and our mobile apps.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Also Read:

Zoom 0day Vulnerability Let Attackers Execute Arbitrary Code on Victim’s Computer

Zoom Vulnerability Allow Attackers to Hack Victim Machine via Chat Messages

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report that highlights…

12 hours ago

C2A Security’s EVSec Risk Management and Automation Platform Gains Automotive Industry Favor as Companies Pursue Regulatory Compliance

In 2023, C2A Security added multiple OEMs and Tier 1s to its portfolio of customers,…

13 hours ago

Apple ID “push bombing” Attack Targeting Apple Users to Steal passwords

Apple users are falling prey to a sophisticated phishing campaign designed to hijack their Apple…

15 hours ago

Hackers Using Weaponized Virtual Hard Disk Files to Deliver Remcos RAT

Hackers have been found leveraging weaponized virtual hard disk (VHD) files to deploy the notorious…

16 hours ago

NVIDIA ChatRTX For Windows App Vulnerability Let Attackers Escalate Privilege

A security update released by ChatRTX on March 26th, 2024, addresses two vulnerabilities (CVE-2024-0082 and…

20 hours ago

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

A new threat has emerged, targeting unsuspecting iPhone users through the seemingly secure iMefofferssage platform.…

20 hours ago