Skip to main content

Are popular platforms are targeted by Cyber Criminals?



Are popular platforms are targeted by Cyber Criminals? The latest report of Zoom meeting shown that they are some privacy issues in ZOOM application which resulted in data breach.

The information from media sources tells that personal information such as Name, Email ID etc. got leaked.



ZOOM meeting app was found in 2011, Since the application is launched there are millions of users accessing it for education, business and other purposes.

This COVID-19 pandemic made the world to lockdown. This resulted in Virtual meetings, classes etc.

This increased in the number of users of ZOOM application made the ZOOM platform into trending platform and brought the attention of Cyber Criminals and resulted in the data breach of users.

Before COVID-19 pandemic there is no history of a data breach of the platforms. Only after the application becoming mostly used application then the cyber criminals started to finding its vulnerabilities and exploited the applications.

Soon after this incident ZOOM responded in a positive way stating the Privacy and Security are its main motive and fixed the issue.


Note: The above written is blog is completely my assumptions that how the platform got exposed to Cyber Criminals.

Pictures Source: Internet

 

 

 


Comments

  1. Great information Mr. Roshan!, expecting more to come.... 🙂

    ReplyDelete

Post a Comment

Popular posts from this blog

Can Blockchain be the Iron Man of Data Security?

  Recent incident in Cyber Space shown that how vulnerable the data is and how important data security is to the user or an organization. There are various mechanisms out in the market in terms of data protection. What may be the reason for Data Thefts and Loss of Data Privacy? Lack of privacy towards the system is becoming more vulnerable to data thefts. For example, using weak passwords and lack of application regarding Cryptography. Cyber Criminals are finding the vulnerabilities in the system like Thanos finding the Infinity stones. Blockchain is the Iron Man of the Data Security. Blockchain Architecture will help reduce data theft and data tempering. What is Blockchain? Blockchain is growing list of records called blocks which are cryptographically hashed with pervious block. Blockchain follows the Merkle tree Data Structure Merkle Tree : In  cryptography  and  computer science , a hash tree or Merkle tree is a  tree  ...

What if Sherlock Holmes is a Digital Detective?

In this series of the blog, I’m going to put Windows Forensics with Sherlock Holmes. In this series, Sherlock Holmes is going to teach you how to solve the cases in the Digital world. John Watson:  Hey, Sherlock how you are going to start your first digital case? Sherlock Holmes:  Let me explain you the style of investigation that I follow to solve a digital case Main Part of Forensic investigation is Collection of Scientific evidence ·         Rule 1 : Maintain Integrity. ·         Rule 2 : Maintain the chain of custody.  ·         Rule 3:  Document everything ·         Rule 4:  Follow standard practices. Phases of Investigation ·         Evidence Preservation. ·         Evidence Searching. ·      ...

Cyberspace awareness during COVID-19

This COVID – 19 pandemic the usage of internet is increased. This pandemic situation became a great opportunity to cybercriminals. To protect our self from the cybercriminals, we need to follow some precautions. Hackers mostly use social engineering techniques to hack your devices.                              Here are some precautions measures to stay secure in this pandemic situations. 1) Banks are not going to ask the customers to pay the loans or bills through emails. As the  government of India cleared order the banks to the postponement of taking bills for three months. Even though if you're paying your debts to please pay the bills by going to the official website of the bank. If you receive any phone call or email stating that they are from the bank and asking to share your card details or PIN or UPI details, please ignore them and report to the bank. 2) Pay the subscription...