Popularity due to lack of privacy . However, in this boom to maintain communication at all costs and from digital platforms, cases such as the one carried out by Zoom call into question the privacy that these programs guarantee users. And it is that the application has gained special relevance due to various security flaws related to its service. In recent weeks, an analysis by Privacy Matters campaigner Pat Walshe of the app's privacy policies specifically for the app that works on iOS devices found that Zoom is sending some analytics data to phone number list Facebook, even if app users They don't have a Facebook account. This problem was recognized by the firm itself, which decided to issue a statement apologizing for the fact while claiming to be working to solve this error.
Which is added to a bug that allowed websites to access the camera of millions of Macs, a vulnerability that it persisted even after uninstalling the app. Now Zoom is once again in the eye of the hurricane on privacy issues after more the phone number list 500,000 accounts with credentials are sold and given away in different online forums. This report was delivered by BleepingComputer , a medium that highlights that in the last few hours around 530,000 Zoom user accounts have appeared for sale at ridiculous prices, where buyers can access email, password, meeting URLs and host keys of each account in Zoom. With all this information, it is easy for a third party to impersonate the affected user using their credentials to.
Access Zoom meetings and exchange messages without the consent of the user who owns the account. Although with the phone number list history of Zoom in recent days, it might be thought that the problem is the result of a failure in the app's system, the reality is that everything indicates that this time the culprits are the users and the mismanagement of their passwords. The information of the compromised accounts has been obtained with a technique that tests credentials from other previously filtered services to see if they match. This means that if, for example, the data (including the password) of the Zoom account coincide with that of Twitter, this coincidence is sought to illegally access another profile of a user that was previously exposed.