Are you really downloading Zoom - or is it malware? • Blisstech Solutions

When you think about tools for remote working and chatting online, Zoom may be one of the first names in your mind.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch.

More Content

Don’t Overlook Home Worker Security

Protecting Home Workers and Your Business In the current work-from-home landscape, business security strategies often overlook one crucial aspect: home office security. This oversight creates vulnerabilities that cybercriminals are actively exploiting. With more...

Tech Tip: How to get the most out of Google searches

Hello everyone! Today's Tuesday Two Minute Tech-tip shows you how to get the best out of your Google searches. Google search is arguably the best in the world and gives us the internet at our fingertips, but it can be hard to find what you are looking for. This tip...

Tech Tip: How to find the tools you need in Microsoft Office

Welcome to a new Tuesday tech tip video, and it's another speedy, but useful one Are you struggling to find the tools you need in Office applications? Me too! Since Microsoft introduced the ribbon in Office applications, it has become harder to find tools that you...

LinkedIn takes action to tackle fake accounts

LinkedIn is introducing new verification features over the coming months to help tackle fake accounts. The business-focused social platform is a fantastic place to connect with like-minded businesspeople, and to find new employees, jobs and opportunities. But thanks to this popularity, we’re seeing an increase in fake profiles, created by scammers for more sinister purposes. Bot-like accounts have been cropping …
Read More

Unlock your potential with Copilot

Unlock your potential with Copilot

Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here we tell you some cool ways it can help.

Don’t sleep on this simple, effective security booster

Don’t sleep on this simple, effective security booster

Microsoft’s enforcing an extra layer of security for logins to one of its tools. Even if you don’t use it, you should follow their lead and implement this security booster in your business.

The secrets to make your laptop battery live longer

The secrets to make your laptop battery live longer

Ever been caught out by a low laptop battery at the worst possible time? Here’s our professional advice to prolong your laptop battery’s lifespan.

Metal work coming out of a metal apple

Do I need Antivirus on a Mac?

Broadly speaking there are two different types of desktop computer users; Windows users and Mac users (sorry Linux users but you are very much in the minority). Microsoft has included a free antivirus solution called Windows Defender for years because they realised...

How to scan a QR code with your phone

As more venues open up for face to face meetings, some are introducing their own track and trace systems using a QR code that you need to scan with your mobile phone. But how? This video explains how to scan a QR code with your phone so you are not trying to figure it...
Protect your business from a data leak with Microsoft Edge

Protect your business from a data leak with Microsoft Edge

Keeping your data away from the wrong hands is a big challenge. But thanks to Microsoft Edge for Business, it’s just become easier. Here we tell you why.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05