Are you really downloading Zoom - or is it malware? • Blisstech Solutions

When you think about tools for remote working and chatting online, Zoom may be one of the first names in your mind.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch.

More Content

A free tool for more polished communication

A free tool for more polished communication

You’ve hit send on an important email – then you notice a typo. Windows 11 lets you spellcheck and autocorrect across most of its apps. Here we help you to set it up

Here’s how cyber criminals try to hack your accounts while you sleep

Have you ever received a notification on your phone while you’re sleeping, asking if it’s really you logging in?
It’s called a fatigue attack and Microsoft Authenticator’s latest feature will help to protect you.

How to cheat (the Blue Screen of) Death

The Blue Screen of Death and how to avoid it

The dreaded Blue Screen of Death makes you panic about what happened, how much work you’ve lost, and how long it’ll take to fix. But a lot of the time it’s avoidable… We’ll tell you how.

How concerned should you be about cyber attacks?

How concerned should you be about cyber attacks?

You’ve probably heard a lot of talk about cyber attacks but how worried should you really be? Well, very, because cyber criminals are getting smarter. We have good news to share about how you can protect your business

Templates and Slide Masters in PowerPoint title

Tech Tip: How to use Templates and Slide Masters in PowerPoint

This Tech Tip will show you how to use templates and Slide Masters in PowerPoint to give your presentations a professional and consistent look. I've been using PowerPoint for over 25 years and have created a lot of presentations. Previously, I would work from a...

Tech Tip: How to use Windows Clipboard History

Welcome to a new Tuesday tech tip video where I will show you a really cool Windows feature called Clipboard History. Do you ever find yourself copying and pasting the same text or images over and over again? If so, you're not alone. But there's a better way! Windows...
artificial intelligence thumbnail

Let’s start talking about Artificial Intelligence (AI)

From Alexa to Siri, AI is already all around us, but names like ChatGPT, Dall-E and Jasper have blown up the internet. Let’s decode some of the language

Is Your Business Ready for Another COVID-19 Lockdown?

Given the rapid rise in cases over the past few weeks, another lockdown was inevitable. Employers and employees alike will now be used to a 'new normal' where we are encouraged to work from home. During the last lockdown, we all learned that it is possible for us to...
Protect your business from a data leak with Microsoft Edge

Protect your business from a data leak with Microsoft Edge

Keeping your data away from the wrong hands is a big challenge. But thanks to Microsoft Edge for Business, it’s just become easier. Here we tell you why.

Antivirus Isn’t Enough. Why You Need EDR for Bulletproof Security

In the ancient days of dial-up internet, a simple antivirus program might have kept your computer safe. Today's digital landscape, however, is a minefield of constantly evolving cyber threats. Ransomware, phishing attacks, and zero-day exploits plague businesses and...
Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05