Are you really downloading Zoom - or is it malware? • Blisstech Solutions

When you think about tools for remote working and chatting online, Zoom may be one of the first names in your mind.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch.

More Content

Start it on your phone… finish it on your PC?

Start it on your phone… finish it on your PC with “Hand Off”

If you work on your phone while you’re on the move, it can be a hassle to find the right file once you’re back at your PC. Here we tell you about a cool new feature coming to Windows 11 that will help.

Take action to avoid a devious new phishing scam

Cyber criminals are getting smarter. This recent malware threat is unusually smart. It impersonates a highly trusted brand name to get a foot in the door.

Microsoft 365 makes Multi-Factor Authentication easier

Microsoft is planning to enable Multi-Factor Authentication (MFA) directly in its Outlook app for many 365 business users.

SHOCK STAT: A third of business owners don’t trust their staff

SHOCK STAT: A third of business owners don’t trust their staff

Do you trust your employees with sensitive business data? You might be shocked to learn how many business owners don’t. But why… ? We have the answers.

How to plan a big IT project

We all dream of making changes to our business that will make us more efficient and profitable, but significant changes to the technology you use to run your business should never be rushed.

Here’s what’s in store for the last ever Windows ‘Moments’ update

Here’s what’s in store for the last ever Windows ‘Moments’ update

Microsoft will start to roll out its last Windows 11 ‘Moments’ update in a few weeks. After that it’s back to annual updates. We have all the details of the ‘Moments 5’ features you won’t want to miss. .

Outsourcing always beats DIY

Do you ever feel like you're juggling ten tasks at once to keep your business running? Marketing, sales, finances, IT… the list goes on! And somewhere in that chaos, your dreams for growth get lost. Enter Dave, a fellow entrepreneur who has created the same...
Businesses are taking too long to fix vulnerabilities

Businesses are taking too long to fix vulnerabilities

If you knew your systems were at risk of attack, you’d jump in and get things locked down fast – right? Actually… many businesses take too long to fix vulnerabilities. Here’s why that’s a problem.

Microsoft plans a naming system for hackers

Microsoft plans a naming system for hackers

Hacking groups are given different names by different security companies. And that means you don’t know who’s really behind an attack so can’t react as quickly as you’d like. That’s about to change, thanks to Microsoft…

New phishing scam is smarter than ever… here’s how to protect your business

New Microsoft 365 phishing scam is smarter than ever… here’s how to protect your business

Microsoft is warning business owners that trusted cloud storage services are being hijacked to trick you into handing over your data. Here we tell you what you need to know.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05