Are you really downloading Zoom - or is it malware? • Blisstech Solutions

When you think about tools for remote working and chatting online, Zoom may be one of the first names in your mind.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch.

More Content

Never mind “can’t teach an old dog new tricks”…

They say you can’t teach an old dog new tricks, but what happens when it’s a young pup that needs training? New research on people under 40 has revealed a scary attitude towards cyber security. We tell you more here.

How to scan a QR code with your phone

As more venues open up for face to face meetings, some are introducing their own track and trace systems using a QR code that you need to scan with your mobile phone. But how? This video explains how to scan a QR code with your phone so you are not trying to figure it...

Serious Flaws Discovered in D-Link Routers

Researchers at Fortinet have uncovered serious flaws in four D-Link routers.  The router vulnerabilities were found to allow for remote code execution which means a remote attacker could gain control of your router, snoop on your traffic and redirect your browser to...
Bridging the trust gap between your employees and AI

Bridging the trust gap between your employees and AI

Have you noticed your employees are reluctant to use AI in the workplace? It may be down to their lack of trust. We explain how to show them AI is a tool that makes work better for everyone.

Beware this malware: It “annoys” you into handing over login details

Beware this malware: It “annoys” you into handing over login details

A sneaky new malware wants to annoy you into giving up your login details. It locks your browser in full screen mode, making you think you’re trapped… But you can easily escape and we’ll tell you how…

When can you finally forget your password?

Passkeys are set to take over from traditional passwords to give us a safer, more secure way of logging into our online accounts.

Data loss? Save yourself a mighty headache

What would you do if all of your business data were lost? You might panic or stare at the screen in disbelief. However, if you're prepared, you'll have a safety net in place in the form of reliable and tested data backup. This means you can quickly restore your data...

Passkeys could change passwords forever

Back in May, we heard there would soon be a successor to the password – the Passkey. Now, we’re hearing that Apple will start rolling out Passkeys in the next few months in iOS 16. And we’re excited. Though it’s caused a bit of confusion. Apple is going to great...
Woman sitting at her computer with her head in her hands

Protecting your data – Backup and Restore

Protecting your data - Backup and Restore Backing up your business data is critical. What are the different methods of backing up your data? How can you restore lost or corrupted data? These are all important questions for any business to ask themselves. After reading...

Stop! And think, before you act on that email

Don’t fall victim to cyber criminals. We explain what a BEC attack is and how to protect your business.

Share This
Contact
Love Lane
Cleobury Mortimer
Shropshire DY14 8PE

01299 382 321
[email protected]
Copyright © 2024 Blisstech Solution Ltd
Registered No: 08125391 VAT No : 307 5490 05