Zoom expands end-to-end encryption for Phone and breakout rooms

Credit to Author: Charlotte Trueman| Date: Fri, 22 Jul 2022 03:44:00 -0700

Zoom has announced it is expanding end-to-end encryption (E2EE) capabilities to Zoom Phone, with breakout rooms to be given the same level of encryption in the near future.

Zoom Phone customers now have the option to upgrade to E2EE during one-on-one Zoom Phone calls between users on the same Zoom account that occur via the Zoom client.

During a call, when users select “More” they will see an option to change the session to an end-to-end encrypted phone call. When enabled, Zoom encrypts the call by using cryptographic keys known only to the devices of the caller and receiver. Users will also have the option to verify E2EE status by providing a unique security code to one another.

To read this article in full, please click here

Read more

The Wren Eleanor story: Why you should keep your kids’ images off social media

Credit to Author: Jovi Umawing| Date: Thu, 21 Jul 2022 17:57:00 +0000

A 3-year old TikTok influencer has got parents talking about how to keep images of their kids away from online creeps.

The post The Wren Eleanor story: Why you should keep your kids’ images off social media appeared first on Malwarebytes Labs.

Read more

The Wren Eleanor story: Why you should keep your kids off social media

Credit to Author: Jovi Umawing| Date: Thu, 21 Jul 2022 17:57:00 +0000

A 3-year old TikTok influencer has got parents talking about how to keep images of their kids away from online creeps.

The post The Wren Eleanor story: Why you should keep your kids off social media appeared first on Malwarebytes Labs.

Read more

Massive Losses Define Epidemic of ‘Pig Butchering’

Credit to Author: BrianKrebs| Date: Thu, 21 Jul 2022 16:35:28 +0000

U.S. state and federal investigators are being inundated with reports from people who’ve lost hundreds of thousands or millions of dollars in connection with a complex investment scam known as “pig butchering,” wherein people are lured by flirtatious strangers online into investing in cryptocurrency trading platforms that eventually seize any funds when victims try to cash out.

Read more

Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography

Credit to Author: Alfredo Oliveira| Date: Thu, 21 Jul 2022 00:00:00 +0000

In this blog entry, we discuss a malicious campaign that targets Alibaba Cloud’s OSS buckets with leaked credentials for malware distribution and cryptojacking.

Read more