Zoom Video Chat Vulnerable to Reused Password Attack

Four Marketing Pillars to Build a Business, Compromised Email Accounts Revealed, scammers, New Ransomware Target Identified, Networking Etiquette, Is Your Home Router Hackable?, Cerber Ransomware Uses Dropbox to Avoid Detection, Almost Perfect Phishing Technique Now Active, Two-Factor Authentication Now Compromised, World Wide Ransomware, Microsoft Defends Against WannaCry Ransomware, OneLogin Secure Signin Service Breached, Petya Ransomware Flooding the World, Cogeco Phishing Attack Targets Subscribers, Home Renovation Tips, WPA2 wireless security, Windows Requirements for Meltdown and Spectre Updates, 4 Reasons A Small Business Owner With A CFO Mindset Can Succeed, WordPress Update Breaks Automatic Update Capability, RCMP Warn Wi-Fi Users to be Aware of Honeypots, CYBER FRAUD PREVENTION AND PROTECTION, Small Businesses Overspending on Cybersecurity Experts Say, Top Questions the CRA Gets at Tax Time, Windows 10 April 2018 Update Coming Soon, VPNFilter Malware has Affected Over 1 million Routers, 4 Ways Businesses Can Survive Disruptions Beyond Your Control, Criminals exploiting flaw in Windows 10 Task Scheduler, Computer security risk

Hackers take Advantage of Login Credentials Purchased on the Dark Web to Compromise over 500,000 Zoom Video Accounts

With the Zoom video chat app becoming more widely used during the current pandemic, security researchers have discovered a database of more than 500,000 compromised accounts.  Because many people tend to reuse the same password to access multiple accounts, hackers have begun using account information purchased on the dark web to successfully attack the Zoom app.

Those who are familiar with security concerns with the Zoom app may already be avoiding its use, but the majority of users are not aware of these issues and continue to use the platform.

If you wish to continue using the Zoom app, please ensure you change your login password to one that has never been used before.  If you are unsure whether your newly chosen password has ever been published as part of a data breach, you can test it at the website Have I Been Pawned

Simply enter your password (nothing else, so there’s no way to tie it to you specifically) and you will be instantly informed whether hackers already use that password in their attack attempts.

Jack Eisenberg is the owner of Safe and Secure Computing and regularly contributes computer security related articles.

Facebook Comments

Previous ArticleNext Article
Jack is the owner of Safe and Secure Computing and JEM Software, with 40-plus years of programming, system design and consulting experience in the computer field. His businesses provide computer security, website design and hosting services to clients in the Windsor-Detroit area.