We did not have time
Hackers can use the "
As Zoom has grown in popularity, it has come under scrutiny from the cybersecurity community, which has begun to look more closely at the weaknesses of the new video conferencing software. Earlier, for example, it was discovered that the end-to-end encryption (end-to-end) declared by the developers in Zoom is actually absent. A vulnerability discovered last year that made it possible to remotely connect to a Mac computer and turn on a video camera without the permission of the owner has been fixed by the developers. However, the solution to the problem with the UNC injection in Zoom itself has not yet been reported.
Currently, if you need to work through the Zoom application, it is recommended to either disable automatic transmission of NTML credentials to a remote server (change the Windows security policy settings), or simply use the Zoom client to surf the Internet.
Source: 3dnews.ru