Are you really downloading Zoom… or is it malware?

When you think about tools for remote working and chatting online, one of the first names in your mind is Zoom.

But its popularity has opened the door for cyber criminals. They’re using its name to steal sensitive data.

Researchers have discovered at least six convincing-looking download sites. They’re not the real thing. They’re designed to tempt you into downloading FAKE Zoom software, containing ‘info stealers’ and other forms of malware (malicious software).

Accidentally use one of these sites thinking that you’re downloading a Zoom update… and you risk having sensitive data stolen. Possibly your banking info, passwords or browser history.

Some can even steal your multi-factor authentication details. That could give cyber criminals access to your most sensitive data.

The research also found these ‘stealer logs’ for sale on the dark web, where criminals can buy this information and use it to gain access to business networks.

Once a cyber criminal has access to your network, every piece of data you have stored becomes a target. In extreme cases, this can leave you vulnerable to ransomware attacks, or data theft.

While these fake sites can be incredibly convincing, take these simple steps to avoid being fooled.

  • Before you download the Zoom application (or any application), double check the address of the website you’re on. Is it what you’re expecting? If you clicked an email to get to that site, are you 100% sure it’s from the real company?
  • Study the rest of the web page too, looking for anything that doesn’t ring true, such as spelling mistakes or a clunky layout.
  • Make sure your security software is up to date and is actively scanning for malware and suspicious downloads.
  • Have a plan to roll out this advice across your business.

If you need any help or advice to keep your business protected from malware and other security threats, get in touch. Published with permission from Your Tech Updates.

Share this article with your friends...

Facebook
Twitter
LinkedIn
WhatsApp
Email

Get Started With StormWarden

Getting started is easy.  Get in touch with us today.

Read More

Related Articles

person using laptop

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your

person holding silver iPhone 6

Google Drive is more than a file-sharing platform. It allows you to streamline your work in ways you never thought were possible.

Registration, Log In, Keyboard, Hand, Write

Credential theft is now at an all-time high and is responsible for more data breaches than any other type of attack. With

StormWarden - Protecting Your Technology

We think everyone deserves to be protected online. Unfortunately, there are ways for crooked people to exploit the internet for shady purposes and small and medium businesses are very attractive targets.

Our reliable team offers holistic, end-to-end IT management and consistent protection from the internet’s evildoers. We don’t just set up business computers, networks and software. Our Wardens focus on safely setting up your systems to defend your data and give you peace of mind. If you ever need to be rescued from an IT crisis, it’s easy to call on the Wardens anytime for backup.

© StormWarden | Business IT Managed Services and Business IT Support. All rights reserved