


“But I wouldn’t be surprised if this is something that attackers are trying to do.” “This project took me months, and I didn't even get all the way there in terms of carrying out the full attack, so I think this would only be available to very well-funded attackers,” Silvanovich says. But a hacker could still have used the access to intercept calls in which users didn't enable that protection. Zoom users have the option to turn on end-to-end encryption for their calls on the platform, which would keep an attacker with that server access from surveilling their communications. Though fixed now, the two vulnerabilities could have been exploited without any user involvement to take over a victim's device or even compromise a Zoom server that processes many users' communications in addition to those of the original victim. Her list now includes Zoom, which until recently had two alarming, interactionless flaws lurking inside. But as so-called zero-click vulnerabilities-in which the target does nothing at all-are exploited more and more, Natalie Silvanovich of Google's Project Zero bug-hunting team has worked to find new examples and get them fixed before attackers can use them.

Visit podcastchoices.Most hacks require the victim to click on the wrong link or open the wrong attachment. If you like the show, telling a friend about it would be helpful! You can text, email, Tweet, or send this link to a friend: Tweet your crazy near-death experiences to using #IAlmostDiedPodcast!ĭon’t forget to subscribe to the podcast for free wherever you're listening or by using this link: Get 15% off their Raycon order at /almost Plus, Ben introduces his new segment, "Random Little Thoughts," and brings about a new conspiracy theory about chicken pox. He talks about gang fights outside of his school, having a bomb squad show up, and why all these experiences (and other things) have caused him to stop "hacking" Zoom classes for good. This week, Ben talks the severe lack of security on schools back in the day.
