The New York Times interviewed IT experts in vulnerability and security who showed them how they could hack videoconferences meeting room with very little effort. It seems many of the largest companies in the world, venture capital companies, oil companies, pharmaceutical companies, even Goldman Sachs, do not take the time to define the appropriate safety features of their dons conferencing software -Fire, the wide open leaving the pirates. In some cases, it is as simple as dialing into a conference call. In just two hours, the experts were able to locate 5,000 vulnerable systems with a program they wrote to find the configuration of videoconference systems outside a firewall, with an answering machine. They were able to demonstrate how they could not only listen in on a call, but they could control the camera. This type of vulnerability opens the floodgates. Once someone accesses your video conferencing system, they could find the stored address information and find call information for systems that are behind firewalls or have more security in place. Basically hide are children, hide are women. Videoconferencing gonna need more advanced security options, but with a simpler user experience.
Full Article THREAT LEVEL via Wired
0 Komentar