To enhance the security of Zoom at the University, all Zoom users need to upgrade to the latest version of the Zoom Client software. This update requirement is six ...
Zoom users are currently unable to join meetings and webinars through the Zoom web client and WebSDK, with the outage not impacting users joining through the Zoom application. An incident entry posted ...
Beginning Nov. 1, 2021, Zoom users will be required to update their Zoom Client software to ensure it is no more than nine months behind the current version at any ...
Zoom regularly provides new versions of the Zoom desktop client to release new features and fix bugs. For example, if you are having difficulties joining breakout rooms it is probably because you are ...
Zoom released a beta iOS mobile browser client that lets doctors send links to patients for appointment access. That means patients will no longer need to download an app just to access their ...
Zoom users are advised to update their clients to version 5.10.0 to patch a number of holes found by Google Project Zero security researcher Ivan Fratric. "User interaction is not required for a ...
Video conferencing software Zoom is working on patching a zero-day vulnerability that was disclosed online earlier today in a blog post by cyber-security firm ACROS Security. The security firm said ...
Forbes contributors publish independent expert analyses and insights. I write about disruptive companies, technologies and usage models. Zoom held its annual Zoomtopia in person and live this week, ...
Google is joining the growing number of organizations who’ve decided to stop using Zoom due to the security concerns with the video-conferencing service. The new restriction was emailed out to Google ...
An unpatched and previously unknown vulnerability in the Zoom Client for Windows, known as a zero-day, has been disclosed by security company 0patch. Mitja Kolsek, 0patch co-founder, said that the ...
The Zoom videoconferencing platform was affected by a zero-day vulnerability that could have allowed attackers to execute commands remotely on affected machines. The flaw impacted devices running the ...