Zoom is unsafe says MHA

Attached communication.

I personally know parents whose children were having calls with friends which were hacked by unknown people. So its real.

If you are still going to use zoom, this must be adhered to:

1. Password protect your meetings

The simplest way to prevent unwanted attendees and hijacking is to set a password for your meeting. Passwords can be set at the individual meeting, user, group, or account level for all sessions. In order to do so, first sign in with your account at the Zoom web portal. If you want to set up a password at the individual meeting level, head straight over to the "Settings" tab and enable "Require a password when scheduling new meetings", which will ensure a password will be generated when a meeting is scheduled. All participants require the password to join the meeting. Subscription holders can also choose to go into "Group Management" to require that everyone follows the same password practices.

2. Authenticate users

When creating a new event, you should choose to only allow signed-in users to participate

3. Join before host

Do not allow others to join a meeting before you, as the host, have arrived. You can enforce this setting for a group under "Account Settings."

4. Lock down your meeting

Once a session has begun, head over to the "Manage Participants" tab, click "More," and choose to "lock" your meeting as soon as every expected participant has arrived. This will prevent others from joining even if meeting IDs or access details have been leaked.

5. Turn off participant screen sharing

No-one wants to see inappropriate material shared by a Zoom bomber, and so disabling the ability for meeting attendees to share their screens is worthwhile. This option can be accessed from the new "Security" tab in active sessions.

6. Use a randomly-generated ID

You should not use your personal meeting ID if possible, as this could pave the way for pranksters or attackers that know it to disrupt online sessions. Instead, choose a randomly generated ID for meetings when creating a new event. In addition, you should not share your personal ID publicly.

7. Use waiting rooms

The Waiting Room feature is a way to screen participants before they are allowed to enter a meeting. While legitimately useful for purposes including interviews or virtual office hours, this also gives hosts greater control over session security.

8. Avoid file sharing

Be careful with the file-sharing feature of meetings, especially if users that you don't recognize are sending content across, as it may be malicious. Instead, share material using a trusted service such as Box or Google Drive. At the time of writing, Zoom has disabled this feature anyway due to a "potential security vulnerability

9. Remove nuisance attendees

If you find that someone is disrupting a meeting, you can kick them out under the "Participants" tab. Hover over the name, click "More," and remove them. You can also make sure they cannot rejoin by disabling "Allow Removed Participants to Rejoin" under the "Settings: Meetings - Basic" tab.

10. Check for updates

As security issues crop up and patches are deployed or functions are disabled, you should make sure you have the latest build. In order to check, open the desktop application, click on your profile in the top-right, and select "Check for updates." more  

via_LocalCircles_008FE72F-9003-42E8-B260-3319963A38BF___20200417062001___.jpeg
via_LocalCircles_7962042C-EB6C-4528-B609-A1333C4D05CF___20200417062001___.jpeg
View all 8 comments Below 8 comments
Do the APP makers deliberately keep loop holes to facilitate hacking. Otherwise, why GOI banned / blocked so many Chinese Apps! Hence, IT ministry must ensure authenticity and reliability of any App before launching. more  
Yes. All such mass communication Apps have one or the other loophole / weak point. The user should take care of his security, against hacking etc. more  
Sir, We are conducting online classes through Zoom app only. Even before the cautionary information from the MHA, we have taken many safety measures. No doubt, the instructions by the government is good. But I doubt how many of us will take them seriously. Once we read on the net about leaking of accounts, we have taken precautions. But many know and think that they are not affected by it. The problem is not the Zoom app. But the Android OS itself. The best OS for mobiles is windows but unfortunately as there was not that much liking by the people, they have stopped giving support to their mobiles. No question of 3rd party intervention, no virus and completely secure and also all the things you can do on PC/Laptop also. Apple phone is good but very costly. If people realise the problems with Android OS, then they may start using Windows phone again. Even New York City Police are using Windows phones and not Android or Apple phones. That much secure these phones are. more  
Individuals should take precautions as given out. Cyber security can never be absolute. more  
Post a Comment

Related Posts

    • AVOIDABLE TRAGEDY

      The majority of Indians are deeply spiritual, with a wide array of religious beliefs. This diversity in belief is not inherently problematic; in fact, many people seek the grace of the Almighty for...

      By Jayakumar Daniel
      /
    • Drugs that have failed quality tests

      Full list of drugs that failed quality tests. Do share with friends family so if they are taking them they find replacements or consult Doctors Cyra Tablets, Rabeprazole Sodium Tablets I...

      By Sarita Ravichandran
      /
    • Bhartiya Nyay Sanhita needs to be rolled back

      In just 15 days, from the 01st of July, the Indian law system will be turned on its head. The BNS is about to begin. Bharatiya Nyay Sanhita (BNS) gives massive powers to local...

      By Ruchika L Maheshwari
      /
    • Band-Aid causing cancer

      Cancer-causing forever chemicals found in BAND-AIDS where they can get directly into blood through open wounds, report warns Bandages from some of the most well-reputed brands, including...

      By Radha Puri
      /
    • Heatwave Alert

      All do’s and don’t issued by sarkar attached

      By Sneha Goyal
      /
    • How to know if phone security is compromised

      Important Thread: 9 Signs Your Phone’s Security Is Compromised! The phone tapping case, which has been making headlines in Telangana, has sparked concerns about the privacy and sec...

      By Garima Sharma
      /
    • Words of ex CBI director Nageshwar Rao today

      Every Indian’s Aadhar Card, PAN Card, Bank Account, Passport, Driving License, FasTag, DigiYatra, Mobile, DigiLocker, Property and Vehicle Registration, Payments, etc are all digitised and li...

      By Rajesh Suri
      /
    • WHY ARE DOGS ROAMING THE STREETS?

      It is reported that a 7 month old Baby has been mauled to death. It appears the Baby was left unattended by a Cleaning Staff. But who let the dogs out on Streets. ? Their place is in human homes a...

      By Jayakumar Daniel
      /
    • Road side assistance for auto cos during an emergency:

      Road side assistance contact numbers during an emergency: Maruti Suzuki: 1800 102 1800 Hyundai: 1800 102 4645 Tata Motors: 1800 209 8282 Mahindra: 1800 209 6006 Toyot...

      By Ruchika Mistry
      /
    • MOSQUITO ERADICATION

      There are a lot of eradication programmes that Netas are talking about. Nobody talks about eradication of mosquitoes. Because of this menace there are more ills than all others put together. ...

      By VIJAYKUMAR N
      /
    • How to ensure whatsapp call doesnt compromise your location

      Did you know that when you make a whatsapp call you disclose your IP addresses to the other person, thereby exposing certain information, including data provider and geographical location.

      By Ruchika L Maheshwari
      /
Share
Enter your email and mobile number and we will send you the instructions

Note - The email can sometime gets delivered to the spam folder, so the instruction will be send to your mobile as well

All My Circles
Invite to
(Maximum 500 email ids allowed.)