Tag Archive for: Meetings

Five smart ways to use your webcam for more than Zoom meetings.


If you need an image on your computer, you can use your webcam to scan it in.

Remember in early 2020 when we were excited to join Zoom happy hours, and every meeting was a video?

If you still are meeting with clients, co-workers, and friends via video, you might as well look and sound good. Tap or click for my top Zoom tips.

Maybe you’re back to the office or at least not taking as many video calls. One clever use for your webcam, or an old phone or laptop, is to turn it into a security camera. Tap or click here for steps to set it up in under a minute.

Here are five more ways to get your money’s worth out of your webcam:

1. Use it to scan documents to your computer

Taking a photo, cropping it, emailing it to yourself, then uploading it or attaching it to another email is a pain. If you need an image on your computer, use your webcam. Even a decent webcam is good enough to scan a document for you.

On a Mac:

• Open Photo Booth. Your webcam will automatically open.

• Place your document in front of the webcam and line it up on the screen.

Source…

Cisco rolls out fix for Webex flaws that let hackers eavesdrop on meetings


Promotional image for video-conferencing software.

Cisco is rolling out fixes for three vulnerabilities in its Webex video-conference software that made it possible for interlopers to eavesdrop on meetings as a “ghost,” meaning being able to view, listen, and more without being seen by the organizer or any of the attendees.

The vulnerabilities were discovered by IBM Research and the IBM’s Office of the CISO, which analyzed Webex because it’s the company’s primary tool for remote meetings. The discovery comes as work-from-home routines have driven a more than fivefold increase in the use of Webex between February and June. At its peak, Webex hosted up to 4 million meetings in a single day.

The vulnerabilities made it possible for an attacker to:

  • Join a meeting as a ghost, in most cases with full access to audio, video, chat, and screen-sharing capabilities
  • Maintain an audio feed as a ghost even after being expelled by the meeting leader
  • Access full names, email addresses, and IP addresses of meeting attendees, even when not admitted to a conference room.

Cisco is in the process of rolling out a fix now for the vulnerabilities, which are tracked as CVE-2020-3441, CVE-2020-3471, and CVE-2020-3419. Below is a video demonstration and deeper explanation:

IBM Works with Cisco to Exorcise Ghosts from Webex Meetings.

Manipulating the handshake

Attacks work by exploiting the virtual handshake that Webex uses to establish a connection between meeting participants. The process works when an end user and server exchange join messages that include information about the attendees, the end-user application, meeting ID, and meeting-room details. In the process, Webex establishes a WebSocket connection between the user and the server.

“By manipulating some of the key fields about an attendee sent over a WebSocket when joining a meeting, the team was able to inject the carefully crafted values that allow someone to join as a ghost attendee,” IBM researchers wrote in a post published on Wednesday. “This worked because of improper handling of the values by the server and other participants’ client applications. For example,…

Source…

Zoom bug meant attackers could brute force their way into password-protected meetings

Zoom has patched a security hole that could have allowed attackers to break their way into password-protected private calls.

Read more in my article on the Hot for Security blog.

Graham Cluley

Rudy Giuliani to coordinate regular cybersecurity meetings between Trump, tech leaders

Former New York Mayor Rudy Giuliani says Donald Trump has tapped him to gather top cybersecurity leaders to meet with the administration regularly to share “all the information available in the private sector” with the goal of improving national cyber defenses “because we’re so far behind.”

“The president elect-decided he wanted to bring in on a regular basis the people in the private sector, the corporate leaders in particular and thought leaders in the private sector who are working on security for cyber because we’re so far behind,” Giuliani said on Fox and Friends.

To read this article in full or to leave a comment, please click here

Network World Tim Greene